Skip to main content

Showing 1–10 of 10 results for author: Peck, J

  1. arXiv:2405.15971  [pdf, other

    cs.LG cs.CR cs.CV

    Robust width: A lightweight and certifiable adversarial defense

    Authors: Jonathan Peck, Bart Goossens

    Abstract: Deep neural networks are vulnerable to so-called adversarial examples: inputs which are intentionally constructed to cause the model to make incorrect predictions or classifications. Adversarial examples are often visually indistinguishable from natural data samples, making them hard to detect. As such, they pose significant threats to the reliability of deep learning systems. In this work, we stu… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. arXiv:2209.03357  [pdf, other

    cs.LG cs.AI

    Distilling Deep RL Models Into Interpretable Neuro-Fuzzy Systems

    Authors: Arne Gevaert, Jonathan Peck, Yvan Saeys

    Abstract: Deep Reinforcement Learning uses a deep neural network to encode a policy, which achieves very good performance in a wide range of applications but is widely regarded as a black box model. A more interpretable alternative to deep networks is given by neuro-fuzzy controllers. Unfortunately, neuro-fuzzy controllers often need a large number of rules to solve relatively simple tasks, making them diff… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  3. arXiv:2110.09687  [pdf

    eess.SP cs.LG

    Data Driven Prediction of Battery Cycle Life Before Capacity Degradation

    Authors: Anmol Singh, Caitlin Feltner, Jamie Peck, Kurt I. Kuhn

    Abstract: Ubiquitous use of lithium-ion batteries across multiple industries presents an opportunity to explore cost saving initiatives as the price to performance ratio continually decreases in a competitive environment. Manufacturers using lithium-ion batteries ranging in applications from mobile phones to electric vehicles need to know how long batteries will last for a given service life. To understand… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 28 pages, 11 figures, 1 table, 12 equations

  4. Making existing software quantum safe: a case study on IBM Db2

    Authors: Lei Zhang, Andriy Miranskyy, Walid Rjaibi, Greg Stager, Michael Gray, John Peck

    Abstract: The software engineering community is facing challenges from quantum computers (QCs). In the era of quantum computing, Shor's algorithm running on QCs can break asymmetric encryption algorithms that classical computers practically cannot. Though the exact date when QCs will become "dangerous" for practical problems is unknown, the consensus is that this future is near. Thus, the software engineeri… ▽ More

    Submitted 2 April, 2023; v1 submitted 16 October, 2021; originally announced October 2021.

    Comments: 25 pages, 4 figures

    Journal ref: Information and Software Technology, 2023 (early access)

  5. Homogenizing Entropy Across Different Environmental Conditions: A Universally Applicable Method for Transforming Continuous Variables

    Authors: Joel R. Peck, David Waxman

    Abstract: In classical information theory, a causal relationship between two variables is typically modelled by assuming that, for every possible state of one of the variables, there exists a particular distribution of states of the second variable. Let us call these two variables the causal and caused variables, respectively. We shall assume that both variables are continuous and one-dimensional. In this w… ▽ More

    Submitted 24 February, 2023; v1 submitted 8 July, 2021; originally announced July 2021.

    Comments: 20 pages, 3 figures

    Journal ref: IEEE Transactions on Information Theory, vol. 69, no. 3, pp. 1394-1412, March 2023

  6. arXiv:2007.03198  [pdf, other

    cs.LG cs.CV stat.ML

    Regional Image Perturbation Reduces $L_p$ Norms of Adversarial Examples While Maintaining Model-to-model Transferability

    Authors: Utku Ozbulak, Jonathan Peck, Wesley De Neve, Bart Goossens, Yvan Saeys, Arnout Van Messem

    Abstract: Regional adversarial attacks often rely on complicated methods for generating adversarial perturbations, making it hard to compare their efficacy against well-known attacks. In this study, we show that effective regional perturbations can be generated without resorting to complex methods. We develop a very simple regional adversarial perturbation attack method using cross-entropy sign, one of the… ▽ More

    Submitted 18 July, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted for the ICML 2020, Workshop on Uncertainty and Robustness in Deep Learning (UDL)

  7. arXiv:2006.03175  [pdf, other

    q-bio.PE cs.MA cs.SI physics.soc-ph

    Simulating COVID-19 in a University Environment

    Authors: Philip T. Gressman, Jennifer R. Peck

    Abstract: Residential colleges and universities face unique challenges in providing in-person instruction during the COVID-19 pandemic. Administrators are currently faced with decisions about whether to open during the pandemic and what modifications of their normal operations might be necessary to protect students, faculty and staff. There is little information, however, on what measures are likely to be m… ▽ More

    Submitted 28 June, 2020; v1 submitted 4 June, 2020; originally announced June 2020.

    Comments: 30 pages, 9 figures; fixed minor typos and rephrased some unclear points

    Journal ref: Mathematical Biosciences Volume 328, October 2020, 108436

  8. arXiv:2003.05703  [pdf, other

    cs.CR stat.ML

    Inline Detection of DGA Domains Using Side Information

    Authors: Raaghavi Sivaguru, Jonathan Peck, Femi Olumofin, Anderson Nascimento, Martine De Cock

    Abstract: Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a communication between an infected bot and the C&C server. In recent years, machine learning based systems have been widely used to detect DGAs. There ar… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

  9. arXiv:1905.01078  [pdf, other

    cs.LG cs.CR stat.ML

    CharBot: A Simple and Effective Method for Evading DGA Classifiers

    Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock

    Abstract: Domain generation algorithms (DGAs) are commonly leveraged by malware to create lists of domain names which can be used for command and control (C&C) purposes. Approaches based on machine learning have recently been developed to automatically detect generated domain names in real-time. In this work, we present a novel DGA called CharBot which is capable of producing large numbers of unregistered d… ▽ More

    Submitted 30 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

  10. Textual Paralanguage and its Implications for Marketing Communications

    Authors: Andrea Webb Luangrath, Joann Peck, Victor A. Barger

    Abstract: Both face-to-face communication and communication in online environments convey information beyond the actual verbal message. In a traditional face-to-face conversation, paralanguage, or the ancillary meaning- and emotion-laden aspects of speech that are not actual verbal prose, gives contextual information that allows interactors to more appropriately understand the message being conveyed. In thi… ▽ More

    Submitted 22 May, 2016; originally announced May 2016.

    Comments: Forthcoming in the Journal of Consumer Psychology

    Journal ref: Journal of Consumer Psychology 27 (2017) 98-107