Search Results for author: Tansu Alpcan

Found 12 papers, 3 papers with code

OIL-AD: An Anomaly Detection Framework for Sequential Decision Sequences

no code implementations7 Feb 2024 Chen Wang, Sarah Erfani, Tansu Alpcan, Christopher Leckie

Our offline learning model is an adaptation of behavioural cloning with a transformer policy network, where we modify the training process to learn a Q function and a state value function from normal trajectories.

Anomaly Detection Behavioural cloning +2

Failure-tolerant Distributed Learning for Anomaly Detection in Wireless Networks

no code implementations23 Mar 2023 Marc Katzef, Andrew C. Cullen, Tansu Alpcan, Christopher Leckie, Justin Kopacz

When such failures arise in wireless communications networks, important services that they use/provide (like anomaly detection) can be left inoperable and can result in a cascade of security problems.

Anomaly Detection Federated Learning

Artificial Intelligence Techniques for Next-Generation Mega Satellite Networks

no code implementations2 Jun 2022 Bassel Al Homssi, Kosta Dakic, Ke Wang, Tansu Alpcan, Ben Allen, Russell Boyce, Sithamparanathan Kandeepan, Akram Al-Hourani, Walid Saad

This article introduces the application of AI techniques for integrated terrestrial satellite networks, particularly massive satellite network communications.

A Game-Theoretic Approach for AI-based Botnet Attack Defence

no code implementations4 Dec 2021 Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit A. Camtepe

The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid detection.

Local Intrinsic Dimensionality Signals Adversarial Perturbations

1 code implementation24 Sep 2021 Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Benjamin I. P. Rubinstein

In this paper, we derive a lower-bound and an upper-bound for the LID value of a perturbed data point and demonstrate that the bounds, in particular the lower-bound, has a positive correlation with the magnitude of the perturbation.

BIG-bench Machine Learning

Defending Regression Learners Against Poisoning Attacks

1 code implementation21 Aug 2020 Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz

Regression models, which are widely used from engineering applications to financial forecasting, are vulnerable to targeted malicious attacks such as training data poisoning, through which adversaries can manipulate their predictions.

Data Poisoning regression

Defending Distributed Classifiers Against Data Poisoning Attacks

1 code implementation21 Aug 2020 Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie

We introduce a weighted SVM against such attacks using K-LID as a distinguishing characteristic that de-emphasizes the effect of suspicious data samples on the SVM decision boundary.

Data Poisoning

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

no code implementations25 Feb 2019 Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani

Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised learning setting.

reinforcement-learning Reinforcement Learning (RL)

Reinforcement Learning for Autonomous Defence in Software-Defined Networking

no code implementations17 Aug 2018 Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani, David Hubczenko, Christopher Leckie, Paul Montague

Despite the successful application of machine learning (ML) in a wide range of domains, adaptability---the very property that makes machine learning desirable---can be exploited by adversaries to contaminate training and evade classification.

BIG-bench Machine Learning General Classification +2

Unsupervised Adversarial Anomaly Detection using One-Class Support Vector Machines

no code implementations ICLR 2018 Prameesha Sandamal Weerasinghe, Tansu Alpcan, Sarah Monazam Erfani, Christopher Leckie

Anomaly detection discovers regular patterns in unlabeled data and identifies the non-conforming data points, which in some cases are the result of malicious attacks by adversaries.

Anomaly Detection BIG-bench Machine Learning

Toward the Starting Line: A Systems Engineering Approach to Strong AI

no code implementations28 Jul 2017 Tansu Alpcan, Sarah M. Erfani, Christopher Leckie

After many hype cycles and lessons from AI history, it is clear that a big conceptual leap is needed for crossing the starting line to kick-start mainstream AGI research.

Position

Large-Scale Strategic Games and Adversarial Machine Learning

no code implementations21 Sep 2016 Tansu Alpcan, Benjamin I. P. Rubinstein, Christopher Leckie

Such high-dimensional decision spaces and big data sets lead to computational challenges, relating to efforts in non-linear optimization scaling up to large systems of variables.

BIG-bench Machine Learning Decision Making

Cannot find the paper you are looking for? You can Submit a new open access paper.