Search Results for author: Xenofon Koutsoukos

Found 22 papers, 7 papers with code

Control-based Graph Embeddings with Data Augmentation for Contrastive Learning

no code implementations7 Mar 2024 Obaid Ullah Ahmad, Anwar Said, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

In this paper, we study the problem of unsupervised graph representation learning by harnessing the control properties of dynamical networks defined on graphs.

Contrastive Learning Data Augmentation +1

Enhanced Graph Neural Networks with Ego-Centric Spectral Subgraph Embeddings Augmentation

1 code implementation10 Oct 2023 Anwar Said, Mudassir Shabbir, Tyler Derr, Waseem Abbas, Xenofon Koutsoukos

The superior performance of GNNs often correlates with the availability and quality of node-level features in the input networks.

Graph Classification Graph Embedding +1

A Survey of Graph Unlearning

no code implementations23 Aug 2023 Anwar Said, Tyler Derr, Mudassir Shabbir, Waseem Abbas, Xenofon Koutsoukos

By laying a solid foundation and fostering continued progress, this survey seeks to inspire researchers to further advance the field of graph unlearning, thereby instilling confidence in the ethical growth of AI systems and reinforcing the responsible application of machine learning techniques in various domains.

Privacy Preserving

NeuroGraph: Benchmarks for Graph Machine Learning in Brain Connectomics

1 code implementation NeurIPS 2023 Anwar Said, Roza G. Bayrak, Tyler Derr, Mudassir Shabbir, Daniel Moyer, Catie Chang, Xenofon Koutsoukos

We delve deeply into the dataset generation search space by crafting 35 datasets that encompass static and dynamic brain connectivity, running in excess of 15 baseline methods for benchmarking.

Benchmarking

Learning-Based Heuristic for Combinatorial Optimization of the Minimum Dominating Set Problem using Graph Convolutional Networks

1 code implementation6 Jun 2023 Abihith Kothapalli, Mudassir Shabbir, Xenofon Koutsoukos

The minimum dominating set problem seeks to find a dominating set of minimum cardinality and is a well-established NP-hard combinatorial optimization problem.

Combinatorial Optimization

Sequential Graph Neural Networks for Source Code Vulnerability Identification

no code implementations23 May 2023 Ammar Ahmed, Anwar Said, Mudassir Shabbir, Xenofon Koutsoukos

However, this task is rather challenging owing to the absence of reliable and adequately managed datasets and learning models.

Graph Classification

Open Set Recognition using Vision Transformer with an Additional Detection Head

1 code implementation16 Mar 2022 Feiyang Cai, Zhenkai Zhang, Jie Liu, Xenofon Koutsoukos

However, in a more realistic open set scenario, traditional classifiers with incomplete knowledge cannot tackle test data that are not from the training classes.

Image Classification Open Set Learning

Reliable Probability Intervals For Classification Using Inductive Venn Predictors Based on Distance Learning

no code implementations7 Oct 2021 Dimitrios Boursinos, Xenofon Koutsoukos

In this paper, we use the Inductive Venn Predictors framework for computing probability intervals regarding the correctness of each prediction in real-time.

Image Classification Metric Learning

Improving Prediction Confidence in Learning-Enabled Autonomous Systems

no code implementations7 Oct 2021 Dimitrios Boursinos, Xenofon Koutsoukos

In this paper, we utilize a feedback loop between learning-enabled components used for classification and the sensors of an autonomous system in order to improve the confidence of the predictions.

Conformal Prediction Decision Making +1

Edge Augmentation with Controllability Constraints in Directed Laplacian Networks

no code implementations13 May 2021 Waseem Abbas, Mudassir Shabbir, Yasin Yazicioglu, Xenofon Koutsoukos

In this paper, we study the maximum edge augmentation problem in directed Laplacian networks to improve their robustness while preserving lower bounds on their strong structural controllability (SSC).

Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

no code implementations14 Apr 2021 Feiyang Cai, Ali I. Ozdagli, Xenofon Koutsoukos

Cyber-physical systems (CPSs) use learning-enabled components (LECs) extensively to cope with various complex tasks under high-uncertainty environments.

Anomaly Detection regression +1

Byzantine Resilient Distributed Multi-Task Learning

1 code implementation NeurIPS 2020 Jiani Li, Waseem Abbas, Xenofon Koutsoukos

We analyze the approach for convex models and show that normal agents converge resiliently towards the global minimum. Further, aggregation with the proposed weight assignment rule always results in an improved expected regret than the non-cooperative case.

Multi-Task Learning

Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for Regression

no code implementations21 Mar 2020 Feiyang Cai, Jiani Li, Xenofon Koutsoukos

Learning-enabled components (LECs) are widely used in cyber-physical systems (CPS) since they can handle the uncertainty and variability of the environment and increase the level of autonomy.

Conformal Prediction regression +1

Resilient Distributed Vector Consensus Using Centerpoints

1 code implementation11 Mar 2020 Waseem Abbas, Mudassir Shabbir, Jiani Li, Xenofon Koutsoukos

In this paper, we study the resilient vector consensus problem in networks with adversarial agents and improve resilience guarantees of existing algorithms.

Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems

no code implementations11 Mar 2020 Dimitrios Boursinos, Xenofon Koutsoukos

Cyber-physical systems (CPS) can benefit by the use of learning enabled components (LECs) such as deep neural networks (DNNs) for perception and decision making tasks.

Conformal Prediction Decision Making

Real-time Out-of-distribution Detection in Learning-Enabled Cyber-Physical Systems

no code implementations28 Jan 2020 Feiyang Cai, Xenofon Koutsoukos

The simulation results show very small number of false positives and detection delay while the execution time is comparable to the execution time of the original machine learning components.

Anomaly Detection BIG-bench Machine Learning +3

Assurance Monitoring of Cyber-Physical Systems with Machine Learning Components

no code implementations14 Jan 2020 Dimitrios Boursinos, Xenofon Koutsoukos

In this paper, we investigate how to use the conformal prediction framework for assurance monitoring of CPS with machine learning components.

BIG-bench Machine Learning Conformal Prediction +2

Computation of the Distance-based Bound on Strong Structural Controllability in Networks

no code implementations8 Sep 2019 Mudassir Shabbir, Waseem Abbas, A. Yasin Yazicioglu, Xenofon Koutsoukos

The bound is based on a sequence of vectors containing the distances between leaders (nodes with external inputs) and followers (remaining nodes) in the underlying network graph.

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems

no code implementations30 Apr 2018 Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Attacks in cyber-physical systems (CPS) which manipulate sensor readings can cause enormous physical damage if undetected.

regression

Cannot find the paper you are looking for? You can Submit a new open access paper.