Zobrazeno 1 - 10
of 253
pro vyhledávání: '"Beling, Peter"'
Autor:
Abdeen, Zain ul, Roy, Padmaksha, Al-Tawaha, Ahmad, Jia, Rouxi, Freeman, Laura, Beling, Peter, Liu, Chen-Ching, Sangiovanni-Vincentelli, Alberto, Jin, Ming
There is an upward trend of deploying distributed energy resource management systems (DERMS) to control modern power grids. However, DERMS controller communication lines are vulnerable to cyberattacks that could potentially impact operational reliabi
Externí odkaz:
http://arxiv.org/abs/2405.02989
The machine learning formulation of online learning is incomplete from a systems theoretic perspective. Typically, machine learning research emphasizes domains and tasks, and a problem solving worldview. It focuses on algorithm parameters, features,
Externí odkaz:
http://arxiv.org/abs/2404.03775
This paper addresses the urgent need for messaging standards in the operational test and evaluation (T&E) of machine learning (ML) applications, particularly in edge ML applications embedded in systems like robots, satellites, and unmanned vehicles.
Externí odkaz:
http://arxiv.org/abs/2404.03769
There is a lack of formalism for some key foundational concepts in systems engineering. One of the most recently acknowledged deficits is the inadequacy of systems engineering practices for engineering intelligent systems. In our previous works, we p
Externí odkaz:
http://arxiv.org/abs/2311.10786
Active learning is a practical field of machine learning that automates the process of selecting which data to label. Current methods are effective in reducing the burden of data labeling but are heavily model-reliant. This has led to the inability o
Externí odkaz:
http://arxiv.org/abs/2302.14567
Autor:
Huang, Lanxiao, Cody, Tyler, Redino, Christopher, Rahman, Abdul, Kakkar, Akshay, Kushwaha, Deepak, Wang, Cheng, Clark, Ryan, Radke, Daniel, Beling, Peter, Bowen, Edward
Reinforcement learning (RL) operating on attack graphs leveraging cyber terrain principles are used to develop reward and state associated with determination of surveillance detection routes (SDR). This work extends previous efforts on developing RL
Externí odkaz:
http://arxiv.org/abs/2211.03027
Engineering methods are centered around traditional notions of decomposition and recomposition that rely on partitioning the inputs and outputs of components to allow for component-level properties to hold after their composition. In artificial intel
Externí odkaz:
http://arxiv.org/abs/2208.02837
In this paper, we present BESSIE (Behavior and Epidemic Simulator for Synthetic Information Environments), an open source, agent-based simulator for COVID-type epidemics. BESSIE uses a synthetic population where each person has demographic attributes
Externí odkaz:
http://arxiv.org/abs/2203.11414
Autor:
Cody, Tyler, Rahman, Abdul, Redino, Christopher, Huang, Lanxiao, Clark, Ryan, Kakkar, Akshay, Kushwaha, Deepak, Park, Paul, Beling, Peter, Bowen, Edward
Reinforcement learning (RL), in conjunction with attack graphs and cyber terrain, are used to develop reward and state associated with determination of optimal paths for exfiltration of data in enterprise networks. This work builds on previous crown
Externí odkaz:
http://arxiv.org/abs/2201.12416
Publikováno v:
In Advances in Water Resources June 2024 188