Zobrazeno 1 - 10
of 167
pro vyhledávání: '"Dasgupta, Prithviraj"'
We consider the problem of team formation within multiagent adversarial games. We propose BERTeam, a novel algorithm that uses a transformer-based deep neural network with Masked Language Model training to select the best team of players from a train
Externí odkaz:
http://arxiv.org/abs/2410.13769
Autor:
Beason, Jordan, Novitzky, Michael, Kliem, John, Errico, Tyler, Serlin, Zachary, Becker, Kevin, Paine, Tyler, Benjamin, Michael, Dasgupta, Prithviraj, Crowley, Peter, O'Donnell, Charles, James, John
The objective of this work is to evaluate multi-agent artificial intelligence methods when deployed on teams of unmanned surface vehicles (USV) in an adversarial environment. Autonomous agents were evaluated in real-world scenarios using the Aquaticu
Externí odkaz:
http://arxiv.org/abs/2404.17038
Autor:
Dasgupta, Prithviraj
We consider the problem of learning to perform a task from demonstrations given by teachers or experts, when some of the experts' demonstrations might be adversarial and demonstrate an incorrect way to perform the task. We propose a novel technique t
Externí odkaz:
http://arxiv.org/abs/2306.04581
Autor:
Brandt, Bryan, Dasgupta, Prithviraj
We consider the problem of synthetically generating data that can closely resemble human decisions made in the context of an interactive human-AI system like a computer game. We propose a novel algorithm that can generate synthetic, human-like, decis
Externí odkaz:
http://arxiv.org/abs/2304.07280
Autor:
Dasgupta, Prithviraj, Osman, Zachariah
We consider the problem of generating adversarial malware by a cyber-attacker where the attacker's task is to strategically modify certain bytes within existing binary malware files, so that the modified files are able to evade a malware detector suc
Externí odkaz:
http://arxiv.org/abs/2111.11487
We consider the problem of prediction by a machine learning algorithm, called learner, within an adversarial learning setting. The learner's task is to correctly predict the class of data passed to it as a query. However, along with queries containin
Externí odkaz:
http://arxiv.org/abs/2002.03924
Publikováno v:
AI Magazine, 40(2), 31-43 (2019)
Machine learning techniques are currently used extensively for automating various cybersecurity tasks. Most of these techniques utilize supervised learning algorithms that rely on training the algorithm to classify incoming data into different catego
Externí odkaz:
http://arxiv.org/abs/1912.02258
Autor:
Dutta, Ayan, Dasgupta, Prithviraj
Publikováno v:
2016 IEEE International Conference on Robotics and Automation (ICRA), Stockholm, 2016, pp. 5216-5221
We consider the configuration formation problem in modular robotic systems where a set of singleton modules that are spatially distributed in an environment are required to assume appropriate positions so that they can configure into a new, user-spec
Externí odkaz:
http://arxiv.org/abs/1610.05731