Goto

Collaborating Authors

 Cherry Hill


Adaptive ECCM for Mitigating Smart Jammers

Pattanayak, Kunal, Jain, Shashwat, Krishnamurthy, Vikram, Berry, Chris

arXiv.org Artificial Intelligence

A list of standard ECM and ECCM strategies are summarized in [1] and [2]. This paper considers adaptive radar electronic counter-counter This paper formulates the radar's ECCM objective as a measures (ECCM) to mitigate ECM by an adversarial jammer. Principle Agent Problem (PAP), wherein the radar gradually Our ECCM approach models the jammer-radar interaction learns the jammer's objective using Inverse Reinforcement as a Principal Agent Problem (PAP), a popular economics Learning (IRL). We assume the radar possesses IRL capability framework for interaction between two entities with and can learn the jammer's utility, while the jammer an information imbalance. In our setup, the radar does not is a naive agent - it only maximizes its utility. Reconstructing know the jammer's utility. Instead, the radar learns the jammer's agent preferences from a finite time series dataset is the utility adaptively over time using inverse reinforcement central theme of revealed preference in micro-economics [3], learning. The radar's adaptive ECCM objective is two-fold [4]. In the radar context, the radar uses the celebrated result (1) maximize its utility by solving the PAP, and (2) estimate of Afriat's theorem [3] to estimate the jammer's utility over the jammer's utility by observing its response.


How can a Radar Mask its Cognition?

Pattanayak, Kunal, Krishnamurthy, Vikram, Berry, Christopher

arXiv.org Artificial Intelligence

A cognitive radar is a constrained utility maximizer that adapts its sensing mode in response to a changing environment. If an adversary can estimate the utility function of a cognitive radar, it can determine the radar's sensing strategy and mitigate the radar performance via electronic countermeasures (ECM). This paper discusses how a cognitive radar can {\em hide} its strategy from an adversary that detects cognition. The radar does so by transmitting purposefully designed sub-optimal responses to spoof the adversary's Neyman-Pearson detector. We provide theoretical guarantees by ensuring the Type-I error probability of the adversary's detector exceeds a pre-defined level for a specified tolerance on the radar's performance loss. We illustrate our cognition masking scheme via numerical examples involving waveform adaptation and beam allocation. We show that small purposeful deviations from the optimal strategy of the radar confuse the adversary by significant amounts, thereby masking the radar's cognition. Our approach uses novel ideas from revealed preference in microeconomics and adversarial inverse reinforcement learning. Our proposed algorithms provide a principled approach for system-level electronic counter-countermeasures (ECCM) to mask the radar's cognition, i.e., hide the radar's strategy from an adversary. We also provide performance bounds for our cognition masking scheme when the adversary has misspecified measurements of the radar's response.


Pattern Ensembling for Spatial Trajectory Reconstruction

Pathak, Shivam, He, Mingyi, Malinchik, Sergey, Sobolevsky, Stanislav

arXiv.org Machine Learning

Digital sensing provides an unprecedented opportunity to assess and understand mobility. However, incompleteness, missing information, possible inaccuracies, and temporal heterogeneity in the geolocation data can undermine its applicability. As mobility patterns are often repeated, we propose a method to use similar trajectory patterns from the local vicinity and probabilistically ensemble them to robustly reconstruct missing or unreliable observations. We evaluate the proposed approach in comparison with traditional functional trajectory interpolation using a case of sea vessel trajectory data provided by The Automatic Identification System (AIS). By effectively leveraging the similarities in real-world trajectories, our pattern ensembling method helps to reconstruct missing trajectory segments of extended length and complex geometry. It can be used for locating mobile objects when temporary unobserved as well as for creating an evenly sampled trajectory interpolation useful for further trajectory mining.


Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack

Guan, Ziwei, Ji, Kaiyi, Bucci, Donald J Jr, Hu, Timothy Y, Palombo, Joseph, Liston, Michael, Liang, Yingbin

arXiv.org Machine Learning

The multi-armed bandit formalism has been extensively studied under various attack models, in which an adversary can modify the reward revealed to the player. Previous studies focused on scenarios where the attack value either is bounded at each round or has a vanishing probability of occurrence. These models do not capture powerful adversaries that can catastrophically perturb the revealed reward. This paper investigates the attack model where an adversary attacks with a certain probability at each round, and its attack value can be arbitrary and unbounded if it attacks. Furthermore, the attack value does not necessarily follow a statistical distribution. We propose a novel sample median-based and exploration-aided UCB algorithm (called med-E-UCB) and a median-based $\epsilon$-greedy algorithm (called med-$\epsilon$-greedy). Both of these algorithms are provably robust to the aforementioned attack model. More specifically we show that both algorithms achieve $\mathcal{O}(\log T)$ pseudo-regret (i.e., the optimal regret without attacks). We also provide a high probability guarantee of $\mathcal{O}(\log T)$ regret with respect to random rewards and random occurrence of attacks. These bounds are achieved under arbitrary and unbounded reward perturbation as long as the attack probability does not exceed a certain constant threshold. We provide multiple synthetic simulations of the proposed algorithms to verify these claims and showcase the inability of existing techniques to achieve sublinear regret. We also provide experimental results of the algorithm operating in a cognitive radio setting using multiple software-defined radios.


K-medoids Clustering of Data Sequences with Composite Distributions

Wang, Tiexing, Li, Qunwei, Bucci, Donald J., Liang, Yingbin, Chen, Biao, Varshney, Pramod K.

arXiv.org Machine Learning

This paper studies clustering of data sequences using the k-medoids algorithm. All the data sequences are assumed to be generated from \emph{unknown} continuous distributions, which form clusters with each cluster containing a composite set of closely located distributions (based on a certain distance metric between distributions). The maximum intra-cluster distance is assumed to be smaller than the minimum inter-cluster distance, and both values are assumed to be known. The goal is to group the data sequences together if their underlying generative distributions (which are unknown) belong to one cluster. Distribution distance metrics based k-medoids algorithms are proposed for known and unknown number of distribution clusters. Upper bounds on the error probability and convergence results in the large sample regime are also provided. It is shown that the error probability decays exponentially fast as the number of samples in each data sequence goes to infinity. The error exponent has a simple form regardless of the distance metric applied when certain conditions are satisfied. In particular, the error exponent is characterized when either the Kolmogrov-Smirnov distance or the maximum mean discrepancy are used as the distance metric. Simulation results are provided to validate the analysis.


These 17 Books Made 2017 a Little Less Terrible for Our Readers

Mother Jones

The events of this year have some Mother Jones readers turning to books for perspective and comfort. Leonard Jay Hastings of Manchester, Michigan, picked up The Plot Against America and tells us this book about a dictatorship "reminds the reader that the corrective measures lie with the citizen public and not primarily with our present elected officials." Others like Emily Wilkinson in Pasadena, Texas, have immersed themselves in other worlds. Emily says The Hitchhiker's Guide to the Galaxy "provided a welcome escape from reality." We asked you to tell us which books helped get you through 2017.


Multi-view constrained clustering with an incomplete mapping between views

Eaton, Eric, desJardins, Marie, Jacob, Sara

arXiv.org Artificial Intelligence

Multi-view learning algorithms typically assume a complete bipartite mapping between the different views in order to exchange information during the learning process. However, many applications provide only a partial mapping between the views, creating a challenge for current methods. To address this problem, we propose a multi-view algorithm based on constrained clustering that can operate with an incomplete mapping. Given a set of pairwise constraints in each view, our approach propagates these constraints using a local similarity measure to those instances that can be mapped to the other views, allowing the propagated constraints to be transferred across views via the partial mapping. It uses co-EM to iteratively estimate the propagation within each view based on the current clustering model, transfer the constraints across views, and then update the clustering model. By alternating the learning process between views, this approach produces a unified clustering model that is consistent with all views. We show that this approach significantly improves clustering performance over several other methods for transferring constraints and allows multi-view clustering to be reliably applied when given a limited mapping between the views. Our evaluation reveals that the propagated constraints have high precision with respect to the true clusters in the data, explaining their benefit to clustering performance in both single- and multi-view learning scenarios.


Interactive Learning Using Manifold Geometry

Eaton, Eric (Lockheed Martin Advanced Technology Laboratories) | Holness, Gary (Lockheed Martin Advanced Technology Laboratories) | McFarlane, Daniel (Lockheed Martin Advanced Technology Laboratories)

AAAI Conferences

We present an interactive learning method that enables a user to iteratively refine a regression model. The user examines the output of the model, visualized as the vertical axis of a 2D scatterplot, and provides corrections by repositioning individual data instances to the correct output level. Each repositioned data instance acts as a control point for altering the learned model, using the geometry underlying the data. We capture the underlying structure of the data as a manifold, on which we compute a set of basis functions as the foundation for learning. Our results show that manifold-based interactive learning improves performance monotonically with each correction, outperforming alternative approaches.


Interactive Learning Using Manifold Geometry

Eaton, Eric (Lockheed Martin Advanced Technology Laboratories) | Holness, Gary (Lockheed Martin Advanced Technology Laboratories) | McFarlane, Daniel (Lockheed Martin Advanced Technology Laboratories)

AAAI Conferences

We present an interactive learning method that enables a user to iteratively refine a regression model. The user examines the output of the model, visualized as the vertical axis of a 2D scatterplot, and provides corrections by repositioning individual data points to the correct output level. Each repositioned data point acts as a control point for altering the learned model, using the geometry underlying the data. We capture the underlying structure of the data as a manifold, on which we compute a set of basis functions as the foundation for learning. Our results show that manifold-based interactive learning achieves dramatic improvement over alternative approaches.