In conventional regression analysis, predictions are typically represented as point estimates derived from covariates. The Gaussian Process (GP) offer a kernel-based framework that predicts and quantifies associated u...
In conventional regression analysis, predictions are typically represented as point estimates derived from covariates. The Gaussian Process (GP) offer a kernel-based framework that predicts and quantifies associated uncertainties. However, kernelbased methods often underperform ensemble-based decision tree approaches in regression tasks involving tabular and categorical data. Recently, Recursive Feature Machines (RFMs) were proposed as a novel feature-learning kernel which strengthens the capabilities of kernel machines. In this study, we harness the power of these RFMs in a probabilistic GP-based approach to enhance uncertainty estimation through feature extraction within kernel methods. We employ this learned kernel for in-depth uncertainty analysis. On tabular datasets, our RFM-based method surpasses other leading uncertainty estimation techniques, including NGBoost and CatBoost-ensemble. Additionally, when assessing out-of-distribution performance, we found that boosting-based methods are surpassed by our RFM-based approach.
We study the tradeoff between consistency and robustness in the context of a single-trajectory time-varying Markov Decision Process (MDP) with untrusted machine-learned advice. Our work departs from the typical approa...
详细信息
Explanations for autonomous vehicle (AV) decisions may build trust, however, explanations can contain errors. In a simulated driving study (n = 232), we tested how AV explanation errors, driving context characteristic...
详细信息
Sim-to real gap in Reinforcement Learning is when a model trained in a simulator does not translate to the real world. This is a problem for Autonomous Vehicles (AVs) as vehicle dynamics can vary from simulation to re...
详细信息
Reverse engineering the functional specification from a netlist is a challenging task that enables IP piracy and tampering. Traditional logic locking techniques, which depend on external activation with secrets stored...
详细信息
ISBN:
(纸本)9798400706356
Reverse engineering the functional specification from a netlist is a challenging task that enables IP piracy and tampering. Traditional logic locking techniques, which depend on external activation with secrets stored in tamper-proof locations to thwart reverse engineering, have repeatedly been compromised by key recovery attacks. Their vulnerability highlights the flawed assumption of relying on tamper-proof secrets for building hardware security solutions, especially when activated devices are deployed in open environments where they are exposed to attackers for functional queries and probing. This paper presents white-box logic obfuscation (WBLO) as a novel solution to safeguard control logic from functional reverse engineering, even when attackers have full visibility of the operational netlist. WBLO eliminates the need for post-manufacturing activation and reliance on tamper-proof key storage by securing the design with keys that are autonomously updated internally through the legitimate sequential execution of the device. The proposed approach invalidates functional analysis under arbitrary probing and combinational queries. We examine the implementation challenges inherent in the WBLO process and identify critical design considerations that enhance security and efficiency. Building on these insights, we suggest a prioritization for various design transformation and synthesis rules that achieve robust security in the white-box attack model while minimizing implementation overheads.
Machine learning force fields (MLFFs) are an attractive alternative to ab-initio methods for molecular dynamics (MD) simulations. However, they can produce unstable simulations, limiting their ability to model phenome...
详细信息
Motivated by applications to matrix multiplication algorithms, Pratt asked (ITCS’24) how large a subset of [n] × [n] could be without containing a skew-corner: three points (x, y), (x, y + h), (x + h, y1) with h...
Education technology (EdTech) is an important tool for streamlining and improving course administration and teaching. Many modern EdTech tools rely on cloud services to host containerized applications. While this is c...
详细信息
ISBN:
(数字)9798331507862
ISBN:
(纸本)9798331507879
Education technology (EdTech) is an important tool for streamlining and improving course administration and teaching. Many modern EdTech tools rely on cloud services to host containerized applications. While this is convenient, it is also costly in terms of both dollars and carbon *** propose the alternative approach of hosting containerized EdTech applications on local clusters of upcycled Android devices. We perform an evaluation of the Google Pixel Fold for handling educational workloads. Our findings suggest that such repurposed device could effectively bridge the gap between mobile and traditional computing platforms in education, open new avenues for accessible educational computing environments.
We propose an algorithm for the problem of computing shortest paths among curved obstacles in the plane. If the obstacles have O(n) description complexity, then the algorithm runs in O(n log n) time plus a term depend...
详细信息
The Colonel Blotto game is a deeply studied theoretical model for competitive allocation environments including elections, advertising, and ecology. However, the original formulation of Colonel Blotto has had few prac...
详细信息
暂无评论