Conference

Learning a Formula of Interpretability to Learn Interpretable Formulas

Many risk-sensitive applications require Machine Learning (ML) models to be interpretable. Attempts to obtain interpretable models typically rely on tuning, by trial-and-error, hyper-parameters of model complexity that are only loosely related to …

Mechanisms of Social Learning in Evolved Artificial Life

Adaptation of agents in artificial life scenarios is especially effective when agents may evolve, i.e., inherit traits from their parents, and learn by interacting with the environment. The learning process may be boosted with forms of social …

Spatial Evolutionary Generative Adversarial Networks

Generative adversary networks (GANs) suffer from training pathologies such as instability and mode collapse. These pathologies mainly arise from a lack of diversity in their adversarial interactions. Evolutionary generative adversarial networks apply …

Active Learning of Predefined Models for Information Extraction: Selecting Regular Expressions from Examples

We consider the problem of constructing a regular expression for information extraction automatically, based only on examples of the desired extraction behavior. We describe an active learning framework that is not aimed at synthesizing a solution …

An Analysis of Dimensionality Reduction Techniques for Visualizing Evolution

We consider the problem of visualizing the population dynamics along an evolutionary run using a dimensionality reduction technique for mapping individuals from the original search space to a 2-D space. We quantitatively assess four of these …

Evolutionary Synthesis of Sensing Controllers for Voxel-based Soft Robots

Soft robots allow for interesting morphological and behavioral designs because they exhibit more degrees of freedom than robots composed of rigid parts. In particular, voxel-based soft robots (VSRs)—aggregations of elastic cubic building blocks—have …

Leveraging Machine Learning for Terrain Traversability in Mobile Robotics

The problem of traversability of soft terrains is hard to solve due to both the inherent modeling complexity and the related computational cost. In this work a surrogate model is used to describe the behavior of soft soil, thus avoiding explicitly …

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants

WPA2 Enterprise is a fundamental technology for secure communication in enterprise wireless networks. A key requirement of this technology is that WiFi-enabled devices (i.e., supplicants) be correctly configured before connecting to the enterprise …

Back To The Basics: Security of Software Downloads for Smart Objects

Smart objects will soon pervade our homes, cities, factories, plants, and hospitals and this fact will introduce widespread important risks for the society as a whole, due to unavoidable security vulnerabilities of those objects. The problem of …

Exploring the Application of GOMEA to Bit-string GE

We explore the application of GOMEA, a recent method for discovering and exploiting the model for a problem in the form of linkage, to Grammatical Evolution (GE). GE employs an indirect representation based on familiar bit-string genotypes and is …