Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review

N Mishra, S Pandya - IEEE Access, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …

Behavioral systems theory in data-driven analysis, signal processing, and control

I Markovsky, F Dörfler - Annual Reviews in Control, 2021 - Elsevier
The behavioral approach to systems theory, put forward 40 years ago by Jan C. Willems,
takes a representation-free perspective of a dynamical system as a set of trajectories. Till …

Towards out-of-distribution generalization: A survey

J Liu, Z Shen, Y He, X Zhang, R Xu, H Yu… - arxiv preprint arxiv …, 2021 - arxiv.org
Traditional machine learning paradigms are based on the assumption that both training and
test data follow the same statistical pattern, which is mathematically referred to as …

Manipulating machine learning: Poisoning attacks and countermeasures for regression learning

M Jagielski, A Oprea, B Biggio, C Liu… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
As machine learning becomes widely used for automated decisions, attackers have strong
incentives to manipulate the results and models generated by machine learning algorithms …

Theory and applications of robust optimization

D Bertsimas, DB Brown, C Caramanis - SIAM review, 2011 - SIAM
In this paper we survey the primary research, both theoretical and applied, in the area of
robust optimization (RO). Our focus is on the computational attractiveness of RO …

Recent advances in robust optimization: An overview

V Gabrel, C Murat, A Thiele - European journal of operational research, 2014 - Elsevier
This paper provides an overview of developments in robust optimization since 2007. It seeks
to give a representative picture of the research topics most explored in recent years …

Learning with pseudo-ensembles

P Bachman, O Alsharif… - Advances in neural …, 2014 - proceedings.neurips.cc
We formalize the notion of a pseudo-ensemble, a (possibly infinite) collection of child
models spawned from a parent model by perturbing it according to some noise process. Eg …

Bridging direct and indirect data-driven control formulations via regularizations and relaxations

F Dörfler, J Coulson, I Markovsky - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this article, we discuss connections between sequential system identification and control
for linear time-invariant systems, often termed indirect data-driven control, as well as a …

Rademacher complexity for adversarially robust generalization

D Yin, R Kannan, P Bartlett - International conference on …, 2019 - proceedings.mlr.press
Many machine learning models are vulnerable to adversarial attacks; for example, adding
adversarial perturbations that are imperceptible to humans can often make machine …

Robust Wasserstein profile inference and applications to machine learning

J Blanchet, Y Kang, K Murthy - Journal of Applied Probability, 2019 - cambridge.org
We show that several machine learning estimators, including square-root least absolute
shrinkage and selection and regularized logistic regression, can be represented as …