19,763 results on '"Yiğit, A"'
Search Results
2. Cooperation and Personalization on a Seesaw: Choice-based FL for Safe Cooperation in Wireless Networks
- Author
-
Zhang, Han, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Ozcan, Yigit, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning - Abstract
Federated learning (FL) is an innovative distributed artificial intelligence (AI) technique. It has been used for interdisciplinary studies in different fields such as healthcare, marketing and finance. However the application of FL in wireless networks is still in its infancy. In this work, we first overview benefits and concerns when applying FL to wireless networks. Next, we provide a new perspective on existing personalized FL frameworks by analyzing the relationship between cooperation and personalization in these frameworks. Additionally, we discuss the possibility of tuning the cooperation level with a choice-based approach. Our choice-based FL approach is a flexible and safe FL framework that allows participants to lower the level of cooperation when they feel unsafe or unable to benefit from the cooperation. In this way, the choice-based FL framework aims to address the safety and fairness concerns in FL and protect participants from malicious attacks.
- Published
- 2024
3. Quantum Programmable Reflections
- Author
-
Schoute, Eddie, Grinko, Dmitry, Subasi, Yigit, and Volkoff, Tyler
- Subjects
Quantum Physics - Abstract
Similar to a classical processor, which is an algorithm for reading a program and executing its instructions on input data, a universal programmable quantum processor is a fixed quantum channel that reads a quantum program $\lvert\psi_{U}\rangle$ that causes the processor to approximately apply an arbitrary unitary $U$ to a quantum data register. The present work focuses on a class of simple programmable quantum processors for implementing reflection operators, i.e. $U = e^{i \pi \lvert\psi\rangle\langle\psi\rvert}$ for an arbitrary pure state $\lvert\psi\rangle$ of finite dimension $d$. Unlike quantum programs that assume query access to $U$, our program takes the form of independent copies of the state to be reflected about $\lvert\psi_U\rangle = \lvert\psi\rangle^{\otimes n}$. We then identify the worst-case optimal algorithm among all processors of the form $\text{tr}_{\text{Program}}[V (\lvert\phi\rangle\langle\phi\rvert \otimes (\lvert\psi\rangle\langle\psi\rvert)^{\otimes n}) V^\dagger]$ where the algorithm $V$ is a unitary linear combination of permutations. By generalizing these algorithms to processors for arbitrary-angle rotations, $e^{i \alpha \lvert\psi\rangle\langle\psi\rvert}$ for $\alpha \in \mathbb R$, we give a construction for a universal programmable processor with better scaling in $d$. For programming reflections, we obtain a tight analytical lower bound on the program dimension by bounding the Holevo information of an ensemble of reflections applied to an entangled probe state. The lower bound makes use of a block decomposition of the uniform ensemble of reflected states with respect to irreps of the partially transposed permutation matrix algebra, and two representation-theoretic conjectures based on extensive numerical evidence., Comment: 50 pages, 4 figures
- Published
- 2024
4. On additive error approximations to #BQP
- Author
-
Rhodes, Mason L., Slezak, Sam, Chowdhury, Anirban, and Subaşı, Yiğit
- Subjects
Quantum Physics - Abstract
Counting complexity characterizes the difficulty of computing functions related to the number of valid certificates to efficiently verifiable decision problems. Here we study additive approximations to a quantum generalization of counting classes known as #BQP. First, we show that there exist efficient quantum algorithms that achieve additive approximations to #BQP problems to an error exponential in the number of witness qubits in the corresponding verifier circuit, and demonstrate that the level of approximation attained is, in a sense, optimal. We next give evidence that such approximations can not be efficiently achieved classically by showing that the ability to return such approximations is BQP-hard. We next look at the relationship between such additive approximations to #BQP and the complexity class DQC$_1$, showing that a restricted class of #BQP problems are DQC$_1$-complete.
- Published
- 2024
5. RAMPA: Robotic Augmented Reality for Machine Programming and Automation
- Author
-
Dogangun, Fatih, Bahar, Serdar, Yildirim, Yigit, Temir, Bora Toprak, Ugur, Emre, and Dogan, Mustafa Doga
- Subjects
Computer Science - Robotics ,Computer Science - Human-Computer Interaction ,Computer Science - Machine Learning - Abstract
As robotics continue to enter various sectors beyond traditional industrial applications, the need for intuitive robot training and interaction systems becomes increasingly more important. This paper introduces Robotic Augmented Reality for Machine Programming (RAMPA), a system that utilizes the capabilities of state-of-the-art and commercially available AR headsets, e.g., Meta Quest 3, to facilitate the application of Programming from Demonstration (PfD) approaches on industrial robotic arms, such as Universal Robots UR10. Our approach enables in-situ data recording, visualization, and fine-tuning of skill demonstrations directly within the user's physical environment. RAMPA addresses critical challenges of PfD, such as safety concerns, programming barriers, and the inefficiency of collecting demonstrations on the actual hardware. The performance of our system is evaluated against the traditional method of kinesthetic control in teaching three different robotic manipulation tasks and analyzed with quantitative metrics, measuring task performance and completion time, trajectory smoothness, system usability, user experience, and task load using standardized surveys. Our findings indicate a substantial advancement in how robotic tasks are taught and refined, promising improvements in operational safety, efficiency, and user engagement in robotic programming., Comment: This work has been submitted to the IEEE for possible publication
- Published
- 2024
6. CrediRAG: Network-Augmented Credibility-Based Retrieval for Misinformation Detection in Reddit
- Author
-
Ram, Ashwin, Bayiz, Yigit Ege, Amini, Arash, Munir, Mustafa, and Marculescu, Radu
- Subjects
Computer Science - Social and Information Networks ,Computer Science - Artificial Intelligence - Abstract
Fake news threatens democracy and exacerbates the polarization and divisions in society; therefore, accurately detecting online misinformation is the foundation of addressing this issue. We present CrediRAG, the first fake news detection model that combines language models with access to a rich external political knowledge base with a dense social network to detect fake news across social media at scale. CrediRAG uses a news retriever to initially assign a misinformation score to each post based on the source credibility of similar news articles to the post title content. CrediRAG then improves the initial retrieval estimations through a novel weighted post-to-post network connected based on shared commenters and weighted by the average stance of all shared commenters across every pair of posts. We achieve 11% increase in the F1-score in detecting misinformative posts over state-of-the-art methods. Extensive experiments conducted on curated real-world Reddit data of over 200,000 posts demonstrate the superior performance of CrediRAG on existing baselines. Thus, our approach offers a more accurate and scalable solution to combat the spread of fake news across social media platforms.
- Published
- 2024
7. Smart Jamming Attack and Mitigation on Deep Transfer Reinforcement Learning Enabled Resource Allocation for Network Slicing
- Author
-
Salehi, Shavbo, Zhou, Hao, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Ozcan, Yigit, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Network slicing is a pivotal paradigm in wireless networks enabling customized services to users and applications. Yet, intelligent jamming attacks threaten the performance of network slicing. In this paper, we focus on the security aspect of network slicing over a deep transfer reinforcement learning (DTRL) enabled scenario. We first demonstrate how a deep reinforcement learning (DRL)-enabled jamming attack exposes potential risks. In particular, the attacker can intelligently jam resource blocks (RBs) reserved for slices by monitoring transmission signals and perturbing the assigned resources. Then, we propose a DRL-driven mitigation model to mitigate the intelligent attacker. Specifically, the defense mechanism generates interference on unallocated RBs where another antenna is used for transmitting powerful signals. This causes the jammer to consider these RBs as allocated RBs and generate interference for those instead of the allocated RBs. The analysis revealed that the intelligent DRL-enabled jamming attack caused a significant 50% degradation in network throughput and 60% increase in latency in comparison with the no-attack scenario. However, with the implemented mitigation measures, we observed 80% improvement in network throughput and 70% reduction in latency in comparison to the under-attack scenario.
- Published
- 2024
- Full Text
- View/download PDF
8. Machine Learning-enabled Traffic Steering in O-RAN: A Case Study on Hierarchical Learning Approach
- Author
-
Habib, Md Arafat, Zhou, Hao, Iturria-Rivera, Pedro Enrique, Ozcan, Yigit, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Traffic Steering is a crucial technology for wireless networks, and multiple efforts have been put into developing efficient Machine Learning (ML)-enabled traffic steering schemes for Open Radio Access Networks (O-RAN). Given the swift emergence of novel ML techniques, conducting a timely survey that comprehensively examines the ML-based traffic steering schemes in O-RAN is critical. In this article, we provide such a survey along with a case study of hierarchical learning-enabled traffic steering in O-RAN. In particular, we first introduce the background of traffic steering in O-RAN and overview relevant state-of-the-art ML techniques and their applications. Then, we analyze the compatibility of the hierarchical learning framework in O-RAN and further propose a Hierarchical Deep-Q-Learning (h-DQN) framework for traffic steering. Compared to existing works, which focus on single-layer architecture with standalone agents, h-DQN decomposes the traffic steering problem into a bi-level architecture with hierarchical intelligence. The meta-controller makes long-term and high-level policies, while the controller executes instant traffic steering actions under high-level policies. Finally, the case study shows that the hierarchical learning approach can provide significant performance improvements over the baseline algorithms., Comment: Accepted for publication in IEEE Communications Magazine
- Published
- 2024
9. ZERNIPAX: A Fast and Accurate Zernike Polynomial Calculator in Python
- Author
-
Elmacioglu, Yigit Gunsur, Conlin, Rory, Dudt, Daniel W., Panici, Dario, and Kolemen, Egemen
- Subjects
Computer Science - Performance - Abstract
Zernike Polynomials serve as an orthogonal basis on the unit disc, and have been proven to be effective in optics simulations, astrophysics, and more recently in plasma simulations. Unlike Bessel functions, they maintain finite values at the disc center, ensuring inherent analyticity along the axis. We developed ZERNIPAX, an open-source Python package capable of utilizing CPU/GPUs, leveraging Google's JAX package and available on https://github.com/PlasmaControl/FastZernike.git as well as PyPI. Our implementation of the recursion relation between Jacobi polynomials significantly improves computation time compared to alternative methods by use of parallel computing while still preserving accuracy for mode numbers n>100.
- Published
- 2024
10. On Divisor Topology of Commutative Rings
- Author
-
Yiğit, Uğur and Koç, Suat
- Subjects
Mathematics - Commutative Algebra ,Mathematics - General Topology ,13A15 - Abstract
Let $R\ $be an integral domain and $R^{\#}$ the set of all nonzero nonunits of $R.\ $For every elements $a,b\in R^{\#},$ we define $a\sim b$ if and only if $aR=bR,$ that is, $a$ and $b$ are associated elements. Suppose that $EC(R^{\#})$ is the set of all equivalence classes of $R^{\#}\ $according to $\sim$.$\ $Let $U_{a}=\{[b]\in EC(R^{\#}):b\ $divides $a\}$ for every $a\in R^{\#}.$ Then we prove that the family $\{U_{a}\}_{a\in R^{\#}}$ becomes a basis for a topology on $EC(R^{\#}).\ $This topology is called divisor topology of $R\ $and denoted by $D(R).\ $We investigate the connections between the algebraic properties of $R\ $and the topological properties of$\ D(R)$. In particular, we investigate the seperation axioms on $D(R)$, first and second countability axioms, connectivity and compactness on $D(R)$. We prove that for atomic domains $R,\ $the divisor topology $D(R)\ $is a Baire space. Also, we characterize valution domains $R$ in terms of nested property of $D(R).$ In the last section, we introduce a new topological proof of the infinitude of prime elements in a UFD and integers by using the topology $D(R)$., Comment: Comments welcome
- Published
- 2024
11. On Golomb Topology of Modules over Commutative Rings
- Author
-
Yiğit, Uğur, Koç, Suat, and Tekir, Ünsal
- Subjects
Mathematics - Commutative Algebra ,Mathematics - General Topology - Abstract
In this paper, we associate a new topology to a nonzero unital module $M$ over a commutative $R$, which is called Golomb topology of the $R$-module $M$. Let $M\ $be an\ $R$-module and $B_{M}$ be the family of coprime cosets $\{m+N\}$ where $m\in M$ and $N\ $is a nonzero submodule of $M\ $such that $N+Rm=M$. We prove that if $M\ $is a meet irreducible multiplication module or $M\ $is a meet irreducible finitely generated module in which every maximal submodule is strongly irreducible, then $B_{M}\ $is the basis for a topology on $M\ $which is denoted by $\widetilde{G(M)}.$ In particular, the subspace topology on $M-\{0\}$ is called the Golomb topology of the $R$-module $M\ $and denoted by $G(M)$. We investigate the relations between topological properties of $G(M)\ $and algebraic properties of $M.\ $In particular, we characterize some important classes of modules such as simple modules, Jacobson semisimple modules in terms of Golomb topology., Comment: Comments welcome!
- Published
- 2024
12. ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
- Author
-
Alsop, Hamish, Alsop, Douglas, Solomon, Joseph, Aumento, Liam, Butters, Mark, Millar, Cameron, Yigit, Yagmur, Maglaras, Leandros, and Moradpoor, Naghmeh
- Subjects
Computer Science - Cryptography and Security - Abstract
End-to-End Encryption (E2EE) ensures that only the intended recipient(s) can read messages. Popular instant messaging (IM) applications such as Signal, WhatsApp, Apple's iMessage, and Telegram claim to offer E2EE. However, client-side scanning (CSS) undermines these claims by scanning all messages, including text, images, audio, and video files, on both sending and receiving ends. Industry and government parties support CSS to combat harmful content such as child pornography, terrorism, and other illegal activities. In this paper, we introduce ARSecure, a novel end-to-end encryption messaging solution utilizing augmented reality glasses. ARSecure allows users to encrypt and decrypt their messages before they reach their phone devices, effectively countering the CSS technology in E2EE systems.
- Published
- 2024
13. Self-Play Ensemble Q-learning enabled Resource Allocation for Network Slicing
- Author
-
Salehi, Shavbo, Iturria-Rivera, Pedro Enrique, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundas, Ozcan, Yigit, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
In 5G networks, network slicing has emerged as a pivotal paradigm to address diverse user demands and service requirements. To meet the requirements, reinforcement learning (RL) algorithms have been utilized widely, but this method has the problem of overestimation and exploration-exploitation trade-offs. To tackle these problems, this paper explores the application of self-play ensemble Q-learning, an extended version of the RL-based technique. Self-play ensemble Q-learning utilizes multiple Q-tables with various exploration-exploitation rates leading to different observations for choosing the most suitable action for each state. Moreover, through self-play, each model endeavors to enhance its performance compared to its previous iterations, boosting system efficiency, and decreasing the effect of overestimation. For performance evaluation, we consider three RL-based algorithms; self-play ensemble Q-learning, double Q-learning, and Q-learning, and compare their performance under different network traffic. Through simulations, we demonstrate the effectiveness of self-play ensemble Q-learning in meeting the diverse demands within 21.92% in latency, 24.22% in throughput, and 23.63\% in packet drop rate in comparison with the baseline methods. Furthermore, we evaluate the robustness of self-play ensemble Q-learning and double Q-learning in situations where one of the Q-tables is affected by a malicious user. Our results depicted that the self-play ensemble Q-learning method is more robust against adversarial users and prevents a noticeable drop in system performance, mitigating the impact of users manipulating policies.
- Published
- 2024
14. Hybrid STAR-RIS Enabled Integrated Sensing and Communication
- Author
-
Yigit, Zehra and Basar, Ertugrul
- Subjects
Computer Science - Information Theory ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Integrated sensing and communication (ISAC) is recognized as one of the key enabling technologies for sixth-generation (6G) wireless communication networks, facilitating diverse emerging applications and services in an energy and cost-efficient manner. This paper proposes a multi-user multi-target ISAC system to enable full-space coverage for communication and sensing tasks. The proposed system employs a hybrid simultaneous transmission and reflection reconfigurable intelligent surface (STAR-RIS) comprising active transmissive and passive reflective elements. In the proposed scheme, the passive reflective elements support communication and sensing links for nearby communication users and sensing targets, while low-power active transmissive elements are deployed to improve sensing performance and overcome high path attenuation due to multi-hop transmission for remote targets. Moreover, to optimize the transmissive/reflective coefficients of the hybrid STAR-RIS, a semi-definite relaxation (SDR)-based algorithm is proposed. Furthermore, to evaluate sensing performance, signal-to-interference-noise ratio (SINR) and Cramer-Rao bound (CRB) metrics have been derived and investigated via conducting extensive computer simulations., Comment: 10 pages, 7 figures
- Published
- 2024
15. Comparing Federated Stochastic Gradient Descent and Federated Averaging for Predicting Hospital Length of Stay
- Author
-
Balik, Mehmet Yigit
- Subjects
Computer Science - Machine Learning - Abstract
Predicting hospital length of stay (LOS) reliably is an essential need for efficient resource allocation at hospitals. Traditional predictive modeling tools frequently have difficulty acquiring sufficient and diverse data because healthcare institutions have privacy rules in place. In our study, we modeled this problem as an empirical graph where nodes are the hospitals. This modeling approach facilitates collaborative model training by modeling decentralized data sources from different hospitals without extracting sensitive data outside of hospitals. A local model is trained on a node (hospital) by aiming the generalized total variation minimization (GTVMin). Moreover, we implemented and compared two different federated learning optimization algorithms named federated stochastic gradient descent (FedSGD) and federated averaging (FedAVG). Our results show that federated learning enables accurate prediction of hospital LOS while addressing privacy concerns without extracting data outside healthcare institutions.
- Published
- 2024
16. New User Event Prediction Through the Lens of Causal Inference
- Author
-
Yuchi, Henry Shaowu, Zhu, Shixiang, Dong, Li, Arisoy, Yigit M., and Spencer, Matthew C.
- Subjects
Statistics - Methodology ,Computer Science - Machine Learning - Abstract
Modeling and analysis for event series generated by heterogeneous users of various behavioral patterns are closely involved in our daily lives, including credit card fraud detection, online platform user recommendation, and social network analysis. The most commonly adopted approach to this task is to classify users into behavior-based categories and analyze each of them separately. However, this approach requires extensive data to fully understand user behavior, presenting challenges in modeling newcomers without historical knowledge. In this paper, we propose a novel discrete event prediction framework for new users through the lens of causal inference. Our method offers an unbiased prediction for new users without needing to know their categories. We treat the user event history as the ''treatment'' for future events and the user category as the key confounder. Thus, the prediction problem can be framed as counterfactual outcome estimation, with the new user model trained on an adjusted dataset where each event is re-weighted by its inverse propensity score. We demonstrate the superior performance of the proposed framework with a numerical simulation study and two real-world applications, including Netflix rating prediction and seller contact prediction for customer support at Amazon.
- Published
- 2024
17. Automating Venture Capital: Founder assessment using LLM-powered segmentation, feature engineering and automated labeling techniques
- Author
-
Ozince, Ekin and Ihlamur, Yiğit
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence - Abstract
This study explores the application of large language models (LLMs) in venture capital (VC) decision-making, focusing on predicting startup success based on founder characteristics. We utilize LLM prompting techniques, like chain-of-thought, to generate features from limited data, then extract insights through statistics and machine learning. Our results reveal potential relationships between certain founder characteristics and success, as well as demonstrate the effectiveness of these characteristics in prediction. This framework for integrating ML techniques and LLMs has vast potential for improving startup success prediction, with important implications for VC firms seeking to optimize their investment strategies., Comment: For the relevant code, see https://github.com/velapartners/moneyball-LLM-based-founder-features.git
- Published
- 2024
18. Unsupervised Analysis of Alzheimer's Disease Signatures using 3D Deformable Autoencoders
- Author
-
Avci, Mehmet Yigit, Chan, Emily, Zimmer, Veronika, Rueckert, Daniel, Wiestler, Benedikt, Schnabel, Julia A., and Bercea, Cosmin I.
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition - Abstract
With the increasing incidence of neurodegenerative diseases such as Alzheimer's Disease (AD), there is a need for further research that enhances detection and monitoring of the diseases. We present MORPHADE (Morphological Autoencoders for Alzheimer's Disease Detection), a novel unsupervised learning approach which uses deformations to allow the analysis of 3D T1-weighted brain images. To the best of our knowledge, this is the first use of deformations with deep unsupervised learning to not only detect, but also localize and assess the severity of structural changes in the brain due to AD. We obtain markedly higher anomaly scores in clinically important areas of the brain in subjects with AD compared to healthy controls, showcasing that our method is able to effectively locate AD-related atrophy. We additionally observe a visual correlation between the severity of atrophy highlighted in our anomaly maps and medial temporal lobe atrophy scores evaluated by a clinical expert. Finally, our method achieves an AUROC of 0.80 in detecting AD, out-performing several supervised and unsupervised baselines. We believe our framework shows promise as a tool towards improved understanding, monitoring and detection of AD. To support further research and application, we have made our code publicly available at github.com/ci-ber/MORPHADE., Comment: 11 pages, 5 figures
- Published
- 2024
19. CLIPAway: Harmonizing Focused Embeddings for Removing Objects via Diffusion Models
- Author
-
Ekin, Yigit, Yildirim, Ahmet Burak, Caglar, Erdem Eren, Erdem, Aykut, Erdem, Erkut, and Dundar, Aysegul
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Advanced image editing techniques, particularly inpainting, are essential for seamlessly removing unwanted elements while preserving visual integrity. Traditional GAN-based methods have achieved notable success, but recent advancements in diffusion models have produced superior results due to their training on large-scale datasets, enabling the generation of remarkably realistic inpainted images. Despite their strengths, diffusion models often struggle with object removal tasks without explicit guidance, leading to unintended hallucinations of the removed object. To address this issue, we introduce CLIPAway, a novel approach leveraging CLIP embeddings to focus on background regions while excluding foreground elements. CLIPAway enhances inpainting accuracy and quality by identifying embeddings that prioritize the background, thus achieving seamless object removal. Unlike other methods that rely on specialized training datasets or costly manual annotations, CLIPAway provides a flexible, plug-and-play solution compatible with various diffusion-based inpainting techniques., Comment: Project page: https://yigitekin.github.io/CLIPAway/
- Published
- 2024
20. LLM-Based Intent Processing and Network Optimization Using Attention-Based Hierarchical Reinforcement Learning
- Author
-
Habib, Md Arafat, Rivera, Pedro Enrique Iturria, Ozcan, Yigit, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundus, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Intent-based network automation is a promising tool to enable easier network management however certain challenges need to be effectively addressed. These are: 1) processing intents, i.e., identification of logic and necessary parameters to fulfill an intent, 2) validating an intent to align it with current network status, and 3) satisfying intents via network optimizing functions like xApps and rApps in O-RAN. This paper addresses these points via a three-fold strategy to introduce intent-based automation for O-RAN. First, intents are processed via a lightweight Large Language Model (LLM). Secondly, once an intent is processed, it is validated against future incoming traffic volume profiles (high or low). Finally, a series of network optimization applications (rApps and xApps) have been developed. With their machine learning-based functionalities, they can improve certain key performance indicators such as throughput, delay, and energy efficiency. In this final stage, using an attention-based hierarchical reinforcement learning algorithm, these applications are optimally initiated to satisfy the intent of an operator. Our simulations show that the proposed method can achieve at least 12% increase in throughput, 17.1% increase in energy efficiency, and 26.5% decrease in network delay compared to the baseline algorithms., Comment: Submitted paper to GLOBECOM 2024
- Published
- 2024
21. An Automated Startup Evaluation Pipeline: Startup Success Forecasting Framework (SSFF)
- Author
-
Wang, Xisen and Ihlamur, Yigit
- Subjects
Computer Science - Artificial Intelligence - Abstract
Evaluating startups in their early stages is a complex task that requires detailed analysis by experts. While automating this process on a large scale can significantly impact businesses, the inherent complexity poses challenges. This paper addresses this challenge by introducing the Startup Success Forecasting Framework (SSFF), a new automated system that combines traditional machine learning with advanced language models. This intelligent agent-based architecture is designed to reason, act, synthesize, and decide like a venture capitalist to perform the analysis end-to-end. The SSFF is made up of three main parts: - Prediction Block: Uses random forests and neural networks to make predictions. - Analyst Block: Simulates VC analysis scenario and uses SOTA prompting techniques - External Knowledge Block: Gathers real-time information from external sources. This framework requires minimal input data about the founder and startup description, enhances it with additional data from external resources, and performs a detailed analysis with high accuracy, all in an automated manner, Comment: For relevant code: https://github.com/Xisen-Wang/Startup-Success-Forecasting-Framework
- Published
- 2024
22. Extended Reality (XR) Codec Adaptation in 5G using Multi-Agent Reinforcement Learning with Attention Action Selection
- Author
-
Iturria-Rivera, Pedro Enrique, Gaigalas, Raimundas, Elsayed, Medhat, Bavand, Majid, Ozcan, Yigit, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Extended Reality (XR) services will revolutionize applications over 5th and 6th generation wireless networks by providing seamless virtual and augmented reality experiences. These applications impose significant challenges on network infrastructure, which can be addressed by machine learning algorithms due to their adaptability. This paper presents a Multi- Agent Reinforcement Learning (MARL) solution for optimizing codec parameters of XR traffic, comparing it to the Adjust Packet Size (APS) algorithm. Our cooperative multi-agent system uses an Optimistic Mixture of Q-Values (oQMIX) approach for handling Cloud Gaming (CG), Augmented Reality (AR), and Virtual Reality (VR) traffic. Enhancements include an attention mechanism and slate-Markov Decision Process (MDP) for improved action selection. Simulations show our solution outperforms APS with average gains of 30.1%, 15.6%, 16.5% 50.3% in XR index, jitter, delay, and Packet Loss Ratio (PLR), respectively. APS tends to increase throughput but also packet losses, whereas oQMIX reduces PLR, delay, and jitter while maintaining goodput., Comment: 6 pages, 5 figures, 2 tables
- Published
- 2024
23. Learning to Slice Wi-Fi Networks: A State-Augmented Primal-Dual Approach
- Author
-
Uslu, Yiğit Berkay, Doostnejad, Roya, Ribeiro, Alejandro, and NaderiAlizadeh, Navid
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Machine Learning - Abstract
Network slicing is a key feature in 5G/NG cellular networks that creates customized slices for different service types with various quality-of-service (QoS) requirements, which can achieve service differentiation and guarantee service-level agreement (SLA) for each service type. In Wi-Fi networks, there is limited prior work on slicing, and a potential solution is based on a multi-tenant architecture on a single access point (AP) that dedicates different channels to different slices. In this paper, we define a flexible, constrained learning framework to enable slicing in Wi-Fi networks subject to QoS requirements. We specifically propose an unsupervised learning-based network slicing method that leverages a state-augmented primal-dual algorithm, where a neural network policy is trained offline to optimize a Lagrangian function and the dual variable dynamics are updated online in the execution phase. We show that state augmentation is crucial for generating slicing decisions that meet the ergodic QoS requirements.
- Published
- 2024
24. Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities
- Author
-
Yigit, Yagmur, Ferrag, Mohamed Amine, Sarker, Iqbal H., Maglaras, Leandros A., Chrysoulas, Christos, Moradpoor, Naghmeh, and Janicke, Helge
- Subjects
Computer Science - Cryptography and Security - Abstract
Critical National Infrastructure (CNI) encompasses a nation's essential assets that are fundamental to the operation of society and the economy, ensuring the provision of vital utilities such as energy, water, transportation, and communication. Nevertheless, growing cybersecurity threats targeting these infrastructures can potentially interfere with operations and seriously risk national security and public safety. In this paper, we examine the intricate issues raised by cybersecurity risks to vital infrastructure, highlighting these systems' vulnerability to different types of cyberattacks. We analyse the significance of trust, privacy, and resilience for Critical Infrastructure Protection (CIP), examining the diverse standards and regulations to manage these domains. We also scrutinise the co-analysis of safety and security, offering innovative approaches for their integration and emphasising the interdependence between these fields. Furthermore, we introduce a comprehensive method for CIP leveraging Generative AI and Large Language Models (LLMs), giving a tailored lifecycle and discussing specific applications across different critical infrastructure sectors. Lastly, we discuss potential future directions that promise to enhance the security and resilience of critical infrastructures. This paper proposes innovative strategies for CIP from evolving attacks and enhances comprehension of cybersecurity concerns related to critical infrastructure.
- Published
- 2024
25. Learning Social Navigation from Demonstrations with Deep Neural Networks
- Author
-
Yildirim, Yigit and Ugur, Emre
- Subjects
Computer Science - Robotics - Abstract
Traditional path-planning techniques treat humans as obstacles. This has changed since robots started to enter human environments. On modern robots, social navigation has become an important aspect of navigation systems. To use learning-based techniques to achieve social navigation, a powerful framework that is capable of representing complex functions with as few data as possible is required. In this study, we benefited from recent advances in deep learning at both global and local planning levels to achieve human-aware navigation on a simulated robot. Two distinct deep models are trained with respective objectives: one for global planning and one for local planning. These models are then employed in the simulated robot. In the end, it has been shown that our model can successfully carry out both global and local planning tasks. We have shown that our system could generate paths that successfully reach targets while avoiding obstacles with better performance compared to feed-forward neural networks., Comment: Presented in RO-MAN 2021 Workshop on Robot Behavior Adaptation to Human Social Norms (TSAR)
- Published
- 2024
26. Optimal Policy Synthesis from A Sequence of Goal Sets with An Application to Electric Distribution System Restoration
- Author
-
Işık, İlker, Arpali, Onur Yigit, and Gol, Ebru Aydin
- Subjects
Electrical Engineering and Systems Science - Systems and Control - Abstract
Motivated by the post-disaster distribution system restoration problem, in this paper, we study the problem of synthesizing the optimal policy for a Markov Decision Process (MDP) from a sequence of goal sets. For each goal set, our aim is to both maximize the probability to reach and minimize the expected time to reach the goal set. The order of the goal sets represents their priority. In particular, our aim is to generate a policy that is optimal with respect to the first goal set, and it is optimal with respect to the second goal set among the policies that are optimal with respect to the first goal set and so on. To synthesize such a policy, we iteratively filter the applicable actions according to the goal sets. We illustrate the developed method over sample distribution systems and disaster scenarios., Comment: 7th ADHS 2021 Conference Paper
- Published
- 2024
- Full Text
- View/download PDF
27. Bidirectional Human Interactive AI Framework for Social Robot Navigation
- Author
-
Girgin, Tuba, Girgin, Emre, Yildirim, Yigit, Ugur, Emre, and Haklidir, Mehmet
- Subjects
Computer Science - Robotics - Abstract
Trustworthiness is a crucial concept in the context of human-robot interaction. Cooperative robots must be transparent regarding their decision-making process, especially when operating in a human-oriented environment. This paper presents a comprehensive end-to-end framework aimed at fostering trustworthy bidirectional human-robot interaction in collaborative environments for the social navigation of mobile robots. In this framework, the robot communicates verbally while the human guides with gestures. Our method enables a mobile robot to predict the trajectory of people and adjust its route in a socially-aware manner. In case of conflict between human and robot decisions, detected through visual examination, the route is dynamically modified based on human preference while verbal communication is maintained. We present our pipeline, framework design, and preliminary experiments that form the foundation of our proposition., Comment: Accepted by Robot Trust for Symbiotic Societies (RTSS) Workshop at ICRA 2024
- Published
- 2024
28. Data Augmentation with In-Context Learning and Comparative Evaluation in Math Word Problem Solving
- Author
-
Yigit, Gulsum and Amasyali, Mehmet Fatih
- Subjects
Computer Science - Computation and Language - Abstract
Math Word Problem (MWP) solving presents a challenging task in Natural Language Processing (NLP). This study aims to provide MWP solvers with a more diverse training set, ultimately improving their ability to solve various math problems. We propose several methods for data augmentation by modifying the problem texts and equations, such as synonym replacement, rule-based: question replacement, and rule based: reversing question methodologies over two English MWP datasets. This study extends by introducing a new in-context learning augmentation method, employing the Llama-7b language model. This approach involves instruction-based prompting for rephrasing the math problem texts. Performance evaluations are conducted on 9 baseline models, revealing that augmentation methods outperform baseline models. Moreover, concatenating examples generated by various augmentation methods further improves performance., Comment: Accepted in SN Computer Science
- Published
- 2024
- Full Text
- View/download PDF
29. Reference-Based 3D-Aware Image Editing with Triplanes
- Author
-
Bilecen, Bahri Batuhan, Yalin, Yigit, Yu, Ning, and Dundar, Aysegul
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Generative Adversarial Networks (GANs) have emerged as powerful tools for high-quality image generation and real image editing by manipulating their latent spaces. Recent advancements in GANs include 3D-aware models such as EG3D, which feature efficient triplane-based architectures capable of reconstructing 3D geometry from single images. However, limited attention has been given to providing an integrated framework for 3D-aware, high-quality, reference-based image editing. This study addresses this gap by exploring and demonstrating the effectiveness of the triplane space for advanced reference-based edits. Our novel approach integrates encoding, automatic localization, spatial disentanglement of triplane features, and fusion learning to achieve the desired edits. Additionally, our framework demonstrates versatility and robustness across various domains, extending its effectiveness to animal face edits, partially stylized edits like cartoon faces, full-body clothing edits, and 360-degree head edits. Our method shows state-of-the-art performance over relevant latent direction, text, and image-guided 2D and 3D-aware diffusion and GAN methods, both qualitatively and quantitatively., Comment: 20 pages, including supplementary material
- Published
- 2024
30. Optimal Coherent Quantum Phase Estimation via Tapering
- Author
-
Patel, Dhrumil, Tan, Shi Jie Samuel, Subasi, Yigit, and Sornborger, Andrew T.
- Subjects
Quantum Physics ,Mathematical Physics - Abstract
Quantum phase estimation is one of the fundamental primitives that underpins many quantum algorithms, including Shor's algorithm for efficiently factoring large numbers. Due to its significance as a subroutine, in this work, we consider the coherent version of the phase estimation problem, where given an arbitrary input state and black-box access to unitaries $U$ and controlled-$U$, the goal is to estimate the phases of $U$ in superposition. Most existing phase estimation algorithms involve intermediary measurements that disrupt coherence. Only a couple of algorithms, including the standard quantum phase estimation algorithm, consider this coherent setting. However, the standard algorithm only succeeds with a constant probability. To boost this success probability, it employs the coherent median technique, resulting in an algorithm with optimal query complexity (the total number of calls to U and controlled-U). However, this coherent median technique requires a large number of ancilla qubits and a computationally expensive quantum sorting network. To address this, in this work, we propose an improved version of this standard algorithm called the tapered quantum phase estimation algorithm. It leverages tapering/window functions commonly used in signal processing. Our algorithm achieves the optimal query complexity without requiring the expensive coherent median technique to boost success probability. We also show that the tapering functions that we use are optimal by formulating optimization problems with different optimization criteria. Beyond the asymptotic regime, we also provide non-asymptotic query complexity of our algorithm, as it is crucial for practical implementation. Finally, we propose an efficient algorithm to prepare the quantum state corresponding to the optimal tapering function., Comment: 24 pages, 6 figures; Changes in version 2: Improved presentation
- Published
- 2024
31. Learning Early Social Maneuvers for Enhanced Social Navigation
- Author
-
Yildirim, Yigit, Suzer, Mehmet, and Ugur, Emre
- Subjects
Computer Science - Robotics - Abstract
Socially compliant navigation is an integral part of safety features in Human-Robot Interaction. Traditional approaches to mobile navigation prioritize physical aspects, such as efficiency, but social behaviors gain traction as robots appear more in daily life. Recent techniques to improve the social compliance of navigation often rely on predefined features or reward functions, introducing assumptions about social human behavior. To address this limitation, we propose a novel Learning from Demonstration (LfD) framework for social navigation that exclusively utilizes raw sensory data. Additionally, the proposed system contains mechanisms to consider the future paths of the surrounding pedestrians, acknowledging the temporal aspect of the problem. The final product is expected to reduce the anxiety of people sharing their environment with a mobile robot, helping them trust that the robot is aware of their presence and will not harm them. As the framework is currently being developed, we outline its components, present experimental results, and discuss future work towards realizing this framework., Comment: Accepted for presentation in the workshop of Robot Trust for Symbiotic Societies (RTSS) at ICRA 2024
- Published
- 2024
32. Transformer-Based Wireless Traffic Prediction and Network Optimization in O-RAN
- Author
-
Habib, Md Arafat, Iturria-Rivera, Pedro Enrique, Ozcan, Yigit, Elsayed, Medhat, Bavand, Majid, Gaigalas, Raimundus, and Erol-Kantarci, Melike
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper introduces an innovative method for predicting wireless network traffic in concise temporal intervals for Open Radio Access Networks (O-RAN) using a transformer architecture, which is the machine learning model behind generative AI tools. Depending on the anticipated traffic, the system either launches a reinforcement learning-based traffic steering xApp or a cell sleeping rApp to enhance performance metrics like throughput or energy efficiency. Our simulation results demonstrate that the proposed traffic prediction-based network optimization mechanism matches the performance of standalone RAN applications (rApps/ xApps) that are always on during the whole simulation time while offering on-demand activation. This feature is particularly advantageous during instances of abrupt fluctuations in traffic volume. Rather than persistently operating specific applications irrespective of the actual incoming traffic conditions, the proposed prediction-based method increases the average energy efficiency by 39.7% compared to the "Always on Traffic Steering xApp" and achieves 10.1% increase in throughput compared to the "Always on Cell Sleeping rApp". The simulation has been conducted over 24 hours, emulating a whole day traffic pattern for a dense urban area.
- Published
- 2024
33. Susceptibility of Communities against Low-Credibility Content in Social News Websites
- Author
-
Bayiz, Yigit Ege, Amini, Arash, Marculescu, Radu, and Topcu, Ufuk
- Subjects
Computer Science - Social and Information Networks - Abstract
Social news websites, such as Reddit, have evolved into prominent platforms for sharing and discussing news. A key issue on social news websites sites is the formation of echo chambers, which often lead to the spread of highly biased or uncredible news. We develop a method to identify communities within a social news website that are prone to uncredible or highly biased news. We employ a user embedding pipeline that detects user communities based on their stances towards posts and news sources. We then project each community onto a credibility-bias space and analyze the distributional characteristics of each projected community to identify those that have a high risk of adopting beliefs with low credibility or high bias. This approach also enables the prediction of individual users' susceptibility to low credibility content, based on their community affiliation. Our experiments show that latent space clusters effectively indicate the credibility and bias levels of their users, with significant differences observed across clusters -- a $34\%$ difference in the users' susceptibility to low-credibility content and a $8.3\%$ difference in the users' susceptibility to high political bias., Comment: 11 pages, 2 figures, Under review in ICWSM 2024
- Published
- 2024
34. Review of Generative AI Methods in Cybersecurity
- Author
-
Yigit, Yagmur, Buchanan, William J, Tehrani, Madjid G, and Maglaras, Leandros
- Subjects
Computer Science - Cryptography and Security - Abstract
Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more prevalent in everyday use. These advancements strengthen cybersecurity's defensive posture and open up new attack avenues for adversaries as well. This paper provides a comprehensive overview of the current state-of-the-art deployments of GenAI, covering assaults, jailbreaking, and applications of prompt injection and reverse psychology. This paper also provides the various applications of GenAI in cybercrimes, such as automated hacking, phishing emails, social engineering, reverse cryptography, creating attack payloads, and creating malware. GenAI can significantly improve the automation of defensive cyber security processes through strategies such as dataset construction, safe code development, threat intelligence, defensive measures, reporting, and cyberattack detection. In this study, we suggest that future research should focus on developing robust ethical norms and innovative defense mechanisms to address the current issues that GenAI creates and to also further encourage an impartial approach to its future application in cybersecurity. Moreover, we underscore the importance of interdisciplinary approaches further to bridge the gap between scientific developments and ethical considerations., Comment: 40 pages
- Published
- 2024
35. 'Did They F***ing Consent to That?': Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse
- Author
-
Qin, Lucy, Hamilton, Vaughn, Wang, Sharon, Aydinalp, Yigit, Scarlett, Marin, and Redmiles, Elissa M.
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Human-Computer Interaction - Abstract
As many as 8 in 10 adults share intimate content such as nude or lewd images. Sharing such content has significant benefits for relationship intimacy and body image, and can offer employment. However, stigmatizing attitudes and a lack of technological mitigations put those sharing such content at risk of sexual violence. An estimated 1 in 3 people have been subjected to image-based sexual abuse (IBSA), a spectrum of violence that includes the nonconsensual distribution or threat of distribution of consensually-created intimate content (also called NDII). In this work, we conducted a rigorous empirical interview study of 52 European creators of intimate content to examine the threats they face and how they defend against them, situated in the context of their different use cases for intimate content sharing and their choice of technologies for storing and sharing such content. Synthesizing our results with the limited body of prior work on technological prevention of NDII, we offer concrete next steps for both platforms and security & privacy researchers to work toward safer intimate content sharing through proactive protection. Content Warning: This work discusses sexual violence, specifically, the harms of image-based sexual abuse (particularly in Sections 2 and 6).
- Published
- 2024
36. Boosting Fairness and Robustness in Over-the-Air Federated Learning
- Author
-
Oksuz, Halil Yigit, Molinari, Fabio, Sprekeler, Henning, and Raisch, Joerg
- Subjects
Computer Science - Machine Learning ,Computer Science - Computers and Society - Abstract
Over-the-Air Computation is a beyond-5G communication strategy that has recently been shown to be useful for the decentralized training of machine learning models due to its efficiency. In this paper, we propose an Over-the-Air federated learning algorithm that aims to provide fairness and robustness through minmax optimization. By using the epigraph form of the problem at hand, we show that the proposed algorithm converges to the optimal solution of the minmax problem. Moreover, the proposed approach does not require reconstructing channel coefficients by complex encoding-decoding schemes as opposed to state-of-the-art approaches. This improves both efficiency and privacy., Comment: 6 Pages, 2 figures. arXiv admin note: text overlap with arXiv:2305.04630
- Published
- 2024
37. Eco-friendly Dyeing of Polyester Fabric with Natural Madder Dye Using Supercritical Carbon Dioxide
- Author
-
Eren, Semiha, Haji, Aminoddin, Öztürk, Merve, Yiğit, İdil, and Eren, Hüseyin Aksel
- Published
- 2024
- Full Text
- View/download PDF
38. Effect of Mn Concentration on Mechanical Properties of A356 Aluminum Alloy Wheels Produced by Low-Pressure Die Casting
- Author
-
Kaya, A. Yiğit, Davut, Kemal, and Gökelma, Mertol
- Published
- 2024
- Full Text
- View/download PDF
39. Evaluation of the impact Of ChatGPT support on acromegaly management and patient education
- Author
-
Köroğlu, Ekin Yiğit, Ersoy, Reyhan, Saçıkara, Muhammed, Dellal Kahramanca, Fatma Dilek, Polat, Şefika Burçak, Topaloğlu, Oya, and Çakır, Bekir
- Published
- 2024
- Full Text
- View/download PDF
40. Analysis of myocardial T1, T2, and T2* values by age, sex, and cardiac segments in normal population: a prospective study
- Author
-
Özcan, Çağrı, Yiğit, Hasan, Çetin, Mehmet Serkan, and Özcan, İrem
- Published
- 2024
- Full Text
- View/download PDF
41. Do not waste “Pickers”: exploring the intention to join waste picker cooperatives
- Author
-
ÇOLAK, Haldun, YİĞİT, Mustafa, BOYACI, Nil BELGİN, ŞİŞMAN, Yener, KAĞNICIOĞLU, Deniz, and KAĞNICIOĞLU, Celal Hakan
- Published
- 2024
- Full Text
- View/download PDF
42. Pelvic parameters as prognostic factors of radiographic progression in classical Ankylosing Spondylitis: A prospective follow-up data
- Author
-
Abacar, Kerem Yiğit, Çolakoğlu-Özkaya, Şeyma, Bıyıklı, Erhan, Buğdaycı, Onur, Kurşun, Meltem, Denizli, Ayberk, Koçak, Beril, Aksoy, Aysun, Erzik, Can, Ay, Pınar, Bezer, Murat, Duruöz, Mehmet Tuncay, Direskeneli, Haner, and Atagündüz, Pamir
- Published
- 2024
- Full Text
- View/download PDF
43. Big Data in Higher Education: Bibliometric Analysis
- Author
-
Erümit, Ali Kürşat, Cebeci, Hasan Yiğit, and Özmen, Sefa
- Published
- 2024
- Full Text
- View/download PDF
44. Ophthalmic artery originating from anterior inferior cerebellar artery: a rare variation
- Author
-
GÖKOĞLU, Abdulkerim, YİĞİT, Hüseyin, İNAN, Enes, ÖZTÜRK, Burak, DÖNMEZ, Halil, and SELÇUKLU, Ahmet
- Published
- 2024
- Full Text
- View/download PDF
45. Using different digital tools in designing and solving mathematical modelling problems
- Author
-
Koyunkaya, Melike Yiğit and Dede, Ayşe Tekin
- Published
- 2024
- Full Text
- View/download PDF
46. Influence of Different Fe Levels on Mechanical Properties of AlSi7Mg0.3 Aluminum Casting Alloys
- Author
-
Karabulut, Cansu, Malkoç, Gülce, Kaya, Ahmet Yiğit, Özaydin, Onur, and Yayla, Paşa
- Published
- 2024
- Full Text
- View/download PDF
47. Automatic recognition of different 3D soliton wave types using deep learning methods
- Author
-
Aksoy, Abdullah and Yiğit, Enes
- Published
- 2024
- Full Text
- View/download PDF
48. Comparison of erectile and ejaculatory functional outcomes between unilateral and bilateral cavernosal rupture in penile fractures
- Author
-
Keskin, Emin Taha, Can, Osman, Filtekin, Yiğit Can, Özdemir, Harun, Şahin, Mehmet, Çeker, Gökhan, Topal, Cemal, and Canat, Halil Lütfi
- Published
- 2024
- Full Text
- View/download PDF
49. Dual-pathway inhibition in patients with chronic limb-threatening ischemia requiring reintervention for infrapopliteal occlusions
- Author
-
Teymen, Burak, Öner, Mehmet Emin, and Erdağ, Yiğit
- Published
- 2024
- Full Text
- View/download PDF
50. The clinical significance of calcium/magnesium ratio in primary hyperparathyroidism: unveiling a clinical association
- Author
-
Köroğlu, Ekin Yiğit, Tam, Abbas Ali, Fakı, Sevgül, Tural Balsak, Belma, Edis Özdemir, Fatma Ayça, Özdemir, Didem, Topaloğlu, Oya, Ersoy, Reyhan, and Çakır, Bekir
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.