Malcolm Heywood - Academia.edu (original) (raw)

Uploads

Papers by Malcolm Heywood

Research paper thumbnail of Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks

Lecture notes in computer science, 2024

Research paper thumbnail of W. B. Langdon “Jaws 30”

Genetic Programming and Evolvable Machines, Nov 21, 2023

Research paper thumbnail of Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector

Research paper thumbnail of Security and Trust of Online Auction Systems in E-Commerce

IGI Global eBooks, May 24, 2011

Internet trading is an irresistible business activity, which nevertheless is constrained by unres... more Internet trading is an irresistible business activity, which nevertheless is constrained by unresolved security issues. With e-tailers like amazon.com having a storefront for auction and the two largest traditional auction houses in the world, Christie’s and Sotheby’s, operating online auctions too; online auction systems are now playing an increasingly important role in e-commerce. However, online auction fraud has been reported in several high profile cases; this chapter offers some solutions for problems identified in online auction trading; which is largely unregulated and in which small auction sites have very little security. A secure architecture for online auction systems will greatly reduce the problems. The discussion herein is restricted to those factors that are deemed critical for ensuring that consumers gain the confidence required to participate in online auctions, and hence a broader spectrum of businesses are able to invest in integrating online auction systems into their commercial operations.

Research paper thumbnail of Knowledge Transfer from Keepaway Soccer to Half-field Offense through Program Symbiosis

Research paper thumbnail of Continuous optimal controllers using hierarchical mixtures of experts

Research paper thumbnail of Reconfigurable computing implementation of binary morphological operators using 4-, 6- and 8-connectivity

This work details and compares the application of configurable and reconfigurable computing techn... more This work details and compares the application of configurable and reconfigurable computing techniques to the estimation of binary 3×3 masks of 4-, 6- and 8-connectivity and logical operations of AND, OR and NOT. Specifically it is shown that the promise of reconfigurable as opposed to configurable computing provides a very efficient implementation of the morphological operator kernel

Research paper thumbnail of A Model of External Memory for Navigation in Partially Observable Visual Reinforcement Learning Tasks

Lecture Notes in Computer Science, 2019

Visual reinforcement learning implies that, decision making policies are identified under delayed... more Visual reinforcement learning implies that, decision making policies are identified under delayed rewards from an environment. Moreover, state information takes the form of high-dimensional data, such as video. In addition, although the video might characterize a 3D world in high resolution, partial observability will place significant limits on what the agent can actually perceive of the world. This means that the agent also has to: (1) provide efficient encodings of state, (2) store the encodings of state efficiently in some form of memory, (3) recall such memories after arbitrary delays for decision making. In this work, we demonstrate how an external memory model facilitates decision making in the complex world of multi-agent ‘deathmatches’ in the ViZDoom first person shooter environment. The ViZDoom environment provides a complex environment of multiple rooms and resources in which agents are spawned from multiple different locations. A unique approach is adopted to defining external memory for genetic programming agents in which: (1) the state of memory is shared across all programs. (2) Writing is formulated as a probabilistic process, resulting in different regions of memory having short- versus long-term memory. (3) Read operations are indexed, enabling programs to identify regions of external memory with specific temporal properties. We demonstrate that agents purposefully navigate the world when external memory is provided, whereas those without external memory are limited to merely ‘flight or fight’ behaviour.

Research paper thumbnail of Evolving dota 2 shadow fiend bots using genetic programming with external memory

Proceedings of the Genetic and Evolutionary Computation Conference, Jul 13, 2019

The capacity of genetic programming (GP) to evolve a 'hero' character in the Dota 2 video... more The capacity of genetic programming (GP) to evolve a 'hero' character in the Dota 2 video game is investigated. A reinforcement learning context is assumed in which the only input is a 320-dimensional state vector and performance is expressed in terms of kills and net worth. Minimal assumptions are made to initialize the GP game playing agents - evolution from a tabula rasa starting point - implying that: 1) the instruction set is not task specific; 2) end of game performance feedback reflects quantitive properties a player experiences; 3) no attempt is made to impart game specific knowledge into GP, such as heuristics for improving navigation, minimizing partial observability, improving team work or prioritizing the protection of specific strategically important structures. In short, GP has to actively develop its own strategies for all aspects of the game. We are able to demonstrate competitive play with the built in game opponents assuming 1-on-1 competitions using the 'Shadow Fiend' hero. The single most important contributing factor to this result is the provision of external memory to GP. Without this, the resulting Dota 2 bots are not able to identify strategies that match those of the built-in game bot.

Research paper thumbnail of Feasibility of a Computer Downtime Recording System

IFAC Proceedings Volumes, Aug 1, 1997

This paper describes the development of a computerised downtime recording system for an automotiv... more This paper describes the development of a computerised downtime recording system for an automotive assembly plant. It introduces the nature of the recording system environment at a large commercial van assembly plant and describes the system developed in terms of, characteristics and usability. The application analysis focuses on the user-computer interface.

Research paper thumbnail of Neuro-fuzzy approaches to fault diagnosis and identification

Research paper thumbnail of CasGP: Building Cascaded Hierarchical Models Using Niching

Research paper thumbnail of Digital library query clearing using clustering and fuzzy decision-making

Information Processing and Management, Jul 1, 2000

ABSTRACT

Research paper thumbnail of Evolving Simple Solutions to the CIFAR-10 Benchmark using Tangled Program Graphs

The goal of the CIFAR-10 benchmark is recast from the perspective of discovering light-weight as ... more The goal of the CIFAR-10 benchmark is recast from the perspective of discovering light-weight as well as accurate solutions. Specifically, the image data, on which CIFAR-10 is based, requires multiple practical issues to be addressed that are not often considered collectively when applying genetic programming to classification problems. Issues of particular interest include cardinality, multi-class classification and diversity maintenance. We demonstrate that diversity maintenance and cardinality can be approached simultaneously by adopting a data subset to compose pools of exemplars for lexicase selection. The issues of multi-class classification and solution simplicity are addressed by adopting the tangled program graph (TPG) approach to emergent modularity. In addition, the mutation operator is modified to ensure that class labels do not ‘die out’ during evolution. The resulting benchmarking study demonstrates solutions that are significantly more accurate than AutoML while providing comparable accuracies with solutions from unsupervised feature discovery, i.e. 70% accuracy. However, unlike the latter TPG solutions are several orders of magnitude simpler.

Research paper thumbnail of A Boosting Approach to Constructing an Ensemble Stack

Lecture Notes in Computer Science, 2023

Research paper thumbnail of A Boosting Approach to Constructing an Ensemble Stack

arXiv (Cornell University), Nov 28, 2022

Research paper thumbnail of Dynamic Insider Threat Detection Based on Adaptable Genetic Programming

2019 IEEE Symposium Series on Computational Intelligence (SSCI)

Different variations in deployment environments of machine learning techniques may affect the per... more Different variations in deployment environments of machine learning techniques may affect the performance of the implemented systems. The variations may cause changes in the data for machine learning solutions, such as in the number of classes and the extracted features. This paper investigates the capabilities of Genetic Programming (GP) for malicious insider detection in corporate environments under such changes. Assuming a Linear GP detector, techniques are introduced to allow a previously trained GP population to adapt to different changes in the data. The experiments and evaluation results show promising insider threat detection performances of the techniques in comparison with training machine learning classifiers from scratch. This reduces the amount of data needed and computation requirements for obtaining dependable insider threat detectors under new conditions.

Research paper thumbnail of On the impact of tangled program graph marking schemes under the atari reinforcement learning benchmark

Proceedings of the Genetic and Evolutionary Computation Conference, 2021

Tangled program graphs (TPG) support emergent modularity by first identifying subsets of programs... more Tangled program graphs (TPG) support emergent modularity by first identifying subsets of programs that can usefully coexist (a team/ graph node) and then identifying the circumstance under which to reference other teams (arc adaptation). Variation operators manipulate the content of teams and arcs. This introduces cycles into the TPG structures. Previously, this effect was eradicated at run time by marking nodes while evaluating TPG individuals. In this work, a new marking heuristic is introduced, that of arc (learner) marking. This means that nodes can be revisited, but not the same arcs. We investigate the impact of this through 18 titles from the Arcade Learning Environment. The performance and complexity of the policies appear to be similar, but with specific tasks (game titles) resulting in preferences for one scheme over another.

Research paper thumbnail of Benchmarking genetic programming in dynamic insider threat detection

Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

In real world applications, variation in deployment environments, such as changes in data collect... more In real world applications, variation in deployment environments, such as changes in data collection techniques, can affect the effectiveness and/or efficiency of machine learning (ML) systems. In this work, we investigate techniques to allow a previously trained population of Linear Genetic Programming (LGP) insider threat detectors to adapt to an expanded feature space. Experiments show that appropriate methods can be adopted to enable LGP to incorporate the new data efficiently, hence reducing computation requirements and expediting deployment under the new conditions.

Research paper thumbnail of Revised Selected Papers of the 17th European Conference on Genetic Programming - Volume 8599

Research paper thumbnail of Simple Efficient Evolutionary Ensemble Learning on Network Intrusion Detection Benchmarks

Lecture notes in computer science, 2024

Research paper thumbnail of W. B. Langdon “Jaws 30”

Genetic Programming and Evolvable Machines, Nov 21, 2023

Research paper thumbnail of Initiating a Moving Target Network Defense with a Real-time Neuro-evolutionary Detector

Research paper thumbnail of Security and Trust of Online Auction Systems in E-Commerce

IGI Global eBooks, May 24, 2011

Internet trading is an irresistible business activity, which nevertheless is constrained by unres... more Internet trading is an irresistible business activity, which nevertheless is constrained by unresolved security issues. With e-tailers like amazon.com having a storefront for auction and the two largest traditional auction houses in the world, Christie’s and Sotheby’s, operating online auctions too; online auction systems are now playing an increasingly important role in e-commerce. However, online auction fraud has been reported in several high profile cases; this chapter offers some solutions for problems identified in online auction trading; which is largely unregulated and in which small auction sites have very little security. A secure architecture for online auction systems will greatly reduce the problems. The discussion herein is restricted to those factors that are deemed critical for ensuring that consumers gain the confidence required to participate in online auctions, and hence a broader spectrum of businesses are able to invest in integrating online auction systems into their commercial operations.

Research paper thumbnail of Knowledge Transfer from Keepaway Soccer to Half-field Offense through Program Symbiosis

Research paper thumbnail of Continuous optimal controllers using hierarchical mixtures of experts

Research paper thumbnail of Reconfigurable computing implementation of binary morphological operators using 4-, 6- and 8-connectivity

This work details and compares the application of configurable and reconfigurable computing techn... more This work details and compares the application of configurable and reconfigurable computing techniques to the estimation of binary 3×3 masks of 4-, 6- and 8-connectivity and logical operations of AND, OR and NOT. Specifically it is shown that the promise of reconfigurable as opposed to configurable computing provides a very efficient implementation of the morphological operator kernel

Research paper thumbnail of A Model of External Memory for Navigation in Partially Observable Visual Reinforcement Learning Tasks

Lecture Notes in Computer Science, 2019

Visual reinforcement learning implies that, decision making policies are identified under delayed... more Visual reinforcement learning implies that, decision making policies are identified under delayed rewards from an environment. Moreover, state information takes the form of high-dimensional data, such as video. In addition, although the video might characterize a 3D world in high resolution, partial observability will place significant limits on what the agent can actually perceive of the world. This means that the agent also has to: (1) provide efficient encodings of state, (2) store the encodings of state efficiently in some form of memory, (3) recall such memories after arbitrary delays for decision making. In this work, we demonstrate how an external memory model facilitates decision making in the complex world of multi-agent ‘deathmatches’ in the ViZDoom first person shooter environment. The ViZDoom environment provides a complex environment of multiple rooms and resources in which agents are spawned from multiple different locations. A unique approach is adopted to defining external memory for genetic programming agents in which: (1) the state of memory is shared across all programs. (2) Writing is formulated as a probabilistic process, resulting in different regions of memory having short- versus long-term memory. (3) Read operations are indexed, enabling programs to identify regions of external memory with specific temporal properties. We demonstrate that agents purposefully navigate the world when external memory is provided, whereas those without external memory are limited to merely ‘flight or fight’ behaviour.

Research paper thumbnail of Evolving dota 2 shadow fiend bots using genetic programming with external memory

Proceedings of the Genetic and Evolutionary Computation Conference, Jul 13, 2019

The capacity of genetic programming (GP) to evolve a 'hero' character in the Dota 2 video... more The capacity of genetic programming (GP) to evolve a 'hero' character in the Dota 2 video game is investigated. A reinforcement learning context is assumed in which the only input is a 320-dimensional state vector and performance is expressed in terms of kills and net worth. Minimal assumptions are made to initialize the GP game playing agents - evolution from a tabula rasa starting point - implying that: 1) the instruction set is not task specific; 2) end of game performance feedback reflects quantitive properties a player experiences; 3) no attempt is made to impart game specific knowledge into GP, such as heuristics for improving navigation, minimizing partial observability, improving team work or prioritizing the protection of specific strategically important structures. In short, GP has to actively develop its own strategies for all aspects of the game. We are able to demonstrate competitive play with the built in game opponents assuming 1-on-1 competitions using the 'Shadow Fiend' hero. The single most important contributing factor to this result is the provision of external memory to GP. Without this, the resulting Dota 2 bots are not able to identify strategies that match those of the built-in game bot.

Research paper thumbnail of Feasibility of a Computer Downtime Recording System

IFAC Proceedings Volumes, Aug 1, 1997

This paper describes the development of a computerised downtime recording system for an automotiv... more This paper describes the development of a computerised downtime recording system for an automotive assembly plant. It introduces the nature of the recording system environment at a large commercial van assembly plant and describes the system developed in terms of, characteristics and usability. The application analysis focuses on the user-computer interface.

Research paper thumbnail of Neuro-fuzzy approaches to fault diagnosis and identification

Research paper thumbnail of CasGP: Building Cascaded Hierarchical Models Using Niching

Research paper thumbnail of Digital library query clearing using clustering and fuzzy decision-making

Information Processing and Management, Jul 1, 2000

ABSTRACT

Research paper thumbnail of Evolving Simple Solutions to the CIFAR-10 Benchmark using Tangled Program Graphs

The goal of the CIFAR-10 benchmark is recast from the perspective of discovering light-weight as ... more The goal of the CIFAR-10 benchmark is recast from the perspective of discovering light-weight as well as accurate solutions. Specifically, the image data, on which CIFAR-10 is based, requires multiple practical issues to be addressed that are not often considered collectively when applying genetic programming to classification problems. Issues of particular interest include cardinality, multi-class classification and diversity maintenance. We demonstrate that diversity maintenance and cardinality can be approached simultaneously by adopting a data subset to compose pools of exemplars for lexicase selection. The issues of multi-class classification and solution simplicity are addressed by adopting the tangled program graph (TPG) approach to emergent modularity. In addition, the mutation operator is modified to ensure that class labels do not ‘die out’ during evolution. The resulting benchmarking study demonstrates solutions that are significantly more accurate than AutoML while providing comparable accuracies with solutions from unsupervised feature discovery, i.e. 70% accuracy. However, unlike the latter TPG solutions are several orders of magnitude simpler.

Research paper thumbnail of A Boosting Approach to Constructing an Ensemble Stack

Lecture Notes in Computer Science, 2023

Research paper thumbnail of A Boosting Approach to Constructing an Ensemble Stack

arXiv (Cornell University), Nov 28, 2022

Research paper thumbnail of Dynamic Insider Threat Detection Based on Adaptable Genetic Programming

2019 IEEE Symposium Series on Computational Intelligence (SSCI)

Different variations in deployment environments of machine learning techniques may affect the per... more Different variations in deployment environments of machine learning techniques may affect the performance of the implemented systems. The variations may cause changes in the data for machine learning solutions, such as in the number of classes and the extracted features. This paper investigates the capabilities of Genetic Programming (GP) for malicious insider detection in corporate environments under such changes. Assuming a Linear GP detector, techniques are introduced to allow a previously trained GP population to adapt to different changes in the data. The experiments and evaluation results show promising insider threat detection performances of the techniques in comparison with training machine learning classifiers from scratch. This reduces the amount of data needed and computation requirements for obtaining dependable insider threat detectors under new conditions.

Research paper thumbnail of On the impact of tangled program graph marking schemes under the atari reinforcement learning benchmark

Proceedings of the Genetic and Evolutionary Computation Conference, 2021

Tangled program graphs (TPG) support emergent modularity by first identifying subsets of programs... more Tangled program graphs (TPG) support emergent modularity by first identifying subsets of programs that can usefully coexist (a team/ graph node) and then identifying the circumstance under which to reference other teams (arc adaptation). Variation operators manipulate the content of teams and arcs. This introduces cycles into the TPG structures. Previously, this effect was eradicated at run time by marking nodes while evaluating TPG individuals. In this work, a new marking heuristic is introduced, that of arc (learner) marking. This means that nodes can be revisited, but not the same arcs. We investigate the impact of this through 18 titles from the Arcade Learning Environment. The performance and complexity of the policies appear to be similar, but with specific tasks (game titles) resulting in preferences for one scheme over another.

Research paper thumbnail of Benchmarking genetic programming in dynamic insider threat detection

Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

In real world applications, variation in deployment environments, such as changes in data collect... more In real world applications, variation in deployment environments, such as changes in data collection techniques, can affect the effectiveness and/or efficiency of machine learning (ML) systems. In this work, we investigate techniques to allow a previously trained population of Linear Genetic Programming (LGP) insider threat detectors to adapt to an expanded feature space. Experiments show that appropriate methods can be adopted to enable LGP to incorporate the new data efficiently, hence reducing computation requirements and expediting deployment under the new conditions.

Research paper thumbnail of Revised Selected Papers of the 17th European Conference on Genetic Programming - Volume 8599