Peter M. VanNostrand

ORCID: 0000-0002-0285-6019
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Explainable Artificial Intelligence (XAI)
  • Scientific Computing and Data Management
  • Advanced Malware Detection Techniques
  • Ethics and Social Impacts of AI
  • Network Security and Intrusion Detection
  • Bayesian Modeling and Causal Inference
  • Data-Driven Disease Surveillance
  • Software System Performance and Reliability
  • Adversarial Robustness in Machine Learning
  • Advanced Statistical Process Monitoring
  • Decision-Making and Behavioral Economics
  • Fault Detection and Control Systems
  • Advanced Statistical Methods and Models
  • Privacy-Preserving Technologies in Data
  • Time Series Analysis and Forecasting

Worcester Polytechnic Institute
2022-2025

University at Buffalo, State University of New York
2019

Due to the scarcity of reliable anomaly labels, recent detection methods leveraging noisy auto-generated labels either select clean samples or refurbish labels. However, both approaches struggle due unique properties anomalies. Sample selection often fails separate sufficiently many from ones, while label refurbishment erroneously refurbishes marginal samples. To overcome these limitations, we design Unity, first learning (LNL) approach for that elegantly leverages merits sample and...

10.1145/3709657 article EN Proceedings of the ACM on Management of Data 2025-02-10

We are able to faithfully reproduce the original paper's findings as well key results reported in its experimental section (i.e., explanation quality, speed, robustness). The authors provided example data, comprehensive scripts, and plotting functions that allowed near-identical reconstruction of all figures.

10.1145/3687998.3717053 article EN 2025-03-21

Performing deep learning on end-user devices provides fast offline inference results and can help protect the user's privacy. However, running models untrusted client reveals model information which may be proprietary, i.e., operating system or other applications manipulated to copy redistribute this information, infringing provider's intellectual property. We propose use of ARM TrustZone, a hardware-based security feature present in most phones, confidentially run proprietary an device....

10.48550/arxiv.1908.10730 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Deep Learning techniques have been widely used in detecting anomalies from complex data. Most of these are either unsupervised or semi-supervised because a lack large number labeled anomalies. However, they typically rely on clean training data not polluted by to learn the distribution normal Otherwise, learned tends be distorted and hence ineffective distinguishing between abnormal To solve this problem, we propose novel approach called ELITE that uses small examples infer hidden samples....

10.1145/3447548.3467320 article EN 2021-08-13

Machine learning systems are deployed in domains such as hiring and healthcare, where undesired classifications can have serious ramifications for the user. Thus, there is a rising demand explainable AI which provide actionable steps lay users to obtain their desired outcome. To meet this need, we propose FACET, first explanation analytics system supports user interactively refining counterfactual explanations decisions made by tree ensembles. As FACET's foundation, design novel type of...

10.1145/3626729 article EN Proceedings of the ACM on Management of Data 2023-12-08

Anomaly detection is a critical task in applications like preventing financial fraud, system malfunctions, and cybersecurity attacks. While previous research has offered plethora of anomaly algorithms, effective remains challenging for users due to the tedious manual tuning process. Currently, model developers must determine which these numerous algorithms best suited their particular domain then tune many parameters by hand make chosen algorithm perform well. This demonstration showcases...

10.14778/3554821.3554880 article EN Proceedings of the VLDB Endowment 2022-08-01

Automated decision-making systems are increasingly deployed in domains such as hiring and credit approval where negative outcomes can have substantial ramifications for decision subjects. Thus, recent research has focused on providing explanations that help subjects understand the system enable them to take actionable recourse change their outcome. Popular counterfactual explanation techniques aim achieve this by describing alterations an instance would transform a outcome positive one....

10.1145/3630106.3658997 article EN 2022 ACM Conference on Fairness, Accountability, and Transparency 2024-06-03

Machine learning is routinely used to automate consequential decisions about users in domains such as finance and healthcare, raising concerns of transparency recourse for negative outcomes. Existing Explainable AI techniques generate a static counterfactual point explanation which recommends changes user's instance obtain positive outcome. Unfortunately, these recommendations are often difficult or impossible realistically enact. To overcome this, we present FACET, the first interactive...

10.14778/3685800.3685872 article EN Proceedings of the VLDB Endowment 2024-08-01

Log anomaly detection, critical in identifying system failures and preempting security breaches, finds irregular patterns within large volumes of log data. Modern detectors rely on training deep learning models clean anomaly-free However, such data requires expensive tedious human labeling. In this paper, we thus propose a robust detection framework, PlutoNOSPACE, that automatically selects representative sample subset the polluted sequence to train Transformer-based model. Pluto features...

10.1145/3677139 article EN Proceedings of the ACM on Management of Data 2024-09-30
Coming Soon ...