Jason Pacheco

ORCID: 0000-0003-1711-1041
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Machine Learning and Algorithms
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • Gaussian Processes and Bayesian Inference
  • Privacy-Preserving Technologies in Data
  • Target Tracking and Data Fusion in Sensor Networks
  • Bayesian Modeling and Causal Inference
  • Network Security and Intrusion Detection
  • Bayesian Methods and Mixture Models
  • AI-based Problem Solving and Planning
  • Traffic and Road Safety
  • Advanced Multi-Objective Optimization Algorithms
  • Traffic Prediction and Management Techniques
  • Underwater Acoustics Research
  • Generative Adversarial Networks and Image Synthesis
  • Distributed Sensor Networks and Detection Algorithms
  • Machine Learning and Data Classification
  • Digital and Cyber Forensics
  • Hydrocarbon exploration and reservoir analysis
  • Nuclear Engineering Thermal-Hydraulics
  • Topic Modeling
  • Optimal Experimental Design Methods
  • Advanced Neural Network Applications
  • Cryptography and Data Security

University of Arizona
2020-2024

Massachusetts Institute of Technology
2018-2020

Brown University
2012-2017

Naval Undersea Warfare Center
2009-2011

Pre-trained Large Language Models (LLMs) are an integral part of modern AI that have led to breakthrough performances in complex tasks. Major companies with expensive infrastructures able develop and train these large models billions millions parameters from scratch. Third parties, researchers, practitioners increasingly adopting pre-trained fine-tuning them on their private data accomplish downstream However, it has been shown adversary can extract/reconstruct the exact training samples...

10.1109/icdmw58026.2022.00078 article EN 2022 IEEE International Conference on Data Mining Workshops (ICDMW) 2022-11-01

Federated learning (FL) enhances privacy by keeping user data on local devices. However, emerging attacks have demonstrated that the updates shared users during training can reveal significant information about their data. This has greatly thwart adoption of FL methods for robust AI models in sensitive applications. Differential Privacy (DP) is considered gold standard safeguarding DP guarantees are highly conservative, providing worst-case guarantees. result overestimating needs, which may...

10.48550/arxiv.2502.08008 preprint EN arXiv (Cornell University) 2025-02-11

Recent machine learning- and deep learning-based static malware detectors have shown breakthrough performance in identifying unseen variants. As a result, they are increasingly being adopted to lower the cost of dynamic analysis manual signature identification. Despite their success, studies that can be vulnerable adversarial attacks, which an adversary modifies known executable subtly fool detector into recognizing it as benign file. automatically crafting these variants at scale is...

10.1109/spw53761.2021.00021 article EN 2021-05-01

Driving safety analysis has recently experienced unprecedented improvements thanks to technological advances in precise positioning sensors, artificial intelligence (AI)-based features, autonomous driving systems, connected vehicles, high-throughput computing, and edge computing servers. Particularly, deep learning (DL) methods empowered volume video processing extract safety-related features from massive videos captured by roadside units (RSU). Safety metrics are commonly used measures...

10.1109/access.2022.3223046 article EN cc-by IEEE Access 2022-11-17

Articulated motion analysis often utilizes strong prior knowledge such as a known or trained parts model for humans. Yet, the world contains variety of articulating objects--mammals, insects, mechanized structures--where number and configuration particular object is unknown in advance. Here, we relax assumptions via an unsupervised, Bayesian nonparametric that infers with motions coupled by body dynamic parameterized SE(D), Lie group rigid transformations. We derive inference procedure short...

10.1109/cvpr42600.2020.00745 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020-06-01

Empowered by the recent development in Ma-chine Learning (ML), signatureless ML-based malware detectors present promising performance identifying unseen mal ware variants and zero days without requiring expensive dynamic analysis. However, it has been recently shown that are vulnerable to adversarial attacks, which an attacker modifies a known exe-cutable trick detector into recognizing modi-fied variant as benign. Adversarial example generation become emerging area ML studies creating...

10.1109/icdmw58026.2022.00079 article EN 2022 IEEE International Conference on Data Mining Workshops (ICDMW) 2022-11-01

Artificial Intelligence (AI) is being widely adopted in modern cyber defense to weave automation and scalability into the operational fabric of cybersecurity firms. Today, AI aids crucial tasks such as malware intrusion detection keep Information Technology (IT) infrastructure secure. Despite their value, agents can be vulnerable adversarial attacks. In these attacks, adversary deliberately manipulates a malicious input by taking sequence actions so that targeted agent fails correctly...

10.25300/misq/2024/17339 article EN MIS Quarterly 2024-01-01

Differentially private stochastic gradient descent (DP-SGD) has been instrumental in privately training deep learning models by providing a framework to control and track the privacy loss incurred during training. At core of this computation lies subsampling method that uses amplification lemma enhance guarantees provided additive noise. Fixed size is appealing for its constant memory usage, unlike variable sized minibatches Poisson subsampling. It also interest addressing class imbalance...

10.48550/arxiv.2408.10456 preprint EN arXiv (Cornell University) 2024-08-19

Driving safety analysis has recently witnessed unprecedented results due to advances in computation frameworks, connected vehicle technology, new generation sensors, and artificial intelligence (AI). Particularly, the recent performance of deep learning (DL) methods realized higher levels for autonomous vehicles empowered volume imagery processing driving analysis. An important application DL is extracting metrics from traffic imagery. However, majority current use micro-scale individual...

10.2139/ssrn.3991827 article EN SSRN Electronic Journal 2021-01-01

We apply the expectation propagation (EP) algorithm to temporally track targets using sensors that produce spurious clutter detections, and may sometimes fail detect true target. The variational inference framework underlying EP allows tracker be easily adapted varying measurement models. develop variants of based on single Gaussian mixture approximations posterior target location distributions, which offer a tradeoff between accuracy computational complexity. Experiments show improved...

10.1109/ssp.2012.6319840 article EN 2012-08-01

for the U. S. Nuclear Regulatory Commission’s Advisory Committee on Reactor Safeguards in 2003. That report noted that “in-dustry lacks tools to perform time-trend analysis with Bayesian updating.” This paper describes an applica-tion of time-dependent inference methods developed European Commission Ageing PSA Network. These utilize open-source software, implementing Markov chain Monte Carlo sampling. The also illustrates approach incorporating multiple sources data via applicability...

10.2172/1959054 article EN 2023-03-03

We present an approach to data fusion that combines the interpretability of structured probabilistic graphical models with flexibility neural networks. The proposed method, lightweight (LDF), emphasizes posterior analysis over latent variables using two types information: primary data, which are well-characterized but limited availability, and auxiliary readily available lacking a statistical relationship quantity interest. lack forward model for precludes use standard approaches, while...

10.48550/arxiv.2011.10607 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Pre-trained Large Language Models (LLMs) are an integral part of modern AI that have led to breakthrough performances in complex tasks. Major companies with expensive infrastructures able develop and train these large models billions millions parameters from scratch. Third parties, researchers, practitioners increasingly adopting pre-trained fine-tuning them on their private data accomplish downstream However, it has been shown adversary can extract/reconstruct the exact training samples...

10.48550/arxiv.2210.15042 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...