Áron Lászka
YOU?
Author Swipe
View article: An End-to-End Solution for Public Transit Stationing and Dispatch Problem
An End-to-End Solution for Public Transit Stationing and Dispatch Problem Open
Public bus transit systems provide critical transportation services for large sections of modern communities. On-time performance and maintaining the reliable quality of service is therefore very important. Unfortunately, disruptions cause…
View article: Scalable Decision-Making in Stochastic Environments through Learned Temporal Abstraction
Scalable Decision-Making in Stochastic Environments through Learned Temporal Abstraction Open
Sequential decision-making in high-dimensional continuous action spaces, particularly in stochastic environments, faces significant computational challenges. We explore this challenge in the traditional offline RL setting, where an agent m…
View article: NS-Gym: Open-Source Simulation Environments and Benchmarks for Non-Stationary Markov Decision Processes
NS-Gym: Open-Source Simulation Environments and Benchmarks for Non-Stationary Markov Decision Processes Open
In many real-world applications, agents must make sequential decisions in environments where conditions are subject to change due to various exogenous factors. These non-stationary environments pose significant challenges to traditional de…
View article: Conditional Causal Representation Learning for Heterogeneous Single-cell RNA Data Integration and Prediction
Conditional Causal Representation Learning for Heterogeneous Single-cell RNA Data Integration and Prediction Open
Single-cell sequencing technology provides deep insights into gene activity at the individual cell level, facilitating the study of gene regulatory mechanisms. However, observed gene expression are often influenced by confounding factors s…
View article: Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing
Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing Open
An emergency responder management (ERM) system dispatches responders, such as ambulances, when it receives requests for medical aid. ERM systems can also proactively reposition responders between predesignated waiting locations to cover an…
View article: Forecasting and Mitigating Disruptions in Public Bus Transit Services
Forecasting and Mitigating Disruptions in Public Bus Transit Services Open
Public transportation systems often suffer from unexpected fluctuations in demand and disruptions, such as mechanical failures and medical emergencies. These fluctuations and disruptions lead to delays and overcrowding, which are detriment…
View article: An Online Approach to Solving Public Transit Stationing and Dispatch Problem
An Online Approach to Solving Public Transit Stationing and Dispatch Problem Open
Public bus transit systems provide critical transportation services for large sections of modern communities. On-time performance and maintaining the reliable quality of service is therefore very important. Unfortunately, disruptions cause…
View article: Pipelet: Practical Streamlined Blockchain Protocol
Pipelet: Practical Streamlined Blockchain Protocol Open
Fueled by the growing popularity of proof-of-stake blockchains, there has been increasing interest and progress in permissioned consensus protocols, which could provide a simpler alternative to existing protocols, such as Paxos and PBFT. I…
View article: Decision Making in Non-Stationary Environments with Policy-Augmented Search
Decision Making in Non-Stationary Environments with Policy-Augmented Search Open
Sequential decision-making under uncertainty is present in many important problems. Two popular approaches for tackling such problems are reinforcement learning and online search (e.g., Monte Carlo tree search). While the former learns a p…
View article: Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks Open
The increasing reliance of drivers on navigation applications has made transportation networks more susceptible to data-manipulation attacks by malicious actors. Adversaries may exploit vulnerabilities in the data collection or processing …
View article: Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction
Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction Open
When a number of similar tasks have to be learned simultaneously, multi-task learning (MTL) models can attain significantly higher accuracy than single-task learning (STL) models. However, the advantage of MTL depends on various factors, s…
View article: Artificial Intelligence for Smart Transportation
Artificial Intelligence for Smart Transportation Open
There are more than 7,000 public transit agencies in the U.S. (and many more private agencies), and together, they are responsible for serving 60 billion passenger miles each year. A well-functioning transit system fosters the growth and e…
View article: Principled Data-Driven Decision Support for Cyber-Forensic Investigations
Principled Data-Driven Decision Support for Cyber-Forensic Investigations Open
In the wake of a cybersecurity incident, it is crucial to promptly discover how the threat actors breached security in order to assess the impact of the incident and to develop and deploy countermeasures that can protect against further at…
View article: Rolling Horizon Based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows
Rolling Horizon Based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows Open
The offline pickup and delivery problem with time windows (PDPTW) is a classical combinatorial optimization problem in the transportation community, which has proven to be very challenging computationally. Due to the complexity of the prob…
View article: Adversarial Reconnaissance Mitigation and Modeling
Adversarial Reconnaissance Mitigation and Modeling Open
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception technique…
View article: Message from the General and TPC Co-Chairs
Message from the General and TPC Co-Chairs Open
The ninth IEEE International Conference on Smart Computing (SmartComp 2023), sponsored by the IEEE Computer Society, will be held in-person in Nashville, Tennessee, USA.It continues the tradition of the previous editions in presenting high…
View article: SoK: The MITRE ATT&CK Framework in Research and Practice
SoK: The MITRE ATT&CK Framework in Research and Practice Open
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques, has been widely adopted by the cybersecurity industry as well as by academic researchers. Its broad range of industry applications include thre…
View article: Impact of COVID-19 on Public Transit Accessibility and Ridership
Impact of COVID-19 on Public Transit Accessibility and Ridership Open
COVID-19 has radically transformed urban travel behavior throughout the world. Agencies have had to provide adequate service while navigating a rapidly changing environment with reduced revenue. As COVID-19-related restrictions are lifted,…
View article: Rolling Horizon based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows
Rolling Horizon based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows Open
The offline pickup and delivery problem with time windows (PDPTW) is a classical combinatorial optimization problem in the transportation community, which has proven to be very challenging computationally. Due to the complexity of the prob…
View article: The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox Open
Recently, bug-bounty programs have gained popularity and become a significant part of the security culture of many organizations. Bug-bounty programs enable organizations to enhance their security posture by harnessing the diverse expertis…
View article: Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem Open
Although researchers have characterized the bug-bounty ecosystem from the point of view of platforms and programs, minimal effort has been made to understand the perspectives of the main workers: bug hunters. To improve bug bounties, it is…
View article: Dataset: The Benefits of Vulnerability Discovery and Bug Bounty Programs
Dataset: The Benefits of Vulnerability Discovery and Bug Bounty Programs Open
The datasets belong to the paper 'The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox'. The folder contains vulnerabilities reported to the Chromium issue tracker and Bugzilla (Mozilla issu…
View article: Dataset: The Benefits of Vulnerability Discovery and Bug Bounty Programs
Dataset: The Benefits of Vulnerability Discovery and Bug Bounty Programs Open
The folder contains source code and dataset related to the paper 'The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox'. The datasets belong to the paper 'The Benefits of Vulnerability Disco…
View article: datasets.zip
datasets.zip Open
The datasets belong to the paper 'The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox'. The folder contains vulnerabilities reported to the Chromium issue tracker and Bugzilla (Mozilla issu…
View article: Principled Data-Driven Decision Support for Cyber-Forensic Investigations
Principled Data-Driven Decision Support for Cyber-Forensic Investigations Open
In the wake of a cybersecurity incident, it is crucial to promptly discover how the threat actors breached security in order to assess the impact of the incident and to develop and deploy countermeasures that can protect against further at…
View article: Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit
Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit Open
Vehicle routing problems (VRPs) can be divided into two major categories: offline VRPs, which consider a given set of trip requests to be served, and online VRPs, which consider requests as they arrive in real-time. Based on discussions wi…
View article: An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services
An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services Open
Many transit agencies operating paratransit and microtransit services have to respond to trip requests that arrive in real-time, which entails solving hard combinatorial and sequential decision-making problems under uncertainty. To avoid d…
View article: Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit
Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit Open
Vehicle routing problems (VRPs) can be divided into two major categories: offline VRPs, which consider a given set of trip requests to be served, and online VRPs, which consider requests as they arrive in real-time. Based on discussions wi…
View article: An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services
An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services Open
Many transit agencies operating paratransit and microtransit services have to respond to trip requests that arrive in real-time, which entails solving hard combinatorial and sequential decision-making problems under uncertainty. To avoid d…