Abstract
Logic stands at the very heart of computer science. In this talk, I will argue that logic is also an essential part of machine learning and that it has a fundamental role to play in both international security and counter-terrorism. I will first briefly describe the use of logic for high-level reasoning in counter-terrorism applications and then describe the BEEF system to explain the forecasts generated by virtually any machine learning classifier. Finally, I will describe one use of logic in deceiving cyber-adversaries who may have successfully compromised an enterprise network.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001)
Cortes, C., Vapnik, V.: Support vector machine. Mach. Learn. 20, 273–297 (1995)
Dekhtyar, A., Dekhtyar, M.I., Subrahmanian, V.: Temporal probabilistic logic programs. In: ICLP, vol. 99, pp. 109–123 (1999)
Grover, S., Pulice, C., Simari, G.I., Subrahmanian, V.: BEEF: balanced English explanations of forecasts. IEEE Trans. Comput. Soc. Syst. 6(2), 350–364 (2019)
Jajodia, S., et al.: A probabilistic logic of cyber deception. IEEE Inf. Forensics Secur. 12(11), 2532–2544 (2017)
Khuller, S., Martinez, M.V., Nau, D., Sliva, A., Simari, G.I., Subrahmanian, V.S.: Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10 30,000 worlds. Ann. Math. Artif. Intell. 51(2–4), 295–331 (2007)
Mannes, A., Michael, M., Pate, A., Sliva, A., Subrahmanian, V.S., Wilkenfeld, J.: Stochastic opponent modeling agents: a case study with Hezbollah. In: Liu, H., Salerno, J.J., Young, M.J. (eds.) Social Computing, Behavioral Modeling, and Prediction, pp. 37–45. Springer, Boston (2008). https://doi.org/10.1007/978-0-387-77672-9_6
Serra, E., Subrahmanian, V.: A survey of quantitative models of terror group behavior and an analysis of strategic disclosure of behavioral models. IEEE Trans. Comput. Soc. Syst. 1(1), 66–88 (2014)
Simari, G.I., Dickerson, J.P., Sliva, A., Subrahmanian, V.: Parallel abductive query answering in probabilistic logic programs. ACM Trans. Comput. Logic (TOCL) 14(2), 12 (2013)
Subrahmanian, V.S., Mannes, A., Roul, A., Raghavan, R.: Indian Mujahideen: Computational Analysis and Public Policy. TESECO. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-02818-7
Subrahmanian, V.S., Mannes, A., Sliva, A., Shakarian, J., Dickerson, J.P.: Computational Analysis of Terrorist Groups: Lashkar-e-Taiba. Springer, New York (2012). https://doi.org/10.1007/978-1-4614-4769-6
Acknowledgement
Different parts of this work were supported by ONR grants N000141612739, N00014-16-1-2918, N00014-18-1-2670 and N00014-16-1-2896.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Subrahmanian, V.S. (2019). Logic, Machine Learning, and Security. In: Cuzzocrea, A., Greco, S., Larsen, H., Saccà, D., Andreasen, T., Christiansen, H. (eds) Flexible Query Answering Systems. FQAS 2019. Lecture Notes in Computer Science(), vol 11529. Springer, Cham. https://doi.org/10.1007/978-3-030-27629-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-27629-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27628-7
Online ISBN: 978-3-030-27629-4
eBook Packages: Computer ScienceComputer Science (R0)