Picture for Akshat Kumar

Akshat Kumar

MIT CSAIL, Cambridge, MA, USA

A Factored MDP Approach To Moving Target Defense With Dynamic Threat Modeling and Cost Efficiency

Add code
Aug 16, 2024
Viaarxiv icon

Safe Reinforcement Learning with Learned Non-Markovian Safety Constraints

Add code
May 05, 2024
Viaarxiv icon

Leveraging AI Planning For Detecting Cloud Security Vulnerabilities

Add code
Feb 16, 2024
Viaarxiv icon

FlowPG: Action-constrained Policy Gradient with Normalizing Flows

Add code
Feb 07, 2024
Viaarxiv icon

Unified Training of Universal Time Series Forecasting Transformers

Add code
Feb 04, 2024
Viaarxiv icon

Pushing the Limits of Pre-training for Time Series Forecasting in the CloudOps Domain

Add code
Oct 10, 2023
Viaarxiv icon

Safe MDP Planning by Learning Temporal Patterns of Undesirable Trajectories and Averting Negative Side Effects

Add code
Apr 06, 2023
Viaarxiv icon

Shining light on data: Geometric data analysis through quantum dynamics

Add code
Dec 13, 2022
Viaarxiv icon

DeepTIMe: Deep Time-Index Meta-Learning for Non-Stationary Time-Series Forecasting

Add code
Jul 14, 2022
Figure 1 for DeepTIMe: Deep Time-Index Meta-Learning for Non-Stationary Time-Series Forecasting
Figure 2 for DeepTIMe: Deep Time-Index Meta-Learning for Non-Stationary Time-Series Forecasting
Figure 3 for DeepTIMe: Deep Time-Index Meta-Learning for Non-Stationary Time-Series Forecasting
Figure 4 for DeepTIMe: Deep Time-Index Meta-Learning for Non-Stationary Time-Series Forecasting
Viaarxiv icon

Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

Add code
May 08, 2022
Figure 1 for Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies
Figure 2 for Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies
Figure 3 for Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies
Figure 4 for Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies
Viaarxiv icon