Gerardo I. Simari’s research while affiliated with Universidad Nacional del Sur and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (171)


The Impact of Strategic Communication in Coopetitive Multiagent Settings
  • Article

January 2025

·

3 Reads

IEEE Transactions on Computational Social Systems

Julian Baldwin

·

Larry Birnbaum

·

David Chan

·

[...]

·

Rand Waltzman

We consider behavior of agents in a long-term multiagent coopetitive setting in which agents vary their cooperative and competitive stances over time. Using the game of Diplomacy as a testbed, we study how successful agents vary their coopetitive behavior, developing a new “style of play” (SoP) characterization of player behavior. We assess five novel SoP hypotheses about successful behavior. We propose two algorithms to automatically compute an agent’s SoP vector and describe the important factors in this computation. As an agent’s SoP depends on the game state and its perception of threat, we develop a novel “means, motive, and opportunity” (MMO) model of threat and show that we can predict threats effectively using this model. We provide novel insights into how agents should behave to more successfully achieve their goals in long-term coopetitive settings.


Figure 2: Results of the Headline Generation task. This figure depicts the distribution of responses from GPT-4o-Mini, Gemini-1.5-Pro and Claude-3.5-Sonnet across the four categories of headlines, from a journalist's perspective (left) and a researcher's perspective (right).
Figure 3: Impact analysis of language cues in the abstracts for the Headline Generation task. Plots show the distribution of responses from GPT-4o-Mini, Claude-3.5-Sonnet, and Gemini-1.5-Pro across three types of linguistic cues: correlation, causal, and no cues, comparing outputs from a journalist's perspective (left) and a researcher's perspective (right).
Figure 4: Results of the Contingency Judgment task-GPT-4o-Mini exhibits the highest degree of causal illusion, while Claude-3.5-Sonnet shows a narrower interquartile range and Gemini-1.5-Pro displays the lowest degree of causal illusion. All model pairs show statistically significant differences (p < 0.0001).
Headlines types along with examples of frequently used language cues.
Do Large Language Models Show Biases in Causal Learning?
  • Preprint
  • File available

December 2024

·

1 Read

Causal learning is the cognitive process of developing the capability of making causal inferences based on available information, often guided by normative principles. This process is prone to errors and biases, such as the illusion of causality, in which people perceive a causal relationship between two variables despite lacking supporting evidence. This cognitive bias has been proposed to underlie many societal problems, including social prejudice, stereotype formation, misinformation, and superstitious thinking. In this research, we investigate whether large language models (LLMs) develop causal illusions, both in real-world and controlled laboratory contexts of causal learning and inference. To this end, we built a dataset of over 2K samples including purely correlational cases, situations with null contingency, and cases where temporal information excludes the possibility of causality by placing the potential effect before the cause. We then prompted the models to make statements or answer causal questions to evaluate their tendencies to infer causation erroneously in these structured settings. Our findings show a strong presence of causal illusion bias in LLMs. Specifically, in open-ended generation tasks involving spurious correlations, the models displayed bias at levels comparable to, or even lower than, those observed in similar studies on human subjects. However, when faced with null-contingency scenarios or temporal cues that negate causal relationships, where it was required to respond on a 0-100 scale, the models exhibited significantly higher bias. These findings suggest that the models have not uniformly, consistently, or reliably internalized the normative principles essential for accurate causal learning.

Download


Figure 2: Accuracy and running time on different training subsets.
Abduction of Domain Relationships from Data for VQA

September 2024

·

89 Reads

In this paper, we study the problem of visual question answering (VQA) where the image and query are represented by ASP programs that lack domain data. We provide an approach that is orthogonal and complementary to existing knowledge augmentation techniques where we abduce domain relationships of image constructs from past examples. After framing the abduction problem, we provide a baseline approach, and an implementation that significantly improves the accuracy of query answering yet requires few examples.


Figure 2: Visual representation of deployment.
Figure 3: Left: Value with subset logic program, logic program Π ′ , Π for the Knoxville location. Right: Runtime Comparison with Depth-First Search and A* Search.
Figure 6: Prob. of detection (PD) from independent trials against ML-based anomaly detectors. Left: PD based on agents discovered. Right: PD based on points discovered.
Geospatial Trajectory Generation via Efficient Abduction: Deployment for Independent Testing

July 2024

·

14 Reads

The ability to generate artificial human movement patterns while meeting location and time constraints is an important problem in the security community, particularly as it enables the study of the analog problem of detecting such patterns while maintaining privacy. We frame this problem as an instance of abduction guided by a novel parsimony function represented as an aggregate truth value over an annotated logic program. This approach has the added benefit of affording explainability to an analyst user. By showing that any subset of such a program can provide a lower bound on this parsimony requirement, we are able to abduce movement trajectories efficiently through an informed (i.e., A*) search. We describe how our implementation was enhanced with the application of multiple techniques in order to be scaled and integrated with a cloud-based software stack that included bottom-up rule learning, geolocated knowledge graph retrieval/management, and interfaces with government systems for independently conducted government-run tests for which we provide results. We also report on our own experiments showing that we not only provide exact results but also scale to very large scenarios and provide realistic agent trajectories that can go undetected by machine learning anomaly detectors.




Towards Effective and Efficient Approximate Query Answering in Probabilistic DeLP

February 2024

·

1 Read

·

1 Citation

This work presents an overview of a research project focused on R&D for ap- proximate query answering in probabilistic structured argumentation based on DeLP [2]. The ultimate goal is to develop a suite of algorithms for tackling the computational cost of this task and selection criteria for choosing the best one based on the analysis of available information


Cyber Threat Analysis with Structured Probabilistic Argumentation

February 2024

·

16 Reads

·

3 Citations

Capturing the uncertain aspects in cyber threat analyses is an important part of a wide range of efforts, including diagnostics, threat evaluation, and preventing attacks. However, there has been insufficient research and development of modeling approaches that are able to correctly capture and handle such uncertainty. In this work, we present an application example of the DeLP3E framework-a formalism that extends structured argumentation based on logic programming-in the domain of cyber threat analysis; in particular, near real-time analyses such as incident response in enterprise networks. The DeLP3E framework provides a unique combination of dialectical reasoning, rule-based inference , and probabilistic modeling to not only offer suggested responses to given situations, but also to explain to the analyst why the system reaches its conclusions.



Citations (48)


... Additionally, it is shown that the class of ring withdrawals is not contained in and does not contain the class of AGM contractions or the class of severe withdrawals. • In their paper Neighborhood-based argumental community support in the context of multi-topic debates [9] Irene M. Coronel, Melisa G. Escañuela Gonzalez, Diego C. Martinez, Gerardo I. Simari, and Maximiliano C.D. Budán deal with a limitation of the formal characterization of abstract argumentation, to not take topics relevant for the discourse domain into account. It introduces semantics for multi-topic argumentation, a new way to evaluate arguments based on how relevant they are to the core topic. ...

Reference:

Formal and Cognitive Reasoning
Neighborhood-based argumental community support in the context of multi-topic debates
  • Citing Article
  • April 2024

International Journal of Approximate Reasoning

... El análisis de amenazas cibernéticas (CTA, por sus siglas en Inglés) [Als20] es un problema de inteligencia altamente técnica en el que un analista (humano) toma en consideración múltiples fuentes de información, con grados posiblemente variables de confianza o incertidumbre, con el objetivo de obtener información sobre los eventos de interés que pueden representar una amenaza para un sistema. Al crear herramientas de IA para ayudar en dicho proceso, los ingenieros de conocimiento enfrentan el desafío de aprovechar el conocimiento incierto de la mejor manera posible al resolver diferentes tipos de problemas [LSSS19]. ...

Cyber Threat Analysis with Structured Probabilistic Argumentation
  • Citing Article
  • February 2024

... Last but not least, by intertwining neural inference with symbolic processing, NUDGE subscribes to the class of neurosymbolic approaches, which recently experienced a substantial revival thanks to increasing ease with which deep learning architectures can be combined with symbolic representations -see, for instance, [6] and [8,20] for reviews of state-of-the-art in this area. ...

Neuro Symbolic Reasoning and Learning

... In the paper 'Engineering User-centered Explanations to Query Answers in Ontology-driven Socio-technical Systems' by Juan Carlos L. Teze, Jose Nicolas Paredes, Maria Vanina Martinez, and Gerardo Ignacio Simari [13], the authors develop a line of research and development towards building tools that facilitate the implementation of explainable and interpretable hybrid intelligent socio-technical systems focusing on user-centered explanations. The implementation of a recently-proposed application framework for developing such systems is presented, and user-centered mechanisms are explored. ...

Engineering user-centered explanations to query answers in ontology-driven socio-technical systems

Semantic Web

... Further, emerging neuro symbolic use cases including temporal logic over finite time periods [4] and knowledge graph reasoning [5] necessitate the need for a logical frmaework that encompasses a broad set of capabilities. Fortunately, generalized annotated logic [6] with various extensions [7,8,9] capture many of these capabilities. In this paper we present a new software package called PyReason for performing deduction using generalized annotated logic that captures many of the desired capabilities seen in various neuro symbolic frameworks including fuzzy, open world, temporal, and graph-based reasoning. ...

Extensions to Generalized Annotated Logic and an Equivalent Neural Architecture
  • Citing Conference Paper
  • September 2022

... Determining the criteria for a good explanation is an area of interest in various scientific fields [47]. Many researchers propose a list of attributes for a good explanation based merely on literature synthesis [20], [23], [39], [48], [49], [50], [51], [52] [53], [54], [55], [56]. Others focus only on their own experience and expertise [46], [57]. ...

The HEIC application framework for implementing XAI-based socio-technical systems
  • Citing Article
  • November 2022

Online Social Networks and Media

... Finally, the seventh and ninth rules can be read as: "If post P is suspected to contain hate speech (with any danger level), and user UID is considered to be an early poster of P that is flagged as viral on the network (with confidence at least 0.7), then there exists a hypothesis that UID is responsible for disseminating hate speech", and "the hypothesis that UID is repeatedly banned is created if the number of bans for UID's account is above the average number of bans per user". For the Network Diffusion sub-module, we could implement a set of logical diffusion rules with the purpose of guiding the evolution of (uncertain) knowledge about the network; an example of a language for expressing such rules is MANCaLog [60]. For this particular example, Fig. 2 shows two diffusion rules, loc_rule 1 and glob_rule 1 , where the former is a local diffusion rule that intuitively states "users that are not popular with certainty and have popular neighbors who reposted P with certainty, will update the belief that P should be reposted, according to influence function if". ...

Reasoning about Complex Networks: A Logic Programming Approach
  • Citing Preprint
  • September 2022

... In contrast, we include both computational experiments and a human-user study, providing a more robust and empirically grounded understanding of the framework's effectiveness. In an orthogonal direction, Teze, Godo, and Simari (2022) proposed an argumentation-based approach for epistemic planning that allows for handling contextual preferences of users during plan construction, but without explainability considerations. In contrast, our framework can be used to explain planning problems to users via argumentation-based dialogues. ...

An approach to improve argumentation-based epistemic planning with contextual preferences
  • Citing Article
  • September 2022

International Journal of Approximate Reasoning

... By mapping security and privacy threats, the security requirements for each type of threat can be made known and the centralized contact tracing system can be viewed as effective. Acknowledging that decision support tools play a useful role vis à vis intelligent sociotechnical systems [4], a number of challenges can be overcome. The emphasis is on the ability to analyze and process various forms of information. ...

Argumentation-Based Query Answering under Uncertainty with Application to Cybersecurity

Big Data and Cognitive Computing