Skip to main content

Showing 1–26 of 26 results for author: Weidlich, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18040  [pdf, other

    cs.LG cs.AI cs.DC cs.ET

    Fast-FedUL: A Training-Free Federated Unlearning with Provable Skew Resilience

    Authors: Thanh Trung Huynh, Trong Bang Nguyen, Phi Le Nguyen, Thanh Tam Nguyen, Matthias Weidlich, Quoc Viet Hung Nguyen, Karl Aberer

    Abstract: Federated learning (FL) has recently emerged as a compelling machine learning paradigm, prioritizing the protection of privacy for training data. The increasing demand to address issues such as ``the right to be forgotten'' and combat data poisoning attacks highlights the importance of techniques, known as \textit{unlearning}, which facilitate the removal of specific training data from trained FL… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: Accepted in ECML PKDD 2024

  2. arXiv:2404.14942  [pdf, other

    cs.CR cs.IR cs.LG

    Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures

    Authors: Thanh Toan Nguyen, Quoc Viet Hung Nguyen, Thanh Tam Nguyen, Thanh Trung Huynh, Thanh Thi Nguyen, Matthias Weidlich, Hongzhi Yin

    Abstract: Recommender systems have become an integral part of online services to help users locate specific information in a sea of data. However, existing studies show that some recommender systems are vulnerable to poisoning attacks, particularly those that involve learning schemes. A poisoning attack is where an adversary injects carefully crafted data into the process of training a model, with the goal… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  3. arXiv:2402.02921  [pdf, other

    cs.DB cs.AI cs.LG

    Mining a Minimal Set of Behavioral Patterns using Incremental Evaluation

    Authors: Mehdi Acheli, Daniela Grigori, Matthias Weidlich

    Abstract: Process mining provides methods to analyse event logs generated by information systems during the execution of processes. It thereby supports the design, validation, and execution of processes in domains ranging from healthcare, through manufacturing, to e-commerce. To explore the regularities of flexible processes that show a large behavioral variability, it was suggested to mine recurrent behavi… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  4. arXiv:2312.08847  [pdf, other

    cs.AI cs.LG cs.NE stat.ML

    Knowledge-Driven Modulation of Neural Networks with Attention Mechanism for Next Activity Prediction

    Authors: Ivan Donadello, Jonghyeon Ko, Fabrizio Maria Maggi, Jan Mendling, Francesco Riva, Matthias Weidlich

    Abstract: Predictive Process Monitoring (PPM) aims at leveraging historic process execution data to predict how ongoing executions will continue up to their completion. In recent years, PPM techniques for the prediction of the next activities have matured significantly, mainly thanks to the use of Neural Networks (NNs) as a predictor. While their performance is difficult to beat in the general case, there a… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    MSC Class: 68T20 (Primary) 68T01; 68T05; 68T37 (Secondary) ACM Class: I.2.6; I.2.8; I.2.m

  5. arXiv:2309.14097  [pdf, other

    cs.OH

    How do users design scientific workflows? The Case of Snakemake

    Authors: Sebastian Pohl, Nourhan Elfaramawy, Kedi Cao, Birte Kehr, Matthias Weidlich

    Abstract: Scientific workflows automate the analysis of large-scale scientific data, fostering the reuse of data processing operators as well as the reproducibility and traceability of analysis results. In exploratory research, however, workflows are continuously adapted, utilizing a wide range of tools and software libraries, to test scientific hypotheses. Script-based workflow engines cater to the require… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  6. arXiv:2309.00900  [pdf, other

    cs.SE cs.AI

    Large Process Models: Business Process Management in the Age of Generative AI

    Authors: Timotheus Kampik, Christian Warmuth, Adrian Rebmann, Ron Agam, Lukas N. P. Egger, Andreas Gerber, Johannes Hoffart, Jonas Kolk, Philipp Herzig, Gero Decker, Han van der Aa, Artem Polyvyanyy, Stefanie Rinderle-Ma, Ingo Weber, Matthias Weidlich

    Abstract: The continued success of Large Language Models (LLMs) and other generative artificial intelligence approaches highlights the advantages that large information corpora can have over rigidly defined symbolic models, but also serves as a proof-point of the challenges that purely statistics-based approaches have in terms of safety and trustworthiness. As a framework for contextualizing the potential,… ▽ More

    Submitted 11 September, 2023; v1 submitted 2 September, 2023; originally announced September 2023.

  7. arXiv:2305.00960  [pdf, other

    cs.DB cs.CR

    PMDG: Privacy for Multi-Perspective Process Mining through Data Generalization

    Authors: Ryan Hildebrant, Stephan A. Fahrenkrog-Petersen, Matthias Weidlich, Shangping Ren

    Abstract: Anonymization of event logs facilitates process mining while protecting sensitive information of process stakeholders. Existing techniques, however, focus on the privatization of the control-flow. Other process perspectives, such as roles, resources, and objects are neglected or subject to randomization, which breaks the dependencies between the perspectives. Hence, existing techniques are not sui… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 16 Pages

    Journal ref: CAiSE 2023

  8. arXiv:2211.07400  [pdf, other

    q-fin.ST cs.AI cs.IR cs.LG

    Efficient Integration of Multi-Order Dynamics and Internal Dynamics in Stock Movement Prediction

    Authors: Thanh Trung Huynh, Minh Hieu Nguyen, Thanh Tam Nguyen, Phi Le Nguyen, Matthias Weidlich, Quoc Viet Hung Nguyen, Karl Aberer

    Abstract: Advances in deep neural network (DNN) architectures have enabled new prediction techniques for stock market data. Unlike other multivariate time-series data, stock markets show two unique characteristics: (i) \emph{multi-order dynamics}, as stock prices are affected by strong non-pairwise correlations (e.g., within the same industry); and (ii) \emph{internal dynamics}, as each individual stock sho… ▽ More

    Submitted 24 November, 2022; v1 submitted 10 November, 2022; originally announced November 2022.

    Comments: Technical report for accepted paper at WSDM 2023

  9. arXiv:2207.08098  [pdf, other

    cs.SI cs.AI cs.LG

    Model-Agnostic and Diverse Explanations for Streaming Rumour Graphs

    Authors: Thanh Tam Nguyen, Thanh Cong Phan, Minh Hieu Nguyen, Matthias Weidlich, Hongzhi Yin, Jun Jo, Quoc Viet Hung Nguyen

    Abstract: The propagation of rumours on social media poses an important threat to societies, so that various techniques for rumour detection have been proposed recently. Yet, existing work focuses on \emph{what} entities constitute a rumour, but provides little support to understand \emph{why} the entities have been classified as such. This prevents an effective evaluation of the detected rumours as well as… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

  10. arXiv:2205.06580  [pdf, other

    cs.SI cs.LG

    Detecting Rumours with Latency Guarantees using Massive Streaming Data

    Authors: Thanh Tam Nguyen, Thanh Trung Huynh, Hongzhi Yin, Matthias Weidlich, Thanh Thi Nguyen, Thai Son Mai, Quoc Viet Hung Nguyen

    Abstract: Today's social networks continuously generate massive streams of data, which provide a valuable starting point for the detection of rumours as soon as they start to propagate. However, rumour detection faces tight latency bounds, which cannot be met by contemporary algorithms, given the sheer volume of high-velocity streaming data emitted by social networks. Hence, in this paper, we argue for best… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  11. arXiv:2112.01897  [pdf, other

    cs.DB

    GECCO: Constraint-driven Abstraction of Low-level Event Logs

    Authors: Adrian Rebmann, Matthias Weidlich, Han van der Aa

    Abstract: Process mining enables the analysis of complex systems using event data recorded during the execution of processes. Specifically, models of these processes can be discovered from event logs, i.e., sequences of events. However, the recorded events are often too fine-granular and result in unstructured models that are not meaningful for analysis. Log abstraction therefore aims to group together even… ▽ More

    Submitted 7 December, 2021; v1 submitted 3 December, 2021; originally announced December 2021.

    Comments: 14 pages, 8 figures, accepted for IEEE ICDE 2022

  12. arXiv:2109.08501  [pdf, other

    cs.DB cs.AI cs.CR cs.LG

    SaCoFa: Semantics-aware Control-flow Anonymization for Process Mining

    Authors: Stephan A. Fahrenkrog-Petersen, Martin Kabierski, Fabian Rösel, Han van der Aa, Matthias Weidlich

    Abstract: Privacy-preserving process mining enables the analysis of business processes using event logs, while giving guarantees on the protection of sensitive information on process stakeholders. To this end, existing approaches add noise to the results of queries that extract properties of an event log, such as the frequency distribution of trace variants, for analysis.Noise insertion neglects the semanti… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

  13. arXiv:2107.06578  [pdf, other

    cs.CR cs.AI cs.LG

    A Distance Measure for Privacy-preserving Process Mining based on Feature Learning

    Authors: Fabian Rösel, Stephan A. Fahrenkrog-Petersen, Han van der Aa, Matthias Weidlich

    Abstract: To enable process analysis based on an event log without compromising the privacy of individuals involved in process execution, a log may be anonymized. Such anonymization strives to transform a log so that it satisfies provable privacy guarantees, while largely maintaining its utility for process analysis. Existing techniques perform anonymization using simple, syntactic measures to identify suit… ▽ More

    Submitted 10 August, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted for 17th International Workshop on Business Process Intelligence

    ACM Class: H.4

  14. arXiv:2103.11740  [pdf, other

    cs.CR cs.DB

    Privacy-aware Process Performance Indicators: Framework and Release Mechanisms

    Authors: Martin Kabierski, Stephan Fahrenkrog-Petersen, Matthias Weidlich

    Abstract: Process performance indicators (PPIs) are metrics to quantify the degree with which organizational goals defined based on business processes are fulfilled. They exploit the event logs recorded by information systems during the execution of business processes, thereby providing a basis for process monitoring and subsequent optimization. However, PPIs are often evaluated on processes that involve in… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  15. arXiv:2008.09558  [pdf, other

    cs.AI cs.CL cs.FL cs.IT

    Entropia: A Family of Entropy-Based Conformance Checking Measures for Process Mining

    Authors: Artem Polyvyanyy, Hanan Alkhammash, Claudio Di Ciccio, Luciano García-Bañuelos, Anna Kalenkova, Sander J. J. Leemans, Jan Mendling, Alistair Moffat, Matthias Weidlich

    Abstract: This paper presents a command-line tool, called Entropia, that implements a family of conformance checking measures for process mining founded on the notion of entropy from information theory. The measures allow quantifying classical non-deterministic and stochastic precision and recall quality criteria for process models automatically discovered from traces executed by IT-systems and recorded in… ▽ More

    Submitted 29 September, 2020; v1 submitted 21 August, 2020; originally announced August 2020.

    Comments: 4 pages

  16. arXiv:2007.02416  [pdf, other

    cs.AI

    Partial Order Resolution of Event Logs for Process Conformance Checking

    Authors: Han van der Aa, Henrik Leopold, Matthias Weidlich

    Abstract: While supporting the execution of business processes, information systems record event logs. Conformance checking relies on these logs to analyze whether the recorded behavior of a process conforms to the behavior of a normative specification. A key assumption of existing conformance checking techniques, however, is that all events are associated with timestamps that allow to infer a total order o… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Accepted for publication in Decision Support Systems

  17. arXiv:2006.12856  [pdf, other

    cs.DB cs.SE

    PRIPEL: Privacy-Preserving Event Log Publishing Including Contextual Information

    Authors: Stephan A. Fahrenkrog-Petersen, Han van der Aa, Matthias Weidlich

    Abstract: Event logs capture the execution of business processes in terms of executed activities and their execution context. Since logs contain potentially sensitive information about the individuals involved in the process, they should be pre-processed before being published to preserve the individuals' privacy. However, existing techniques for such pre-processing are limited to a process' control-flow an… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Journal ref: International Conference on Business Process Management 2020

  18. Quantifying the Re-identification Risk of Event Logs for Process Mining

    Authors: S. Nuñez von Voigt, S. A. Fahrenkrog-Petersen, D. Janssen, A. Koschmider, F. Tschorsch, F. Mannhardt, O. Landsiedel, M. Weidlich

    Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back… ▽ More

    Submitted 19 June, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted to CAiSE-2020

    Journal ref: CAiSE 2020: Advanced Information Systems Engineering pp 252-267

  19. arXiv:1909.02977  [pdf, other

    cs.LG cs.SI stat.ML

    Parallel Computation of Graph Embeddings

    Authors: Chi Thang Duong, Hongzhi Yin, Thanh Dat Hoang, Truong Giang Le Ba, Matthias Weidlich, Quoc Viet Hung Nguyen, Karl Aberer

    Abstract: Graph embedding aims at learning a vector-based representation of vertices that incorporates the structure of the graph. This representation then enables inference of graph properties. Existing graph embedding techniques, however, do not scale well to large graphs. We therefore propose a framework for parallel computation of a graph embedding using a cluster of compute nodes with resource constrai… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  20. arXiv:1905.09568  [pdf, other

    cs.LG cs.AI stat.ML

    Fire Now, Fire Later: Alarm-Based Systems for Prescriptive Process Monitoring

    Authors: Stephan A. Fahrenkrog-Petersen, Niek Tax, Irene Teinemaa, Marlon Dumas, Massimiliano de Leoni, Fabrizio Maria Maggi, Matthias Weidlich

    Abstract: Predictive process monitoring is a family of techniques to analyze events produced during the execution of a business process in order to predict the future state or the final outcome of running process instances. Existing techniques in this field are able to predict, at each step of a process instance, the likelihood that it will lead to an undesired outcome.These techniques, however, focus on ge… ▽ More

    Submitted 14 October, 2020; v1 submitted 23 May, 2019; originally announced May 2019.

  21. arXiv:1901.02244  [pdf, other

    cs.DC cs.LG

    CROSSBOW: Scaling Deep Learning with Small Batch Sizes on Multi-GPU Servers

    Authors: Alexandros Koliousis, Pijika Watcharapichat, Matthias Weidlich, Luo Mai, Paolo Costa, Peter Pietzuch

    Abstract: Deep learning models are trained on servers with many GPUs, and training must scale with the number of GPUs. Systems such as TensorFlow and Caffe2 train models with parallel synchronous stochastic gradient descent: they process a batch of training data at a time, partitioned across GPUs, and average the resulting partial gradients to obtain an updated global model. To fully utilise all GPUs, syste… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  22. Monotone Precision and Recall Measures for Comparing Executions and Specifications of Dynamic Systems

    Authors: Artem Polyvyanyy, Andreas Solti, Matthias Weidlich, Claudio Di Ciccio, Jan Mendling

    Abstract: The behavioural comparison of systems is an important concern of software engineering research. For example, the areas of specification discovery and specification mining are concerned with measuring the consistency between a collection of execution traces and a program specification. This problem is also tackled in process mining with the help of measures that describe the quality of a process sp… ▽ More

    Submitted 25 April, 2020; v1 submitted 18 December, 2018; originally announced December 2018.

  23. The Internet-of-Things Meets Business Process Management: A Manifesto

    Authors: Christian Janiesch, Agnes Koschmider, Massimo Mecella, Barbara Weber, Andrea Burattin, Claudio Di Ciccio, Giancarlo Fortino, Avigdor Gal, Udo Kannengiesser, Francesco Leotta, Felix Mannhardt, Andrea Marrella, Jan Mendling, Andreas Oberweis, Manfred Reichert, Stefanie Rinderle-Ma, Estefania Serral, WenZhan Song, Jianwen Su, Victoria Torres, Matthias Weidlich, Mathias Weske, Liang Zhang

    Abstract: The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and acros… ▽ More

    Submitted 28 October, 2020; v1 submitted 11 September, 2017; originally announced September 2017.

  24. arXiv:1704.03610  [pdf, other

    cs.SE

    Blockchains for Business Process Management - Challenges and Opportunities

    Authors: Jan Mendling, Ingo Weber, Wil van der Aalst, Jan vom Brocke, Cristina Cabanillas, Florian Daniel, Soren Debois, Claudio Di Ciccio, Marlon Dumas, Schahram Dustdar, Avigdor Gal, Luciano Garcia-Banuelos, Guido Governatori, Richard Hull, Marcello La Rosa, Henrik Leopold, Frank Leymann, Jan Recker, Manfred Reichert, Hajo A. Reijers, Stefanie Rinderle-Ma, Andreas Rogge-Solti, Michael Rosemann, Stefan Schulte, Munindar P. Singh , et al. (7 additional authors not shown)

    Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More

    Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: Preprint for ACM TMIS

  25. Modeling Styles in Business Process Modeling

    Authors: Jakob Pinggera, Pnina Soffer, Stefan Zugal, Barbara Weber, Matthias Weidlich, Dirk Fahland, Hajo A. Reijers, Jan Mendling

    Abstract: Research on quality issues of business process models has recently begun to explore the process of creating process models. As a consequence, the question arises whether different ways of creating process models exist. In this vein, we observed 115 students engaged in the act of modeling, recording all their interactions with the modeling environment using a specialized tool. The recordings of pro… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'12, pp. 151-166, 2012

  26. Tying Process Model Quality to the Modeling Process: The Impact of Structuring, Movement, and Speed

    Authors: Jan Claes, Irene Vanderfeesten, Hajo A. Reijers, Jakob Pinggera, Matthias Weidlich, Stefan Zugal, Dirk Fahland, Barbara Weber, Jan Mendling, Geert Poels

    Abstract: In an investigation into the process of process modeling, we examined how modeling behavior relates to the quality of the process model that emerges from that. Specifically, we considered whether (i) a modeler's structured modeling style, (ii) the frequency of moving existing objects over the modeling canvas, and (iii) the overall modeling speed is in any way connected to the ease with which the r… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.