Founder, Principal Investigator
Anyscale Learning For All (ALFA) Group
MIT Computer Science and Artificial Intelligence Lab (CSAIL)
Email: unamay@csail.mit.edu
Office: 32-D534 Stata Center
Since the beginning of my interest in Artificial Intelligence, I have focused on learning and adaptation.
My central inspiration is Nature’s process of evolution because it generates compelling examples of intelligent organisms and behavior.
This is why I work with evolutionary algorithms.
Neither evolution or evolutionary algorithms are efficient, but I am devoted to the open question of how to use the latter to computationally replicate intelligence.
Adversarial learning, i.e. behavioral adaptation under the pressure of adversarial competition, is an under-explored facet of intelligence, despite being so common and important to understand. For example, consider biological arms races of predators and prey, viruses and their hosts, the never-ending challenges of cybersecurity, and even squirrels versus bird feeder owners! For this, I have coined the moniker “Artificial Adversarial Intelligence”. Adversarial Intelligence is the thinking underlying adversarial behavior. It recruits planning, learning, technical skills, expert knowledge and other faces of intelligence. ALFA’s goal became to computationally replicate Adversarial Intelligence in pursuit of Artificial Adversarial Intelligence.
Enroute to Artificial Adversarial Intelligence, we develop data-driven, gradient-based Machine Learning approaches that leverage adversarial learning. ALFA’s Lipizzaner framework applies spatially distributed co-evolution to provide resilient and robust Generative Adversarial Network training. ALFA’s cybersecurity projects address sponsors’ interests in anticipating possible moves and counter-moves to inform resilient defenses in cyber threat scenarios. Cyber adversaries reason with expert and common knowledge. To support artificial adversarial reasoning, I support Erik Hemberg on an ALFA open software project named BRON. BRON aggregates the text entries of open access databases which enumerate threats (their tactics and techniques and exploites), vulnerabilities (software weaknesses and exposures) and defenses. BRON supports reasoning about behavioral-level cyber threats and defenses in support of, e.g. cyber threat hunting. ALFA’s results also endorse and encourage further translation of the evolutionary process to achieve intelligence different from that of adversaries, perhaps more positively, e.g. around cooperation.
Finally, veering away from evolutionary algorithms but still focusing on security, I also consider how intelligent adversaries can exploit code insecurities such as bugs or design weaknesses. Integral to this capability is how they understand code. For more on this, check out publications I have co-authored with Shashank Srikant, a now-graduated, PhD student.
Assuming leadership in different communities fulfills my passion for service. The scientific field of Evolutionary Computation is fairly youthful and its sub-field of Genetic Programming even younger. Since I was a PhD student, I have led different efforts to expand these fields and make them more accessible. I chaired the first workshop for graduate students at Genetic Programming 1997. When I was relatively junior, in 2005, I served as the first female chair of ACM SIGEVO’s GECCO, the most prestigious conference of the field. I also was the first female co-chair of the European Conference on Genetic Programming. I was an inaugural member of the executive board of ACM SIGEVO and continue to serve as a member, having served at different times as an Officer, i.e. Secretary and Vice Chair. I am an inaugural member of the editorial board of the Springer journal Genetic Programming and Evolvable Machines, and currently am the journal’s Area Editor for Data Analytics and Knowledge Discovery. The ACM Journal on Transactions on Evolutionary Learning and Optimization was founded just recently and I serve as an Area Editor for it. I annually teach the Introduction to Genetic Programming tutorial at GECCO and recently have started to offer a tutorial on Coevolutionary Computation for Adversarial Deep Learning at GECCO. In 2013 a career recognition award propelled me to shift prevailing culture by starting an annual meeting for Women in Evolutionary Computation. To this day, it is regularly hosted at GECCO. I am especially proud to report that the meeting’s scope has been updated to include any under-represented member of the EC community.
In 2013 I updated my research group’s name to ALFA from Evolutionary Design and Optimization. Based on its application focus on security, ALFA is mostly funded by DARPA and the US Government, with additional funding from multiple CSAIL Alliance Program initiatives.
Among the many rewards of leading ALFA, my group serves my passion for mentoring students and postdocs from MIT. ALFA has been a humane academic research home to numerous UROPs, Masters students (in Computer Science, Technology and Policy, and System Design & Management), PhD students, and PostDocs. For MIT’s Department of Electrical Engineering and Computer Science, I have led the Machine Learning track for PhD admissions, in addition to serving on the admissions committee multiple years. I also enjoy academically advising EECS undergraduates and Ph.D. students.
Besides working for technical and academic communities, I also devote efforts to the CSAIL community. I have led the CSAIL Pretty Committee, Lobby Committee, and Logo Committee. I lead the Applied Machine Learning Community of Research and I led the committee organizing CSAIL’s Celebration of its 20th and 60th anniversaries. In the service of principal and senior research scientists in CSAIL, I have worked on defining the appointments’ review process. I am currently working on recommendations to CSAIL that will improve the transparency and details of the appointments’ responsibilities and career paths. A detailed, full list of my service can be found in my Curriculum Vitae.