@article{heinrich2023targeted, abstract = {In recent years, researchers proposed a variety of deep learning models for wind power forecasting. These models predict the wind power generation of wind farms or entire regions more accurately than traditional machine learning algorithms or physical models. However, latest research has shown that deep learning models can often be manipulated by adversarial attacks. Since wind power forecasts are essential for the stability of modern power systems, it is important to protect them from this threat. In this work, we investigate the vulnerability of two different forecasting models to targeted, semi-targeted, and untargeted adversarial attacks. We consider a Long Short-Term Memory (LSTM) network for predicting the power generation of individual wind farms and a Convolutional Neural Network (CNN) for forecasting the wind power generation throughout Germany. Moreover, we propose the Total Adversarial Robustness Score (TARS), an evaluation metric for quantifying the robustness of regression models to targeted and semi-targeted adversarial attacks. It assesses the impact of attacks on the model's performance, as well as the extent to which the attacker's goal was achieved, by assigning a score between 0 (very vulnerable) and 1 (very robust). In our experiments, the LSTM forecasting model was fairly robust and achieved a TARS value of over 0.78 for all adversarial attacks investigated. The CNN forecasting model only achieved TARS values below 0.10 when trained ordinarily, and was thus very vulnerable. Yet, its robustness could be significantly improved by adversarial training, which always resulted in a TARS above 0.46.}, author = {Heinrich, René and Scholz, Christoph and Vogt, Stephan and Lehna, Malte}, codeurl = {https://github.com/FraunhoferIEE/taaowpf}, doi = {10.1007/s10994-023-06396-9}, interhash = {b25c4cf1609a5d217e90fe6761ada42d}, intrahash = {c85f3b4d92e02dde845c55776a4fa4e6}, journal = {Machine Learning}, number = 2, pages = {863--889}, publisher = {Springer}, title = {Targeted Adversarial Attacks on Wind Power Forecasts}, volume = 113, year = 2023 } @inproceedings{rauch2023active, abstract = {We propose a shift towards end-to-end learning in bird sound monitoring by combining self-supervised (SSL) and deep active learning (DAL). Leveraging transformer models, we aim to bypass traditional spectrogram conversions, enabling direct raw audio processing. ACTIVE BIRD2VEC is set to generate high-quality bird sound representations through SSL, potentially accelerating the assessment of environmental changes and decision-making processes for wind farms. Additionally, we seek to utilize the wide variety of bird vocalizations through DAL, reducing the reliance on extensively labeled datasets by human experts. We plan to curate a comprehensive set of tasks through Huggingface Datasets, enhancing future comparability and reproducibility of bioacoustic research. A comparative analysis between various transformer models will be conducted to evaluate their proficiency in bird sound recognition tasks. We aim to accelerate the progression of avian bioacoustic research and contribute to more effective conservation strategies.}, author = {Rauch, Lukas and Schwinger, Raphael and Wirth, Moritz and Sick, Bernhard and Tomforde, Sven and Scholz, Christoph}, booktitle = {Workshop on Artificial Intelligence for Sustainability (AI4S), ECAI}, interhash = {fa669d70ebe82d3d149ddc85adc736a9}, intrahash = {642c133c4f7cca48aa218da212f69f64}, pages = {1--6}, title = {Active Bird2Vec: Towards End-To-End Bird Sound Monitoring with Transformers}, url = {https://arxiv.org/abs/2308.07121}, year = 2023 } @article{lehna2023managing, abstract = {The operation of electricity grids has become increasingly complex due to the current upheaval and the increase in renewable energy production. As a consequence, active grid management is reaching its limits with conventional approaches. In the context of the Learning to Run a Power Network (L2RPN) challenge, it has been shown that Reinforcement Learning (RL) is an efficient and reliable approach with considerable potential for automatic grid operation. In this article, we analyse the submitted agent from Binbinchen and provide novel strategies to improve the agent, both for the RL and the rule-based approach. The main improvement is a N-1 strategy, where we consider topology actions that keep the grid stable, even if one line is disconnected. More, we also propose a topology reversion to the original grid, which proved to be beneficial. The improvements are tested against reference approaches on the challenge test sets and are able to increase the performance of the rule-based agent by 27%. In direct comparison between rule-based and RL agent we find similar performance. However, the RL agent has a clear computational advantage. We also analyse the behaviour in an exemplary case in more detail to provide additional insights. Here, we observe that through the N-1 strategy, the actions of both the rule-based and the RL agent become more diversified.}, author = {Lehna, Malte and Viebahn, Jan and Marot, Antoine and Tomforde, Sven and Scholz, Christoph}, codeurl = {https://github.com/FraunhoferIEE/CurriculumAgent}, doi = {10.1016/j.egyai.2023.100276}, interhash = {1eb2a95c3cc50ac7aa87f74f078f7a28}, intrahash = {e8949e7700da1eb974fe51c94877666e}, journal = {Energy and AI}, pages = 100276, publisher = {Energy and AI}, title = {Managing power grids through topology actions: A comparative study between advanced rule-based and reinforcement learning agents}, url = {https://www.sciencedirect.com/science/article/pii/S2666546823000484?via%3Dihub}, volume = 14, year = 2023 } @article{SIAS:14c, author = {Scholz, Christoph and Illig, Jens and Atzmueller, Martin and Stumme, Gerd}, interhash = {6a81e1de99a936c7b641546e284af20f}, intrahash = {3c8f0d99481312cf1543184948366b94}, journal = {CoRR}, opturl = {http://arxiv.org/abs/1407.0613}, title = {{On the Predictability of Talk Attendance at Academic Conferences (Extended Version)}}, volume = {abs/1407.0613}, year = 2014 } @inproceedings{SIAS:14b, address = {Aachen, Germany}, author = {Scholz, Christoph and Illig, Jens and Atzmueller, Martin and Stumme, Gerd}, booktitle = {Proc. LWA 2014 (KDML Special Track)}, interhash = {036eeb2c7b6ae2bab0be93301dd15abf}, intrahash = {653db2c6705c15c8fd9afe0536982a62}, publisher = {RTWH Aachen University}, title = {{On the Predictability of Talk Attendance at Academic Conferences (Extended Abstract, Resubmission)}}, year = 2014 } @article{SAS:14c, author = {Scholz, Christoph and Atzmueller, Martin and Stumme, Gerd}, interhash = {56c79f29ee5d2631ded291a39f7952db}, intrahash = {b1d72d24278760d72fb0774543cfdb06}, journal = {Journal of Social Network Analysis and Mining}, number = 217, title = {{Predictability of Evolving Contacts and Triadic Closure in Human Face-to-Face Proximity Networks}}, volume = 4, year = 2014 } @inbook{SMADS:14, address = {Heidelberg, Germany}, author = {Scholz, Christoph and Macek, Bjoern-Elmar and Atzmueller, Martin and Doerfel, Stephan and Stumme, Gerd}, chapter = {{Mining Social Links for Ubiquitous Knowledge Engineering}}, editor = {David, Klaus and Geihs, Kurt and Leimeister, Jan-Marco and Roßnagel, Alexander and Schmidt, Ludger and Stumme, Gerd and Wacker, Arno}, interhash = {892e8ce5c72e6e47c51974cbdbcdcd71}, intrahash = {1cd46cc57f2a578d26d512d17f2b04b2}, publisher = {Springer Verlag}, title = {{Socio-technical Design of Ubiquitous Computing Systems}}, year = 2014 } @inbook{ABHKMSSSS:14, address = {Heidelberg, Germany}, author = {Atzmueller, Martin and Behrenbruch, Kay and Hoffmann, Axel and Kibanov, Mark and Macek, Bjoern-Elmar and Scholz, Christoph and Skistims, Hendrik and Söllner, Matthias and Stumme, Gerd}, chapter = {{Connect-U: A System for Enhancing Social Networking}}, editor = {David, Klaus and Geihs, Kurt and Leimeister, Jan-Marco and Roßnagel, Alexander and Schmidt, Ludger and Stumme, Gerd and Wacker, Arno}, interhash = {a3e215f96a328486628a4c9e3b5917b0}, intrahash = {55fca5af1fe9313324d9ee570e57fbe2}, publisher = {Springer Verlag}, title = {{Socio-technical Design of Ubiquitous Computing Systems}}, year = 2014 } @inproceedings{SIAS:14a, address = {New York, NY, USA}, author = {Scholz, Christoph and Illig, Jens and Atzmueller, Martin and Stumme, Gerd}, booktitle = {Proc. 25th ACM Conference on Hypertext and Social Media}, interhash = {0d109dea7c2d5bab0fdd68d212fb88cd}, intrahash = {9eae843cffe35355caf37658c8c391c5}, optpages = {245-254}, publisher = {ACM Press}, title = {{On the Predictability of Talk Attendance at Academic Conferences}}, year = 2014 } @incollection{noKey, abstract = {The application of ubiquitous and social computational systems shows a rapidly increasing trend in our everyday environments: Enhancing social interactions and communication in both online and real-world settings is an important issue in a broad range of application contexts. This chapter describes the development of ubiquitous and social software for enhancing social networking. The Connect-U demonstrator features a class of such applications. In particular, it comprises the Conferator and MyGroup applications for enabling smarter social interactions in the context of conferences and working groups. We describe the applied socio-technical design process, and discuss experiences and lessons learned.}, author = {Atzmueller, Martin and Behrenbruch, Kay and Hoffmann, Axel and Kibanov, Mark and Macek, Bjoern-Elmar and Scholz, Christoph and Skistims, Hendrik and Söllner, Matthias and Stumme, Gerd}, booktitle = {Socio-technical Design of Ubiquitous Computing Systems}, doi = {10.1007/978-3-319-05044-7_15}, editor = {David, Klaus and Geihs, Kurt and Leimeister, Jan Marco and Roßnagel, Alexander and Schmidt, Ludger and Stumme, Gerd and Wacker, Arno}, interhash = {324a07604f0e107ca3f147a4a12a171a}, intrahash = {9708321a82ff6f1b2dd9e5509399f169}, isbn = {978-3-319-05043-0}, language = {English}, pages = {261-275}, publisher = {Springer International Publishing}, title = {Connect-U: A System for Enhancing Social Networking}, url = {http://dx.doi.org/10.1007/978-3-319-05044-7_15}, year = 2014 } @incollection{scholz2014mining, abstract = {Exploiting social links is an important issue for enhancing ubiquitous knowledge engineering because they are a substitute for a wide range of properties depending on which relation spans the link: in case of human face-to-face contacts, similar locations or potential knowledge transfer for the people in contact can be derived. This information can be used to improve the quality of ubiquitous services as localization or recommendation systems. We capture this information by deploying active RFID setups at a variety of contexts. In this chapter, we focus especially on working groups and conferences and discuss and evaluate the achieved improvements using the gathered data.}, author = {Scholz, Christoph and Macek, Bjoern-Elmar and Atzmueller, Martin and Doerfel, Stephan and Stumme, Gerd}, booktitle = {Socio-technical Design of Ubiquitous Computing Systems}, doi = {10.1007/978-3-319-05044-7_7}, editor = {David, Klaus and Geihs, Kurt and Leimeister, Jan Marco and Roßnagel, Alexander and Schmidt, Ludger and Stumme, Gerd and Wacker, Arno}, interhash = {530ce0d71bc54eb7faea4fad8f4f8a4d}, intrahash = {9f18259717ccfc3c46a062950112f4d2}, isbn = {978-3-319-05043-0}, language = {English}, pages = {109-129}, publisher = {Springer International Publishing}, title = {Mining Social Links for Ubiquitous Knowledge Engineering}, url = {http://dx.doi.org/10.1007/978-3-319-05044-7_7}, year = 2014 } @article{DBLP:journals/corr/SAS_Arxiv14, author = {Scholz, Christoph and Atzmueller, Martin and Stumme, Gerd}, ee = {http://arxiv.org/abs/1407.2161}, interhash = {3d6fc1f4eadda2f95eb84d455e17167e}, intrahash = {9c8ecf3df858805b00a204d7d7d40bea}, journal = {CoRR}, title = {Link Prediction and the Role of Stronger Ties in Networks of Face-to-Face Proximity}, volume = {abs/1407.2161}, year = 2014 } @article{DBLP:journals/corr/SIAS_Arxiv14, author = {Scholz, Christoph and Illig, Jens and Atzmueller, Martin and Stumme, Gerd}, bibsource = {DBLP, http://dblp.uni-trier.de}, ee = {http://arxiv.org/abs/1407.0613}, interhash = {0d109dea7c2d5bab0fdd68d212fb88cd}, intrahash = {5e567bcf1520069b2754d3ecf196ad2b}, journal = {CoRR}, title = {On the Predictability of Talk Attendance at Academic Conferences}, volume = {abs/1407.0613}, year = 2014 } @inproceedings{scholz2014predictability, address = {Santiago, Chile, September 1-4}, author = {Scholz, Christoph and Illig, Jens and Atzmueller, Martin and Stumme, Gerd}, booktitle = {25th ACM Conference on Hypertext and Social Media (to appear)}, interhash = {0d109dea7c2d5bab0fdd68d212fb88cd}, intrahash = {221c41039256e475ad43d1d9721ae01e}, publisher = {ACM}, title = {On the Predictability of Talk Attendance at Academic Conferences}, year = 2014 } @inproceedings{SAS:14a, author = {Scholz, Christoph and Atzmueller, Martin and Stumme, Gerd}, booktitle = {Proc. WWW 2014 (Companion)}, interhash = {0882363a1ebda6d57279735a4da12376}, intrahash = {1f1a67f541c62a959180223c539c27a2}, optaddress = {New York, NY, USA}, organization = {IW3C2 / ACM}, title = {{On the Predictability of Recurring Links in Networks of Face-to-Face Proximity}}, year = 2014 } @inproceedings{AEKSS:14, author = {Atzmueller, Martin and Ernst, Andreas and Krebs, Friedrich and Scholz, Christoph and Stumme, Gerd}, booktitle = {Proc. WWW 2014 (Companion)}, interhash = {8c281719ae6ad614bf278357c564d6f3}, intrahash = {14cca4bdf6b887bbf5ca48bb510435db}, optaddress = {New York, NY, USA}, organization = {IW3C2 / ACM}, title = {{On the Evolution of Social Groups During Coffee Breaks}}, year = 2014 } @article{ABKSDHMMMS:14, author = {Atzmueller, Martin and Becker, Martin and Kibanov, Mark and Scholz, Christoph and Doerfel, Stephan and Hotho, Andreas and Macek, Bjoern-Elmar and Mitzlaff, Folke and Mueller, Juergen and Stumme, Gerd}, doi = {10.1080/13614568.2013.873488}, interhash = {6364e034fa868644b30618dc887c0270}, intrahash = {176e4f2816af5fe1630ed65e062900ce}, journal = {New Review of Hypermedia and Multimedia}, number = 1, pages = {53--77}, title = {{Ubicon and its Applications for Ubiquitous Social Computing}}, volume = 20, year = 2014 } @article{KASS:14, author = {Kibanov, Mark and Atzmueller, Martin and Scholz, Christoph and Stumme, Gerd}, interhash = {3952a54e9f3c299feab739ed13bd4e7c}, intrahash = {ea0f450249503499c0c553a2d51505cb}, journal = {Science China}, month = {March}, title = {{Temporal Evolution of Contacts and Communities in Networks of Face-to-Face Human Interactions}}, volume = 57, year = 2014 } @inproceedings{DBLP:conf/ismis/SAS14, author = {Scholz, Christoph and Atzmueller, Martin and Stumme, Gerd}, bibsource = {DBLP, http://dblp.uni-trier.de}, booktitle = {ISMIS}, interhash = {51475ecd758cf5d4a6d7317981420af3}, intrahash = {d52a7bee8a41aa633ab63e419b042e31}, title = {Unsupervised and Hybrid Approaches for On-Line RFID Localization with Mixed Context Knowledge}, year = 2014 } @article{atzmueller2014ubicon, abstract = {The combination of ubiquitous and social computing is an emerging research area which integrates different but complementary methods, techniques and tools. In this paper, we focus on the Ubicon platform, its applications, and a large spectrum of analysis results. Ubicon provides an extensible framework for building and hosting applications targeting both ubiquitous and social environments. We summarize the architecture and exemplify its implementation using four real-world applications built on top of Ubicon. In addition, we discuss several scientific experiments in the context of these applications in order to give a better picture of the potential of the framework, and discuss analysis results using several real-world data sets collected utilizing Ubicon.}, author = {Atzmueller, Martin and Becker, Martin and Kibanov, Mark and Scholz, Christoph and Doerfel, Stephan and Hotho, Andreas and Macek, Bjoern-Elmar and Mitzlaff, Folke and Mueller, Juergen and Stumme, Gerd}, doi = {10.1080/13614568.2013.873488}, eprint = {http://www.tandfonline.com/doi/pdf/10.1080/13614568.2013.873488}, interhash = {6364e034fa868644b30618dc887c0270}, intrahash = {5d1ed63c337f8473d2b5b3b6c02a5f20}, journal = {New Review of Hypermedia and Multimedia}, number = 1, pages = {53-77}, title = {Ubicon and its applications for ubiquitous social computing}, url = {http://www.tandfonline.com/doi/abs/10.1080/13614568.2013.873488}, volume = 20, year = 2014 }