Collective defense of honeybee colonies: experimental results and
theoretical modeling
- URL: http://arxiv.org/abs/2010.07326v1
- Date: Wed, 14 Oct 2020 18:00:50 GMT
- Title: Collective defense of honeybee colonies: experimental results and
theoretical modeling
- Authors: Andrea L\'opez-Incera, Morgane Nouvian, Katja Ried, Thomas M\"uller
and Hans J. Briegel
- Abstract summary: Social insect colonies routinely face large vertebrate predators, against which they need to mount a collective defense.
Here, we investigate how individual bees react to different alarm pheromone concentrations, and how this evolved response-pattern leads to better coordination at the group level.
We are able to reproduce the experimentally measured response-pattern of real bees, and to identify the main selection pressures that shaped it.
- Score: 2.519906683279153
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Social insect colonies routinely face large vertebrate predators, against
which they need to mount a collective defense. To do so, honeybees use an alarm
pheromone that recruits nearby bees into mass stinging of the perceived threat.
This alarm pheromone is carried directly on the stinger, hence its
concentration builds up during the course of the attack. Here, we investigate
how individual bees react to different alarm pheromone concentrations, and how
this evolved response-pattern leads to better coordination at the group level.
We first present an individual dose-response curve to the alarm pheromone,
obtained experimentally. Second, we apply Projective Simulation to model each
bee as an artificial learning agent that relies on the pheromone concentration
to decide whether to sting or not. If the emergent collective performance
benefits the colony, the individual reactions that led to it are enhanced via
reinforcement learning, thus emulating natural selection. Predators are modeled
in a realistic way so that the effect of factors such as their resistance,
their killing rate or their frequency of attacks can be studied. We are able to
reproduce the experimentally measured response-pattern of real bees, and to
identify the main selection pressures that shaped it. Finally, we apply the
model to a case study: by tuning the parameters to represent the environmental
conditions of European or African bees, we can predict the difference in
aggressiveness observed between these two subspecies.
Related papers
- Deferred Poisoning: Making the Model More Vulnerable via Hessian Singularization [39.37308843208039]
We introduce a more threatening type of poisoning attack called the Deferred Poisoning Attack.
This new attack allows the model to function normally during the training and validation phases but makes it very sensitive to evasion attacks or even natural noise.
We have conducted both theoretical and empirical analyses of the proposed method and validated its effectiveness through experiments on image classification tasks.
arXiv Detail & Related papers (2024-11-06T08:27:49Z) - Artificial Immune System of Secure Face Recognition Against Adversarial Attacks [67.31542713498627]
optimisation is required for insect production to realise its full potential.
This can be by targeted improvement of traits of interest through selective breeding.
This review combines knowledge from diverse disciplines, bridging the gap between animal breeding, quantitative genetics, evolutionary biology, and entomology.
arXiv Detail & Related papers (2024-06-26T07:50:58Z) - Smoke and Mirrors in Causal Downstream Tasks [59.90654397037007]
This paper looks at the causal inference task of treatment effect estimation, where the outcome of interest is recorded in high-dimensional observations.
We compare 6 480 models fine-tuned from state-of-the-art visual backbones, and find that the sampling and modeling choices significantly affect the accuracy of the causal estimate.
Our results suggest that future benchmarks should carefully consider real downstream scientific questions, especially causal ones.
arXiv Detail & Related papers (2024-05-27T13:26:34Z) - Comparing fine-grained and coarse-grained object detection for ecology [0.5755004576310334]
We investigated how model results were affected by combining multiple species in single classes.
We found that species that benefited the most from merging into a single class were mainly species that look alike morphologically.
We suggest that practitioners could classify morphologically similar species together as a functional group or higher taxonomic group to draw ecological inferences.
arXiv Detail & Related papers (2024-05-06T04:50:55Z) - Predator-prey survival pressure is sufficient to evolve swarming
behaviors [22.69193229479221]
We propose a minimal predator-prey coevolution framework based on mixed cooperative-competitive multiagent reinforcement learning.
Surprisingly, our analysis of this approach reveals an unexpectedly rich diversity of emergent behaviors for both prey and predators.
arXiv Detail & Related papers (2023-08-24T08:03:11Z) - Diffusion Theory as a Scalpel: Detecting and Purifying Poisonous
Dimensions in Pre-trained Language Models Caused by Backdoor or Bias [64.81358555107788]
Pre-trained Language Models (PLMs) may be poisonous with backdoors or bias injected by the suspicious attacker during the fine-tuning process.
We propose the Fine-purifying approach, which utilizes the diffusion theory to study the dynamic process of fine-tuning for finding potentially poisonous dimensions.
To the best of our knowledge, we are the first to study the dynamics guided by the diffusion theory for safety or defense purposes.
arXiv Detail & Related papers (2023-05-08T08:40:30Z) - Indiscriminate Poisoning Attacks Are Shortcuts [77.38947817228656]
We find that the perturbations of advanced poisoning attacks are almost textbflinear separable when assigned with the target labels of the corresponding samples.
We show that such synthetic perturbations are as powerful as the deliberately crafted attacks.
Our finding suggests that the emphshortcut learning problem is more serious than previously believed.
arXiv Detail & Related papers (2021-11-01T12:44:26Z) - Semi-Supervised Audio Representation Learning for Modeling Beehive
Strengths [2.2680266599208765]
Honey bees are critical to our ecosystem and food security as a pollinator, contributing 35% of our global yield.
In spite of their importance, beekeeping is exclusively dependent on human labor and experience-derived bees.
We develop an integrated hardware sensing system for beehive monitoring through audio and environment measurements.
We show that this model performs well despite limited labels, and can learn an audio embedding that is useful for characterizing different sound profiles of beehives.
arXiv Detail & Related papers (2021-05-21T18:59:29Z) - Learning to Attack: Towards Textual Adversarial Attacking in Real-world
Situations [81.82518920087175]
Adversarial attacking aims to fool deep neural networks with adversarial examples.
We propose a reinforcement learning based attack model, which can learn from attack history and launch attacks more efficiently.
arXiv Detail & Related papers (2020-09-19T09:12:24Z) - Sampling Attacks: Amplification of Membership Inference Attacks by
Repeated Queries [74.59376038272661]
We introduce sampling attack, a novel membership inference technique that unlike other standard membership adversaries is able to work under severe restriction of no access to scores of the victim model.
We show that a victim model that only publishes the labels is still susceptible to sampling attacks and the adversary can recover up to 100% of its performance.
For defense, we choose differential privacy in the form of gradient perturbation during the training of the victim model as well as output perturbation at prediction time.
arXiv Detail & Related papers (2020-09-01T12:54:54Z) - Anomaly Detection in Beehives using Deep Recurrent Autoencoders [3.449808359602251]
We present an autoencoder, a deep learning model, which detects any type of anomaly in data independent of its origin.
Our model is able to reveal the same swarms as a simple rule-based swarm detection algorithm but is also triggered by any other anomaly.
arXiv Detail & Related papers (2020-03-10T08:39:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.