Skip to main content

Showing 1–12 of 12 results for author: Dass, S

  1. arXiv:2404.06243  [pdf, other

    cs.CV cs.AI cs.HC cs.LG cs.MM

    ActNetFormer: Transformer-ResNet Hybrid Method for Semi-Supervised Action Recognition in Videos

    Authors: Sharana Dharshikgan Suresh Dass, Hrishav Bakul Barua, Ganesh Krishnasamy, Raveendran Paramesran, Raphael C. -W. Phan

    Abstract: Human action or activity recognition in videos is a fundamental task in computer vision with applications in surveillance and monitoring, self-driving cars, sports analytics, human-robot interaction and many more. Traditional supervised methods require large annotated datasets for training, which are expensive and time-consuming to acquire. This work proposes a novel approach using Cross-Architect… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: Submitted for peer review

    MSC Class: Artificial intelligence; Computer vision; Machine learning; Deep learning; Human-computer Interaction ACM Class: I.2; I.2.9; I.2.10; I.3.3; I.4.5

  2. arXiv:2403.12945  [pdf, other

    cs.RO

    DROID: A Large-Scale In-The-Wild Robot Manipulation Dataset

    Authors: Alexander Khazatsky, Karl Pertsch, Suraj Nair, Ashwin Balakrishna, Sudeep Dasari, Siddharth Karamcheti, Soroush Nasiriany, Mohan Kumar Srirama, Lawrence Yunliang Chen, Kirsty Ellis, Peter David Fagan, Joey Hejna, Masha Itkina, Marion Lepert, Yecheng Jason Ma, Patrick Tree Miller, Jimmy Wu, Suneel Belkhale, Shivin Dass, Huy Ha, Arhan Jain, Abraham Lee, Youngwoon Lee, Marius Memmel, Sungjae Park , et al. (74 additional authors not shown)

    Abstract: The creation of large, diverse, high-quality robot manipulation datasets is an important stepping stone on the path toward more capable and robust robotic manipulation policies. However, creating such datasets is challenging: collecting robot manipulation data in diverse environments poses logistical and safety challenges and requires substantial investments in hardware and human labour. As a resu… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: Project website: https://droid-dataset.github.io/

  3. arXiv:2403.07869  [pdf, other

    cs.RO cs.AI cs.LG

    TeleMoMa: A Modular and Versatile Teleoperation System for Mobile Manipulation

    Authors: Shivin Dass, Wensi Ai, Yuqian Jiang, Samik Singh, Jiaheng Hu, Ruohan Zhang, Peter Stone, Ben Abbatematteo, Roberto Martín-Martín

    Abstract: A critical bottleneck limiting imitation learning in robotics is the lack of data. This problem is more severe in mobile manipulation, where collecting demonstrations is harder than in stationary manipulation due to the lack of available and easy-to-use teleoperation interfaces. In this work, we demonstrate TeleMoMa, a general and modular interface for whole-body teleoperation of mobile manipulato… ▽ More

    Submitted 21 March, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  4. arXiv:2310.17552  [pdf, other

    cs.RO cs.AI cs.LG

    Model-Based Runtime Monitoring with Interactive Imitation Learning

    Authors: Huihan Liu, Shivin Dass, Roberto Martín-Martín, Yuke Zhu

    Abstract: Robot learning methods have recently made great strides, but generalization and robustness challenges still hinder their widespread deployment. Failing to detect and address potential failures renders state-of-the-art learning systems not combat-ready for high-stakes tasks. Recent advances in interactive imitation learning have presented a promising framework for human-robot teaming, enabling the… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

  5. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (267 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 1 June, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  6. arXiv:2212.04708  [pdf, other

    cs.RO cs.AI cs.LG

    PATO: Policy Assisted TeleOperation for Scalable Robot Data Collection

    Authors: Shivin Dass, Karl Pertsch, Hejia Zhang, Youngwoon Lee, Joseph J. Lim, Stefanos Nikolaidis

    Abstract: Large-scale data is an essential component of machine learning as demonstrated in recent advances in natural language processing and computer vision research. However, collecting large-scale robotic data is much more expensive and slower as each operator can control only a single robot at a time. To make this costly data collection process efficient and scalable, we propose Policy Assisted TeleOpe… ▽ More

    Submitted 1 June, 2023; v1 submitted 9 December, 2022; originally announced December 2022.

    Comments: Robotics: Science and Systems (RSS) 2023. Website: https://clvrai.com/pato

  7. arXiv:2206.09011  [pdf, other

    cs.CR

    Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks

    Authors: Jacques Bou Abdo, Shuvalaxmi Dass, Basheer Qolomany, Liaquat Hossain

    Abstract: The world economy is experiencing the novel adoption of distributed currencies that are free from the control of central banks. Distributed currencies suffer from extreme volatility, and this can lead to catastrophic implications during future economic crisis. Understanding the dynamics of this new type of currencies is vital for empowering supervisory bodies from current reactive and manual incid… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

    Comments: 12 pages, 12 figures, 13 equations

    MSC Class: 94C15 ACM Class: G.2.2; C.2.1

  8. arXiv:2106.02012  [pdf, other

    cs.CR cs.AI

    Attack Prediction using Hidden Markov Model

    Authors: Shuvalaxmi Dass, Prerit Datta, Akbar Siami Namin

    Abstract: It is important to predict any adversarial attacks and their types to enable effective defense systems. Often it is hard to label such activities as malicious ones without adequate analytical reasoning. We propose the use of Hidden Markov Model (HMM) to predict the family of related attacks. Our proposed model is based on the observations often agglomerated in the form of log files and from the ta… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: 20 pages, 4 figures, COMPSAC'21

  9. arXiv:2006.08606  [pdf, other

    cs.SE

    Vulnerability Coverage as an Adequacy Testing Criterion

    Authors: Shuvalaxmi Dass, Akbar Siami Namin

    Abstract: Mainstream software applications and tools are the configurable platforms with an enormous number of parameters along with their values. Certain settings and possible interactions between these parameters may harden (or soften) the security and robustness of these applications against some known vulnerabilities. However, the large number of vulnerabilities reported and associated with these tools… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  10. arXiv:2006.08605  [pdf, other

    cs.SE cs.AI cs.LG

    Detection of Coincidentally Correct Test Cases through Random Forests

    Authors: Shuvalaxmi Dass, Xiaozhen Xue, Akbar Siami Namin

    Abstract: The performance of coverage-based fault localization greatly depends on the quality of test cases being executed. These test cases execute some lines of the given program and determine whether the underlying tests are passed or failed. In particular, some test cases may be well-behaved (i.e., passed) while executing faulty statements. These test cases, also known as coincidentally correct test cas… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  11. arXiv:2006.08604  [pdf, other

    cs.CR cs.SE

    Vulnerability Coverage for Secure Configuration

    Authors: Shuvalaxmi Dass, Akbar Siami Namin

    Abstract: We present a novel idea on adequacy testing called ``{vulnerability coverage}.'' The introduced coverage measure examines the underlying software for the presence of certain classes of vulnerabilities often found in the National Vulnerability Database (NVD) website. The thoroughness of the test input generation procedure is performed through the adaptation of evolutionary algorithms namely Genetic… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  12. arXiv:1612.01055  [pdf

    stat.ML cs.LG stat.AP

    Modeling trajectories of mental health: challenges and opportunities

    Authors: Lauren Erdman, Ekansh Sharma, Eva Unternahrer, Shantala Hari Dass, Kieran ODonnell, Sara Mostafavi, Rachel Edgar, Michael Kobor, Helene Gaudreau, Michael Meaney, Anna Goldenberg

    Abstract: More than two thirds of mental health problems have their onset during childhood or adolescence. Identifying children at risk for mental illness later in life and predicting the type of illness is not easy. We set out to develop a platform to define subtypes of childhood social-emotional development using longitudinal, multifactorial trait-based measures. Subtypes discovered through this study cou… ▽ More

    Submitted 3 December, 2016; originally announced December 2016.

    Comments: extended abstract for ML4HC at NIPS 2016, 4 pages