Skip to main content

Showing 1–27 of 27 results for author: Gautam, A

  1. arXiv:2406.03245  [pdf, other

    cs.HC cs.AI cs.SI

    Reconfiguring Participatory Design to Resist AI Realism

    Authors: Aakash Gautam

    Abstract: The growing trend of artificial intelligence (AI) as a solution to social and technical problems reinforces AI Realism -- the belief that AI is an inevitable and natural order. In response, this paper argues that participatory design (PD), with its focus on democratic values and processes, can play a role in questioning and resisting AI Realism. I examine three concerning aspects of AI Realism: th… ▽ More

    Submitted 8 June, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

    Comments: 6 pages, 1 table

    Journal ref: Participatory Design Conference 2024

  2. Enhancing Reentry Support Programs Through Digital Literacy Integration

    Authors: Aakash Gautam, Khushboo Gandhi, Jessica Eileen Sendejo

    Abstract: Challenges faced by formerly incarcerated individuals in the United States raise questions about our society's ability to truly provide second chances. This paper presents the outcomes of our ongoing collaboration with a non-profit organization dedicated to reentry support. We highlight the multifaceted challenges individuals face during their reentry journey, including support programs that prior… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 15 pages, 1 table, 3 figures

    Journal ref: Designing Interactive Systems Conference 2024

  3. arXiv:2404.07775  [pdf, other

    cs.CL cs.AI cs.LG

    Discourse-Aware In-Context Learning for Temporal Expression Normalization

    Authors: Akash Kumar Gautam, Lukas Lange, Jannik Strötgen

    Abstract: Temporal expression (TE) normalization is a well-studied problem. However, the predominately used rule-based systems are highly restricted to specific settings, and upcoming machine learning approaches suffer from a lack of labeled data. In this work, we explore the feasibility of proprietary and open-source large language models (LLMs) for TE normalization using in-context learning to inject task… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: Accepted at NAACL 2024

  4. arXiv:2403.08773  [pdf, other

    cs.CV cs.AI cs.CL cs.MM

    Veagle: Advancements in Multimodal Representation Learning

    Authors: Rajat Chawla, Arkajit Datta, Tushar Verma, Adarsh Jha, Anmol Gautam, Ayush Vatsal, Sukrit Chaterjee, Mukunda NS, Ishaan Bhola

    Abstract: Lately, researchers in artificial intelligence have been really interested in how language and vision come together, giving rise to the development of multimodal models that aim to seamlessly integrate textual and visual information. Multimodal models, an extension of Large Language Models (LLMs), have exhibited remarkable capabilities in addressing a diverse array of tasks, ranging from image cap… ▽ More

    Submitted 18 January, 2024; originally announced March 2024.

  5. arXiv:2402.07173  [pdf, other

    cs.CV

    INSITE: labelling medical images using submodular functions and semi-supervised data programming

    Authors: Akshat Gautam, Anurag Shandilya, Akshit Srivastava, Venkatapathy Subramanian, Ganesh Ramakrishnan, Kshitij Jadhav

    Abstract: The necessity of large amounts of labeled data to train deep models, especially in medical imaging creates an implementation bottleneck in resource-constrained settings. In Insite (labelINg medical imageS usIng submodular funcTions and sEmi-supervised data programming) we apply informed subset selection to identify a small number of most representative or diverse images from a huge pool of unlabel… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

  6. arXiv:2402.06159  [pdf, other

    cs.CR

    Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers

    Authors: Anuj Gautam, Tarun Kumar Yadav, Kent Seamons, Scott Ruoti

    Abstract: Password-based authentication faces various security and usability issues. Password managers help alleviate some of these issues by enabling users to manage their passwords effectively. However, malicious client-side scripts and browser extensions can steal passwords after they have been autofilled by the manager into the web page. In this paper, we explore what role the password manager can take… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  7. arXiv:2402.03255  [pdf, other

    cs.SI cs.CY cs.HC

    Security Advice for Parents and Children About Content Filtering and Circumvention as Found on YouTube and TikTok

    Authors: Ran Elgedawy, John Sadik, Anuj Gautam, Trinity Bissahoyo, Christopher Childress, Jacob Leonard, Clay Shubert, Scott Ruoti

    Abstract: In today's digital age, concerns about online security and privacy have become paramount. However, addressing these issues can be difficult, especially within the context of family relationships, wherein parents and children may have conflicting interests. In this environment, parents and children may turn to online security advice to determine how to proceed. In this paper, we examine the advice… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 15 pages, 5 figures, 8 tables

  8. arXiv:2402.00689  [pdf, other

    cs.CR cs.AI

    Ocassionally Secure: A Comparative Analysis of Code Generation Assistants

    Authors: Ran Elgedawy, John Sadik, Senjuti Dutta, Anuj Gautam, Konstantinos Georgiou, Farzin Gholamrezae, Fujiao Ji, Kyungchan Lim, Qian Liu, Scott Ruoti

    Abstract: $ $Large Language Models (LLMs) are being increasingly utilized in various applications, with code generations being a notable example. While previous research has shown that LLMs have the capability to generate both secure and insecure code, the literature does not take into account what factors help generate secure and effective code. Therefore in this paper we focus on identifying and understan… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 12 pages, 2 figures

  9. Socially Responsible Computing in an Introductory Course

    Authors: Aakash Gautam, Anagha Kulkarni, Sarah Hug, Jane Lehr, Ilmi Yoon

    Abstract: Given the potential for technology to inflict harm and injustice on society, it is imperative that we cultivate a sense of social responsibility among our students as they progress through the Computer Science (CS) curriculum. Our students need to be able to examine the social complexities in which technology development and use are situated. Also, aligning students' personal goals and their abili… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

    Journal ref: Proceedings of the 55th ACM Technical Symposium on Computer Science Education (SIGCSE 2024)

  10. arXiv:2311.14786  [pdf, other

    cs.CV cs.AI cs.RO

    GPT-4V Takes the Wheel: Promises and Challenges for Pedestrian Behavior Prediction

    Authors: Jia Huang, Peng Jiang, Alvika Gautam, Srikanth Saripalli

    Abstract: Predicting pedestrian behavior is the key to ensure safety and reliability of autonomous vehicles. While deep learning methods have been promising by learning from annotated video frame sequences, they often fail to fully grasp the dynamic interactions between pedestrians and traffic, crucial for accurate predictions. These models also lack nuanced common sense reasoning. Moreover, the manual anno… ▽ More

    Submitted 25 January, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

  11. arXiv:2310.10290  [pdf, other

    cs.RO cs.HC

    Autonomous Mapping and Navigation using Fiducial Markers and Pan-Tilt Camera for Assisting Indoor Mobility of Blind and Visually Impaired People

    Authors: Dharmateja Adapa, Virendra Singh Shekhawat, Avinash Gautam, Sudeept Mohan

    Abstract: Large indoor spaces have complex layouts making them difficult to navigate. Indoor spaces in hospitals, universities, shopping complexes, etc., carry multi-modal information in the form of text and symbols. Hence, it is difficult for Blind and Visually Impaired (BVI) people to independently navigate such spaces. Indoor environments are usually GPS-denied; therefore, Bluetooth-based, WiFi-based, or… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    ACM Class: I.3.5; H.5.2

  12. arXiv:2309.16057  [pdf, other

    cs.RO

    WiDEVIEW: An UltraWideBand and Vision Dataset for Deciphering Pedestrian-Vehicle Interactions

    Authors: Jia Huang, Alvika Gautam, Junghun Choi, Srikanth Saripalli

    Abstract: Robust and accurate tracking and localization of road users like pedestrians and cyclists is crucial to ensure safe and effective navigation of Autonomous Vehicles (AVs), particularly so in urban driving scenarios with complex vehicle-pedestrian interactions. Existing datasets that are useful to investigate vehicle-pedestrian interactions are mostly image-centric and thus vulnerable to vision fail… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  13. arXiv:2305.15441  [pdf, other

    q-bio.QM cs.LG

    Improving few-shot learning-based protein engineering with evolutionary sampling

    Authors: M. Zaki Jawaid, Robin W. Yeo, Aayushma Gautam, T. Blair Gainous, Daniel O. Hart, Timothy P. Daley

    Abstract: Designing novel functional proteins remains a slow and expensive process due to a variety of protein engineering challenges; in particular, the number of protein variants that can be experimentally tested in a given assay pales in comparison to the vastness of the overall sequence space, resulting in low hit rates and expensive wet lab testing cycles. In this paper, we propose a few-shot learning… ▽ More

    Submitted 25 May, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

  14. arXiv:2305.13051  [pdf, other

    cs.RO cs.CV

    Learning Pedestrian Actions to Ensure Safe Autonomous Driving

    Authors: Jia Huang, Alvika Gautam, Srikanth Saripalli

    Abstract: To ensure safe autonomous driving in urban environments with complex vehicle-pedestrian interactions, it is critical for Autonomous Vehicles (AVs) to have the ability to predict pedestrians' short-term and immediate actions in real-time. In recent years, various methods have been developed to study estimating pedestrian behaviors for autonomous driving scenarios, but there is a lack of clear defin… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 8 pages, 9 figures

  15. arXiv:2209.07861  [pdf, other

    cs.NI cs.IT cs.LG

    Machine Learning Decoder for 5G NR PUCCH Format 0

    Authors: Anil Kumar Yerrapragada, Jeeva Keshav S, Ankit Gautam, Radha Krishna Ganti

    Abstract: 5G cellular systems depend on the timely exchange of feedback control information between the user equipment and the base station. Proper decoding of this control information is necessary to set up and sustain high throughput radio links. This paper makes the first attempt at using Machine Learning techniques to improve the decoding performance of the Physical Uplink Control Channel Format 0. We u… ▽ More

    Submitted 26 August, 2022; originally announced September 2022.

    Comments: Submitted to NCC conference

  16. Empowering Participation Within Structures of Dependency

    Authors: Aakash Gautam, Deborah Tatar

    Abstract: Participatory Design (PD) seeks political change to support people's democratic control over processes, solutions, and, in general, matters of concern to them. A particular challenge remains in supporting vulnerable groups to gain power and control when they are dependent on organizations and external structures. We reflect on our five-year engagement with survivors of sex trafficking in Nepal and… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: 12 pages, 3 figures, 1 table. In Participatory Design Conference 2022: Volume 1 (pp. 75-86)

    Journal ref: In Participatory Design Conference 2022: Volume 1 (pp. 75-86) 2022

  17. The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android

    Authors: Sean Oesch, Anuj Gautam, Scott Ruoti

    Abstract: Password managers help users more effectively manage their passwords, encouraging them to adopt stronger passwords across their many accounts. In contrast to desktop systems where password managers receive no system-level support, mobile operating systems provide autofill frameworks designed to integrate with password managers to provide secure and usable autofill for browsers and other apps insta… ▽ More

    Submitted 28 September, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 12 pages, 3 pages appendix, published at ACSAC 2021

  18. arXiv:2101.11425  [pdf, other

    cs.CL

    Fake News Detection System using XLNet model with Topic Distributions: CONSTRAINT@AAAI2021 Shared Task

    Authors: Akansha Gautam, Venktesh V, Sarah Masud

    Abstract: With the ease of access to information, and its rapid dissemination over the internet (both velocity and volume), it has become challenging to filter out truthful information from fake ones. The research community is now faced with the task of automatic detection of fake news, which carries real-world socio-political impact. One such research contribution came in the form of the Constraint@AAA1202… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

    Comments: Accepted at CONSTRAINT@AAAI2021 Shared Task for the CONSTRAINT workshop, collocated with AAAI 2021

  19. arXiv:2008.06854  [pdf, other

    cs.CL cs.CY cs.MM

    SGG: Spinbot, Grammarly and GloVe based Fake News Detection

    Authors: Akansha Gautam, Koteswar Rao Jerripothula

    Abstract: Recently, news consumption using online news portals has increased exponentially due to several reasons, such as low cost and easy accessibility. However, such online platforms inadvertently also become the cause of spreading false information across the web. They are being misused quite frequently as a medium to disseminate misinformation and hoaxes. Such malpractices call for a robust automatic… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: 9 pages, 7 figures, Accepted by IEEE International Conference on Multimedia Big Data (BigMM), 2020

  20. arXiv:2005.03534  [pdf, other

    cs.HC cs.CY

    p for political: Participation Without Agency Is Not Enough

    Authors: Aakash Gautam, Deborah Tatar

    Abstract: Participatory Design's vision of democratic participation assumes participants' feelings of agency in envisioning a collective future. But this assumption may be leaky when dealing with vulnerable populations. We reflect on the results of a series of activities aimed at supporting agentic-future-envisionment with a group of sex-trafficking survivors in Nepal. We observed a growing sense among the… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 5 pages, 1 figure. Accepted in the 16th Participatory Design Conference (PDC'20)

    ACM Class: K.4

  21. Crafting, Communality, and Computing: Building on Existing Strengths To Support a Vulnerable Population

    Authors: Aakash Gautam, Deborah Tatar, Steve Harrison

    Abstract: In Nepal, sex-trafficking survivors and the organizations that support them have limited resources to assist the survivors in their on-going journey towards reintegration. We take an asset-based approach wherein we identify and build on the strengths possessed by such groups. In this work, we present reflections from introducing a voice-annotated web application to a group of survivors. The web ap… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 1 figure. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI'20)

    ACM Class: K.4

  22. arXiv:2004.07359  [pdf, other

    cs.CY cs.CR cs.HC

    Usable, Acceptable, Appropriable: Towards Practicable Privacy

    Authors: Aakash Gautam

    Abstract: A majority of the work on digital privacy and security has focused on users from developed countries who account for only around 20\% of the global population. Moreover, the privacy needs for population that is already marginalized and vulnerable differ from users who have privilege to access a greater social support system. We reflect on our experiences of introducing computers and the Internet t… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: 6 pages, position paper submitted to the CHI 2020 workshop on Networked Privacy

    ACM Class: H.0

  23. arXiv:2004.02168  [pdf, other

    cs.CV

    Comparative Analysis of Multiple Deep CNN Models for Waste Classification

    Authors: Dipesh Gyawali, Alok Regmi, Aatish Shakya, Ashish Gautam, Surendra Shrestha

    Abstract: Waste is a wealth in a wrong place. Our research focuses on analyzing possibilities for automatic waste sorting and collecting in such a way that helps it for further recycling process. Various approaches are being practiced managing waste but not efficient and require human intervention. The automatic waste segregation would fit in to fill the gap. The project tested well known Deep Learning Netw… ▽ More

    Submitted 14 August, 2020; v1 submitted 5 April, 2020; originally announced April 2020.

    Comments: 6 pages, 13 figures

    Journal ref: 5th International Conference on Advanced Engineering and ICT-Convergence 2020

  24. arXiv:2003.00826  [pdf

    cs.CV cs.LG stat.ML

    Realistic River Image Synthesis using Deep Generative Adversarial Networks

    Authors: Akshat Gautam, Muhammed Sit, Ibrahim Demir

    Abstract: In this paper, we demonstrated a practical application of realistic river image generation using deep learning. Specifically, we explored a generative adversarial network (GAN) model capable of generating high-resolution and realistic river images that can be used to support modeling and analysis in surface water estimation, river meandering, wetland loss, and other hydrological research studies.… ▽ More

    Submitted 27 July, 2021; v1 submitted 14 February, 2020; originally announced March 2020.

  25. arXiv:2001.09215  [pdf, other

    cs.CL cs.SI

    An Iterative Approach for Identifying Complaint Based Tweets in Social Media Platforms

    Authors: Gyanesh Anand, Akash Gautam, Puneet Mathur, Debanjan Mahata, Rajiv Ratn Shah, Ramit Sawhney

    Abstract: Twitter is a social media platform where users express opinions over a variety of issues. Posts offering grievances or complaints can be utilized by private/ public organizations to improve their service and promptly gauge a low-cost assessment. In this paper, we propose an iterative methodology which aims to identify complaint based posts pertaining to the transport domain. We perform comprehensi… ▽ More

    Submitted 17 June, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: Preprint of paper accepted at AAAI, student abstract 2020

  26. arXiv:1912.06927  [pdf, other

    cs.CL cs.SI

    #MeTooMA: Multi-Aspect Annotations of Tweets Related to the MeToo Movement

    Authors: Akash Gautam, Puneet Mathur, Rakesh Gosangi, Debanjan Mahata, Ramit Sawhney, Rajiv Ratn Shah

    Abstract: In this paper, we present a dataset containing 9,973 tweets related to the MeToo movement that were manually annotated for five different linguistic aspects: relevance, stance, hate speech, sarcasm, and dialogue acts. We present a detailed account of the data collection and annotation processes. The annotations have a very high inter-annotator agreement (0.79 to 0.93 k-alpha) due to the domain exp… ▽ More

    Submitted 20 April, 2020; v1 submitted 14 December, 2019; originally announced December 2019.

    Comments: Preprint of paper accepted at ICWSM 2020

  27. arXiv:1802.01787  [pdf, other

    cs.RO

    A Distributed Hybrid Hardware-In-the-Loop Simulation framework for Infrastructure Enabled Autonomy

    Authors: Abhishek Nayak, Kenny Chour, Tyler Marr, Deepika Ravipati, Sheelabhadra Dey, Alvika Gautam, Swaminathan Gopalswamy, Sivakumar Rathinam

    Abstract: Infrastructure Enabled Autonomy (IEA) is a new paradigm that employs a distributed intelligence architecture for connected autonomous vehicles by offloading core functionalities to the infrastructure. In this paper, we develop a simulation framework that can be used to study the concept. A key challenge for such a simulation is the rapid increase in the scale of the computations with the size of t… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

    Comments: Submitted to the IEEE IV 2018 conference