Skip to main content

Showing 1–22 of 22 results for author: Iyengar, A

  1. arXiv:2403.00935  [pdf, other

    cs.CR cs.LG

    Transfer Learning for Security: Challenges and Future Directions

    Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino

    Abstract: Many machine learning and data mining algorithms rely on the assumption that the training and testing data share the same feature space and distribution. However, this assumption may not always hold. For instance, there are situations where we need to classify data in one domain, but we only have sufficient training data available from a different domain. The latter data may follow a distinct dist… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  2. arXiv:2308.05221  [pdf, other

    cs.HC cs.AI cs.RO

    Alexa, play with robot: Introducing the First Alexa Prize SimBot Challenge on Embodied AI

    Authors: Hangjie Shi, Leslie Ball, Govind Thattai, Desheng Zhang, Lucy Hu, Qiaozi Gao, Suhaila Shakiah, Xiaofeng Gao, Aishwarya Padmakumar, Bofei Yang, Cadence Chung, Dinakar Guthy, Gaurav Sukhatme, Karthika Arumugam, Matthew Wen, Osman Ipek, Patrick Lange, Rohan Khanna, Shreyas Pansare, Vasu Sharma, Chao Zhang, Cris Flagg, Daniel Pressel, Lavina Vaz, Luke Dai , et al. (17 additional authors not shown)

    Abstract: The Alexa Prize program has empowered numerous university students to explore, experiment, and showcase their talents in building conversational agents through challenges like the SocialBot Grand Challenge and the TaskBot Challenge. As conversational agents increasingly appear in multimodal and embodied contexts, it is important to explore the affordances of conversational interaction augmented wi… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  3. arXiv:2306.03972  [pdf

    cs.ET cs.AR

    A Reference-less Slope Detection Technique in 65nm for Robust Sensing of 1T1R Arrays

    Authors: Seyedhamidreza Motaman, Swaroop Ghosh, Jae-Won Jang, Anirudh Iyengar, Rekha Govindaraj, Zakir Khondker

    Abstract: Spin-Torque-Transfer RAM (STTRAM) is a promising technology however process variation poses serious challenge to sensing. To eliminate bit-to-bit process variation we propose a reference-less, destructive slope detection technique which exploits the MTJ switching from high to low state to detect memory state. A proof-of-concept fabricated test-chip using 96kb mimicked STTRAM bits in 65nm technolog… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  4. arXiv:2107.01154  [pdf, other

    cs.LG cs.CR

    Gradient-Leakage Resilient Federated Learning

    Authors: Wenqi Wei, Ling Liu, Yanzhao Wu, Gong Su, Arun Iyengar

    Abstract: Federated learning(FL) is an emerging distributed learning paradigm with default client privacy because clients can keep sensitive data on their devices and only share local training parameter updates with the federated server. However, recent studies reveal that gradient leakages in FL may compromise the privacy of client training data. This paper presents a gradient leakage resilient approach to… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

  5. arXiv:2104.12197  [pdf, other

    cs.DC

    RDMAbox : Optimizing RDMA for Memory Intensive Workloads

    Authors: Juhyun Bae, Ling Liu, Yanzhao Wu, Gong Su, Arun Iyengar

    Abstract: We present RDMAbox, a set of low level RDMA optimizations that provide better performance than previous approaches. The optimizations are packaged in easy-to-use kernel and user space libraries for applications and systems in data center. We demonstrate the flexibility and effectiveness of RDMAbox by implementing a kernel remote paging system and a user space file system using RDMAbox. RDMAbox emp… ▽ More

    Submitted 13 August, 2021; v1 submitted 25 April, 2021; originally announced April 2021.

    Comments: 10 pages, 12 figures

  6. arXiv:2011.08982  [pdf, other

    eess.SP cs.LG

    Patient-Specific Seizure Prediction Using Single Seizure Electroencephalography Recording

    Authors: Zaid Bin Tariq, Arun Iyengar, Lara Marcuse, Hui Su, Bülent Yener

    Abstract: Electroencephalogram (EEG) is a prominent way to measure the brain activity for studying epilepsy, thereby helping in predicting seizures. Seizure prediction is an active research area with many deep learning based approaches dominating the recent literature for solving this problem. But these models require a considerable number of patient-specific seizures to be recorded for extracting the preic… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

    Comments: 8 pages

  7. arXiv:2008.00902  [pdf, other

    cs.DC

    Efficient Orchestration of Host and Remote Shared Memory for Memory Intensive Workloads

    Authors: Juhyun Bae, Gong Su, Arun Iyengar, Yanzhao Wu, Ling Liu

    Abstract: Since very few contributions to the development of an unified memory orchestration framework for efficient management of both host and remote idle memory have been made, we present Valet, an efficient approach to orchestration of host and remote shared memory for improving performance of memory intensive workloads. The paper makes three original contributions. First, we redesign the data flow in t… ▽ More

    Submitted 28 August, 2020; v1 submitted 3 August, 2020; originally announced August 2020.

    Comments: 13 pages, 23 figures, 8 tables, MemSys '20: The International Symposium on Memory Systems, Sept 2020, Washington, DC

  8. arXiv:2006.16529  [pdf, other

    cs.DB cs.DC

    Lachesis: Automatic Partitioning for UDF-Centric Analytics

    Authors: Jia Zou, Amitabh Das, Pratik Barhate, Arun Iyengar, Binhang Yuan, Dimitrije Jankov, Chris Jermaine

    Abstract: Persistent partitioning is effective in avoiding expensive shuffling operations. However it remains a significant challenge to automate this process for Big Data analytics workloads that extensively use user defined functions (UDFs), where sub-computations are hard to be reused for partitionings compared to relational applications. In addition, functional dependency that is widely utilized for par… ▽ More

    Submitted 22 February, 2021; v1 submitted 30 June, 2020; originally announced June 2020.

    Comments: In submission

  9. arXiv:1911.09356  [pdf, other

    cs.DB cs.AI cs.IR

    Schemaless Queries over Document Tables with Dependencies

    Authors: Mustafa Canim, Cristina Cornelio, Arun Iyengar, Ryan Musa, Mariano Rodrigez Muro

    Abstract: Unstructured enterprise data such as reports, manuals and guidelines often contain tables. The traditional way of integrating data from these tables is through a two-step process of table detection/extraction and mapping the table layouts to an appropriate schema. This can be an expensive process. In this paper we show that by using semantic technologies (RDF/SPARQL and database dependencies) pair… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

  10. arXiv:1908.06477  [pdf, other

    cs.LG stat.ML

    Demystifying Learning Rate Policies for High Accuracy Training of Deep Neural Networks

    Authors: Yanzhao Wu, Ling Liu, Juhyun Bae, Ka-Ho Chow, Arun Iyengar, Calton Pu, Wenqi Wei, Lei Yu, Qi Zhang

    Abstract: Learning Rate (LR) is an important hyper-parameter to tune for effective training of deep neural networks (DNNs). Even for the baseline of a constant learning rate, it is non-trivial to choose a good constant value for training a DNN. Dynamic learning rates involve multi-step tuning of LR values at various stages of the training process and offer high accuracy and fast convergence. However, they a… ▽ More

    Submitted 26 October, 2019; v1 submitted 18 August, 2019; originally announced August 2019.

    Comments: To appear on IEEE Big Data 2019. LRBench (https://github.com/git-disl/LRBench)

  11. arXiv:1907.03710  [pdf, other

    cs.CR

    StackVault: Protection from Untrusted Functions

    Authors: Qi Zhang, Zehra Sura, Ashish Kundu, Gong Su, Arun Iyengar, Ling Liu

    Abstract: Data exfiltration attacks have led to huge data breaches. Recently, the Equifax attack affected 147M users and a third-party library - Apache Struts - was alleged to be responsible for it. These attacks often exploit the fact that sensitive data are stored unencrypted in process memory and can be accessed by any function executing within the same process, including untrusted third-party library fu… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

    Comments: 11 pages

  12. arXiv:1808.06094  [pdf, other

    cs.DC

    Pangea: Monolithic Distributed Storage for Data Analytics

    Authors: Jia Zou, Arun Iyengar, Chris Jermaine

    Abstract: Storage and memory systems for modern data analytics are heavily layered, managing shared persistent data, cached data, and non-shared execution data in separate systems such as distributed file system like HDFS, in-memory file system like Alluxio and computation framework like Spark. Such layering introduces significant performance and management costs for copying data across layers redundantly a… ▽ More

    Submitted 16 December, 2018; v1 submitted 18 August, 2018; originally announced August 2018.

    Comments: 14 pages

  13. arXiv:1512.01581  [pdf

    cs.CR cs.AR

    Threshold Voltage-Defined Switches for Programmable Gates

    Authors: Anirudh Iyengar, Swaroop Ghosh

    Abstract: Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE), piracy of Intellectual Property (IP) or Integrated Circuit (IC) and side-channel analysis due to involvement of untrusted parties. In this paper, we propose transistor threshold voltage-defined switches to camouflage the logic gate b… ▽ More

    Submitted 4 December, 2015; originally announced December 2015.

  14. arXiv:1412.8090  [pdf, ps, other

    cs.IT

    Analysis of Saturated Belief Propagation Decoding of Low-Density Parity-Check Codes

    Authors: Shrinivas Kudekar, Tom Richardson, Aravind Iyengar

    Abstract: We consider the effect of log-likelihood ratio saturation on belief propagation decoder low-density parity-check codes. Saturation is commonly done in practice and is known to have a significant effect on error floor performance. Our focus is on threshold analysis and stability of density evolution. We analyze the decoder for standard low-density parity-check code ensembles and show that belief… ▽ More

    Submitted 27 December, 2014; originally announced December 2014.

    Comments: Submitted to IEEE Transactionson Information Theory

  15. arXiv:1405.6353  [pdf, ps, other

    cs.IT stat.ML

    A Novel Stochastic Decoding of LDPC Codes with Quantitative Guarantees

    Authors: Nima Noorshams, Aravind Iyengar

    Abstract: Low-density parity-check codes, a class of capacity-approaching linear codes, are particularly recognized for their efficient decoding scheme. The decoding scheme, known as the sum-product, is an iterative algorithm consisting of passing messages between variable and check nodes of the factor graph. The sum-product algorithm is fully parallelizable, owing to the fact that all messages can be updat… ▽ More

    Submitted 24 May, 2014; originally announced May 2014.

    Comments: This paper has been submitted to IEEE Transactions on Information Theory on May 24th 2014

  16. arXiv:1403.3678  [pdf, ps, other

    cs.IT

    The Effect of Saturation on Belief Propagation Decoding of LDPC Codes

    Authors: Shrinivas Kudekar, Tom Richardson, Aravind Iyengar

    Abstract: We consider the effect of LLR saturation on belief propagation decoding of low-density parity-check codes. Saturation occurs universally in practice and is known to have a significant effect on error floor performance. Our focus is on threshold analysis and stability of density evolution. We analyze the decoder for certain low-density parity-check code ensembles and show that belief propagation… ▽ More

    Submitted 14 March, 2014; originally announced March 2014.

    Comments: Submitted to ISIT. Longer version to be submitted to IT Transactions in preparation

  17. On the Capacity of Channels with Timing Synchronization Errors

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We consider a new formulation of a class of synchronization error channels and derive analytical bounds and numerical estimates for the capacity of these channels. For the binary channel with only deletions, we obtain an expression for the symmetric information rate in terms of subsequence weights which reduces to a tight lower bound for small deletion probabilities. We are also able to exactly ch… ▽ More

    Submitted 2 October, 2015; v1 submitted 12 February, 2013; originally announced February 2013.

    Comments: 23 pages, 5 figures, submitted to the IEEE Transactions on Information Theory, Feb 2013. Summary of some results presented at ISIT 2011 (http://arxiv.org/abs/1106.0070) Revised Feb 2015

  18. Enhancing Binary Images of Non-Binary LDPC Codes

    Authors: Aman Bhatia, Aravind R. Iyengar, Paul H. Siegel

    Abstract: We investigate the reasons behind the superior performance of belief propagation decoding of non-binary LDPC codes over their binary images when the transmission occurs over the binary erasure channel. We show that although decoding over the binary image has lower complexity, it has worse performance owing to its larger number of stopping sets relative to the original non-binary code. We propose a… ▽ More

    Submitted 27 October, 2011; originally announced October 2011.

    Comments: 6 pages, 2 figures, to be presented at IEEE GLOBECOM 2011

  19. arXiv:1106.0075  [pdf, other

    cs.IT

    Windowed Decoding of Spatially Coupled Codes

    Authors: Aravind R. Iyengar, Paul H. Siegel, Rudiger L. Urbanke, Jack K. Wolf

    Abstract: Spatially coupled codes have been of interest recently owing to their superior performance over memoryless binary-input channels. The performance is good both asymptotically, since the belief propagation thresholds approach capacity, as well as for finite lengths, since degree-2 variables that result in high error floors can be completely avoided. However, to realize the promised good performance,… ▽ More

    Submitted 30 November, 2012; v1 submitted 31 May, 2011; originally announced June 2011.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory, November 2012. Summary presented at ISIT 2011 <http://arxiv.org/abs/1106.0075v1>

  20. arXiv:1106.0070  [pdf, other

    cs.IT

    Modeling and Information Rates for Synchronization Error Channels

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new channel model for channels with synchronization errors. Using this model, we give simple, non-trivial and, in some cases, tight lower bounds on the capacity for certain synchronization error channels.

    Submitted 31 May, 2011; originally announced June 2011.

    Comments: 5 pages, 1 figure, to be presented at ISIT 2011

  21. Write Channel Model for Bit-Patterned Media Recording

    Authors: Aravind R. Iyengar, Paul H. Siegel, Jack K. Wolf

    Abstract: We propose a new write channel model for bit-patterned media recording that reflects the data dependence of write synchronization errors. It is shown that this model accommodates both substitution-like errors and insertion-deletion errors whose statistics are determined by an underlying channel state process. We study information theoretic properties of the write channel model, including the capac… ▽ More

    Submitted 21 October, 2010; originally announced October 2010.

    Comments: 11 pages, 12 figures, journal

  22. Windowed Decoding of Protograph-based LDPC Convolutional Codes over Erasure Channels

    Authors: Aravind Iyengar, Marco Papaleo, Paul Siegel, Jack Wolf, Alessandro Vanelli-Coralli, Giovanni Corazza

    Abstract: We consider a windowed decoding scheme for LDPC convolutional codes that is based on the belief-propagation (BP) algorithm. We discuss the advantages of this decoding scheme and identify certain characteristics of LDPC convolutional code ensembles that exhibit good performance with the windowed decoder. We will consider the performance of these ensembles and codes over erasure channels with and wi… ▽ More

    Submitted 22 October, 2011; v1 submitted 21 October, 2010; originally announced October 2010.

    Comments: 18 pages, 9 figures, accepted for publication in the IEEE Transactions on Information Theory