Skip to main content

Showing 1–19 of 19 results for author: Lal, R

  1. arXiv:2407.03549  [pdf, other

    cs.CV

    POSTURE: Pose Guided Unsupervised Domain Adaptation for Human Body Part Segmentation

    Authors: Arindam Dutta, Rohit Lal, Yash Garg, Calvin-Khang Ta, Dripta S. Raychaudhuri, Hannah Dela Cruz, Amit K. Roy-Chowdhury

    Abstract: Existing algorithms for human body part segmentation have shown promising results on challenging datasets, primarily relying on end-to-end supervision. However, these algorithms exhibit severe performance drops in the face of domain shifts, leading to inaccurate segmentation masks. To tackle this issue, we introduce POSTURE: \underline{Po}se Guided Un\underline{s}upervised Domain Adap\underline{t}… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2312.16221  [pdf, other

    cs.CV

    STRIDE: Single-video based Temporally Continuous Occlusion Robust 3D Pose Estimation

    Authors: Rohit Lal, Saketh Bachu, Yash Garg, Arindam Dutta, Calvin-Khang Ta, Dripta S. Raychaudhuri, Hannah Dela Cruz, M. Salman Asif, Amit K. Roy-Chowdhury

    Abstract: The capability to accurately estimate 3D human poses is crucial for diverse fields such as action recognition, gait recognition, and virtual/augmented reality. However, a persistent and significant challenge within this field is the accurate prediction of human poses under conditions of severe occlusion. Traditional image-based estimators struggle with heavy occlusions due to a lack of temporal co… ▽ More

    Submitted 13 March, 2024; v1 submitted 24 December, 2023; originally announced December 2023.

  3. arXiv:2312.02420  [pdf, other

    cs.CV

    Towards Granularity-adjusted Pixel-level Semantic Annotation

    Authors: Rohit Kundu, Sudipta Paul, Rohit Lal, Amit K. Roy-Chowdhury

    Abstract: Recent advancements in computer vision predominantly rely on learning-based systems, leveraging annotations as the driving force to develop specialized models. However, annotating pixel-level information, particularly in semantic segmentation, presents a challenging and labor-intensive task, prompting the need for autonomous processes. In this work, we propose GranSAM which distinguishes itself by… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  4. arXiv:2311.05077  [pdf, other

    cs.CV

    POISE: Pose Guided Human Silhouette Extraction under Occlusions

    Authors: Arindam Dutta, Rohit Lal, Dripta S. Raychaudhuri, Calvin Khang Ta, Amit K. Roy-Chowdhury

    Abstract: Human silhouette extraction is a fundamental task in computer vision with applications in various downstream tasks. However, occlusions pose a significant challenge, leading to incomplete and distorted silhouettes. To address this challenge, we introduce POISE: Pose Guided Human Silhouette Extraction under Occlusions, a novel self-supervised fusion framework that enhances accuracy and robustness i… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Journal ref: Winter Conference on Applications of Computer Vision, 2024

  5. arXiv:2308.13954  [pdf, other

    cs.CV

    Prior-guided Source-free Domain Adaptation for Human Pose Estimation

    Authors: Dripta S. Raychaudhuri, Calvin-Khang Ta, Arindam Dutta, Rohit Lal, Amit K. Roy-Chowdhury

    Abstract: Domain adaptation methods for 2D human pose estimation typically require continuous access to the source data during adaptation, which can be challenging due to privacy, memory, or computational constraints. To address this limitation, we focus on the task of source-free domain adaptation for pose estimation, where a source model must adapt to a new target domain using only unlabeled target data.… ▽ More

    Submitted 26 August, 2023; originally announced August 2023.

    Comments: Accepted at ICCV 2023

  6. arXiv:2302.00995  [pdf, other

    cs.CV

    Open-Set Multi-Source Multi-Target Domain Adaptation

    Authors: Rohit Lal, Arihant Gaur, Aadhithya Iyer, Muhammed Abdullah Shaikh, Ritik Agrawal

    Abstract: Single-Source Single-Target Domain Adaptation (1S1T) aims to bridge the gap between a labelled source domain and an unlabelled target domain. Despite 1S1T being a well-researched topic, they are typically not deployed to the real world. Methods like Multi-Source Domain Adaptation and Multi-Target Domain Adaptation have evolved to model real-world problems but still do not generalise well. The fact… ▽ More

    Submitted 3 February, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: Accepted in NeurIPS 2021 Workshop on Pre-registration in Machine Learning

  7. arXiv:2211.03876  [pdf, other

    cs.LG cs.AI cs.CV

    CoNMix for Source-free Single and Multi-target Domain Adaptation

    Authors: Vikash Kumar, Rohit Lal, Himanshu Patil, Anirban Chakraborty

    Abstract: This work introduces the novel task of Source-free Multi-target Domain Adaptation and proposes adaptation framework comprising of \textbf{Co}nsistency with \textbf{N}uclear-Norm Maximization and \textbf{Mix}Up knowledge distillation (\textit{CoNMix}) as a solution to this problem. The main motive of this work is to solve for Single and Multi target Domain Adaptation (SMTDA) for the source-free p… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: Accepted at WACV 2023

  8. arXiv:2208.04150  [pdf

    cs.CV cs.LG eess.IV

    Efficient Neural Net Approaches in Metal Casting Defect Detection

    Authors: Rohit Lal, Bharath Kumar Bolla, Sabeesh Ethiraj

    Abstract: One of the most pressing challenges prevalent in the steel manufacturing industry is the identification of surface defects. Early identification of casting defects can help boost performance, including streamlining production processes. Though, deep learning models have helped bridge this gap and automate most of these processes, there is a dire need to come up with lightweight models that can be… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: Accepted in International Conference on Machine Learning and Data Engineering (ICMLDE), 2022

  9. arXiv:2207.12271  [pdf, other

    cs.LG cs.AI

    NN2Rules: Extracting Rule List from Neural Networks

    Authors: G Roshan Lal, Varun Mithal

    Abstract: We present an algorithm, NN2Rules, to convert a trained neural network into a rule list. Rule lists are more interpretable since they align better with the way humans make decisions. NN2Rules is a decompositional approach to rule extraction, i.e., it extracts a set of decision rules from the parameters of the trained neural network model. We show that the decision rules extracted have the same pre… ▽ More

    Submitted 4 July, 2022; originally announced July 2022.

  10. arXiv:2206.14359  [pdf, other

    cs.LG cs.AI

    TE2Rules: Explaining Tree Ensembles using Rules

    Authors: G Roshan Lal, Xiaotong Chen, Varun Mithal

    Abstract: Tree Ensemble (TE) models, such as Gradient Boosted Trees, often achieve optimal performance on tabular datasets, yet their lack of transparency poses challenges for comprehending their decision logic. This paper introduces TE2Rules (Tree Ensemble to Rules), a novel approach for explaining binary classification tree ensemble models through a list of rules, particularly focusing on explaining the m… ▽ More

    Submitted 23 January, 2024; v1 submitted 28 June, 2022; originally announced June 2022.

  11. arXiv:2205.02604  [pdf, other

    cs.CV cs.HC cs.LG stat.ML

    Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

    Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty

    Abstract: Adversarial attack perturbs an image with an imperceptible noise, leading to incorrect model prediction. Recently, a few works showed inherent bias associated with such attack (robustness bias), where certain subgroups in a dataset (e.g. based on class, gender, etc.) are less robust than others. This bias not only persists even after adversarial training, but often results in severe performance di… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: Accepted in CVPR Workshop 2022 on Human-centered Intelligent Services: Safe and Trustworthy

  12. arXiv:2112.07719  [pdf, other

    cs.CV

    Decomposing the Deep: Finding Class Specific Filters in Deep CNNs

    Authors: Akshay Badola, Cherian Roy, Vineet Padmanabhan, Rajendra Lal

    Abstract: Interpretability of Deep Neural Networks has become a major area of exploration. Although these networks have achieved state of the art accuracy in many tasks, it is extremely difficult to interpret and explain their decisions. In this work we analyze the final and penultimate layers of Deep Convolutional Networks and provide an efficient method for identifying subsets of features that contribute… ▽ More

    Submitted 3 April, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: 22 pages, 5 figures, 8 tables. github repo: https://github.com/akshaybadola/cnn-class-specific-filters-with-histogram. Preprint submitted to Elsevier. This version contains visualization of filters and ablation study w.r.t. influential features

  13. arXiv:2111.13364  [pdf

    cs.NE

    Optimal Technical Indicator-based Trading Strategies Using NSGA-II

    Authors: P. Shanmukh Kali Prasad, Vadlamani Madhav, Ramanuj Lal, Vadlamani Ravi

    Abstract: This paper proposes non-dominated sorting genetic algorithm-II (NSGA-II ) in the context of technical indicator-based stock trading, by finding optimal combinations of technical indicators to generate buy and sell strategies such that the objectives, namely, Sharpe ratio and Maximum Drawdown are maximized and minimized respectively. NSGA-II is chosen because it is a very popular and powerful bi-ob… ▽ More

    Submitted 25 January, 2022; v1 submitted 26 November, 2021; originally announced November 2021.

    Comments: 24 pages; 1 figure; 11 Tables

    MSC Class: 68W50 ACM Class: I.2

  14. arXiv:2009.08193  [pdf, other

    cs.SE

    Do Scaling Agile Frameworks Address Global Software Development Risks? An Empirical Study

    Authors: Sarah Beecham, Tony Clear, Ramesh Lal, John Noll

    Abstract: Driven by the need to coordinate activities of multiple agile development teams cooperating to produce a large software product, software-intensive organizations are turning to scaling agile software development frameworks. Despite the growing adoption of various scalin g agile frameworks, there is little empirical evidence of how effective their practices are in mitigating risk, especially in glo… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    ACM Class: D.2.9

    Journal ref: Journal of Systems and Software, Special Issue on Global Software Engineering (2020)

  15. arXiv:2007.15270  [pdf, other

    cs.AI cs.LG stat.ML

    Fairness-Aware Online Personalization

    Authors: G Roshan Lal, Sahin Cem Geyik, Krishnaram Kenthapadi

    Abstract: Decision making in crucial applications such as lending, hiring, and college admissions has witnessed increasing use of algorithmic models and techniques as a result of a confluence of factors such as ubiquitous connectivity, ability to collect, aggregate, and process large amounts of fine-grained data using cloud computing, and ease of access to applying sophisticated machine learning models. Qui… ▽ More

    Submitted 6 September, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Comments: Accepted in RecSys 2020, FAccTRec Workshop: Responsible Recommendation

  16. arXiv:1712.03380  [pdf, other

    cs.GR cs.CV

    A Deep Recurrent Framework for Cleaning Motion Capture Data

    Authors: Utkarsh Mall, G. Roshan Lal, Siddhartha Chaudhuri, Parag Chaudhuri

    Abstract: We present a deep, bidirectional, recurrent framework for cleaning noisy and incomplete motion capture data. It exploits temporal coherence and joint correlations to infer adaptive filters for each joint in each frame. A single model can be trained to denoise a heterogeneous mix of action types, under substantial amounts of noise. A signal that has both noise and gaps is preprocessed with a second… ▽ More

    Submitted 9 December, 2017; originally announced December 2017.

  17. arXiv:1603.07735  [pdf, ps, other

    quant-ph cs.LO math.PR

    Possibilities Determine the Combinatorial Structure of Probability Polytopes

    Authors: Samson Abramsky, Rui Soares Barbosa, Kohei Kishida, Raymond Lal, Shane Mansfield

    Abstract: We study the set of no-signalling empirical models on a measurement scenario, and show that the combinatorial structure of the no-signalling polytope is completely determined by the possibilistic information given by the support of the models. This is a special case of a general result which applies to all polytopes presented in a standard form, given by linear equations together with non-negativi… ▽ More

    Submitted 24 March, 2016; originally announced March 2016.

    Journal ref: In special issue on Foundations of Probability Theory in Psychology and Beyond, Journal of Mathematical Psychology, 74: 58--65, 2016

  18. arXiv:1502.03097  [pdf, other

    quant-ph cs.LO math.AT

    Contextuality, Cohomology and Paradox

    Authors: Samson Abramsky, Rui Soares Barbosa, Kohei Kishida, Raymond Lal, Shane Mansfield

    Abstract: Contextuality is a key feature of quantum mechanics that provides an important non-classical resource for quantum information and computation. Abramsky and Brandenburger used sheaf theory to give a general treatment of contextuality in quantum theory [New Journal of Physics 13 (2011) 113036]. However, contextual phenomena are found in other fields as well, for example database theory. In this pape… ▽ More

    Submitted 5 March, 2017; v1 submitted 10 February, 2015; originally announced February 2015.

    Comments: 18 pages, 4 figures

    Journal ref: 24th EACSL Annual Conference on Computer Science Logic (CSL 2015), Leibniz International Proceedings in Informatics (LIPIcs), 41: 211-228, 2015

  19. arXiv:1105.1086  [pdf, ps, other

    cs.CR

    Public Key Protocol Based on Amalgamated Free Product

    Authors: Sumit Kumar Upadhyay, Shiv Datt Kumar, Ramji Lal

    Abstract: In the spirit of Diffie Hellman the concept of a protocol algebra is introduced using certain amalgamated free product of Braid group B and Thompson group T together with a nilpotent subgroup H of index 2.

    Submitted 16 April, 2011; originally announced May 2011.