Skip to main content

Showing 1–50 of 132 results for author: Mitra, S

  1. arXiv:2406.18812  [pdf, other

    cs.RO cs.AI

    A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics

    Authors: Ivan A. Fernandez, Subash Neupane, Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Nisha Pillai, Jingdao Chen, Shahram Rahimi

    Abstract: Industry 4.0 has witnessed the rise of complex robots fueled by the integration of Artificial Intelligence/Machine Learning (AI/ML) and Digital Twin (DT) technologies. While these technologies offer numerous benefits, they also introduce potential privacy and security risks. This paper surveys privacy attacks targeting robots enabled by AI and DT models. Exfiltration and data leakage of ML models… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 10 pages, 3 figures, 1 table

  2. arXiv:2406.16993  [pdf, other

    eess.IV cs.CV

    Are Vision xLSTM Embedded UNet More Reliable in Medical 3D Image Segmentation?

    Authors: Pallabi Dutta, Soham Bose, Swalpa Kumar Roy, Sushmita Mitra

    Abstract: The advancement of developing efficient medical image segmentation has evolved from initial dependence on Convolutional Neural Networks (CNNs) to the present investigation of hybrid models that combine CNNs with Vision Transformers. Furthermore, there is an increasing focus on creating architectures that are both high-performing in medical image segmentation tasks and computationally efficient to… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  3. arXiv:2406.04654  [pdf, other

    eess.IV cs.LG

    GenzIQA: Generalized Image Quality Assessment using Prompt-Guided Latent Diffusion Models

    Authors: Diptanu De, Shankhanil Mitra, Rajiv Soundararajan

    Abstract: The design of no-reference (NR) image quality assessment (IQA) algorithms is extremely important to benchmark and calibrate user experiences in modern visual systems. A major drawback of state-of-the-art NR-IQA methods is their limited ability to generalize across diverse IQA settings with reasonable distribution shifts. Recent text-to-image generative models such as latent diffusion models genera… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  4. arXiv:2404.19341  [pdf, other

    cs.CV cs.AI

    Reliable or Deceptive? Investigating Gated Features for Smooth Visual Explanations in CNNs

    Authors: Soham Mitra, Atri Sukul, Swalpa Kumar Roy, Pravendra Singh, Vinay Verma

    Abstract: Deep learning models have achieved remarkable success across diverse domains. However, the intricate nature of these models often impedes a clear understanding of their decision-making processes. This is where Explainable AI (XAI) becomes indispensable, offering intuitive explanations for model decisions. In this work, we propose a simple yet highly effective approach, ScoreCAM++, which introduces… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  5. arXiv:2404.10547  [pdf, other

    cs.LG

    A/B testing under Interference with Partial Network Information

    Authors: Shiv Shankar, Ritwik Sinha, Yash Chandak, Saayan Mitra, Madalina Fiterau

    Abstract: A/B tests are often required to be conducted on subjects that might have social connections. For e.g., experiments on social media, or medical and social interventions to control the spread of an epidemic. In such settings, the SUTVA assumption for randomized-controlled trials is violated due to network interference, or spill-over effects, as treatments to group A can potentially also affect the c… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: AISTATS 2024

  6. arXiv:2403.08607  [pdf, other

    cs.CL cs.AI

    MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models

    Authors: Subash Neupane, Shaswata Mitra, Sudip Mittal, Noorbakhsh Amiri Golilarz, Shahram Rahimi, Amin Amirlatifi

    Abstract: Large Language Models (LLMs) have shown impressive capabilities in generating human-like responses. However, their lack of domain-specific knowledge limits their applicability in healthcare settings, where contextual and comprehensive responses are vital. To address this challenge and enable the generation of patient-centric responses that are contextually relevant and comprehensive, we propose Me… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  7. arXiv:2403.01882  [pdf, other

    cs.HC

    Using Virtual Reality for Detection and Intervention of Depression -- A Systematic Literature Review

    Authors: Mohammad Waqas, Y Pawankumar Gururaj, V D Shanmukha Mitra, Sai Anirudh Karri, Raghu Reddy, Syed Azeemuddin

    Abstract: The use of emerging technologies like Virtual Reality (VR) in therapeutic settings has increased in the past few years. By incorporating VR, a mental health condition like depression can be assessed effectively, while also providing personalized motivation and meaningful engagement for treatment purposes. The integration of external sensors further enhances the engagement of the subjects with the… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 8 pages, 2 figures, 3 tables, Conference full paper

  8. arXiv:2403.01693  [pdf, other

    cs.CV cs.AI

    HanDiffuser: Text-to-Image Generation With Realistic Hand Appearances

    Authors: Supreeth Narasimhaswamy, Uttaran Bhattacharya, Xiang Chen, Ishita Dasgupta, Saayan Mitra, Minh Hoai

    Abstract: Text-to-image generative models can generate high-quality humans, but realism is lost when generating hands. Common artifacts include irregular hand poses, shapes, incorrect numbers of fingers, and physically implausible finger orientations. To generate images with realistic hands, we propose a novel diffusion-based architecture called HanDiffuser that achieves realism by injecting hand embeddings… ▽ More

    Submitted 21 April, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

    Comments: Revisions: 1. Added a link to project page in the abstract, 2. Updated references and related work, 3. Fixed some grammatical errors

  9. arXiv:2402.17067  [pdf, ps, other

    math.ST cs.IT stat.ML

    On Independent Samples Along the Langevin Diffusion and the Unadjusted Langevin Algorithm

    Authors: Jiaming Liang, Siddharth Mitra, Andre Wibisono

    Abstract: We study the rate at which the initial and current random variables become independent along a Markov chain, focusing on the Langevin diffusion in continuous time and the Unadjusted Langevin Algorithm (ULA) in discrete time. We measure the dependence between random variables via their mutual information. For the Langevin diffusion, we show the mutual information converges to $0$ exponentially fast… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: 41 pages

  10. The Paradox of Industrial Involvement in Engineering Higher Education

    Authors: Srinjoy Mitra, Jean-Pierre Raskin

    Abstract: This paper discusses the importance of reflective and socially conscious education in engineering schools, particularly within the EE/CS sector. While most engineering disciplines have historically aligned themselves with the demands of the technology industry, the lack of critical examination of industry practices and their impact on justice, equality, and sustainability is self-evident. Today, t… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  11. arXiv:2402.04541  [pdf, other

    cs.CV

    BRI3L: A Brightness Illusion Image Dataset for Identification and Localization of Regions of Illusory Perception

    Authors: Aniket Roy, Anirban Roy, Soma Mitra, Kuntal Ghosh

    Abstract: Visual illusions play a significant role in understanding visual perception. Current methods in understanding and evaluating visual illusions are mostly deterministic filtering based approach and they evaluate on a handful of visual illusions, and the conclusions therefore, are not generic. To this end, we generate a large-scale dataset of 22,366 images (BRI3L: BRightness Illusion Image dataset fo… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  12. arXiv:2401.10036  [pdf, other

    cs.CR cs.AI cs.IR cs.LO

    LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

    Authors: Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

    Abstract: Security Operations Center (SoC) analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs. These analysts also depend on internal repositories, which act as private local knowledge database for an organization. Credible cyber intelligence, critical operational details, and relevant organizational information… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  13. arXiv:2401.05680  [pdf, other

    cs.CR cs.AI cs.LG cs.NE

    Use of Graph Neural Networks in Aiding Defensive Cyber Operations

    Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

    Abstract: In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information. Additionally, cyber-attacks differ depending on the objective and evolve rapidly to disguise defensive systems. However, a typical cyber-attack demonstrates a series of stages from attack i… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 35 pages, 9 figures, 8 tables

  14. arXiv:2401.00013  [pdf, other

    cs.SI cs.DB cs.DS cs.LG

    HITSnDIFFs: From Truth Discovery to Ability Discovery by Recovering Matrices with the Consecutive Ones Property

    Authors: Zixuan Chen, Subhodeep Mitra, R Ravi, Wolfgang Gatterbauer

    Abstract: We analyze a general problem in a crowd-sourced setting where one user asks a question (also called item) and other users return answers (also called labels) for this question. Different from existing crowd sourcing work which focuses on finding the most appropriate label for the question (the "truth"), our problem is to determine a ranking of the users based on their ability to answer questions.… ▽ More

    Submitted 21 December, 2023; originally announced January 2024.

    Comments: 22 pages, 14 figures, long version of of ICDE 2024 conference paper

  15. arXiv:2312.15425  [pdf, other

    cs.CV cs.LG

    Knowledge Guided Semi-Supervised Learning for Quality Assessment of User Generated Videos

    Authors: Shankhanil Mitra, Rajiv Soundararajan

    Abstract: Perceptual quality assessment of user generated content (UGC) videos is challenging due to the requirement of large scale human annotated videos for training. In this work, we address this challenge by first designing a self-supervised Spatio-Temporal Visual Quality Representation Learning (ST-VQRL) framework to generate robust quality aware features for videos. Then, we propose a dual-model based… ▽ More

    Submitted 24 December, 2023; originally announced December 2023.

    Comments: Accepted to 38th AAAI conference on AI (AAAI 24)

  16. arXiv:2312.15036  [pdf, other

    cs.LG cs.CR cs.DC

    SODA: Protecting Proprietary Information in On-Device Machine Learning Models

    Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy

    Abstract: The growth of low-end hardware has led to a proliferation of machine learning-based services in edge applications. These applications gather contextual information about users and provide some services, such as personalized offers, through a machine learning (ML) model. A growing practice has been to deploy such ML models on the user's device to reduce latency, maintain user privacy, and minimize… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    Journal ref: ACM/IEEE Symposium on Edge Computing 2023

  17. R2D2: Reducing Redundancy and Duplication in Data Lakes

    Authors: Raunak Shah, Koyel Mukherjee, Atharv Tyagi, Sai Keerthana Karnam, Dhruv Joshi, Shivam Bhosale, Subrata Mitra

    Abstract: Enterprise data lakes often suffer from substantial amounts of duplicate and redundant data, with data volumes ranging from terabytes to petabytes. This leads to both increased storage costs and unnecessarily high maintenance costs for these datasets. In this work, we focus on identifying and reducing redundancy in enterprise data lakes by addressing the problem of 'dataset containment'. To the be… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: The first two authors contributed equally. 25 pages, accepted to the International Conference on Management of Data (SIGMOD) 2024. ©Raunak Shah | ACM 2023. This is the author's version of the work. Not for redistribution. The definitive Version of Record was published in Proceedings of the ACM on Management of Data (PACMMOD), http://dx.doi.org/10.1145/3626762

    Journal ref: Proc. ACM Manag. Data 1, 4, Article 268 (December 2023), 25 pages

  18. arXiv:2312.04838  [pdf, other

    cs.CV

    Learning Generalizable Perceptual Representations for Data-Efficient No-Reference Image Quality Assessment

    Authors: Suhas Srinath, Shankhanil Mitra, Shika Rao, Rajiv Soundararajan

    Abstract: No-reference (NR) image quality assessment (IQA) is an important tool in enhancing the user experience in diverse visual applications. A major drawback of state-of-the-art NR-IQA techniques is their reliance on a large number of human annotations to train models for a target IQA application. To mitigate this requirement, there is a need for unsupervised learning of generalizable quality representa… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: Accepted to IEEE/CVF WACV 2024

  19. arXiv:2312.04429  [pdf, other

    cs.CV

    Approximate Caching for Efficiently Serving Diffusion Models

    Authors: Shubham Agarwal, Subrata Mitra, Sarthak Chakraborty, Srikrishna Karanam, Koyel Mukherjee, Shiv Saini

    Abstract: Text-to-image generation using diffusion models has seen explosive popularity owing to their ability in producing high quality images adhering to text prompts. However, production-grade diffusion model serving is a resource intensive task that not only require high-end GPUs which are expensive but also incurs considerable latency. In this paper, we introduce a technique called approximate-caching… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: Accepted at NSDI'24

  20. arXiv:2311.11509  [pdf, other

    cs.CL cs.LG

    Token-Level Adversarial Prompt Detection Based on Perplexity Measures and Contextual Information

    Authors: Zhengmian Hu, Gang Wu, Saayan Mitra, Ruiyi Zhang, Tong Sun, Heng Huang, Viswanathan Swaminathan

    Abstract: In recent years, Large Language Models (LLM) have emerged as pivotal tools in various applications. However, these models are susceptible to adversarial prompt attacks, where attackers can carefully curate input strings that mislead LLMs into generating incorrect or undesired outputs. Previous work has revealed that with relatively simple yet effective attacks based on discrete optimization, it is… ▽ More

    Submitted 18 February, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

  21. arXiv:2311.11429  [pdf, other

    cs.LG

    Fast Heavy Inner Product Identification Between Weights and Inputs in Neural Network Training

    Authors: Lianke Qin, Saayan Mitra, Zhao Song, Yuanyuan Yang, Tianyi Zhou

    Abstract: In this paper, we consider a heavy inner product identification problem, which generalizes the Light Bulb problem~(\cite{prr89}): Given two sets $A \subset \{-1,+1\}^d$ and $B \subset \{-1,+1\}^d$ with $|A|=|B| = n$, if there are exact $k$ pairs whose inner product passes a certain threshold, i.e., $\{(a_1, b_1), \cdots, (a_k, b_k)\} \subset A \times B$ such that… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

    Comments: IEEE BigData 2023

  22. arXiv:2311.10811  [pdf, other

    cs.LG cs.AI

    A novel post-hoc explanation comparison metric and applications

    Authors: Shreyan Mitra, Leilani Gilpin

    Abstract: Explanatory systems make the behavior of machine learning models more transparent, but are often inconsistent. To quantify the differences between explanatory systems, this paper presents the Shreyan Distance, a novel metric based on the weighted difference between ranked feature importance lists produced by such systems. This paper uses the Shreyan Distance to compare two explanatory systems, SHA… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 8 pages, 4 figures, 2 tables, and 1 listing. arXiv admin note: substantial text overlap with arXiv:2304.08499

    MSC Class: I.2

  23. arXiv:2311.08652  [pdf, other

    cs.RO cs.CV

    Refining Perception Contracts: Case Studies in Vision-based Safe Auto-landing

    Authors: Yangge Li, Benjamin C Yang, Yixuan Jia, Daniel Zhuang, Sayan Mitra

    Abstract: Perception contracts provide a method for evaluating safety of control systems that use machine learning for perception. A perception contract is a specification for testing the ML components, and it gives a method for proving end-to-end system-level safety requirements. The feasibility of contract-based testing and assurance was established earlier in the context of straight lane keeping: a 3-dim… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  24. arXiv:2311.04817  [pdf, other

    cs.LG cs.AI

    Decentralized Personalized Online Federated Learning

    Authors: Renzhi Wu, Saayan Mitra, Xiang Chen, Anup Rao

    Abstract: Vanilla federated learning does not support learning in an online environment, learning a personalized model on each client, and learning in a decentralized setting. There are existing methods extending federated learning in each of the three aspects. However, some important applications on enterprise edge servers (e.g. online item recommendation at global scale) involve the three aspects at the s… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Journal ref: IEEE BigData 2023

  25. arXiv:2310.13227  [pdf, other

    cs.CL cs.AI cs.LG

    ToolChain*: Efficient Action Space Navigation in Large Language Models with A* Search

    Authors: Yuchen Zhuang, Xiang Chen, Tong Yu, Saayan Mitra, Victor Bursztyn, Ryan A. Rossi, Somdeb Sarkhel, Chao Zhang

    Abstract: Large language models (LLMs) have demonstrated powerful decision-making and planning capabilities in solving complicated real-world problems. LLM-based autonomous agents can interact with diverse tools (e.g., functional APIs) and generate solution plans that execute a series of API function calls in a step-by-step manner. The multitude of candidate API function calls significantly expands the acti… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  26. arXiv:2310.08565  [pdf, other

    cs.RO cs.AI

    Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

    Authors: Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

    Abstract: Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their inception. Today, AI-Robotics systems have become an integral part of our daily lives, from robotic vacuum cleaners to semi-autonomous cars. These systems are built upon three fundamental architectural elements: perception, navigation and planning, and control. However, while the integration of AI-Robotics sys… ▽ More

    Submitted 25 January, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  27. arXiv:2310.04288  [pdf, other

    eess.SY cs.AI cs.FL

    Searching for Optimal Runtime Assurance via Reachability and Reinforcement Learning

    Authors: Kristina Miller, Christopher K. Zeitler, William Shen, Kerianne Hobbs, Sayan Mitra, John Schierman, Mahesh Viswanathan

    Abstract: A runtime assurance system (RTA) for a given plant enables the exercise of an untrusted or experimental controller while assuring safety with a backup (or safety) controller. The relevant computational design problem is to create a logic that assures safety by switching to the safety controller as needed, while maximizing some performance criteria, such as the utilization of the untrusted controll… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  28. arXiv:2309.13515  [pdf, other

    cs.RO eess.SY

    Learning-based Inverse Perception Contracts and Applications

    Authors: Dawei Sun, Benjamin C. Yang, Sayan Mitra

    Abstract: Perception modules are integral in many modern autonomous systems, but their accuracy can be subject to the vagaries of the environment. In this paper, we propose a learning-based approach that can automatically characterize the error of a perception module from data and use this for safe control. The proposed approach constructs an inverse perception contract (IPC) which generates a set that cont… ▽ More

    Submitted 3 March, 2024; v1 submitted 23 September, 2023; originally announced September 2023.

  29. arXiv:2309.12355  [pdf

    cs.CY

    Role of ICT Innovation in Perpetuating the Myth of Techno-Solutionism

    Authors: Srinjoy Mitra, Jean-Pierre Raskin, Mario Pansera

    Abstract: Innovation in Information and Communication Technology has become one of the key economic drivers of our technology dependent world. In popular notion, the tech industry or how ICT is often known has become synonymous to all technologies that drive modernity. Digital technologies have become so pervasive that it is hard to imagine new technology developments that are not totally or partially influ… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

  30. arXiv:2309.10878  [pdf, other

    cs.LG cs.CV

    DeepliteRT: Computer Vision at the Edge

    Authors: Saad Ashfaq, Alexander Hoffman, Saptarshi Mitra, Sudhakar Sah, MohammadHossein AskariHemmat, Ehsan Saboori

    Abstract: The proliferation of edge devices has unlocked unprecedented opportunities for deep learning model deployment in computer vision applications. However, these complex models require considerable power, memory and compute resources that are typically not available on edge platforms. Ultra low-bit quantization presents an attractive solution to this problem by scaling down the model weights and activ… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: Accepted at British Machine Vision Conference (BMVC) 2023

  31. arXiv:2309.08814  [pdf, other

    cs.RO cs.AI

    URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments

    Authors: Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy Bethel, Jingdao Chen

    Abstract: A major challenge with off-road autonomous navigation is the lack of maps or road markings that can be used to plan a path for autonomous robots. Classical path planning methods mostly assume a perfectly known environment without accounting for the inherent perception and sensing uncertainty from detecting terrain and obstacles in off-road environments. Recent work in computer vision and deep neur… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  32. arXiv:2308.11395  [pdf, other

    cs.ET

    ULGss: A Strategy to construct a Library of Universal Logic Gates for $N$-variable Boolean Logic beyond NAND and NOR

    Authors: Aadarsh G. Goenka, Shyamali Mitra, Mrinal K. Naskar, Nibaran Das

    Abstract: In literature, NAND and NOR are two logic gates that display functional completeness, hence regarded as Universal gates. So, the present effort is focused on exploring a library of universal gates in binary that are still unexplored in literature along with a broad and systematic approach to classify the logic connectives. The study shows that the number of Universal Gates in any logic system grow… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: 8 pages 10 tables 11 figures

  33. arXiv:2307.14735  [pdf, other

    cs.CV eess.IV

    Test Time Adaptation for Blind Image Quality Assessment

    Authors: Subhadeep Roy, Shankhanil Mitra, Soma Biswas, Rajiv Soundararajan

    Abstract: While the design of blind image quality assessment (IQA) algorithms has improved significantly, the distribution shift between the training and testing scenarios often leads to a poor performance of these methods at inference time. This motivates the study of test time adaptation (TTA) techniques to improve their performance at inference time. Existing auxiliary tasks and loss functions used for T… ▽ More

    Submitted 26 September, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

    Comments: Accepted to ICCV 2023

  34. arXiv:2307.13901  [pdf, other

    cs.CV

    YOLOBench: Benchmarking Efficient Object Detectors on Embedded Systems

    Authors: Ivan Lazarevich, Matteo Grimaldi, Ravish Kumar, Saptarshi Mitra, Shahrukh Khan, Sudhakar Sah

    Abstract: We present YOLOBench, a benchmark comprised of 550+ YOLO-based object detection models on 4 different datasets and 4 different embedded hardware platforms (x86 CPU, ARM CPU, Nvidia GPU, NPU). We collect accuracy and latency numbers for a variety of YOLO-based one-stage detectors at different model scales by performing a fair, controlled comparison of these detectors with a fixed training environme… ▽ More

    Submitted 21 August, 2023; v1 submitted 25 July, 2023; originally announced July 2023.

  35. arXiv:2306.11797  [pdf, other

    gr-qc astro-ph.HE cs.LG

    Towards a robust and reliable deep learning approach for detection of compact binary mergers in gravitational wave data

    Authors: Shreejit Jadhav, Mihir Shrivastava, Sanjit Mitra

    Abstract: The ability of deep learning (DL) approaches to learn generalised signal and noise models, coupled with their fast inference on GPUs, holds great promise for enhancing gravitational-wave (GW) searches in terms of speed, parameter space coverage, and search sensitivity. However, the opaque nature of DL models severely harms their reliability. In this work, we meticulously develop a DL model stage-w… ▽ More

    Submitted 13 November, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 22 pages, 22 figures

    Journal ref: Mach. Learn.: Sci. Technol. 4 045028 (2023)

  36. arXiv:2306.08803  [pdf, other

    cs.LG cs.AI stat.ML

    Langevin Thompson Sampling with Logarithmic Communication: Bandits and Reinforcement Learning

    Authors: Amin Karbasi, Nikki Lijing Kuang, Yi-An Ma, Siddharth Mitra

    Abstract: Thompson sampling (TS) is widely used in sequential decision making due to its ease of use and appealing empirical performance. However, many existing analytical and empirical results for TS rely on restrictive assumptions on reward distributions, such as belonging to conjugate families, which limits their applicability in realistic scenarios. Moreover, sequential decision making problems are ofte… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: ICML 2023

    ACM Class: G.3; I.2.0

  37. arXiv:2306.04585  [pdf, other

    cs.LO

    RTAEval: A framework for evaluating runtime assurance logic

    Authors: Kristina Miller, Christopher K. Zeitler, William Shen, Mahesh Viswanathan, Sayan Mitra

    Abstract: Runtime assurance (RTA) addresses the problem of keeping an autonomous system safe while using an untrusted (or experimental) controller. This can be done via logic that explicitly switches between the untrusted controller and a safety controller, or logic that filters the input provided by the untrusted controller. While several tools implement specific instances of RTAs, there is currently no fr… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  38. arXiv:2305.08993  [pdf, other

    cs.CR cs.LG

    Survey of Malware Analysis through Control Flow Graph using Machine Learning

    Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal

    Abstract: Malware is a significant threat to the security of computer systems and networks which requires sophisticated techniques to analyze the behavior and functionality for detection. Traditional signature-based malware detection methods have become ineffective in detecting new and unknown malware due to their rapid evolution. One of the most promising techniques that can overcome the limitations of sig… ▽ More

    Submitted 20 June, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

  39. arXiv:2304.14993  [pdf, ps, other

    cs.HC cs.AI cs.CY

    ChatGPT in the Classroom: An Analysis of Its Strengths and Weaknesses for Solving Undergraduate Computer Science Questions

    Authors: Ishika Joshi, Ritvik Budhiraja, Harshal Dev, Jahnvi Kadia, M. Osama Ataullah, Sayan Mitra, Dhruv Kumar, Harshal D. Akolekar

    Abstract: ChatGPT is an AI language model developed by OpenAI that can understand and generate human-like text. It can be used for a variety of use cases such as language generation, question answering, text summarization, chatbot development, language translation, sentiment analysis, content creation, personalization, text completion, and storytelling. While ChatGPT has garnered significant positive attent… ▽ More

    Submitted 6 October, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: Accepted in SIGCSE TS 2024

  40. arXiv:2304.09049  [pdf, other

    cs.LG

    DeepGEMM: Accelerated Ultra Low-Precision Inference on CPU Architectures using Lookup Tables

    Authors: Darshan C. Ganji, Saad Ashfaq, Ehsan Saboori, Sudhakar Sah, Saptarshi Mitra, MohammadHossein AskariHemmat, Alexander Hoffman, Ahmed Hassanien, Mathieu Léonardon

    Abstract: A lot of recent progress has been made in ultra low-bit quantization, promising significant improvements in latency, memory footprint and energy consumption on edge devices. Quantization methods such as Learned Step Size Quantization can achieve model accuracy that is comparable to full-precision floating-point baselines even with sub-byte quantization. However, it is extremely challenging to depl… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

  41. arXiv:2304.08499  [pdf, other

    cs.LG cs.AI

    The XAISuite framework and the implications of explanatory system dissonance

    Authors: Shreyan Mitra, Leilani Gilpin

    Abstract: Explanatory systems make machine learning models more transparent. However, they are often inconsistent. In order to quantify and isolate possible scenarios leading to this discrepancy, this paper compares two explanatory systems, SHAP and LIME, based on the correlation of their respective importance scores using 14 machine learning models (7 regression and 7 classification) and 4 tabular datasets… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: 41 pages, 23 figures

  42. arXiv:2302.06155  [pdf, other

    cs.CL cs.AI

    Identifying Semantically Difficult Samples to Improve Text Classification

    Authors: Shashank Mujumdar, Stuti Mehta, Hima Patel, Suman Mitra

    Abstract: In this paper, we investigate the effect of addressing difficult samples from a given text dataset on the downstream text classification task. We define difficult samples as being non-obvious cases for text classification by analysing them in the semantic embedding space; specifically - (i) semantically similar samples that belong to different classes and (ii) semantically dissimilar samples that… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

  43. arXiv:2301.11767  [pdf, other

    cs.CR cs.LG

    CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense

    Authors: Trisha Chakraborty, Shaswata Mitra, Sudip Mittal

    Abstract: Critical servers can be secured against distributed denial of service (DDoS) attacks using proof of work (PoW) systems assisted by an Artificial Intelligence (AI) that learns contextual network request patterns. In this work, we introduce CAPoW, a context-aware anti-DDoS framework that injects latency adaptively during communication by utilizing context-aware PoW puzzles. In CAPoW, a security prof… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

    Comments: 8 pages

    Journal ref: 20th International Conference on Security and Cryptography (SECRYPT 2023)

  44. arXiv:2301.08714  [pdf, other

    cs.SE cs.FL cs.MA

    Verse: A Python library for reasoning about multi-agent hybrid system scenarios

    Authors: Yangge Li, Haoqing Zhu, Katherine Braught, Keyi Shen, Sayan Mitra

    Abstract: We present the Verse library with the aim of making hybrid system verification more usable for multi-agent scenarios. In Verse, decision making agents move in a map and interact with each other through sensors. The decision logic for each agent is written in a subset of Python and the continuous dynamics is given by a black-box simulator. Multiple agents can be instantiated and they can be ported… ▽ More

    Submitted 22 January, 2023; v1 submitted 20 January, 2023; originally announced January 2023.

    Comments: 26 pages, 16 figures

  45. arXiv:2301.06961  [pdf, other

    eess.IV cs.CV

    Composite Deep Network with Feature Weighting for Improved Delineation of COVID Infection in Lung CT

    Authors: Pallabi Dutta, Sushmita Mitra

    Abstract: An early effective screening and grading of COVID-19 has become imperative towards optimizing the limited available resources of the medical facilities. An automated segmentation of the infected volumes in lung CT is expected to significantly aid in the diagnosis and care of patients. However, an accurate demarcation of lesions remains problematic due to their irregular structure and location(s) w… ▽ More

    Submitted 17 February, 2023; v1 submitted 17 January, 2023; originally announced January 2023.

  46. arXiv:2212.12264  [pdf, other

    eess.IV cs.CV

    Collective Intelligent Strategy for Improved Segmentation of COVID-19 from CT

    Authors: Surochita Pal Das, Sushmita Mitra, B. Uma Shankar

    Abstract: The devastation caused by the coronavirus pandemic makes it imperative to design automated techniques for a fast and accurate detection. We propose a novel non-invasive tool, using deep learning and imaging, for delineating COVID-19 infection in lungs. The Ensembling Attention-based Multi-scaled Convolution network (EAMC), employing Leave-One-Patient-Out (LOPO) training, exhibits high sensitivity… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  47. arXiv:2212.06225  [pdf, other

    cs.LG cs.AI cs.DB

    Reinforced Approximate Exploratory Data Analysis

    Authors: Shaddy Garg, Subrata Mitra, Tong Yu, Yash Gadhia, Arjun Kashettiwar

    Abstract: Exploratory data analytics (EDA) is a sequential decision making process where analysts choose subsequent queries that might lead to some interesting insights based on the previous queries and corresponding results. Data processing systems often execute the queries on samples to produce results with low latency. Different downsampling strategy preserves different statistics of the data and have di… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

    Comments: Appears in the 37th AAAI Conference on Artificial Intelligence (AAAI), 2023

  48. arXiv:2211.03758  [pdf, other

    stat.ME cs.AI cs.HC

    Privacy Aware Experiments without Cookies

    Authors: Shiv Shankar, Ritwik Sinha, Saayan Mitra, Viswanathan Swaminathan, Sridhar Mahadevan, Moumita Sinha

    Abstract: Consider two brands that want to jointly test alternate web experiences for their customers with an A/B test. Such collaborative tests are today enabled using \textit{third-party cookies}, where each brand has information on the identity of visitors to another website. With the imminent elimination of third-party cookies, such A/B tests will become untenable. We propose a two-stage experimental de… ▽ More

    Submitted 6 February, 2023; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: Technical report supplementing paper accepted to WSDM 23

  49. arXiv:2210.15571  [pdf, other

    eess.IV cs.CV

    Full-scale Deeply Supervised Attention Network for Segmenting COVID-19 Lesions

    Authors: Pallabi Dutta, Sushmita Mitra

    Abstract: Automated delineation of COVID-19 lesions from lung CT scans aids the diagnosis and prognosis for patients. The asymmetric shapes and positioning of the infected regions make the task extremely difficult. Capturing information at multiple scales will assist in deciphering features, at global and local levels, to encompass lesions of variable size and texture. We introduce the Full-scale Deeply Sup… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

  50. arXiv:2210.08974  [pdf

    cs.CY

    Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing

    Authors: Klara Nahrstedt, Naresh Shanbhag, Vikram Adve, Nancy Amato, Romit Roy Choudhury, Carl Gunter, Nam Sung Kim, Olgica Milenkovic, Sayan Mitra, Lav Varshney, Yurii Vlasov, Sarita Adve, Rashid Bashir, Andreas Cangellaris, James DiCarlo, Katie Driggs-Campbell, Nick Feamster, Mattia Gazzola, Karrie Karahalios, Sanmi Koyejo, Paul Kwiat, Bo Li, Negar Mehr, Ravish Mehra, Andrew Miller , et al. (3 additional authors not shown)

    Abstract: In 2021, the Coordinated Science Laboratory CSL, an Interdisciplinary Research Unit at the University of Illinois Urbana-Champaign, hosted the Future of Computing Symposium to celebrate its 70th anniversary. CSL's research covers the full computing stack, computing's impact on society and the resulting need for social responsibility. In this white paper, we summarize the major technological points… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.