Skip to main content

Showing 1–14 of 14 results for author: Prakash, K

  1. arXiv:2207.13143  [pdf, other

    cs.SE

    Random Test Generation of Application Programming Interfaces

    Authors: Eitan Farchi, Krithika Prakash, Vitali Sokhin

    Abstract: Cloud high quality API (Application Programming Interface) testing is essential for supporting the API economy. Autotest is a random test generator that addresses this need. It reads the API specification and deduces a model used in the test generation. This paper describes Autotest. It also address the topic of API specification pitfalls which Autotest may reveal when reading the specification. A… ▽ More

    Submitted 6 November, 2022; v1 submitted 26 July, 2022; originally announced July 2022.

  2. arXiv:2204.13663  [pdf, other

    cs.AI cs.CY

    ADVISER: AI-Driven Vaccination Intervention Optimiser for Increasing Vaccine Uptake in Nigeria

    Authors: Vineet Nair, Kritika Prakash, Michael Wilbur, Aparna Taneja, Corinne Namblard, Oyindamola Adeyemo, Abhishek Dubey, Abiodun Adereni, Milind Tambe, Ayan Mukhopadhyay

    Abstract: More than 5 million children under five years die from largely preventable or treatable medical conditions every year, with an overwhelmingly large proportion of deaths occurring in under-developed countries with low vaccination uptake. One of the United Nations' sustainable development goals (SDG 3) aims to end preventable deaths of newborns and children under five years of age. We focus on Niger… ▽ More

    Submitted 5 July, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: Accepted for publication at International Joint Conference on Artificial Intelligence 2022, AI for Good Track (IJCAI-22)

  3. arXiv:2112.07054  [pdf, other

    cs.LG

    Graph network for learning bi-directional physics

    Authors: Sakthi Kumar Arul Prakash, Conrad Tucker

    Abstract: In this work, we propose an end-to-end graph network that learns forward and inverse models of particle-based physics using interpretable inductive biases. Physics-informed neural networks are often engineered to solve specific problems through problem-specific regularization and loss functions. Such explicit learning biases the network to learn data specific patterns and may require a change in t… ▽ More

    Submitted 31 January, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

  4. arXiv:2112.05495  [pdf, other

    cs.LG cs.AI

    How Private Is Your RL Policy? An Inverse RL Based Analysis Framework

    Authors: Kritika Prakash, Fiza Husain, Praveen Paruchuri, Sujit P. Gujar

    Abstract: Reinforcement Learning (RL) enables agents to learn how to perform various tasks from scratch. In domains like autonomous driving, recommendation systems, and more, optimal RL policies learned could cause a privacy breach if the policies memorize any part of the private reward. We study the set of existing differentially-private RL policies derived from various RL algorithms such as Value Iteratio… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: 15 pages, 7 figures, 5 tables, version accepted at AAAI 2022

  5. arXiv:2110.01315  [pdf, ps, other

    cs.CR cs.AI cs.LG

    Towards General-purpose Infrastructure for Protecting Scientific Data Under Study

    Authors: Andrew Trask, Kritika Prakash

    Abstract: The scientific method presents a key challenge to privacy because it requires many samples to support a claim. When samples are commercially valuable or privacy-sensitive enough, their owners have strong reasons to avoid releasing them for scientific study. Privacy techniques seek to mitigate this tension by enforcing limits on one's ability to use studied samples for secondary purposes. Recent wo… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  6. arXiv:2109.10573  [pdf, other

    cs.LG cs.CR

    An automatic differentiation system for the age of differential privacy

    Authors: Dmitrii Usynin, Alexander Ziller, Moritz Knolle, Andrew Trask, Kritika Prakash, Daniel Rueckert, Georgios Kaissis

    Abstract: We introduce Tritium, an automatic differentiation-based sensitivity analysis framework for differentially private (DP) machine learning (ML). Optimal noise calibration in this setting requires efficient Jacobian matrix computations and tight bounds on the L2-sensitivity. Our framework achieves these objectives by relying on a functional analysis-based method for sensitivity tracking, which we bri… ▽ More

    Submitted 5 April, 2022; v1 submitted 22 September, 2021; originally announced September 2021.

    Comments: 8 pages, Accepted to the NEURIPS 2021 Privacy Preserving Machine Learning Workshop

  7. arXiv:2107.04265  [pdf, ps, other

    cs.LG cs.CR cs.SC

    Sensitivity analysis in differentially private machine learning using hybrid automatic differentiation

    Authors: Alexander Ziller, Dmitrii Usynin, Moritz Knolle, Kritika Prakash, Andrew Trask, Rickmer Braren, Marcus Makowski, Daniel Rueckert, Georgios Kaissis

    Abstract: In recent years, formal methods of privacy protection such as differential privacy (DP), capable of deployment to data-driven tasks such as machine learning (ML), have emerged. Reconciling large-scale ML with the closed-form reasoning required for the principled analysis of individual privacy loss requires the introduction of new tools for automatic sensitivity analysis and for tracking an individ… ▽ More

    Submitted 17 August, 2021; v1 submitted 9 July, 2021; originally announced July 2021.

    Comments: Accepted to the ICML 2021 Theory and Practice of Differential Privacy Workshop

  8. arXiv:2105.13683  [pdf, other

    cs.FL cs.LO

    Fast zone-based algorithms for reachability in pushdown timed automata

    Authors: S. Akshay, Paul Gastin, Karthik R Prakash

    Abstract: Given the versatility of timed automata a huge body of work has evolved that considers extensions of timed automata. One extension that has received a lot of interest is timed automata with a, possibly unbounded, stack, also called the pushdown timed automata (PDTA) model. While different algorithms have been given for reachability in different variants of this model, most of these results are pur… ▽ More

    Submitted 19 July, 2021; v1 submitted 28 May, 2021; originally announced May 2021.

    Comments: Long version of conference paper accepted at CAV'2021

  9. arXiv:2104.12385  [pdf, other

    cs.LG cs.CR

    Syft 0.5: A Platform for Universally Deployable Structured Transparency

    Authors: Adam James Hall, Madhava Jay, Tudor Cebere, Bogdan Cebere, Koen Lennart van der Veen, George Muraru, Tongye Xu, Patrick Cason, William Abramson, Ayoub Benaissa, Chinmay Shah, Alan Aboudib, Théo Ryffel, Kritika Prakash, Tom Titcombe, Varun Kumar Khare, Maddie Shang, Ionesio Junior, Animesh Gupta, Jason Paumier, Nahua Kang, Vova Manannikov, Andrew Trask

    Abstract: We present Syft 0.5, a general-purpose framework that combines a core group of privacy-enhancing technologies that facilitate a universal set of structured transparency systems. This framework is demonstrated through the design and implementation of a novel privacy-preserving inference information flow where we pass homomorphically encrypted activation signals through a split neural network for in… ▽ More

    Submitted 27 April, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  10. arXiv:1808.01550  [pdf, other

    cs.LG stat.ML

    Designing Adaptive Neural Networks for Energy-Constrained Image Classification

    Authors: Dimitrios Stamoulis, Ting-Wu Chin, Anand Krishnan Prakash, Haocheng Fang, Sribhuvan Sajja, Mitchell Bognar, Diana Marculescu

    Abstract: As convolutional neural networks (CNNs) enable state-of-the-art computer vision applications, their high energy consumption has emerged as a key impediment to their deployment on embedded and mobile devices. Towards efficient image classification under hardware constraints, prior work has proposed adaptive CNNs, i.e., systems of networks with different accuracy and computation characteristics, whe… ▽ More

    Submitted 6 August, 2018; v1 submitted 4 August, 2018; originally announced August 2018.

    Comments: This conference paper will appear in the proceedings of ICCAD 2018

  11. Thinning Algorithm Using Hypergraph Based Morphological Operators

    Authors: R. P. Prakash, Keerthana S. Prakash, V. P. Binu

    Abstract: The object recognition is a complex problem in the image processing. Mathematical morphology is Shape oriented operations, that simplify image data, preserving their essential shape characteristics and eliminating irrelevancies. This paper briefly describes morphological operators using hypergraph and its applications for thinning algorithms. The morphological operators using hypergraph method is… ▽ More

    Submitted 25 July, 2015; originally announced July 2015.

    Comments: Advance Computing Conference (IACC), 2015 IEEE International,Banglore India

    Journal ref: IEEE Xplore Advance Computing Conference (IACC) Proceedings Pages: 1017 - 1020,,Year: 2015

  12. A Study of Morphological Filtering Using Graph and Hypergraphs

    Authors: Keerthana S. Prakash, R. P. Prakash, V. P. Binu

    Abstract: Mathematical morphology (MM) helps to describe and analyze shapes using set theory. MM can be effectively applied to binary images which are treated as sets. Basic morphological operators defined can be used as an effective tool in image processing. Morphological operators are also developed based on graph and hypergraph. These operators have found better performance and applications in image proc… ▽ More

    Submitted 25 July, 2015; originally announced July 2015.

    Comments: Advance Computing Conference (IACC), 2015 IEEE International,12-13 June 2015,Banglore India, Page(s):1017 - 1020,Print ISBN:978-1-4799-8046-8,IEEE Xplore,2015

  13. arXiv:1212.2563  [pdf

    cs.CR

    Wireless Public key Infrastructure for Mobile Phones

    Authors: Balachandra Muniyal, Krishna Prakash, Shashank Sharma

    Abstract: Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at the same level of security as the wired network. PKI (Public… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

  14. arXiv:1002.1157  [pdf

    cs.AI

    Establishment of Relationships between Material Design and Product Design Domains by Hybrid FEM-ANN Technique

    Authors: K. Soorya Prakash, S. S. Mohamed Nazirudeen, M. Joseph Malvin Raj

    Abstract: In this paper, research on AI based modeling technique to optimize development of new alloys with necessitated improvements in properties and chemical mixture over existing alloys as per functional requirements of product is done. The current research work novels AI in lieu of predictions to establish association between material and product customary. Advanced computational simulation technique… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Establishment-of-Relationships-between-Material-Design-and-Product-Design-Domains-by-Hybrid-FEM-ANN-Technique.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Establishment-of-Relationships-between-Material-Design-and-Product-Design-Domains-by-Hybrid-FEM-ANN-Technique.php