Skip to main content

Showing 1–26 of 26 results for author: Rane, S

  1. arXiv:2406.04671  [pdf, ps, other

    cs.CY cs.AI

    The Reasonable Person Standard for AI

    Authors: Sunayana Rane

    Abstract: As AI systems are increasingly incorporated into domains where human behavior has set the norm, a challenge for AI governance and AI alignment research is to regulate their behavior in a way that is useful and constructive for society. One way to answer this question is to ask: how do we govern the human behavior that the models are emulating? To evaluate human behavior, the American legal system… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  2. arXiv:2404.19753  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    DOCCI: Descriptions of Connected and Contrasting Images

    Authors: Yasumasa Onoe, Sunayana Rane, Zachary Berger, Yonatan Bitton, Jaemin Cho, Roopal Garg, Alexander Ku, Zarana Parekh, Jordi Pont-Tuset, Garrett Tanzer, Su Wang, Jason Baldridge

    Abstract: Vision-language datasets are vital for both text-to-image (T2I) and image-to-text (I2T) research. However, current datasets lack descriptions with fine-grained detail that would allow for richer associations to be learned by models. To fill the gap, we introduce Descriptions of Connected and Contrasting Images (DOCCI), a dataset with long, human-annotated English descriptions for 15k images that w… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  3. arXiv:2404.00850  [pdf, other

    eess.SY cs.CR

    Delay-Induced Watermarking for Detection of Replay Attacks in Linear Systems

    Authors: Christoforos Somarakis, Raman Goyal, Erfaun Noorani, Shantanu Rane

    Abstract: A state-feedback watermarking signal design for the detection of replay attacks in linear systems is proposed. The control input is augmented with a random time-delayed term of the system state estimate, in order to secure the system against attacks of replay type. We outline the basic analysis of the closed-loop response of the state-feedback watermarking in a LQG controlled system. Our theoretic… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: 6 pages, 3 figures, manuscript to appear in the 2024 American Control Conference

  4. arXiv:2401.08672  [pdf, ps, other

    cs.LG cs.AI q-bio.NC

    Concept Alignment

    Authors: Sunayana Rane, Polyphony J. Bruna, Ilia Sucholutsky, Christopher Kello, Thomas L. Griffiths

    Abstract: Discussion of AI alignment (alignment between humans and AI systems) has focused on value alignment, broadly referring to creating AI systems that share human values. We argue that before we can even attempt to align values, it is imperative that AI systems and humans align the concepts they use to understand the world. We integrate ideas from philosophy, cognitive science, and deep learning to ex… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: NeurIPS MP2 Workshop 2023

  5. arXiv:2310.20059  [pdf, other

    cs.AI

    Concept Alignment as a Prerequisite for Value Alignment

    Authors: Sunayana Rane, Mark Ho, Ilia Sucholutsky, Thomas L. Griffiths

    Abstract: Value alignment is essential for building AI systems that can safely and reliably interact with people. However, what a person values -- and is even capable of valuing -- depends on the concepts that they are currently using to understand and evaluate what happens in the world. The dependence of values on concepts means that concept alignment is a prerequisite for value alignment -- agents need to… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  6. arXiv:2310.13018  [pdf, other

    q-bio.NC cs.AI cs.LG cs.NE

    Getting aligned on representational alignment

    Authors: Ilia Sucholutsky, Lukas Muttenthaler, Adrian Weller, Andi Peng, Andreea Bobu, Been Kim, Bradley C. Love, Erin Grant, Iris Groen, Jascha Achterberg, Joshua B. Tenenbaum, Katherine M. Collins, Katherine L. Hermann, Kerem Oktar, Klaus Greff, Martin N. Hebart, Nori Jacoby, Qiuyi Zhang, Raja Marjieh, Robert Geirhos, Sherol Chen, Simon Kornblith, Sunayana Rane, Talia Konkle, Thomas P. O'Connell , et al. (5 additional authors not shown)

    Abstract: Biological and artificial information processing systems form representations that they can use to categorize, reason, plan, navigate, and make decisions. How can we measure the extent to which the representations formed by these diverse systems agree? Do similarities in representations then translate into similar behavior? How can a system's representations be modified to better match those of an… ▽ More

    Submitted 2 November, 2023; v1 submitted 18 October, 2023; originally announced October 2023.

    Comments: Working paper, changes to be made in upcoming revisions

  7. arXiv:2310.03346  [pdf, other

    cs.CV

    Combining Datasets with Different Label Sets for Improved Nucleus Segmentation and Classification

    Authors: Amruta Parulekar, Utkarsh Kanwat, Ravi Kant Gupta, Medha Chippa, Thomas Jacob, Tripti Bameta, Swapnil Rane, Amit Sethi

    Abstract: Segmentation and classification of cell nuclei in histopathology images using deep neural networks (DNNs) can save pathologists' time for diagnosing various diseases, including cancers, by automating cell counting and morphometric assessments. It is now well-known that the accuracy of DNNs increases with the sizes of annotated datasets available for training. Although multiple datasets of histopat… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  8. arXiv:2308.02653  [pdf, other

    cs.CR cs.CY

    Incentivizing Gigaton-Scale Carbon Dioxide Removal via a Climate-Positive Blockchain

    Authors: Jonathan Bachman, Sujit Chakravorti, Shantanu Rane, Krishnan Thyagarajan

    Abstract: A new crypto token is proposed as an incentive mechanism to remove CO2 from the atmosphere permanently at gigaton scale. The token facilitates CO2 removal (CDR) by providing financial incentives to those that are removing CO2 and an opportunity to provide additional financial resources for CDR by the public. The new token will be native to a blockchain that uses a Proof-of-Useful-Work (PoUW) conse… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: 20 pages, 3 figures

  9. arXiv:2308.00250  [pdf, other

    cs.SE

    CONSTRUCT: A Program Synthesis Approach for Reconstructing Control Algorithms from Embedded System Binaries in Cyber-Physical Systems

    Authors: Ali Shokri, Alexandre Perez, Souma Chowdhury, Chen Zeng, Gerald Kaloor, Ion Matei, Peter-Patel Schneider, Akshith Gunasekaran, Shantanu Rane

    Abstract: We introduce a novel approach to automatically synthesize a mathematical representation of the control algorithms implemented in industrial cyber-physical systems (CPS), given the embedded system binary. The output model can be used by subject matter experts to assess the system's compliance with the expected behavior and for a variety of forensic applications. Our approach first performs static a… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

  10. arXiv:2208.12506  [pdf, other

    cs.CV cs.AI cs.LG

    EGFR Mutation Prediction of Lung Biopsy Images using Deep Learning

    Authors: Ravi Kant Gupta, Shivani Nandgaonkar, Nikhil Cherian Kurian, Swapnil Rane, Amit Sethi

    Abstract: The standard diagnostic procedures for targeted therapies in lung cancer treatment involve histological subtyping and subsequent detection of key driver mutations, such as EGFR. Even though molecular profiling can uncover the driver mutation, the process is often expensive and time-consuming. Deep learning-oriented image analysis offers a more economical alternative for discovering driver mutation… ▽ More

    Submitted 13 March, 2023; v1 submitted 26 August, 2022; originally announced August 2022.

    Comments: We need to improve

    ACM Class: I.4.0; I.4.6; I.4.10; J.3; I.2.10

  11. arXiv:2207.09847  [pdf, other

    cs.CL cs.AI cs.CV

    Predicting Word Learning in Children from the Performance of Computer Vision Systems

    Authors: Sunayana Rane, Mira L. Nencheva, Zeyu Wang, Casey Lew-Williams, Olga Russakovsky, Thomas L. Griffiths

    Abstract: For human children as well as machine learning systems, a key challenge in learning a word is linking the word to the visual phenomena it describes. We explore this aspect of word learning by using the performance of computer vision systems as a proxy for the difficulty of learning a word from visual cues. We show that the age at which children acquire different categories of words is correlated w… ▽ More

    Submitted 9 September, 2023; v1 submitted 7 July, 2022; originally announced July 2022.

    Comments: CogSci 2023

  12. arXiv:2205.01777  [pdf, other

    eess.IV cs.CV

    Deep Multi-Scale U-Net Architecture and Label-Noise Robust Training Strategies for Histopathological Image Segmentation

    Authors: Nikhil Cherian Kurian, Amit Lohan, Gregory Verghese, Nimish Dharamshi, Swati Meena, Mengyuan Li, Fangfang Liu, Cheryl Gillet, Swapnil Rane, Anita Grigoriadis, Amit Sethi

    Abstract: Although the U-Net architecture has been extensively used for segmentation of medical images, we address two of its shortcomings in this work. Firstly, the accuracy of vanilla U-Net degrades when the target regions for segmentation exhibit significant variations in shape and size. Even though the U-Net already possesses some capability to analyze features at various scales, we propose to explicitl… ▽ More

    Submitted 13 August, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: 12 pages, 4 figures , 2 tables ,Added Attention UNet Results, Added Sinus and Germinal Center overlay images, Modified paper format, Fixed Title typos

  13. arXiv:2203.15230  [pdf, other

    cs.CV cs.CR cs.LG

    Zero-Query Transfer Attacks on Context-Aware Object Detectors

    Authors: Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

    Abstract: Adversarial attacks perturb images such that a deep neural network produces incorrect classification results. A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check, wherein, if the detected objects are not consistent with an appropriately defined context, then an attack is suspected. Stronger attacks are needed to fool su… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: CVPR 2022 Accepted

  14. arXiv:2106.03851  [pdf, other

    cs.SD cs.LG eess.AS

    Impact of data-splits on generalization: Identifying COVID-19 from cough and context

    Authors: Makkunda Sharma, Nikhil Shenoy, Jigar Doshi, Piyush Bagad, Aman Dalmia, Parag Bhamare, Amrita Mahale, Saurabh Rane, Neeraj Agrawal, Rahul Panicker

    Abstract: Rapidly scaling screening, testing and quarantine has shown to be an effective strategy to combat the COVID-19 pandemic. We consider the application of deep learning techniques to distinguish individuals with COVID from non-COVID by using data acquirable from a phone. Using cough and context (symptoms and meta-data) represent such a promising approach. Several independent works in this direction h… ▽ More

    Submitted 5 June, 2021; originally announced June 2021.

    Comments: Published as a workshop paper at ICLR 2021 AI for Public Health Workshop and ICLR 20201 Machine Learning for Preventing and Combating Pandemics Workshop

  15. arXiv:2009.08790  [pdf, other

    cs.SD cs.LG eess.AS

    Cough Against COVID: Evidence of COVID-19 Signature in Cough Sounds

    Authors: Piyush Bagad, Aman Dalmia, Jigar Doshi, Arsha Nagrani, Parag Bhamare, Amrita Mahale, Saurabh Rane, Neeraj Agarwal, Rahul Panicker

    Abstract: Testing capacity for COVID-19 remains a challenge globally due to the lack of adequate supplies, trained personnel, and sample-processing equipment. These problems are even more acute in rural and underdeveloped regions. We demonstrate that solicited-cough sounds collected over a phone, when analysed by our AI model, have statistically significant signal indicative of COVID-19 status (AUC 0.72, t-… ▽ More

    Submitted 23 September, 2020; v1 submitted 17 September, 2020; originally announced September 2020.

    Comments: Under submission to AAAI 20

  16. arXiv:1901.00832  [pdf, ps, other

    cs.CR

    Secure Two-Party Feature Selection

    Authors: Vanishree Rao, Yunhui Long, Hoda Eldardiry, Shantanu Rane, Ryan Rossi, Frank Torres

    Abstract: In this work, we study how to securely evaluate the value of trading data without requiring a trusted third party. We focus on the important machine learning task of classification. This leads us to propose a provably secure four-round protocol that computes the value of the data to be traded without revealing the data to the potential acquirer. The theoretical results demonstrate a number of impo… ▽ More

    Submitted 3 January, 2019; originally announced January 2019.

  17. arXiv:1811.02629  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    Identifying the Best Machine Learning Algorithms for Brain Tumor Segmentation, Progression Assessment, and Overall Survival Prediction in the BRATS Challenge

    Authors: Spyridon Bakas, Mauricio Reyes, Andras Jakab, Stefan Bauer, Markus Rempfler, Alessandro Crimi, Russell Takeshi Shinohara, Christoph Berger, Sung Min Ha, Martin Rozycki, Marcel Prastawa, Esther Alberts, Jana Lipkova, John Freymann, Justin Kirby, Michel Bilello, Hassan Fathallah-Shaykh, Roland Wiest, Jan Kirschke, Benedikt Wiestler, Rivka Colen, Aikaterini Kotrotsou, Pamela Lamontagne, Daniel Marcus, Mikhail Milchenko , et al. (402 additional authors not shown)

    Abstract: Gliomas are the most common primary brain malignancies, with different degrees of aggressiveness, variable prognosis and various heterogeneous histologic sub-regions, i.e., peritumoral edematous/invaded tissue, necrotic core, active and non-enhancing core. This intrinsic heterogeneity is also portrayed in their radio-phenotype, as their sub-regions are depicted by varying intensity profiles dissem… ▽ More

    Submitted 23 April, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

    Comments: The International Multimodal Brain Tumor Segmentation (BraTS) Challenge

  18. arXiv:1605.02140  [pdf, other

    cs.CV

    Matrix Factorization-Based Clustering Of Image Features For Bandwidth-Constrained Information Retrieval

    Authors: Jacob Chakareski, Immanuel Manohar, Shantanu Rane

    Abstract: We consider the problem of accurately and efficiently querying a remote server to retrieve information about images captured by a mobile device. In addition to reduced transmission overhead and computational complexity, the retrieval protocol should be robust to variations in the image acquisition process, such as translation, rotation, scaling, and sensor-related differences. We propose to extrac… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

    Comments: 6 Pages, 7 figures, ICMEWorkshop 2016

    MSC Class: 62h25; ACM Class: I.4

  19. arXiv:1512.07636  [pdf, other

    cs.IT cs.AI cs.IR

    Representation and Coding of Signal Geometry

    Authors: Petros T Boufounos, Shantanu Rane, Hassan Mansour

    Abstract: Approaches to signal representation and coding theory have traditionally focused on how to best represent signals using parsimonious representations that incur the lowest possible distortion. Classical examples include linear and non-linear approximations, sparse representations, and rate-distortion theory. Very often, however, the goal of processing is to extract specific information from the sig… ▽ More

    Submitted 23 December, 2015; originally announced December 2015.

  20. arXiv:1402.4360  [pdf, ps, other

    cs.CR cs.IT

    An Elementary Completeness Proof for Secure Two-Party Computation Primitives

    Authors: Ye Wang, Prakash Ishwar, Shantanu Rane

    Abstract: In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and output. For semi-honest parties and information-theoretic security guarantees, it is well-known that, if only noiseless communication is available,… ▽ More

    Submitted 12 December, 2014; v1 submitted 18 February, 2014; originally announced February 2014.

    Comments: 6 pages, extended version of ITW 2014 paper

  21. arXiv:1311.1490  [pdf, other

    cs.CR cs.GT cs.IT

    On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games

    Authors: Ye Wang, Shantanu Rane, Prakash Ishwar

    Abstract: In game theory, a trusted mediator acting on behalf of the players can enable the attainment of correlated equilibria, which may provide better payoffs than those available from the Nash equilibria alone. We explore the approach of replacing the trusted mediator with an unconditionally secure sampling protocol that jointly generates the players' actions. We characterize the joint distributions tha… ▽ More

    Submitted 6 November, 2013; originally announced November 2013.

    Comments: 4 pages, to appear at GlobalSIP 2013

  22. Secure Biometrics: Concepts, Authentication Architectures and Challenges

    Authors: Shantanu Rane, Ye Wang, Stark. C. Draper, Prakash Ishwar

    Abstract: BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, bio- metrics are fundamentally noisy and irreplaceable. There are always slight variatio… ▽ More

    Submitted 21 May, 2013; originally announced May 2013.

    Comments: 16 pages, 11 figures, 1 table

  23. arXiv:1304.4613  [pdf, other

    cs.CR cs.DB cs.DS

    On the Benefits of Sampling in Privacy Preserving Statistical Analysis on Distributed Databases

    Authors: Bing-Rong Lin, Ye Wang, Shantanu Rane

    Abstract: We consider a problem where mutually untrusting curators possess portions of a vertically partitioned database containing information about a set of individuals. The goal is to enable an authorized party to obtain aggregate (statistical) information from the database while protecting the privacy of the individuals, which we formalize using Differential Privacy. This process can be facilitated by a… ▽ More

    Submitted 16 April, 2013; originally announced April 2013.

    Comments: 11 pages, 9 figures

  24. arXiv:1206.2669  [pdf, other

    cs.CR cs.IT

    Information-Theoretically Secure Three-Party Computation with One Corrupted Party

    Authors: Ye Wang, Prakash Ishwar, Shantanu Rane

    Abstract: The problem in which one of three pairwise interacting parties is required to securely compute a function of the inputs held by the other two, when one party may arbitrarily deviate from the computation protocol (active behavioral model), is studied. An information-theoretic characterization of unconditionally secure computation protocols under the active behavioral model is provided. A protocol f… ▽ More

    Submitted 4 February, 2013; v1 submitted 12 June, 2012; originally announced June 2012.

    Comments: 7 pages, 1 figure, submitted to ISIT 2013

  25. arXiv:1112.5630  [pdf, other

    cs.IT cs.CR

    A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems

    Authors: Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar

    Abstract: We present a theoretical framework for the analysis of privacy and security tradeoffs in secure biometric authentication systems. We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches. We derive upper bounds for the probability of false rejection ($P_{FR}$)… ▽ More

    Submitted 23 December, 2011; originally announced December 2011.

    Comments: 15 pages

  26. arXiv:1010.0670  [pdf, other

    cs.CR cs.IT

    Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost

    Authors: Ye Wang, Shantanu Rane, Prakash Ishwar, Wei Sun

    Abstract: Consider a network of k parties, each holding a long sequence of n entries (a database), with minimum vertex-cut greater than t. We show that any empirical statistic across the network of databases can be computed by each party with perfect privacy, against any set of t < k/2 passively colluding parties, such that the worst-case distortion and communication cost (in bits per database entry) both g… ▽ More

    Submitted 18 February, 2014; v1 submitted 4 October, 2010; originally announced October 2010.

    Comments: 12 pages, 6 figures