Skip to main content

Showing 1–50 of 201 results for author: Roy, D

  1. arXiv:2407.09661  [pdf, other

    cs.HC cs.CL

    Bridging Dictionary: AI-Generated Dictionary of Partisan Language Use

    Authors: Hang Jiang, Doug Beeferman, William Brannon, Andrew Heyward, Deb Roy

    Abstract: Words often carry different meanings for people from diverse backgrounds. Today's era of social polarization demands that we choose words carefully to prevent miscommunication, especially in political communication and journalism. To address this issue, we introduce the Bridging Dictionary, an interactive tool designed to illuminate how words are perceived by people with different political views.… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: Accepted to CSCW Demo 2024

  2. arXiv:2407.00950  [pdf, other

    cs.LG stat.ML

    Causal Bandits: The Pareto Optimal Frontier of Adaptivity, a Reduction to Linear Bandits, and Limitations around Unknown Marginals

    Authors: Ziyi Liu, Idan Attias, Daniel M. Roy

    Abstract: In this work, we investigate the problem of adapting to the presence or absence of causal structure in multi-armed bandit problems. In addition to the usual reward signal, we assume the learner has access to additional variables, observed in each round after acting. When these variables $d$-separate the action from the reward, existing work in causal bandits demonstrates that one can achieve stric… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: Accepted to ICML 2024

  3. arXiv:2406.17737  [pdf, other

    cs.CL cs.AI cs.LG

    LLM Targeted Underperformance Disproportionately Impacts Vulnerable Users

    Authors: Elinor Poole-Dayan, Deb Roy, Jad Kabbara

    Abstract: While state-of-the-art Large Language Models (LLMs) have shown impressive performance on many tasks, there has been extensive research on undesirable model behavior such as hallucinations and bias. In this work, we investigate how the quality of LLM responses changes in terms of information accuracy, truthfulness, and refusals depending on three user traits: English proficiency, education level, a… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  4. arXiv:2406.12452  [pdf, other

    cs.CV cs.AI cs.LG

    Insect Identification in the Wild: The AMI Dataset

    Authors: Aditya Jain, Fagner Cunha, Michael James Bunsen, Juan Sebastián Cañas, Léonard Pasi, Nathan Pinoy, Flemming Helsing, JoAnne Russo, Marc Botham, Michael Sabourin, Jonathan Fréchette, Alexandre Anctil, Yacksecari Lopez, Eduardo Navarro, Filonila Perez Pimentel, Ana Cecilia Zamora, José Alejandro Ramirez Silva, Jonathan Gagnon, Tom August, Kim Bjerge, Alba Gomez Segura, Marc Bélisle, Yves Basset, Kent P. McFarland, David Roy , et al. (3 additional authors not shown)

    Abstract: Insects represent half of all global biodiversity, yet many of the world's insects are disappearing, with severe implications for ecosystems and agriculture. Despite this crisis, data on insect diversity and abundance remain woefully inadequate, due to the scarcity of human experts and the lack of scalable tools for monitoring. Ecologists have started to adopt camera traps to record and study inse… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  5. arXiv:2406.05968  [pdf, other

    eess.AS cs.CL

    Prompting Large Language Models with Audio for General-Purpose Speech Summarization

    Authors: Wonjune Kang, Deb Roy

    Abstract: In this work, we introduce a framework for speech summarization that leverages the processing and reasoning capabilities of large language models (LLMs). We propose an end-to-end system that combines an instruction-tuned LLM with an audio encoder that converts speech into token representations that the LLM can interpret. Using a dataset with paired speech-text data, the overall system is trained t… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: Accepted to Interspeech 2024

  6. arXiv:2405.17304  [pdf, ps, other

    cs.LO eess.SY

    Stochastic Omega-Regular Verification and Control with Supermartingales

    Authors: Alessandro Abate, Mirco Giacobbe, Diptarko Roy

    Abstract: We present for the first time a supermartingale certificate for $ω$-regular specifications. We leverage the Robbins & Siegmund convergence theorem to characterize supermartingale certificates for the almost-sure acceptance of Streett conditions on general stochastic processes, which we call Streett supermartingales. This enables effective verification and control of discrete-time stochastic dynami… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: The conference version of this manuscript appeared at CAV'24

  7. arXiv:2404.09473  [pdf, other

    cs.IR

    Exploring the Nexus Between Retrievability and Query Generation Strategies

    Authors: Aman Sinha, Priyanshu Raj Mall, Dwaipayan Roy

    Abstract: Quantifying bias in retrieval functions through document retrievability scores is vital for assessing recall-oriented retrieval systems. However, many studies investigating retrieval model bias lack validation of their query generation methods as accurate representations of retrievability for real users and their queries. This limitation results from the absence of established criteria for query g… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Accepted at ECIR 2024

  8. arXiv:2404.06498  [pdf, other

    cs.LG stat.ML

    Simultaneous linear connectivity of neural networks modulo permutation

    Authors: Ekansh Sharma, Devin Kwok, Tom Denton, Daniel M. Roy, David Rolnick, Gintare Karolina Dziugaite

    Abstract: Neural networks typically exhibit permutation symmetries which contribute to the non-convexity of the networks' loss landscapes, since linearly interpolating between two permuted versions of a trained network tends to encounter a high loss barrier. Recent work has argued that permutation symmetries are the only sources of non-convexity, meaning there are essentially no such barriers between traine… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: 11 pages, 6 figures

  9. arXiv:2403.18247  [pdf, other

    cs.CR cs.IT

    An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay

    Abstract: Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital sign… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  10. arXiv:2403.04123  [pdf, other

    cs.SE cs.CL cs.LG

    Exploring LLM-based Agents for Root Cause Analysis

    Authors: Devjeet Roy, Xuchao Zhang, Rashi Bhave, Chetan Bansal, Pedro Las-Casas, Rodrigo Fonseca, Saravan Rajmohan

    Abstract: The growing complexity of cloud based software systems has resulted in incident management becoming an integral part of the software development lifecycle. Root cause analysis (RCA), a critical part of the incident management process, is a demanding task for on-call engineers, requiring deep domain knowledge and extensive experience with a team's specific services. Automation of RCA can result in… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  11. arXiv:2402.17019  [pdf, other

    cs.CL cs.HC

    Leveraging Large Language Models for Learning Complex Legal Concepts through Storytelling

    Authors: Hang Jiang, Xiajie Zhang, Robert Mahari, Daniel Kessler, Eric Ma, Tal August, Irene Li, Alex 'Sandy' Pentland, Yoon Kim, Deb Roy, Jad Kabbara

    Abstract: Making legal knowledge accessible to non-experts is crucial for enhancing general legal literacy and encouraging civic participation in democracy. However, legal documents are often challenging to understand for people without legal backgrounds. In this paper, we present a novel application of large language models (LLMs) in legal education to help non-experts learn intricate legal concepts throug… ▽ More

    Submitted 2 July, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: Accepted to ACL 2024

  12. arXiv:2402.16173  [pdf

    cs.NI cs.AI

    Communication Traffic Characteristics Reveal an IoT Devices Identity

    Authors: Rajarshi Roy Chowdhury, Debashish Roy, Pg Emeroylariffion Abas

    Abstract: Internet of Things (IoT) is one of the technological advancements of the twenty-first century which can improve living standards. However, it also imposes new types of security challenges, including device authentication, traffic types classification, and malicious traffic identification, in the network domain. Traditionally, internet protocol (IP) and media access control (MAC) addresses are util… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

    Comments: 16 pages

    ACM Class: F.2.2; I.2.7

  13. arXiv:2402.09327  [pdf, other

    cs.LG

    Information Complexity of Stochastic Convex Optimization: Applications to Generalization and Memorization

    Authors: Idan Attias, Gintare Karolina Dziugaite, Mahdi Haghifam, Roi Livni, Daniel M. Roy

    Abstract: In this work, we investigate the interplay between memorization and learning in the context of \emph{stochastic convex optimization} (SCO). We define memorization via the information a learning algorithm reveals about its training data points. We then quantify this information using the framework of conditional mutual information (CMI) proposed by Steinke and Zakynthinou (2020). Our main result is… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 44 Pages

  14. arXiv:2402.04896  [pdf, other

    cs.NI cs.LG

    Learning from the Best: Active Learning for Wireless Communications

    Authors: Nasim Soltani, Jifan Zhang, Batool Salehi, Debashri Roy, Robert Nowak, Kaushik Chowdhury

    Abstract: Collecting an over-the-air wireless communications training dataset for deep learning-based communication tasks is relatively simple. However, labeling the dataset requires expert involvement and domain knowledge, may involve private intellectual properties, and is often computationally and financially expensive. Active learning is an emerging area of research in machine learning that aims to redu… ▽ More

    Submitted 23 January, 2024; originally announced February 2024.

  15. arXiv:2402.01669  [pdf, other

    cs.CY cs.AI cs.LG

    Improved Performances and Motivation in Intelligent Tutoring Systems: Combining Machine Learning and Learner Choice

    Authors: Benjamin Clément, Hélène Sauzéon, Didier Roy, Pierre-Yves Oudeyer

    Abstract: Large class sizes pose challenges to personalized learning in schools, which educational technologies, especially intelligent tutoring systems (ITS), aim to address. In this context, the ZPDES algorithm, based on the Learning Progress Hypothesis (LPH) and multi-armed bandit machine learning techniques, sequences exercises that maximize learning progress (LP). This algorithm was previously shown in… ▽ More

    Submitted 16 January, 2024; originally announced February 2024.

    Comments: 29 pages, 37 figures

    ACM Class: I.2.1; I.2.6

  16. arXiv:2401.14135  [pdf, other

    cs.CL cs.CY cs.LG

    Convolutional Neural Networks can achieve binary bail judgement classification

    Authors: Amit Barman, Devangan Roy, Debapriya Paul, Indranil Dutta, Shouvik Kumar Guha, Samir Karmakar, Sudip Kumar Naskar

    Abstract: There is an evident lack of implementation of Machine Learning (ML) in the legal domain in India, and any research that does take place in this domain is usually based on data from the higher courts of law and works with English data. The lower courts and data from the different regional languages of India are often overlooked. In this paper, we deploy a Convolutional Neural Network (CNN) architec… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted on 20th International Conference on Natural Language Processing (ICON)

  17. arXiv:2401.02110  [pdf, other

    cs.CV

    Significance of Anatomical Constraints in Virtual Try-On

    Authors: Debapriya Roy, Sanchayan Santra, Diganta Mukherjee, Bhabatosh Chanda

    Abstract: The system of Virtual Try-ON (VTON) allows a user to try a product virtually. In general, a VTON system takes a clothing source and a person's image to predict the try-on output of the person in the given clothing. Although existing methods perform well for simple poses, in case of bent or crossed arms posture or when there is a significant difference between the alignment of the source clothing a… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2208.08076

  18. arXiv:2312.17127  [pdf, other

    cs.PL cs.LO math.PR

    Probabilistic programming interfaces for random graphs: Markov categories, graphons, and nominal sets

    Authors: Nathanael L. Ackerman, Cameron E. Freer, Younesse Kaddar, Jacek Karwowski, Sean K. Moss, Daniel M. Roy, Sam Staton, Hongseok Yang

    Abstract: We study semantic models of probabilistic programming languages over graphs, and establish a connection to graphons from graph theory and combinatorics. We show that every well-behaved equational theory for our graph probabilistic programming language corresponds to a graphon, and conversely, every graphon arises in this way. We provide three constructions for showing that every graphon arises f… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

    Comments: Accepted for POPL 2024

    Journal ref: Proc. ACM Program. Lang. 8, POPL, Article 61 (2024), pp 1819-1849

  19. arXiv:2312.16322  [pdf, other

    cs.CR

    Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management

    Authors: Vikas Srivastava, Paresh Baidya, Sihem Mesnager, Debasish Roy, Sumit Kumar Debnath

    Abstract: Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secur… ▽ More

    Submitted 25 March, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  20. arXiv:2312.01869  [pdf, ps, other

    cs.NI eess.SY

    TCP Slice: A semi-distributed TCP algorithm for Delay-constrained Applications

    Authors: Dibbendu Roy, Goutam Das

    Abstract: The TCP congestion control protocol serves as the cornerstone of reliable internet communication. However, as new applications require more specific guarantees regarding data rate and delay, network management must adapt. Thus, service providers are shifting from decentralized to centralized control of the network using a software-defined network controller (SDN). The SDN classifies applications a… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  21. arXiv:2312.01007  [pdf, other

    cs.IR cs.AI

    A Hypergraph-Based Approach to Recommend Online Resources in a Library

    Authors: Debashish Roy, Rajarshi Roy Chowdhury

    Abstract: When users in a digital library read or browse online resources, it generates an immense amount of data. If the underlying system can recommend items, such as books and journals, to the users, it will help them to find the related items. This research analyzes a digital library's usage data to recommend items to its users, and it uses different clustering algorithms to design the recommender syste… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 12 Pages, 2 figures, and 1 table

  22. arXiv:2311.13333  [pdf, other

    cs.OS

    Trace-enabled Timing Model Synthesis for ROS2-based Autonomous Applications

    Authors: Hazem Abaza, Debayan Roy, Shiqing Fan, Selma Saidi, Antonios Motakis

    Abstract: Autonomous applications are typically developed over Robot Operating System 2.0 (ROS2) even in time-critical systems like automotive. Recent years have seen increased interest in developing model-based timing analysis and schedule optimization approaches for ROS2-based applications. To complement these approaches, we propose a tracing and measurement framework to obtain timing models of ROS2-based… ▽ More

    Submitted 23 November, 2023; v1 submitted 22 November, 2023; originally announced November 2023.

  23. arXiv:2311.10348  [pdf, other

    cs.IR

    A Comparative Analysis of Retrievability and PageRank Measures

    Authors: Aman Sinha, Priyanshu Raj Mall, Dwaipayan Roy

    Abstract: The accessibility of documents within a collection holds a pivotal role in Information Retrieval, signifying the ease of locating specific content in a collection of documents. This accessibility can be achieved via two distinct avenues. The first is through some retrieval model using a keyword or other feature-based search, and the other is where a document can be navigated using links associated… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: Accepted at FIRE 2023

  24. arXiv:2311.04592  [pdf, other

    cs.LG cs.CV

    On Characterizing the Evolution of Embedding Space of Neural Networks using Algebraic Topology

    Authors: Suryaka Suresh, Bishshoy Das, Vinayak Abrol, Sumantra Dutta Roy

    Abstract: We study how the topology of feature embedding space changes as it passes through the layers of a well-trained deep neural network (DNN) through Betti numbers. Motivated by existing studies using simplicial complexes on shallow fully connected networks (FCN), we present an extended analysis using Cubical homology instead, with a variety of popular deep architectures and real image datasets. We dem… ▽ More

    Submitted 9 November, 2023; v1 submitted 8 November, 2023; originally announced November 2023.

  25. arXiv:2311.04581  [pdf, other

    cs.AR cs.CR

    KiD: A Hardware Design Framework Targeting Unified NTT Multiplication for CRYSTALS-Kyber and CRYSTALS-Dilithium on FPGA

    Authors: Suraj Mandal, Debapriya Basu Roy

    Abstract: Large-degree polynomial multiplication is an integral component of post-quantum secure lattice-based cryptographic algorithms like CRYSTALS-Kyber and Dilithium. The computational complexity of large-degree polynomial multiplication can be reduced significantly through Number Theoretic Transformation (NTT). In this paper, we aim to develop a unified and shared NTT architecture that can support poly… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  26. arXiv:2311.01463  [pdf, other

    cs.CL cs.AI cs.CV cs.LG cs.NE

    Creating Trustworthy LLMs: Dealing with Hallucinations in Healthcare AI

    Authors: Muhammad Aurangzeb Ahmad, Ilker Yaramis, Taposh Dutta Roy

    Abstract: Large language models have proliferated across multiple domains in as short period of time. There is however hesitation in the medical and healthcare domain towards their adoption because of issues like factuality, coherence, and hallucinations. Give the high stakes nature of healthcare, many researchers have even cautioned against its usage until these issues are resolved. The key to the implemen… ▽ More

    Submitted 26 September, 2023; originally announced November 2023.

  27. arXiv:2310.12131  [pdf, other

    cs.IR

    Automated Attribute Extraction from Legal Proceedings

    Authors: Subinay Adhikary, Sagnik Das, Sagnik Saha, Procheta Sen, Dwaipayan Roy, Kripabandhu Ghosh

    Abstract: The escalating number of pending cases is a growing concern world-wide. Recent advancements in digitization have opened up possibilities for leveraging artificial intelligence (AI) tools in the processing of legal documents. Adopting a structured representation for legal documents, as opposed to a mere bag-of-words flat text representation, can significantly enhance processing capabilities. With t… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Presented in Mining and Learning in the Legal Domain (MLLD) workshop 2023

  28. arXiv:2310.09508  [pdf, other

    cs.IR

    Findability: A Novel Measure of Information Accessibility

    Authors: Aman Sinha, Priyanshu Raj Mall, Dwaipayan Roy

    Abstract: The overwhelming volume of data generated and indexed by search engines poses a significant challenge in retrieving documents from the index efficiently and effectively. Even with a well-crafted query, several relevant documents often get buried among a multitude of competing documents, resulting in reduced accessibility or `findability' of the desired document. Consequently, it is crucial to deve… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Accepted at CIKM 2023

  29. arXiv:2310.02959  [pdf, other

    cs.AR cs.DC cs.OS

    Co-Optimizing Cache Partitioning and Multi-Core Task Scheduling: Exploit Cache Sensitivity or Not?

    Authors: Binqi Sun, Debayan Roy, Tomasz Kloda, Andrea Bastoni, Rodolfo Pellizzoni, Marco Caccamo

    Abstract: Cache partitioning techniques have been successfully adopted to mitigate interference among concurrently executing real-time tasks on multi-core processors. Considering that the execution time of a cache-sensitive task strongly depends on the cache available for it to use, co-optimizing cache partitioning and task allocation improves the system's schedulability. In this paper, we propose a hybrid… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: to be published in IEEE Real-Time Systems Symposium (RTSS), 2023

  30. arXiv:2309.06377  [pdf, other

    quant-ph cs.LG

    Adversarial attacks on hybrid classical-quantum Deep Learning models for Histopathological Cancer Detection

    Authors: Biswaraj Baral, Reek Majumdar, Bhavika Bhalgamiya, Taposh Dutta Roy

    Abstract: We present an effective application of quantum machine learning in histopathological cancer detection. The study here emphasizes two primary applications of hybrid classical-quantum Deep Learning models. The first application is to build a classification model for histopathological cancer detection using the quantum transfer learning strategy. The second application is to test the performance of t… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: 7 pages, 8 figures, 2 Tables

  31. arXiv:2309.05550  [pdf, other

    cs.CR

    Multiplierless Design of High-Speed Very Large Constant Multiplications

    Authors: Levent Aksoy, Debapriya Basu Roy, Malik Imran, Samuel Pagliarini

    Abstract: In cryptographic algorithms, the constants to be multiplied by a variable can be very large due to security requirements. Thus, the hardware complexity of such algorithms heavily depends on the design architecture handling large constants. In this paper, we introduce an electronic design automation tool, called LEIGER, which can automatically generate the realizations of very large constant multip… ▽ More

    Submitted 12 September, 2023; v1 submitted 11 September, 2023; originally announced September 2023.

  32. arXiv:2308.15556  [pdf

    cs.SI

    Polarized Speech on Online Platforms

    Authors: Suyash Fulay, Deb Roy

    Abstract: While political polarization has increased as measured through surveys, currently we lack comprehensive, longitudinal, and ecologically valid measurement of the polarization of online political speech that spans social media platforms. Using language models, we analyze ~2.5 billion comments on Reddit and Twitter across ~1.7 million accounts from 2007-2023 and find that polarized speech has been ri… ▽ More

    Submitted 7 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  33. arXiv:2308.14647  [pdf, other

    cs.LG cs.DC cs.DM math.OC

    Edge Generation Scheduling for DAG Tasks Using Deep Reinforcement Learning

    Authors: Binqi Sun, Mirco Theile, Ziyuan Qin, Daniele Bernardini, Debayan Roy, Andrea Bastoni, Marco Caccamo

    Abstract: Directed acyclic graph (DAG) tasks are currently adopted in the real-time domain to model complex applications from the automotive, avionics, and industrial domains that implement their functionalities through chains of intercommunicating tasks. This paper studies the problem of scheduling real-time DAG tasks by presenting a novel schedulability test based on the concept of trivial schedulability.… ▽ More

    Submitted 10 January, 2024; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted for publication in IEEE Transactions on Computers

  34. arXiv:2308.09098  [pdf, other

    cs.CV

    ImGeoNet: Image-induced Geometry-aware Voxel Representation for Multi-view 3D Object Detection

    Authors: Tao Tu, Shun-Po Chuang, Yu-Lun Liu, Cheng Sun, Ke Zhang, Donna Roy, Cheng-Hao Kuo, Min Sun

    Abstract: We propose ImGeoNet, a multi-view image-based 3D object detection framework that models a 3D space by an image-induced geometry-aware voxel representation. Unlike previous methods which aggregate 2D features into 3D voxels without considering geometry, ImGeoNet learns to induce geometry from multi-view images to alleviate the confusion arising from voxels of free space, and during the inference ph… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: ICCV'23; project page: https://ttaoretw.github.io/imgeonet/

  35. arXiv:2307.08987  [pdf, other

    cs.NI cs.AI cs.MM

    AI-assisted Improved Service Provisioning for Low-latency XR over 5G NR

    Authors: Moyukh Laha, Dibbendu Roy, Sourav Dutta, Goutam Das

    Abstract: Extended Reality (XR) is one of the most important 5G/6G media applications that will fundamentally transform human interactions. However, ensuring low latency, high data rate, and reliability to support XR services poses significant challenges. This letter presents a novel AI-assisted service provisioning scheme that leverages predicted frames for processing rather than relying solely on actual f… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  36. arXiv:2307.08593  [pdf, other

    physics.acc-ph cs.LG hep-ex nucl-ex nucl-th

    Artificial Intelligence for the Electron Ion Collider (AI4EIC)

    Authors: C. Allaire, R. Ammendola, E. -C. Aschenauer, M. Balandat, M. Battaglieri, J. Bernauer, M. Bondì, N. Branson, T. Britton, A. Butter, I. Chahrour, P. Chatagnon, E. Cisbani, E. W. Cline, S. Dash, C. Dean, W. Deconinck, A. Deshpande, M. Diefenthaler, R. Ent, C. Fanelli, M. Finger, M. Finger, Jr., E. Fol, S. Furletov , et al. (70 additional authors not shown)

    Abstract: The Electron-Ion Collider (EIC), a state-of-the-art facility for studying the strong force, is expected to begin commissioning its first experiments in 2028. This is an opportune time for artificial intelligence (AI) to be included from the start at this facility and in all phases that lead up to the experiments. The second annual workshop organized by the AI4EIC working group, which recently took… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 27 pages, 11 figures, AI4EIC workshop, tutorials and hackathon

  37. arXiv:2307.00586  [pdf, other

    cs.CV

    ClipSitu: Effectively Leveraging CLIP for Conditional Predictions in Situation Recognition

    Authors: Debaditya Roy, Dhruv Verma, Basura Fernando

    Abstract: Situation Recognition is the task of generating a structured summary of what is happening in an image using an activity verb and the semantic roles played by actors and objects. In this task, the same activity verb can describe a diverse set of situations as well as the same actor or object category can play a diverse set of semantic roles depending on the situation depicted in the image. Hence a… ▽ More

    Submitted 11 September, 2023; v1 submitted 2 July, 2023; originally announced July 2023.

    Comments: State-of-the-art results on Grounded Situation Recognition

  38. arXiv:2306.17759  [pdf, other

    stat.ML cs.LG

    The Shaped Transformer: Attention Models in the Infinite Depth-and-Width Limit

    Authors: Lorenzo Noci, Chuning Li, Mufan Bill Li, Bobby He, Thomas Hofmann, Chris Maddison, Daniel M. Roy

    Abstract: In deep learning theory, the covariance matrix of the representations serves as a proxy to examine the network's trainability. Motivated by the success of Transformers, we study the covariance matrix of a modified Softmax-based attention model with skip connections in the proportional limit of infinite-depth-and-width. We show that at initialization the limiting distribution can be described by a… ▽ More

    Submitted 9 December, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

  39. arXiv:2305.14321  [pdf, other

    cs.CL

    ConGraT: Self-Supervised Contrastive Pretraining for Joint Graph and Text Embeddings

    Authors: William Brannon, Wonjune Kang, Suyash Fulay, Hang Jiang, Brandon Roy, Deb Roy, Jad Kabbara

    Abstract: Learning on text-attributed graphs (TAGs), in which nodes are associated with one or more texts, has been the subject of much recent work. However, most approaches tend to make strong assumptions about the downstream task of interest, are reliant on hand-labeled data, or fail to equally balance the importance of both text and graph representations. In this work, we propose Contrastive Graph-Text p… ▽ More

    Submitted 9 July, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: New visualizations, added references, and an application to community detection. To appear at the TextGraphs workshop @ ACL 2024. 21 pages, 5 figures, 13 tables

  40. arXiv:2305.10350  [pdf, other

    eess.SP cs.LG cs.NI

    Multiverse at the Edge: Interacting Real World and Digital Twins for Wireless Beamforming

    Authors: Batool Salehi, Utku Demir, Debashri Roy, Suyash Pradhan, Jennifer Dy, Stratis Ioannidis, Kaushik Chowdhury

    Abstract: Creating a digital world that closely mimics the real world with its many complex interactions and outcomes is possible today through advanced emulation software and ubiquitous computing power. Such a software-based emulation of an entity that exists in the real world is called a 'digital twin'. In this paper, we consider a twin of a wireless millimeter-wave band radio that is mounted on a vehicle… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  41. arXiv:2305.02673  [pdf, other

    cs.CV

    Modelling Spatio-Temporal Interactions for Compositional Action Recognition

    Authors: Ramanathan Rajendiran, Debaditya Roy, Basura Fernando

    Abstract: Humans have the natural ability to recognize actions even if the objects involved in the action or the background are changed. Humans can abstract away the action from the appearance of the objects and their context which is referred to as compositionality of actions. Compositional action recognition deals with imparting human-like compositional generalization abilities to action-recognition model… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  42. arXiv:2305.02547  [pdf, other

    cs.CL cs.AI cs.HC

    PersonaLLM: Investigating the Ability of Large Language Models to Express Personality Traits

    Authors: Hang Jiang, Xiajie Zhang, Xubo Cao, Cynthia Breazeal, Deb Roy, Jad Kabbara

    Abstract: Despite the many use cases for large language models (LLMs) in creating personalized chatbots, there has been limited research on evaluating the extent to which the behaviors of personalized LLMs accurately and consistently reflect specific personality traits. We consider studying the behavior of LLM-based agents which we refer to as LLM personas and present a case study with GPT-3.5 and GPT-4 to… ▽ More

    Submitted 2 April, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: First version in 05/2023. Accepted at NAACL Findings 2024

  43. arXiv:2304.08967  [pdf, other

    cs.CY stat.AP

    All a-board: sharing educational data science research with school districts

    Authors: Nabeel Gillani, Doug Beeferman, Cassandra Overney, Christine Vega-Pourheydarian, Deb Roy

    Abstract: Educational data scientists often conduct research with the hopes of translating findings into lasting change through policy, civil society, or other channels. However, the bridge from research to practice can be fraught with sociopolitical frictions that impede, or altogether block, such translations -- especially when they are contentious or otherwise difficult to achieve. Focusing on one entren… ▽ More

    Submitted 5 July, 2023; v1 submitted 18 April, 2023; originally announced April 2023.

    Comments: In Proceedings of the Tenth ACM Conference on Learning at Scale (L@S '23)

  44. arXiv:2304.07195  [pdf, other

    cs.SI

    Divergences in Following Patterns between Influential Twitter Users and Their Audiences across Dimensions of Identity

    Authors: Suyash Fulay, Nabeel Gillani, Deb Roy

    Abstract: Identity spans multiple dimensions; however, the relative salience of a dimension of identity can vary markedly from person to person. Furthermore, there is often a difference between one's internal identity (how salient different aspects of one's identity are to oneself) and external identity (how salient different aspects are to the external world). We attempt to capture the internal and externa… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

    Comments: Accepted to ICWSM-2023, 5 pages

  45. arXiv:2304.04610  [pdf, other

    cs.CL

    Attention at SemEval-2023 Task 10: Explainable Detection of Online Sexism (EDOS)

    Authors: Debashish Roy, Manish Shrivastava

    Abstract: In this paper, we have worked on interpretability, trust, and understanding of the decisions made by models in the form of classification tasks. The task is divided into 3 subtasks. The first task consists of determining Binary Sexism Detection. The second task describes the Category of Sexism. The third task describes a more Fine-grained Category of Sexism. Our work explores solving these tasks a… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  46. arXiv:2303.16779  [pdf, other

    cs.CL cs.LG

    Language Models Trained on Media Diets Can Predict Public Opinion

    Authors: Eric Chu, Jacob Andreas, Stephen Ansolabehere, Deb Roy

    Abstract: Public opinion reflects and shapes societal behavior, but the traditional survey-based tools to measure it are limited. We introduce a novel approach to probe media diet models -- language models adapted to online news, TV broadcast, or radio show content -- that can emulate the opinions of subpopulations that have consumed a set of media. To validate this method, we use as ground truth the opinio… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  47. Retrievability in an Integrated Retrieval System: An Extended Study

    Authors: Dwaipayan Roy, Zeljko Carevic, Philipp Mayr

    Abstract: Retrievability measures the influence a retrieval system has on the access to information in a given collection of items. This measure can help in making an evaluation of the search system based on which insights can be drawn. In this paper, we investigate the retrievability in an integrated search system consisting of items from various categories, particularly focussing on datasets, publications… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

    Comments: To appear in International Journal on Digital Libraries (IJDL). arXiv admin note: substantial text overlap with arXiv:2205.00937

    Journal ref: 2023

  48. arXiv:2303.07603  [pdf, other

    cs.CY cs.AI

    Redrawing attendance boundaries to promote racial and ethnic diversity in elementary schools

    Authors: Nabeel Gillani, Doug Beeferman, Christine Vega-Pourheydarian, Cassandra Overney, Pascal Van Hentenryck, Deb Roy

    Abstract: Most US school districts draw "attendance boundaries" to define catchment areas that assign students to schools near their homes, often recapitulating neighborhood demographic segregation in schools. Focusing on elementary schools, we ask: how much might we reduce school segregation by redrawing attendance boundaries? Combining parent preference data with methods from combinatorial optimization, w… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: Supplementary materials: https://drive.google.com/file/d/1OCV9fnv3m7jNMlwfPA8Mfi0s7BD5qtJN/view

  49. arXiv:2303.04117  [pdf, other

    cs.AI cs.LG

    Validation of a Hospital Digital Twin with Machine Learning

    Authors: Muhammad Aurangzeb Ahmad, Vijay Chickarmane, Farinaz Sabz Ali Pour, Nima Shariari, Taposh Dutta Roy

    Abstract: Recently there has been a surge of interest in developing Digital Twins of process flows in healthcare to better understand bottlenecks and areas of improvement. A key challenge is in the validation process. We describe a work in progress for a digital twin using an agent based simulation model for determining bed turnaround time for patients in hospitals. We employ a strategy using machine learni… ▽ More

    Submitted 8 March, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

  50. arXiv:2302.09418  [pdf, other

    cs.CL cs.AI

    M-SENSE: Modeling Narrative Structure in Short Personal Narratives Using Protagonist's Mental Representations

    Authors: Prashanth Vijayaraghavan, Deb Roy

    Abstract: Narrative is a ubiquitous component of human communication. Understanding its structure plays a critical role in a wide variety of applications, ranging from simple comparative analyses to enhanced narrative retrieval, comprehension, or reasoning capabilities. Prior research in narratology has highlighted the importance of studying the links between cognitive and linguistic aspects of narratives f… ▽ More

    Submitted 18 February, 2023; originally announced February 2023.

    Comments: Accepted at AAAI-23