Skip to main content

Showing 1–50 of 133 results for author: Roy, P

  1. arXiv:2406.11734  [pdf, other

    cs.SE cs.DC cs.PF

    LibProf: A Python Profiler for Improving Cold Start Performance in Serverless Applications

    Authors: Syed Salauddin Mohammad Tariq, Ali Al Zein, Soumya Sripad Vaidya, Arati Khanolkar, Probir Roy

    Abstract: Serverless computing abstracts away server management, enabling automatic scaling and efficient resource utilization. However, cold-start latency remains a significant challenge, affecting end-to-end performance. Our preliminary study reveals that inefficient library initialization and usage are major contributors to this latency in Python-based serverless applications. We introduce LibProf, a Pyt… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2406.11731  [pdf, other

    cs.SE

    PerfCurator: Curating a large-scale dataset of performance bug-related commits from public repositories

    Authors: Md Abul Kalam Azad, Manoj Alexender, Matthew Alexender, Syed Salauddin Mohammad Tariq, Foyzul Hassan, Probir Roy

    Abstract: Performance bugs challenge software development, degrading performance and wasting computational resources. Software developers invest substantial effort in addressing these issues. Curating these performance bugs can offer valuable insights to the software engineering research community, aiding in developing new mitigation strategies. However, there is no large-scale open-source performance bugs… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  3. arXiv:2406.04626  [pdf, other

    cs.LG

    Adaptive Interface-PINNs (AdaI-PINNs): An Efficient Physics-informed Neural Networks Framework for Interface Problems

    Authors: Sumanta Roy, Chandrasekhar Annavarapu, Pratanu Roy, Antareep Kumar Sarma

    Abstract: We present an efficient physics-informed neural networks (PINNs) framework, termed Adaptive Interface-PINNs (AdaI-PINNs), to improve the modeling of interface problems with discontinuous coefficients and/or interfacial jumps. This framework is an enhanced version of its predecessor, Interface PINNs or I-PINNs (Sarma et al.; https://dx.doi.org/10.2139/ssrn.4766623), which involves domain decomposit… ▽ More

    Submitted 10 June, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: 17 pages, 8 figures, 6 tables

  4. arXiv:2405.02989  [pdf, other

    cs.CR eess.SY

    Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS

    Authors: Zain ul Abdeen, Padmaksha Roy, Ahmad Al-Tawaha, Rouxi Jia, Laura Freeman, Peter Beling, Chen-Ching Liu, Alberto Sangiovanni-Vincentelli, Ming Jin

    Abstract: There is an upward trend of deploying distributed energy resource management systems (DERMS) to control modern power grids. However, DERMS controller communication lines are vulnerable to cyberattacks that could potentially impact operational reliability. While a data-driven intrusion detection system (IDS) can potentially thwart attacks during deployment, also known as the evasion attack, the tra… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  5. arXiv:2404.15446  [pdf, other

    cs.CR eess.SY

    OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems

    Authors: Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri

    Abstract: Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compr… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  6. arXiv:2403.03223  [pdf, other

    cs.LG physics.comp-ph

    Exact Enforcement of Temporal Continuity in Sequential Physics-Informed Neural Networks

    Authors: Pratanu Roy, Stephen Castonguay

    Abstract: The use of deep learning methods in scientific computing represents a potential paradigm shift in engineering problem solving. One of the most prominent developments is Physics-Informed Neural Networks (PINNs), in which neural networks are trained to satisfy partial differential equations (PDEs). While this method shows promise, the standard version has been shown to struggle in accurately predict… ▽ More

    Submitted 7 March, 2024; v1 submitted 15 February, 2024; originally announced March 2024.

    Comments: 30 pages, 13 figures

  7. arXiv:2402.07255  [pdf, other

    cs.CL cs.CV

    American Sign Language Video to Text Translation

    Authors: Parsheeta Roy, Ji-Eun Han, Srishti Chouhan, Bhaavanaa Thumu

    Abstract: Sign language to text is a crucial technology that can break down communication barriers for individuals with hearing difficulties. We replicate and try to improve on a recently published study. We evaluate models using BLEU and rBLEU metrics to ensure translation quality. During our ablation study, we found that the model's performance is significantly influenced by optimizers, activation functio… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

  8. arXiv:2401.16878  [pdf, other

    cs.HC

    Enhancing EEG Signal-Based Emotion Recognition with Synthetic Data: Diffusion Model Approach

    Authors: Gourav Siddhad, Masakazu Iwamura, Partha Pratim Roy

    Abstract: Emotions are crucial in human life, influencing perceptions, relationships, behaviour, and choices. Emotion recognition using Electroencephalography (EEG) in the Brain-Computer Interface (BCI) domain presents significant challenges, particularly the need for extensive datasets. This study aims to generate synthetic EEG samples that are similar to real samples but are distinct by augmenting noise t… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: 8 Pages, 3 Figures, 2 Tables

  9. arXiv:2401.10245  [pdf, other

    cs.CE physics.flu-dyn

    Train Small, Model Big: Scalable Physics Simulators via Reduced Order Modeling and Domain Decomposition

    Authors: Seung Whan Chung, Youngsoo Choi, Pratanu Roy, Thomas Moore, Thomas Roy, Tiras Y. Lin, Du Y. Nguyen, Christopher Hahn, Eric B. Duoss, Sarah E. Baker

    Abstract: Numerous cutting-edge scientific technologies originate at the laboratory scale, but transitioning them to practical industry applications is a formidable challenge. Traditional pilot projects at intermediate scales are costly and time-consuming. An alternative, the E-pilot, relies on high-fidelity numerical simulations, but even these simulations can be computationally prohibitive at larger scale… ▽ More

    Submitted 5 December, 2023; originally announced January 2024.

    Comments: 40 pages, 12 figures. Submitted to Computer Methods in Applied Mechanics and Engineering

    Report number: LLNL-JRNL-857774 MSC Class: 65F55; 65N55 (primary) 76D07 (secondary)

  10. arXiv:2401.01481  [pdf, other

    cs.RO cs.MA

    Optimizing UAV-UGV Coalition Operations: A Hybrid Clustering and Multi-Agent Reinforcement Learning Approach for Path Planning in Obstructed Environment

    Authors: Shamyo Brotee, Farhan Kabir, Md. Abdur Razzaque, Palash Roy, Md. Mamun-Or-Rashid, Md. Rafiul Hassan, Mohammad Mehedi Hassan

    Abstract: One of the most critical applications undertaken by coalitions of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) is reaching predefined targets by following the most time-efficient routes while avoiding collisions. Unfortunately, UAVs are hampered by limited battery life, and UGVs face challenges in reachability due to obstacles and elevation variations. Existing literature pr… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  11. arXiv:2312.17300  [pdf, other

    cs.CR cs.LG

    Improving Intrusion Detection with Domain-Invariant Representation Learning in Latent Space

    Authors: Padmaksha Roy, Tyler Cody, Himanshu Singhal, Kevin Choi, Ming Jin

    Abstract: Domain generalization focuses on leveraging knowledge from multiple related domains with ample training data and labels to enhance inference on unseen in-distribution (IN) and out-of-distribution (OOD) domains. In our study, we introduce a two-phase representation learning technique using multi-task learning. This approach aims to cultivate a latent space from features spanning multiple domains, e… ▽ More

    Submitted 23 April, 2024; v1 submitted 28 December, 2023; originally announced December 2023.

  12. arXiv:2311.11250  [pdf, other

    cs.AI

    A Comprehensive Review on Sentiment Analysis: Tasks, Approaches and Applications

    Authors: Sudhanshu Kumar, Partha Pratim Roy, Debi Prosad Dogra, Byung-Gyu Kim

    Abstract: Sentiment analysis (SA) is an emerging field in text mining. It is the process of computationally identifying and categorizing opinions expressed in a piece of text over different social media platforms. Social media plays an essential role in knowing the customer mindset towards a product, services, and the latest market trends. Most organizations depend on the customer's response and feedback to… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

  13. arXiv:2310.16527  [pdf, other

    cs.CV cs.LG

    Enhancing Document Information Analysis with Multi-Task Pre-training: A Robust Approach for Information Extraction in Visually-Rich Documents

    Authors: Tofik Ali, Partha Pratim Roy

    Abstract: This paper introduces a deep learning model tailored for document information analysis, emphasizing document classification, entity relation extraction, and document visual question answering. The proposed model leverages transformer-based models to encode all the information present in a document image, including textual, visual, and layout information. The model is pre-trained and subsequently f… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  14. arXiv:2310.04513  [pdf, ps, other

    cs.CR

    A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning

    Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner

    Abstract: Machine learning (ML) is increasingly being deployed in critical systems. The data dependence of ML makes securing data used to train and test ML-enabled systems of utmost importance. While the field of cybersecurity has well-established practices for securing information, ML-enabled systems create new attack vectors. Furthermore, data science and cybersecurity domains adhere to their own set of s… ▽ More

    Submitted 4 December, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

  15. arXiv:2309.06424  [pdf

    cs.SE cs.AI cs.LG

    Unveiling the potential of large language models in generating semantic and cross-language clones

    Authors: Palash R. Roy, Ajmain I. Alam, Farouq Al-omari, Banani Roy, Chanchal K. Roy, Kevin A. Schneider

    Abstract: Semantic and Cross-language code clone generation may be useful for code reuse, code comprehension, refactoring and benchmarking. OpenAI's GPT model has potential in such clone generation as GPT is used for text generation. When developers copy/paste codes from Stack Overflow (SO) or within a system, there might be inconsistent changes leading to unexpected behaviours. Similarly, if someone posses… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: Accepted in IWSC

  16. arXiv:2308.13963  [pdf

    cs.SE

    GPTCloneBench: A comprehensive benchmark of semantic clones and cross-language clones using GPT-3 model and SemanticCloneBench

    Authors: Ajmain Inqiad Alam, Palash Ranjan Roy, Farouq Al-omari, Chanchal Kumar Roy, Banani Roy, Kevin Schneider

    Abstract: With the emergence of Machine Learning, there has been a surge in leveraging its capabilities for problem-solving across various domains. In the code clone realm, the identification of type-4 or semantic clones has emerged as a crucial yet challenging task. Researchers aim to utilize Machine Learning to tackle this challenge, often relying on the BigCloneBench dataset. However, it's worth noting t… ▽ More

    Submitted 1 September, 2023; v1 submitted 26 August, 2023; originally announced August 2023.

    Comments: Accepted in 39th IEEE International Conference on Software Maintenance and Evolution(ICSME 2023)

  17. Algebraic Reasoning About Timeliness

    Authors: Seyed Hossein Haeri, Peter W. Thompson, Peter Van Roy, Magne Haveraaen, Neil J. Davies, Mikhail Barash, Kevin Hammond, James Chapman

    Abstract: Designing distributed systems to have predictable performance under high load is difficult because of resource exhaustion, non-linearity, and stochastic behaviour. Timeliness, i.e., delivering results within defined time bounds, is a central aspect of predictable performance. In this paper, we focus on timeliness using the DELTA-Q Systems Development paradigm (DELTA-QSD, developed by PNSol), which… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: In Proceedings ICE 2023, arXiv:2308.08920

    ACM Class: B.8.2; C.4; D.2.4; D.2.8; F.3.2; F.3.1; F.4.1; F.4.3; I.1.1

    Journal ref: EPTCS 383, 2023, pp. 35-54

  18. arXiv:2308.02905  [pdf, other

    cs.CV cs.MM

    FAST: Font-Agnostic Scene Text Editing

    Authors: Alloy Das, Prasun Roy, Saumik Bhattacharya, Subhankar Ghosh, Umapada Pal, Michael Blumenstein

    Abstract: Scene Text Editing (STE) is a challenging research problem, and it aims to modify existing texts in an image while preserving the background and the font style of the original text of the image. Due to its various real-life applications, researchers have explored several approaches toward STE in recent years. However, most of the existing STE methods show inferior editing performance because of (1… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

    Comments: 13 pages, in submission

  19. arXiv:2308.02515  [pdf, other

    cs.LG cs.HC eess.SP

    Feature Reweighting for EEG-based Motor Imagery Classification

    Authors: Taveena Lotey, Prateek Keserwani, Debi Prosad Dogra, Partha Pratim Roy

    Abstract: Classification of motor imagery (MI) using non-invasive electroencephalographic (EEG) signals is a critical objective as it is used to predict the intention of limb movements of a subject. In recent research, convolutional neural network (CNN) based methods have been widely utilized for MI-EEG classification. The challenges of training neural networks for MI-EEG signals classification include low… ▽ More

    Submitted 29 July, 2023; originally announced August 2023.

  20. arXiv:2307.15991  [pdf, other

    cs.CV

    Separate Scene Text Detector for Unseen Scripts is Not All You Need

    Authors: Prateek Keserwani, Taveena Lotey, Rohit Keshari, Partha Pratim Roy

    Abstract: Text detection in the wild is a well-known problem that becomes more challenging while handling multiple scripts. In the last decade, some scripts have gained the attention of the research community and achieved good detection performance. However, many scripts are low-resourced for training deep learning-based scene text detectors. It raises a critical question: Is there a need for separate train… ▽ More

    Submitted 29 July, 2023; originally announced July 2023.

  21. arXiv:2307.10095  [pdf, other

    quant-ph cs.LO

    The Qudit ZH-Calculus: Generalised Toffoli+Hadamard and Universality

    Authors: Patrick Roy, John van de Wetering, Lia Yeh

    Abstract: We introduce the qudit ZH-calculus and show how to generalise all the phase-free qubit rules to qudits. We prove that for prime dimensions d, the phase-free qudit ZH-calculus is universal for matrices over the ring Z[e^2(pi)i/d]. For qubits, there is a strong connection between phase-free ZH-diagrams and Toffoli+Hadamard circuits, a computationally universal fragment of quantum circuits. We genera… ▽ More

    Submitted 1 September, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

    Comments: In Proceedings QPL 2023, arXiv:2308.15489

    Journal ref: EPTCS 384, 2023, pp. 142-170

  22. arXiv:2305.09123  [pdf, other

    cs.DC cs.CR

    CFT-Forensics: High-Performance Byzantine Accountability for Crash Fault Tolerant Protocols

    Authors: Weizhao Tang, Peiyao Sheng, Ronghao Ni, Pronoy Roy, Xuechao Wang, Giulia Fanti, Pramod Viswanath

    Abstract: Crash fault tolerant (CFT) consensus algorithms are commonly used in scenarios where system components are trusted -- e.g., enterprise settings and government infrastructure. However, CFT consensus can be broken by even a single corrupt node. A desirable property in the face of such potential Byzantine faults is \emph{accountability}: if a corrupt node breaks protocol and affects consensus safety,… ▽ More

    Submitted 3 June, 2024; v1 submitted 15 May, 2023; originally announced May 2023.

  23. arXiv:2304.11993  [pdf, other

    cs.CV cs.MM

    MMC: Multi-Modal Colorization of Images using Textual Descriptions

    Authors: Subhankar Ghosh, Saumik Bhattacharya, Prasun Roy, Umapada Pal, Michael Blumenstein

    Abstract: Handling various objects with different colors is a significant challenge for image colorization techniques. Thus, for complex real-world scenes, the existing image colorization algorithms often fail to maintain color consistency. In this work, we attempt to integrate textual descriptions as an auxiliary condition, along with the grayscale image that is to be colorized, to improve the fidelity of… ▽ More

    Submitted 25 April, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

    Comments: 9 pages

  24. arXiv:2303.07989  [pdf, other

    cs.CV cs.HC

    A CNN Based Framework for Unistroke Numeral Recognition in Air-Writing

    Authors: Prasun Roy, Subhankar Ghosh, Umapada Pal

    Abstract: Air-writing refers to virtually writing linguistic characters through hand gestures in three-dimensional space with six degrees of freedom. This paper proposes a generic video camera-aided convolutional neural network (CNN) based air-writing framework. Gestures are performed using a marker of fixed color in front of a generic video camera, followed by color-based segmentation to identify the marke… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: Accepted in The International Conference on Frontiers of Handwriting Recognition (ICFHR) 2018

  25. arXiv:2302.14728  [pdf, other

    cs.CV cs.MM

    Global Context-Aware Person Image Generation

    Authors: Prasun Roy, Saumik Bhattacharya, Subhankar Ghosh, Umapada Pal, Michael Blumenstein

    Abstract: We propose a data-driven approach for context-aware person image generation. Specifically, we attempt to generate a person image such that the synthesized instance can blend into a complex scene. In our method, the position, scale, and appearance of the generated person are semantically conditioned on the existing persons in the scene. The proposed technique is divided into three sequential steps.… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: 14 pages

  26. arXiv:2302.00558  [pdf, ps, other

    cs.PL

    Ideas for the future of Prolog inspired by Oz

    Authors: Peter Van Roy, Seif Haridi

    Abstract: Both Prolog and Oz are multiparadigm languages with a logic programming core. There is a significant subset of Oz that is a syntactic variant of Prolog: pure Prolog programs with green or blue cuts and bagof/3 or setof/3 can be translated directly to Oz. Because of this close relationship between Prolog and Oz, we propose that the extensions made by Oz to logic programming can be an inspiration fo… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: 15 pages, 0 figures

    ACM Class: D.3

  27. arXiv:2301.10336  [pdf, other

    cs.CR

    A survey of Digital Manufacturing Hardware and Software Trojans

    Authors: Prithwish Basu Roy, Mudit Bhargava, Chia-Yun Chang, Ellen Hui, Nikhil Gupta, Ramesh Karri, Hammond Pearce

    Abstract: Digital Manufacturing (DM) refers to the on-going adoption of smarter, more agile manufacturing processes and cyber-physical systems. This includes modern techniques and technologies such as Additive Manufacturing (AM)/3D printing, as well as the Industrial Internet of Things (IIoT) and the broader trend toward Industry 4.0. However, this adoption is not without risks: with a growing complexity an… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

    Comments: 15 pages

  28. arXiv:2301.00462  [pdf, other

    cs.LG

    A Latent Space Correlation-Aware Autoencoder for Anomaly Detection in Skewed Data

    Authors: Padmaksha Roy

    Abstract: Unsupervised learning-based anomaly detection in latent space has gained importance since discriminating anomalies from normal data becomes difficult in high-dimensional space. Both density estimation and distance-based methods to detect anomalies in latent space have been explored in the past. These methods prove that retaining valuable properties of input data in latent space helps in the better… ▽ More

    Submitted 15 February, 2024; v1 submitted 1 January, 2023; originally announced January 2023.

  29. arXiv:2211.09923  [pdf, other

    cs.PL cs.AI cs.LO

    Proceedings of the 2nd Workshop on Logic and Practice of Programming (LPOP)

    Authors: David S. Warren, Peter Van Roy, Yanhong A. Liu

    Abstract: This proceedings contains abstracts and position papers for the work presented at the second Logic and Practice of Programming (LPOP) Workshop. The workshop was held online, virtually in place of Chicago, USA, on November 15, 2010, in conjunction with the ACM SIGPLAN Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH) 2020. The purpose of this workshop i… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

  30. Apple Counting using Convolutional Neural Networks

    Authors: Nicolai Häni, Pravakar Roy, Volkan Isler

    Abstract: Estimating accurate and reliable fruit and vegetable counts from images in real-world settings, such as orchards, is a challenging problem that has received significant recent attention. Estimating fruit counts before harvest provides useful information for logistics planning. While considerable progress has been made toward fruit detection, estimating the actual counts remains challenging. In pra… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Journal ref: 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  31. arXiv:2208.02843  [pdf, other

    cs.CV

    TIC: Text-Guided Image Colorization

    Authors: Subhankar Ghosh, Prasun Roy, Saumik Bhattacharya, Umapada Pal, Michael Blumenstein

    Abstract: Image colorization is a well-known problem in computer vision. However, due to the ill-posed nature of the task, image colorization is inherently challenging. Though several attempts have been made by researchers to make the colorization pipeline automatic, these processes often produce unrealistic results due to a lack of conditioning. In this work, we attempt to integrate textual descriptions as… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  32. arXiv:2207.11718  [pdf, other

    cs.CV cs.MM

    TIPS: Text-Induced Pose Synthesis

    Authors: Prasun Roy, Subhankar Ghosh, Saumik Bhattacharya, Umapada Pal, Michael Blumenstein

    Abstract: In computer vision, human pose synthesis and transfer deal with probabilistic image generation of a person in a previously unseen pose from an already available observation of that person. Though researchers have recently proposed several methods to achieve this task, most of these techniques derive the target pose directly from the desired target image on a specific dataset, making the underlying… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: Accepted in The European Conference on Computer Vision (ECCV) 2022

  33. arXiv:2206.03224  [pdf

    cs.CY cs.AI cs.HC

    The Beyond the Fence Musical and Computer Says Show Documentary

    Authors: Simon Colton, Maria Teresa Llano, Rose Hepworth, John Charnley, Catherine V. Gale, Archie Baron, Francois Pachet, Pierre Roy, Pablo Gervas, Nick Collins, Bob Sturm, Tillman Weyde, Daniel Wolff, James Robert Lloyd

    Abstract: During 2015 and early 2016, the cultural application of Computational Creativity research and practice took a big leap forward, with a project where multiple computational systems were used to provide advice and material for a new musical theatre production. Billed as the world's first 'computer musical... conceived by computer and substantially crafted by computer', Beyond The Fence was staged in… ▽ More

    Submitted 11 May, 2022; originally announced June 2022.

    Journal ref: The Seventh International Conference on Computational Creativity, {ICCC} 2016

  34. arXiv:2206.02717  [pdf, other

    cs.CV cs.MM

    Scene Aware Person Image Generation through Global Contextual Conditioning

    Authors: Prasun Roy, Subhankar Ghosh, Saumik Bhattacharya, Umapada Pal, Michael Blumenstein

    Abstract: Person image generation is an intriguing yet challenging problem. However, this task becomes even more difficult under constrained situations. In this work, we propose a novel pipeline to generate and insert contextually relevant person images into an existing scene while preserving the global semantics. More specifically, we aim to insert a person such that the location, pose, and scale of the pe… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Comments: Accepted in The International Conference on Pattern Recognition (ICPR) 2022

  35. arXiv:2205.15951  [pdf, other

    cs.CL cs.CY cs.LG

    Hollywood Identity Bias Dataset: A Context Oriented Bias Analysis of Movie Dialogues

    Authors: Sandhya Singh, Prapti Roy, Nihar Sahoo, Niteesh Mallela, Himanshu Gupta, Pushpak Bhattacharyya, Milind Savagaonkar, Nidhi, Roshni Ramnani, Anutosh Maitra, Shubhashis Sengupta

    Abstract: Movies reflect society and also hold power to transform opinions. Social biases and stereotypes present in movies can cause extensive damage due to their reach. These biases are not always found to be the need of storyline but can creep in as the author's bias. Movie production houses would prefer to ascertain that the bias present in a script is the story's demand. Today, when deep learning model… ▽ More

    Submitted 1 June, 2022; v1 submitted 31 May, 2022; originally announced May 2022.

  36. arXiv:2204.09019  [pdf, other

    eess.SP cs.LG eess.SY physics.ao-ph

    Hybrid Transformer Network for Different Horizons-based Enriched Wind Speed Forecasting

    Authors: Dr. M. Madhiarasan, Prof. Partha Pratim Roy

    Abstract: Highly accurate different horizon-based wind speed forecasting facilitates a better modern power system. This paper proposed a novel astute hybrid wind speed forecasting model and applied it to different horizons. The proposed hybrid forecasting model decomposes the original wind speed data into IMFs (Intrinsic Mode Function) using Improved Complete Ensemble Empirical Mode Decomposition with Adapt… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Communicated to IEEE Transactions on Power Systems status Under Review

  37. arXiv:2204.03328  [pdf, other

    cs.CV cs.AI cs.CL

    A Comprehensive Review of Sign Language Recognition: Different Types, Modalities, and Datasets

    Authors: Dr. M. Madhiarasan, Prof. Partha Pratim Roy

    Abstract: A machine can understand human activities, and the meaning of signs can help overcome the communication barriers between the inaudible and ordinary people. Sign Language Recognition (SLR) is a fascinating research area and a crucial task concerning computer vision and pattern recognition. Recently, SLR usage has increased in many applications, but the environment, background image resolution, moda… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: communicated to the Computer Science Review (Elsevier) status With Editor

  38. arXiv:2202.06777  [pdf, other

    cs.CV cs.MM

    Multi-scale Attention Guided Pose Transfer

    Authors: Prasun Roy, Saumik Bhattacharya, Subhankar Ghosh, Umapada Pal

    Abstract: Pose transfer refers to the probabilistic image generation of a person with a previously unseen novel pose from another image of that person having a different pose. Due to potential academic and commercial applications, this problem is extensively studied in recent years. Among the various approaches to the problem, attention guided progressive generation is shown to produce state-of-the-art resu… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

    Comments: 14 pages

  39. arXiv:2202.05170  [pdf, ps, other

    eess.SP cs.AI cs.LG

    Efficacy of Transformer Networks for Classification of Raw EEG Data

    Authors: Gourav Siddhad, Anmol Gupta, Debi Prosad Dogra, Partha Pratim Roy

    Abstract: With the unprecedented success of transformer networks in natural language processing (NLP), recently, they have been successfully adapted to areas like computer vision, generative adversarial networks (GAN), and reinforcement learning. Classifying electroencephalogram (EEG) data has been challenging and researchers have been overly dependent on pre-processing and hand-crafted feature extraction.… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

    Journal ref: Biomedical Signal Processing and Control, Vol 87, 2023

  40. arXiv:2201.00727  [pdf

    cs.CY cs.DL q-bio.NC

    Recommendations for repositories and scientific gateways from a neuroscience perspective

    Authors: Malin Sandström, Mathew Abrams, Jan Bjaalie, Mona Hicks, David Kennedy, Arvind Kumar, JB Poline, Prasun Roy, Paul Tiesinga, Thomas Wachtler, Wojtek Goscinski

    Abstract: Digital services such as repositories and science gateways have become key resources for the neuroscience community, but users often have a hard time orienting themselves in the service landscape to find the best fit for their particular needs. INCF (International Neuroinformatics Coordinating Facility) has developed a set of recommendations and associated criteria for choosing or setting up and r… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: 10 pages, submitted to Scientific Data

  41. arXiv:2111.06625  [pdf

    cs.SD cs.AI cs.CL cs.LG

    A Convolutional Neural Network Based Approach to Recognize Bangla Spoken Digits from Speech Signal

    Authors: Ovishake Sen, Al-Mahmud, Pias Roy

    Abstract: Speech recognition is a technique that converts human speech signals into text or words or in any form that can be easily understood by computers or other machines. There have been a few studies on Bangla digit recognition systems, the majority of which used small datasets with few variations in genders, ages, dialects, and other variables. Audio recordings of Bangladeshi people of various genders… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

    Comments: 4 pages, 5 figures, 2021 International Conference on Electronics, Communications and Information Technology (ICECIT), 14 to 16 September 2021, Khulna, Bangladesh

  42. arXiv:2111.05199  [pdf, other

    cs.LG

    Deep diffusion-based forecasting of COVID-19 by incorporating network-level mobility information

    Authors: Padmaksha Roy, Shailik Sarkar, Subhodip Biswas, Fanglan Chen, Zhiqian Chen, Naren Ramakrishnan, Chang-Tien Lu

    Abstract: Modeling the spatiotemporal nature of the spread of infectious diseases can provide useful intuition in understanding the time-varying aspect of the disease spread and the underlying complex spatial dependency observed in people's mobility patterns. Besides, the county level multiple related time series information can be leveraged to make a forecast on an individual time series. Adding to this ch… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: 8 pages

    ACM Class: K.5

    Journal ref: Published as conference paper at ASONAM 2021, Research Track

  43. arXiv:2110.15018  [pdf, other

    eess.AS cs.SD

    TorchAudio: Building Blocks for Audio and Speech Processing

    Authors: Yao-Yuan Yang, Moto Hira, Zhaoheng Ni, Anjali Chourdia, Artyom Astafurov, Caroline Chen, Ching-Feng Yeh, Christian Puhrsch, David Pollack, Dmitriy Genzel, Donny Greenberg, Edward Z. Yang, Jason Lian, Jay Mahadeokar, Jeff Hwang, Ji Chen, Peter Goldsborough, Prabhat Roy, Sean Narenthiran, Shinji Watanabe, Soumith Chintala, Vincent Quenneville-Bélair, Yangyang Shi

    Abstract: This document describes version 0.10 of TorchAudio: building blocks for machine learning applications in the audio and speech processing domain. The objective of TorchAudio is to accelerate the development and deployment of machine learning applications for researchers and engineers by providing off-the-shelf building blocks. The building blocks are designed to be GPU-compatible, automatically dif… ▽ More

    Submitted 16 February, 2022; v1 submitted 28 October, 2021; originally announced October 2021.

    Comments: Accepted by ICASSP 2022

  44. arXiv:2108.10034  [pdf, other

    cs.SI

    Collation of Feasible Solutions for Domain Based Problems: An Analysis of Sentiments Based on Codeathon Activity

    Authors: Rajeshwari K, Preetha S, Anitha C, Lakshmi Shree K, Pronoy Roy

    Abstract: Codeathon activity is a practical approach for enduring the principles of Software Engineering and Object Oriented Modelling. Real world domain problem's solution was accomplished through team work. Analysing the problem and designing a feasible solution through a one day activity was achieved through virtual connection. There are three different sections in a semester, 13 teams were framed and as… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 10 pages, 15 figures, 1 table

  45. arXiv:2106.15989  [pdf, other

    cs.CV cs.MM

    Word-level Sign Language Recognition with Multi-stream Neural Networks Focusing on Local Regions

    Authors: Mizuki Maruyama, Shuvozit Ghose, Katsufumi Inoue, Partha Pratim Roy, Masakazu Iwamura, Michifumi Yoshioka

    Abstract: In recent years, Word-level Sign Language Recognition (WSLR) research has gained popularity in the computer vision community, and thus various approaches have been proposed. Among these approaches, the method using I3D network achieves the highest recognition accuracy on large public datasets for WSLR. However, the method with I3D only utilizes appearance information of the upper body of the signe… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  46. arXiv:2106.06059  [pdf, other

    cs.CV

    Predicting Next Local Appearance for Video Anomaly Detection

    Authors: Pankaj Raj Roy, Guillaume-Alexandre Bilodeau, Lama Seoud

    Abstract: We present a local anomaly detection method in videos. As opposed to most existing methods that are computationally expensive and are not very generalizable across different video scenes, we propose an adversarial framework that learns the temporal local appearance variations by predicting the appearance of a normally behaving object in the next frame of a scene by only relying on its current and… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: Accepted as an oral presentation for MVA'2021

  47. arXiv:2012.15423  [pdf, other

    cs.CR

    Lattice-based Signcryption with Equality Test in Standard Model

    Authors: Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto

    Abstract: A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud server) to check whether or not two ciphertexts are encrypted from the same message without knowing the message. This application plays an important rol… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

  48. arXiv:2011.08456  [pdf, ps, other

    cs.CR

    Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

    Authors: Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy

    Abstract: The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a ``proxy" to securely divert encrypted files of user A (delegator) to user B (deleg… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.06741

  49. arXiv:2011.06722  [pdf, other

    cs.CV cs.LG

    Local Anomaly Detection in Videos using Object-Centric Adversarial Learning

    Authors: Pankaj Raj Roy, Guillaume-Alexandre Bilodeau, Lama Seoud

    Abstract: We propose a novel unsupervised approach based on a two-stage object-centric adversarial framework that only needs object regions for detecting frame-level local anomalies in videos. The first stage consists in learning the correspondence between the current appearance and past gradient images of objects in scenes deemed normal, allowing us to either generate the past gradient from current appeara… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted for The First International Workshop on Deep Learning for Human-Centric Activity Understanding (ICPR2020 workshop)

  50. arXiv:2010.12669  [pdf, other

    cs.CV cs.HC

    Position and Rotation Invariant Sign Language Recognition from 3D Kinect Data with Recurrent Neural Networks

    Authors: Prasun Roy, Saumik Bhattacharya, Partha Pratim Roy, Umapada Pal

    Abstract: Sign language is a gesture-based symbolic communication medium among speech and hearing impaired people. It also serves as a communication bridge between non-impaired and impaired populations. Unfortunately, in most situations, a non-impaired person is not well conversant in such symbolic languages restricting the natural information flow between these two categories. Therefore, an automated trans… ▽ More

    Submitted 14 March, 2023; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: 10 pages