Skip to main content

Showing 1–18 of 18 results for author: Sahay, R

  1. arXiv:2405.00293  [pdf, other

    cs.CV

    MoPEFT: A Mixture-of-PEFTs for the Segment Anything Model

    Authors: Rajat Sahay, Andreas Savakis

    Abstract: The emergence of foundation models, such as the Segment Anything Model (SAM), has sparked interest in Parameter-Efficient Fine-Tuning (PEFT) methods that tailor these large models to application domains outside their training data. However, different PEFT techniques modify the representation of a model differently, making it a non-trivial task to select the most appropriate method for the domain o… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

    Comments: Workshop on Foundation Models, CVPR 2024

  2. arXiv:2301.01606  [pdf, other

    cs.SI

    Predicting Learning Interactions in Social Learning Networks: A Deep Learning Enabled Approach

    Authors: Rajeev Sahay, Serena Nicoll, Minjun Zhang, Tsung-Yen Yang, Carlee Joe-Wong, Kerrie A. Douglas, Christopher G Brinton

    Abstract: We consider the problem of predicting link formation in Social Learning Networks (SLN), a type of social network that forms when people learn from one another through structured interactions. While link prediction has been studied for general types of social networks, the evolution of SLNs over their lifetimes coupled with their dependence on which topics are being discussed presents new challenge… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Comments: This work was published in the IEEE/ACM Transactions on Networking

  3. arXiv:2212.10830  [pdf, other

    cs.CR

    A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS

    Authors: Rishikesh Sahay, D. A. Sepulveda Estay, Weizhi Meng, Christian D. Jensen, Michael Bruhn Barfod

    Abstract: The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have bee… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  4. arXiv:2203.03181  [pdf, other

    cs.CV

    Dynamic Template Selection Through Change Detection for Adaptive Siamese Tracking

    Authors: Madhu Kiran, Le Thanh Nguyen-Meidine, Rajat Sahay, Rafael Menelau Oliveira E Cruz, Louis-Antoine Blais-Morin, Eric Granger

    Abstract: Deep Siamese trackers have recently gained much attention in recent years since they can track visual objects at high speeds. Additionally, adaptive tracking methods, where target samples collected by the tracker are employed for online learning, have achieved state-of-the-art accuracy. However, single object tracking (SOT) remains a challenging task in real-world application due to changes and de… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

  5. arXiv:2202.09938  [pdf, other

    cs.CV

    Generative Target Update for Adaptive Siamese Tracking

    Authors: Madhu Kiran, Le Thanh Nguyen-Meidine, Rajat Sahay, Rafael Menelau Oliveira E Cruz, Louis-Antoine Blais-Morin, Eric Granger

    Abstract: Siamese trackers perform similarity matching with templates (i.e., target models) to recursively localize objects within a search region. Several strategies have been proposed in the literature to update a template based on the tracker output, typically extracted from the target search region in the current frame, and thereby mitigate the effects of target drift. However, this may lead to corrupte… ▽ More

    Submitted 20 February, 2022; originally announced February 2022.

  6. arXiv:2104.01494  [pdf, other

    cs.CR cs.AI cs.LG

    Mitigating Gradient-based Adversarial Attacks via Denoising and Compression

    Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal

    Abstract: Gradient-based adversarial attacks on deep neural networks pose a serious threat, since they can be deployed by adding imperceptible perturbations to the test data of any network, and the risk they introduce cannot be assessed through the network's original training performance. Denoising and dimensionality reduction are two distinct methods that have been independently investigated to combat such… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

    Comments: 13 pages, 2 figures, 9 tables

  7. arXiv:2011.01132  [pdf, other

    eess.SP cs.LG

    Frequency-based Automated Modulation Classification in the Presence of Adversaries

    Authors: Rajeev Sahay, Christopher G. Brinton, David J. Love

    Abstract: Automatic modulation classification (AMC) aims to improve the efficiency of crowded radio spectrums by automatically predicting the modulation constellation of wireless RF signals. Recent work has demonstrated the ability of deep learning to achieve robust AMC performance using raw in-phase and quadrature (IQ) time samples. Yet, deep learning models are highly susceptible to adversarial interferen… ▽ More

    Submitted 19 February, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: 6 pages, 7 figures. Published in Proc. of the 2021 IEEE International Conference on Communications (ICC)

  8. arXiv:2002.09772  [pdf, other

    cs.LG cs.CR stat.ML

    Non-Intrusive Detection of Adversarial Deep Learning Attacks via Observer Networks

    Authors: Kirthi Shankar Sivamani, Rajeev Sahay, Aly El Gamal

    Abstract: Recent studies have shown that deep learning models are vulnerable to specifically crafted adversarial inputs that are quasi-imperceptible to humans. In this letter, we propose a novel method to detect adversarial inputs, by augmenting the main classification network with multiple binary detectors (observer networks) which take inputs from the hidden layers of the original network (convolutional k… ▽ More

    Submitted 22 February, 2020; originally announced February 2020.

    Comments: 5 pages, 2 figures, 4 tables

  9. arXiv:2001.09486  [pdf, other

    cs.LG cs.CR stat.ML

    Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks

    Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal

    Abstract: Gradient-based adversarial attacks on neural networks can be crafted in a variety of ways by varying either how the attack algorithm relies on the gradient, the network architecture used for crafting the attack, or both. Most recent work has focused on defending classifiers in a case where there is no uncertainty about the attacker's behavior (i.e., the attacker is expected to generate a specific… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

    Comments: 6 pages, 4 figures

  10. arXiv:1911.09878  [pdf, other

    cs.CV

    PAG-Net: Progressive Attention Guided Depth Super-resolution Network

    Authors: Arpit Bansal, Sankaraganesh Jonna, Rajiv R. Sahay

    Abstract: In this paper, we propose a novel method for the challenging problem of guided depth map super-resolution, called PAGNet. It is based on residual dense networks and involves the attention mechanism to suppress the texture copying problem arises due to improper guidance by RGB images. The attention module mainly involves providing the spatial attention to guidance image based on the depth features.… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 6 pages, 5 figures

  11. arXiv:1906.05599  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    A Computationally Efficient Method for Defending Adversarial Deep Learning Attacks

    Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal

    Abstract: The reliance on deep learning algorithms has grown significantly in recent years. Yet, these models are highly vulnerable to adversarial attacks, which introduce visually imperceptible perturbations into testing data to induce misclassifications. The literature has proposed several methods to combat such adversarial attacks, but each method either fails at high perturbation values, requires excess… ▽ More

    Submitted 13 June, 2019; originally announced June 2019.

    Comments: 6 pages, 6 figures, submitted to IEEE Signal Processing Letters

  12. arXiv:1812.03087  [pdf, other

    cs.LG cs.CR stat.ML

    Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach

    Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal

    Abstract: Machine Learning models are vulnerable to adversarial attacks that rely on perturbing the input data. This work proposes a novel strategy using Autoencoder Deep Neural Networks to defend a machine learning model against two gradient-based attacks: The Fast Gradient Sign attack and Fast Gradient attack. First we use an autoencoder to denoise the test data, which is trained with both clean and corru… ▽ More

    Submitted 7 December, 2018; originally announced December 2018.

    Comments: 7 pages, 8 figures, submitted to Conference on Information Sciences and Systems (CISS 2019)

  13. arXiv:1805.12218  [pdf, other

    cs.LG q-bio.QM stat.ML

    Convolutional Embedded Networks for Population Scale Clustering and Bio-ancestry Inferencing

    Authors: Md. Rezaul Karim, Michael Cochez, Achille Zappa, Ratnesh Sahay, Oya Beyan, Dietrich-Rebholz Schuhmann, Stefan Decker

    Abstract: The study of genetic variants can help find correlating population groups to identify cohorts that are predisposed to common diseases and explain differences in disease susceptibility and how patients react to drugs. Machine learning algorithms are increasingly being applied to identify interacting GVs to understand their complex phenotypic traits. Since the performance of a learning algorithm not… ▽ More

    Submitted 19 April, 2020; v1 submitted 30 May, 2018; originally announced May 2018.

    Comments: This article is under review in IEEE/ACM Transactions on Computational Biology and Bioinformatics. It is based on a workshop paper discussed at the Extended Semantic Web Conference (ESWC'2017) workshop on Semantic Web Solutions for Large-scale Biomedical Data Analytics (SeWeBMeDA), Slovenia, May, 28-29, 2017

  14. arXiv:1805.07442  [pdf, other

    cs.CV

    My camera can see through fences: A deep learning approach for image de-fencing

    Authors: Sankaraganesh Jonna, Krishna Kanth Nakka, Rajiv R. Sahay

    Abstract: In recent times, the availability of inexpensive image capturing devices such as smartphones/tablets has led to an exponential increase in the number of images/videos captured. However, sometimes the amateur photographer is hindered by fences in the scene which have to be removed after the image has been captured. Conventional approaches to image de-fencing suffer from inaccurate and non-robust fe… ▽ More

    Submitted 18 May, 2018; originally announced May 2018.

    Comments: ACPR 2015, Kuala Lumpur

  15. arXiv:1802.02360  [pdf, ps, other

    cs.CR eess.SY

    Cyber-Physical Architecture Assisted by Programmable Networking

    Authors: Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquin Garcia-Alfaro

    Abstract: Cyber-physical technologies are prone to attacks, in addition to faults and failures. The issue of protecting cyber-physical systems should be tackled by jointly addressing security at both cyber and physical domains, in order to promptly detect and mitigate cyber-physical threats. Towards this end, this letter proposes a new architecture combining control-theoretic solutions together with program… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: 8 pages, 3 figures, pre-print

  16. arXiv:1612.03273  [pdf, other

    cs.CV

    Towards an Automated Image De-fencing Algorithm Using Sparsity

    Authors: Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay

    Abstract: Conventional approaches to image de-fencing suffer from non-robust fence detection and are limited to processing images of static scenes. In this position paper, we propose an automatic de-fencing algorithm for images of dynamic scenes. We divide the problem of image de-fencing into the tasks of automated fence detection, motion estimation and fusion of data from multiple frames of a captured vide… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

    Comments: The paper was accepted in VISAPP-2015

  17. arXiv:1612.01323  [pdf, other

    cs.CV

    Stereo image de-fencing using smartphones

    Authors: Sankaraganesh Jonna, Sukla Satapathy, Rajiv R. Sahay

    Abstract: Conventional approaches to image de-fencing have limited themselves to using only image data in adjacent frames of the captured video of an approximately static scene. In this work, we present a method to harness disparity using a stereo pair of fenced images in order to detect fence pixels. Tourists and amateur photographers commonly carry smartphones/phablets which can be used to capture a short… ▽ More

    Submitted 5 December, 2016; originally announced December 2016.

    Comments: Under review as a conference paper

  18. arXiv:1609.07727  [pdf, other

    cs.CV

    Deep learning based fence segmentation and removal from an image using a video sequence

    Authors: Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay

    Abstract: Conventional approaches to image de-fencing use multiple adjacent frames for segmentation of fences in the reference image and are limited to restoring images of static scenes only. In this paper, we propose a de-fencing algorithm for images of dynamic scenes using an occlusion-aware optical flow method. We divide the problem of image de-fencing into the tasks of automated fence segmentation from… ▽ More

    Submitted 21 October, 2016; v1 submitted 25 September, 2016; originally announced September 2016.