Skip to main content

Showing 1–44 of 44 results for author: Shetty, A

  1. arXiv:2406.13006  [pdf, other

    cs.CV cs.ET eess.IV

    Weighted Sum of Segmented Correlation: An Efficient Method for Spectra Matching in Hyperspectral Images

    Authors: Sampriti Soor, Priyanka Kumari, B. S. Daya Sagar, Amba Shetty

    Abstract: Matching a target spectrum with known spectra in a spectral library is a common method for material identification in hyperspectral imaging research. Hyperspectral spectra exhibit precise absorption features across different wavelength segments, and the unique shapes and positions of these absorptions create distinct spectral signatures for each material, aiding in their identification. Therefore,… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted in IEEE IGARSS 2024 conference

  2. arXiv:2406.02742  [pdf, ps, other

    cs.DS cs.LG

    Tolerant Algorithms for Learning with Arbitrary Covariate Shift

    Authors: Surbhi Goel, Abhishek Shetty, Konstantinos Stavropoulos, Arsen Vasilyan

    Abstract: We study the problem of learning under arbitrary distribution shift, where the learner is trained on a labeled set from one distribution but evaluated on a different, potentially adversarially generated test distribution. We focus on two frameworks: PQ learning [Goldwasser, A. Kalai, Y. Kalai, Montasser NeurIPS 2020], allowing abstention on adversarially generated parts of the test distribution, a… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  3. arXiv:2405.19597  [pdf, other

    cs.LG cs.AI cs.CL

    SVFT: Parameter-Efficient Fine-Tuning with Singular Vectors

    Authors: Vijay Lingam, Atula Tejaswi, Aditya Vavre, Aneesh Shetty, Gautham Krishna Gudur, Joydeep Ghosh, Alex Dimakis, Eunsol Choi, Aleksandar Bojchevski, Sujay Sanghavi

    Abstract: Popular parameter-efficient fine-tuning (PEFT) methods, such as LoRA and its variants, freeze pre-trained model weights \(W\) and inject learnable matrices \(ΔW\). These \(ΔW\) matrices are structured for efficient parameterization, often using techniques like low-rank approximations or scaling vectors. However, these methods typically show a performance gap compared to full fine-tuning. Although… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 17 pages, 5 figures, 14 tables

  4. arXiv:2403.01472  [pdf, other

    cs.CR cs.CL cs.LG

    WARDEN: Multi-Directional Backdoor Watermarks for Embedding-as-a-Service Copyright Protection

    Authors: Anudeex Shetty, Yue Teng, Ke He, Qiongkai Xu

    Abstract: Embedding as a Service (EaaS) has become a widely adopted solution, which offers feature extraction capabilities for addressing various downstream tasks in Natural Language Processing (NLP). Prior studies have shown that EaaS can be prone to model extraction attacks; nevertheless, this concern could be mitigated by adding backdoor watermarks to the text embeddings and subsequently verifying the at… ▽ More

    Submitted 9 June, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

    Comments: Accepted to ACL2024 (Main Proceedings)

  5. arXiv:2402.14987  [pdf, ps, other

    stat.ML cs.LG

    On the Performance of Empirical Risk Minimization with Smoothed Data

    Authors: Adam Block, Alexander Rakhlin, Abhishek Shetty

    Abstract: In order to circumvent statistical and computational hardness results in sequential decision-making, recent work has considered smoothed online learning, where the distribution of data at each time is assumed to have bounded likeliehood ratio with respect to a base measure when conditioned on the history. While previous works have demonstrated the benefits of smoothness, they have either assumed t… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  6. arXiv:2402.09483  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Oracle-Efficient Differentially Private Learning with Public Data

    Authors: Adam Block, Mark Bun, Rathin Desai, Abhishek Shetty, Steven Wu

    Abstract: Due to statistical lower bounds on the learnability of many function classes under privacy constraints, there has been recent interest in leveraging public data to improve the performance of private learning algorithms. In this model, algorithms must always guarantee differential privacy with respect to the private samples while also ensuring learning guarantees when the private data distribution… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  7. arXiv:2401.14645  [pdf, ps, other

    cs.LG cs.CC cs.DS

    Omnipredictors for Regression and the Approximate Rank of Convex Functions

    Authors: Parikshit Gopalan, Princewill Okoroafor, Prasad Raghavendra, Abhishek Shetty, Mihir Singhal

    Abstract: Consider the supervised learning setting where the goal is to learn to predict labels $\mathbf y$ given points $\mathbf x$ from a distribution. An \textit{omnipredictor} for a class $\mathcal L$ of loss functions and a class $\mathcal C$ of hypotheses is a predictor whose predictions incur less expected loss than the best hypothesis in $\mathcal C$ for every loss in $\mathcal L$. Since the work of… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  8. arXiv:2312.07423  [pdf, other

    cs.CV

    Holoported Characters: Real-time Free-viewpoint Rendering of Humans from Sparse RGB Cameras

    Authors: Ashwath Shetty, Marc Habermann, Guoxing Sun, Diogo Luvizon, Vladislav Golyanik, Christian Theobalt

    Abstract: We present the first approach to render highly realistic free-viewpoint videos of a human actor in general apparel, from sparse multi-view recording to display, in real-time at an unprecedented 4K resolution. At inference, our method only requires four camera views of the moving actor and the respective 3D skeletal pose. It handles actors in wide clothing, and reproduces even fine-scale dynamic de… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Project page: https://vcai.mpi-inf.mpg.de/projects/holochar/

  9. arXiv:2310.06841  [pdf

    cs.CR cs.LG

    Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices

    Authors: Akhil M R, Adithya Krishna V Sharma, Harivardhan Swamy, Pavan A, Ashray Shetty, Anirudh B Sathyanarayana

    Abstract: With the increasing extent of malware attacks in the present day along with the difficulty in detecting modern malware, it is necessary to evaluate the effectiveness and performance of Deep Neural Networks (DNNs) for malware classification. Multiple DNN architectures can be designed and trained to detect and classify malware binaries. Results demonstrate the potential of DNNs in accurately classif… ▽ More

    Submitted 21 August, 2023; originally announced October 2023.

  10. arXiv:2309.12226  [pdf, ps, other

    cs.GT cs.DS cs.LG

    Smooth Nash Equilibria: Algorithms and Complexity

    Authors: Constantinos Daskalakis, Noah Golowich, Nika Haghtalab, Abhishek Shetty

    Abstract: A fundamental shortcoming of the concept of Nash equilibrium is its computational intractability: approximating Nash equilibria in normal-form games is PPAD-hard. In this paper, inspired by the ideas of smoothed analysis, we introduce a relaxed variant of Nash equilibrium called $σ$-smooth Nash equilibrium, for a smoothness parameter $σ$. In a $σ$-smooth Nash equilibrium, players only need to achi… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  11. Eventually-Consistent Federated Scheduling for Data Center Workloads

    Authors: Meghana Thiyyakat, Subramaniam Kalambur, Rishit Chaudhary, Saurav G Nayak, Adarsh Shetty, Dinkar Sitaram

    Abstract: Data center schedulers operate at unprecedented scales today to accommodate the growing demand for computing and storage power. The challenge that schedulers face is meeting the requirements of scheduling speeds despite the scale. To do so, most scheduler architectures use parallelism. However, these architectures consist of multiple parallel scheduling entities that can only utilize partial knowl… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

    Comments: 26 pages. Submitted to Elsevier's Ad Hoc Networks Journal

  12. arXiv:2306.13119  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Adversarial Resilience in Sequential Prediction via Abstention

    Authors: Surbhi Goel, Steve Hanneke, Shay Moran, Abhishek Shetty

    Abstract: We study the problem of sequential prediction in the stochastic setting with an adversary that is allowed to inject clean-label adversarial (or out-of-distribution) examples. Algorithms designed to handle purely stochastic data tend to fail in the presence of such adversarial examples, often leading to erroneous predictions. This is undesirable in many high-stakes applications such as medical reco… ▽ More

    Submitted 24 January, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

  13. arXiv:2304.09167  [pdf, ps, other

    cs.LG cs.DS math.ST

    Optimal PAC Bounds Without Uniform Convergence

    Authors: Ishaq Aden-Ali, Yeshwanth Cherapanamjeri, Abhishek Shetty, Nikita Zhivotovskiy

    Abstract: In statistical learning theory, determining the sample complexity of realizable binary classification for VC classes was a long-standing open problem. The results of Simon and Hanneke established sharp upper bounds in this setting. However, the reliance of their argument on the uniform convergence principle limits its applicability to more general learning settings such as multiclass classificatio… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: 27 pages

  14. arXiv:2303.04845  [pdf, ps, other

    cs.LG cs.DS cs.IT stat.ML

    Smoothed Analysis of Sequential Probability Assignment

    Authors: Alankrita Bhatt, Nika Haghtalab, Abhishek Shetty

    Abstract: We initiate the study of smoothed analysis for the sequential probability assignment problem with contexts. We study information-theoretically optimal minmax rates as well as a framework for algorithmic reduction involving the maximum likelihood estimator oracle. Our approach establishes a general-purpose reduction from minimax rates for sequential probability assignment for smoothed adversaries t… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

  15. arXiv:2302.10093  [pdf, other

    cs.LG

    Progressive Ensemble Distillation: Building Ensembles for Efficient Inference

    Authors: Don Kurian Dennis, Abhishek Shetty, Anish Sevekari, Kazuhito Koishida, Virginia Smith

    Abstract: We study the problem of progressive ensemble distillation: Given a large, pretrained teacher model $g$, we seek to decompose the model into smaller, low-inference cost student models $f_i$, such that progressively evaluating additional models in this ensemble leads to improved predictions. The resulting ensemble allows for flexibly tuning accuracy vs. inference cost at runtime, which is useful for… ▽ More

    Submitted 9 November, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

  16. arXiv:2212.09270  [pdf, ps, other

    cs.LG cs.DS math.ST

    The One-Inclusion Graph Algorithm is not Always Optimal

    Authors: Ishaq Aden-Ali, Yeshwanth Cherapanamjeri, Abhishek Shetty, Nikita Zhivotovskiy

    Abstract: The one-inclusion graph algorithm of Haussler, Littlestone, and Warmuth achieves an optimal in-expectation risk bound in the standard PAC classification setup. In one of the first COLT open problems, Warmuth conjectured that this prediction strategy always implies an optimal high probability bound on the risk, and hence is also an optimal PAC algorithm. We refute this conjecture in the strongest s… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    Comments: 16 pages

  17. arXiv:2211.08310  [pdf, other

    cs.LG eess.SP

    Identification of medical devices using machine learning on distribution feeder data for informing power outage response

    Authors: Paraskevi Kourtza, Maitreyee Marathe, Anuj Shetty, Diego Kiedanski

    Abstract: Power outages caused by extreme weather events due to climate change have doubled in the United States in the last two decades. Outages pose severe health risks to over 4.4 million individuals dependent on in-home medical devices. Data on the number of such individuals residing in a given area is limited. This study proposes a load disaggregation model to predict the number of medical devices behi… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: To appear in the Tackling Climate Change with Machine Learning workshop at NeurIPS 2022 (Proposals Track) 6 pages, 3 figures

  18. arXiv:2210.12622  [pdf, other

    cs.CV

    Facial De-occlusion Network for Virtual Telepresence Systems

    Authors: Surabhi Gupta, Ashwath Shetty, Avinash Sharma

    Abstract: To see what is not in the image is one of the broader missions of computer vision. Technology to inpaint images has made significant progress with the coming of deep learning. This paper proposes a method to tackle occlusion specific to human faces. Virtual presence is a promising direction in communication and recreation for the future. However, Virtual Reality (VR) headsets occlude a significant… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: This workshop paper is presented in CVPR Workshop on Computer Vision for Augmented and Virtual Reality, New Orleans, LA, 2022. Link: https://xr.cornell.edu/workshop/2022/papers

  19. TangibleGrid: Tangible Web Layout Design for Blind Users

    Authors: Jiasheng Li, Zeyu Yan, Ebrima Jarjue, Ashrith Shetty, Huaishu Peng

    Abstract: We present TangibleGrid, a novel device that allows blind users to understand and design the layout of a web page with real-time tangible feedback. We conducted semi-structured interviews and a series of co-design sessions with blind users to elicit insights that guided the design of TangibleGrid. Our final prototype contains shape-changing brackets representing the web elements and a baseboard re… ▽ More

    Submitted 27 August, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

    Journal ref: UIST '22, October 29-November 2, 2022, Bend, OR, USA

  20. arXiv:2206.06308  [pdf, other

    cs.CL cs.AI

    Knowledge Graph Construction and Its Application in Automatic Radiology Report Generation from Radiologist's Dictation

    Authors: Kaveri Kale, Pushpak Bhattacharyya, Aditya Shetty, Milind Gune, Kush Shrivastava, Rustom Lawyer, Spriha Biswas

    Abstract: Conventionally, the radiologist prepares the diagnosis notes and shares them with the transcriptionist. Then the transcriptionist prepares a preliminary formatted report referring to the notes, and finally, the radiologist reviews the report, corrects the errors, and signs off. This workflow causes significant delays and errors in the report. In current research work, we focus on applications of N… ▽ More

    Submitted 13 June, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

  21. arXiv:2202.08549  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Oracle-Efficient Online Learning for Beyond Worst-Case Adversaries

    Authors: Nika Haghtalab, Yanjun Han, Abhishek Shetty, Kunhe Yang

    Abstract: In this paper, we study oracle-efficient algorithms for beyond worst-case analysis of online learning. We focus on two settings. First, the smoothed analysis setting of [RST11,HRS22] where an adversary is constrained to generating samples from distributions whose density is upper bounded by $1/σ$ times the uniform density. Second, the setting of $K$-hint transductive learning, where the learner is… ▽ More

    Submitted 22 November, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

    Comments: An extended abstract of this work was published under the title "Oracle-efficient Online Learning for Smoothed Adversaries'' in the Proceedings of the 36th Conference on Neural Information Processing Systems

  22. arXiv:2112.01098  [pdf, other

    cs.CV

    Attention based Occlusion Removal for Hybrid Telepresence Systems

    Authors: Surabhi Gupta, Ashwath Shetty, Avinash Sharma

    Abstract: Traditionally, video conferencing is a widely adopted solution for telecommunication, but a lack of immersiveness comes inherently due to the 2D nature of facial representation. The integration of Virtual Reality (VR) in a communication/telepresence system through Head Mounted Displays (HMDs) promises to provide users a much better immersive experience. However, HMDs cause hindrance by blocking th… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  23. arXiv:2111.07941  [pdf, other

    stat.ML cs.DS cs.LG math.ST stat.ME

    Distribution Compression in Near-linear Time

    Authors: Abhishek Shetty, Raaz Dwivedi, Lester Mackey

    Abstract: In distribution compression, one aims to accurately summarize a probability distribution $\mathbb{P}$ using a small number of representative points. Near-optimal thinning procedures achieve this goal by sampling $n$ points from a Markov chain and identifying $\sqrt{n}$ points with $\widetilde{\mathcal{O}}(1/\sqrt{n})$ discrepancy to $\mathbb{P}$. Unfortunately, these algorithms suffer from quadrat… ▽ More

    Submitted 17 October, 2022; v1 submitted 15 November, 2021; originally announced November 2021.

    Comments: Accepted to ICLR 2022; An outdated proof of Theorem 2 was previously included in the appendix; this oversight is corrected in this version

  24. arXiv:2110.10099  [pdf, other

    cs.DS cs.CC math.CO quant-ph

    Matrix Discrepancy from Quantum Communication

    Authors: Samuel B. Hopkins, Prasad Raghavendra, Abhishek Shetty

    Abstract: We develop a novel connection between discrepancy minimization and (quantum) communication complexity. As an application, we resolve a substantial special case of the Matrix Spencer conjecture. In particular, we show that for every collection of symmetric $n \times n$ matrices $A_1,\ldots,A_n$ with $\|A_i\| \leq 1$ and $\|A_i\|_F \leq n^{1/4}$ there exist signs $x \in \{ \pm 1\}^n$ such that the m… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  25. arXiv:2110.09581  [pdf, other

    cs.RO

    Improving GNSS Positioning using Neural Network-based Corrections

    Authors: Ashwin V. Kanhere, Shubh Gupta, Akshay Shetty, Grace Gao

    Abstract: Deep Neural Networks (DNNs) are a promising tool for Global Navigation Satellite System (GNSS) positioning in the presence of multipath and non-line-of-sight errors, owing to their ability to model complex errors using data. However, developing a DNN for GNSS positioning presents various challenges, such as 1) poor numerical conditioning caused by large variations in measurements and position valu… ▽ More

    Submitted 21 June, 2022; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: 15 pages, 8 figures, accepted in Navigation: Journal of the Institute of Navigation

  26. arXiv:2110.06342  [pdf, other

    cs.RO cs.MA

    Decentralized Connectivity Maintenance for Multi-robot Systems Under Motion and Sensing Uncertainties

    Authors: Akshay Shetty, Timmy Hussain, Grace Gao

    Abstract: Communication connectivity is desirable for safe and efficient operation of multi-robot systems. While decentralized algorithms for connectivity maintenance have been explored in recent literature, the majority of these works do not account for robot motion and sensing uncertainties. These uncertainties are inherent in practical robots and result in robots deviating from their desired positions wh… ▽ More

    Submitted 20 July, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

    Comments: Accepted in NAVIGATION: Journal of The Institute of Navigation

  27. arXiv:2108.00963  [pdf, other

    cs.FL

    Scope-Bounded Reachability in Valence Systems

    Authors: Aneesh K. Shetty, S. Krishna, Georg Zetzsche

    Abstract: Multi-pushdown systems are a standard model for concurrent recursive programs, but they have an undecidable reachability problem. Therefore, there have been several proposals to underapproximate their sets of runs so that reachability in this underapproximation becomes decidable. One such underapproximation that covers a relatively high portion of runs is scope boundedness. In such a run, after ea… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: To appear in proceedings of CONCUR 2021

  28. arXiv:2102.08446  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Smoothed Analysis with Adaptive Adversaries

    Authors: Nika Haghtalab, Tim Roughgarden, Abhishek Shetty

    Abstract: We prove novel algorithmic guarantees for several online problems in the smoothed analysis model. In this model, at each time an adversary chooses an input distribution with density function bounded above by $\tfrac{1}σ$ times that of the uniform distribution; nature then samples an input from this distribution. Crucially, our results hold for {\em adaptive} adversaries that can choose an input di… ▽ More

    Submitted 18 August, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: Accepted to FOCS 2021

  29. arXiv:2012.09808  [pdf, other

    cs.RO

    Connectivity Maintenance for Multi-Robot Systems Under Motion and Sensing Uncertainties Using Distributed ADMM-based Trajectory Planning

    Authors: Akshay Shetty, Derek Knowles, Grace Xingxin Gao

    Abstract: Inter-robot communication enables multi-robot systems to coordinate and execute complex missions efficiently. Thus, maintaining connectivity of the communication network between robots is essential for many multi-robot systems. In this paper, we present a trajectory planner for connectivity maintenance of a multi-robot system. We first define a weighted undirected graph to represent the connectivi… ▽ More

    Submitted 16 December, 2021; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: Submitted to IEEE Transactions on Control of Network Systems

  30. arXiv:2012.09689  [pdf, other

    cs.RO

    Trajectory Planning Under Stochastic and Bounded Sensing Uncertainties Using Reachability Analysis

    Authors: Akshay Shetty, Grace Xingxin Gao

    Abstract: Trajectory planning under uncertainty is an active research topic. Previous works predict state and state estimation uncertainties along trajectories to check for collision safety. They assume either stochastic or bounded sensing uncertainties. However, GNSS pseudoranges are typically modeled to contain stochastic uncertainties with additional biases in urban environments. Thus, given bounds for t… ▽ More

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: Submitted to Navigation: Journal of the Institute of Navigation

  31. arXiv:2008.01316  [pdf, ps, other

    cs.CC

    Fractional Pseudorandom Generators from Any Fourier Level

    Authors: Eshan Chattopadhyay, Jason Gaitonde, Chin Ho Lee, Shachar Lovett, Abhishek Shetty

    Abstract: We prove new results on the polarizing random walk framework introduced in recent works of Chattopadhyay {et al.} [CHHL19,CHLT19] that exploit $L_1$ Fourier tail bounds for classes of Boolean functions to construct pseudorandom generators (PRGs). We show that given a bound on the $k$-th level of the Fourier spectrum, one can construct a PRG with a seed length whose quality scales with $k$. This in… ▽ More

    Submitted 7 November, 2020; v1 submitted 4 August, 2020; originally announced August 2020.

  32. arXiv:2007.09562  [pdf, other

    cs.RO cs.LG eess.SY

    Learning to Play Cup-and-Ball with Noisy Camera Observations

    Authors: Monimoy Bujarbaruah, Tony Zheng, Akhil Shetty, Martin Sehr, Francesco Borrelli

    Abstract: Playing the cup-and-ball game is an intriguing task for robotics research since it abstracts important problem characteristics including system nonlinearity, contact forces and precise positioning as terminal goal. In this paper, we present a learning model based control strategy for the cup-and-ball game, where a Universal Robots UR5e manipulator arm learns to catch a ball in one of the cups on a… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

    Comments: Final paper for IEEE CASE, Hong Kong, August, 2020. First three authors contributed equally

  33. arXiv:2006.10129  [pdf, ps, other

    cs.LG cs.DS stat.ML

    Smoothed Analysis of Online and Differentially Private Learning

    Authors: Nika Haghtalab, Tim Roughgarden, Abhishek Shetty

    Abstract: Practical and pervasive needs for robustness and privacy in algorithms have inspired the design of online adversarial and differentially private learning algorithms. The primary quantity that characterizes learnability in these settings is the Littlestone dimension of the class of hypotheses [Ben-David et al., 2009, Alon et al., 2019]. This characterization is often interpreted as an impossibility… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  34. arXiv:2006.03987  [pdf, other

    cs.RO

    Safety Challenges for Autonomous Vehicles in the Absence of Connectivity

    Authors: Akhil Shetty, Mengqiao Yu, Alex Kurzhanskiy, Offer Grembek, Hamidreza Tavafoghi, Pravin Varaiya

    Abstract: Autonomous vehicles (AVs) are promoted as a technology that will create a future with effortless driving and virtually no traffic accidents. AV companies claim that, when fully developed, the technology will eliminate 94% of all accidents that are caused by human error. These AVs will likely avoid the large number of crashes caused by impaired, distracted or reckless drivers. But there remains a s… ▽ More

    Submitted 14 April, 2021; v1 submitted 6 June, 2020; originally announced June 2020.

  35. arXiv:1908.05660  [pdf, other

    cs.LG stat.ML

    Effect of Activation Functions on the Training of Overparametrized Neural Nets

    Authors: Abhishek Panigrahi, Abhishek Shetty, Navin Goyal

    Abstract: It is well-known that overparametrized neural networks trained using gradient-based methods quickly achieve small training error with appropriate hyperparameter settings. Recent papers have proved this statement theoretically for highly overparametrized networks under reasonable assumptions. These results either assume that the activation function is ReLU or they crucially depend on the minimum ei… ▽ More

    Submitted 10 April, 2020; v1 submitted 16 August, 2019; originally announced August 2019.

    Comments: Major update: Several new results, some reorganization and rewriting of previous results, new references

  36. arXiv:1907.10531  [pdf, ps, other

    math.OC cs.DS

    Sampling and Optimization on Convex Sets in Riemannian Manifolds of Non-Negative Curvature

    Authors: Navin Goyal, Abhishek Shetty

    Abstract: The Euclidean space notion of convex sets (and functions) generalizes to Riemannian manifolds in a natural sense and is called geodesic convexity. Extensively studied computational problems such as convex optimization and sampling in convex sets also have meaningful counterparts in the manifold setting. Geodesically convex optimization is a well-studied problem with ongoing research and considerab… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: Appeared at COLT 2019

    Report number: PMLR 99:1519-1561, 2019

  37. arXiv:1906.09158  [pdf, other

    cs.CG

    $n$-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality

    Authors: Wei Zeng, Abdur B. Shahid, Keyan Zolfaghari, Aditya Shetty, Niki Pissinou, Sitharama S. Iyengar

    Abstract: To date, location privacy protection is a critical issue in Location-Based Services (LBS). In this work, we propose a novel geometric framework based on the classical discrete geometric structure, the Voronoi-Delaunay duality (VDD). We utilize the fact that the user location cannot be recovered if only given an irregular $n$-sided Voronoi cell around it, and the anonymity zone is the intersection… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: 12 pages, 19 figures

  38. arXiv:1905.11055  [pdf, other

    cs.DC

    An Open-Source Benchmark Suite for Cloud and IoT Microservices

    Authors: Yu Gan, Yanqi Zhang, Dailun Cheng, Ankitha Shetty, Priyal Rathi, Nayan Katarki, Ariana Bruno, Justin Hu, Brian Ritchken, Brendon Jackson, Kelvin Hu, Meghna Pancholi, Yuan He, Brett Clancy, Chris Colen, Fukang Wen, Catherine Leung, Siyuan Wang, Leon Zaruvinsky, Mateo Espinosa, Rick Lin, Zhongling Liu, Jake Padilla, Christina Delimitrou

    Abstract: Cloud services have recently started undergoing a major shift from monolithic applications, to graphs of hundreds of loosely-coupled microservices. Microservices fundamentally change a lot of assumptions current cloud systems are designed with, and present both opportunities and challenges when optimizing for quality of service (QoS) and utilization. In this paper we explore the implications micro… ▽ More

    Submitted 27 May, 2019; originally announced May 2019.

  39. arXiv:1809.05979  [pdf, other

    cs.RO

    UAV Pose Estimation using Cross-view Geolocalization with Satellite Imagery

    Authors: Akshay Shetty, Grace Xingxin Gao

    Abstract: We propose an image-based cross-view geolocalization method that estimates the global pose of a UAV with the aid of georeferenced satellite imagery. Our method consists of two Siamese neural networks that extract relevant features despite large differences in viewpoints. The input to our method is an aerial UAV image and nearby satellite images, and the output is the weighted global pose estimate… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: Submitted as contributed paper to ICRA 2019

  40. arXiv:1807.04936  [pdf, ps, other

    cs.LG cs.DS cs.IT stat.ML

    Non-Gaussian Component Analysis using Entropy Methods

    Authors: Navin Goyal, Abhishek Shetty

    Abstract: Non-Gaussian component analysis (NGCA) is a problem in multidimensional data analysis which, since its formulation in 2006, has attracted considerable attention in statistics and machine learning. In this problem, we have a random variable $X$ in $n$-dimensional Euclidean space. There is an unknown subspace $Γ$ of the $n$-dimensional Euclidean space such that the orthogonal projection of $X$ onto… ▽ More

    Submitted 4 November, 2018; v1 submitted 13 July, 2018; originally announced July 2018.

  41. arXiv:1806.04594  [pdf, ps, other

    stat.ML cs.LG

    Exponential Weights on the Hypercube in Polynomial Time

    Authors: Sudeep Raja Putta, Abhishek Shetty

    Abstract: We study a general online linear optimization problem(OLO). At each round, a subset of objects from a fixed universe of $n$ objects is chosen, and a linear cost associated with the chosen subset is incurred. To measure the performance of our algorithms, we use the notion of regret which is the difference between the total cost incurred over all iterations and the cost of the best fixed subset in h… ▽ More

    Submitted 22 August, 2019; v1 submitted 12 June, 2018; originally announced June 2018.

  42. arXiv:1707.05357  [pdf, other

    cs.CV

    Show and Recall: Learning What Makes Videos Memorable

    Authors: Sumit Shekhar, Dhruv Singal, Harvineet Singh, Manav Kedia, Akhil Shetty

    Abstract: With the explosion of video content on the Internet, there is a need for research on methods for video analysis which take human cognition into account. One such cognitive measure is memorability, or the ability to recall visual content after watching it. Prior research has looked into image memorability and shown that it is intrinsic to visual content, but the problem of modeling video memorabili… ▽ More

    Submitted 28 August, 2017; v1 submitted 17 July, 2017; originally announced July 2017.

    Comments: 10 pages, updated abstract, added few references, project page link and acknowledgements. Accepted at ICCV 2017 Workshop on Mutual Benefits of Cognitive and Computer Vision (MBCC)

  43. arXiv:1412.2857  [pdf

    cs.CR

    Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes

    Authors: Jeril Kuriakose, Amruth V., Sandesh A. G., Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty

    Abstract: Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nod… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 10 pages, 13 pages, conference

  44. arXiv:1208.1880  [pdf

    cs.CV cs.MM cs.SD

    Stereo Acoustic Perception based on Real Time Video Acquisition for Navigational Assistance

    Authors: Supreeth K. Rao, Arpitha Prasad B., Anushree R. Shetty, Chinmai, R. Bhakthavathsalam, Rajeshwari Hegde

    Abstract: A smart navigation system (an Electronic Travel Aid) based on an object detection mechanism has been designed to detect the presence of obstacles that immediately impede the path, by means of real time video processing. The algorithm can be used for any general purpose navigational aid. This paper is discussed, keeping in mind the navigation of the visually impaired, and is not limited to the same… ▽ More

    Submitted 9 August, 2012; originally announced August 2012.

    Comments: 12 pages, 8 figures, 1 table, SIPM-2012, pp. 97-108, 2012; http://airccj.org/CSCP/vol2/csit2311.pdf