Skip to main content

Showing 1–50 of 74 results for author: Yadav, K

  1. arXiv:2407.06939  [pdf, other

    cs.RO cs.CV

    Towards Open-World Mobile Manipulation in Homes: Lessons from the Neurips 2023 HomeRobot Open Vocabulary Mobile Manipulation Challenge

    Authors: Sriram Yenamandra, Arun Ramachandran, Mukul Khanna, Karmesh Yadav, Jay Vakil, Andrew Melnik, Michael Büttner, Leon Harz, Lyon Brown, Gora Chand Nandi, Arjun PS, Gaurav Kumar Yadav, Rahul Kala, Robert Haschke, Yang Luo, Jinxin Zhu, Yansen Han, Bingyi Lu, Xuan Gu, Qinyuan Liu, Yaping Zhao, Qiting Ye, Chenxiao Dou, Yansong Chua, Volodymyr Kuzma , et al. (20 additional authors not shown)

    Abstract: In order to develop robots that can effectively serve as versatile and capable home assistants, it is crucial for them to reliably perceive and interact with a wide variety of objects across diverse environments. To this end, we proposed Open Vocabulary Mobile Manipulation as a key benchmark task for robotics: finding any object in a novel environment and placing it on any receptacle surface withi… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  2. arXiv:2406.13608  [pdf, other

    cs.IT cs.CR

    Wiretapped Commitment over Binary Channels

    Authors: Anuj Kumar Yadav, Manideep Mamindlapally, Amitalok J. Budkuley

    Abstract: We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve. We seek to determine the maximum commitment throughput in the presence of an eaves… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 13 Pages, 1 figure

  3. arXiv:2405.05852  [pdf, other

    cs.CV cs.AI cs.CL cs.LG cs.RO stat.ML

    Pre-trained Text-to-Image Diffusion Models Are Versatile Representation Learners for Control

    Authors: Gunshi Gupta, Karmesh Yadav, Yarin Gal, Dhruv Batra, Zsolt Kira, Cong Lu, Tim G. J. Rudner

    Abstract: Embodied AI agents require a fine-grained understanding of the physical world mediated through visual and language inputs. Such capabilities are difficult to learn solely from task-specific data. This has led to the emergence of pre-trained vision-language models as a tool for transferring representations learned from internet-scale data to downstream tasks and new domains. However, commonly used… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2404.10989  [pdf, other

    cs.CV cs.LG cs.MM cs.SD eess.AS

    FairSSD: Understanding Bias in Synthetic Speech Detectors

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Davide Salvi, Paolo Bestagini, Edward J. Delp

    Abstract: Methods that can generate synthetic speech which is perceptually indistinguishable from speech recorded by a human speaker, are easily available. Several incidents report misuse of synthetic speech generated from these methods to commit fraud. To counter such misuse, many methods have been proposed to detect synthetic speech. Some of these detectors are more interpretable, can generalize to detect… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024 (WMF)

  5. arXiv:2404.08655  [pdf, other

    cs.CL cs.AI cs.LG

    Transformer-based Joint Modelling for Automatic Essay Scoring and Off-Topic Detection

    Authors: Sourya Dipta Das, Yash Vadi, Kuldeep Yadav

    Abstract: Automated Essay Scoring (AES) systems are widely popular in the market as they constitute a cost-effective and time-effective option for grading systems. Nevertheless, many studies have demonstrated that the AES system fails to assign lower grades to irrelevant responses. Thus, detecting the off-topic response in automated essay scoring is crucial in practical tasks where candidates write unrelate… ▽ More

    Submitted 24 March, 2024; originally announced April 2024.

    Comments: Accepted in LREC-COLING 2024

  6. arXiv:2403.15484  [pdf, other

    cs.CL cs.LG

    RakutenAI-7B: Extending Large Language Models for Japanese

    Authors: Rakuten Group, Aaron Levine, Connie Huang, Chenguang Wang, Eduardo Batista, Ewa Szymanska, Hongyi Ding, Hou Wei Chou, Jean-François Pessiot, Johanes Effendi, Justin Chiu, Kai Torben Ohlhus, Karan Chopra, Keiji Shinzato, Koji Murakami, Lee Xiong, Lei Chen, Maki Kubota, Maksim Tkachenko, Miroku Lee, Naoki Takahashi, Prathyusha Jwalapuram, Ryutaro Tatsushima, Saurabh Jain, Sunil Kumar Yadav , et al. (5 additional authors not shown)

    Abstract: We introduce RakutenAI-7B, a suite of Japanese-oriented large language models that achieve the best performance on the Japanese LM Harness benchmarks among the open 7B models. Along with the foundation model, we release instruction- and chat-tuned models, RakutenAI-7B-instruct and RakutenAI-7B-chat respectively, under the Apache 2.0 license.

    Submitted 21 March, 2024; originally announced March 2024.

  7. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  8. arXiv:2402.06159  [pdf, other

    cs.CR

    Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers

    Authors: Anuj Gautam, Tarun Kumar Yadav, Kent Seamons, Scott Ruoti

    Abstract: Password-based authentication faces various security and usability issues. Password managers help alleviate some of these issues by enabling users to manage their passwords effectively. However, malicious client-side scripts and browser extensions can steal passwords after they have been autofilled by the manager into the web page. In this paper, we explore what role the password manager can take… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  9. Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India

    Authors: Hasmat Malik, Amit Kumar Yadav, Fausto Pedro García Márquez, Jesús María Pinar-Pérez

    Abstract: Wind power generated by wind has non-schedule nature due to stochastic nature of meteorological variable. Hence energy business and control of wind power generation requires prediction of wind speed (WS) from few seconds to different time steps in advance. To deal with prediction shortcomings, various WS prediction methods have been used. Predictive data mining offers variety of methods for WS pre… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Malik, H., Yadav, A. K., Márquez, F. P. G., & Pinar-Pérez, J. M. (2022). Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India. Energy Strategy Reviews, 41, 100864

    Journal ref: Energy Strategy Reviews 2022. Vol 41, 100864

  10. arXiv:2312.08611  [pdf, other

    cs.RO cs.AI

    UniTeam: Open Vocabulary Mobile Manipulation Challenge

    Authors: Andrew Melnik, Michael Büttner, Leon Harz, Lyon Brown, Gora Chand Nandi, Arjun PS, Gaurav Kumar Yadav, Rahul Kala, Robert Haschke

    Abstract: This report introduces our UniTeam agent - an improved baseline for the "HomeRobot: Open Vocabulary Mobile Manipulation" challenge. The challenge poses problems of navigation in unfamiliar environments, manipulation of novel objects, and recognition of open-vocabulary object classes. This challenge aims to facilitate cross-cutting research in embodied AI using recent advances in machine learning,… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  11. arXiv:2312.01523  [pdf, other

    cs.CL cs.LG

    SymNoise: Advancing Language Model Fine-tuning with Symmetric Noise

    Authors: Abhay Kumar Yadav, Arjun Singh

    Abstract: In this paper, we introduce a novel fine-tuning technique for language models, which involves incorporating symmetric noise into the embedding process. This method aims to enhance the model's function by more stringently regulating its local curvature, demonstrating superior performance over the current method, NEFTune. When fine-tuning the LLaMA-2-7B model using Alpaca, standard techniques yield… ▽ More

    Submitted 8 December, 2023; v1 submitted 3 December, 2023; originally announced December 2023.

  12. arXiv:2311.17969  [pdf, other

    q-bio.MN cs.LG

    Generation of a Compendium of Transcription Factor Cascades and Identification of Potential Therapeutic Targets using Graph Machine Learning

    Authors: Sonish Sivarajkumar, Pratyush Tandale, Ankit Bhardwaj, Kipp W. Johnson, Anoop Titus, Benjamin S. Glicksberg, Shameer Khader, Kamlesh K. Yadav, Lakshminarayanan Subramanian

    Abstract: Transcription factors (TFs) play a vital role in the regulation of gene expression thereby making them critical to many cellular processes. In this study, we used graph machine learning methods to create a compendium of TF cascades using data extracted from the STRING database. A TF cascade is a sequence of TFs that regulate each other, forming a directed path in the TF network. We constructed a k… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  13. arXiv:2310.02219  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    What do we learn from a large-scale study of pre-trained visual representations in sim and real environments?

    Authors: Sneha Silwal, Karmesh Yadav, Tingfan Wu, Jay Vakil, Arjun Majumdar, Sergio Arnaud, Claire Chen, Vincent-Pierre Berges, Dhruv Batra, Aravind Rajeswaran, Mrinal Kalakrishnan, Franziska Meier, Oleksandr Maksymets

    Abstract: We present a large empirical investigation on the use of pre-trained visual representations (PVRs) for training downstream policies that execute real-world tasks. Our study involves five different PVRs, each trained for five distinct manipulation or indoor navigation tasks. We performed this evaluation using three different robots and two different policy learning paradigms. From this effort, we c… ▽ More

    Submitted 13 July, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: Project website https://pvrs-sim2real.github.io/

    MSC Class: 68T45 (Primary) 68T40; 68T05(Secondary) ACM Class: I.2.9; I.2.6; I.4.8; I.5.4

  14. arXiv:2308.04886  [pdf, other

    cs.CL cs.CV cs.SD eess.AS

    Unsupervised Out-of-Distribution Dialect Detection with Mahalanobis Distance

    Authors: Sourya Dipta Das, Yash Vadi, Abhishek Unnam, Kuldeep Yadav

    Abstract: Dialect classification is used in a variety of applications, such as machine translation and speech recognition, to improve the overall performance of the system. In a real-world scenario, a deployed dialect classification model can encounter anomalous inputs that differ from the training data distribution, also called out-of-distribution (OOD) samples. Those OOD samples can lead to unexpected out… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Accepted in Interspeech 2023

  15. arXiv:2308.02973  [pdf, other

    cs.CR

    A Security and Usability Analysis of Local Attacks Against FIDO2

    Authors: Tarun Kumar Yadav, Kent Seamons

    Abstract: The FIDO2 protocol aims to strengthen or replace password authentication using public-key cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote attackers that compromise a password or attempt to phish the user. In this paper, we explore threats from local attacks on FIDO2 that have received less attention -- a browser extension compromise and attackers gaining… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  16. arXiv:2307.14374  [pdf, other

    cs.LG

    Forecasting, capturing and activation of carbon-dioxide (CO$_2$): Integration of Time Series Analysis, Machine Learning, and Material Design

    Authors: Suchetana Sadhukhan, Vivek Kumar Yadav

    Abstract: This study provides a comprehensive time series analysis of daily industry-specific, country-wise CO$_2$ emissions from January 2019 to February 2023. The research focuses on the Power, Industry, Ground Transport, Domestic Aviation, and International Aviation sectors in European countries (EU27 & UK, Italy, Germany, Spain) and India, utilizing near-real-time activity data from the Carbon Monitor r… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: 38 pages, 16 figures

  17. arXiv:2306.15768  [pdf

    cs.CV

    An Efficient Deep Convolutional Neural Network Model For Yoga Pose Recognition Using Single Images

    Authors: Santosh Kumar Yadav, Apurv Shukla, Kamlesh Tiwari, Hari Mohan Pandey, Shaik Ali Akbar

    Abstract: Pose recognition deals with designing algorithms to locate human body joints in a 2D/3D space and run inference on the estimated joint locations for predicting the poses. Yoga poses consist of some very complex postures. It imposes various challenges on the computer vision algorithms like occlusion, inter-class similarity, intra-class variability, viewpoint complexity, etc. This paper presents YPo… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  18. arXiv:2306.15765  [pdf

    cs.CV

    A Novel Two Stream Decision Level Fusion of Vision and Inertial Sensors Data for Automatic Multimodal Human Activity Recognition System

    Authors: Santosh Kumar Yadav, Muhtashim Rafiqi, Egna Praneeth Gummana, Kamlesh Tiwari, Hari Mohan Pandey, Shaik Ali Akbara

    Abstract: This paper presents a novel multimodal human activity recognition system. It uses a two-stream decision level fusion of vision and inertial sensors. In the first stream, raw RGB frames are passed to a part affinity field-based pose estimation network to detect the keypoints of the user. These keypoints are then pre-processed and inputted in a sliding window fashion to a specially designed convolut… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  19. arXiv:2306.11565  [pdf, other

    cs.RO cs.AI cs.CV

    HomeRobot: Open-Vocabulary Mobile Manipulation

    Authors: Sriram Yenamandra, Arun Ramachandran, Karmesh Yadav, Austin Wang, Mukul Khanna, Theophile Gervet, Tsung-Yen Yang, Vidhi Jain, Alexander William Clegg, John Turner, Zsolt Kira, Manolis Savva, Angel Chang, Devendra Singh Chaplot, Dhruv Batra, Roozbeh Mottaghi, Yonatan Bisk, Chris Paxton

    Abstract: HomeRobot (noun): An affordable compliant robot that navigates homes and manipulates a wide range of objects in order to complete everyday tasks. Open-Vocabulary Mobile Manipulation (OVMM) is the problem of picking any object in any unseen environment, and placing it in a commanded location. This is a foundational challenge for robots to be useful assistants in human environments, because it invol… ▽ More

    Submitted 10 January, 2024; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 37 pages, 22 figures, 8 tables

  20. arXiv:2305.14622  [pdf, other

    cs.CL cs.LG

    EXnet: Efficient In-context Learning for Data-less Text classification

    Authors: Debaditya Shome, Kuldeep Yadav

    Abstract: Large pre-trained language models (PLMs) have made significant progress in encoding world knowledge and spawned a new set of learning paradigms including zero-shot, few-shot, and in-context learning. Many language tasks can be modeled as a set of prompts (for example, is this text about geography?) and language models can provide binary answers, i.e., Yes or No. There is evidence to suggest that t… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  21. arXiv:2305.07118  [pdf, other

    cs.IT cs.CR

    Commitment over Gaussian Unfair Noisy Channels

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes, however, their imprecise statistical characterization can severely impair such schemes, especially their security guarantees. Keeping our focus on channel unreliability in this work, we study commitment over unreliable con… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: The paper follows alphabetical author order. AKY, MM, and PJ have equally contributed to this work

  22. arXiv:2305.05745  [pdf, other

    cs.IT math.PR

    Information Spectrum Converse for Minimum Entropy Couplings and Functional Representations

    Authors: Yanina Y. Shkel, Anuj Kumar Yadav

    Abstract: Given two jointly distributed random variables $(X,Y)$, a functional representation of $X$ is a random variable $Z$ independent of $Y$, and a deterministic function $g(\cdot, \cdot)$ such that $X=g(Y,Z)$. The problem of finding a minimum entropy functional representation is known to be equivalent to the problem of finding a minimum entropy coupling where, given a collection of probability distribu… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 2023 IEEE International Symposium on Information Theory (ISIT)

  23. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  24. arXiv:2304.01192  [pdf, other

    cs.CV cs.RO

    Navigating to Objects Specified by Images

    Authors: Jacob Krantz, Theophile Gervet, Karmesh Yadav, Austin Wang, Chris Paxton, Roozbeh Mottaghi, Dhruv Batra, Jitendra Malik, Stefan Lee, Devendra Singh Chaplot

    Abstract: Images are a convenient way to specify which particular object instance an embodied agent should navigate to. Solving this task requires semantic visual reasoning and exploration of unknown environments. We present a system that can perform this task in both simulation and the real world. Our modular method solves sub-tasks of exploration, goal instance re-identification, goal localization, and lo… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  25. arXiv:2303.18240  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Where are we in the search for an Artificial Visual Cortex for Embodied Intelligence?

    Authors: Arjun Majumdar, Karmesh Yadav, Sergio Arnaud, Yecheng Jason Ma, Claire Chen, Sneha Silwal, Aryan Jain, Vincent-Pierre Berges, Pieter Abbeel, Jitendra Malik, Dhruv Batra, Yixin Lin, Oleksandr Maksymets, Aravind Rajeswaran, Franziska Meier

    Abstract: We present the largest and most comprehensive empirical study of pre-trained visual representations (PVRs) or visual 'foundation models' for Embodied AI. First, we curate CortexBench, consisting of 17 different tasks spanning locomotion, navigation, dexterous, and mobile manipulation. Next, we systematically evaluate existing PVRs and find that none are universally dominant. To study the effect of… ▽ More

    Submitted 1 February, 2024; v1 submitted 31 March, 2023; originally announced March 2023.

    Comments: Project website: https://eai-vc.github.io

  26. arXiv:2303.07798  [pdf, other

    cs.CV cs.AI

    OVRL-V2: A simple state-of-art baseline for ImageNav and ObjectNav

    Authors: Karmesh Yadav, Arjun Majumdar, Ram Ramrakhya, Naoki Yokoyama, Alexei Baevski, Zsolt Kira, Oleksandr Maksymets, Dhruv Batra

    Abstract: We present a single neural network architecture composed of task-agnostic components (ViTs, convolutions, and LSTMs) that achieves state-of-art results on both the ImageNav ("go to location in <this picture>") and ObjectNav ("find a chair") tasks without any task-specific modules like object detection, segmentation, mapping, or planning modules. Such general-purpose methods offer advantages of sim… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: 15 pages, 7 figures, 9 tables

  27. arXiv:2303.01054  [pdf

    eess.IV cs.CV

    Deep Learning based Segmentation of Optical Coherence Tomographic Images of Human Saphenous Varicose Vein

    Authors: Maryam Viqar, Violeta Madjarova, Amit Kumar Yadav, Desislava Pashkuleva, Alexander S. Machikhin

    Abstract: Deep-learning based segmentation model is proposed for Optical Coherence Tomography images of human varicose vein based on the U-Net model employing atrous convolution with residual blocks, which gives an accuracy of 0.9932.

    Submitted 2 March, 2023; originally announced March 2023.

  28. arXiv:2212.07527  [pdf

    cs.CV

    Plastic Contaminant Detection in Aerial Imagery of Cotton Fields with Deep Learning

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Robert G. Hardin, Stephen W. Searcy, Ulisses Braga-Neto, Sorin C. Popescu, Roberto Rodriguez, Daniel E Martin, Juan Enciso, Karem Meza, Emma L. White

    Abstract: Plastic shopping bags that get carried away from the side of roads and tangled on cotton plants can end up at cotton gins if not removed before the harvest. Such bags may not only cause problem in the ginning process but might also get embodied in cotton fibers reducing its quality and marketable value. Therefore, it is required to detect, locate, and remove the bags before cotton is harvested. Ma… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: preprint

  29. arXiv:2212.03384  [pdf

    cs.CV

    DroneAttention: Sparse Weighted Temporal Attention for Drone-Camera Based Activity Recognition

    Authors: Santosh Kumar Yadav, Achleshwar Luthra, Esha Pahwa, Kamlesh Tiwari, Heena Rathore, Hari Mohan Pandey, Peter Corcoran

    Abstract: Human activity recognition (HAR) using drone-mounted cameras has attracted considerable interest from the computer vision research community in recent years. A robust and efficient HAR system has a pivotal role in fields like video surveillance, crowd behavior analysis, sports analysis, and human-computer interaction. What makes it challenging are the complex poses, understanding different viewpoi… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2211.05531

  30. arXiv:2211.11746  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Last-Mile Embodied Visual Navigation

    Authors: Justin Wasserman, Karmesh Yadav, Girish Chowdhary, Abhinav Gupta, Unnat Jain

    Abstract: Realistic long-horizon tasks like image-goal navigation involve exploratory and exploitative phases. Assigned with an image of the goal, an embodied agent must explore to discover the goal, i.e., search efficiently using learned priors. Once the goal is discovered, the agent must accurately calibrate the last-mile of navigation to the goal. As with any robust system, switches between exploratory g… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: Accepted at CoRL 2022. Code and results available at https://jbwasse2.github.io/portfolio/SLING

  31. arXiv:2211.05531  [pdf

    cs.CV

    SWTF: Sparse Weighted Temporal Fusion for Drone-Based Activity Recognition

    Authors: Santosh Kumar Yadav, Esha Pahwa, Achleshwar Luthra, Kamlesh Tiwari, Hari Mohan Pandey, Peter Corcoran

    Abstract: Drone-camera based human activity recognition (HAR) has received significant attention from the computer vision research community in the past few years. A robust and efficient HAR system has a pivotal role in fields like video surveillance, crowd behavior analysis, sports analysis, and human-computer interaction. What makes it challenging are the complex poses, understanding different viewpoints,… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

  32. arXiv:2210.09940  [pdf, other

    cs.CR

    Automatic Detection of Fake Key Attacks in Secure Messaging

    Authors: Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent Seamons

    Abstract: Popular instant messaging applications such as WhatsApp and Signal provide end-to-end encryption for billions of users. They rely on a centralized, application-specific server to distribute public keys and relay encrypted messages between the users. Therefore, they prevent passive attacks but are vulnerable to some active attacks. A malicious or hacked server can distribute fake keys to users to p… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: An extended version of our paper published at ACM CCS 2022

  33. arXiv:2210.05633  [pdf, other

    cs.CV

    Habitat-Matterport 3D Semantics Dataset

    Authors: Karmesh Yadav, Ram Ramrakhya, Santhosh Kumar Ramakrishnan, Theo Gervet, John Turner, Aaron Gokaslan, Noah Maestre, Angel Xuan Chang, Dhruv Batra, Manolis Savva, Alexander William Clegg, Devendra Singh Chaplot

    Abstract: We present the Habitat-Matterport 3D Semantics (HM3DSEM) dataset. HM3DSEM is the largest dataset of 3D real-world spaces with densely annotated semantics that is currently available to the academic community. It consists of 142,646 object instance annotations across 216 3D spaces and 3,100 rooms within those spaces. The scale, quality, and diversity of object annotations far exceed those of prior… ▽ More

    Submitted 12 October, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: 15 Pages, 11 Figures, 6 Tables

  34. arXiv:2208.10246  [pdf, other

    cs.CL cs.IT cs.LG

    SDBERT: SparseDistilBERT, a faster and smaller BERT model

    Authors: Devaraju Vinoda, Pawan Kumar Yadav

    Abstract: In this work we introduce a new transformer architecture called SparseDistilBERT (SDBERT), which is a combination of sparse attention and knowledge distillantion (KD). We implemented sparse attention mechanism to reduce quadratic dependency on input length to linear. In addition to reducing computational complexity of the model, we used knowledge distillation (KD). We were able to reduce the size… ▽ More

    Submitted 28 July, 2022; originally announced August 2022.

  35. arXiv:2208.00519  [pdf

    cs.CV cs.AI

    Assessing The Performance of YOLOv5 Algorithm for Detecting Volunteer Cotton Plants in Corn Fields at Three Different Growth Stages

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Stephen W. Searcy, Robert G. Hardin, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: The boll weevil (Anthonomus grandis L.) is a serious pest that primarily feeds on cotton plants. In places like Lower Rio Grande Valley of Texas, due to sub-tropical climatic conditions, cotton plants can grow year-round and therefore the left-over seeds from the previous season during harvest can continue to grow in the middle of rotation crops like corn (Zea mays L.) and sorghum (Sorghum bicolor… ▽ More

    Submitted 31 July, 2022; originally announced August 2022.

    Comments: Preprint Under Review

  36. arXiv:2207.07334  [pdf

    eess.IV cs.AI

    Computer Vision for Volunteer Cotton Detection in a Corn Field with UAS Remote Sensing Imagery and Spot Spray Applications

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Stephen W. Searcy, Robert G. Hardin, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: To control boll weevil (Anthonomus grandis L.) pest re-infestation in cotton fields, the current practices of volunteer cotton (VC) (Gossypium hirsutum L.) plant detection in fields of rotation crops like corn (Zea mays L.) and sorghum (Sorghum bicolor L.) involve manual field scouting at the edges of fields. This leads to many VC plants growing in the middle of fields remain undetected that conti… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: 39 pages

  37. arXiv:2207.06673  [pdf

    cs.CV cs.AI

    Detecting Volunteer Cotton Plants in a Corn Field with Deep Learning on UAV Remote-Sensing Imagery

    Authors: Pappu Kumar Yadav, J. Alex Thomasson, Robert Hardin, Stephen W. Searcy, Ulisses Braga-Neto, Sorin C. Popescu, Daniel E. Martin, Roberto Rodriguez, Karem Meza, Juan Enciso, Jorge Solorzano Diaz, Tianyi Wang

    Abstract: The cotton boll weevil, Anthonomus grandis Boheman is a serious pest to the U.S. cotton industry that has cost more than 16 billion USD in damages since it entered the United States from Mexico in the late 1800s. This pest has been nearly eradicated; however, southern part of Texas still faces this issue and is always prone to the pest reinfestation each year due to its sub-tropical climate where… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: 38 Pages

  38. arXiv:2205.06673  [pdf

    q-fin.ST cs.AI cs.LG

    Univariate and Multivariate LSTM Model for Short-Term Stock Market Prediction

    Authors: Vishal Kuber, Divakar Yadav, Arun Kr Yadav

    Abstract: Designing robust and accurate prediction models has been a viable research area since a long time. While proponents of a well-functioning market predictors believe that it is difficult to accurately predict market prices but many scholars disagree. Robust and accurate prediction systems will not only be helpful to the businesses but also to the individuals in making their financial investments. Th… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: 24 pages, 20 figures, 8 tables

  39. arXiv:2204.13226  [pdf, other

    cs.CV cs.LG

    Offline Visual Representation Learning for Embodied Navigation

    Authors: Karmesh Yadav, Ram Ramrakhya, Arjun Majumdar, Vincent-Pierre Berges, Sachit Kuhar, Dhruv Batra, Alexei Baevski, Oleksandr Maksymets

    Abstract: How should we learn visual representations for embodied agents that must see and move? The status quo is tabula rasa in vivo, i.e. learning visual representations from scratch while also learning to move, potentially augmented with auxiliary tasks (e.g. predicting the action taken between two successive observations). In this paper, we show that an alternative 2-stage strategy is far more effectiv… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

    Comments: 15 pages, 4 figures, 7 tables and supplementary

  40. arXiv:2204.12067  [pdf, other

    cs.CV cs.MM

    An Overview of Recent Work in Media Forensics: Methods and Threats

    Authors: Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp

    Abstract: In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents. For each data modality, we discuss synthesis and manipulation techniques that can be used to create and modify digital media. We then review technological advancements for detecting and quantifying such manipulations. Finally, we consider open issues and suggest directions… ▽ More

    Submitted 12 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This is a longer version of a paper accepted to the 2022 IEEE International Conference on Multimedia Information Processing and Retrieval entitled "An Overview of Recent Work in Multimedia Forensics"

  41. arXiv:2204.01849  [pdf

    cs.CL cs.IR cs.LG

    Automatic Text Summarization Methods: A Comprehensive Review

    Authors: Divakar Yadav, Jalpa Desai, Arun Kumar Yadav

    Abstract: One of the most pressing issues that have arisen due to the rapid growth of the Internet is known as information overloading. Simplifying the relevant information in the form of a summary will assist many people because the material on any topic is plentiful on the Internet. Manually summarising massive amounts of text is quite challenging for humans. So, it has increased the need for more complex… ▽ More

    Submitted 3 March, 2022; originally announced April 2022.

    Comments: 20 pages, 7 figures and 4 tables

  42. arXiv:2111.08477  [pdf, other

    cs.IT cs.CR

    On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is an important cryptographic primitive. It is well known that noisy channels are a promising resource to realize commitment in an information-theoretically secure manner. However, oftentimes, channel behaviour may be poorly characterized thereby limiting the commitment throughput and/or degrading the security guarantees; particularly problematic is when a dishonest party, unbeknown to… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 16 pages, 3 figures

  43. arXiv:2108.04001  [pdf, other

    cs.AI

    Development of Human Motion Prediction Strategy using Inception Residual Block

    Authors: Shekhar Gupta, Gaurav Kumar Yadav, G. C. Nandi

    Abstract: Human Motion Prediction is a crucial task in computer vision and robotics. It has versatile application potentials such as in the area of human-robot interactions, human action tracking for airport security systems, autonomous car navigation, computer gaming to name a few. However, predicting human motion based on past actions is an extremely challenging task due to the difficulties in detecting s… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

  44. arXiv:2108.00640  [pdf, ps, other

    cs.LG eess.SP

    Few-shot calibration of low-cost air pollution (PM2.5) sensors using meta-learning

    Authors: Kalpit Yadav, Vipul Arora, Sonu Kumar Jha, Mohit Kumar, Sachchida Nand Tripathi

    Abstract: Low-cost particulate matter sensors are transforming air quality monitoring because they have lower costs and greater mobility as compared to reference monitors. Calibration of these low-cost sensors requires training data from co-deployed reference monitors. Machine Learning based calibration gives better performance than conventional techniques, but requires a large amount of training data from… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: 3+1 pages, submitted to IEEE sensors conference 2021

  45. arXiv:2104.06901  [pdf, other

    cs.CL cs.AI cs.LG

    Enhancing Interpretable Clauses Semantically using Pretrained Word Representation

    Authors: Rohan Kumar Yadav, Lei Jiao, Ole-Christoffer Granmo, Morten Goodwin

    Abstract: Tsetlin Machine (TM) is an interpretable pattern recognition algorithm based on propositional logic, which has demonstrated competitive performance in many Natural Language Processing (NLP) tasks, including sentiment analysis, text classification, and Word Sense Disambiguation. To obtain human-level interpretability, legacy TM employs Boolean input features such as bag-of-words (BOW). However, the… ▽ More

    Submitted 10 September, 2021; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: BlackboxNLP 2021

  46. arXiv:2102.10799  [pdf

    cs.LG

    Clustering Algorithm to Detect Adversaries in Federated Learning

    Authors: Krishna Yadav, B. B Gupta

    Abstract: In recent times, federated machine learning has been very useful in building intelligent intrusion detection systems for IoT devices. As IoT devices are equipped with a security architecture vulnerable to various attacks, these security loopholes may bring a risk during federated training of decentralized IoT devices. Adversaries can take control over these IoT devices and inject false gradients t… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

    Comments: To appear in 39th IEEE Conference on Consumer Electronics(Jan 11-13 2021 )

  47. arXiv:2101.03235  [pdf

    cs.CL cs.AI

    Key Phrase Extraction & Applause Prediction

    Authors: Krishna Yadav, Lakshya Choudhary

    Abstract: With the increase in content availability over the internet it is very difficult to get noticed. It has become an upmost the priority of the blog writers to get some feedback over their creations to be confident about the impact of their article. We are training a machine learning model to learn popular article styles, in the form of vector space representations using various word embeddings, and… ▽ More

    Submitted 1 January, 2021; originally announced January 2021.

    Comments: 4 pages, 8 figures best project award winner. https://krishna19039.medium.com/key-phrase-extraction-applause-prediction-7b397c7ad76d

  48. arXiv:2101.02397  [pdf, other

    cs.LG cs.AI

    A Comprehensive Study on Optimization Strategies for Gradient Descent In Deep Learning

    Authors: Kaustubh Yadav

    Abstract: One of the most important parts of Artificial Neural Networks is minimizing the loss functions which tells us how good or bad our model is. To minimize these losses we need to tune the weights and biases. Also to calculate the minimum value of a function we need gradient. And to update our weights we need gradient descent. But there are some problems with regular gradient descent ie. it is quite s… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

  49. arXiv:2012.03201  [pdf, other

    cs.CL

    A Two-Systems Perspective for Computational Thinking

    Authors: Arvind W Kiwelekar, Swanand Navandar, Dharmendra K. Yadav

    Abstract: Computational Thinking (CT) has emerged as one of the vital thinking skills in recent times, especially for Science, Technology, Engineering and Management (STEM) graduates. Educators are in search of underlying cognitive models against which CT can be analyzed and evaluated. This paper suggests adopting Kahneman's two-systems model as a framework to understand the computational thought process. K… ▽ More

    Submitted 6 December, 2020; originally announced December 2020.

    Comments: Accepted version of the paper for 12th International Conference on Intelligent Human Interaction (IHCI 2020) held from 24th to 26th November 2020 at Exco-Daegu South Korea

  50. arXiv:2009.04861  [pdf, other

    cs.AI cs.LG

    Massively Parallel and Asynchronous Tsetlin Machine Architecture Supporting Almost Constant-Time Scaling

    Authors: K. Darshana Abeyrathna, Bimal Bhattarai, Morten Goodwin, Saeed Gorji, Ole-Christoffer Granmo, Lei Jiao, Rupsa Saha, Rohan K. Yadav

    Abstract: Using logical clauses to represent patterns, Tsetlin Machines (TMs) have recently obtained competitive performance in terms of accuracy, memory footprint, energy, and learning speed on several benchmarks. Each TM clause votes for or against a particular class, with classification resolved using a majority vote. While the evaluation of clauses is fast, being based on binary operators, the voting ma… ▽ More

    Submitted 9 June, 2021; v1 submitted 10 September, 2020; originally announced September 2020.

    Comments: Accepted to ICML 2021