Skip to main content

Showing 1–50 of 55 results for author: Ishwar, P

.
  1. Detecting Frames in News Headlines and Lead Images in U.S. Gun Violence Coverage

    Authors: Isidora Chara Tourni, Lei Guo, Hengchang Hu, Edward Halim, Prakash Ishwar, Taufiq Daryanto, Mona Jalal, Boqi Chen, Margrit Betke, Fabian Zhafransyah, Sha Lai, Derry Tanti Wijaya

    Abstract: News media structure their reporting of events or issues using certain perspectives. When describing an incident involving gun violence, for example, some journalists may focus on mental health or gun regulation, while others may emphasize the discussion of gun rights. Such perspectives are called \say{frames} in communication research. We study, for the first time, the value of combining lead i… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: published at Findings of the Association for Computational Linguistics: EMNLP 2021

  2. arXiv:2312.06544  [pdf, ps, other

    cs.DC cs.PF

    Complexity Evaluation of Parallel Execution of the RAPiD Deep-Learning Algorithm on Intel CPU

    Authors: Dominic Konrad, Zhihao Duan, Mertcan Cokbas, Prakash Ishwar

    Abstract: Knowing how many and where are people in various indoor spaces is critical for reducing HVAC energy waste, space management, spatial analytics and in emergency scenarios. While a range of technologies have been proposed to detect and track people in large indoor spaces, ceiling-mounted fisheye cameras have recently emerged as strong contenders. Currently, RAPiD is the SOTA algorithm for people det… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Report number: ECE-2022-04

  3. arXiv:2311.05139  [pdf, other

    cs.LG

    On neural and dimensional collapse in supervised and unsupervised contrastive learning with hard negative sampling

    Authors: Ruijie Jiang, Thuan Nguyen, Shuchin Aeron, Prakash Ishwar

    Abstract: For a widely-studied data model and general loss and sample-hardening functions we prove that the Supervised Contrastive Learning (SCL), Hard-SCL (HSCL), and Unsupervised Contrastive Learning (UCL) risks are minimized by representations that exhibit Neural Collapse (NC), i.e., the class means form an Equianglular Tight Frame (ETF) and data from the same class are mapped to the same representation.… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  4. arXiv:2304.00629  [pdf, ps, other

    cs.LG

    A principled approach to model validation in domain generalization

    Authors: Boyang Lyu, Thuan Nguyen, Matthias Scheutz, Prakash Ishwar, Shuchin Aeron

    Abstract: Domain generalization aims to learn a model with good generalization ability, that is, the learned model should not only perform well on several seen domains but also on unseen domains with different data distributions. State-of-the-art domain generalization methods typically train a representation function followed by a classifier jointly to minimize both the classification risk and the domain di… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: Accepted to ICASSP 2023

  5. Estimating Distances Between People using a Single Overhead Fisheye Camera with Application to Social-Distancing Oversight

    Authors: Zhangchi Lu, Mertcan Cokbas, Prakash Ishwar, Jansuz Konrad

    Abstract: Unobtrusive monitoring of distances between people indoors is a useful tool in the fight against pandemics. A natural resource to accomplish this are surveillance cameras. Unlike previous distance estimation methods, we use a single, overhead, fisheye camera with wide area coverage and propose two approaches. One method leverages a geometric model of the fisheye lens, whereas the other method uses… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Journal ref: In Proceedings of the 18th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 5: VISAPP (2023), pages 528-535

  6. arXiv:2212.11477  [pdf, other

    cs.CV

    Spatio-Visual Fusion-Based Person Re-Identification for Overhead Fisheye Images

    Authors: Mertcan Cokbas, Prakash Ishwar, Janusz Konrad

    Abstract: Person re-identification (PRID) has been thoroughly researched in typical surveillance scenarios where various scenes are monitored by side-mounted, rectilinear-lens cameras. To date, few methods have been proposed for fisheye cameras mounted overhead and their performance is lacking. In order to close this performance gap, we propose a multi-feature framework for fisheye PRID where we combine dee… ▽ More

    Submitted 25 April, 2023; v1 submitted 21 December, 2022; originally announced December 2022.

  7. arXiv:2210.15000  [pdf, ps, other

    cs.LG cs.CV

    Trade-off between reconstruction loss and feature alignment for domain generalization

    Authors: Thuan Nguyen, Boyang Lyu, Prakash Ishwar, Matthias Scheutz, Shuchin Aeron

    Abstract: Domain generalization (DG) is a branch of transfer learning that aims to train the learning models on several seen domains and subsequently apply these pre-trained models to other unseen (unknown but related) domains. To deal with challenging settings in DG where both data and label of the unseen domain are not available at training time, the most common approach is to design the classifiers based… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: 13 pages, 2 tables

    Journal ref: International Conference on Machine Learning and Applications (ICMLA-2022)

  8. arXiv:2210.01582  [pdf, other

    cs.CV

    FRIDA: Fisheye Re-Identification Dataset with Annotations

    Authors: Mertcan Cokbas, John Bolognino, Janusz Konrad, Prakash Ishwar

    Abstract: Person re-identification (PRID) from side-mounted rectilinear-lens cameras is a well-studied problem. On the other hand, PRID from overhead fisheye cameras is new and largely unstudied, primarily due to the lack of suitable image datasets. To fill this void, we introduce the "Fisheye Re-IDentification Dataset with Annotations" (FRIDA), with 240k+ bounding-box annotations of people, captured by 3 t… ▽ More

    Submitted 19 October, 2022; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: 8 pages

  9. arXiv:2209.00078  [pdf, other

    cs.LG

    Supervised Contrastive Learning with Hard Negative Samples

    Authors: Ruijie Jiang, Thuan Nguyen, Prakash Ishwar, Shuchin Aeron

    Abstract: Through minimization of an appropriate loss function such as the InfoNCE loss, contrastive learning (CL) learns a useful representation function by pulling positive samples close to each other while pushing negative samples far apart in the embedding space. The positive samples are typically created using "label-preserving" augmentations, i.e., domain-specific transformations of a given datum or a… ▽ More

    Submitted 10 May, 2024; v1 submitted 31 August, 2022; originally announced September 2022.

  10. arXiv:2208.00898  [pdf, other

    cs.LG cs.AI cs.CV

    Joint covariate-alignment and concept-alignment: a framework for domain generalization

    Authors: Thuan Nguyen, Boyang Lyu, Prakash Ishwar, Matthias Scheutz, Shuchin Aeron

    Abstract: In this paper, we propose a novel domain generalization (DG) framework based on a new upper bound to the risk on the unseen domain. Particularly, our framework proposes to jointly minimize both the covariate-shift as well as the concept-shift between the seen domains for a better performance on the unseen domain. While the proposed approach can be implemented via an arbitrary combination of covari… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: 8 pages, 2 figures, and 1 table. This paper is accepted at 32nd IEEE International Workshop on Machine Learning for Signal Processing (MLSP 2022)

  11. arXiv:2201.10460  [pdf, ps, other

    cs.LG cs.AI

    Conditional entropy minimization principle for learning domain invariant representation features

    Authors: Thuan Nguyen, Boyang Lyu, Prakash Ishwar, Matthias Scheutz, Shuchin Aeron

    Abstract: Invariance-principle-based methods such as Invariant Risk Minimization (IRM), have recently emerged as promising approaches for Domain Generalization (DG). Despite promising theory, such approaches fail in common classification tasks due to the mixing of true invariant features and spurious invariant features. To address this, we propose a framework based on the conditional entropy minimization (C… ▽ More

    Submitted 9 July, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: 10 pages, this paper was accepted at 26th International Conference on Pattern Recognition (ICPR-2022)

  12. arXiv:2111.03169  [pdf, other

    cs.LG math.ST

    Hard Negative Sampling via Regularized Optimal Transport for Contrastive Representation Learning

    Authors: Ruijie Jiang, Prakash Ishwar, Shuchin Aeron

    Abstract: We study the problem of designing hard negative sampling distributions for unsupervised contrastive representation learning. We propose and analyze a novel min-max framework that seeks a representation which minimizes the maximum (worst-case) generalized contrastive learning loss over all couplings (joint distributions between positive and negative samples subject to marginal constraints) and prov… ▽ More

    Submitted 14 December, 2023; v1 submitted 4 November, 2021; originally announced November 2021.

    Comments: Minor changes - fixing typos, minor rephrasing in abstract and introduction

  13. arXiv:2109.04526  [pdf, other

    stat.ML cs.LG

    Ergodic Limits, Relaxations, and Geometric Properties of Random Walk Node Embeddings

    Authors: Christy Lin, Daniel Sussman, Prakash Ishwar

    Abstract: Random walk based node embedding algorithms learn vector representations of nodes by optimizing an objective function of node embedding vectors and skip-bigram statistics computed from random walks on the network. They have been applied to many supervised learning problems such as link prediction and node classification and have demonstrated state-of-the-art performance. Yet, their properties rema… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  14. Barycentric-alignment and reconstruction loss minimization for domain generalization

    Authors: Boyang Lyu, Thuan Nguyen, Prakash Ishwar, Matthias Scheutz, Shuchin Aeron

    Abstract: This paper advances the theory and practice of Domain Generalization (DG) in machine learning. We consider the typical DG setting where the hypothesis is composed of a representation map** followed by a labeling function. Within this setting, the majority of popular DG methods aim to jointly learn the representation and the labeling functions by minimizing a well-known upper bound for the classi… ▽ More

    Submitted 21 May, 2023; v1 submitted 4 September, 2021; originally announced September 2021.

    Comments: This article has been accepted for publication in IEEE Access

  15. arXiv:2101.09585  [pdf, other

    cs.CV

    BSUV-Net 2.0: Spatio-Temporal Data Augmentations for Video-Agnostic Supervised Background Subtraction

    Authors: M. Ozan Tezcan, Prakash Ishwar, Janusz Konrad

    Abstract: Background subtraction (BGS) is a fundamental video processing task which is a key component of many applications. Deep learning-based supervised algorithms achieve very good perforamnce in BGS, however, most of these algorithms are optimized for either a specific video or a group of videos, and their performance decreases dramatically when applied to unseen videos. Recently, several papers addres… ▽ More

    Submitted 24 February, 2021; v1 submitted 23 January, 2021; originally announced January 2021.

  16. arXiv:2008.06974  [pdf, other

    cs.CL cs.IR cs.LG

    OpenFraming: We brought the ML; you bring the data. Interact with your data and discover its frames

    Authors: Alyssa Smith, David Assefa Tofu, Mona Jalal, Edward Edberg Halim, Yimeng Sun, Vidya Akavoor, Margrit Betke, Prakash Ishwar, Lei Guo, Derry Wijaya

    Abstract: When journalists cover a news story, they can cover the story from multiple angles or perspectives. A news article written about COVID-19 for example, might focus on personal preventative actions such as mask-wearing, while another might focus on COVID-19's impact on the economy. These perspectives are called "frames," which when used may influence public perception and opinion of the issue. We in… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: 8 pages, 8 figures, EMNLP 2020 demonstration papers

  17. arXiv:2005.11623  [pdf, other

    cs.CV

    RAPiD: Rotation-Aware People Detection in Overhead Fisheye Images

    Authors: Zhihao Duan, M. Ozan Tezcan, Hayato Nakamura, Prakash Ishwar, Janusz Konrad

    Abstract: Recent methods for people detection in overhead, fisheye images either use radially-aligned bounding boxes to represent people, assuming people always appear along image radius or require significant pre-/post-processing which radically increases computational complexity. In this work, we develop an end-to-end rotation-aware people detection method, named RAPiD, that detects people using arbitrari… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

    Comments: CVPR 2020 OmniCV Workshop paper extended version

  18. arXiv:2004.05685  [pdf, other

    cs.CV

    Low-Resolution Overhead Thermal Tripwire for Occupancy Estimation

    Authors: Mertcan Cokbas, Prakash Ishwar, Janusz Konrad

    Abstract: Smart buildings use occupancy sensing for various tasks ranging from energy-efficient HVAC and lighting to space-utilization analysis and emergency response. We propose a people counting system which uses a low-resolution thermal sensor. Unlike previous people-counting systems based on thermal sensors, we use an overhead tripwire configuration at entryways to detect and track transient entries or… ▽ More

    Submitted 5 May, 2020; v1 submitted 12 April, 2020; originally announced April 2020.

  19. VAE/WGAN-Based Image Representation Learning For Pose-Preserving Seamless Identity Replacement In Facial Images

    Authors: Hiroki Kawai, Jiawei Chen, Prakash Ishwar, Janusz Konrad

    Abstract: We present a novel variational generative adversarial network (VGAN) based on Wasserstein loss to learn a latent representation from a face image that is invariant to identity but preserves head-pose information. This facilitates synthesis of a realistic face image with the same head pose as a given input image, but with a different identity. One application of this network is in privacy-sensitive… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: 6 pages, 5 figures, 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP)

    Journal ref: 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP)

  20. arXiv:1907.11371  [pdf, other

    cs.CV

    BSUV-Net: A Fully-Convolutional Neural Network for Background Subtraction of Unseen Videos

    Authors: M. Ozan Tezcan, Prakash Ishwar, Janusz Konrad

    Abstract: Background subtraction is a basic task in computer vision and video processing often applied as a pre-processing step for object tracking, people recognition, etc. Recently, a number of successful background-subtraction algorithms have been proposed, however nearly all of the top-performing ones are supervised. Crucially, their success relies upon the availability of some annotated frames of the t… ▽ More

    Submitted 14 January, 2020; v1 submitted 25 July, 2019; originally announced July 2019.

    Comments: 10 pages

  21. arXiv:1906.09313  [pdf, other

    cs.CV

    A Cyclically-Trained Adversarial Network for Invariant Representation Learning

    Authors: Jiawei Chen, Janusz Konrad, Prakash Ishwar

    Abstract: Recent studies show that deep neural networks are vulnerable to adversarial examples which can be generated via certain types of transformations. Being robust to a desired family of adversarial attacks is then equivalent to being invariant to a family of transformations. Learning invariant representations then naturally emerges as an important goal to achieve which we explore in this paper within… ▽ More

    Submitted 16 April, 2020; v1 submitted 21 June, 2019; originally announced June 2019.

  22. arXiv:1901.06237  [pdf, other

    cs.HC cs.LG stat.ML

    BUOCA: Budget-Optimized Crowd Worker Allocation

    Authors: Mehrnoosh Sameki, Sha Lai, Kate K. Mays, Lei Guo, Prakash Ishwar, Margrit Betke

    Abstract: Due to concerns about human error in crowdsourcing, it is standard practice to collect labels for the same data point from multiple internet workers. We here show that the resulting budget can be used more effectively with a flexible worker assignment strategy that asks fewer workers to analyze easy-to-label data and more workers to analyze data that requires extra scrutiny. Our main contribution… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  23. arXiv:1901.03383  [pdf, other

    cs.CR

    Collaborative Privacy for Web Applications

    Authors: Yihao Hu, Ari Trachtenberg, Prakash Ishwar

    Abstract: Real-time, online-editing web apps provide free and convenient services for collaboratively editing, sharing and storing files. The benefits of these web applications do not come for free: not only do service providers have full access to the users' files, but they also control access, transmission, and storage mechanisms for them. As a result, user data may be at risk of data mining, third-party… ▽ More

    Submitted 17 November, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: 14 pages, double column, 7 figures

  24. arXiv:1803.07100  [pdf, ps, other

    cs.CV

    VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition

    Authors: Jiawei Chen, Janusz Konrad, Prakash Ishwar

    Abstract: Reliable facial expression recognition plays a critical role in human-machine interactions. However, most of the facial expression analysis methodologies proposed to date pay little or no attention to the protection of a user's privacy. In this paper, we propose a Privacy-Preserving Representation-Learning Variational Generative Adversarial Network (PPRL-VGAN) to learn an image representation that… ▽ More

    Submitted 7 September, 2018; v1 submitted 19 March, 2018; originally announced March 2018.

  25. arXiv:1712.07008  [pdf, other

    cs.IT cs.CR cs.GT cs.LG stat.ML

    Privacy-Preserving Adversarial Networks

    Authors: Ardhendu Tripathy, Ye Wang, Prakash Ishwar

    Abstract: We propose a data-driven framework for optimizing privacy-preserving data release mechanisms to attain the information-theoretically optimal tradeoff between minimizing distortion of useful data and concealing specific sensitive information. Our approach employs adversarially-trained neural networks to implement randomized mechanisms and to perform a variational approximation of mutual information… ▽ More

    Submitted 12 June, 2019; v1 submitted 19 December, 2017; originally announced December 2017.

    Comments: 16 pages

    MSC Class: 94A15; 68T05; 62B10

  26. arXiv:1710.09295  [pdf, other

    cs.IT cs.CR

    Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms

    Authors: Ye Wang, Yuksel Ozan Basciftci, Prakash Ishwar

    Abstract: Privacy-preserving data release mechanisms aim to simultaneously minimize information-leakage with respect to sensitive data and distortion with respect to useful data. Dependencies between sensitive and useful data results in a privacy-utility tradeoff that has strong connections to generalized rate-distortion problems. In this work, we study how the optimal privacy-utility tradeoff region is aff… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: 20 pages, 3 figures, under submission

    MSC Class: 94A15

  27. arXiv:1611.03028  [pdf, ps, other

    cs.SI physics.soc-ph stat.ML

    Node Embedding via Word Embedding for Network Community Discovery

    Authors: Weicong Ding, Christy Lin, Prakash Ishwar

    Abstract: Neural node embeddings have recently emerged as a powerful representation for supervised learning tasks involving graph-structured data. We leverage this recent advance to develop a novel algorithm for unsupervised community discovery in graphs. Through extensive experimental studies on simulated and real-world data, we demonstrate that the proposed approach consistently improves over the current… ▽ More

    Submitted 28 June, 2017; v1 submitted 9 November, 2016; originally announced November 2016.

    Comments: This version has been accepted for publication in a joint special issue between IEEE JSTSP and TSIPN

  28. arXiv:1610.03898  [pdf, other

    cs.CV

    Semi-Coupled Two-Stream Fusion ConvNets for Action Recognition at Extremely Low Resolutions

    Authors: Jiawei Chen, Jonathan Wu, Janusz Konrad, Prakash Ishwar

    Abstract: Deep convolutional neural networks (ConvNets) have been recently shown to attain state-of-the-art performance for action recognition on standard-resolution videos. However, less attention has been paid to recognition performance at extremely low resolutions (eLR) (e.g., 16 x 12 pixels). Reliable action recognition using eLR cameras would address privacy concerns in various application environments… ▽ More

    Submitted 5 October, 2018; v1 submitted 12 October, 2016; originally announced October 2016.

  29. arXiv:1508.05565  [pdf, ps, other

    cs.LG cs.CL cs.IR stat.ML

    Necessary and Sufficient Conditions and a Provably Efficient Algorithm for Separable Topic Discovery

    Authors: Weicong Ding, Prakash Ishwar, Venkatesh Saligrama

    Abstract: We develop necessary and sufficient conditions and a novel provably consistent and efficient algorithm for discovering topics (latent factors) from observations (documents) that are realized from a probabilistic mixture of shared latent factors that have certain properties. Our focus is on the class of topic models in which each shared latent factor contains a novel word that is unique to that fac… ▽ More

    Submitted 4 December, 2015; v1 submitted 22 August, 2015; originally announced August 2015.

    Comments: Typo corrected; Revised argument in Lemma 3 and 4

  30. arXiv:1504.00757  [pdf, ps, other

    cs.LG stat.ML

    Learning Mixed Membership Mallows Models from Pairwise Comparisons

    Authors: Weicong Ding, Prakash Ishwar, Venkatesh Saligrama

    Abstract: We propose a novel parameterized family of Mixed Membership Mallows Models (M4) to account for variability in pairwise comparisons generated by a heterogeneous population of noisy and inconsistent users. M4 models individual preferences as a user-specific probabilistic mixture of shared latent Mallows components. Our key algorithmic insight for estimation is to establish a statistical connection b… ▽ More

    Submitted 3 April, 2015; originally announced April 2015.

  31. arXiv:1412.3705  [pdf, ps, other

    cs.LG stat.ML

    A Topic Modeling Approach to Ranking

    Authors: Weicong Ding, Prakash Ishwar, Venkatesh Saligrama

    Abstract: We propose a topic modeling approach to the prediction of preferences in pairwise comparisons. We develop a new generative model for pairwise comparisons that accounts for multiple shared latent rankings that are prevalent in a population of users. This new model also captures inconsistent user behavior in a natural way. We show how the estimation of latent rankings in the new generative model can… ▽ More

    Submitted 25 January, 2015; v1 submitted 11 December, 2014; originally announced December 2014.

  32. arXiv:1408.0586  [pdf, ps, other

    cs.IT

    A note on the sum-rate-distortion function of some lossy source coding problems involving infinite-valued distortion functions

    Authors: Prakash Ishwar

    Abstract: For a number of lossy source coding problems it is shown that even if the usual single-letter sum-rate-distortion expressions may become invalid for non-infinite distortion functions, they can be approached, to any desired accuracy, via the usual valid expressions for appropriately truncated finite versions of the distortion functions.

    Submitted 4 August, 2014; originally announced August 2014.

    Comments: 4 pages

  33. arXiv:1402.4360  [pdf, ps, other

    cs.CR cs.IT

    An Elementary Completeness Proof for Secure Two-Party Computation Primitives

    Authors: Ye Wang, Prakash Ishwar, Shantanu Rane

    Abstract: In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and output. For semi-honest parties and information-theoretic security guarantees, it is well-known that, if only noiseless communication is available,… ▽ More

    Submitted 12 December, 2014; v1 submitted 18 February, 2014; originally announced February 2014.

    Comments: 6 pages, extended version of ITW 2014 paper

  34. arXiv:1312.0512  [pdf, ps, other

    cs.LG

    Sensing-Aware Kernel SVM

    Authors: Weicong Ding, Prakash Ishwar, Venkatesh Saligrama, W. Clem Karl

    Abstract: We propose a novel approach for designing kernels for support vector machines (SVMs) when the class label is linked to the observation through a latent state and the likelihood function of the observation given the state (the sensing model) is available. We show that the Bayes-optimum decision boundary is a hyperplane under a map** defined by the likelihood function. Combining this with the maxi… ▽ More

    Submitted 13 March, 2014; v1 submitted 2 December, 2013; originally announced December 2013.

  35. arXiv:1311.1490  [pdf, other

    cs.CR cs.GT cs.IT

    On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games

    Authors: Ye Wang, Shantanu Rane, Prakash Ishwar

    Abstract: In game theory, a trusted mediator acting on behalf of the players can enable the attainment of correlated equilibria, which may provide better payoffs than those available from the Nash equilibria alone. We explore the approach of replacing the trusted mediator with an unconditionally secure sampling protocol that jointly generates the players' actions. We characterize the joint distributions tha… ▽ More

    Submitted 6 November, 2013; originally announced November 2013.

    Comments: 4 pages, to appear at GlobalSIP 2013

  36. arXiv:1310.7994  [pdf, ps, other

    cs.LG cs.IR stat.ML

    Necessary and Sufficient Conditions for Novel Word Detection in Separable Topic Models

    Authors: Weicong Ding, Prakash Ishwar, Mohammad H. Rohban, Venkatesh Saligrama

    Abstract: The simplicial condition and other stronger conditions that imply it have recently played a central role in develo** polynomial time algorithms with provable asymptotic consistency and sample complexity guarantees for topic estimation in separable topic models. Of these algorithms, those that rely solely on the simplicial condition are impractical while the practical ones need stronger condition… ▽ More

    Submitted 29 October, 2013; originally announced October 2013.

  37. Secure Biometrics: Concepts, Authentication Architectures and Challenges

    Authors: Shantanu Rane, Ye Wang, Stark. C. Draper, Prakash Ishwar

    Abstract: BIOMETRICS are an important and widely used class of methods for identity verification and access control. Biometrics are attractive because they are inherent properties of an individual. They need not be remembered like passwords, and are not easily lost or forged like identifying documents. At the same time, bio- metrics are fundamentally noisy and irreplaceable. There are always slight variatio… ▽ More

    Submitted 21 May, 2013; originally announced May 2013.

    Comments: 16 pages, 11 figures, 1 table

  38. arXiv:1303.3664  [pdf, ps, other

    stat.ML cs.LG

    Topic Discovery through Data Dependent and Random Projections

    Authors: Weicong Ding, Mohammad H. Rohban, Prakash Ishwar, Venkatesh Saligrama

    Abstract: We present algorithms for topic modeling based on the geometry of cross-document word-frequency patterns. This perspective gains significance under the so called separability condition. This is a condition on existence of novel-words that are unique to each topic. We present a suite of highly efficient algorithms based on data-dependent and random projections of word-frequency patterns to identify… ▽ More

    Submitted 18 March, 2013; v1 submitted 14 March, 2013; originally announced March 2013.

  39. An Impossibility Result for High Dimensional Supervised Learning

    Authors: Mohammad Hossein Rohban, Prakash Ishwar, Birant Orten, William C. Karl, Venkatesh Saligrama

    Abstract: We study high-dimensional asymptotic performance limits of binary supervised classification problems where the class conditional densities are Gaussian with unknown means and covariances and the number of signal dimensions scales faster than the number of labeled training samples. We show that the Bayes error, namely the minimum attainable error probability with complete distributional knowledge a… ▽ More

    Submitted 25 April, 2013; v1 submitted 29 January, 2013; originally announced January 2013.

    Comments: This paper was submitted to the IEEE Information Theory Workshop (ITW) 2013 on April 23, 2013

  40. A New Geometric Approach to Latent Topic Modeling and Discovery

    Authors: Weicong Ding, Mohammad H. Rohban, Prakash Ishwar, Venkatesh Saligrama

    Abstract: A new geometrically-motivated algorithm for nonnegative matrix factorization is developed and applied to the discovery of latent "topics" for text and image "document" corpora. The algorithm is based on robustly finding and clustering extreme points of empirical cross-document word-frequencies that correspond to novel "words" unique to each topic. In contrast to related approaches that are based o… ▽ More

    Submitted 4 January, 2013; originally announced January 2013.

    Comments: This paper was submitted to the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2013 on November 30, 2012

  41. arXiv:1206.2669  [pdf, other

    cs.CR cs.IT

    Information-Theoretically Secure Three-Party Computation with One Corrupted Party

    Authors: Ye Wang, Prakash Ishwar, Shantanu Rane

    Abstract: The problem in which one of three pairwise interacting parties is required to securely compute a function of the inputs held by the other two, when one party may arbitrarily deviate from the computation protocol (active behavioral model), is studied. An information-theoretic characterization of unconditionally secure computation protocols under the active behavioral model is provided. A protocol f… ▽ More

    Submitted 4 February, 2013; v1 submitted 12 June, 2012; originally announced June 2012.

    Comments: 7 pages, 1 figure, submitted to ISIT 2013

  42. arXiv:1112.5630  [pdf, other

    cs.IT cs.CR

    A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems

    Authors: Ye Wang, Shantanu Rane, Stark C. Draper, Prakash Ishwar

    Abstract: We present a theoretical framework for the analysis of privacy and security tradeoffs in secure biometric authentication systems. We use this framework to conduct a comparative information-theoretic analysis of two biometric systems that are based on linear error correction codes, namely fuzzy commitment and secure sketches. We derive upper bounds for the probability of false rejection ($P_{FR}$)… ▽ More

    Submitted 23 December, 2011; originally announced December 2011.

    Comments: 15 pages

  43. arXiv:1010.0670  [pdf, other

    cs.CR cs.IT

    Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost

    Authors: Ye Wang, Shantanu Rane, Prakash Ishwar, Wei Sun

    Abstract: Consider a network of k parties, each holding a long sequence of n entries (a database), with minimum vertex-cut greater than t. We show that any empirical statistic across the network of databases can be computed by each party with perfect privacy, against any set of t < k/2 passively colluding parties, such that the worst-case distortion and communication cost (in bits per database entry) both g… ▽ More

    Submitted 18 February, 2014; v1 submitted 4 October, 2010; originally announced October 2010.

    Comments: 12 pages, 6 figures

  44. arXiv:1001.2781  [pdf, ps, other

    cs.IT

    Interaction Strictly Improves the Wyner-Ziv Rate-distortion function

    Authors: Nan Ma, Prakash Ishwar

    Abstract: In 1985 Kaspi provided a single-letter characterization of the sum-rate-distortion function for a two-way lossy source coding problem in which two terminals send multiple messages back and forth with the goal of reproducing each other's sources. Yet, the question remained whether more messages can strictly improve the sum-rate-distortion function. Viewing the sum-rate as a functional of the distor… ▽ More

    Submitted 1 June, 2010; v1 submitted 15 January, 2010; originally announced January 2010.

    Comments: 5 pages, submitted to IEEE International Symposium on Information Theory (ISIT) 2010

  45. Infinite-message Interactive Function Computation in Collocated Networks

    Authors: Nan Ma, Prakash Ishwar

    Abstract: An interactive function computation problem in a collocated network is studied in a distributed block source coding framework. With the goal of computing a desired function at the sink, the source nodes exchange messages through a sequence of error-free broadcasts. The infinite-message minimum sum-rate is viewed as a functional of the joint source pmf and is characterized as the least element in a… ▽ More

    Submitted 1 June, 2010; v1 submitted 11 January, 2010; originally announced January 2010.

    Comments: 5 pages. 2 figures. This draft has been submitted to IEEE International Symposium on Information Theory (ISIT) 2010

  46. arXiv:0908.3512  [pdf, ps, other

    cs.IT

    The Infinite-message Limit of Two-terminal Interactive Source Coding

    Authors: Nan Ma, Prakash Ishwar

    Abstract: A two-terminal interactive function computation problem with alternating messages is studied within the framework of distributed block source coding theory. For any finite number of messages, a single-letter characterization of the sum-rate-distortion function was established in previous works using standard information-theoretic techniques. This, however, does not provide a satisfactory character… ▽ More

    Submitted 2 August, 2012; v1 submitted 24 August, 2009; originally announced August 2009.

    Comments: 40 pages, 5 figures. Submitted to IEEE Transactions on Information Theory in Sep 2010 and revised in Mar 2012. This version (version 3) is the latest revised version. Version 1 was published in Allerton Conference 2009. Version 2 contains extensions to the rate-distortion theory and an achievable proof of the sum-rate R* in the second example

  47. arXiv:0902.0822  [pdf, ps, other

    cs.CR cs.IT

    Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation

    Authors: Ye Wang, Prakash Ishwar

    Abstract: We propose an information theoretic framework for the secure two-party function computation (SFC) problem and introduce the notion of SFC capacity. We study and extend string oblivious transfer (OT) to sample-wise OT. We propose an efficient, perfectly private OT protocol utilizing the binary erasure channel or source. We also propose the bootstrap string OT protocol which provides disjoint (wea… ▽ More

    Submitted 4 February, 2009; originally announced February 2009.

    Comments: 5 pages, 2 figures. Submitted to 2009 IEEE International Symposium on Information Theory, Seoul, South Korea

  48. Information-Theoretic Bounds for Multiround Function Computation in Collocated Networks

    Authors: Nan Ma, Prakash Ishwar, Piyush Gupta

    Abstract: We study the limits of communication efficiency for function computation in collocated networks within the framework of multi-terminal block source coding theory. With the goal of computing a desired function of sources at a sink, nodes interact with each other through a sequence of error-free, network-wide broadcasts of finite-rate messages. For any function of independent sources, we derive a… ▽ More

    Submitted 28 January, 2009; v1 submitted 15 January, 2009; originally announced January 2009.

    Comments: 9 pages. A 5-page version without appendices was submitted to IEEE International Symposium on Information Theory (ISIT), 2009. This version contains complete proofs as appendices

  49. arXiv:0801.0756  [pdf, ps, other

    cs.IT

    Distributed Source Coding for Interactive Function Computation

    Authors: Nan Ma, Prakash Ishwar

    Abstract: A two-terminal interactive distributed source coding problem with alternating messages for function computation at both locations is studied. For any number of messages, a computable characterization of the rate region is provided in terms of single-letter information measures. While interaction is useless in terms of the minimum sum-rate for lossless source reproduction at one or both locations… ▽ More

    Submitted 12 November, 2008; v1 submitted 4 January, 2008; originally announced January 2008.

    Comments: 30 pages, 6 figures. This work has been submitted to the IEEE for possible publication. Parts of this work were presented at 2008 IEEE International Symposium on Information Theory (ISIT'08)

  50. arXiv:0707.2176  [pdf, ps, other

    cs.IT

    Benefit of Delay on the Diversity-Multiplexing Tradeoffs of MIMO Channels with Partial CSI

    Authors: Masoud Sharif, Prakash Ishwar

    Abstract: This paper re-examines the well-known fundamental tradeoffs between rate and reliability for the multi-antenna, block Rayleigh fading channel in the high signal to noise ratio (SNR) regime when (i) the transmitter has access to (noiseless) one bit per coherence-interval of causal channel state information (CSI) and (ii) soft decoding delays together with worst-case delay guarantees are acceptabl… ▽ More

    Submitted 14 July, 2007; originally announced July 2007.

    Comments: 5 pages, 2 figures, to appear in the Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24-29 June, 2007