Skip to main content

Showing 1–50 of 64 results for author: Jha, N K

.
  1. arXiv:2406.16351  [pdf, other

    cs.LG stat.ME

    METRIK: Measurement-Efficient Randomized Controlled Trials using Transformers with Input Masking

    Authors: Sayeri Lala, Niraj K. Jha

    Abstract: Clinical randomized controlled trials (RCTs) collect hundreds of measurements spanning various metric types (e.g., laboratory tests, cognitive/motor assessments, etc.) across 100s-1000s of subjects to evaluate the effect of a treatment, but do so at the cost of significant trial expense. To reduce the number of measurements, trial protocols can be revised to remove metrics extraneous to the study'… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 18 pages, 11 figures

  2. arXiv:2406.00539  [pdf, other

    cs.LG stat.ML

    CONFINE: Conformal Prediction for Interpretable Neural Networks

    Authors: Linhui Huang, Sayeri Lala, Niraj K. Jha

    Abstract: Deep neural networks exhibit remarkable performance, yet their black-box nature limits their utility in fields like healthcare where interpretability is crucial. Existing explainability approaches often sacrifice accuracy and lack quantifiable measures of prediction uncertainty. In this study, we introduce Conformal Prediction for Interpretable Neural Networks (CONFINE), a versatile framework that… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  3. arXiv:2405.05252  [pdf, other

    cs.CV cs.AI cs.LG eess.IV eess.SP

    Attention-Driven Training-Free Efficiency Enhancement of Diffusion Models

    Authors: Hongjie Wang, Difan Liu, Yan Kang, Yijun Li, Zhe Lin, Niraj K. Jha, Yuchen Liu

    Abstract: Diffusion Models (DMs) have exhibited superior performance in generating high-quality and diverse images. However, this exceptional performance comes at the cost of expensive architectural design, particularly due to the attention module heavily used in leading models. Existing works mainly adopt a retraining process to enhance DM efficiency. This is computationally expensive and not very scalable… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted to IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024

  4. arXiv:2405.00888  [pdf, other

    cs.CL

    DynaMo: Accelerating Language Model Inference with Dynamic Multi-Token Sampling

    Authors: Shikhar Tuli, Chi-Heng Lin, Yen-Chang Hsu, Niraj K. Jha, Yilin Shen, Hongxia **

    Abstract: Traditional language models operate autoregressively, i.e., they predict one token at a time. Rapid explosion in model sizes has resulted in high inference times. In this work, we propose DynaMo, a suite of multi-token prediction language models that reduce net inference times. Our models $\textit{dynamically}$ predict multiple tokens based on their confidence in the predicted joint probability di… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: Accepted at NAACL 2024

  5. arXiv:2403.08197  [pdf, other

    cs.LG cs.AI

    PAGE: Domain-Incremental Adaptation with Past-Agnostic Generative Replay for Smart Healthcare

    Authors: Chia-Hao Li, Niraj K. Jha

    Abstract: We propose PAGE, a domain-incremental adaptation strategy with past-agnostic generative replay for smart healthcare. PAGE enables generative replay without the aid of any preserved data or information from prior domains. When adapting to a new domain, it exploits real data from the new distribution and the current model to generate synthetic data that retain the learned knowledge of previous domai… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 30 pages, 7 figures. arXiv admin note: text overlap with arXiv:2305.05738

  6. arXiv:2403.07887  [pdf, other

    cs.CV cs.AI

    Neural Slot Interpreters: Grounding Object Semantics in Emergent Slot Representations

    Authors: Bhishma Dedhia, Niraj K. Jha

    Abstract: Object-centric methods have seen significant progress in unsupervised decomposition of raw perception into rich object-like abstractions. However, limited ability to ground object semantics of the real world into the learned abstractions has hindered their adoption in downstream understanding applications. We present the Neural Slot Interpreter (NSI) that learns to ground and generate object seman… ▽ More

    Submitted 2 February, 2024; originally announced March 2024.

  7. arXiv:2401.03693  [pdf, other

    stat.AP eess.SP stat.ME

    TAD-SIE: Sample Size Estimation for Clinical Randomized Controlled Trials using a Trend-Adaptive Design with a Synthetic-Intervention-Based Estimator

    Authors: Sayeri Lala, Niraj K. Jha

    Abstract: Phase-3 clinical trials provide the highest level of evidence on drug safety and effectiveness needed for market approval by implementing large randomized controlled trials (RCTs). However, 30-40% of these trials fail mainly because such studies have inadequate sample sizes, stemming from the inability to obtain accurate initial estimates of average treatment effect parameters. To remove this obst… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

    Comments: 31 pages, 21 figures

  8. arXiv:2308.08666  [pdf, other

    cs.LG

    BREATHE: Second-Order Gradients and Heteroscedastic Emulation based Design Space Exploration

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Researchers constantly strive to explore larger and more complex search spaces in various scientific studies and physical experiments. However, such investigations often involve sophisticated simulators or time-consuming experiments that make exploring and observing new design samples challenging. Previous works that target such applications are typically sample-inefficient and restricted to vecto… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  9. arXiv:2305.17328  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Zero-TPrune: Zero-Shot Token Pruning through Leveraging of the Attention Graph in Pre-Trained Transformers

    Authors: Hongjie Wang, Bhishma Dedhia, Niraj K. Jha

    Abstract: Deployment of Transformer models on edge devices is becoming increasingly challenging due to the exponentially growing inference cost that scales quadratically with the number of tokens in the input sequence. Token pruning is an emerging solution to address this challenge due to its ease of deployment on various Transformer backbones. However, most token pruning methods require computationally exp… ▽ More

    Submitted 7 April, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024

  10. arXiv:2305.17262  [pdf, other

    cs.CV cs.AI

    Im-Promptu: In-Context Composition from Image Prompts

    Authors: Bhishma Dedhia, Michael Chang, Jake C. Snell, Thomas L. Griffiths, Niraj K. Jha

    Abstract: Large language models are few-shot learners that can solve diverse tasks from a handful of demonstrations. This implicit understanding of tasks suggests that the attention mechanisms over word tokens may play a role in analogical reasoning. In this work, we investigate whether analogical reasoning can enable in-context composition over composable elements of visual stimuli. First, we introduce a s… ▽ More

    Submitted 22 October, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

  11. arXiv:2305.06697  [pdf, other

    physics.flu-dyn

    Improvement in sealing effectiveness of air curtains using positive buoyancy

    Authors: Tanmay Agrawal, Narsing K. Jha, Vamsi K. Chalamalla

    Abstract: Air curtains are commonly employed in building applications to facilitate aerodynamic sealing against the exchange flow that occurs through an open doorway due to the density differences owing to buoyancy. Such situations often prevail due to temperature gradients across a doorway of an air-conditioned building, e.g., during the summer season in an Indian subcontinental situation. In the present s… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: Fluid Mechanics and Fluid Power Conference 2023

  12. arXiv:2305.05738  [pdf, other

    cs.LG cs.HC eess.SP

    DOCTOR: A Multi-Disease Detection Continual Learning Framework Based on Wearable Medical Sensors

    Authors: Chia-Hao Li, Niraj K. Jha

    Abstract: Modern advances in machine learning (ML) and wearable medical sensors (WMSs) in edge devices have enabled ML-driven disease detection for smart healthcare. Conventional ML-driven methods for disease detection rely on customizing individual models for each disease and its corresponding WMS data. However, such methods lack adaptability to distribution shifts and new task classification classes. In a… ▽ More

    Submitted 18 June, 2024; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: 39 pages, 14 figures. This work has been submitted to the ACM for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  13. arXiv:2305.05078  [pdf, other

    eess.SP cs.LG stat.AP stat.ME

    SECRETS: Subject-Efficient Clinical Randomized Controlled Trials using Synthetic Intervention

    Authors: Sayeri Lala, Niraj K. Jha

    Abstract: The randomized controlled trial (RCT) is the gold standard for estimating the average treatment effect (ATE) of a medical intervention but requires 100s-1000s of subjects, making it expensive and difficult to implement. While a cross-over trial can reduce sample size requirements by measuring the treatment effect per individual, it is only applicable to chronic conditions and interventions whose e… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: 23 pages, 4 figures. This work has been submitted to the IEEE for possible publication

  14. arXiv:2304.10593  [pdf, other

    cs.CR

    DeepReShape: Redesigning Neural Networks for Efficient Private Inference

    Authors: Nandan Kumar Jha, Brandon Reagen

    Abstract: Prior work on Private Inference (PI) -- inferences performed directly on encrypted input -- has focused on minimizing a network's ReLUs, which have been assumed to dominate PI latency rather than FLOPs. Recent work has shown that FLOPs for PI can no longer be ignored and incur high latency penalties. In this paper, we develop DeepReShape, a technique that optimizes neural network architectures und… ▽ More

    Submitted 24 June, 2024; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: Accepted to Transactions on Machine Learning Research (TMLR), 2024

  15. arXiv:2303.14882  [pdf, other

    cs.LG cs.AR

    TransCODE: Co-design of Transformers and Accelerators for Efficient Training and Inference

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Automated co-design of machine learning models and evaluation hardware is critical for efficiently deploying such models at scale. Despite the state-of-the-art performance of transformer models, they are not yet ready for execution on resource-constrained hardware platforms. High memory requirements and low parallelizability of the transformer architecture exacerbate this problem. Recently-propose… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  16. arXiv:2303.13745  [pdf, other

    cs.LG

    EdgeTran: Co-designing Transformers for Efficient Inference on Mobile Edge Platforms

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Automated design of efficient transformer models has recently attracted significant attention from industry and academia. However, most works only focus on certain metrics while searching for the best-performing transformer architecture. Furthermore, running traditional, complex, and large transformer models on low-compute edge platforms is a challenging problem. In this work, we propose a framewo… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  17. arXiv:2302.14705  [pdf, other

    cs.AR cs.LG

    AccelTran: A Sparsity-Aware Accelerator for Dynamic Inference with Transformers

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Self-attention-based transformer models have achieved tremendous success in the domain of natural language processing. Despite their efficacy, accelerating the transformer is challenging due to its quadratic computational complexity and large activation sizes. Existing transformer accelerators attempt to prune its tokens to reduce memory access, albeit with high compute overheads. Moreover, previo… ▽ More

    Submitted 1 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

  18. arXiv:2301.04314  [pdf, other

    cs.CR

    ML-FEED: Machine Learning Framework for Efficient Exploit Detection

    Authors: Tanujay Saha, Tamjid Al-Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha

    Abstract: Machine learning (ML)-based methods have recently become attractive for detecting security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term memories (LSTMs) and transformers incur significant computation overheads. This overhead makes it infeasible to deploy them in real-time environments. We propose a novel ML-based exploit detection model, ML-FEED, that enab… ▽ More

    Submitted 6 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: This paper has been published in The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022

  19. arXiv:2212.03965  [pdf, other

    cs.AR cs.LG eess.IV

    CODEBench: A Neural Architecture and Hardware Accelerator Co-Design Framework

    Authors: Shikhar Tuli, Chia-Hao Li, Ritvik Sharma, Niraj K. Jha

    Abstract: Recently, automated co-design of machine learning (ML) models and accelerator architectures has attracted significant attention from both the industry and academia. However, most co-design frameworks either explore a limited search space or employ suboptimal exploration techniques for simultaneous design decision investigations of the ML model and the accelerator. Furthermore, training the ML mode… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: Published at ACM Transactions on Embedded Computing Systems. Code available at https://github.com/jha-lab/codebench

  20. arXiv:2208.08464  [pdf, other

    cs.LG

    CTRL: Clustering Training Losses for Label Error Detection

    Authors: Chang Yue, Niraj K. Jha

    Abstract: In supervised machine learning, use of correct labels is extremely important to ensure high accuracy. Unfortunately, most datasets contain corrupted labels. Machine learning models trained on such datasets do not generalize well. Thus, detecting their label errors can significantly increase their efficacy. We propose a novel framework, called CTRL (Clustering TRaining Losses for label error detect… ▽ More

    Submitted 12 September, 2023; v1 submitted 17 August, 2022; originally announced August 2022.

  21. Characterizing and Optimizing End-to-End Systems for Private Inference

    Authors: Karthik Garimella, Zahra Ghodsi, Nandan Kumar Jha, Siddharth Garg, Brandon Reagen

    Abstract: In two-party machine learning prediction services, the client's goal is to query a remote server's trained machine learning model to perform neural network inference in some application domain. However, sensitive information can be obtained during this process by either the client or the server, leading to potential collection, unauthorized secondary use, and inappropriate access to personal infor… ▽ More

    Submitted 16 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted to the 28th edition of the Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2023 Conference

  22. arXiv:2207.04208  [pdf, other

    cs.AI cs.LG

    SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare

    Authors: Bhishma Dedhia, Roshini Balasubramanian, Niraj K. Jha

    Abstract: The Synthetic Control method has pioneered a class of powerful data-driven techniques to estimate the counterfactual reality of a unit from donor units. At its core, the technique involves a linear model fitted on the pre-intervention period that combines donor outcomes to yield the counterfactual. However, linearly combining spatial information at each time instance using time-agnostic weights fa… ▽ More

    Submitted 23 November, 2022; v1 submitted 9 July, 2022; originally announced July 2022.

  23. arXiv:2205.11656  [pdf, other

    cs.LG cs.CL

    FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?

    Authors: Shikhar Tuli, Bhishma Dedhia, Shreshth Tuli, Niraj K. Jha

    Abstract: The existence of a plethora of language models makes the problem of selecting the best one for a custom task challenging. Most state-of-the-art methods leverage transformer-based models (e.g., BERT) or their variants. Training such models and exploring their hyperparameter space, however, is computationally expensive. Prior work proposes several neural architecture search (NAS) methods that employ… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Preprint. In review

  24. arXiv:2111.02583  [pdf, other

    cs.CR

    CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale

    Authors: Karthik Garimella, Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The privacy concerns of providing deep learning inference as a service have underscored the need for private inference (PI) protocols that protect users' data and the service provider's model using cryptographic methods. Recently proposed PI protocols have achieved significant reductions in PI latency by moving the computationally heavy homomorphic encryption (HE) parts to an offline/pre-compute p… ▽ More

    Submitted 18 July, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 4 Figures and 3 Tables

  25. arXiv:2108.03514  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

    Authors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha

    Abstract: The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network… ▽ More

    Submitted 7 August, 2021; originally announced August 2021.

    Comments: 17 pages, 11 figures, 13 tables, This paper has been submitted for review in IEEE Transactions on Emerging Topics in Computing. Copyright IEEE 2021

  26. arXiv:2107.12342  [pdf, other

    cs.LG cs.CR

    Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

    Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen

    Abstract: Privacy concerns in client-server machine learning have given rise to private inference (PI), where neural inference occurs directly on encrypted inputs. PI protects clients' personal data and the server's intellectual property. A common practice in PI is to use garbled circuits to compute nonlinear functions privately, namely ReLUs. However, garbled circuits suffer from high storage, bandwidth, a… ▽ More

    Submitted 2 November, 2021; v1 submitted 26 July, 2021; originally announced July 2021.

    Comments: Accepted to PPML (ACM CCS) 2021

  27. arXiv:2106.08475  [pdf, other

    cs.LG cs.CR

    Circa: Stochastic ReLUs for Private Deep Learning

    Authors: Zahra Ghodsi, Nandan Kumar Jha, Brandon Reagen, Siddharth Garg

    Abstract: The simultaneous rise of machine learning as a service and concerns over user privacy have increasingly motivated the need for private inference (PI). While recent work demonstrates PI is possible using cryptographic primitives, the computational overheads render it impractical. The community is largely unprepared to address these overheads, as the source of slowdown in PI stems from the ReLU oper… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

  28. arXiv:2106.00073  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

    Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha

    Abstract: Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of devices connected in a complex network topology. The diversity and complexity of these components present an enormous attack surface, allowing an adversary to exploit security vulnerabilities of different devices to execute a potent attack. Though significant efforts have been made to improve the security of ind… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

    Comments: This article has been published in IEEE Transactions on Emerging Topics in Computing, 2021

  29. arXiv:2104.02464  [pdf, other

    eess.SY cs.AI cs.LG cs.NE

    Fast Design Space Exploration of Nonlinear Systems: Part II

    Authors: Prerit Terway, Kenza Hamidouche, Niraj K. Jha

    Abstract: Nonlinear system design is often a multi-objective optimization problem involving search for a design that satisfies a number of predefined constraints. The design space is typically very large since it includes all possible system architectures with different combinations of components composing each architecture. In this article, we address nonlinear system design space exploration through a two… ▽ More

    Submitted 8 April, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: 14 pages, 24 figures. arXiv admin note: substantial text overlap with arXiv:2009.10214

  30. arXiv:2104.01747  [pdf

    cs.LG cs.AI

    Fast Design Space Exploration of Nonlinear Systems: Part I

    Authors: Sanjai Narain, Emily Mak, Dana Chee, Brendan Englot, Kishore Pochiraju, Niraj K. Jha, Karthik Narayan

    Abstract: System design tools are often only available as input-output blackboxes: for a given design as input they compute an output representing system behavior. Blackboxes are intended to be run in the forward direction. This paper presents a new method of solving the inverse design problem namely, given requirements or constraints on output, find an input that also optimizes an objective function. This… ▽ More

    Submitted 6 April, 2022; v1 submitted 4 April, 2021; originally announced April 2021.

    Comments: 16 pages, 27 figures. arXiv admin note: text overlap with arXiv:2010.09842

  31. arXiv:2103.01781  [pdf, other

    cs.CR eess.SY

    HW/SW Framework for Improving the Safety of Implantable and Wearable Medical Devices

    Authors: Malin Prematilake, Younghyun Kim, Vijay Raghunathan, Anand Raghunathan, N. K. Jha

    Abstract: Implantable and wearable medical devices (IWMDs) are widely used for the monitoring and therapy of an increasing range of medical conditions. Improvements in medical devices, enabled by advances in low-power processors, more complex firmware, and wireless connectivity, have greatly improved therapeutic outcomes and patients' quality-of-life. However, security attacks, malfunctions and sometimes us… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

  32. arXiv:2103.01396  [pdf, other

    cs.LG cs.CR

    DeepReDuce: ReLU Reduction for Fast Private Inference

    Authors: Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The recent rise of privacy concerns has led researchers to devise methods for private neural inference -- where inferences are made directly on encrypted data, never seeing inputs. The primary challenge facing private inference is that computing on encrypted data levies an impractically-high latency penalty, stemming mostly from non-linear operators like ReLU. Enabling practical and private infere… ▽ More

    Submitted 22 June, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: ICML 2021

    ACM Class: I.2.m

  33. arXiv:2102.10435  [pdf, other

    cs.LG cs.HC cs.NE

    MHDeep: Mental Health Disorder Detection System based on Body-Area and Deep Neural Networks

    Authors: Shayan Hassantabar, Joe Zhang, Hongxu Yin, Niraj K. Jha

    Abstract: Mental health problems impact quality of life of millions of people around the world. However, diagnosis of mental health disorders is a challenging problem that often relies on self-reporting by patients about their behavioral patterns. Therefore, there is a need for new strategies for diagnosis of mental health problems. The recent introduction of body-area networks consisting of a plethora of a… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: 11 pages, 6 figures

  34. SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

    Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha

    Abstract: Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being deployed across multiple functionalities, ranging from healthcare devices and wearables to critical infrastructures, e.g., nuclear power plants, autonomous vehicles, smart cities, and smart homes. These devices are inherently not secure across their comprehensive software, hardware, and network stacks, thus pr… ▽ More

    Submitted 19 October, 2022; v1 submitted 7 January, 2021; originally announced January 2021.

    Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright

    Journal ref: IEEE Transactions on Emerging Topics in Computing, 2021

  35. arXiv:2010.09842  [pdf

    cs.AI cs.LG cs.RO

    Robot Design With Neural Networks, MILP Solvers and Active Learning

    Authors: Sanjai Narain, Emily Mak, Dana Chee, Todd Huster, Jeremy Cohen, Kishore Pochiraju, Brendan Englot, Niraj K. Jha, Karthik Narayan

    Abstract: Central to the design of many robot systems and their controllers is solving a constrained blackbox optimization problem. This paper presents CNMA, a new method of solving this problem that is conservative in the number of potentially expensive blackbox function evaluations; allows specifying complex, even recursive constraints directly rather than as hard-to-design penalty or barrier functions; a… ▽ More

    Submitted 8 February, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: 22 pages, 8 figures

  36. arXiv:2010.05429  [pdf, other

    cs.NE cs.LG

    TUTOR: Training Neural Networks Using Decision Rules as Model Priors

    Authors: Shayan Hassantabar, Prerit Terway, Niraj K. Jha

    Abstract: The human brain has the ability to carry out new tasks with limited experience. It utilizes prior learning experiences to adapt the solution strategy to new domains. On the other hand, deep neural networks (DNNs) generally need large amounts of data and computational resources for training. However, this requirement is not met in many settings. To address these challenges, we propose the TUTOR DNN… ▽ More

    Submitted 15 February, 2022; v1 submitted 11 October, 2020; originally announced October 2020.

    Comments: 14 pages, 4 figures

  37. arXiv:2010.00426  [pdf

    physics.flu-dyn physics.app-ph

    Elastically driven Kelvin-Helmholtz-like instability in planar channel flow

    Authors: Narsing K. Jha, Victor Steinberg

    Abstract: Kelvin-Helmholtz instability (KHI) is widely spread in nature on scales from micrometer up to Galactic one. This instability refers to the growth of perturbation of an interface between two parallel streams of Newtonian fluids with different velocities and densities, destabilized by shear strain and stabilized by density stratification with the heavier fluid at the bottom. Here, we report the disc… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: 15 pages, 5 figures

  38. arXiv:2009.12258  [pdf

    physics.flu-dyn physics.app-ph

    Universal coherent structures of elastic turbulence in straight channel with viscoelastic fluid flow

    Authors: Narsing K. Jha, Victor Steinberg

    Abstract: In the present study, we investigated flow structures and properties of elastic turbulence in straight 2D channel viscoelastic fluid flow and tested earlier observations. We discovered self-organized cycling process of weakly unstable coherent structures (CSs) of co-existing streaks and stream-wise vortices, with the former being destroyed by Kelvin-Helmholtz-like instability resulting in chaotic… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: 13 pages, 6 figures

  39. arXiv:2009.10214  [pdf, other

    cs.LG cs.NE eess.SY

    DISPATCH: Design Space Exploration of Cyber-Physical Systems

    Authors: Prerit Terway, Kenza Hamidouche, Niraj K. Jha

    Abstract: Design of cyber-physical systems (CPSs) is a challenging task that involves searching over a large search space of various CPS configurations and possible values of components composing the system. Hence, there is a need for sample-efficient CPS design space exploration to select the system architecture and component values that meet the target system requirements. We address this challenge by for… ▽ More

    Submitted 24 September, 2020; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: 14 pages

  40. arXiv:2009.05841  [pdf, ps, other

    physics.flu-dyn

    Contaminant transport by human passage through an air curtain separating two sections of a corridor: Part II -- two zones at different temperatures

    Authors: Narsing K. Jha, D. Frank, L. Darracq, P. F. Linden

    Abstract: Air curtains are installed in open doorways of a building to reduce buoyancy-driven exchange flows across the doorway. Although an air curtain allows an unhampered passage of humans and vehicles, the interaction of this traffic with an air curtain is not well understood. We study this problem by conducting small-scale waterbath experiments with fresh water and salt water solutions. As a model of h… ▽ More

    Submitted 12 September, 2020; originally announced September 2020.

    Comments: 13 pages, 9 figures

  41. arXiv:2009.05806  [pdf, ps, other

    physics.flu-dyn physics.ao-ph

    Contaminant transport by human passage through an air curtain separating two sections of a corridor: Part I -- uniform ambient temperature

    Authors: Narsing K Jha, D. Frank, P. F. Linden

    Abstract: Air curtains are commonly used as separation barriers to reduce exchange flows through an open-door of a building.Here, we investigated the effectiveness of an air curtain to prevent the transport of contaminants by a person walking along a corridor from a dirty zone into a clean zone. We conducted small-scale waterbath experiments with freshwater, brine and sugar solutions, with the brine as a pa… ▽ More

    Submitted 12 September, 2020; originally announced September 2020.

    Comments: 13 pages, 9 figures

  42. arXiv:2008.02565  [pdf, other

    cs.CV cs.AR

    Modeling Data Reuse in Deep Neural Networks by Taking Data-Types into Cognizance

    Authors: Nandan Kumar Jha, Sparsh Mittal

    Abstract: In recent years, researchers have focused on reducing the model size and number of computations (measured as "multiply-accumulate" or MAC operations) of DNNs. The energy consumption of a DNN depends on both the number of MAC operations and the energy efficiency of each MAC operation. The former can be estimated at design time; however, the latter depends on the intricate data reuse patterns and un… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: Accepted at IEEE Transactions on Computers (Special Issue on Machine-Learning Architectures and Accelerators) 2020

    ACM Class: C.0; I.5.1

  43. arXiv:2007.15248  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

    Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela

    Abstract: The remarkable predictive performance of deep neural networks (DNNs) has led to their adoption in service domains of unprecedented scale and scope. However, the widespread adoption and growing commercialization of DNNs have underscored the importance of intellectual property (IP) protection. Devising techniques to ensure IP protection has become necessary due to the increasing trend of outsourcing… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: Accepted at The ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020. 25 pages, 11 tables, and 11 figures

    ACM Class: K.4.1; K.4.4

  44. arXiv:2007.15151  [pdf, other

    cs.CV cs.LG

    Fully Dynamic Inference with Deep Neural Networks

    Authors: Wenhan Xia, Hongxu Yin, Xiaoliang Dai, Niraj K. Jha

    Abstract: Modern deep neural networks are powerful and widely applicable models that extract task-relevant information through multi-level abstraction. Their cross-domain success, however, is often achieved at the expense of computational cost, high memory bandwidth, and long inference latency, which prevents their deployment in resource-constrained and time-sensitive scenarios, such as edge-side inference… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

  45. arXiv:2007.10497  [pdf, other

    cs.HC cs.NE

    CovidDeep: SARS-CoV-2/COVID-19 Test Based on Wearable Medical Sensors and Efficient Neural Networks

    Authors: Shayan Hassantabar, Novati Stefano, Vishweshwar Ghanakota, Alessandra Ferrari, Gregory N. Nicola, Raffaele Bruno, Ignazio R. Marino, Kenza Hamidouche, Niraj K. Jha

    Abstract: The novel coronavirus (SARS-CoV-2) has led to a pandemic. The current testing regime based on Reverse Transcription-Polymerase Chain Reaction for SARS-CoV-2 has been unable to keep up with testing demands, and also suffers from a relatively low positive detection rate in the early stages of the resultant COVID-19 disease. Hence, there is a need for an alternative approach for repeated large-scale… ▽ More

    Submitted 28 October, 2020; v1 submitted 20 July, 2020; originally announced July 2020.

    Comments: 11 pages, 3 figures

  46. arXiv:2006.16589  [pdf, other

    cs.CV

    On the Demystification of Knowledge Distillation: A Residual Network Perspective

    Authors: Nandan Kumar Jha, Rajat Saini, Sparsh Mittal

    Abstract: Knowledge distillation (KD) is generally considered as a technique for performing model compression and learned-label smoothing. However, in this paper, we study and investigate the KD approach from a new perspective: we study its efficacy in training a deeper network without any residual connections. We find that in most of the cases, non-residual student networks perform equally or better than t… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    ACM Class: I.5.1; I.5.1

  47. arXiv:2006.15103  [pdf, other

    eess.SP cs.AR cs.LG

    DRACO: Co-Optimizing Hardware Utilization, and Performance of DNNs on Systolic Accelerator

    Authors: Nandan Kumar Jha, Shreyas Ravishankar, Sparsh Mittal, Arvind Kaushik, Dipan Mandal, Mahesh Chandra

    Abstract: The number of processing elements (PEs) in a fixed-sized systolic accelerator is well matched for large and compute-bound DNNs; whereas, memory-bound DNNs suffer from PE underutilization and fail to achieve peak performance and energy efficiency. To mitigate this, specialized dataflow and/or micro-architectural techniques have been proposed. However, due to the longer development cycle and the rap… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in the IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Limassol, CYPRUS, July 6-8, 2020

    ACM Class: I.5.1; I.5.2; C.0; C.1.3

  48. ULSAM: Ultra-Lightweight Subspace Attention Module for Compact Convolutional Neural Networks

    Authors: Rajat Saini, Nandan Kumar Jha, Bedanta Das, Sparsh Mittal, C. Krishna Mohan

    Abstract: The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for c… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 IEEE Winter Conference on Applications of Computer Vision (WACV)

    ACM Class: I.5.1; I.5.2; I.5.4

    Journal ref: WACV (2020) 1627-1636

  49. arXiv:2006.15100  [pdf, other

    cs.LG eess.SP stat.ML

    E2GC: Energy-efficient Group Convolution in Deep Neural Networks

    Authors: Nandan Kumar Jha, Rajat Saini, Subhrajit Nag, Sparsh Mittal

    Abstract: The number of groups ($g$) in group convolution (GConv) is selected to boost the predictive performance of deep neural networks (DNNs) in a compute and parameter efficient manner. However, we show that naive selection of $g$ in GConv creates an imbalance between the computational complexity and degree of data reuse, which leads to suboptimal energy efficiency in DNNs. We devise an optimum group si… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID)

    ACM Class: I.5.1; I.5.2; I.5.5; C.0

    Journal ref: VLSID (2020) 155-160

  50. The Ramifications of Making Deep Neural Networks Compact

    Authors: Nandan Kumar Jha, Sparsh Mittal, Govardhan Mattela

    Abstract: The recent trend in deep neural networks (DNNs) research is to make the networks more compact. The motivation behind designing compact DNNs is to improve energy efficiency since by virtue of having lower memory footprint, compact DNNs have lower number of off-chip accesses which improves energy efficiency. However, we show that making DNNs compact has indirect and subtle implications which are not… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID)

    ACM Class: I.5.1; I.5.2

    Journal ref: VLSID (2019) 215-220