Skip to main content

Showing 1–16 of 16 results for author: Kumar, K N

.
  1. arXiv:2404.04139  [pdf

    cs.CR cs.AI

    Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning

    Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry

    Abstract: Federated Learning (FL) is a collaborative learning paradigm enabling participants to collectively train a shared machine learning model while preserving the privacy of their sensitive data. Nevertheless, the inherent decentralized and data-opaque characteristics of FL render its susceptibility to data poisoning attacks. These attacks introduce malformed or malicious inputs during local model trai… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 14 pages, 11 figures, 5 tables, Accepted in ACM CODASPY 2024

  2. arXiv:2310.10606  [pdf, other

    cs.RO cs.LG

    BayRnTune: Adaptive Bayesian Domain Randomization via Strategic Fine-tuning

    Authors: Tianle Huang, Nitish Sontakke, K. Niranjan Kumar, Irfan Essa, Stefanos Nikolaidis, Dennis W. Hong, Sehoon Ha

    Abstract: Domain randomization (DR), which entails training a policy with randomized dynamics, has proven to be a simple yet effective algorithm for reducing the gap between simulation and the real world. However, DR often requires careful tuning of randomization parameters. Methods like Bayesian Domain Randomization (Bayesian DR) and Active Domain Randomization (Adaptive DR) address this issue by automatin… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  3. arXiv:2310.06226  [pdf, other

    cs.RO

    Words into Action: Learning Diverse Humanoid Robot Behaviors using Language Guided Iterative Motion Refinement

    Authors: K. Niranjan Kumar, Irfan Essa, Sehoon Ha

    Abstract: Humanoid robots are well suited for human habitats due to their morphological similarity, but develo** controllers for them is a challenging task that involves multiple sub-problems, such as control, planning and perception. In this paper, we introduce a method to simplify controller design by enabling users to train and fine-tune robot control policies using natural language commands. We first… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  4. arXiv:2305.02736  [pdf, other

    cs.FL

    Separability and Non-Determinizability of WSTS

    Authors: Wojciech Czerwiński, Eren Keskin, Sławomir Lasota, Roland Meyer, Sebastian Muskalla, K Narayan Kumar, Prakash Saivasan

    Abstract: We study the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that every pair of disjoint WSTS languages is regularly separable: there is a regular language containing one of them while being disjoint from the other. As a consequence, if a language as well as its complement are both recognized by WSTS, then they are ne… ▽ More

    Submitted 31 May, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: This paper is the journal version of the CONCUR23 paper "Separability and Non-Determinizability of WSTS'', which can be found in the previous version of this arxiv document. It covers both papers about regular separability in WSTS: the CONCUR23 paper and its predecessor the CONCUR18 paper. As this version does not contain an appendix, please refer to the previous version for missing proofs

  5. arXiv:2212.08954  [pdf, other

    cs.RO cs.LG

    Cascaded Compositional Residual Learning for Complex Interactive Behaviors

    Authors: K. Niranjan Kumar, Irfan Essa, Sehoon Ha

    Abstract: Real-world autonomous missions often require rich interaction with nearby objects, such as doors or switches, along with effective navigation. However, such complex behaviors are difficult to learn because they involve both high-level planning and low-level motor control. We present a novel framework, Cascaded Compositional Residual Learning (CCRL), which learns composite skills by recursively lev… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

    Comments: Website: https://www.kniranjankumar.com/ccrl/

  6. arXiv:2109.10460  [pdf, other

    cs.RO

    Graph-based Cluttered Scene Generation and Interactive Exploration using Deep Reinforcement Learning

    Authors: K. Niranjan Kumar, Irfan Essa, Sehoon Ha

    Abstract: We introduce a novel method to teach a robotic agent to interactively explore cluttered yet structured scenes, such as kitchen pantries and grocery shelves, by leveraging the physical plausibility of the scene. We propose a novel learning framework to train an effective scene exploration policy to discover hidden objects with minimal interactions. First, we define a novel scene grammar to represen… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

  7. arXiv:2101.10233  [pdf, other

    cs.PL cs.SE

    Data Flow Analysis of Asynchronous Systems using Infinite Abstract Domains

    Authors: Snigdha Athaiya, Raghavan Komondoor, K Narayan Kumar

    Abstract: Asynchronous message-passing systems are employed frequently to implement distributed mechanisms, protocols, and processes. This paper addresses the problem of precise data flow analysis for such systems. To obtain good precision, data flow analysis needs to somehow skip execution paths that read more messages than the number of messages sent so far in the path, as such paths are infeasible at run… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: 61 pages, 4 figures, 3 Tables, European Symposium on Programming 2021

    ACM Class: D.2.4

  8. arXiv:2101.06092  [pdf, other

    cs.CV cs.AI

    Black-box Adversarial Attacks in Autonomous Vehicle Technology

    Authors: K Naveen Kumar, C Vishnu, Reshmi Mitra, C Krishna Mohan

    Abstract: Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 7 pages, 10 figures, published in 49th Annual IEEE AIPR 2020: Trusted Computing, Privacy, and Securing Multimedia Washington, D.C. October 13-15, 2020

  9. arXiv:2012.00373  [pdf, other

    cond-mat.mtrl-sci

    Study of involution domain based interfaces in Ni-Ti-Cu Shape Memory Alloy

    Authors: Atharva Pagare, V Sashi Mohan Rao, K Naga Chaithanya Kumar, K S Suresh

    Abstract: An algorithm was made to study the lattice correspondence involved in phase transformation from cubic B2 to monoclinic B19'. The method is based on studying the orientation matrices generated from EBSD data. Starting from the very fundamental, coordinate transformation matrices as well as the vector transformation matrices have been walked through for a general non-orthogonal to the orthogonal sys… ▽ More

    Submitted 25 December, 2020; v1 submitted 1 December, 2020; originally announced December 2020.

    Comments: 14 pages, 6 Figures, 3 Tables

  10. arXiv:2008.00827  [pdf, other

    cs.CV cs.AI eess.SP

    Defining Traffic States using Spatio-temporal Traffic Graphs

    Authors: Debaditya Roy, K. Naveen Kumar, C. Krishna Mohan

    Abstract: Intersections are one of the main sources of congestion and hence, it is important to understand traffic behavior at intersections. Particularly, in develo** countries with high vehicle density, mixed traffic type, and lane-less driving behavior, it is difficult to distinguish between congested and normal traffic behavior. In this work, we propose a way to understand the traffic state of smaller… ▽ More

    Submitted 27 July, 2020; originally announced August 2020.

    Comments: Accepted in 23rd IEEE International Conference on Intelligent Transportation Systems September 20 to 23, 2020. 6 pages, 6 figures

  11. arXiv:1907.03964  [pdf, other

    cs.RO cs.AI

    Estimating Mass Distribution of Articulated Objects using Non-prehensile Manipulation

    Authors: K. Niranjan Kumar, Irfan Essa, Sehoon Ha, C. Karen Liu

    Abstract: We explore the problem of estimating the mass distribution of an articulated object by an interactive robotic agent. Our method predicts the mass distribution of an object by using the limited sensing and actuating capabilities of a robotic agent that is interacting with the object. We are inspired by the role of exploratory play in human infants. We take the combined approach of supervised and re… ▽ More

    Submitted 18 November, 2020; v1 submitted 8 July, 2019; originally announced July 2019.

  12. arXiv:1904.10703  [pdf, ps, other

    cs.LO cs.FL

    The Ideal Approach to Computing Closed Subsets in Well-Quasi-Ordering

    Authors: Jean Goubault-Larrecq, Simon Halfon, Prateek Karandikar, K. Narayan Kumar, Philippe Schnoebelen

    Abstract: Elegant and general algorithms for handling upwards-closed and downwards-closed subsets of WQOs can be developed using the filter-based and ideal-based representation for these sets. These algorithms can be built in a generic or parameterized way, in parallel with the way complex WQOs are obtained by combining or modifying simpler WQOs.

    Submitted 24 April, 2019; originally announced April 2019.

  13. arXiv:1702.05334  [pdf, other

    cs.FL

    Regular Separability of Well Structured Transition Systems

    Authors: Wojciech Czerwiński, Sławomir Lasota, Roland Meyer, Sebastian Muskalla, K Narayan Kumar, Prakash Saivasan

    Abstract: We investigate the languages recognized by well-structured transition systems (WSTS) with upward and downward compatibility. Our first result shows that, under very mild assumptions, every two disjoint WSTS languages are regular separable: There is a regular language containing one of them and being disjoint from the other. As a consequence, if a language as well as its complement are both recogni… ▽ More

    Submitted 5 July, 2018; v1 submitted 17 February, 2017; originally announced February 2017.

  14. arXiv:1602.03419  [pdf, other

    cs.FL cs.LO

    Complexity of regular abstractions of one-counter languages

    Authors: Mohamed Faouzi Atig, Dmitry Chistikov, Piotr Hofman, K Narayan Kumar, Prakash Saivasan, Georg Zetzsche

    Abstract: We study the computational and descriptional complexity of the following transformation: Given a one-counter automaton (OCA) A, construct a nondeterministic finite automaton (NFA) B that recognizes an abstraction of the language L(A): its (1) downward closure, (2) upward closure, or (3) Parikh image. For the Parikh image over a fixed alphabet and for the upward and downward closures, we find pol… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

  15. arXiv:1405.0628  [pdf, other

    cs.GT cs.FL

    Infinite-State Energy Games

    Authors: Parosh Aziz Abdulla, Mohamed Faouzi Atig, Piotr Hofman, Richard Mayr, K. Narayan Kumar, Patrick Totzke

    Abstract: Energy games are a well-studied class of 2-player turn-based games on a finite graph where transitions are labeled with integer vectors which represent changes in a multidimensional resource (the energy). One player tries to keep the cumulative changes non-negative in every component while the other tries to frustrate this. We consider generalized energy games played on infinite game graphs induce… ▽ More

    Submitted 3 May, 2014; originally announced May 2014.

    Comments: 11 pages

    Report number: EDI-INF-RR-1419 MSC Class: 91A43 ACM Class: F.3.1

    Journal ref: Full version (including proofs) of material presented at CSL-LICS 2014 (Vienna, Austria)

  16. arXiv:1205.6928  [pdf, ps, other

    cs.LO cs.FL cs.GT

    Model checking Branching-Time Properties of Multi-Pushdown Systems is Hard

    Authors: Mohamed Faouzi Atig, Ahmed Bouajjani, K. Narayan Kumar, Prakash Saivasan

    Abstract: We address the model checking problem for shared memory concurrent programs modeled as multi-pushdown systems. We consider here boolean programs with a finite number of threads and recursive procedures. It is well-known that the model checking problem is undecidable for this class of programs. In this paper, we investigate the decidability and the complexity of this problem under the assumption of… ▽ More

    Submitted 31 May, 2012; originally announced May 2012.