-
Giving each task what it needs -- leveraging structured sparsity for tailored multi-task learning
Authors:
Richa Upadhyay,
Ronald Phlypo,
Rajkumar Saini,
Marcus Liwicki
Abstract:
Every task demands distinct feature representations, ranging from low-level to high-level attributes, so it is vital to address the specific needs of each task, especially in the Multi-task Learning (MTL) framework. This work, therefore, introduces Layer-Optimized Multi-Task (LOMT) models that utilize structured sparsity to refine feature selection for individual tasks and enhance the performance…
▽ More
Every task demands distinct feature representations, ranging from low-level to high-level attributes, so it is vital to address the specific needs of each task, especially in the Multi-task Learning (MTL) framework. This work, therefore, introduces Layer-Optimized Multi-Task (LOMT) models that utilize structured sparsity to refine feature selection for individual tasks and enhance the performance of all tasks in a multi-task scenario. Structured or group sparsity systematically eliminates parameters from trivial channels and, eventually, entire layers within a convolution neural network during training. Consequently, the remaining layers provide the most optimal features for a given task. In this two-step approach, we subsequently leverage this sparsity-induced optimal layer information to build the LOMT models by connecting task-specific decoders to these strategically identified layers, deviating from conventional approaches that uniformly connect decoders at the end of the network. This tailored architecture optimizes the network, focusing on essential features while reducing redundancy. We validate the efficacy of the proposed approach on two datasets, ie NYU-v2 and CelebAMask-HD datasets, for multiple heterogeneous tasks. A detailed performance analysis of the LOMT models, in contrast to the conventional MTL models, reveals that the LOMT models outperform for most task combinations. The excellent qualitative and quantitative outcomes highlight the effectiveness of employing structured sparsity for optimal layer (or feature) selection.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Investigating Robustness of Open-Vocabulary Foundation Object Detectors under Distribution Shifts
Authors:
Prakash Chandra Chhipa,
Kanjar De,
Meenakshi Subhash Chippa,
Rajkumar Saini,
Marcus Liwicki
Abstract:
The challenge of Out-Of-Distribution (OOD) robustness remains a critical hurdle towards deploying deep vision models. Open-vocabulary object detection extends the capabilities of traditional object detection frameworks to recognize and classify objects beyond predefined categories. Investigating OOD robustness in open-vocabulary object detection is essential to increase the trustworthiness of thes…
▽ More
The challenge of Out-Of-Distribution (OOD) robustness remains a critical hurdle towards deploying deep vision models. Open-vocabulary object detection extends the capabilities of traditional object detection frameworks to recognize and classify objects beyond predefined categories. Investigating OOD robustness in open-vocabulary object detection is essential to increase the trustworthiness of these models. This study presents a comprehensive robustness evaluation of zero-shot capabilities of three recent open-vocabulary foundation object detection models, namely OWL-ViT, YOLO World, and Grounding DINO. Experiments carried out on the COCO-O and COCO-C benchmarks encompassing distribution shifts highlight the challenges of the models' robustness. Source code shall be made available to the research community on GitHub.
△ Less
Submitted 1 June, 2024; v1 submitted 1 April, 2024;
originally announced May 2024.
-
Möbius Transform for Mitigating Perspective Distortions in Representation Learning
Authors:
Prakash Chandra Chhipa,
Meenakshi Subhash Chippa,
Kanjar De,
Rajkumar Saini,
Marcus Liwicki,
Mubarak Shah
Abstract:
Perspective distortion (PD) causes unprecedented changes in shape, size, orientation, angles, and other spatial relationships of visual concepts in images. Precisely estimating camera intrinsic and extrinsic parameters is a challenging task that prevents synthesizing perspective distortion. Non-availability of dedicated training data poses a critical barrier to develo** robust computer vision me…
▽ More
Perspective distortion (PD) causes unprecedented changes in shape, size, orientation, angles, and other spatial relationships of visual concepts in images. Precisely estimating camera intrinsic and extrinsic parameters is a challenging task that prevents synthesizing perspective distortion. Non-availability of dedicated training data poses a critical barrier to develo** robust computer vision methods. Additionally, distortion correction methods make other computer vision tasks a multi-step approach and lack performance. In this work, we propose mitigating perspective distortion (MPD) by employing a fine-grained parameter control on a specific family of Möbius transform to model real-world distortion without estimating camera intrinsic and extrinsic parameters and without the need for actual distorted data. Also, we present a dedicated perspectively distorted benchmark dataset, ImageNet-PD, to benchmark the robustness of deep learning models against this new dataset. The proposed method outperforms on existing benchmarks, ImageNet-E and ImageNet-X. Additionally, it significantly improves performance on ImageNet-PD while consistently performing on standard data distribution. Further, our method shows improved performance on three PD-affected real-world applications: crowd counting, fisheye image recognition, and person re-identification. We will release source code, dataset, and models for foster further research.
△ Less
Submitted 7 March, 2024;
originally announced May 2024.
-
Vehicle Detection Performance in Nordic Region
Authors:
Hamam Mokayed,
Rajkumar Saini,
Oluwatosin Adewumi,
Lama Alkhaled,
Bjorn Backe,
Palaiahnakote Shivakumara,
Olle Hagner,
Yan Chai Hum
Abstract:
This paper addresses the critical challenge of vehicle detection in the harsh winter conditions in the Nordic regions, characterized by heavy snowfall, reduced visibility, and low lighting. Due to their susceptibility to environmental distortions and occlusions, traditional vehicle detection methods have struggled in these adverse conditions. The advanced proposed deep learning architectures broug…
▽ More
This paper addresses the critical challenge of vehicle detection in the harsh winter conditions in the Nordic regions, characterized by heavy snowfall, reduced visibility, and low lighting. Due to their susceptibility to environmental distortions and occlusions, traditional vehicle detection methods have struggled in these adverse conditions. The advanced proposed deep learning architectures brought promise, yet the unique difficulties of detecting vehicles in Nordic winters remain inadequately addressed. This study uses the Nordic Vehicle Dataset (NVD), which has UAV images from northern Sweden, to evaluate the performance of state-of-the-art vehicle detection algorithms under challenging weather conditions. Our methodology includes a comprehensive evaluation of single-stage, two-stage, and transformer-based detectors against the NVD. We propose a series of enhancements tailored to each detection framework, including data augmentation, hyperparameter tuning, transfer learning, and novel strategies designed explicitly for the DETR model. Our findings not only highlight the limitations of current detection systems in the Nordic environment but also offer promising directions for enhancing these algorithms for improved robustness and accuracy in vehicle detection amidst the complexities of winter landscapes. The code and the dataset are available at https://nvd.ltu-ai.dev
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Less is More -- Towards parsimonious multi-task models using structured sparsity
Authors:
Richa Upadhyay,
Ronald Phlypo,
Rajkumar Saini,
Marcus Liwicki
Abstract:
Model sparsification in deep learning promotes simpler, more interpretable models with fewer parameters. This not only reduces the model's memory footprint and computational needs but also shortens inference time. This work focuses on creating sparse models optimized for multiple tasks with fewer parameters. These parsimonious models also possess the potential to match or outperform dense models i…
▽ More
Model sparsification in deep learning promotes simpler, more interpretable models with fewer parameters. This not only reduces the model's memory footprint and computational needs but also shortens inference time. This work focuses on creating sparse models optimized for multiple tasks with fewer parameters. These parsimonious models also possess the potential to match or outperform dense models in terms of performance. In this work, we introduce channel-wise l1/l2 group sparsity in the shared convolutional layers parameters (or weights) of the multi-task learning model. This approach facilitates the removal of extraneous groups i.e., channels (due to l1 regularization) and also imposes a penalty on the weights, further enhancing the learning efficiency for all tasks (due to l2 regularization). We analyzed the results of group sparsity in both single-task and multi-task settings on two widely-used Multi-Task Learning (MTL) datasets: NYU-v2 and CelebAMask-HQ. On both datasets, which consist of three different computer vision tasks each, multi-task models with approximately 70% sparsity outperform their dense equivalents. We also investigate how changing the degree of sparsification influences the model's performance, the overall sparsity percentage, the patterns of sparsity, and the inference time.
△ Less
Submitted 30 November, 2023; v1 submitted 23 August, 2023;
originally announced August 2023.
-
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini,
Zhiguo Ding
Abstract:
Non-orthogonal multiple access (NOMA) has been recognized as one of the key enabling technologies for future generation wireless networks. Sharing the same time-frequency resource among users imposes secrecy challenges in NOMA in the presence of untrusted users. This paper characterizes the impact of user-pair selection on the secrecy performance of an untrusted NOMA system. In this regard, an opt…
▽ More
Non-orthogonal multiple access (NOMA) has been recognized as one of the key enabling technologies for future generation wireless networks. Sharing the same time-frequency resource among users imposes secrecy challenges in NOMA in the presence of untrusted users. This paper characterizes the impact of user-pair selection on the secrecy performance of an untrusted NOMA system. In this regard, an optimization problem is formulated to maximize the secrecy rate of the strong user while satisfying the quality of service (QoS) demands of the user with poorer channel conditions. To solve this problem, we first obtain optimal power allocation in a two-user NOMA system, and then investigate the user-pair selection problem in a more generalized four user NOMA system. Extensive performance evaluations are conducted to validate the accuracy of the proposed results and present valuable insights on the impact of various system parameters on the secrecy performance of the NOMA communication system.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
Non-orthogonal multiple access (NOMA) has come to the fore as a spectral-efficient technique for fifth-generation and beyond communication networks. We consider the downlink of a NOMA system with untrusted users. In order to consider a more realistic scenario, imperfect successive interference cancellation is assumed at the receivers during the decoding process. Since pair outage probability (POP)…
▽ More
Non-orthogonal multiple access (NOMA) has come to the fore as a spectral-efficient technique for fifth-generation and beyond communication networks. We consider the downlink of a NOMA system with untrusted users. In order to consider a more realistic scenario, imperfect successive interference cancellation is assumed at the receivers during the decoding process. Since pair outage probability (POP) ensures a minimum rate guarantee to each user, it behaves as a measure of the quality of service for the pair of users. With the objective of designing a reliable communication protocol, we derive the closed-form expression of POP. Further, we find the optimal power allocation that minimizes the POP. Lastly, numerical results have been presented which validate the exactness of the analysis, and reveal the effect of various key parameters on achieved pair outage performance. In addition, we benchmark optimal power allocation against equal and fixed power allocations with respect to POP. The results indicate that optimal power allocation results in improved communication reliability.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users
Authors:
Sapna Thapar,
Insha Amin,
Deepak Mishra,
Ravikant Saini
Abstract:
Non-orthogonal multiple access (NOMA) has come to the fore as a spectrally efficient technique for fifth-generation networks and beyond. At the same time, NOMA faces severe security issues in the presence of untrusted users due to successive interference cancellation (SIC)-based decoding at receivers. In this paper, to make the system model more realistic, we consider the impact of imperfect SIC d…
▽ More
Non-orthogonal multiple access (NOMA) has come to the fore as a spectrally efficient technique for fifth-generation networks and beyond. At the same time, NOMA faces severe security issues in the presence of untrusted users due to successive interference cancellation (SIC)-based decoding at receivers. In this paper, to make the system model more realistic, we consider the impact of imperfect SIC during the decoding process. Assuming the downlink mode, we focus on designing a secure NOMA communication protocol for the considered system model with two untrusted users. In this regard, we obtain the power allocation bounds to achieve a positive secrecy rate for both near and far users. Analytical expressions of secrecy outage probability (SOP) for both users are derived to analyze secrecy performance. Closed-form approximations of SOPs are also provided to gain analytical insights. Lastly, numerical results have been presented, which validate the exactness of the analysis and reveal the effect of various key parameters on achieved secrecy performance.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error
Authors:
Sapna Thapar,
Deepak Mishra,
Derrick Wing Kwan Ng,
Ravikant Saini
Abstract:
Non-orthogonal multiple access (NOMA) serves multiple users simultaneously via the same resource block by exploiting superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers. Under practical considerations, perfect SIC may not be achieved. Thus, residual interference (RI) occurs inevitably due to imperfect SIC. In this work, we first propose a novel m…
▽ More
Non-orthogonal multiple access (NOMA) serves multiple users simultaneously via the same resource block by exploiting superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers. Under practical considerations, perfect SIC may not be achieved. Thus, residual interference (RI) occurs inevitably due to imperfect SIC. In this work, we first propose a novel model for characterizing RI to provide a more realistic secrecy performance analysis of a downlink NOMA system under imperfect SIC at receivers. In the presence of untrusted users, NOMA has an inherent security flaw. Therefore, for this untrusted users' scenario, we derive new analytical expressions of secrecy outage probability (SOP) for each user in a two-user untrusted NOMA system by using the proposed RI model. To further shed light on the obtained results and obtain a deeper understanding, a high signal-to-noise ratio approximation of the SOPs is also obtained. Lastly, numerical investigations are provided to validate the accuracy of the desired analytical results and present valuable insights into the impact of various system parameters on the secrecy rate performance of the secure NOMA communication system.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are r…
▽ More
The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Can Self-Supervised Representation Learning Methods Withstand Distribution Shifts and Corruptions?
Authors:
Prakash Chandra Chhipa,
Johan Rodahl Holmgren,
Kanjar De,
Rajkumar Saini,
Marcus Liwicki
Abstract:
Self-supervised learning in computer vision aims to leverage the inherent structure and relationships within data to learn meaningful representations without explicit human annotation, enabling a holistic understanding of visual scenes. Robustness in vision machine learning ensures reliable and consistent performance, enhancing generalization, adaptability, and resistance to noise, variations, and…
▽ More
Self-supervised learning in computer vision aims to leverage the inherent structure and relationships within data to learn meaningful representations without explicit human annotation, enabling a holistic understanding of visual scenes. Robustness in vision machine learning ensures reliable and consistent performance, enhancing generalization, adaptability, and resistance to noise, variations, and adversarial attacks. Self-supervised paradigms, namely contrastive learning, knowledge distillation, mutual information maximization, and clustering, have been considered to have shown advances in invariant learning representations. This work investigates the robustness of learned representations of self-supervised learning approaches focusing on distribution shifts and image corruptions in computer vision. Detailed experiments have been conducted to study the robustness of self-supervised learning methods on distribution shifts and image corruptions. The empirical analysis demonstrates a clear relationship between the performance of learned representations within self-supervised paradigms and the severity of distribution shifts and corruptions. Notably, higher levels of shifts and corruptions are found to significantly diminish the robustness of the learned representations. These findings highlight the critical impact of distribution shifts and image corruptions on the performance and resilience of self-supervised learning methods, emphasizing the need for effective strategies to mitigate their adverse effects. The study strongly advocates for future research in the field of self-supervised representation learning to prioritize the key aspects of safety and robustness in order to ensure practical applicability. The source code and results are available on GitHub.
△ Less
Submitted 11 August, 2023; v1 submitted 31 July, 2023;
originally announced August 2023.
-
Performance of data-driven inner speech decoding with same-task EEG-fMRI data fusion and bimodal models
Authors:
Holly Wilson,
Scott Wellington,
Foteini Simistira Liwicki,
Vibha Gupta,
Rajkumar Saini,
Kanjar De,
Nosheen Abid,
Sumit Rakesh,
Johan Eriksson,
Oliver Watts,
Xi Chen,
Mohammad Golbabaee,
Michael J. Proulx,
Marcus Liwicki,
Eamonn O'Neill,
Benjamin Metcalfe
Abstract:
Decoding inner speech from the brain signal via hybridisation of fMRI and EEG data is explored to investigate the performance benefits over unimodal models. Two different bimodal fusion approaches are examined: concatenation of probability vectors output from unimodal fMRI and EEG machine learning models, and data fusion with feature engineering. Same task inner speech data are recorded from four…
▽ More
Decoding inner speech from the brain signal via hybridisation of fMRI and EEG data is explored to investigate the performance benefits over unimodal models. Two different bimodal fusion approaches are examined: concatenation of probability vectors output from unimodal fMRI and EEG machine learning models, and data fusion with feature engineering. Same task inner speech data are recorded from four participants, and different processing strategies are compared and contrasted to previously-employed hybridisation methods. Data across participants are discovered to encode different underlying structures, which results in varying decoding performances between subject-dependent fusion models. Decoding performance is demonstrated as improved when pursuing bimodal fMRI-EEG fusion strategies, if the data show underlying structure.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
Robust and Fast Vehicle Detection using Augmented Confidence Map
Authors:
Hamam Mokayed,
Palaiahnakote Shivakumara,
Lama Alkhaled,
Rajkumar Saini,
Muhammad Zeshan Afzal,
Yan Chai Hum,
Marcus Liwicki
Abstract:
Vehicle detection in real-time scenarios is challenging because of the time constraints and the presence of multiple types of vehicles with different speeds, shapes, structures, etc. This paper presents a new method relied on generating a confidence map-for robust and faster vehicle detection. To reduce the adverse effect of different speeds, shapes, structures, and the presence of several vehicle…
▽ More
Vehicle detection in real-time scenarios is challenging because of the time constraints and the presence of multiple types of vehicles with different speeds, shapes, structures, etc. This paper presents a new method relied on generating a confidence map-for robust and faster vehicle detection. To reduce the adverse effect of different speeds, shapes, structures, and the presence of several vehicles in a single image, we introduce the concept of augmentation which highlights the region of interest containing the vehicles. The augmented map is generated by exploring the combination of multiresolution analysis and maximally stable extremal regions (MR-MSER). The output of MR-MSER is supplied to fast CNN to generate a confidence map, which results in candidate regions. Furthermore, unlike existing models that implement complicated models for vehicle detection, we explore the combination of a rough set and fuzzy-based models for robust vehicle detection. To show the effectiveness of the proposed method, we conduct experiments on our dataset captured by drones and on several vehicle detection benchmark datasets, namely, KITTI and UA-DETRAC. The results on our dataset and the benchmark datasets show that the proposed method outperforms the existing methods in terms of time efficiency and achieves a good detection rate.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Functional Knowledge Transfer with Self-supervised Representation Learning
Authors:
Prakash Chandra Chhipa,
Muskaan Chopra,
Gopal Mengi,
Varun Gupta,
Richa Upadhyay,
Meenakshi Subhash Chippa,
Kanjar De,
Rajkumar Saini,
Seiichi Uchida,
Marcus Liwicki
Abstract:
This work investigates the unexplored usability of self-supervised representation learning in the direction of functional knowledge transfer. In this work, functional knowledge transfer is achieved by joint optimization of self-supervised learning pseudo task and supervised learning task, improving supervised learning task performance. Recent progress in self-supervised learning uses a large volum…
▽ More
This work investigates the unexplored usability of self-supervised representation learning in the direction of functional knowledge transfer. In this work, functional knowledge transfer is achieved by joint optimization of self-supervised learning pseudo task and supervised learning task, improving supervised learning task performance. Recent progress in self-supervised learning uses a large volume of data, which becomes a constraint for its applications on small-scale datasets. This work shares a simple yet effective joint training framework that reinforces human-supervised task learning by learning self-supervised representations just-in-time and vice versa. Experiments on three public datasets from different visual domains, Intel Image, CIFAR, and APTOS, reveal a consistent track of performance improvements on classification tasks during joint optimization. Qualitative analysis also supports the robustness of learnt representations. Source code and trained models are available on GitHub.
△ Less
Submitted 10 July, 2023; v1 submitted 12 March, 2023;
originally announced April 2023.
-
PFSL: Personalized & Fair Split Learning with Data & Label Privacy for thin clients
Authors:
Manas Wadhwa,
Gagan Raj Gupta,
Ashutosh Sahu,
Rahul Saini,
Vidhi Mittal
Abstract:
The traditional framework of federated learning (FL) requires each client to re-train their models in every iteration, making it infeasible for resource-constrained mobile devices to train deep-learning (DL) models. Split learning (SL) provides an alternative by using a centralized server to offload the computation of activations and gradients for a subset of the model but suffers from problems of…
▽ More
The traditional framework of federated learning (FL) requires each client to re-train their models in every iteration, making it infeasible for resource-constrained mobile devices to train deep-learning (DL) models. Split learning (SL) provides an alternative by using a centralized server to offload the computation of activations and gradients for a subset of the model but suffers from problems of slow convergence and lower accuracy. In this paper, we implement PFSL, a new framework of distributed split learning where a large number of thin clients perform transfer learning in parallel, starting with a pre-trained DL model without sharing their data or labels with a central server. We implement a lightweight step of personalization of client models to provide high performance for their respective data distributions. Furthermore, we evaluate performance fairness amongst clients under a work fairness constraint for various scenarios of non-i.i.d. data distributions and unequal sample sizes. Our accuracy far exceeds that of current SL algorithms and is very close to that of centralized learning on several real-life benchmarks. It has a very low computation cost compared to FL variants and promises to deliver the full benefits of DL to extremely thin, resource-constrained clients.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
A Systematic Performance Analysis of Deep Perceptual Loss Networks: Breaking Transfer Learning Conventions
Authors:
Gustav Grund Pihlgren,
Konstantina Nikolaidou,
Prakash Chandra Chhipa,
Nosheen Abid,
Rajkumar Saini,
Fredrik Sandin,
Marcus Liwicki
Abstract:
In recent years, deep perceptual loss has been widely and successfully used to train machine learning models for many computer vision tasks, including image synthesis, segmentation, and autoencoding. Deep perceptual loss is a type of loss function for images that computes the error between two images as the distance between deep features extracted from a neural network. Most applications of the lo…
▽ More
In recent years, deep perceptual loss has been widely and successfully used to train machine learning models for many computer vision tasks, including image synthesis, segmentation, and autoencoding. Deep perceptual loss is a type of loss function for images that computes the error between two images as the distance between deep features extracted from a neural network. Most applications of the loss use pretrained networks called loss networks for deep feature extraction. However, despite increasingly widespread use, the effects of loss network implementation on the trained models have not been studied.
This work rectifies this through a systematic evaluation of the effect of different pretrained loss networks on four different application areas. Specifically, the work evaluates 14 different pretrained architectures with four different feature extraction layers. The evaluation reveals that VGG networks without batch normalization have the best performance and that the choice of feature extraction layer is at least as important as the choice of architecture. The analysis also reveals that deep perceptual loss does not adhere to the transfer learning conventions that better ImageNet accuracy implies better downstream performance and that feature extraction from the later layers provides better performance.
△ Less
Submitted 3 July, 2024; v1 submitted 8 February, 2023;
originally announced February 2023.
-
Depth Contrast: Self-Supervised Pretraining on 3DPM Images for Mining Material Classification
Authors:
Prakash Chandra Chhipa,
Richa Upadhyay,
Rajkumar Saini,
Lars Lindqvist,
Richard Nordenskjold,
Seiichi Uchida,
Marcus Liwicki
Abstract:
This work presents a novel self-supervised representation learning method to learn efficient representations without labels on images from a 3DPM sensor (3-Dimensional Particle Measurement; estimates the particle size distribution of material) utilizing RGB images and depth maps of mining material on the conveyor belt. Human annotations for material categories on sensor-generated data are scarce a…
▽ More
This work presents a novel self-supervised representation learning method to learn efficient representations without labels on images from a 3DPM sensor (3-Dimensional Particle Measurement; estimates the particle size distribution of material) utilizing RGB images and depth maps of mining material on the conveyor belt. Human annotations for material categories on sensor-generated data are scarce and cost-intensive. Currently, representation learning without human annotations remains unexplored for mining materials and does not leverage on utilization of sensor-generated data. The proposed method, Depth Contrast, enables self-supervised learning of representations without labels on the 3DPM dataset by exploiting depth maps and inductive transfer. The proposed method outperforms material classification over ImageNet transfer learning performance in fully supervised learning settings and achieves an F1 score of 0.73. Further, The proposed method yields an F1 score of 0.65 with an 11% improvement over ImageNet transfer learning performance in a semi-supervised setting when only 20% of labels are used in fine-tuning. Finally, the Proposed method showcases improved performance generalization on linear evaluation. The implementation of proposed method is available on GitHub.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Multi-Task Meta Learning: learn how to adapt to unseen tasks
Authors:
Richa Upadhyay,
Prakash Chandra Chhipa,
Ronald Phlypo,
Rajkumar Saini,
Marcus Liwicki
Abstract:
This work proposes Multi-task Meta Learning (MTML), integrating two learning paradigms Multi-Task Learning (MTL) and meta learning, to bring together the best of both worlds. In particular, it focuses simultaneous learning of multiple tasks, an element of MTL and promptly adapting to new tasks, a quality of meta learning. It is important to highlight that we focus on heterogeneous tasks, which are…
▽ More
This work proposes Multi-task Meta Learning (MTML), integrating two learning paradigms Multi-Task Learning (MTL) and meta learning, to bring together the best of both worlds. In particular, it focuses simultaneous learning of multiple tasks, an element of MTL and promptly adapting to new tasks, a quality of meta learning. It is important to highlight that we focus on heterogeneous tasks, which are of distinct kind, in contrast to typically considered homogeneous tasks (e.g., if all tasks are classification or if all tasks are regression tasks). The fundamental idea is to train a multi-task model, such that when an unseen task is introduced, it can learn in fewer steps whilst offering a performance at least as good as conventional single task learning on the new task or inclusion within the MTL. By conducting various experiments, we demonstrate this paradigm on two datasets and four tasks: NYU-v2 and the taskonomy dataset for which we perform semantic segmentation, depth estimation, surface normal estimation, and edge detection. MTML achieves state-of-the-art results for three out of four tasks for the NYU-v2 dataset and two out of four for the taskonomy dataset. In the taskonomy dataset, it was discovered that many pseudo-labeled segmentation masks lacked classes that were expected to be present in the ground truth; however, our MTML approach was found to be effective in detecting these missing classes, delivering good qualitative results. While, quantitatively its performance was affected due to the presence of incorrect ground truth labels. The the source code for reproducibility can be found at https://github.com/ricupa/MTML-learn-how-to-adapt-to-unseen-tasks.
△ Less
Submitted 26 April, 2023; v1 submitted 13 October, 2022;
originally announced October 2022.
-
RIDS : Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks
Authors:
Rahul Saini,
Debajyoti Halder,
Anand M. Baswade
Abstract:
With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, to fix the most common security flaws, the WiFi Protected Access 3 (WPA3) got introduced. Although WPA3 is an improvement over its predecessor in terms of security, recently it was found that WPA3 has a few security vulnerabilities as well. In…
▽ More
With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, to fix the most common security flaws, the WiFi Protected Access 3 (WPA3) got introduced. Although WPA3 is an improvement over its predecessor in terms of security, recently it was found that WPA3 has a few security vulnerabilities as well. In this paper, we have mentioned the previously known vulnerabilities in WPA3 and WPA2. In addition to that, we have created our own dataset based on WPA3 attacks (Section III). We have proposed a two-stage solution for the detection of an intrusion in the network. The two-stage approach will help ease computational processing burden of an AP and WLAN Controller. First, AP will perform a lightweight simple operation for some duration (say 500ms) at certain time interval. Upon discovering any abnormality in the flow of traffic an ML-based solution at the controller will detect the type of attack. Our approach is to utilize resources on AP as well as the back-end controller with certain level of optimization. We have achieved over 99% accuracy in attack detection using an ML-based solution. We have also publicly provided our code and dataset for the open-source research community, so that it can contribute for future research work.
△ Less
Submitted 6 July, 2022;
originally announced July 2022.
-
NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity
Authors:
Rakesh Saini,
Bikash K. Behera,
Saif Al-Kuwari,
Ahmed Farouk
Abstract:
Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and…
▽ More
Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and external threats. Moreover, the forthcoming advent of quantum computing poses a significant challenge, as it could decrypt data encrypted by classical. In this paper, we propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map. We evaluated developed quantum circuits using qiskit and quantum devices to validate the encryption technique. Through comprehensive performance analysis, we have demonstrated the efficiency of the chosen encryption algorithm across various criteria. Furthermore, we introduce a hybrid methodology aimed at mitigating circuit complexity and reducing quantum cost. Leveraging the Espresso algorithm and incorporating an ancilla qubit into the circuitry, we achieve a remarkable 50\% reduction in cost while maintaining security and efficiency. Finally, we conducted robustness and security analyses to assess the resilience of our encryption method against diverse noise attacks. The results confirm that our proposed quantum image encryption technique provides a secure solution and offers precise and measurable quantum image processing capabilities.
△ Less
Submitted 26 March, 2024; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Magnification Prior: A Self-Supervised Method for Learning Representations on Breast Cancer Histopathological Images
Authors:
Prakash Chandra Chhipa,
Richa Upadhyay,
Gustav Grund Pihlgren,
Rajkumar Saini,
Seiichi Uchida,
Marcus Liwicki
Abstract:
This work presents a novel self-supervised pre-training method to learn efficient representations without labels on histopathology medical images utilizing magnification factors. Other state-of-theart works mainly focus on fully supervised learning approaches that rely heavily on human annotations. However, the scarcity of labeled and unlabeled data is a long-standing challenge in histopathology.…
▽ More
This work presents a novel self-supervised pre-training method to learn efficient representations without labels on histopathology medical images utilizing magnification factors. Other state-of-theart works mainly focus on fully supervised learning approaches that rely heavily on human annotations. However, the scarcity of labeled and unlabeled data is a long-standing challenge in histopathology. Currently, representation learning without labels remains unexplored for the histopathology domain. The proposed method, Magnification Prior Contrastive Similarity (MPCS), enables self-supervised learning of representations without labels on small-scale breast cancer dataset BreakHis by exploiting magnification factor, inductive transfer, and reducing human prior. The proposed method matches fully supervised learning state-of-the-art performance in malignancy classification when only 20% of labels are used in fine-tuning and outperform previous works in fully supervised learning settings. It formulates a hypothesis and provides empirical evidence to support that reducing human-prior leads to efficient representation learning in self-supervision. The implementation of this work is available online on GitHub - https://github.com/prakashchhipa/Magnification-Prior-Self-Supervised-Method
△ Less
Submitted 8 September, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Sharing to learn and learning to share; Fitting together Meta-Learning, Multi-Task Learning, and Transfer Learning: A meta review
Authors:
Richa Upadhyay,
Ronald Phlypo,
Rajkumar Saini,
Marcus Liwicki
Abstract:
Integrating knowledge across different domains is an essential feature of human learning. Learning paradigms such as transfer learning, meta learning, and multi-task learning reflect the human learning process by exploiting the prior knowledge for new tasks, encouraging faster learning and good generalization for new tasks. This article gives a detailed view of these learning paradigms and their c…
▽ More
Integrating knowledge across different domains is an essential feature of human learning. Learning paradigms such as transfer learning, meta learning, and multi-task learning reflect the human learning process by exploiting the prior knowledge for new tasks, encouraging faster learning and good generalization for new tasks. This article gives a detailed view of these learning paradigms and their comparative analysis. The weakness of one learning algorithm turns out to be a strength of another, and thus, merging them is a prevalent trait in the literature. Numerous research papers focus on each of these learning paradigms separately and provide a comprehensive overview of them. However, this article reviews research studies that combine (two of) these learning algorithms. This survey describes how these techniques are combined to solve problems in many different fields of research, including computer vision, natural language processing, hyper-spectral imaging, and many more, in a supervised setting only. Based on the knowledge accumulated from the literature, we hypothesize a generic task-agnostic and model-agnostic learning network - an ensemble of meta learning, transfer learning, and multi-task learning, termed Multi-modal Multi-task Meta Transfer Learning. We also present some open research questions, limitations, and future research directions for this proposed network. The aim of this article is to spark interest among scholars in effectively merging existing learning algorithms with the intention of advancing research in this field. Instead of presenting experimental results, we invite readers to explore and contemplate techniques for merging algorithms while navigating through their limitations.
△ Less
Submitted 5 May, 2024; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
Observing the significance of spectrally-efficient secure non-orthogonal multiple access (NOMA), this paper proposes a novel quality of service (QoS) aware secure NOMA protocol that maximizes secrecy fairness among untrusted users. Considering a base station (BS) and two users, a novel decoding order is designed that provides security to both users. With the objective of ensuring secrecy fairness…
▽ More
Observing the significance of spectrally-efficient secure non-orthogonal multiple access (NOMA), this paper proposes a novel quality of service (QoS) aware secure NOMA protocol that maximizes secrecy fairness among untrusted users. Considering a base station (BS) and two users, a novel decoding order is designed that provides security to both users. With the objective of ensuring secrecy fairness between users, while satisfying their QoS requirements under BS transmit power budget constraint, we explore the problem of minimizing the maximum secrecy outage probability (SOP). Closed-form expression of pair outage probability (POP) and optimal power allocation (PA) minimizing POP are obtained. To analyze secrecy performance, analytical expressions of SOP for both users are derived, and individual SOP minimization problems are solved using concept of generalized-convexity. High signal-to-noise ratio approximation of SOP and asymptotically optimized solution minimizing this approximation is also found. Furthermore, a global-optimal solution from secrecy fairness standpoint is obtained at low computational complexity, and tight approximation is derived to get analytical insights. Numerical results present useful insights on globally optimized PA which ensure secrecy fairness and provide performance gain of about 55.12%, 69.30%, and 19.11%, respectively, compared to fixed PA and individual users' optimal PAs. Finally, a tradeoff between secrecy fairness performance and QoS demands is presented.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
The amalgamation of non-orthogonal multiple access (NOMA) and physical layer security is a significant research interest for providing spectrally-efficient secure fifth-generation networks. Observing the secrecy issue among multiplexed NOMA users, which is stemmed from successive interference cancellation based decoding at receivers, we focus on safeguarding untrusted NOMA. Considering the problem…
▽ More
The amalgamation of non-orthogonal multiple access (NOMA) and physical layer security is a significant research interest for providing spectrally-efficient secure fifth-generation networks. Observing the secrecy issue among multiplexed NOMA users, which is stemmed from successive interference cancellation based decoding at receivers, we focus on safeguarding untrusted NOMA. Considering the problem of each user's privacy from each other, the appropriate secure decoding order and power allocation (PA) for users are investigated. Specifically, a decoding order strategy is proposed which is efficient in providing positive secrecy at all NOMA users. An algorithm is also provided through which all the feasible secure decoding orders in accordance with the proposed decoding order strategy can be obtained. Further, in order to maximize the sum secrecy rate of the system, the joint solution of decoding order and PA is obtained numerically. Also, a sub-optimal decoding order solution is proposed. Lastly, numerical results present useful insights on the impact of key system parameters and demonstrate that average secrecy rate performance gain of about 27 dB is obtained by the jointly optimized solution over different relevant schemes.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Decoding Orders for Securing Untrusted NOMA
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted nonorthogonal multiple access users. In this context, firstly, we identify the total number of possible decoding orders analytically. Then, we propose a decoding order strategy ensuring positive secrecy rate for all users, and obtain the number of feasible secure decoding orders based on this propose…
▽ More
This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted nonorthogonal multiple access users. In this context, firstly, we identify the total number of possible decoding orders analytically. Then, we propose a decoding order strategy ensuring positive secrecy rate for all users, and obtain the number of feasible secure decoding orders based on this proposed strategy numerically. Thereafter, we present a suboptimal policy to avoid the computational complexity involved in finding the best secure decoding order. Numerical results illustrate that the suboptimal solution provides a performance gain of about 137% over therelevant benchmark.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Secrecy Fairness Aware NOMA for Untrusted Users
Authors:
Sapna Thapar,
Deepak Mishra,
Ravikant Saini
Abstract:
Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a substantial research interest for fifth generation development. This work explores crucial security issue in NOMA which is stemmed from utilizing the decoding concept of successive interference cancellation. Considering untrusted users, we design a novel secure NOMA transmission protocol to maximize secrecy f…
▽ More
Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a substantial research interest for fifth generation development. This work explores crucial security issue in NOMA which is stemmed from utilizing the decoding concept of successive interference cancellation. Considering untrusted users, we design a novel secure NOMA transmission protocol to maximize secrecy fairness among users. A new decoding order for two users' NOMA is proposed that provides positive secrecy rate to both users. Observing the objective of maximizing secrecy fairness between users under given power budget constraint, the problem is formulated as minimizing the maximum secrecy outage probability (SOP) between users. In particular, closed-form expressions of SOP for both users are derived to analyze secrecy performance. SOP minimization problems are solved using pseudoconvexity concept, and optimized power allocation (PA) for each user is obtained. Asymptotic expressions of SOPs, and optimal PAs minimizing these approximations are obtained to get deeper insights. Further, globally-optimized power control solution from secrecy fairness perspective is obtained at a low computational complexity and, asymptotic approximation is obtained to gain analytical insights. Numerical results validate the correctness of analysis, and present insights on optimal solutions. Finally, we present insights on global-optimal PA by which fairness is ensured and gains of about 55.12%, 69.30%, and 19.11%, respectively are achieved, compared to fixed PA and individual users' optimal PAs.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Investigation of NOx in piloted stabilized methane-air diffusion flames using Finite-rate and Infinitely-fast chemistry based combustion models
Authors:
Rohit Saini,
Swetha Prakash,
Ashoke De,
Rakesh Yadav
Abstract:
The present work reports on the numerical investigation of NOx in three turbulent piloted diffusion flames of different levels of extinction. The study involves two-dimensional axisymmetric modeling of combustion in these flames with fairly detailed chemistry, i.e. GRI 3.0 mechanism. The main focus of the study is to analyze the effects of the two different combustion model approaches, such as inf…
▽ More
The present work reports on the numerical investigation of NOx in three turbulent piloted diffusion flames of different levels of extinction. The study involves two-dimensional axisymmetric modeling of combustion in these flames with fairly detailed chemistry, i.e. GRI 3.0 mechanism. The main focus of the study is to analyze the effects of the two different combustion model approaches, such as infinitely fast chemistry based unsteady flamelet and finite rate chemistry based EDC, in predicting the NOx formation in three piloted methane jet flames (Sandia D, E, and F). The EDC approach is able to predict the passive scalar quantities but shows over-prediction in the reactive scalar quantities and NO prediction, while the unsteady flamelet modeling is found to be essential in predicting the accurate formation of slow kinetic species like NOx. The inability of flamelet and EDC approach in capturing localized flame extinction is observed, which lead to an over-prediction of NOx at larger downstream locations. Further, the dominance of NOx formation pathways is investigated in all three flames.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Assessment of Soot Formation Models in Lifted Ethylene/Air Turbulent Diffusion Flame
Authors:
Rohit Saini,
Ashoke De
Abstract:
In the present study, soot formation in the turbulent lifted diffusion flame, consisting of ethylene-air is numerically investigated using three different soot modeling approaches and is comprehensively reported. For turbulence-chemistry interaction, Flamelet generated manifold (FGM) model is used. A detailed kinetics is used which is represented through POLIMI mechanism (Ranzi et al. 2012). Soot…
▽ More
In the present study, soot formation in the turbulent lifted diffusion flame, consisting of ethylene-air is numerically investigated using three different soot modeling approaches and is comprehensively reported. For turbulence-chemistry interaction, Flamelet generated manifold (FGM) model is used. A detailed kinetics is used which is represented through POLIMI mechanism (Ranzi et al. 2012). Soot formation is modeled using two different approaches, semi-empirical two-equation approach and Quadrature methods of moments approach, where both the approaches consider various sub-processes such as nucleation, coagulation, surface growth and oxidation. The radiation heat transfer is taken into account considering four fictitious gasses in conjunction with the weighted-sum-of-gray gas (WSSGM) approach for modeling absorption coefficient. The experimental and earlier published numerical data from Köhler et al. (2012) and Blacha et al. (2011) are used for assessment of different soot modeling approaches. The discrepancies between numerical and experimental data are observed due to under-prediction of OH radicals concentration and poor fuel-air mixing ratios in the vicinity of the fuel jet region leading to early soot formation and the trends are unaffected after invoking radiation.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Finite groups scheme actions and incompressibility of Galois covers: beyond the ordinary case
Authors:
Najmuddin Fakhruddin,
Rijul Saini
Abstract:
Inspired by recent work of Farb, Kisin and Wolfson, we develop a method for using actions of finite group schemes over a mixed characteristic dvr R to get lower bounds for the essential dimension of a cover of a variety over K = Frac(R). We then apply this to prove p-incompressibility for congruence covers of a class of unitary Shimura varieties for primes p at which the reduction of the Shimura v…
▽ More
Inspired by recent work of Farb, Kisin and Wolfson, we develop a method for using actions of finite group schemes over a mixed characteristic dvr R to get lower bounds for the essential dimension of a cover of a variety over K = Frac(R). We then apply this to prove p-incompressibility for congruence covers of a class of unitary Shimura varieties for primes p at which the reduction of the Shimura variety (at any prime of the reflex field over p) does not have any ordinary points. We also make some progress towards a conjecture of Brosnan on the p-incompressibility of the multiplication by p map of an abelian variety.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Experimental Realization of Quantum Darwinism State on Quantum Computers
Authors:
Rakesh Saini,
Bikash K. Behera
Abstract:
It is well-known that decoherence is a crucial barrier in realizing various quantum information processing tasks; on the other hand, it plays a pivotal role in explaining how a quantum system's fragile state leads to the robust classical state. Zurek [Nat. Phys. 5, 181-188 (2009)] has developed the theory which successfully describes the emergence of classical objectivity of quantum system via dec…
▽ More
It is well-known that decoherence is a crucial barrier in realizing various quantum information processing tasks; on the other hand, it plays a pivotal role in explaining how a quantum system's fragile state leads to the robust classical state. Zurek [Nat. Phys. 5, 181-188 (2009)] has developed the theory which successfully describes the emergence of classical objectivity of quantum system via decoherence, introduced by the environment. Here, we consider two systems for a model universe, in which the first system shows a random quantum state, and the other represents the environment. We take 2-, 3-, 4-, 5- and 6-qubit quantum circuits, where the system consists of one qubit and the rest qubits represent the environment qubits. We experimentally realize the Darwinism state constructed by this system's ensemble on two real devices, ibmq_athens and ibmq_16_melbourne. We then use the results to investigate quantum-classical correlation and the mutual information present between the system and the environment.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
Protection of qubits by nonlinear resonances
Authors:
Rakesh Kumar Saini,
Raman Sehgal,
Sudhir R. Jain
Abstract:
We show that quantized superconducting circuits are non-integrable at the classical level of description, adorned by nonlinear resonances amidst stochastic sea. The spectral fluctuations of these quasi-integrable systems exhibit intermediate behaviour between regularity and chaos. The distribution function of ratios of adjacent spacings, and, nearest-neighbour spacing distribution functions attest…
▽ More
We show that quantized superconducting circuits are non-integrable at the classical level of description, adorned by nonlinear resonances amidst stochastic sea. The spectral fluctuations of these quasi-integrable systems exhibit intermediate behaviour between regularity and chaos. The distribution function of ratios of adjacent spacings, and, nearest-neighbour spacing distribution functions attest to the occurrence of "mild chaos". Based on these features, we propose criteria for protection of qubits from decoherence which amounts to choosing the parameters of the system in a way that the system resides as close as possible to the elliptic point of the primary nonlinear resonance of the corresponding classical system.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
Rational curves on K3 surfaces of small genus
Authors:
Rijul Saini
Abstract:
Let $\mathfrak B_g$ denote the moduli space of primitively polarized $K3$ surfaces $(S,H)$ of genus $g$ over $\mathbb C$. It is well-known that $\mathfrak B_g$ is irreducible and that there are only finitely many rational curves in $|H|$ for any primitively polarized $K3$ surface $(S,H)$. So we can ask the question of finding the monodromy group of such curves. The case of $g=2$ essentially follow…
▽ More
Let $\mathfrak B_g$ denote the moduli space of primitively polarized $K3$ surfaces $(S,H)$ of genus $g$ over $\mathbb C$. It is well-known that $\mathfrak B_g$ is irreducible and that there are only finitely many rational curves in $|H|$ for any primitively polarized $K3$ surface $(S,H)$. So we can ask the question of finding the monodromy group of such curves. The case of $g=2$ essentially follows from the results of Harris \cite{Ha} to be the full symmetric group $S_{324}$, here we solve the case $g=3$ and $4$.
△ Less
Submitted 19 January, 2023; v1 submitted 19 November, 2020;
originally announced November 2020.
-
On the Demystification of Knowledge Distillation: A Residual Network Perspective
Authors:
Nandan Kumar Jha,
Rajat Saini,
Sparsh Mittal
Abstract:
Knowledge distillation (KD) is generally considered as a technique for performing model compression and learned-label smoothing. However, in this paper, we study and investigate the KD approach from a new perspective: we study its efficacy in training a deeper network without any residual connections. We find that in most of the cases, non-residual student networks perform equally or better than t…
▽ More
Knowledge distillation (KD) is generally considered as a technique for performing model compression and learned-label smoothing. However, in this paper, we study and investigate the KD approach from a new perspective: we study its efficacy in training a deeper network without any residual connections. We find that in most of the cases, non-residual student networks perform equally or better than their residual versions trained on raw data without KD (baseline network). Surprisingly, in some cases, they surpass the accuracy of baseline networks even with the inferior teachers. After a certain depth of non-residual student network, the accuracy drop, coming from the removal of residual connections, is substantial, and training with KD boosts the accuracy of the student up to a great extent; however, it does not fully recover the accuracy drop. Furthermore, we observe that the conventional teacher-student view of KD is incomplete and does not adequately explain our findings. We propose a novel interpretation of KD with the Trainee-Mentor hypothesis, which provides a holistic view of KD. We also present two viewpoints, loss landscape, and feature reuse, to explain the interplay between residual connections and KD. We substantiate our claims through extensive experiments on residual networks.
△ Less
Submitted 30 June, 2020;
originally announced June 2020.
-
ULSAM: Ultra-Lightweight Subspace Attention Module for Compact Convolutional Neural Networks
Authors:
Rajat Saini,
Nandan Kumar Jha,
Bedanta Das,
Sparsh Mittal,
C. Krishna Mohan
Abstract:
The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for c…
▽ More
The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for compact convolutional neural networks (CNNs). In this work, we propose a simple yet effective "Ultra-Lightweight Subspace Attention Mechanism" (ULSAM), which infers different attention maps for each feature map subspace. We argue that leaning separate attention maps for each feature subspace enables multi-scale and multi-frequency feature representation, which is more desirable for fine-grained image classification. Our method of subspace attention is orthogonal and complementary to the existing state-of-the-arts attention mechanisms used in vision models. ULSAM is end-to-end trainable and can be deployed as a plug-and-play module in the pre-existing compact CNNs. Notably, our work is the first attempt that uses a subspace attention mechanism to increase the efficiency of compact CNNs. To show the efficacy of ULSAM, we perform experiments with MobileNet-V1 and MobileNet-V2 as backbone architectures on ImageNet-1K and three fine-grained image classification datasets. We achieve $\approx$13% and $\approx$25% reduction in both the FLOPs and parameter counts of MobileNet-V2 with a 0.27% and more than 1% improvement in top-1 accuracy on the ImageNet-1K and fine-grained image classification datasets (respectively). Code and trained models are available at https://github.com/Nandan91/ULSAM.
△ Less
Submitted 26 June, 2020;
originally announced June 2020.
-
E2GC: Energy-efficient Group Convolution in Deep Neural Networks
Authors:
Nandan Kumar Jha,
Rajat Saini,
Subhrajit Nag,
Sparsh Mittal
Abstract:
The number of groups ($g$) in group convolution (GConv) is selected to boost the predictive performance of deep neural networks (DNNs) in a compute and parameter efficient manner. However, we show that naive selection of $g$ in GConv creates an imbalance between the computational complexity and degree of data reuse, which leads to suboptimal energy efficiency in DNNs. We devise an optimum group si…
▽ More
The number of groups ($g$) in group convolution (GConv) is selected to boost the predictive performance of deep neural networks (DNNs) in a compute and parameter efficient manner. However, we show that naive selection of $g$ in GConv creates an imbalance between the computational complexity and degree of data reuse, which leads to suboptimal energy efficiency in DNNs. We devise an optimum group size model, which enables a balance between computational cost and data movement cost, thus, optimize the energy-efficiency of DNNs. Based on the insights from this model, we propose an "energy-efficient group convolution" (E2GC) module where, unlike the previous implementations of GConv, the group size ($G$) remains constant. Further, to demonstrate the efficacy of the E2GC module, we incorporate this module in the design of MobileNet-V1 and ResNeXt-50 and perform experiments on two GPUs, P100 and P4000. We show that, at comparable computational complexity, DNNs with constant group size (E2GC) are more energy-efficient than DNNs with a fixed number of groups (F$g$GC). For example, on P100 GPU, the energy-efficiency of MobileNet-V1 and ResNeXt-50 is increased by 10.8% and 4.73% (respectively) when E2GC modules substitute the F$g$GC modules in both the DNNs. Furthermore, through our extensive experimentation with ImageNet-1K and Food-101 image classification datasets, we show that the E2GC module enables a trade-off between generalization ability and representational power of DNN. Thus, the predictive performance of DNNs can be optimized by selecting an appropriate $G$. The code and trained models are available at https://github.com/iithcandle/E2GC-release.
△ Less
Submitted 26 June, 2020;
originally announced June 2020.
-
Novel Language Resources for Hindi: An Aesthetics Text Corpus and a Comprehensive Stop Lemma List
Authors:
Gayatri Venugopal-Wairagade,
Jatinderkumar R. Saini,
Dhanya Pramod
Abstract:
This paper is an effort to complement the contributions made by researchers working toward the inclusion of non-English languages in natural language processing studies. Two novel Hindi language resources have been created and released for public consumption. The first resource is a corpus consisting of nearly thousand pre-processed fictional and nonfictional texts spanning over hundred years. The…
▽ More
This paper is an effort to complement the contributions made by researchers working toward the inclusion of non-English languages in natural language processing studies. Two novel Hindi language resources have been created and released for public consumption. The first resource is a corpus consisting of nearly thousand pre-processed fictional and nonfictional texts spanning over hundred years. The second resource is an exhaustive list of stop lemmas created from 12 corpora across multiple domains, consisting of over 13 million words, from which more than 200,000 lemmas were generated, and 11 publicly available stop word lists comprising over 1000 words, from which nearly 400 unique lemmas were generated. This research lays emphasis on the use of stop lemmas instead of stop words owing to the presence of various, but not all morphological forms of a word in stop word lists, as opposed to the presence of only the root form of the word, from which variations could be derived if required. It was also observed that stop lemmas were more consistent across multiple sources as compared to stop words. In order to generate a stop lemma list, the parts of speech of the lemmas were investigated but rejected as it was found that there was no significant correlation between the rank of a word in the frequency list and its part of speech. The stop lemma list was assessed using a comparative method. A formal evaluation method is suggested as future work arising from this study.
△ Less
Submitted 1 February, 2020;
originally announced February 2020.
-
Bounds on Spreads of Matrices related to Fourth Central Moment. II
Authors:
R. Sharma,
R. Kumar,
R. Saini,
P. Devi
Abstract:
We derive some inequalities involving first four central moments of discrete and continuous distributions. Bounds for the eigenvalues and spread of a matrix are obtained when all its eigenvalues are real. Likewise, we discuss bounds for the roots and span of a polynomial equation.
We derive some inequalities involving first four central moments of discrete and continuous distributions. Bounds for the eigenvalues and spread of a matrix are obtained when all its eigenvalues are real. Likewise, we discuss bounds for the roots and span of a polynomial equation.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
A note on variance bounds and location of eigenvalues
Authors:
R. Sharma,
A. Sharma,
R. Saini
Abstract:
We discuss some extensions and refinements of the variance bounds for both real and complex numbers. The related bounds for the eigenvalues and spread of a matrix are also derived here.
We discuss some extensions and refinements of the variance bounds for both real and complex numbers. The related bounds for the eigenvalues and spread of a matrix are also derived here.
△ Less
Submitted 18 May, 2019;
originally announced May 2019.
-
ICDAR 2019 Historical Document Reading Challenge on Large Structured Chinese Family Records
Authors:
Rajkumar Saini,
Derek Dobson,
Jon Morrey,
Marcus Liwicki,
Foteini Simistira Liwicki
Abstract:
We propose a Historical Document Reading Challenge on Large Chinese Structured Family Records, in short ICDAR2019 HDRC CHINESE. The objective of the proposed competition is to recognize and analyze the layout, and finally detect and recognize the textlines and characters of the large historical document collection containing more than 20 000 pages kindly provided by FamilySearch.
We propose a Historical Document Reading Challenge on Large Chinese Structured Family Records, in short ICDAR2019 HDRC CHINESE. The objective of the proposed competition is to recognize and analyze the layout, and finally detect and recognize the textlines and characters of the large historical document collection containing more than 20 000 pages kindly provided by FamilySearch.
△ Less
Submitted 10 May, 2019; v1 submitted 8 March, 2019;
originally announced March 2019.
-
Utility Regions for DF Relay in OFDMA-based Secure Communication with Untrusted Users
Authors:
Ravikant Saini,
Deepak Mishra,
Swades De
Abstract:
This paper investigates the utility of a trusted decode-and-forward relay in OFDMA-based secure communication system with untrusted users. For deciding whether to use the relay or not, we first present optimal subcarrier allocation policies for direct communication (DC) and relayed communication (RC). Next we identify exclusive RC mode, exclusive DC mode, and mixed (RDC) mode subcarriers which can…
▽ More
This paper investigates the utility of a trusted decode-and-forward relay in OFDMA-based secure communication system with untrusted users. For deciding whether to use the relay or not, we first present optimal subcarrier allocation policies for direct communication (DC) and relayed communication (RC). Next we identify exclusive RC mode, exclusive DC mode, and mixed (RDC) mode subcarriers which can support both the modes. For RDC mode we present optimal mode selection policy and a suboptimal strategy independent of power allocation which is asymptotically optimal at both low and high SNRs. Finally, via numerical results we present insights on relay utility regions.
△ Less
Submitted 16 January, 2019;
originally announced January 2019.
-
Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users
Authors:
Ravikant Saini,
Deepak Mishra,
Swades De
Abstract:
Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing (SCP), and power allocation in a cooperative secure orthogonal frequency division multiple access (OFDMA) communication system with untrusted users is considered. Both amplify and forward (AF), and decode and forward (DF) modes of operations are considered with individual power budget constraints for sour…
▽ More
Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing (SCP), and power allocation in a cooperative secure orthogonal frequency division multiple access (OFDMA) communication system with untrusted users is considered. Both amplify and forward (AF), and decode and forward (DF) modes of operations are considered with individual power budget constraints for source and relay. After finding optimal subcarrier allocation for an AF relayed system, we prove the joint power allocation as a generalized convex problem, and solve it optimally. Compared to the conventional channel gain matching view, the optimal SCP is emphasized as a novel concept of channel gain tailoring. We prove that the optimal SCP pairs subcarriers such that the variance among the effective channel gains is minimized. For a DF relayed system, we show that depending on the power budgets of source and relay, SCP can either be in a subordinate role where it improves the energy efficiency, or in a main role where it improves the spectral efficiency of the system. In an AF relayed system we confirm that SCP plays a crucial role, and improves the spectral efficiency of the system. The channel gain tailoring property of SCP, various roles of SCP in improving the spectral and the energy efficiency of a cooperative communication system are validated with the help of simulation results.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users
Authors:
Ravikant Saini,
Abhishek **dal,
Swades De
Abstract:
In this paper, we consider the problem of resource allocation in the orthogonal frequency division multiple access system with single source and M untrusted users in presence of a friendly jammer. The jammer is used to improve either the weighted sum secure rate or the overall system fairness. The formulated optimization problem in both the cases is a mixed integer non-linear programming problem,…
▽ More
In this paper, we consider the problem of resource allocation in the orthogonal frequency division multiple access system with single source and M untrusted users in presence of a friendly jammer. The jammer is used to improve either the weighted sum secure rate or the overall system fairness. The formulated optimization problem in both the cases is a mixed integer non-linear programming problem, belonging to the class of NP-hard. In the sum secure rate maximization scenario, we decouple the problem and first obtain the subcarrier allocation at source and the decision for jammer power utilization on a per-subcarrier basis. Then, we do joint source and jammer power allocation using primal decomposition and alternating optimization framework. Next, we consider fair resource allocation by introducing a novel concept of subcarrier snatching with the help of jammer. We propose two schemes for jammer power utilization, called proactively fair allocation (PFA) and on-demand allocation (ODA). PFA considers equitable distribution of jammer power among the subcarriers, while ODA distributes jammer power based on the user demand. In both cases of jammer usage, we also present suboptimal solutions that solve the power allocation at a highly reduced complexity. Asymptotically optimal solutions are derived to benchmark optimality of the proposed schemes. We compare the performance of our proposed schemes with equal power allocation at source and jammer. Our simulation results demonstrate that the jammer can indeed help in improving either the sum secure rate or the overall system fairness.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
OFDMA-based DF Secure Cooperative Communication with Untrusted Users
Authors:
Ravikant Saini,
Deepak Mishra,
Swades De
Abstract:
In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users. We formulate two optimization problems, namely, (i) sum rate maximization subject to individual power constraints on source and relay, and (ii) sum power minimization subject to a fairness constraint in terms of per-user min…
▽ More
In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users. We formulate two optimization problems, namely, (i) sum rate maximization subject to individual power constraints on source and relay, and (ii) sum power minimization subject to a fairness constraint in terms of per-user minimum support secure rate requirement. The optimization problems are solved utilizing the optimality of KKT conditions for pseudolinear functions.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Recognizing Gender from Human Facial Regions using Genetic Algorithm
Authors:
Avirup Bhattacharyya,
Rajkumar Saini,
Partha Pratim Roy,
Debi Prosad Dogra,
Samarjit Kar
Abstract:
Recently, recognition of gender from facial images has gained a lot of importance. There exist a handful of research work that focus on feature extraction to obtain gender specific information from facial images. However, analyzing different facial regions and their fusion help in deciding the gender of a person from facial images. In this paper, we propose a new approach to identify gender from f…
▽ More
Recently, recognition of gender from facial images has gained a lot of importance. There exist a handful of research work that focus on feature extraction to obtain gender specific information from facial images. However, analyzing different facial regions and their fusion help in deciding the gender of a person from facial images. In this paper, we propose a new approach to identify gender from frontal facial images that is robust to background, illumination, intensity, and facial expression. In our framework, first the frontal face image is divided into a number of distinct regions based on facial landmark points that are obtained by the Chehra model proposed by Asthana et al. The model provides 49 facial landmark points covering different regions of the face, e.g. forehead, left eye, right eye, lips. Next, a face image is segmented into facial regions using landmark points and features are extracted from each region. The Compass LBP feature, a variant of LBP feature, has been used in our framework to obtain discriminative gender-specific information. Following this, a Support Vector Machine based classifier has been used to compute the probability scores from each facial region. Finally, the classification scores obtained from individual regions are combined with a genetic algorithm based learning to improve the overall classification accuracy. The experiments have been performed on popular face image datasets such as Adience, cFERET (color FERET), LFW and two sketch datasets, namely CUFS and CUFSF. Through experiments, we have observed that, the proposed method outperforms existing approaches.
△ Less
Submitted 5 December, 2017;
originally announced December 2017.
-
Wall Shear Stress Analysis in Stenosed Carotid Arteries with Different Shapes of Plaque
Authors:
Ruchika Bhatia,
Sharda Vashisth,
Renu Saini
Abstract:
Atherosclerosis is a disease caused due to formation of plaque into the artery. Increase in plaque affects the wall shear stress. The present study is performed to calculate wall shear stress in different geometries of stenosed carotid artery. A 2D model of different geometries is generated using CFD for Non- Newtonian model. After this WSS of different geometries of stenosed arteries is calculate…
▽ More
Atherosclerosis is a disease caused due to formation of plaque into the artery. Increase in plaque affects the wall shear stress. The present study is performed to calculate wall shear stress in different geometries of stenosed carotid artery. A 2D model of different geometries is generated using CFD for Non- Newtonian model. After this WSS of different geometries of stenosed arteries is calculated and compared. Wall Shear Stress (WSS) of carotid arteries with smooth plaque, irregular plaque, cosine plaque and artery with blood clot is calculated. It is found that with increase of plaque in common carotid artery WSS increases. Irregular plaque causes highest WSS. Wall Shear Stress of opposite walls of carotid artery is compared where one wall is having blood clot into it and other one is healthy.
△ Less
Submitted 31 May, 2017;
originally announced June 2017.
-
Classification of Pressure Gradient of Human Common Carotid Artery and Ascending Aorta on the Basis of Age and Gender
Authors:
Renu Saini,
Sharda Vashisth,
Ruchika Bhatia
Abstract:
The current work is done to see which artery has more chance of having cardiovascular diseases by measuring value of pressure gradient in the common carotid artery (CCA) and ascending aorta according to age and gender. Pressure gradient is determined in the CCA and ascending aorta of presumed healthy volunteers, having age between 10 and 60 years. A real 2D model of both aorta and common carotid a…
▽ More
The current work is done to see which artery has more chance of having cardiovascular diseases by measuring value of pressure gradient in the common carotid artery (CCA) and ascending aorta according to age and gender. Pressure gradient is determined in the CCA and ascending aorta of presumed healthy volunteers, having age between 10 and 60 years. A real 2D model of both aorta and common carotid artery is constructed for different age groups using computational fluid dynamics (CFD). Pressure gradient of both the arteries are calculated and compared for different age groups and gender. It is found that with increase in diameter of common carotid artery and ascending aorta with advancing age pressure gradient decreases. The value of pressure gradient of aorta is found less than common carotid artery in both cases of age and gender.
△ Less
Submitted 31 May, 2017;
originally announced June 2017.
-
Means Moments and Newton's Inequalities
Authors:
R. Sharma,
A. Sharma,
R. Saini,
G. Kapoor
Abstract:
It is shown that Newton's inequalities and the related Maclaurin's inequalities provide several refinements of the fundamental Arithmetic mean - Geometric mean - Harmonic mean inequality in terms of the means and variance of positive real numbers. We also obtain some inequalities involving third and fourth central moments of real numbers.
It is shown that Newton's inequalities and the related Maclaurin's inequalities provide several refinements of the fundamental Arithmetic mean - Geometric mean - Harmonic mean inequality in terms of the means and variance of positive real numbers. We also obtain some inequalities involving third and fourth central moments of real numbers.
△ Less
Submitted 15 February, 2017;
originally announced February 2017.
-
Complementary upper bounds for fourth central moment with extensions and applications
Authors:
R. Sharma,
R. Kumar,
R. Saini,
G. Kapoor
Abstract:
We prove some inequalities involving fourth central moment of a random variable that takes values in a given finite interval. Both discrete and continuous cases are considered. Bounds for the spread are obtained when a given nxn complex matrix has real eigenvalues. Likewise, we discuss bounds for the spans of polynomial equations.
We prove some inequalities involving fourth central moment of a random variable that takes values in a given finite interval. Both discrete and continuous cases are considered. Bounds for the spread are obtained when a given nxn complex matrix has real eigenvalues. Likewise, we discuss bounds for the spans of polynomial equations.
△ Less
Submitted 12 March, 2015;
originally announced March 2015.
-
Note on Bounds for Eigenvalues using Traces
Authors:
R. Sharma,
R. Kumar,
R. Saini
Abstract:
We show that various old and new bounds involving eigenvalues of a complex n x n matrix are immediate consequences of the inequalities involving variance of real and complex numbers.
We show that various old and new bounds involving eigenvalues of a complex n x n matrix are immediate consequences of the inequalities involving variance of real and complex numbers.
△ Less
Submitted 30 August, 2014;
originally announced September 2014.
-
On Lower bounds for variance and moments of unimodal distributions
Authors:
R. Sharma,
R. Bhandari,
R. Saini
Abstract:
We provide an elementary proof of the lower bound for the variance of continuous unimodal distributions and obtain analogous bounds for the higher order central moments. A lower bound for the rth central moment of discrete distribution is given and compared favorably with a related bound for discrete unimodal distribution in literature.
We provide an elementary proof of the lower bound for the variance of continuous unimodal distributions and obtain analogous bounds for the higher order central moments. A lower bound for the rth central moment of discrete distribution is given and compared favorably with a related bound for discrete unimodal distribution in literature.
△ Less
Submitted 6 October, 2013;
originally announced October 2013.