Skip to main content

Showing 1–10 of 10 results for author: Sajeev, S

.
  1. arXiv:2401.15724  [pdf, other

    cs.CL

    RE-GAINS & EnChAnT: Intelligent Tool Manipulation Systems For Enhanced Query Responses

    Authors: Sahil Girhepuje, Siva Sankar Sajeev, Purvam Jain, Arya Sikder, Adithya Rama Varma, Ryan George, Akshay Govind Srinivasan, Mahendra Kurup, Ashmit Sinha, Sudip Mondal

    Abstract: Large Language Models (LLMs) currently struggle with tool invocation and chaining, as they often hallucinate or miss essential steps in a sequence. We propose RE-GAINS and EnChAnT, two novel frameworks that empower LLMs to tackle complex user queries by making API calls to external tools based on tool descriptions and argument lists. Tools are chained based on the expected output, without receivin… ▽ More

    Submitted 20 June, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

  2. arXiv:2310.09255  [pdf, other

    physics.app-ph cond-mat.str-el

    Magnetotransport Properties of Epitaxial Films and Hall Bar Devices of the Correlated Layered Ruthenate Sr$_3$Ru$_2$O$_7$

    Authors: Prosper Ngabonziza, Anand Sharma, Anna Scheid, Sethulakshmi Sajeev, Peter A. van Aken, Jochen Mannhart

    Abstract: For epitaxial Sr$_3$Ru$_2$O$_7$ films grown by pulsed laser deposition, we report a combined structural and magnetotransport study of thin films and Hall bar devices patterned side-by-side on the same film. Structural properties of these films are investigated using X-ray diffraction and high-resolution transmission electron microscopy, and confirm that these films are epitaxially oriented and nea… ▽ More

    Submitted 18 March, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: 9 pages and 6 Figures in the Main text. 3 pages and 4 Figures in the Supplementary Material

  3. arXiv:2307.12935  [pdf, other

    cs.CL cs.AI

    Rule By Example: Harnessing Logical Rules for Explainable Hate Speech Detection

    Authors: Christopher Clarke, Matthew Hall, Gaurav Mittal, Ye Yu, Sandra Sajeev, Jason Mars, Mei Chen

    Abstract: Classic approaches to content moderation typically apply a rule-based heuristic approach to flag content. While rules are easily customizable and intuitive for humans to interpret, they are inherently fragile and lack the flexibility or robustness needed to moderate the vast amount of undesirable content found online today. Recent advances in deep learning have demonstrated the promise of using hi… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: ACL 2023 Main Conference

  4. arXiv:2305.10547  [pdf, other

    cs.CV cs.CY

    Rethinking Multimodal Content Moderation from an Asymmetric Angle with Mixed-modality

    Authors: Jialin Yuan, Ye Yu, Gaurav Mittal, Matthew Hall, Sandra Sajeev, Mei Chen

    Abstract: There is a rapidly growing need for multimodal content moderation (CM) as more and more content on social media is multimodal in nature. Existing unimodal CM systems may fail to catch harmful content that crosses modalities (e.g., memes or videos), which may lead to severe consequences. In this paper, we present a novel CM model, Asymmetric Mixed-Modal Moderation (AM3), to target multimodal and un… ▽ More

    Submitted 13 December, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: Accepted at WACV 2024

  5. arXiv:2204.00159  [pdf, ps, other

    cs.IT cs.NI

    Secure and Ultra-Reliable Provenance Recovery in Sparse Networks: Strategies and Performance Bounds

    Authors: Suraj Sajeev, Manish Bansal, Sriraam S V, J. Harshan, Huzur Saran, Yih-Chun Hu

    Abstract: Provenance embedding algorithms are well known for tracking the footprints of information flow in wireless networks. Recently, low-latency provenance embedding algorithms have received traction in vehicular networks owing to strict deadlines on the delivery of packets. While existing low-latency provenance embedding methods focus on reducing the packet delay, they assume a complete graph on the un… ▽ More

    Submitted 31 March, 2022; originally announced April 2022.

    Comments: 29 pages with 16 figures

  6. Contextual Bandit Applications in Customer Support Bot

    Authors: Sandra Sajeev, Jade Huang, Nikos Karampatziakis, Matthew Hall, Sebastian Kochman, Weizhu Chen

    Abstract: Virtual support agents have grown in popularity as a way for businesses to provide better and more accessible customer service. Some challenges in this domain include ambiguous user queries as well as changing support topics and user behavior (non-stationarity). We do, however, have access to partial feedback provided by the user (clicks, surveys, and other events) which can be leveraged to improv… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: in KDD 2021

    ACM Class: I.2.0

    Journal ref: KDD '21: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (August 2021) Pages 3522-3530

  7. arXiv:2010.08670  [pdf, other

    cs.CL

    CoDA: Contrast-enhanced and Diversity-promoting Data Augmentation for Natural Language Understanding

    Authors: Yanru Qu, Dinghan Shen, Yelong Shen, Sandra Sajeev, Jiawei Han, Weizhu Chen

    Abstract: Data augmentation has been demonstrated as an effective strategy for improving model generalization and data efficiency. However, due to the discrete nature of natural language, designing label-preserving transformations for text data tends to be more challenging. In this paper, we propose a novel data augmentation framework dubbed CoDA, which synthesizes diverse and informative augmented examples… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

  8. arXiv:1911.09296  [pdf, other

    cs.CV

    xBD: A Dataset for Assessing Building Damage from Satellite Imagery

    Authors: Ritwik Gupta, Richard Hosfelt, Sandra Sajeev, Nirav Patel, Bryce Goodman, Jigar Doshi, Eric Heim, Howie Choset, Matthew Gaston

    Abstract: We present xBD, a new, large-scale dataset for the advancement of change detection and building damage assessment for humanitarian assistance and disaster recovery research. Natural disaster response requires an accurate understanding of damaged buildings in an affected region. Current response strategies require in-person damage assessments within 24-48 hours of a disaster. Massive potential exis… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: 9 pages, 10 figures

  9. A Smart Wizard System Suitable for Use With Internet Mobile Devices to Adjust Personal Information Privacy Settings

    Authors: Nahier Aldhafferi, Charles Watson, A. S. M Sajeev

    Abstract: The privacy of personal information is an important issue affecting the confidence of internet users. The widespread adoption of online social networks and access to these platforms using mobile devices has encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim of this study is to test a wizard that allows users to control the sharing of personal inf… ▽ More

    Submitted 13 July, 2013; originally announced July 2013.

    Comments: 16 pages, 8 figures, 2 tables

    Journal ref: International Journal of Security, Privacy and Trust Management,Vol2,No3,2013

  10. Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices

    Authors: Nahier Aldhafferi, Charles Watson, A. S. M Sajeev

    Abstract: Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on… ▽ More

    Submitted 13 May, 2013; originally announced May 2013.

    Journal ref: International Journal of Security, Privacy and Trust Management (IJSPTM), vol 2, No 2, April 2013