Skip to main content

Showing 1–13 of 13 results for author: Sridhar, R

.
  1. arXiv:2110.07736  [pdf, other

    cs.CL

    Identifying and Mitigating Spurious Correlations for Improving Robustness in NLP Models

    Authors: Tianlu Wang, Rohit Sridhar, Diyi Yang, Xuezhi Wang

    Abstract: Recently, NLP models have achieved remarkable progress across a variety of tasks; however, they have also been criticized for being not robust. Many robustness problems can be attributed to models exploiting spurious correlations, or shortcuts between the training data and the task labels. Most existing work identifies a limited set of task-specific shortcuts via human priors or error analyses, wh… ▽ More

    Submitted 25 May, 2022; v1 submitted 14 October, 2021; originally announced October 2021.

    Comments: 8 pages, accepted to NAACL 2022 Findings

  2. arXiv:1810.13427  [pdf, other

    stat.ML cs.LG

    Unsupervised Dimension Selection using a Blue Noise Spectrum

    Authors: Jayaraman J. Thiagarajan, Rushil Anirudh, Rahul Sridhar, Peer-Timo Bremer

    Abstract: Unsupervised dimension selection is an important problem that seeks to reduce dimensionality of data, while preserving the most useful characteristics. While dimensionality reduction is commonly utilized to construct low-dimensional embeddings, they produce feature spaces that are hard to interpret. Further, in applications such as sensor design, one needs to perform reduction directly in the inpu… ▽ More

    Submitted 31 October, 2018; originally announced October 2018.

  3. arXiv:1711.05407  [pdf, other

    stat.ML cs.CV cs.LG

    MARGIN: Uncovering Deep Neural Networks using Graph Signal Analysis

    Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Rahul Sridhar, Peer-Timo Bremer

    Abstract: Interpretability has emerged as a crucial aspect of building trust in machine learning systems, aimed at providing insights into the working of complex neural networks that are otherwise opaque to a user. There are a plethora of existing solutions addressing various aspects of interpretability ranging from identifying prototypical samples in a dataset to explaining image predictions or explaining… ▽ More

    Submitted 15 January, 2021; v1 submitted 14 November, 2017; originally announced November 2017.

    Comments: Technical Report

  4. arXiv:1202.5282  [pdf, ps, other

    cs.CR cs.OS

    How to Bypass Verified Boot Security in Chromium OS

    Authors: Mohammad Iftekhar Husain, Lokesh Mandvekar, Chunming Qiao, Ramalingam Sridhar

    Abstract: Verified boot is an interesting feature of Chromium OS that supposedly can detect any modification in the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware or keylogger and still pass the verified boot process. The exploit is… ▽ More

    Submitted 2 June, 2012; v1 submitted 23 February, 2012; originally announced February 2012.

    Comments: Update information about Chromium OS. Added new and advanced exploits. Added mitigation techniques and evaluation

  5. Robust seed selection algorithm for k-means type algorithms

    Authors: K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao, G. R. Sridhar

    Abstract: Selection of initial seeds greatly affects the quality of the clusters and in k-means type algorithms. Most of the seed selection methods result different results in different independent runs. We propose a single, optimal, outlier insensitive seed selection algorithm for k-means type algorithms as extension to k-means++. The experimental results on synthetic, real and on microarray data sets demo… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

    Comments: 17 pages, 5 tables, 9figures

    MSC Class: 62H30 ACM Class: I.5.3

    Journal ref: International Journal of Computer Science and Technology (IJCSIT), Vol 3, No 5, Oct 2011 pp 147-163

  6. arXiv:1108.5148  [pdf, ps, other

    cs.CR cs.CC cs.NI

    CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity

    Authors: Mohammad Iftekhar Husain, Suyash Mahant, Ramalingam Sridhar

    Abstract: A common approach for introducing security at the physical layer is to rely on the channel variations of the wireless environment. This type of approach is not always suitable for wireless networks where the channel remains static for most of the network lifetime. For these scenarios, a channel independent physical layer security measure is more appropriate which will rely on a secret known to the… ▽ More

    Submitted 25 August, 2011; originally announced August 2011.

    Comments: 9 pages, 15 figures

  7. Comparison Of Modified Dual Ternary Indexing And Multi-Key Hashing Algorithms For Music Information Retrieval

    Authors: Rajeswari Sridhar, A. Amudha, S. Karthiga, Geetha T V

    Abstract: In this work we have compared two indexing algorithms that have been used to index and retrieve Carnatic music songs. We have compared a modified algorithm of the Dual ternary indexing algorithm for music indexing and retrieval with the multi-key hashing indexing algorithm proposed by us. The modification in the dual ternary algorithm was essential to handle variable length query phrase and to acc… ▽ More

    Submitted 29 July, 2010; originally announced July 2010.

    Comments: 11 pages, 5 figures

    Journal ref: International Journal of Artificial Intelligence & Applications 1.3 (2010) 59-69

  8. arXiv:1005.4309  [pdf, ps, other

    math.QA math-ph math.NT

    (p,q)-Rogers-Szego polynomial and the (p,q)-oscillator

    Authors: R. Jagannathan, R. Sridhar

    Abstract: A (p,q)-analogue of the classical Rogers-Szego polynomial is defined by replacing the q-binomial coefficient in it by the (p,q)-binomial coefficient. Exactly like the Rogers-Szego polynomial is associated with the q-oscillator algebra it is found that the (p,q)-Rogers-Szego polynomial is associated with the (p,q)-oscillator algebra.

    Submitted 24 May, 2010; originally announced May 2010.

    Comments: 13 pages; Dedicated to the memory of Prof. Alladi Ramakrishnan; To appear in: "The Legacy of Alladi Ramakrishnan in the Mathematical Sciences'' (K. Alladi, J. Klauder, C. R. Rao, Editors) Springer, 2010

  9. arXiv:math-ph/0403059  [pdf, ps, other

    math-ph

    A q-Generalization of Product Densities and Janossy Functions in Stochastic Point Processes

    Authors: R. Parthasarathy, R. Sridhar

    Abstract: A q-generalization of the product densities in stochastic point processes is developed. The properties of these functions are studied and a q-generalization of the usual $C^r_s$ coefficients is obtained. This for fixed q-number of particles coincides with the q-Stirling numbers of the second kind. The q-product densities are investigated using q-Poisson distribution and this shows that the stoch… ▽ More

    Submitted 30 March, 2004; originally announced March 2004.

    Comments: Latex

    Report number: IMSc/2004/03/12

  10. arXiv:math-ph/0212068  [pdf, ps, other

    math-ph math.QA

    On the q-analogues of the Zassenhaus formula for dientangling exponential operators

    Authors: R. Sridhar, R. Jagannathan

    Abstract: Katriel, Rasetti and Solomon introduced a $q$-analogue of the Zassenhaus formula written as $e_q^{(A+B)}$ $=$ $e_q^Ae_q^Be_q^{c_2}e_q^{c_3}e_q^{c_4}e_q^{c_5}...$, where $A$ and $B$ are two generally noncommuting operators and $e_q^z$ is the Jackson $q$-exponential, and derived the expressions for $c_2$, $c_3$ and $c_4$. It is shown that one can also write $e_q^{(A+B)}$ $=$… ▽ More

    Submitted 28 April, 2003; v1 submitted 24 December, 2002; originally announced December 2002.

    Comments: 12 Pages. New references have been added. Title and Abstract have been modified in view of an earlier work of Katriel, Rasetti and Solomon on a different form of the q-Zassenhaus formula. The text is modified only slightly since the result of the paper is unchanged

    Report number: IMSc-2002/32 MSC Class: 20G42; 20G99

  11. A Diagonal Representation of Quantum Density Matrix Using q-Boson Oscillator Coherent States

    Authors: R. Parthasarathy, R. Sridhar

    Abstract: A q-analogue of Sudarshan's diagonal representation of the Quantum Mechanical density matrix is obtained using q-boson coherent states. Earlier result of Mehta and Sudarshan on the self reproducing property of rho(z',z) is also generalized and a self-consistent self-reproducing kernel {K-tilde}(z',z) is constructed.

    Submitted 16 August, 2002; originally announced August 2002.

    Comments: 9 Pages, Latex version

    Report number: IMSc/2002/07/20

  12. Supersymmetry in Thermo Field Dynamics

    Authors: R. Parthasarathy, R. Sridhar

    Abstract: By considering the enlarged thermal system including the heat bath, it is shown that this system has supersymmetry which is not broken at finite temperature. The super algebra is constructed and the Hamiltonian is expressed as the anti-commutator of two kinds of super charges. With this Hamiltonian and the thermal vacuum $\mid 0(β)>$, this supersymmetry is found to be preserved.

    Submitted 21 June, 2000; originally announced June 2000.

    Comments: 12 pages, Latex file

    Report number: IMSc/2000/06/26

    Journal ref: Phys.Lett. A279 (2001) 17-22

  13. The N-Chain Hubbard model in the Composite Operator Method

    Authors: A. Avella, F. Mancini, M. M. Sanchez, R. Sridhar

    Abstract: We propose a theoretical framework to describe the ladder systems. The N-chain Hubbard model has been studied within the Composite Operator Method. In this scheme of calculations the single-particle Green's function for any number of coupled chains is obtained by solving self-consistently a system of integral equations.

    Submitted 27 July, 1998; originally announced July 1998.

    Comments: 6 pages, 1 embedded Postscript figure, LaTeX, to be published in Physica B

    Journal ref: Physica B 259, 1056 (1999)