Skip to main content

Showing 1–19 of 19 results for author: Venkatasubramanian, N

.
  1. arXiv:2308.03901  [pdf, other

    cs.LG cs.AI cs.DC cs.PF

    FLIPS: Federated Learning using Intelligent Participant Selection

    Authors: Rahul Atul Bhope, K. R. Jayaram, Nalini Venkatasubramanian, Ashish Verma, Gegi Thomas

    Abstract: This paper presents the design and implementation of FLIPS, a middleware system to manage data and participant heterogeneity in federated learning (FL) training workloads. In particular, we examine the benefits of label distribution clustering on participant selection in federated learning. FLIPS clusters parties involved in an FL training job based on the label distribution of their data apriori,… ▽ More

    Submitted 30 September, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

  2. arXiv:2307.03173  [pdf, other

    astro-ph.SR astro-ph.IM

    Data processing of Visible Emission Line Coronagraph Onboard ADITYA L1

    Authors: Muthu Priyal, Jagdev Singh, B. Raghavendra Prasad, Chavali Sumana, Varun Kumar, Shalabh Mishra, S. N. Venkata, G. Sindhuja, K. Sasikumar Raja, Amit Kumar, Sanal krishnan, Bhavana S. Hegde, D. Utkarsha, Natarajan Venkatasubramanian, Pawankumar Somasundram, S. Nagabhushana, PU. Kamath, S. Kathiravan, T. Vishnu Mani, Suresh Basavaraju, Rajkumar Chavan, P. Vemareddy, B. Ravindra, S. P. Rajaguru, K. Nagaraju , et al. (6 additional authors not shown)

    Abstract: ADITYA-L1 is India's first dedicated mission to observe the sun and its atmosphere from a halo orbit around L1 point. Visible emission line coronagraph (VELC) is the prime payload on board at Aditya-L1 to observe the sun's corona. VELC is designed as an internally occulted reflective coronagraph to meet the observational requirements of wide wavelength band and close to the solar limb (1.05 Ro). I… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

  3. arXiv:2211.01914  [pdf, other

    cs.LG cs.AI

    FedGen: Generalizable Federated Learning for Sequential Data

    Authors: Praveen Venkateswaran, Vatche Isahagian, Vinod Muthusamy, Nalini Venkatasubramanian

    Abstract: Existing federated learning models that follow the standard risk minimization paradigm of machine learning often fail to generalize in the presence of spurious correlations in the training data. In many real-world distributed settings, spurious correlations exist due to biases and data sampling issues on distributed devices or clients that can erroneously influence models. Current generalization a… ▽ More

    Submitted 30 May, 2023; v1 submitted 3 November, 2022; originally announced November 2022.

  4. arXiv:2209.13128  [pdf, other

    hep-ph hep-ex

    Report of the Topical Group on Physics Beyond the Standard Model at Energy Frontier for Snowmass 2021

    Authors: Tulika Bose, Antonio Boveia, Caterina Doglioni, Simone Pagan Griso, James Hirschauer, Elliot Lipeles, Zhen Liu, Nausheen R. Shah, Lian-Tao Wang, Kaustubh Agashe, Juliette Alimena, Sebastian Baum, Mohamed Berkat, Kevin Black, Gwen Gardner, Tony Gherghetta, Josh Greaves, Maxx Haehn, Phil C. Harris, Robert Harris, Julie Hogan, Suneth Jayawardana, Abraham Kahn, Jan Kalinowski, Simon Knapen , et al. (297 additional authors not shown)

    Abstract: This is the Snowmass2021 Energy Frontier (EF) Beyond the Standard Model (BSM) report. It combines the EF topical group reports of EF08 (Model-specific explorations), EF09 (More general explorations), and EF10 (Dark Matter at Colliders). The report includes a general introduction to BSM motivations and the comparative prospects for proposed future experiments for a broad range of potential BSM mode… ▽ More

    Submitted 18 October, 2022; v1 submitted 26 September, 2022; originally announced September 2022.

    Comments: 108 pages + 38 pages references and appendix, 37 figures, Report of the Topical Group on Beyond the Standard Model Physics at Energy Frontier for Snowmass 2021. The first nine authors are the Conveners, with Contributions from the other authors

  5. arXiv:2209.01318  [pdf, other

    hep-ex hep-ph

    Muon Collider Forum Report

    Authors: K. M. Black, S. **dariani, D. Li, F. Maltoni, P. Meade, D. Stratakis, D. Acosta, R. Agarwal, K. Agashe, C. Aime, D. Ally, A. Apresyan, A. Apyan, P. Asadi, D. Athanasakos, Y. Bao, E. Barzi, N. Bartosik, L. A. T. Bauerdick, J. Beacham, S. Belomestnykh, J. S. Berg, J. Berryhill, A. Bertolin, P. C. Bhat , et al. (160 additional authors not shown)

    Abstract: A multi-TeV muon collider offers a spectacular opportunity in the direct exploration of the energy frontier. Offering a combination of unprecedented energy collisions in a comparatively clean leptonic environment, a high energy muon collider has the unique potential to provide both precision measurements and the highest energy reach in one machine that cannot be paralleled by any currently availab… ▽ More

    Submitted 8 August, 2023; v1 submitted 2 September, 2022; originally announced September 2022.

  6. arXiv:2206.03456  [pdf, other

    hep-ph hep-ex

    Summarizing experimental sensitivities of collider experiments to dark matter models and comparison to other experiments

    Authors: Antonio Boveia, Caterina Doglioni, Boyu Gao, Josh Greaves, Philip Harris, Katherine Pachal, Etienne Dreyer, Giuliano Gustavino, Robert Harris, Daniel Hayden, Tetiana Hrynova, Ashutosh Kotwal, Jared Little, Kevin Black, Tulika Bose, Yuze Chen, Sridhara Dasu, Haoyi Jia, Deborah Pinna, Varun Sharma, Nikhilesh Venkatasubramanian, Carl Vuosalo

    Abstract: Comparisons of the coverage of current and proposed dark matter searches can help us to understand the context in which a discovery of particle dark matter would be made. In some scenarios, a discovery could be reinforced by information from multiple, complementary types of experiments; in others, only one experiment would see a signal, giving only a partial, more ambiguous picture; in still other… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: Submitted to the Proceedings of the US Community Study on the Future of Particle Physics (Snowmass 2021)

  7. arXiv:2205.10404  [pdf, other

    hep-ex hep-ph

    Prospects for Heavy WIMP Dark Matter Searches at Muon Colliders

    Authors: Kevin Black, Tulika Bose, Yuze Chen, Sridhara Dasu, Haoyi Jia, Deborah Pinna, Varun Sharma, Nikhilesh Venkatasubramanian, Carl Vuosalo

    Abstract: Plots summarizing the constraints on Dark Matter models can help visualize synergies between different searches for the same kind of experiment, as well as between different experiments. In this whitepaper, we present an update to the European Strategy Briefing Book plots, from the perspective of collider searches within the Dark Matter at the Energy Frontier (EF10) Snowmass Topical Group, startin… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

    Comments: contribution to Snowmass 2021

  8. arXiv:2108.02293  [pdf, other

    cs.CR cs.DB cs.DC cs.NI

    IoT Notary: Attestable Sensor Data Capture in IoT Environments

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

    Abstract: Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address s… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: This version has been accepted in ACM Transactions on Internet Technology (TOIT), 2021. arXiv admin note: substantial text overlap with arXiv:1908.10033

  9. arXiv:2102.05238  [pdf, other

    cs.CR cs.DB cs.DC cs.IR

    Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets

    Authors: Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

    Abstract: This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based applications (involving aggregation queries over selected regions over time windows) to users. Concealer exploits carefully selected encryption techniques to use indexes supported by da… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: A preliminary version of this paper has been accepted in the 24th International Conference on Extending Database Technology (EDBT) 2021

  10. arXiv:2005.02510  [pdf, other

    cs.DB cs.CR cs.DC cs.IR

    Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets

    Authors: Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang

    Abstract: Contact tracing has emerged as one of the main mitigation strategies to prevent the spread of pandemics such as COVID-19. Recently, several efforts have been initiated to track individuals, their movements, and interactions using technologies, e.g., Bluetooth beacons, cellular data records, and smartphone applications. Such solutions are often intrusive, potentially violating individual privacy ri… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  11. LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization

    Authors: Yiming Lin, Daokun Jiang, Roberto Yus, Georgios Bouloukakis, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian

    Abstract: This paper explores the data cleaning challenges that arise in using WiFi connectivity data to locate users to semantic indoor locations such as buildings, regions, rooms. WiFi connectivity data consists of sporadic connections between devices and nearby WiFi access points (APs), each of which may cover a relatively large area within a building. Our system, entitled semantic LOCATion cleanER (LOCA… ▽ More

    Submitted 5 April, 2022; v1 submitted 20 April, 2020; originally announced April 2020.

  12. arXiv:2004.03841  [pdf, other

    cs.CR cs.DC cs.LG cs.NI

    Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

    Abstract: This paper focuses on the new privacy challenges that arise in smart homes. Specifically, the paper focuses on inferring the user's activities -- which may, in turn, lead to the user's privacy -- via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulation in a ring network consisting of smart home devic… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

    Comments: This version has been accepted in ACM Transactions on Cyber-Physical Systems (TCPS). A preliminary version of this paper was accepted in ACM Conference on Data and Application Security and Privacy (CODASPY) 2019. arXiv admin note: substantial text overlap with arXiv:1901.08618

  13. arXiv:2003.04969  [pdf, other

    cs.CR cs.DB cs.DC cs.DS

    IoT Expunge: Implementing Verifiable Retention of IoT Data

    Authors: Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian

    Abstract: The growing deployment of Internet of Things (IoT) systems aims to ease the daily life of end-users by providing several value-added services. However, IoT systems may capture and store sensitive, personal data about individuals in the cloud, thereby jeopardizing user-privacy. Emerging legislation, such as California's CalOPPA and GDPR in Europe, support strong privacy laws to protect an individua… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: This paper has been accepted in 10th ACM Conference on Data and Application Security and Privacy (CODASPY), 2020

  14. arXiv:1908.10033  [pdf, other

    cs.CR cs.DB cs.DC cs.IR

    IoT Notary: Sensor Data Attestation in Smart Environment

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

    Abstract: Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced --- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted in IEEE International Symposium on Network Computing and Applications (NCA), 2019

  15. arXiv:1904.05476  [pdf, other

    cs.CR cs.NI

    Smart Home Survey on Security and Privacy

    Authors: Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Łukasz Krzywiecki, Nalini Venkatasubramanian

    Abstract: Smart homes are a special use-case of the Internet-of-Things (IoT) paradigm. Security and privacy are two prime concern in smart home networks. A threat-prone smart home can reveal lifestyle and behavior of the occupants, which may be a significant concern. This article shows security requirements and threats to a smart home and focuses on a privacy-preserving security model. We classify smart hom… ▽ More

    Submitted 3 May, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: 9 pages, 2 figures, 4 tables, 16 references

  16. Verifiable Round-Robin Scheme for Smart Homes

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian

    Abstract: Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channel and in-home device activities. We propose a meth… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

    Comments: Accepted in ACM Conference on Data and Application Security and Privacy (CODASPY), 2019. 12 pages

  17. arXiv:1705.01985  [pdf

    cs.CY

    Research Agenda in Intelligent Infrastructure to Enhance Disaster Management, Community Resilience and Public Safety

    Authors: Michael Dunaway, Robin Murphy, Nalini Venkatasubramanian, Leysia Palen, Daniel Lopresti

    Abstract: Modern societies can be understood as the intersection of four interdependent systems: (1) the natural environment of geography, climate and weather; (2) the built environment of cities, engineered systems, and physical infrastructure; (3) the social environment of human populations, communities and socio-economic activities; and (4) an information ecosystem that overlays the other three domains a… ▽ More

    Submitted 4 May, 2017; originally announced May 2017.

    Comments: A Computing Community Consortium (CCC) white paper, 4 pages

  18. arXiv:1308.4391  [pdf, ps, other

    cs.DC cs.NI

    On Optimal and Fair Service Allocation in Mobile Cloud Computing

    Authors: M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos

    Abstract: This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile app… ▽ More

    Submitted 20 August, 2013; originally announced August 2013.

    Comments: 21 Pages

  19. arXiv:0906.4096  [pdf, ps, other

    cs.DB cs.AI

    An Event Based Approach To Situational Representation

    Authors: Naveen Ashish, Dmitri Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian

    Abstract: Many application domains require representing interrelated real-world activities and/or evolving physical phenomena. In the crisis response domain, for instance, one may be interested in representing the state of the unfolding crisis (e.g., forest fire), the progress of the response activities such as evacuation and traffic control, and the state of the crisis site(s). Such a situation represent… ▽ More

    Submitted 22 June, 2009; v1 submitted 22 June, 2009; originally announced June 2009.