Skip to main content

Showing 1–50 of 253 results for author: Venkatesh, S

.
  1. arXiv:2406.13411  [pdf, other

    cs.CV cs.LG

    Composite Concept Extraction through Backdooring

    Authors: Banibrata Ghosh, Haripriya Harikumar, Khoa D Doan, Svetha Venkatesh, Santu Rana

    Abstract: Learning composite concepts, such as \textquotedbl red car\textquotedbl , from individual examples -- like a white car representing the concept of \textquotedbl car\textquotedbl{} and a red strawberry representing the concept of \textquotedbl red\textquotedbl -- is inherently challenging. This paper introduces a novel method called Composite Concept Extractor (CoCE), which leverages techniques fro… ▽ More

    Submitted 21 June, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

  2. arXiv:2406.12818  [pdf, other

    econ.TH cs.SI

    Optimal Bailouts in Diversified Financial Networks

    Authors: Krishna Dasaratha, Santosh Venkatesh, Rakesh Vohra

    Abstract: Widespread default involves substantial deadweight costs which could be countered by injecting capital into failing firms. Injections have positive spillovers that can trigger a repayment cascade. But which firms should a regulator bailout so as to minimize the total injection of capital while ensuring solvency of all firms? While the problem is, in general, NP-hard, for a wide range of networks t… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  3. arXiv:2405.16388  [pdf, other

    cs.CL cs.LG

    Multi-Reference Preference Optimization for Large Language Models

    Authors: Hung Le, Quan Tran, Dung Nguyen, Kien Do, Saloni Mittal, Kelechi Ogueji, Svetha Venkatesh

    Abstract: How can Large Language Models (LLMs) be aligned with human intentions and values? A typical solution is to gather human preference on model outputs and finetune the LLMs accordingly while ensuring that updates do not deviate too far from a reference model. Recent approaches, such as direct preference optimization (DPO), have eliminated the need for unstable and sluggish reinforcement learning opti… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

    Comments: 20 pages

  4. arXiv:2405.15254  [pdf, other

    stat.ML cs.AI cs.LG

    Novel Kernel Models and Exact Representor Theory for Neural Networks Beyond the Over-Parameterized Regime

    Authors: Alistair Shilton, Sunil Gupta, Santu Rana, Svetha Venkatesh

    Abstract: This paper presents two models of neural-networks and their training applicable to neural networks of arbitrary width, depth and topology, assuming only finite-energy neural activations; and a novel representor theory for neural networks in terms of a matrix-valued kernel. The first model is exact (un-approximated) and global, casting the neural network as an elements in a reproducing kernel Banac… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2405.14405  [pdf, other

    cs.CV eess.IV quant-ph

    Qubit-efficient Variational Quantum Algorithms for Image Segmentation

    Authors: Supreeth Mysore Venkatesh, Antonio Macaluso, Marlon Nuske, Matthias Klusch, Andreas Dengel

    Abstract: Quantum computing is expected to transform a range of computational tasks beyond the reach of classical algorithms. In this work, we examine the application of variational quantum algorithms (VQAs) for unsupervised image segmentation to partition images into separate semantic regions. Specifically, we formulate the task as a graph cut optimization problem and employ two established qubit-efficient… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 7 pages, 4 figures, 2 tables

  6. arXiv:2405.04389  [pdf, ps, other

    math.AG math.AC

    Triangulated characterizations of singularities

    Authors: Pat Lank, Sridhar Venkatesh

    Abstract: This work presents a range of triangulated characterizations for important classes of singularities such as derived splinters, rational singularities, and Du Bois singularities. An invariant called 'level' in a triangulated category can be used to measure the failure of a variety to have a prescribed singularity type. We provide explicit computations of this invariant for reduced Nagata schemes of… ▽ More

    Submitted 10 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: Current: Removed properness assumptions, removed Section 4, improved exposition. Previous: Initial version

    MSC Class: 14F08 (primary); 14B05 (secondary); 14F17; 14A30; 14E15; 18G80

  7. arXiv:2404.19668  [pdf, other

    cs.NE cs.LG

    SQUAT: Stateful Quantization-Aware Training in Recurrent Spiking Neural Networks

    Authors: Sreyes Venkatesh, Razvan Marinescu, Jason K. Eshraghian

    Abstract: Weight quantization is used to deploy high-performance deep learning models on resource-limited hardware, enabling the use of low-precision integers for storage and computation. Spiking neural networks (SNNs) share the goal of enhancing efficiency, but adopt an 'event-driven' approach to reduce the power consumption of neural network inference. While extensive research has focused on weight quanti… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: 10 pages, 4 figures, accepted at NICE 2024

  8. arXiv:2404.12680  [pdf, other

    cs.CV cs.CR

    VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

    Authors: Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

    Abstract: Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presen… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)

  9. arXiv:2404.11870  [pdf, ps, other

    cs.LG cs.CL

    Enhancing Length Extrapolation in Sequential Models with Pointer-Augmented Neural Memory

    Authors: Hung Le, Dung Nguyen, Kien Do, Svetha Venkatesh, Truyen Tran

    Abstract: We propose Pointer-Augmented Neural Memory (PANM) to help neural networks understand and apply symbol processing to new, longer sequences of data. PANM integrates an external neural memory that uses novel physical addresses and pointer manipulation techniques to mimic human and computer symbol processing abilities. PANM facilitates pointer assignment, dereference, and arithmetic by explicitly usin… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: Preprint

  10. arXiv:2404.04767  [pdf, ps, other

    math.AG math.CO

    The intersection cohomology Hodge module of toric varieties

    Authors: Hyunsuk Kim, Sridhar Venkatesh

    Abstract: We study the Hodge filtration of the intersection cohomology Hodge module for toric varieties. More precisely, we study the cohomology sheaves of the graded de Rham complex of the intersection cohomology Hodge module and give a precise formula relating it with the stalks of the intersection cohomology as a constructible complex. The main idea is to use the Ishida complex in order to compute the hi… ▽ More

    Submitted 22 May, 2024; v1 submitted 6 April, 2024; originally announced April 2024.

    Comments: 24 pages, minor changes

    MSC Class: 14B05; 14C30; 14F10; 14M25; 14Q99; 32S35; 52B22

  11. arXiv:2402.17701  [pdf, other

    eess.AS cs.LG cs.SD

    Real-time Low-latency Music Source Separation using Hybrid Spectrogram-TasNet

    Authors: Satvik Venkatesh, Arthur Benilov, Philip Coleman, Frederic Roskam

    Abstract: There have been significant advances in deep learning for music demixing in recent years. However, there has been little attention given to how these neural networks can be adapted for real-time low-latency applications, which could be helpful for hearing aids, remixing audio streams and live shows. In this paper, we investigate the various challenges involved in adapting current demixing models i… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: Accepted to ICASSP 2024

    ACM Class: I.5.1; I.5.4

  12. arXiv:2402.17679  [pdf, ps, other

    cs.SE

    The Emergence of Large Language Models in Static Analysis: A First Look through Micro-Benchmarks

    Authors: Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Amir M. Mir, Sofia Reis, Eric Bodden

    Abstract: The application of Large Language Models (LLMs) in software engineering, particularly in static analysis tasks, represents a paradigm shift in the field. In this paper, we investigate the role that current LLMs can play in improving callgraph analysis and type inference for Python programs. Using the PyCG, HeaderGen, and TypeEvalPy micro-benchmarks, we evaluate 26 LLMs, including OpenAI's GPT seri… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: To be published in: ICSE FORGE 2024 (AI Foundation Models and Software Engineering)

  13. arXiv:2402.17343  [pdf, other

    cs.LG stat.ML

    Enhanced Bayesian Optimization via Preferential Modeling of Abstract Properties

    Authors: Arun Kumar A V, Alistair Shilton, Sunil Gupta, Santu Rana, Stewart Greenhill, Svetha Venkatesh

    Abstract: Experimental (design) optimization is a key driver in designing and discovering new products and processes. Bayesian Optimization (BO) is an effective tool for optimizing expensive and black-box experimental design processes. While Bayesian optimization is a principled data-driven approach to experimental optimization, it learns everything from scratch and could greatly benefit from the expertise… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 19 Pages, 6 Figures

  14. arXiv:2402.13739  [pdf, ps, other

    cs.SE

    Hidden Gems in the Rough: Computational Notebooks as an Uncharted Oasis for IDEs

    Authors: Sergey Titov, Konstantin Grotov, Ashwin Prasad S. Venkatesh

    Abstract: In this paper, we outline potential ways for the further development of computational notebooks in Integrated Development Environments (IDEs). We discuss notebooks integration with IDEs, focusing on three main areas: facilitating experimentation, adding collaborative features, and improving code comprehension. We propose that better support of notebooks will not only benefit the notebooks, but als… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  15. arXiv:2402.10931  [pdf, other

    cond-mat.mtrl-sci

    Enabling discovery of materials through enhanced generalisability of deep learning models

    Authors: Sherif Abdulkader Tawfik, Tri Minh Nguyen, Salvy P. Russo, Truyen Tran, Sunil Gupta, Svetha Venkatesh

    Abstract: The road towards the discovery of new, useful materials is full of imperfections. Machine learning, which is currently the power horse of material discovery when it works in concert with density functional theory, has been able to accelerate the discovery of new materials for various applications by learning the properties of known, stable materials to infer the properties of unknown, deformed mat… ▽ More

    Submitted 30 April, 2024; v1 submitted 31 January, 2024; originally announced February 2024.

    Comments: 14 pages, 4 figures

  16. arXiv:2402.03577  [pdf, other

    cs.LG

    Revisiting the Dataset Bias Problem from a Statistical Perspective

    Authors: Kien Do, Dung Nguyen, Hung Le, Thao Le, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: In this paper, we study the "dataset bias" problem from a statistical standpoint, and identify the main cause of the problem as the strong correlation between a class attribute u and a non-class attribute b in the input x, represented by p(u|b) differing significantly from p(u). Since p(u|b) appears as part of the sampling distributions in the standard maximum log-likelihood (MLL) objective, a mod… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  17. arXiv:2312.16882  [pdf, ps, other

    cs.SE

    TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools

    Authors: Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Jiawei Wang, Amir M. Mir, Li Li, Eric Bodden

    Abstract: In light of the growing interest in type inference research for Python, both researchers and practitioners require a standardized process to assess the performance of various type inference techniques. This paper introduces TypeEvalPy, a comprehensive micro-benchmarking framework for evaluating type inference tools. TypeEvalPy contains 154 code snippets with 845 type annotations across 18 categori… ▽ More

    Submitted 2 January, 2024; v1 submitted 28 December, 2023; originally announced December 2023.

    Comments: To be published in ICSE 2024

  18. arXiv:2312.11818  [pdf, other

    cs.AI cs.LG stat.ML

    Root Cause Explanation of Outliers under Noisy Mechanisms

    Authors: Phuoc Nguyen, Truyen Tran, Sunil Gupta, Thin Nguyen, Svetha Venkatesh

    Abstract: Identifying root causes of anomalies in causal processes is vital across disciplines. Once identified, one can isolate the root causes and implement necessary measures to restore the normal operation. Causal processes are often modelled as graphs with entities being nodes and their paths/interconnections as edge. Existing work only consider the contribution of nodes in the generative process, thus… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: Accepted AAAI 2024

  19. arXiv:2312.04095  [pdf, other

    cs.LG cs.CV

    Learn to Unlearn for Deep Neural Networks: Minimizing Unlearning Interference with Gradient Projection

    Authors: Tuan Hoang, Santu Rana, Sunil Gupta, Svetha Venkatesh

    Abstract: Recent data-privacy laws have sparked interest in machine unlearning, which involves removing the effect of specific training samples from a learnt model as if they were never present in the original training dataset. The challenge of machine unlearning is to discard information about the ``forget'' data in the learnt model without altering the knowledge about the remaining dataset and to do so mo… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: Accepted to WACV 2024

  20. arXiv:2311.12912  [pdf, other

    cs.CV quant-ph

    Q-Seg: Quantum Annealing-based Unsupervised Image Segmentation

    Authors: Supreeth Mysore Venkatesh, Antonio Macaluso, Marlon Nuske, Matthias Klusch, Andreas Dengel

    Abstract: In this study, we present Q-Seg, a novel unsupervised image segmentation method based on quantum annealing, tailored for existing quantum hardware. We formulate the pixel-wise segmentation problem, which assimilates spectral and spatial information of the image, as a graph-cut optimization task. Our method efficiently leverages the interconnected qubit topology of the D-Wave Advantage device, offe… ▽ More

    Submitted 30 November, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 12 pages, 9 figures, 1 table

  21. arXiv:2311.11566  [pdf, other

    cs.CV

    Does complimentary information from multispectral imaging improve face presentation attack detection?

    Authors: Narayan Vetrekar, Raghavendra Ramachandra, Sushma Venkatesh, Jyoti D. Pawar, R. S. Gad

    Abstract: Presentation Attack Detection (PAD) has been extensively studied, particularly in the visible spectrum. With the advancement of sensing technology beyond the visible range, multispectral imaging has gained significant attention in this direction. We present PAD based on multispectral images constructed for eight different presentation artifacts resulted from three different artifact species. In th… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: Accepted in International IEEE Applied Sensing Conference (IEEE APSCON) 2024

  22. arXiv:2310.16808  [pdf, other

    cs.CV

    Fingervein Verification using Convolutional Multi-Head Attention Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh

    Abstract: Biometric verification systems are deployed in various security-based access-control applications that require user-friendly and reliable person verification. Among the different biometric characteristics, fingervein biometrics have been extensively studied owing to their reliable verification performance. Furthermore, fingervein patterns reside inside the skin and are not visible outside; therefo… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  23. arXiv:2309.13704  [pdf, other

    cs.CV

    Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

    Authors: Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

    Abstract: Facial biometrics are widely deployed in smartphone-based applications because of their usability and increased verification accuracy in unconstrained scenarios. The evolving applications of smartphone-based facial recognition have also increased Presentation Attacks (PAs), where an attacker can present a Presentation Attack Instrument (PAI) to maliciously gain access to the application. Because t… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Accepted in IJCB 2023

  24. GRB Optical and X-ray Plateau Properties Classifier Using Unsupervised Machine Learning

    Authors: Shubham Bhardwaj, Maria G. Dainotti, Sachin Venkatesh, Aditya Narendra, Anish Kalsi, Enrico Rinaldi, Agnieszka Pollo

    Abstract: The division of Gamma-ray bursts (GRBs) into different classes, other than the "short" and "long", has been an active field of research. We investigate whether GRBs can be classified based on a broader set of parameters, including prompt and plateau emission ones. Observational evidence suggests the existence of more GRB sub-classes, but results so far are either conflicting or not statistically s… ▽ More

    Submitted 6 September, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: 20 pages, 10 figures (one has 4 panels, two have a single panel, six have 8 panels, one has 6 panels), 4 tables. Accepted for publication in MNRAS

    Report number: RIKEN-iTHEMS-Report-23

    Journal ref: MNRAS, Volume 525, Issue 4, pp.5204-5223, November 2023

  25. arXiv:2308.13542  [pdf, other

    cs.AI

    LaGR-SEQ: Language-Guided Reinforcement Learning with Sample-Efficient Querying

    Authors: Thommen George Karimpanal, Laknath Buddhika Semage, Santu Rana, Hung Le, Truyen Tran, Sunil Gupta, Svetha Venkatesh

    Abstract: Large language models (LLMs) have recently demonstrated their impressive ability to provide context-aware responses via text. This ability could potentially be used to predict plausible solutions in sequential decision making tasks pertaining to pattern completion. For example, by observing a partial stack of cubes, LLMs can predict the correct sequence in which the remaining cubes should be stack… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

    Comments: 18 pages, 11 figures

  26. arXiv:2308.04836  [pdf, other

    cs.LG

    Beyond Surprise: Improving Exploration Through Surprise Novelty

    Authors: Hung Le, Kien Do, Dung Nguyen, Svetha Venkatesh

    Abstract: We present a new computing model for intrinsic rewards in reinforcement learning that addresses the limitations of existing surprise-driven explorations. The reward is the novelty of the surprise rather than the surprise norm. We estimate the surprise novelty as retrieval errors of a memory network wherein the memory stores and reconstructs surprises. Our surprise memory (SM) augments the capabili… ▽ More

    Submitted 30 January, 2024; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: 17 pages including Appendix

  27. arXiv:2308.00285  [pdf, other

    cs.LG stat.ML

    Predictive Modeling through Hyper-Bayesian Optimization

    Authors: Manisha Senadeera, Santu Rana, Sunil Gupta, Svetha Venkatesh

    Abstract: Model selection is an integral problem of model based optimization techniques such as Bayesian optimization (BO). Current approaches often treat model selection as an estimation problem, to be periodically updated with observations coming from the optimization iterations. In this paper, we propose an alternative way to achieve both efficiently. Specifically, we propose a novel way of integrating m… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  28. arXiv:2307.12729  [pdf, ps, other

    cs.CV

    Persistent-Transient Duality: A Multi-mechanism Approach for Modeling Human-Object Interaction

    Authors: Hung Tran, Vuong Le, Svetha Venkatesh, Truyen Tran

    Abstract: Humans are highly adaptable, swiftly switching between different modes to progressively handle different tasks, situations and contexts. In Human-object interaction (HOI) activities, these modes can be attributed to two mechanisms: (1) the large-scale consistent plan for the whole activity and (2) the small-scale children interactive actions that start and end along the timeline. While neuroscienc… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: Accepted at ICCV 2023

  29. arXiv:2306.16574  [pdf, other

    math.AC

    On Lengths of $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$

    Authors: Fiona Han, Jennifer Kenkel, Daniel Li, Sridhar Venkatesh, Ashley Wiles

    Abstract: In this paper, we provide a formula for the vector space dimension of the ring $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ over $\mathbb{F}_2$ when $d_1,d_2,d_3$ all lie between successive powers of $2$. For general $d_1,d_2,d_3$, we provide a simple algorithm to calculate the vector space dimension of $\mathbb{F}_2[x,y,z]/(x^{d_1}, y^{d_2},z^{d_3}, x+y+z)$ by combining our formula wit… ▽ More

    Submitted 11 March, 2024; v1 submitted 28 June, 2023; originally announced June 2023.

  30. Local vanishing for toric varieties

    Authors: Wanchun Shen, Sridhar Venkatesh, Anh Duc Vo

    Abstract: Let $X$ be a toric variety. We establish vanishing (and non-vanishing) results for the sheaves $R^if_*Ω^p_{\tilde X}(\log E)$, where $f: \tilde{X} \to X$ is a strong log resolution of singularities with reduced exceptional divisor $E$. These extend the local vanishing theorem for toric varieties in [MOP20]. Our consideration of these sheaves is motivated by the notion of $k$-rational singularities… ▽ More

    Submitted 28 April, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: 17 pages; v2: Minor changes, following the referee's comments; to appear in manuscripta mathematica

    MSC Class: 14M25; 14F17; 14B05

  31. arXiv:2306.03977  [pdf, ps, other

    math.AG

    On $k$-Du Bois and $k$-rational singularities

    Authors: Wanchun Shen, Sridhar Venkatesh, Anh Duc Vo

    Abstract: We introduce new notions of $k$-Du Bois and $k$-rational singularities, extending the previous definitions in the case of local complete intersections (lci), to include natural examples outside of this setting. We study the stability of these notions under general hyperplane sections and show that varieties with $k$-rational singularities are $k$-Du Bois, extending previous results in [MP22b] and… ▽ More

    Submitted 13 November, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: improved presentation of proof of Thm B, extended Prop 4.2 and Cor 4.3 to pre-k-rational singularities

  32. arXiv:2305.01294  [pdf, other

    cs.CV

    Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran Raja

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: accepted in 5th International Conference on Bio-engineering for Smart Technologies (BIO-SMART 2023)

  33. arXiv:2304.12144  [pdf

    physics.ins-det

    Inductive sensing of magnetic microrobots under actuation by rotating magnetic fields

    Authors: Michael G. Christiansen, Lucien Stöcklin, Cameron Forbrigger, Shashaank Abhinav Venkatesh, Simone Schuerle

    Abstract: The engineering space for magnetically manipulated biomedical microrobots is rapidly expanding. This includes synthetic, bioinspired, and biohybrid designs, some of which may eventually assume clinical roles aiding drug delivery or performing other therapeutic functions. Actuating these microrobots with rotating magnetic fields (RMFs) and the magnetic torques they exert offers the advantages of ef… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 33 pages, 4 main figures, 6 supplementary figures

  34. QuACS: Variational Quantum Algorithm for Coalition Structure Generation in Induced Subgraph Games

    Authors: Supreeth Mysore Venkatesh, Antonio Macaluso, Matthias Klusch

    Abstract: Coalition Structure Generation (CSG) is an NP-Hard problem in which agents are partitioned into mutually exclusive groups to maximize their social welfare. In this work, we propose QuACS, a novel hybrid quantum classical algorithm for Coalition Structure Generation in Induced Subgraph Games (ISGs). Starting from a coalition structure where all the agents belong to a single coalition, QuACS recursi… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

    Comments: 7 pages, 2 figures, 1 table

  35. arXiv:2304.03510  [pdf, other

    cs.CV

    Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra Gad

    Abstract: Face morphing attack detection is emerging as an increasingly challenging problem owing to advancements in high-quality and realistic morphing attack generation. Reliable detection of morphing attacks is essential because these attacks are targeted for border control applications. This paper presents a multispectral framework for differential morphing-attack detection (D-MAD). The D-MAD methods ar… ▽ More

    Submitted 25 October, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  36. arXiv:2303.14004  [pdf, other

    cs.CV

    Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

    Abstract: Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted in IWBF 2023

  37. arXiv:2303.01684  [pdf, other

    cs.LG cs.AI

    BO-Muse: A human expert and AI teaming framework for accelerated experimental design

    Authors: Sunil Gupta, Alistair Shilton, Arun Kumar A V, Shannon Ryan, Majid Abdolshah, Hung Le, Santu Rana, Julian Berk, Mahad Rashid, Svetha Venkatesh

    Abstract: In this paper we introduce BO-Muse, a new approach to human-AI teaming for the optimization of expensive black-box functions. Inspired by the intrinsic difficulty of extracting expert knowledge and distilling it back into AI models and by observations of human behavior in real-world experimental design, our algorithm lets the human expert take the lead in the experimental process. The human expert… ▽ More

    Submitted 30 March, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

    Comments: 34 Pages, 7 Figures and 5 Tables

  38. arXiv:2302.04013  [pdf, other

    cs.LG cs.AI cs.RO

    Zero-shot Sim2Real Adaptation Across Environments

    Authors: Buddhika Laknath Semage, Thommen George Karimpanal, Santu Rana, Svetha Venkatesh

    Abstract: Simulation based learning often provides a cost-efficient recourse to reinforcement learning applications in robotics. However, simulators are generally incapable of accurately replicating real-world dynamics, and thus bridging the sim2real gap is an important problem in simulation based learning. Current solutions to bridge the sim2real gap involve hybrid simulators that are augmented with neural… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  39. arXiv:2302.00205  [pdf, other

    stat.ML cs.LG

    Gradient Descent in Neural Networks as Sequential Learning in RKBS

    Authors: Alistair Shilton, Sunil Gupta, Santu Rana, Svetha Venkatesh

    Abstract: The study of Neural Tangent Kernels (NTKs) has provided much needed insight into convergence and generalization properties of neural networks in the over-parametrized (wide) limit by approximating the network using a first-order Taylor expansion with respect to its weights in the neighborhood of their initialization values. This allows neural network training to be analyzed from the perspective of… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

  40. arXiv:2301.06926  [pdf, ps, other

    cs.AI cs.LG

    Memory-Augmented Theory of Mind Network

    Authors: Dung Nguyen, Phuoc Nguyen, Hung Le, Kien Do, Svetha Venkatesh, Truyen Tran

    Abstract: Social reasoning necessitates the capacity of theory of mind (ToM), the ability to contextualise and attribute mental states to others without having access to their internal cognitive structure. Recent machine learning approaches to ToM have demonstrated that we can train the observer to read the past and present behaviours of other agents and infer their beliefs (including false beliefs about th… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

    Comments: Accepted for publication at AAAI 2023

  41. arXiv:2301.04949  [pdf, ps, other

    math.OC

    A Formal Power Series Approach to Multiplicative Dynamic Feedback Interconnection

    Authors: Kurusch Ebrahimi-Fard, G. S. Venkatesh

    Abstract: The goal of the paper is multi-fold. First, an explicit formula is derived to compute the non-commutative generating series of a closed-loop system when a (multi-input, multi-output) plant, given in Chen--Fliess series description is in multiplicative output feedback interconnection with another system, also given as Chen--Fliess series. Furthermore, it is shown that the multiplicative dynamic out… ▽ More

    Submitted 23 October, 2023; v1 submitted 12 January, 2023; originally announced January 2023.

  42. arXiv:2301.04419  [pdf, other

    cs.SE

    Static Analysis Driven Enhancements for Comprehension in Machine Learning Notebooks

    Authors: Ashwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Mouli Chekkapalli, Jiawei Wang, Li Li, Eric Bodden

    Abstract: Jupyter notebooks enable developers to interleave code snippets with rich-text and in-line visualizations. Data scientists use Jupyter notebook as the de-facto standard for creating and sharing machine-learning based solutions, primarily written in Python. Recent studies have demonstrated, however, that a large portion of Jupyter notebooks available on public platforms are undocumented and lacks a… ▽ More

    Submitted 11 June, 2024; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: To be published in: EMSE Journal

  43. arXiv:2212.14863  [pdf, other

    math.SG math.KT

    Rabinowitz Fukaya categories and the categorical formal punctured neighborhood of infinity

    Authors: Sheel Ganatra, Yuan Gao, Sara Venkatesh

    Abstract: This paper constructs and studies the Rabinowitz (wrapped) Fukaya category, a categorical invariant of exact cylindrical Lagrangians in a Liouville manifold whose cohomological morphisms, ``Rabinowitz wrapped Floer homology groups" measure the failure of wrapped Floer cohomology to satisfy Poincare duality (and in particular vanish for any pair with at least one compact Lagrangian). Our main resul… ▽ More

    Submitted 30 December, 2022; originally announced December 2022.

    Comments: 82 pages, 5 figures, comments welcome

    MSC Class: 53D37; 18G70; 14J33; 16E40

  44. arXiv:2212.11372  [pdf, other

    quant-ph cs.AI cs.MA

    GCS-Q: Quantum Graph Coalition Structure Generation

    Authors: Supreeth Mysore Venkatesh, Antonio Macaluso, Matthias Klusch

    Abstract: The problem of generating an optimal coalition structure for a given coalition game of rational agents is to find a partition that maximizes their social welfare and is known to be NP-hard. This paper proposes GCS-Q, a novel quantum-supported solution for Induced Subgraph Games (ISGs) in coalition structure generation. GCS-Q starts by considering the grand coalition as initial coalition structure… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: 6 pages, 3 figures

  45. PERISTOLE: PackagE that geneRates tIme delay plotS caused by graviTatiOnaL lEnsing

    Authors: T. S. Sachin Venkatesh, Gaurav Pundir

    Abstract: We present PERISTOLE to study the various time delays associated with the pulsar rotation and other general relativistic aspects of binary pulsars. It is made available as an open-source python package which takes some parameters of the double pulsar system as input and outputs the rotational and latitudinal lensing delays along with the geometric and Shapiro delays that arise due to gravitational… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 8 subfigures placed as sets of 2 to showcase the graph functions, accepted to RNAAS

    Journal ref: Research Notes of the AAS, 6(12), 255

  46. arXiv:2211.13208  [pdf, other

    cs.LG

    On Instance-Dependent Bounds for Offline Reinforcement Learning with Linear Function Approximation

    Authors: Thanh Nguyen-Tang, Ming Yin, Sunil Gupta, Svetha Venkatesh, Raman Arora

    Abstract: Sample-efficient offline reinforcement learning (RL) with linear function approximation has recently been studied extensively. Much of prior work has yielded the minimax-optimal bound of $\tilde{\mathcal{O}}(\frac{1}{\sqrt{K}})$, with $K$ being the number of episodes in the offline data. In this work, we seek to understand instance-dependent bounds for offline RL with function approximation. We pr… ▽ More

    Submitted 27 January, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: AAAI'23

  47. arXiv:2211.07615  [pdf, other

    cs.CL

    UGIF: UI Grounded Instruction Following

    Authors: Sagar Gubbi Venkatesh, Partha Talukdar, Srini Narayanan

    Abstract: Smartphone users often find it difficult to navigate myriad menus to perform common tasks such as "How to block calls from unknown numbers?". Currently, help documents with step-by-step instructions are manually written to aid the user. The user experience can be further enhanced by grounding the instructions in the help document to the UI and overlaying a tutorial on the phone UI. To build such t… ▽ More

    Submitted 23 May, 2023; v1 submitted 14 November, 2022; originally announced November 2022.

  48. arXiv:2209.10359  [pdf, other

    cs.CV cs.AI

    Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation

    Authors: Kien Do, Hung Le, Dung Nguyen, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: Data-free Knowledge Distillation (DFKD) has attracted attention recently thanks to its appealing capability of transferring knowledge from a teacher network to a student network without using training data. The main idea is to use a generator to synthesize data for training the student. As the generator gets updated, the distribution of synthetic data will change. Such distribution shift could be… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted to NeurIPS 2022

  49. arXiv:2207.12106  [pdf, other

    cs.CV cs.AI cs.LG

    Black-box Few-shot Knowledge Distillation

    Authors: Dang Nguyen, Sunil Gupta, Kien Do, Svetha Venkatesh

    Abstract: Knowledge distillation (KD) is an efficient approach to transfer the knowledge from a large "teacher" network to a smaller "student" network. Traditional KD methods require lots of labeled training samples and a white-box teacher (parameters are accessible) to train a good student. However, these resources are not always available in real-world applications. The distillation process often happens… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: To appear at ECCV 2022

  50. arXiv:2207.08300  [pdf, ps, other

    math.OC

    A Formal Power Series Approach to Multiplicative Dynamic and Static Output Feedback

    Authors: G. S. Venkatesh

    Abstract: The goal of the paper is two-fold. The first of which is to derive an explicit formula to compute the generating series of a closed-loop system when a plant, given in a Chen-Fliess series description is in multiplicative output feedback connection with another system given in Chen-Fliess series description. Further, the objective extends in showing that the multiplicative dynamic output feedback c… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: accepted in $25^{th}$ Int. Symposium on Mathematical Theory of Networks and Systems, Bayreuth, Germany, 2022