Skip to main content

Showing 1–30 of 30 results for author: A, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14102  [pdf, other

    cs.CR

    SeCTIS: A Framework to Secure CTI Sharing

    Authors: Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Vinod P

    Abstract: The rise of IT-dependent operations in modern organizations has heightened their vulnerability to cyberattacks. As a growing number of organizations include smart, interconnected devices in their systems to automate their processes, the attack surface becomes much bigger, and the complexity and frequency of attacks pose a significant threat. Consequently, organizations have been compelled to seek… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2405.14311  [pdf, ps, other

    cs.CR

    Deep Learning Fusion For Effective Malware Detection: Leveraging Visual Features

    Authors: Jahez Abraham Johny, Vinod P., Asmitha K. A., G. Radhamani, Rafidha Rehiman K. A., Mauro Conti

    Abstract: Malware has become a formidable threat as it has been growing exponentially in number and sophistication, thus, it is imperative to have a solution that is easy to implement, reliable, and effective. While recent research has introduced deep learning multi-feature fusion algorithms, they lack a proper explanation. In this work, we investigate the power of fusing Convolutional Neural Network models… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  3. arXiv:2404.19534  [pdf, other

    cs.CV

    MIPI 2024 Challenge on Nighttime Flare Removal: Methods and Results

    Authors: Yuekun Dai, Dafeng Zhang, Xiaoming Li, Zongsheng Yue, Chongyi Li, Shangchen Zhou, Ruicheng Feng, Peiqing Yang, Zhezhu **, Guanqun Liu, Chen Change Loy, Lize Zhang, Shuai Liu, Chaoyu Feng, Luyang Wang, Shuan Chen, Guangqi Shao, Xiaotao Wang, Lei Lei, Qirui Yang, Qihua Cheng, Zhiqiang Xu, Yihao Liu, Huan**g Yue, **gyu Yang , et al. (38 additional authors not shown)

    Abstract: The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photogra… ▽ More

    Submitted 27 May, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: CVPR 2024 Mobile Intelligent Photography and Imaging (MIPI) Workshop--Nighttime Flare Removal Challenge Report. Website: https://mipi-challenge.org/MIPI2024/

  4. arXiv:2403.00211  [pdf, other

    cs.CV

    Trustworthy Self-Attention: Enabling the Network to Focus Only on the Most Relevant References

    Authors: Yu **g, Tan Yujuan, Ren Ao, Liu Duo

    Abstract: The prediction of optical flow for occluded points is still a difficult problem that has not yet been solved. Recent methods use self-attention to find relevant non-occluded points as references for estimating the optical flow of occluded points based on the assumption of self-similarity. However, they rely on visual features of a single image and weak constraints, which are not sufficient to cons… ▽ More

    Submitted 26 March, 2024; v1 submitted 29 February, 2024; originally announced March 2024.

    Comments: Correct Figure 1

  5. arXiv:2402.11425  [pdf, other

    stat.ME cs.LG math.OC math.PR

    Online Local False Discovery Rate Control: A Resource Allocation Approach

    Authors: Ruicheng Ao, Hongyu Chen, David Simchi-Levi, Feng Zhu

    Abstract: We consider the problem of sequentially conducting multiple experiments where each experiment corresponds to a hypothesis testing task. At each time point, the experimenter must make an irrevocable decision of whether to reject the null hypothesis (or equivalently claim a discovery) before the next experimental result arrives. The goal is to maximize the number of discoveries while maintaining a l… ▽ More

    Submitted 1 April, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

  6. arXiv:2401.05879  [pdf

    cs.CV

    YOIO: You Only Iterate Once by mining and fusing multiple necessary global information in the optical flow estimation

    Authors: Yu **g, Tan Yujuan, Ren Ao, Liu Duo

    Abstract: Occlusions pose a significant challenge to optical flow algorithms that even rely on global evidences. We consider an occluded point to be one that is imaged in the reference frame but not in the next. Estimating the motion of these points is extremely difficult, particularly in the two-frame setting. Previous work only used the current frame as the only input, which could not guarantee providing… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2104.02409 by other authors

  7. arXiv:2401.03552  [pdf, other

    cs.CR cs.AI cs.LG

    Privacy-Preserving in Blockchain-based Federated Learning Systems

    Authors: Sameera K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti

    Abstract: Federated Learning (FL) has recently arisen as a revolutionary approach to collaborative training Machine Learning models. According to this novel framework, multiple participants train a global model collaboratively, coordinating with a central aggregator without sharing their local data. As FL gains popularity in diverse domains, security, and privacy concerns arise due to the distributed nature… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: 44 pages, 11 figures

  8. arXiv:2311.10408  [pdf

    cs.CV

    Deep Learning based CNN Model for Classification and Detection of Individuals Wearing Face Mask

    Authors: R. Chinnaiyan, Iyyappan M, Al Raiyan Shariff A, Kondaveeti Sai, Mallikarjunaiah B M, P Bharath

    Abstract: In response to the global COVID-19 pandemic, there has been a critical demand for protective measures, with face masks emerging as a primary safeguard. The approach involves a two-fold strategy: first, recognizing the presence of a face by detecting faces, and second, identifying masks on those faces. This project utilizes deep learning to create a model that can detect face masks in real-time str… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 8 Pages , 6 figures , 1 Table

  9. arXiv:2311.08807  [pdf, other

    cs.CR

    NLP-Based Techniques for Cyber Threat Intelligence

    Authors: Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti

    Abstract: In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  10. arXiv:2308.06471  [pdf

    cs.LG

    Volterra Accentuated Non-Linear Dynamical Admittance (VANYA) to model Deforestation: An Exemplification from the Amazon Rainforest

    Authors: Karthik R., Ramamoorthy A.

    Abstract: Intelligent automation supports us against cyclones, droughts, and seismic events with recent technology advancements. Algorithmic learning has advanced fields like neuroscience, genetics, and human-computer interaction. Time-series data boosts progress. Challenges persist in adopting these approaches in traditional fields. Neural networks face comprehension and bias issues. AI's expansion across… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

  11. arXiv:2307.00783  [pdf, other

    math.OC cs.AI cs.LG

    Monte Carlo Policy Gradient Method for Binary Optimization

    Authors: Cheng Chen, Ruitao Chen, Tianyou Li, Ruichen Ao, Zaiwen Wen

    Abstract: Binary optimization has a wide range of applications in combinatorial optimization problems such as MaxCut, MIMO detection, and MaxSAT. However, these problems are typically NP-hard due to the binary constraints. We develop a novel probabilistic model to sample the binary solution according to a parameterized policy distribution. Specifically, minimizing the KL divergence between the parameterized… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    MSC Class: 90C09; 90C27; 90C59; 60J45; 60J20

  12. arXiv:2306.16087  [pdf, other

    cs.CR

    Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

    Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti

    Abstract: Time-relevant and accurate threat information from public domains are essential for cyber security. In a constantly evolving threat landscape, such information assists security researchers in thwarting attack strategies. In this work, we collect and analyze threat-related information from Twitter to extract intelligence for proactive security. We first use a convolutional neural network to classif… ▽ More

    Submitted 28 June, 2023; originally announced June 2023.

  13. arXiv:2211.08980  [pdf, other

    cs.GT cs.IT cs.LG math.OC

    Asynchronous Gradient Play in Zero-Sum Multi-agent Games

    Authors: Ruicheng Ao, Shicong Cen, Yuejie Chi

    Abstract: Finding equilibria via gradient play in competitive multi-agent games has been attracting a growing amount of attention in recent years, with emphasis on designing efficient strategies where the agents operate in a decentralized and symmetric manner with guaranteed convergence. While significant efforts have been made in understanding zero-sum two-player matrix games, the performance in zero-sum m… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

  14. arXiv:2207.07287  [pdf, other

    math.OC cs.LG

    Riemannian Natural Gradient Methods

    Authors: Jiang Hu, Ruicheng Ao, Anthony Man-Cho So, Minghan Yang, Zaiwen Wen

    Abstract: This paper studies large-scale optimization problems on Riemannian manifolds whose objective function is a finite sum of negative log-probability losses. Such problems arise in various machine learning and signal processing applications. By introducing the notion of Fisher information matrix in the manifold setting, we propose a novel Riemannian natural gradient method, which can be viewed as a na… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  15. arXiv:2201.00969  [pdf

    cs.CV cs.CL cs.LG

    Interactive Attention AI to translate low light photos to captions for night scene understanding in women safety

    Authors: Rajagopal A, Nirmala V, Arun Muthuraj Vedamanickam

    Abstract: There is amazing progress in Deep Learning based models for Image captioning and Low Light image enhancement. For the first time in literature, this paper develops a Deep Learning model that translates night scenes to sentences, opening new possibilities for AI applications in the safety of visually impaired women. Inspired by Image Captioning and Visual Question Answering, a novel Interactive Ima… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: In Springer Proceedings. International Conference On Big Data, Machine Learning and Applications 2021. http://bigdml.nits.ac.in/

    ACM Class: I.2.0

  16. arXiv:2201.00966  [pdf

    cs.CV cs.AI cs.HC

    AI visualization in Nanoscale Microscopy

    Authors: Rajagopal A, Nirmala V, Andrew J, Arun Muthuraj Vedamanickam.

    Abstract: Artificial Intelligence & Nanotechnology are promising areas for the future of humanity. While Deep Learning based Computer Vision has found applications in many fields from medicine to automotive, its application in nanotechnology can open doors for new scientific discoveries. Can we apply AI to explore objects that our eyes can't see such as nano scale sized objects? An AI platform to visualize… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: Best paper award at International Conference On Big Data, Machine Learning and Applications 2021. http://bigdml.nits.ac.in/ In Springer Proceedings 2021

    ACM Class: I.2.0; J.2

  17. arXiv:2105.14333  [pdf

    eess.IV cs.CV cs.LG

    Covid-19 diagnosis from x-ray using neural networks

    Authors: Dinesh J, Mohammed Rhithick A

    Abstract: Corona virus or COVID-19 is a pandemic illness, which has influenced more than million of causalities worldwide and infected a few large number of individuals .Innovative instrument empowering quick screening of the COVID-19 contamination with high precision can be critically useful to the medical care experts. The primary clinical device presently being used for the analysis of COVID-19 is the Re… ▽ More

    Submitted 29 May, 2021; originally announced May 2021.

    Comments: 3 Graphs, 1 Figures

  18. arXiv:2104.09064  [pdf, other

    eess.AS cs.SD

    Automatic Stroke Classification of Tabla Accompaniment in Hindustani Vocal Concert Audio

    Authors: Rohit M. A., Preeti Rao

    Abstract: The tabla is a unique percussion instrument due to the combined harmonic and percussive nature of its timbre, and the contrasting harmonic frequency ranges of its two drums. This allows a tabla player to uniquely emphasize parts of the rhythmic cycle (theka) in order to mark the salient positions. An analysis of the loudness dynamics and timing deviations at various cycle positions is an important… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

    Comments: To appear in the JOURNAL OF ACOUSTICAL SOCIETY OF INDIA, April 2021

  19. Analysing Long Short Term Memory Models for Cricket Match Outcome Prediction

    Authors: Rahul Chakwate, Madhan R A

    Abstract: As the technology advances, an ample amount of data is collected in sports with the help of advanced sensors. Sports Analytics is the study of this data to provide a constructive advantage to the team and its players. The game of international cricket is popular all across the globe. Recently, various machine learning techniques have been used to analyse the cricket match data and predict the matc… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  20. arXiv:2008.00756  [pdf, other

    eess.AS cs.IR cs.LG

    Structure and Automatic Segmentation of Dhrupad Vocal Bandish Audio

    Authors: Rohit M. A., Preeti Rao

    Abstract: A Dhrupad vocal concert comprises a composition section that is interspersed with improvised episodes of increased rhythmic activity involving the interaction between the vocals and the percussion. Tracking the changing rhythmic density, in relation to the underlying metric tempo of the piece, thus facilitates the detection and labeling of the improvised sections in the concert structure. This wor… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: Part of this work published in ISMIR 2020

  21. arXiv:2005.10634  [pdf, other

    cs.CR cs.CY

    A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications

    Authors: Rajan M A, Manish Shukla, Sachin Lodha

    Abstract: Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracin… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 Pages, 3 Figures

  22. Assessing Car Damage using Mask R-CNN

    Authors: Sarath P, Soorya M, Shaik Abdul Rahman A, S Suresh Kumar, K Devaki

    Abstract: Picture based vehicle protection handling is a significant region with enormous degree for mechanization. In this paper we consider the issue of vehicle harm characterization, where a portion of the classifications can be fine-granular. We investigate profound learning based procedures for this reason. At first, we attempt legitimately preparing a CNN. In any case, because of little arrangement of… ▽ More

    Submitted 4 May, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Report number: C5302029320

  23. arXiv:2004.13328  [pdf, other

    cs.LG cs.CR cs.CY cs.DC

    Privacy Guidelines for Contact Tracing Applications

    Authors: Manish Shukla, Rajan M A, Sachin Lodha, Gautam Shroff, Ramesh Raskar

    Abstract: Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a comb… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: 10 pages, 0 images

  24. arXiv:2004.08547  [pdf

    cs.CV

    Color Image Segmentation using Adaptive Particle Swarm Optimization and Fuzzy C-means

    Authors: Narayana Reddy A, Ranjita Das

    Abstract: Segmentation partitions an image into different regions containing pixels with similar attributes. A standard non-contextual variant of Fuzzy C-means clustering algorithm (FCM), considering its simplicity is generally used in image segmentation. Using FCM has its disadvantages like it is dependent on the initial guess of the number of clusters and highly sensitive to noise. Satisfactory visual seg… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: 4 pages, 2 figures, Included in conference proceedings of "International conference in Recent Trends on Electronics & Computer Science (ICRTECS-2019)" organised by National Institute of Technology, Silchar

    MSC Class: 68U10 ACM Class: I.4.6

  25. arXiv:1906.03595  [pdf

    cs.AI cs.DC cs.MA

    Federated AI lets a team imagine together: Federated Learning of GANs

    Authors: Rajagopal. A, Nirmala. V

    Abstract: Envisioning a new imaginative idea together is a popular human need. Imagining together as a team can often lead to breakthrough ideas, but the collaboration effort can also be challenging, especially when the team members are separated by time and space. What if there is a AI that can assist the team to collaboratively envision new ideas?. Is it possible to develop a working model of such an AI?… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

    Comments: Keywords. Artificial Intelligence, Distributed Machine Learning, Generative Deep Learning, Generative Adversarial Networks, Federated learning, Creative AI, AI based Collaboration, AI planning

    ACM Class: I.2.0

  26. arXiv:1906.03466  [pdf

    cs.AI cs.CR cs.CV

    Strategies to architect AI Safety: Defense to guard AI from Adversaries

    Authors: Rajagopal. A, Nirmala. V

    Abstract: The impact of designing for security of AI is critical for humanity in the AI era. With humans increasingly becoming dependent upon AI, there is a need for neural networks that work reliably, inspite of Adversarial attacks. The vision for Safe and secure AI for popular use is achievable. To achieve safety of AI, this paper explores strategies and a novel deep learning architecture. To guard AI fro… ▽ More

    Submitted 8 June, 2019; originally announced June 2019.

    MSC Class: I.2.0

  27. arXiv:1312.2323  [pdf

    cs.SE cs.CY

    Architectural Pattern of Health Care System Using GSM Networks

    Authors: Meiappane. A, Dr. V. Prasanna Venkatesan, Selva Murugan. S, Arun. A, Ramachandran. A

    Abstract: Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 7 pages

    Journal ref: (IJCTE), ISSN: 1793-8201. vol. 3, no. 1, pp. 64-70, February 2011

  28. A Secure And High Capacity Image Steganography Technique

    Authors: Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath

    Abstract: Steganography is the science of invisible communication. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide multiple secret images and keys in color cover image using Integer Wavelet Transform (IWT). There is no visu… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 7 pages, Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1, February 2013. arXiv admin note: substantial text overlap with arXiv:1304.3313

  29. A Secure Color Image Steganography In Transform Domain

    Authors: Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath

    Abstract: Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 8 pages

    Journal ref: International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013

  30. arXiv:0910.0227  [pdf

    cs.CR

    Hierarchical Approach for Key Management in Mobile Ad hoc Networks

    Authors: Renuka A., K. C. Shet

    Abstract: Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new environment since mobile ad hoc networks… ▽ More

    Submitted 1 October, 2009; originally announced October 2009.

    Comments: 9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 87-95, September 2009, USA