Skip to main content

Showing 1–50 of 79 results for author: Anand, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19630  [pdf, other

    cs.CV cs.AI

    Optimal Video Compression using Pixel Shift Tracking

    Authors: Hitesh Saai Mananchery Panneerselvam, Smit Anand

    Abstract: The Video comprises approximately ~85\% of all internet traffic, but video encoding/compression is being historically done with hard coded rules, which has worked well but only to a certain limit. We have seen a surge in video compression algorithms using ML-based models in the last few years and many of them have outperformed several legacy codecs. The models range from encoding video end to end… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2406.02577  [pdf, other

    cs.CL cs.CR cs.LG

    Are PPO-ed Language Models Hackable?

    Authors: Suraj Anand, David Getzen

    Abstract: Numerous algorithms have been proposed to $\textit{align}$ language models to remove undesirable behaviors. However, the challenges associated with a very large state space and creating a proper reward function often result in various jailbreaks. Our paper aims to examine this effect of reward in the controlled setting of positive sentiment language generation. Instead of online training of a rewa… ▽ More

    Submitted 28 May, 2024; originally announced June 2024.

    Comments: 8 pages, 4 figures

  3. arXiv:2406.00053  [pdf, other

    cs.CL cs.LG

    Dual Process Learning: Controlling Use of In-Context vs. In-Weights Strategies with Weight Forgetting

    Authors: Suraj Anand, Michael A. Lepori, Jack Merullo, Ellie Pavlick

    Abstract: Language models have the ability to perform in-context learning (ICL), allowing them to flexibly adapt their behavior based on context. This contrasts with in-weights learning, where information is statically encoded in model parameters from iterated observations of the data. Despite this apparent ability to learn in-context, language models are known to struggle when faced with unseen or rarely s… ▽ More

    Submitted 1 July, 2024; v1 submitted 28 May, 2024; originally announced June 2024.

    Comments: 9 pages, 5 figures

  4. arXiv:2405.07105  [pdf, other

    cond-mat.mtrl-sci cs.AI cs.LG

    Overcoming systematic softening in universal machine learning interatomic potentials by fine-tuning

    Authors: Bowen Deng, Yunyeong Choi, Peichen Zhong, Janosh Riebesell, Shashwat Anand, Zhuohan Li, KyuJung Jun, Kristin A. Persson, Gerbrand Ceder

    Abstract: Machine learning interatomic potentials (MLIPs) have introduced a new paradigm for atomic simulations. Recent advancements have seen the emergence of universal MLIPs (uMLIPs) that are pre-trained on diverse materials datasets, providing opportunities for both ready-to-use universal force fields and robust foundations for downstream machine learning refinements. However, their performance in extrap… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

  5. arXiv:2402.10921  [pdf, other

    cs.AI cs.CV cs.LG

    AM^2-EmoJE: Adaptive Missing-Modality Emotion Recognition in Conversation via Joint Embedding Learning

    Authors: Naresh Kumar Devulapally, Sidharth Anand, Sreyasee Das Bhattacharjee, Junsong Yuan

    Abstract: Human emotion can be presented in different modes i.e., audio, video, and text. However, the contribution of each mode in exhibiting each emotion is not uniform. Furthermore, the availability of complete mode-specific details may not always be guaranteed in the test time. In this work, we propose AM^2-EmoJE, a model for Adaptive Missing-Modality Emotion Recognition in Conversation via Joint Embedd… ▽ More

    Submitted 26 January, 2024; originally announced February 2024.

  6. arXiv:2402.07896  [pdf, other

    cs.CL

    Suppressing Pink Elephants with Direct Principle Feedback

    Authors: Louis Castricato, Nathan Lile, Suraj Anand, Hailey Schoelkopf, Siddharth Verma, Stella Biderman

    Abstract: Existing methods for controlling language models, such as RLHF and Constitutional AI, involve determining which LLM behaviors are desirable and training them into a language model. However, in many cases, it is desirable for LLMs to be controllable at inference time, so that they can be used in multiple contexts with diverse needs. We illustrate this with the Pink Elephant Problem: instructing an… ▽ More

    Submitted 13 February, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: 8 pages, 6 figures

  7. arXiv:2402.00468  [pdf, other

    cs.AI

    RadDQN: a Deep Q Learning-based Architecture for Finding Time-efficient Minimum Radiation Exposure Pathway

    Authors: Biswajit Sadhu, Trijit Sadhu, S. Anand

    Abstract: Recent advancements in deep reinforcement learning (DRL) techniques have sparked its multifaceted applications in the automation sector. Managing complex decision-making problems with DRL encourages its use in the nuclear industry for tasks such as optimizing radiation exposure to the personnel during normal operating conditions and potential accidental scenarios. However, the lack of efficient re… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 12 pages, 7 main figures, code link (GitHub)

  8. arXiv:2401.15164  [pdf, other

    cs.SD cs.CV cs.LG cs.MM eess.AS

    AMuSE: Adaptive Multimodal Analysis for Speaker Emotion Recognition in Group Conversations

    Authors: Naresh Kumar Devulapally, Sidharth Anand, Sreyasee Das Bhattacharjee, Junsong Yuan, Yu-** Chang

    Abstract: Analyzing individual emotions during group conversation is crucial in develo** intelligent agents capable of natural human-machine interaction. While reliable emotion recognition techniques depend on different modalities (text, audio, video), the inherent heterogeneity between these modalities and the dynamic cross-modal interactions influenced by an individual's unique behavioral patterns make… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  9. arXiv:2312.00069  [pdf, other

    cs.CV

    SICKLE: A Multi-Sensor Satellite Imagery Dataset Annotated with Multiple Key Crop** Parameters

    Authors: Depanshu Sani, Sandeep Mahato, Sourabh Saini, Harsh Kumar Agarwal, Charu Chandra Devshali, Saket Anand, Gaurav Arora, Thiagarajan Jayaraman

    Abstract: The availability of well-curated datasets has driven the success of Machine Learning (ML) models. Despite greater access to earth observation data in agriculture, there is a scarcity of curated and labelled datasets, which limits the potential of its use in training ML models for remote sensing (RS) in agriculture. To this end, we introduce a first-of-its-kind dataset called SICKLE, which constitu… ▽ More

    Submitted 29 November, 2023; originally announced December 2023.

    Comments: Accepted as an oral presentation at WACV 2024

  10. arXiv:2311.04588  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection

    Authors: Akshit **dal, Vikram Goyal, Saket Anand, Chetan Arora

    Abstract: Machine Learning (ML) models become vulnerable to Model Stealing Attacks (MSA) when they are deployed as a service. In such attacks, the deployed model is queried repeatedly to build a labelled dataset. This dataset allows the attacker to train a thief model that mimics the original model. To maximize query efficiency, the attacker has to select the most informative subset of data points from the… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 10 pages, 5 figures, paper accepted to WACV 2024

  11. arXiv:2309.13716  [pdf, other

    cs.CV eess.IV

    MOSAIC: Multi-Object Segmented Arbitrary Stylization Using CLIP

    Authors: Prajwal Ganugula, Y S S S Santosh Kumar, N K Sagar Reddy, Prabhath Chellingi, Avinash Thakur, Neeraj Kasera, C Shyam Anand

    Abstract: Style transfer driven by text prompts paved a new path for creatively stylizing the images without collecting an actual style image. Despite having promising results, with text-driven stylization, the user has no control over the stylization. If a user wants to create an artistic image, the user requires fine control over the stylization of various entities individually in the content image, which… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Camera ready, New Ideas in Vision Transformers workshop, ICCV 2023

  12. arXiv:2309.05668  [pdf, other

    cs.CL cs.AI

    Studying the impacts of pre-training using ChatGPT-generated text on downstream tasks

    Authors: Sarthak Anand

    Abstract: In recent times, significant advancements have been witnessed in the field of language models, particularly with the emergence of Large Language Models (LLMs) that are trained on vast amounts of data extracted from internet archives. These LLMs, such as ChatGPT, have become widely accessible, allowing users to generate text for various purposes including articles, essays, jokes, and poetry. Given… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

    Comments: Master's thesis

  13. arXiv:2309.03294  [pdf, other

    cs.CR

    MALITE: Lightweight Malware Detection and Classification for Constrained Devices

    Authors: Sidharth Anand, Barsha Mitra, Soumyadeep Dey, Abhinav Rao, Rupsa Dhar, Jaideep Vaidya

    Abstract: Today, malware is one of the primary cyberthreats to organizations. Malware has pervaded almost every type of computing device including the ones having limited memory, battery and computation power such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. Consequently, the privacy and security of the malware infected systems and devices have been heavily jeopardiz… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  14. arXiv:2301.01667  [pdf, other

    eess.SY cs.LG

    Learning-based MPC from Big Data Using Reinforcement Learning

    Authors: Shambhuraj Sawant, Akhil S Anand, Dirk Reinhardt, Sebastien Gros

    Abstract: This paper presents an approach for learning Model Predictive Control (MPC) schemes directly from data using Reinforcement Learning (RL) methods. The state-of-the-art learning methods use RL to improve the performance of parameterized MPC schemes. However, these learning algorithms are often gradient-based methods that require frequent evaluations of computationally expensive MPC schemes, thereby… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

  15. arXiv:2212.08553  [pdf, other

    cs.CL

    Is it Required? Ranking the Skills Required for a Job-Title

    Authors: Sarthak Anand, Jens-Joris Decorte, Niels Lowie

    Abstract: In this paper, we describe our method for ranking the skills required for a given job title. Our analysis shows that important/relevant skills appear more frequently in similar job titles. We train a Language-agnostic BERT Sentence Encoder (LaBSE) model to predict the importance of the skills using weak supervision. We show the model can learn the importance of skills and perform well in other lan… ▽ More

    Submitted 28 November, 2022; originally announced December 2022.

  16. arXiv:2210.11546  [pdf, other

    cs.CR cs.NI

    Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth

    Authors: Peiyao Sheng, Nikita Yadav, Vishal Sevani, Arun Babu, SVR Anand, Himanshu Tyagi, Pramod Viswanath

    Abstract: Recent years have seen the emergence of decentralized wireless networks consisting of nodes hosted by many individuals and small enterprises, reawakening the decades-old dream of open networking. These networks have been deployed in an organic, distributed manner and are driven by new economic models resting on tokenized incentives. A critical requirement for the incentives to scale is the ability… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  17. arXiv:2210.06749  [pdf, other

    cs.CV

    Reducing Annotation Effort by Identifying and Labeling Contextually Diverse Classes for Semantic Segmentation Under Domain Shift

    Authors: Sharat Agarwal, Saket Anand, Chetan Arora

    Abstract: In Active Domain Adaptation (ADA), one uses Active Learning (AL) to select a subset of images from the target domain, which are then annotated and used for supervised domain adaptation (DA). Given the large performance gap between supervised and unsupervised DA techniques, ADA allows for an excellent trade-off between annotation cost and performance. Prior art makes use of measures of uncertainty… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: Accepted WACV2023

  18. arXiv:2209.12238  [pdf, other

    cs.CV cs.AI cs.LG

    High-Resolution Satellite Imagery for Modeling the Impact of Aridification on Crop Production

    Authors: Depanshu Sani, Sandeep Mahato, Parichya Sirohi, Saket Anand, Gaurav Arora, Charu Chandra Devshali, Thiagarajan Jayaraman, Harsh Kumar Agarwal

    Abstract: The availability of well-curated datasets has driven the success of Machine Learning (ML) models. Despite the increased access to earth observation data for agriculture, there is a scarcity of curated, labelled datasets, which limits the potential of its use in training ML models for remote sensing (RS) in agriculture. To this end, we introduce a first-of-its-kind dataset, SICKLE, having time-seri… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Comments: Submitted as an End of Google AI4SG Workshop report

  19. Deep Model Predictive Variable Impedance Control

    Authors: Akhil S Anand, Fares J. Abu-Dakka, Jan Tommy Gravdahl

    Abstract: The capability to adapt compliance by varying muscle stiffness is crucial for dexterous manipulation skills in humans. Incorporating compliance in robot motor control is crucial to performing real-world force interaction tasks with human-level dexterity. This work presents a Deep Model Predictive Variable Impedance Controller for compliant robotic manipulation which combines Variable Impedance Con… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: Preprint submitted to the journal of robotics and autonomous systems

  20. arXiv:2209.06354  [pdf, other

    cs.LG

    Tuple Packing: Efficient Batching of Small Graphs in Graph Neural Networks

    Authors: Mario Michael Krell, Manuel Lopez, Sreenidhi Anand, Hatem Helal, Andrew William Fitzgibbon

    Abstract: When processing a batch of graphs in machine learning models such as Graph Neural Networks (GNN), it is common to combine several small graphs into one overall graph to accelerate processing and remove or reduce the overhead of padding. This is for example supported in the PyG library. However, the sizes of small graphs can vary substantially with respect to the number of nodes and edges, and henc… ▽ More

    Submitted 18 September, 2022; v1 submitted 13 September, 2022; originally announced September 2022.

  21. arXiv:2207.12646  [pdf, other

    cs.CV

    Learning Hierarchy Aware Features for Reducing Mistake Severity

    Authors: Ashima Garg, Depanshu Sani, Saket Anand

    Abstract: Label hierarchies are often available apriori as part of biological taxonomy or language datasets WordNet. Several works exploit these to learn hierarchy aware features in order to improve the classifier to make semantically meaningful mistakes while maintaining or reducing the overall error. In this paper, we propose a novel approach for learning Hierarchy Aware Features (HAF) that leverages clas… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: 21 pages, 7 figures, Accepted in ECCV 2022

  22. arXiv:2207.02107  [pdf, other

    cs.MA

    EasyABM: a lightweight and easy to use heterogeneous agent-based modelling tool written in Julia

    Authors: Renu Solanki, Monisha Khanna, Shailly Anand, Anita Gulati, Prateek Kumar, Munendra Kumar, Dushyant Kumar

    Abstract: Agent based modelling is a computational approach that aims to understand the behaviour of complex systems through simplified interactions of programmable objects in computer memory called agents. Agent based models (ABMs) are predominantly used in fields of biology, ecology, social sciences and economics where the systems of interest often consist of several interacting entities. In this work, we… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: 18 pages, 7 figures

  23. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  24. arXiv:2205.03104  [pdf, other

    cs.CV cs.LG eess.IV

    Crop Type Identification for Smallholding Farms: Analyzing Spatial, Temporal and Spectral Resolutions in Satellite Imagery

    Authors: Depanshu Sani, Sandeep Mahato, Parichya Sirohi, Saket Anand, Gaurav Arora, Charu Chandra Devshali, T. Jayaraman

    Abstract: The integration of the modern Machine Learning (ML) models into remote sensing and agriculture has expanded the scope of the application of satellite images in the agriculture domain. In this paper, we present how the accuracy of crop type identification improves as we move from medium-spatiotemporal-resolution (MSTR) to high-spatiotemporal-resolution (HSTR) satellite images. We further demonstrat… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: Supported by Google under AI4SG Workshop

  25. arXiv:2201.08020  [pdf, other

    cs.LG eess.SP eess.SY

    A Deep Learning Approach To Estimation Using Measurements Received Over a Network

    Authors: Shivangi Agarwal, Sanjit K. Kaul, Saket Anand, P. B. Sujit

    Abstract: We propose a novel deep neural network (DNN) based approximation architecture to learn estimates of measurements. We detail an algorithm that enables training of the DNN. The DNN estimator only uses measurements, if and when they are received over a communication network. The measurements are communicated over a network as packets, at a rate unknown to the estimator. Packets may suffer drops and n… ▽ More

    Submitted 12 September, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

  26. arXiv:2112.02721  [pdf, other

    cs.CL cs.AI cs.LG

    NL-Augmenter: A Framework for Task-Sensitive Natural Language Augmentation

    Authors: Kaustubh D. Dhole, Varun Gangal, Sebastian Gehrmann, Aadesh Gupta, Zhenhao Li, Saad Mahamood, Abinaya Mahendiran, Simon Mille, Ashish Shrivastava, Samson Tan, Tongshuang Wu, Jascha Sohl-Dickstein, **ho D. Choi, Eduard Hovy, Ondrej Dusek, Sebastian Ruder, Sajant Anand, Nagender Aneja, Rabin Banjade, Lisa Barthe, Hanna Behnke, Ian Berlot-Attwell, Connor Boyle, Caroline Brun, Marco Antonio Sobrevilla Cabezudo , et al. (101 additional authors not shown)

    Abstract: Data augmentation is an important component in the robustness evaluation of models in natural language processing (NLP) and in enhancing the diversity of the data they are trained on. In this paper, we present NL-Augmenter, a new participatory Python-based natural language augmentation framework which supports the creation of both transformations (modifications to the data) and filters (data split… ▽ More

    Submitted 11 October, 2022; v1 submitted 5 December, 2021; originally announced December 2021.

    Comments: 39 pages, repository at https://github.com/GEM-benchmark/NL-Augmenter

  27. arXiv:2111.01223  [pdf, other

    stat.ME cs.LG stat.AP stat.ML

    A framework for causal segmentation analysis with machine learning in large-scale digital experiments

    Authors: Nima S. Hejazi, Wen**g Zheng, Sathya Anand

    Abstract: We present an end-to-end methodological framework for causal segment discovery that aims to uncover differential impacts of treatments across subgroups of users in large-scale digital experiments. Building on recent developments in causal inference and non/semi-parametric statistics, our approach unifies two objectives: (1) the discovery of user segments that stand to benefit from a candidate trea… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: Accepted by the 8th annual Conference on Digital Experimentation (CODE) at MIT

  28. arXiv:2111.00164  [pdf, other

    cs.CV

    HIERMATCH: Leveraging Label Hierarchies for Improving Semi-Supervised Learning

    Authors: Ashima Garg, Shaurya Bagga, Yashvardhan Singh, Saket Anand

    Abstract: Semi-supervised learning approaches have emerged as an active area of research to combat the challenge of obtaining large amounts of annotated data. Towards the goal of improving the performance of semi-supervised learning methods, we propose a novel framework, HIERMATCH, a semi-supervised approach that leverages hierarchical information to reduce labeling costs and performs as well as a vanilla s… ▽ More

    Submitted 21 December, 2021; v1 submitted 29 October, 2021; originally announced November 2021.

    Comments: 11 pages, 1 figure, Accepted in WACV 2022

  29. arXiv:2110.10389  [pdf, other

    cs.CV

    Does Data Repair Lead to Fair Models? Curating Contextually Fair Data To Reduce Model Bias

    Authors: Sharat Agarwal, Sumanyu Muku, Saket Anand, Chetan Arora

    Abstract: Contextual information is a valuable cue for Deep Neural Networks (DNNs) to learn better representations and improve accuracy. However, co-occurrence bias in the training dataset may hamper a DNN model's generalizability to unseen scenarios in the real world. For example, in COCO, many object categories have a much higher co-occurrence with men compared to women, which can bias a DNN's prediction… ▽ More

    Submitted 20 October, 2021; originally announced October 2021.

    Comments: A variant of this report is accepted in WACV 2022

  30. Design of multiplicative watermarking against covert attacks

    Authors: Alexander J. Gallo, Sribalaji C. Anand, André M. H. Teixeira, Riccardo M. G. Ferrari

    Abstract: This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output l2-gain, which characterizes the maximum gain between the residual output of a detection scheme and some performance output. Although optimal, this control prob… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: 6 page conference paper accepted to the 60th IEEE Conference on Decision and Control

    Journal ref: 2021 60th IEEE Conference on Decision and Control (CDC), profs. of

  31. arXiv:2106.03186  [pdf, other

    cs.LG

    Reverse Engineering the Neural Tangent Kernel

    Authors: James B. Simon, Sajant Anand, Michael R. DeWeese

    Abstract: The development of methods to guide the design of neural networks is an important open challenge for deep learning theory. As a paradigm for principled neural architecture design, we propose the translation of high-performing kernels, which are better-understood and amenable to first-principles design, into equivalent network architectures, which have superior efficiency, flexibility, and feature… ▽ More

    Submitted 13 August, 2022; v1 submitted 6 June, 2021; originally announced June 2021.

    Comments: 15 pages, 5 figures

  32. arXiv:2105.07966  [pdf, other

    cs.GT

    A Game-Theoretic Analysis of Competitive Editing in Wikipedia: Contributors' Effort to Influence Articles and the Community's Attempt to Ensure Neutrality

    Authors: Santhanakrishnan Anand, Ofer Arazy, Narayan B. Mandayam, Oded Nov

    Abstract: Peer production, such as the collaborative authoring of Wikipedia articles, involves both cooperation and competition between contributors, and we focus on the latter. As individuals, contributors compete to align Wikipedia articles with their personal perspectives. As a community, they work collectively to ensure a neutral point of view (NPOV). We study the interplay between individuals' competit… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: 37 pages, 6 figures, 1 Table

  33. arXiv:2101.01693  [pdf, other

    cs.CY

    COVID-19 Tests Gone Rogue: Privacy, Efficacy, Mismanagement and Misunderstandings

    Authors: Manuel Morales, Rachel Barbar, Darshan Gandhi, Sanskruti Landage, Joseph Bae, Arpita Vats, Jil Kothari, Sheshank Shankar, Rohan Sukumaran, Himi Mathur, Krutika Misra, Aishwarya Saxena, Parth Patwa, Sethuraman T. V., Maurizio Arseni, Shailesh Advani, Kasia Jakimowicz, Sunaina Anand, Priyanshi Katiyar, Ashley Mehra, Rohan Iyer, Srinidhi Murali, Aryan Mahindra, Mikhail Dmitrienko, Saurish Srivastava , et al. (5 additional authors not shown)

    Abstract: COVID-19 testing, the cornerstone for effective screening and identification of COVID-19 cases, remains paramount as an intervention tool to curb the spread of COVID-19 both at local and national levels. However, the speed at which the pandemic struck and the response was rolled out, the widespread impact on healthcare infrastructure, the lack of sufficient preparation within the public health sys… ▽ More

    Submitted 7 May, 2021; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: 22 pages, 2 figures

  34. arXiv:2012.01772  [pdf, other

    cs.CY

    Digital Landscape of COVID-19 Testing: Challenges and Opportunities

    Authors: Darshan Gandhi, Rohan Sukumaran, Priyanshi Katiyar, Alex Radunsky, Sunaina Anand, Shailesh Advani, Jil Kothari, Kasia Jakimowicz, Sheshank Shankar, Sethuraman T. V., Krutika Misra, Aishwarya Saxena, Sanskruti Landage, Richa Sonker, Parth Patwa, Aryan Mahindra, Mikhail Dmitrienko, Kanishka Vaish, Ashley Mehra, Srinidhi Murali, Rohan Iyer, Joseph Bae, Vivek Sharma, Abhishek Singh, Rachel Barbar , et al. (1 additional authors not shown)

    Abstract: The COVID-19 Pandemic has left a devastating trail all over the world, in terms of loss of lives, economic decline, travel restrictions, trade deficit, and collapsing economy including real-estate, job loss, loss of health benefits, the decline in quality of access to care and services and overall quality of life. Immunization from the anticipated vaccines will not be the stand-alone guideline tha… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: 28 pages, 4 figures

  35. arXiv:2011.11228  [pdf, other

    cs.SE

    Modeling Functional Similarity in Source Code with Graph-Based Siamese Networks

    Authors: Nikita Mehrotra, Navdha Agarwal, Piyush Gupta, Saket Anand, David Lo, Rahul Purandare

    Abstract: Code clones are duplicate code fragments that share (nearly) similar syntax or semantics. Code clone detection plays an important role in software maintenance, code refactoring, and reuse. A substantial amount of research has been conducted in the past to detect clones. A majority of these approaches use lexical and syntactic information to detect clones. However, only a few of them target semanti… ▽ More

    Submitted 25 November, 2020; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: Under Review IEEE Transactions on Software Engineering

  36. arXiv:2009.02619  [pdf, other

    cs.CL

    MIDAS at SemEval-2020 Task 10: Emphasis Selection using Label Distribution Learning and Contextual Embeddings

    Authors: Sarthak Anand, Pradyumna Gupta, Hemant Yadav, Debanjan Mahata, Rakesh Gosangi, Haimin Zhang, Rajiv Ratn Shah

    Abstract: This paper presents our submission to the SemEval 2020 - Task 10 on emphasis selection in written text. We approach this emphasis selection problem as a sequence labeling task where we represent the underlying text with various contextual embedding models. We also employ label distribution learning to account for annotator disagreements. We experiment with the choice of model architectures, traina… ▽ More

    Submitted 5 September, 2020; originally announced September 2020.

  37. arXiv:2008.05723  [pdf, other

    cs.CV

    Contextual Diversity for Active Learning

    Authors: Sharat Agarwal, Himanshu Arora, Saket Anand, Chetan Arora

    Abstract: Requirement of large annotated datasets restrict the use of deep convolutional neural networks (CNNs) for many practical applications. The problem can be mitigated by using active learning (AL) techniques which, under a given annotation budget, allow to select a subset of data that yields maximum accuracy upon fine tuning. State of the art AL approaches typically rely on measures of visual diversi… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: A variant of this report is accepted in ECCV 2020

  38. arXiv:2006.10679  [pdf, other

    cs.CV stat.ML

    REGroup: Rank-aggregating Ensemble of Generative Classifiers for Robust Predictions

    Authors: Lokender Tiwari, Anish Madan, Saket Anand, Subhashis Banerjee

    Abstract: Deep Neural Networks (DNNs) are often criticized for being susceptible to adversarial attacks. Most successful defense strategies adopt adversarial training or random input transformations that typically require retraining or fine-tuning the model to achieve reasonable performance. In this work, our investigations of intermediate representations of a pre-trained DNN lead to an interesting discover… ▽ More

    Submitted 24 November, 2021; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: WACV,2022. Project Page : https://lokender.github.io/REGroup.html

  39. arXiv:2006.02413  [pdf, other

    cs.CV

    DGSAC: Density Guided Sampling and Consensus

    Authors: Lokender Tiwari, Saket Anand

    Abstract: Robust multiple model fitting plays a crucial role in many computer vision applications. Unlike single model fitting problems, the multi-model fitting has additional challenges. The unknown number of models and the inlier noise scale are the two most important of them, which are in general provided by the user using ground-truth or some other auxiliary information. Mode seeking/ clustering-based a… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: Working article

  40. Computer Vision Toolkit for Non-invasive Monitoring of Factory Floor Artifacts

    Authors: Aditya M. Deshpande, Anil Kumar Telikicherla, Vinay Jakkali, David A. Wickelhaus, Manish Kumar, Sam Anand

    Abstract: Digitization has led to smart, connected technologies be an integral part of businesses, governments and communities. For manufacturing digitization, there has been active research and development with a focus on Cloud Manufacturing (CM) and the Industrial Internet of Things (IIoT). This work presents a computer vision toolkit (CV Toolkit) for non-invasive digitization of the factory floor in line… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: Accepted for publication in 48th SME North American Manufacturing Research Conference (NAMRC48)

    Journal ref: Procedia Manufacturing 48 (2020) 1020-1028

  41. arXiv:2005.02936  [pdf, other

    cs.CV cs.CR cs.LG

    GraCIAS: Grassmannian of Corrupted Images for Adversarial Security

    Authors: Ankita Shukla, Pavan Turaga, Saket Anand

    Abstract: Input transformation based defense strategies fall short in defending against strong adversarial attacks. Some successful defenses adopt approaches that either increase the randomness within the applied transformations, or make the defense computationally intensive, making it substantially more challenging for the attacker. However, it limits the applicability of such defenses as a pre-processing… ▽ More

    Submitted 7 May, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 16 pages

  42. Automatic Detection and Recognition of Individuals in Patterned Species

    Authors: Gullal Singh Cheema, Saket Anand

    Abstract: Visual animal biometrics is rapidly gaining popularity as it enables a non-invasive and cost-effective approach for wildlife monitoring applications. Widespread usage of camera traps has led to large volumes of collected images, making manual processing of visual content hard to manage. In this work, we develop a framework for automatic detection and recognition of individuals in different pattern… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    Comments: 12 pages, ECML-PKDD 2017

  43. arXiv:2004.14418  [pdf

    cs.LG cs.IT

    To Reduce Gross NPA and Classify Defaulters Using Shannon Entropy

    Authors: Ambarish Moharil, Nikhil Sonavane, Chirag Kedia, Mansimran Singh Anand

    Abstract: Non Performing Asset(NPA) has been in a serious attention by banks over the past few years. NPA cause a huge loss to the banks hence it becomes an extremely critical step in deciding which loans have the capabilities to become an NPA and thereby deciding which loans to grant and which ones to reject. In this paper which focuses on the exact crux of the matter we have proposed an algorithm which is… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 11 Pages, 7 Figures

  44. arXiv:2004.11296  [pdf

    eess.IV cs.CV

    Edge Detection using Stationary Wavelet Transform, HMM, and EM algorithm

    Authors: S. Anand, K. Nagajothi, K. Nithya

    Abstract: Stationary Wavelet Transform (SWT) is an efficient tool for edge analysis. This paper a new edge detection technique using SWT based Hidden Markov Model (WHMM) along with the expectation-maximization (EM) algorithm is proposed. The SWT coefficients contain a hidden state and they indicate the SWT coefficient fits into an edge model or not. Laplacian and Gaussian model is used to check the informat… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 07 pages, 5 figures

  45. arXiv:2004.10681  [pdf, other

    cs.CV

    Pseudo RGB-D for Self-Improving Monocular SLAM and Depth Prediction

    Authors: Lokender Tiwari, Pan Ji, Quoc-Huy Tran, Bingbing Zhuang, Saket Anand, Manmohan Chandraker

    Abstract: Classical monocular Simultaneous Localization And Map** (SLAM) and the recently emerging convolutional neural networks (CNNs) for monocular depth prediction represent two largely disjoint approaches towards building a 3D map of the surrounding environment. In this paper, we demonstrate that the coupling of these two by leveraging the strengths of each mitigates the other's shortcomings. Specific… ▽ More

    Submitted 7 August, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: ECCV 2020, Project Page: https://lokender.github.io/self-improving-SLAM.html

  46. arXiv:2004.09632  [pdf, ps, other

    cs.CV

    Intelligent Querying for Target Tracking in Camera Networks using Deep Q-Learning with n-Step Bootstrap**

    Authors: Anil Sharma, Saket Anand, Sanjit K. Kaul

    Abstract: Surveillance camera networks are a useful infrastructure for various visual analytics applications, where high-level inferences and predictions could be made based on target tracking across the network. Most multi-camera tracking works focus on target re-identification and trajectory association problems to track the target. However, since camera networks can generate enormous amount of video data… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: Camera Selections for Target Tracking

  47. arXiv:1911.03637  [pdf, ps, other

    cs.DM math.CO

    Boundary-type Sets of Strong Product of Directed Graphs

    Authors: Prasanth G. Narasimha-Shenoi, Bijo S Anand, Mary Shalet T J

    Abstract: Let $D=(V,E)$ be a strongly connected digraph and let $u ,v\in V(D)$. The maximum distance $md (u,v)$ is defined as\\ $md(u,v)$=max\{$\overrightarrow{d}(u,v), \overrightarrow{d}(v,u)$\} where $\overrightarrow{d}(u,v)$ denote the length of a shortest directed $u-v$ path in $D$. This is a metric. The boundary, contour, eccentric and peripheral sets of a strong digraph $D$ with respect to this metric… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

  48. arXiv:1910.08292  [pdf, other

    cs.CV cs.IR

    Diversity in Fashion Recommendation using Semantic Parsing

    Authors: Sagar Verma, Sukhad Anand, Chetan Arora, Atul Rai

    Abstract: Develo** recommendation system for fashion images is challenging due to the inherent ambiguity associated with what criterion a user is looking at. Suggesting multiple images where each output image is similar to the query image on the basis of a different feature or part is one way to mitigate the problem. Existing works for fashion recommendation have used Siamese or Triplet network to learn f… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

    Comments: 5 pages, ICIP2018, code: https://github.com/sagarverma/fashion_recommendation_stlstm

  49. arXiv:1907.09554  [pdf, other

    cs.CV cs.LG

    Product of Orthogonal Spheres Parameterization for Disentangled Representation Learning

    Authors: Ankita Shukla, Sarthak Bhagat, Shagun Uppal, Saket Anand, Pavan Turaga

    Abstract: Learning representations that can disentangle explanatory attributes underlying the data improves interpretabilty as well as provides control on data generation. Various learning frameworks such as VAEs, GANs and auto-encoders have been used in the literature to learn such representations. Most often, the latent space is constrained to a partitioned representation or structured by a prior to impos… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

    Comments: Accepted at British Machine Vision Conference (BMVC) 2019

  50. arXiv:1907.05972  [pdf, other

    cs.CR

    Motion Sensor-based Privacy Attack on Smartphones

    Authors: S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen

    Abstract: In this paper, we build a speech privacy attack that exploits speech reverberations generated from a smartphone's in-built loudspeaker captured via a zero-permission motion sensor (accelerometer). We design our attack Spearphone2, and demonstrate that speech reverberations from inbuilt loudspeakers, at an appropriate loudness, can impact the accelerometer, leaking sensitive information about the s… ▽ More

    Submitted 19 October, 2020; v1 submitted 12 July, 2019; originally announced July 2019.

    Comments: 15 pages, 25 figures