Skip to main content

Showing 1–8 of 8 results for author: Banerjee, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12327  [pdf, other

    cs.IR cs.LG

    Diversifying by Intent in Recommender Systems

    Authors: Yuyan Wang, Cheenar Banerjee, Samer Chucri, Fabio Soldo, Sriraj Badam, Ed H. Chi, Minmin Chen

    Abstract: It has become increasingly clear that recommender systems overly focusing on short-term engagement can inadvertently hurt long-term user experience. However, it is challenging to optimize long-term user experience directly as the desired signal is sparse, noisy and manifests over a long horizon. In this work, we show the benefits of incorporating higher-level user understanding, specifically user… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. Static and Dynamic Synthesis of Bengali and Devanagari Signatures

    Authors: Miguel A. Ferrer, Sukalpa Chanda, Moises Diaz, Chayan Kr. Banerjee, Anirban Majumdar, Cristina Carmona-Duarte, Parikshit Acharya, Umapada Pal

    Abstract: Develo** an automatic signature verification system is challenging and demands a large number of training samples. This is why synthetic handwriting generation is an emerging topic in document image analysis. Some handwriting synthesizers use the motor equivalence model, the well-established hypothesis from neuroscience, which analyses how a human being accomplishes movement. Specifically, a mot… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Accepted version. Published on IEEE Transactions on Cybernetics [ISSN 2168-2267], v. 48(10), p. 2896-2907

    Journal ref: IEEE Transactions on Cybernetics, v. 48(10), p. 2896-2907, 2018

  3. arXiv:2309.01909  [pdf, other

    cs.LG eess.SY

    A Survey on Physics Informed Reinforcement Learning: Review and Open Problems

    Authors: Chayan Banerjee, Kien Nguyen, Clinton Fookes, Maziar Raissi

    Abstract: The inclusion of physical information in machine learning frameworks has revolutionized many application areas. This involves enhancing the learning process by incorporating physical constraints and adhering to physical laws. In this work we explore their utility for reinforcement learning applications. We present a thorough review of the literature on incorporating physics information, as known a… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  4. arXiv:2305.18035  [pdf, other

    eess.IV cs.CV

    Physics-Informed Computer Vision: A Review and Perspectives

    Authors: Chayan Banerjee, Kien Nguyen, Clinton Fookes, George Karniadakis

    Abstract: The incorporation of physical information in machine learning frameworks is opening and transforming many application domains. Here the learning process is augmented through the induction of fundamental knowledge and governing physical laws. In this work, we explore their utility for computer vision tasks in interpreting and understanding visual data. We present a systematic literature review of m… ▽ More

    Submitted 12 May, 2024; v1 submitted 29 May, 2023; originally announced May 2023.

  5. arXiv:2210.00211  [pdf, ps, other

    cs.LG eess.SY

    Boosting Exploration in Actor-Critic Algorithms by Incentivizing Plausible Novel States

    Authors: Chayan Banerjee, Zhiyong Chen, Nasimul Noman

    Abstract: Actor-critic (AC) algorithms are a class of model-free deep reinforcement learning algorithms, which have proven their efficacy in diverse domains, especially in solving continuous control problems. Improvement of exploration (action entropy) and exploitation (expected return) using more efficient samples is a critical issue in AC algorithms. A basic strategy of a learning algorithm is to facilita… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

  6. arXiv:2109.11767  [pdf, ps, other

    cs.LG eess.SY

    Improved Soft Actor-Critic: Mixing Prioritized Off-Policy Samples with On-Policy Experience

    Authors: Chayan Banerjee, Zhiyong Chen, Nasimul Noman

    Abstract: Soft Actor-Critic (SAC) is an off-policy actor-critic reinforcement learning algorithm, essentially based on entropy regularization. SAC trains a policy by maximizing the trade-off between expected return and entropy (randomness in the policy). It has achieved state-of-the-art performance on a range of continuous-control benchmark tasks, outperforming prior on-policy and off-policy methods. SAC wo… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

  7. arXiv:2108.06911  [pdf, ps, other

    cs.LG eess.SY

    Optimal Actor-Critic Policy with Optimized Training Datasets

    Authors: Chayan Banerjee, Zhiyong Chen, Nasimul Noman, Mohsen Zamani

    Abstract: Actor-critic (AC) algorithms are known for their efficacy and high performance in solving reinforcement learning problems, but they also suffer from low sampling efficiency. An AC based policy optimization process is iterative and needs to frequently access the agent-environment system to evaluate and update the policy by rolling out the policy, collecting rewards and states (i.e. samples), and le… ▽ More

    Submitted 1 December, 2021; v1 submitted 16 August, 2021; originally announced August 2021.

  8. arXiv:0911.0494  [pdf

    cs.SE cs.CR

    Software Security Rules, SDLC Perspective

    Authors: C. Banerjee, S. K. Pandey

    Abstract: Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable sec… ▽ More

    Submitted 2 November, 2009; originally announced November 2009.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 123-128, October 2009, USA