Skip to main content

Showing 1–36 of 36 results for author: Das, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.16276  [pdf, ps, other

    cs.LO

    Duality for Fitting's Multi-valued Modal logic via bitopology and biVietoris coalgebra

    Authors: Litan Kumar Das, Kumar Sankar Ray, Prakash Chandra Mali

    Abstract: Fitting's Heyting-valued logic and Heyting-valued modal logic have already been studied from an algebraic viewpoint. In addition to algebraic axiomatizations with the completeness of Fitting's Heyting-valued logic and Heyting-valued modal logic, both topological and coalgebraic dualities have also been developed for algebras of Fitting's Heyting-valued modal logic. Bitopological methods have recen… ▽ More

    Submitted 1 July, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  2. arXiv:2312.11470  [pdf, other

    cs.CV eess.IV

    Anomaly detection for automated inspection of power line insulators

    Authors: Laya Das, Blazhe Gjorgiev, Giovanni Sansavini

    Abstract: Inspection of insulators is important to ensure reliable operation of the power system. Deep learning has recently been explored to automate the inspection process by leveraging aerial images captured by drones along with powerful object detection models. However, a purely object detection-based approach exhibits class imbalance-induced poor detection accuracy for faulty insulators, especially for… ▽ More

    Submitted 14 November, 2023; originally announced December 2023.

  3. arXiv:2305.19871  [pdf, other

    cs.LG

    There is more to graphs than meets the eye: Learning universal features with self-supervision

    Authors: Laya Das, Sai Munikoti, Mahantesh Halappanavar

    Abstract: We study the problem of learning universal features across multiple graphs through self-supervision. Graph self supervised learning has been shown to facilitate representation learning, and produce competitive models compared to supervised baselines. However, existing methods of self-supervision learn features from one graph, and thus, produce models that are specialized to a particular graph. We… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.11939, arXiv:2301.13287, arXiv:2305.12686, arXiv:2305.02299

  4. arXiv:2303.12643  [pdf, other

    cs.LG

    Traffic Volume Prediction using Memory-Based Recurrent Neural Networks: A comparative analysis of LSTM and GRU

    Authors: Lokesh Chandra Das

    Abstract: Predicting traffic volume in real-time can improve both traffic flow and road safety. A precise traffic volume forecast helps alert drivers to the flow of traffic along their preferred routes, preventing potential deadlock situations. Existing parametric models cannot reliably forecast traffic volume in dynamic and complex traffic conditions. Therefore, in order to evaluate and forecast the traffi… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

  5. arXiv:2303.10954  [pdf, other

    cs.LG eess.SY

    Uncertainty-aware deep learning for digital twin-driven monitoring: Application to fault detection in power lines

    Authors: Laya Das, Blazhe Gjorgiev, Giovanni Sansavini

    Abstract: Deep neural networks (DNNs) are often coupled with physics-based models or data-driven surrogate models to perform fault detection and health monitoring of systems in the low data regime. These models serve as digital twins to generate large quantities of data to train DNNs which would otherwise be difficult to obtain from the real-life system. However, such models can exhibit parametric uncertain… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

  6. arXiv:2303.09070  [pdf, ps, other

    cs.CY

    LCS-TF: Multi-Agent Deep Reinforcement Learning-Based Intelligent Lane-Change System for Improving Traffic Flow

    Authors: Lokesh Chandra Das, Myounggyu Won

    Abstract: Discretionary lane-change is one of the critical challenges for autonomous vehicle (AV) design due to its significant impact on traffic efficiency. Existing intelligent lane-change solutions have primarily focused on optimizing the performance of the ego-vehicle, thereby suffering from limited generalization performance. Recent research has seen an increased interest in multi-agent reinforcement l… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  7. arXiv:2212.11017  [pdf, other

    cs.CV eess.IV

    Object detection-based inspection of power line insulators: Incipient fault detection in the low data-regime

    Authors: Laya Das, Mohammad Hossein Saadat, Blazhe Gjorgiev, Etienne Auger, Giovanni Sansavini

    Abstract: Deep learning-based object detection is a powerful approach for detecting faulty insulators in power lines. This involves training an object detection model from scratch, or fine tuning a model that is pre-trained on benchmark computer vision datasets. This approach works well with a large number of insulator images, but can result in unreliable models in the low data regime. The current literatur… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  8. arXiv:2212.03497  [pdf, ps, other

    cs.CY

    RLPG: Reinforcement Learning Approach for Dynamic Intra-Platoon Gap Adaptation for Highway On-Ramp Merging

    Authors: Sushma Reddy Yadavalli, Lokesh Chandra Das, Myounggyu Won

    Abstract: A platoon refers to a group of vehicles traveling together in very close proximity using automated driving technology. Owing to its immense capacity to improve fuel efficiency, driving safety, and driver comfort, platooning technology has garnered substantial attention from the autonomous vehicle research community. Although highly advantageous, recent research has uncovered that an excessively sm… ▽ More

    Submitted 11 March, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

  9. arXiv:2208.07441  [pdf, ps, other

    cs.CV cs.CY

    WatchPed: Pedestrian Crossing Intention Prediction Using Embedded Sensors of Smartwatch

    Authors: Jibran Ali Abbasi, Navid Mohammad Imran, Lokesh Chandra Das, Myounggyu Won

    Abstract: The pedestrian crossing intention prediction problem is to estimate whether or not the target pedestrian will cross the street. State-of-the-art techniques heavily depend on visual data acquired through the front camera of the ego-vehicle to make a prediction of the pedestrian's crossing intention. Hence, the efficiency of current methodologies tends to decrease notably in situations where visual… ▽ More

    Submitted 15 March, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

  10. arXiv:2206.07922  [pdf, other

    cs.LG

    Challenges and Opportunities in Deep Reinforcement Learning with Graph Neural Networks: A Comprehensive review of Algorithms and Applications

    Authors: Sai Munikoti, Deepesh Agarwal, Laya Das, Mahantesh Halappanavar, Balasubramaniam Natarajan

    Abstract: Deep reinforcement learning (DRL) has empowered a variety of artificial intelligence fields, including pattern recognition, robotics, recommendation-systems, and gaming. Similarly, graph neural networks (GNN) have also demonstrated their superior performance in supervised learning for graph-structured data. In recent times, the fusion of GNN with DRL for graph-structured environments has attracted… ▽ More

    Submitted 7 November, 2022; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: 20 pages, 3 figures, 2 tables

  11. arXiv:2205.13387  [pdf, ps, other

    cs.LO cs.AI

    Coalgebraic Fuzzy geometric logic

    Authors: Litan Kumar Das, Kumar Sankar Ray, Prakash Chandra Mali

    Abstract: The paper aims to develop a framework for coalgebraic fuzzy geometric logic by adding modalities to the language of fuzzy geometric logic. Using the methods of coalgebra, the modal operators are introduced in the language of fuzzy geometric logic. To define the modal operators, we introduce a notion of fuzzy-open predicate lifting. Based on coalgebras for an endofunctor $T$ on the category… ▽ More

    Submitted 7 September, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

  12. arXiv:2205.10491  [pdf, ps, other

    eess.SP cs.LG

    LSTM-Based Adaptive Vehicle Position Control for Dynamic Wireless Charging

    Authors: Lokesh Chandra Das, Dipankar Dasgupta, Myounggyu Won

    Abstract: Dynamic wireless charging (DWC) is an emerging technology that allows electric vehicles (EVs) to be wirelessly charged while in motion. It is gaining significant momentum as it can potentially address the range limitation issue for EVs. However, due to significant power loss caused by wireless power transfer, improving charging efficiency remains as a major challenge for DWC systems. This paper pr… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

  13. arXiv:2205.09968  [pdf, other

    cs.LG stat.ML

    A General Framework for quantifying Aleatoric and Epistemic uncertainty in Graph Neural Networks

    Authors: Sai Munikoti, Deepesh Agarwal, Laya Das, Balasubramaniam Natarajan

    Abstract: Graph Neural Networks (GNN) provide a powerful framework that elegantly integrates Graph theory with Machine learning for modeling and analysis of networked data. We consider the problem of quantifying the uncertainty in predictions of GNN stemming from modeling errors and measurement uncertainty. We consider aleatoric uncertainty in the form of probabilistic links and noise in feature vector of n… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

    Comments: 10 pages, 1 figure, 6 Tables

  14. arXiv:2104.06506  [pdf, ps, other

    cs.RO cs.LG

    SAINT-ACC: Safety-Aware Intelligent Adaptive Cruise Control for Autonomous Vehicles Using Deep Reinforcement Learning

    Authors: Lokesh Das, Myounggyu Won

    Abstract: We present a novel adaptive cruise control (ACC) system namely SAINT-ACC: {S}afety-{A}ware {Int}elligent {ACC} system (SAINT-ACC) that is designed to achieve simultaneous optimization of traffic efficiency, driving safety, and driving comfort through dynamic adaptation of the inter-vehicle gap based on deep reinforcement learning (RL). A novel dual RL agent-based approach is developed to seek and… ▽ More

    Submitted 24 September, 2021; v1 submitted 6 March, 2021; originally announced April 2021.

    Comments: Accepted for publication in ICML, 2021

    Journal ref: Proceedings of the 38th International Conference on Machine Learning (2021) 2445-2455

  15. Bayesian Graph Neural Network for Fast identification of critical nodes in Uncertain Complex Networks

    Authors: Sai Munikoti, Laya Das, Balasubramaniam Natarajan

    Abstract: In the quest to improve efficiency, interdependence and complexity are becoming defining characteristics of modern complex networks representing engineered and natural systems. Graph theory is a widely used framework for modeling such complex networks and to evaluate their robustness to disruptions. Particularly, identification of critical nodes/links in a graph can facilitate the enhancement of g… ▽ More

    Submitted 17 May, 2021; v1 submitted 26 December, 2020; originally announced December 2020.

    Comments: 6 pages, 2 figures, 3 Tables

  16. Scalable Graph Neural Network-based framework for identifying critical nodes and links in Complex Networks

    Authors: Sai Munikoti, Laya Das, Balasubramaniam Natarajan

    Abstract: Identifying critical nodes and links in graphs is a crucial task. These nodes/links typically represent critical elements/communication links that play a key role in a system's performance. However, a majority of the methods available in the literature on the identification of critical nodes/links are based on an iterative approach that explores each node/link of a graph at a time, repeating for a… ▽ More

    Submitted 10 May, 2021; v1 submitted 26 December, 2020; originally announced December 2020.

    Comments: 29 pages, single column, 3 figures

  17. arXiv:2012.04215  [pdf, ps, other

    cs.CR

    On Aadhaar Identity Management System

    Authors: Yash Mehta, Dev Patel, Manik Lal Das

    Abstract: A unique identification for citizens can lead to effective governance to manage and provide citizen-centric services. While ensuring this service, privacy of the citizens needs to be preserved. Aadhaar, the identification system by UIDAI has faced some critics regarding its privacy preserving feature. This paper discusses those concerns in Aadhaar system and proposed a new model for the Aadhaar sy… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: 8 pages, 2 figures

  18. arXiv:2011.03181  [pdf, ps, other

    cs.CR

    Web Application Attack Detection using Deep Learning

    Authors: Tikam Alma, Manik Lal Das

    Abstract: Modern web applications are dominated by HTTP/HTTPS messages that consist of one or more headers, where most of the exploits and payloads can be injected by attackers. According to the OWASP, the 80 percent of the web attacks are done through HTTP/HTTPS requests queries. In this paper, we present a deep learning based web application attacks detection model. The model uses auto-encoder that can le… ▽ More

    Submitted 5 November, 2020; originally announced November 2020.

    Comments: 10 pages

  19. arXiv:2008.09575  [pdf, other

    cs.NE cs.MA cs.SI eess.SY

    Robust and Efficient Swarm Communication Topologies for Hostile Environments

    Authors: Vipul Mann, Abhishek Sivaram, Laya Das, Venkat Venkatasubramanian

    Abstract: Swarm Intelligence-based optimization techniques combine systematic exploration of the search space with information available from neighbors and rely strongly on communication among agents. These algorithms are typically employed to solve problems where the function landscape is not adequately known and there are multiple local optima that could result in premature convergence for other algorithm… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

  20. arXiv:2006.01411  [pdf, ps, other

    cs.CY eess.SP

    D-ACC: Dynamic Adaptive Cruise Control for Highways with Ramps Based on Deep Q-Learning

    Authors: Lokesh Das, Myounggyu Won

    Abstract: An Adaptive Cruise Control (ACC) system allows vehicles to maintain a desired headway distance to a preceding vehicle automatically. It is increasingly adopted by commercial vehicles. Recent research demonstrates that the effective use of ACC can improve the traffic flow through the adaptation of the headway distance in response to the current traffic conditions. In this paper, we demonstrate that… ▽ More

    Submitted 24 March, 2021; v1 submitted 2 June, 2020; originally announced June 2020.

    Comments: Accepted for Publication in IEEE International Conference on Robotics and Automation (ICRA) 2021

  21. arXiv:1912.12223  [pdf, other

    cs.LO cs.AI

    Bitopological Duality for Algebras of Fittings logic and Natural Duality extension

    Authors: Litan Kumar Das, Kumar Sankar Ray

    Abstract: In this paper, we investigate a bitopological duality for algebras of Fitting's multi-valued logic. We also extend the natural duality theory for $\mathbb{ISP_I}(\mathcal{L})$ by develo** a duality for $\mathbb{ISP}(\mathcal{L})$, where $\mathcal{L}$ is a finite algebra in which underlying lattice is bounded distributive.

    Submitted 11 December, 2019; originally announced December 2019.

  22. arXiv:1810.08464  [pdf, ps, other

    cs.CR

    DigiLock: User-controlled and Server-aware Digital Locker System

    Authors: Atrayee Deb, Saloni Dalal, Manik Lal Das

    Abstract: The growing popularity of digital systems have paved the way for digital locker that ensures security and safety of the digital documents in store. While facilitating this system to user and availing its services offered by service provider, non-repudiation of service offered and service consumed is an important security requirement in the digital locker system. In this paper, we present a digital… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: 10 pages

  23. arXiv:1711.09032  [pdf

    cs.CR

    Image Authentication using Visual Cryptography

    Authors: Rahul Saranjame, Manik Lal Das

    Abstract: This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography. A prominent attack involving generation of fake shares to cheat honest users has been described and a demonstration of the proposed system employing a centralised server to generate shares and authenticate them on the basis of requests is made as a co… ▽ More

    Submitted 24 November, 2017; originally announced November 2017.

  24. arXiv:1507.02921  [pdf, ps, other

    cs.IT

    Zero Attracting PNLMS Algorithm and Its Convergence in Mean

    Authors: Rajib Lochan Das, Mrityunjoy Chackraborty

    Abstract: The proportionate normalized least mean square (PNLMS) algorithm and its variants are by far the most popular adaptive filters that are used to identify sparse systems. The convergence speed of the PNLMS algorithm, though very high initially, however, slows down at a later stage, even becoming worse than sparsity agnostic adaptive filters like the NLMS. In this paper, we address this problem by in… ▽ More

    Submitted 10 July, 2015; originally announced July 2015.

    Comments: 11 pages, 6 figures

  25. arXiv:1304.4002  [pdf

    cs.DC cs.CR

    Reputation Algebra for Cloud-based Anonymous Data Storage Systems

    Authors: Harsh N Thakker, Mayank Saha, Manik Lal Das

    Abstract: Given a cloud-based anonymous data storage system, there are two ways for managing the nodes involved in file transfers. One of them is using reputations and the other uses a micropayment system. In reputation-based approach, each node has a reputation associated with it, which is used as a currency or feedback collection for file exchange operations. There have been several attempts over the year… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 9 pages

  26. Improved Bounds on RIP for Generalized Orthogonal Matching Pursuit

    Authors: Siddhartha Satpathi, Rajib Lochan Das, Mrityunjoy Chakraborty

    Abstract: Generalized Orthogonal Matching Pursuit (gOMP) is a natural extension of OMP algorithm where unlike OMP, it may select $N (\geq1)$ atoms in each iteration. In this paper, we demonstrate that gOMP can successfully reconstruct a $K$-sparse signal from a compressed measurement $ {\bf y}={\bf Φx}$ by $K^{th}$ iteration if the sensing matrix ${\bf Φ}$ satisfies restricted isometry property (RIP) of ord… ▽ More

    Submitted 3 February, 2013; originally announced February 2013.

    Comments: 8 pages, 1 figure

  27. System Support for Managing Invalid Bindings

    Authors: Lachhman Das, Yasir Arfat, Azhar Shah, Khalil Khoumbati

    Abstract: Context-aware adaptation is a central aspect of pervasive computing applications, enabling them to adapt and perform tasks based on contextual information. One of the aspects of context-aware adaptation is reconfiguration in which bindings are created between application component and remote services in order to realize new behaviour in response to contextual information. Various research efforts… ▽ More

    Submitted 6 August, 2011; originally announced August 2011.

    Journal ref: Lachhman Das Dhomeja, Yasir Arfat Malkani, Azhar Ali Shah and Khalil Khoumbati, "System Support For Managing Invalid Bindings", International Journal of UbiComp (IJU), Vol.2, No.3, July 2011

  28. arXiv:0911.0727  [pdf, ps, other

    cs.CR

    GSM Security Using Identity-based Cryptography

    Authors: Animesh Agarwal, Vaibhav Shrimali, Manik Lal Das

    Abstract: Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports… ▽ More

    Submitted 3 November, 2009; originally announced November 2009.

    Comments: 10 pages

  29. arXiv:0804.4628  [pdf, ps, other

    cs.CR

    Comment - Practical Data Protection

    Authors: Manik Lal Das

    Abstract: Recently, Rawat and Saxena proposed a method for protecting data using ``Disclaimer Statement''. This paper presents some issues and several flaws in their proposal.

    Submitted 29 April, 2008; originally announced April 2008.

  30. arXiv:0802.2112  [pdf, ps, other

    cs.CR

    On the Security of ``an efficient and complete remote user authentication scheme''

    Authors: Manik Lal Das

    Abstract: Recently, Liaw et al. proposed a remote user authentication scheme using smart cards. Their scheme has claimed a number of features e.g. mutual authentication, no clock synchronization, no verifier table, flexible user password change, etc. We show that Liaw et al.'s scheme is completely insecure. By intercepting a valid login message in Liaw et al.'s scheme, any unregistered user or adversary c… ▽ More

    Submitted 14 February, 2008; originally announced February 2008.

  31. arXiv:0801.0575  [pdf

    cs.CR

    A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards

    Authors: Manik Lal Das

    Abstract: The paper presents an authentication scheme for remote systems using smart card. The scheme prevents the scenario of many logged in users with the same login identity, and does not require password/verifier table to validate the users' login request. The scheme provides a user-friendly password change option, and withstands the replay, impersonation, stolen-verifier, guessing, and denial-of-serv… ▽ More

    Submitted 3 January, 2008; originally announced January 2008.

    Journal ref: Published in the Transactions on Electronics, Computer and Communication, 1(2):78-82, 2006

  32. arXiv:0712.3084  [pdf, ps, other

    cs.CR

    Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings

    Authors: Manik Lal Das, Ashutosh Saxena, Deepak B Phatak

    Abstract: We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage. With this technique, the signer receives a partial private key from a trusted authority and unblinds it to get his private key, in turn, overcomes the key escrow problem which is a constr… ▽ More

    Submitted 18 December, 2007; originally announced December 2007.

    Journal ref: International Journal of Network Security, Vol. 4, No.3, pp.312-317, 2007

  33. arXiv:0712.3037  [pdf, ps, other

    cs.CR

    Comments on "Improved Efficient Remote User Authentication Schemes"

    Authors: Manik Lal Das

    Abstract: Recently, Tian et al presented an article, in which they discussed some security weaknesses of Yoon et al's scheme and subsequently proposed two ``improved'' schemes. In this paper, we show that the Tian et al's schemes are insecure and vulnerable than the Yoon et al's scheme.

    Submitted 18 December, 2007; originally announced December 2007.

    Journal ref: International Journal of Network Security, Vol. 6, No. 3, pp. 282-284, 2008

  34. A Dynamic ID-based Remote User Authentication Scheme

    Authors: Manik Lal Das, Ashutosh Saxena, Ved P. Gulati

    Abstract: Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dy… ▽ More

    Submitted 13 December, 2007; originally announced December 2007.

    Comments: Published in IEEE Transactions On Consumer Electronics

    Journal ref: IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, 2004, pp. 629-631

  35. arXiv:cs/0612098  [pdf, ps, other

    cs.CR

    Algorithms and Approaches of Proxy Signature: A Survey

    Authors: Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak

    Abstract: Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable proposals, and provides an overall remark of these proposals.

    Submitted 20 December, 2006; originally announced December 2006.

    Comments: 29 pages

  36. arXiv:cs/0506015  [pdf, ps, other

    cs.CR

    Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems

    Authors: Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena

    Abstract: To remove key escrow problem and avoid the need of secure channel in ID based cryptosystem Lee et al. proposed a secure key issuing protocol. However we show that it suffers from impersonation, insider attacks and incompetency of the key privacy authorities. We also cryptanalyze Sui et al.'s separable and anonymous key issuing protocol.

    Submitted 6 June, 2005; originally announced June 2005.

    Comments: Submitted to National Workshop on Cryptology 2005, India