Skip to main content

Showing 1–13 of 13 results for author: Dave, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19635  [pdf, other

    cs.LG cs.CV

    Model Predictive Simulation Using Structured Graphical Models and Transformers

    Authors: Xinghua Lou, Meet Dave, Shrinu Kushagra, Miguel Lazaro-Gredilla, Kevin Murphy

    Abstract: We propose an approach to simulating trajectories of multiple interacting agents (road users) based on transformers and probabilistic graphical models (PGMs), and apply it to the Waymo SimAgents challenge. The transformer baseline is based on the MTR model, which predicts multiple future trajectories conditioned on the past trajectories and static road layout features. We then improve upon these g… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: Special Mention at the Waymo Sim Agents Challenge 2024

  2. arXiv:2303.07397  [pdf, other

    cs.LG cs.AI

    Fast exploration and learning of latent graphs with aliased observations

    Authors: Miguel Lazaro-Gredilla, Ishan Deshpande, Sivaramakrishnan Swaminathan, Meet Dave, Dileep George

    Abstract: We consider the problem of recovering a latent graph where the observations at each node are \emph{aliased}, and transitions are stochastic. Observations are gathered by an agent traversing the graph. Aliasing means that multiple nodes emit the same observation, so the agent can not know in which node it is located. The agent needs to uncover the hidden topology as accurately as possible and in as… ▽ More

    Submitted 25 September, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

  3. arXiv:2208.06130  [pdf

    cs.CR

    Analysis, Detection, and Classification of Android Malware using System Calls

    Authors: Shubham Shakya, Mayank Dave

    Abstract: With the increasing popularity of Android in the last decade, Android is popular among users as well as attackers. The vast number of android users grabs the attention of attackers on android. Due to the continuous evolution of the variety and attacking techniques of android malware, our detection methods should need an update too. Most of the researcher's works are based on static features, and v… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

    Comments: 18 pages, 7 table , 3 figures

  4. arXiv:2201.06100  [pdf

    cs.CR cs.DC

    Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain

    Authors: Hardik Sachdeva, Shivam Gupta, Anushka Misra, Khushbu Chauhan, Mayank Dave

    Abstract: Unmanned Aerial Vehicles (UAVs), also known as drones, have exploded in every segment present in todays business industry. They have scope in reinventing old businesses, and they are even develo** new opportunities for various brands and franchisors. UAVs are used in the supply chain, maintaining surveillance and serving as mobile hotspots. Although UAVs have potential applications, they bring s… ▽ More

    Submitted 27 June, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: 18 Pages; 14 Figures; 2 Tables

    Journal ref: Int. J. of Communication Networks and Distributed Systems (IJCNDS) 2023

  5. arXiv:2012.01964  [pdf, other

    cs.CR

    Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense

    Authors: Vaishali Kansal, Mayank Dave

    Abstract: Distributed Denial of Service (DDoS) attacks are serious cyber attacks and mitigating DDoS attacks in cloud is a topic of ongoing research interest which remains a major security challenge. Fog computing is an extension of cloud computing which has been used to secure cloud. Moving Target Defense (MTD) is a newly recognized, proactive security defense that can be used to mitigate DDoS attacks on c… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

  6. Architectural-Space Exploration of Heterogeneous Reliability and Checkpointing Modes for Out-of-Order Superscalar Processors

    Authors: Bharath Srinivas Prabakaran, Mihika Dave, Florian Kriebel, Semeen Rehman, Muhammad Shafique

    Abstract: Reliability has emerged as a key topic of interest for researchers around the world to detect and/or mitigate the side effects of decreasing transistor sizes, such as soft errors. Traditional solutions, like DMR and TMR, incur significant area and power overheads, which might not always be applicable due to power restrictions. Therefore, we investigate alternative heterogeneous reliability modes t… ▽ More

    Submitted 12 July, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

    Comments: 16 Pages, 19 Figures, 6 Tables

    Journal ref: IEEE Access, vol. 7, pp. 145324-145339, 2019

  7. arXiv:1709.08805  [pdf

    cs.CR

    Malware Detection Approach for Android systems Using System Call Logs

    Authors: Sanya Chaba, Rahul Kumar, Rohan Pant, Mayank Dave

    Abstract: Static detection technologies based on signature-based approaches that are widely used in Android platform to detect malicious applications. It can accurately detect malware by extracting signatures from test data and then comparing the test data with the signature samples of virus and benign samples. However, this method is generally unable to detect unknown malware applications. This is because,… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

  8. arXiv:1609.07215  [pdf

    cs.LG cs.NE

    A Novel Progressive Multi-label Classifier for Classincremental Data

    Authors: Mihika Dave, Sahil Tapiawala, Meng Joo Er, Rajasekar Venkatesan

    Abstract: In this paper, a progressive learning algorithm for multi-label classification to learn new labels while retaining the knowledge of previous labels is designed. New output neurons corresponding to new labels are added and the neural network connections and parameters are automatically restructured as if the label has been introduced from the beginning. This work is the first of the kind in multi-l… ▽ More

    Submitted 22 September, 2016; originally announced September 2016.

    Comments: 5 pages, 3 figures, 4 tables

  9. arXiv:1609.00086  [pdf

    cs.LG cs.AI cs.NE

    A novel online multi-label classifier for high-speed streaming data applications

    Authors: Rajasekar Venkatesan, Meng Joo Er, Mihika Dave, Mahardhika Pratama, Shiqian Wu

    Abstract: In this paper, a high-speed online neural network classifier based on extreme learning machines for multi-label classification is proposed. In multi-label classification, each of the input data sample belongs to one or more than one of the target labels. The traditional binary and multi-class classification where each sample belongs to only one target class forms the subset of multi-label classifi… ▽ More

    Submitted 31 August, 2016; originally announced September 2016.

    Comments: 18 pages, 7 tables, 3 figures. arXiv admin note: text overlap with arXiv:1608.08898

  10. Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

    Authors: Manish B Dave, Mitesh B Nakrani

    Abstract: In cognitive radio it is of prime importance that the presence of Primary Users (PU) is detected correctly at each of the time. In order to do so the help from all present Secondary Users (SU) is taken and such a taken is known as co-operative spectrum sensing. Ideally it is assumed that all the secondary users give the correct result to the control center. But there are certain conditions under w… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: 5 pages, 8 figures, 1 table, "Published with International Journal of Engineering Trends and Technology (IJETT)"

    Journal ref: Manish B Dave , Mitesh B Nakrani. "Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques",IJETT, V9(7),326-330 March 2014. ISSN:2231-5381

  11. arXiv:1403.3312  [pdf

    cs.NI cs.IT

    Optimal number of users in Co-operative spectrum sensing in WRAN using Cyclo-Stationary Detector

    Authors: Manish B Dave

    Abstract: Cognitive radio allows unlicensed users to access licensed frequency bands through dynamic spectrum access so as to reduce spectrum scarcity. This requires intelligent spectrum sensing techniques. This paper investigates the use of cyclo-stationary detector and performance evaluation for Digital Video Broadcast-Terrestrial (DVB-T) signals. Generally, DVB-T is specified in IEEE 802.22 standard in V… ▽ More

    Submitted 13 March, 2014; originally announced March 2014.

    Comments: 5 pages, 6 figures, Published with International Journal of Engineering Trends and Technology (IJETT)

    Journal ref: International Journal of Engineering Trends and Technology (IJETT) 4(7):2806-2810, July 2013

  12. arXiv:1108.2095  [pdf

    cs.NI cs.SI

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Authors: Rakesh Kumar, Mayank Dave

    Abstract: Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic data. In this paper we have proposed mobile agent as… ▽ More

    Submitted 10 August, 2011; originally announced August 2011.

    Comments: 6 pages,5 figures; IJCA Special Issue on "Mobile Ad-hoc Networks" 2011

  13. arXiv:1108.2094  [pdf

    cs.NI

    A Comparative Study of Various Routing Protocols in VANET

    Authors: Rakesh Kumar, Mayank Dave

    Abstract: Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages / disadvantages and the applications of various routing protocols for vehicular ad hoc networks. It explores the motivation beh… ▽ More

    Submitted 10 August, 2011; originally announced August 2011.

    Comments: 6 pages, 1 figure and 2 tables

    Journal ref: International Journal of Computer Science Issues (IJCSI), Vol. 8,Issue-4,No.-4,Jul 2011