Skip to main content

Showing 1–17 of 17 results for author: Doshi, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.18665  [pdf, other

    cs.CV

    Leveraging PointNet and PointNet++ for Lyft Point Cloud Classification Challenge

    Authors: Rajat K. Doshi

    Abstract: This study investigates the application of PointNet and PointNet++ in the classification of LiDAR-generated point cloud data, a critical component for achieving fully autonomous vehicles. Utilizing a modified dataset from the Lyft 3D Object Detection Challenge, we examine the models' capabilities to handle dynamic and complex environments essential for autonomous navigation. Our analysis shows tha… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  2. arXiv:2311.01832  [pdf, other

    cs.RO

    On Hand-Held Grippers and the Morphological Gap in Human Manipulation Demonstration

    Authors: Kiran Doshi, Yijiang Huang, Stelian Coros

    Abstract: Collecting manipulation demonstrations with robotic hardware is tedious - and thus difficult to scale. Recording data on robot hardware ensures that it is in the appropriate format for Learning from Demonstrations (LfD) methods. By contrast, humans are proficient manipulators, and recording their actions would be easy to scale, but it is challenging to use that data format with LfD methods. The qu… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  3. arXiv:2303.10703  [pdf, other

    cs.CV

    CCTV-Gun: Benchmarking Handgun Detection in CCTV Images

    Authors: Srikar Yellapragada, Zhenghong Li, Kevin Bhadresh Doshi, Purva Makarand Mhasakar, Heng Fan, Jie Wei, Erik Blasch, Bin Zhang, Haibin Ling

    Abstract: Gun violence is a critical security problem, and it is imperative for the computer vision community to develop effective gun detection algorithms for real-world scenarios, particularly in Closed Circuit Television (CCTV) surveillance data. Despite significant progress in visual object detection, detecting guns in real-world CCTV images remains a challenging and under-explored task. Firearms, espec… ▽ More

    Submitted 11 July, 2023; v1 submitted 19 March, 2023; originally announced March 2023.

  4. arXiv:2204.07705  [pdf, other

    cs.CL cs.AI

    Super-NaturalInstructions: Generalization via Declarative Instructions on 1600+ NLP Tasks

    Authors: Yizhong Wang, Swaroop Mishra, Pegah Alipoormolabashi, Yeganeh Kordi, Amirreza Mirzaei, Anjana Arunkumar, Arjun Ashok, Arut Selvan Dhanasekaran, Atharva Naik, David Stap, Eshaan Pathak, Giannis Karamanolakis, Haizhi Gary Lai, Ishan Purohit, Ishani Mondal, Jacob Anderson, Kirby Kuznia, Krima Doshi, Maitreya Patel, Kuntal Kumar Pal, Mehrad Moradshahi, Mihir Parmar, Mirali Purohit, Neeraj Varshney, Phani Rohitha Kaza , et al. (15 additional authors not shown)

    Abstract: How well can NLP models generalize to a variety of unseen tasks when provided with task instructions? To address this question, we first introduce Super-NaturalInstructions, a benchmark of 1,616 diverse NLP tasks and their expert-written instructions. Our collection covers 76 distinct task types, including but not limited to classification, extraction, infilling, sequence tagging, text rewriting,… ▽ More

    Submitted 24 October, 2022; v1 submitted 15 April, 2022; originally announced April 2022.

    Comments: Accepted to EMNLP 2022, 25 pages

  5. arXiv:2204.03141  [pdf, other

    cs.CV cs.AI

    Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems

    Authors: Furkan Mumcu, Keval Doshi, Yasin Yilmaz

    Abstract: Anomaly detection in videos is an important computer vision problem with various applications including automated video surveillance. Although adversarial attacks on image understanding models have been heavily investigated, there is not much work on adversarial machine learning targeting video understanding models and no previous work which focuses on video anomaly detection. To this end, we inve… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

  6. arXiv:2203.05167  [pdf, other

    cs.LG eess.SP stat.ML

    TiSAT: Time Series Anomaly Transformer

    Authors: Keval Doshi, Shatha Abudalou, Yasin Yilmaz

    Abstract: While anomaly detection in time series has been an active area of research for several years, most recent approaches employ an inadequate evaluation criterion leading to an inflated F1 score. We show that a rudimentary Random Guess method can outperform state-of-the-art detectors in terms of this popular but faulty evaluation criterion. In this work, we propose a proper evaluation metric that meas… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  7. arXiv:2203.05156  [pdf, other

    cs.CV cs.AI

    End-to-End Semantic Video Transformer for Zero-Shot Action Recognition

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: While video action recognition has been an active area of research for several years, zero-shot action recognition has only recently started gaining traction. In this work, we propose a novel end-to-end trained transformer model which is capable of capturing long range spatiotemporal dependencies efficiently, contrary to existing approaches which use 3D-CNNs. Moreover, to address a common ambiguit… ▽ More

    Submitted 2 December, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

  8. arXiv:2110.02150  [pdf, other

    cs.PF

    Online Application Guidance for Heterogeneous Memory Systems

    Authors: M. Ben Olson, Brandon Kammerdiener, Kshitij A. Doshi, Terry Jones, Michael R. Jantz

    Abstract: Many high end and next generation computing systems to incorporated alternative memory technologies to meet performance goals. Since these technologies present distinct advantages and tradeoffs compared to conventional DDR* SDRAM, such as higher bandwidth with lower capacity or vice versa, they are typically packaged alongside conventional SDRAM in a heterogeneous memory architecture. To utilize t… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  9. arXiv:2104.09758  [pdf, other

    cs.CV cs.AI eess.IV

    An Efficient Approach for Anomaly Detection in Traffic Videos

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Due to its relevance in intelligent transportation systems, anomaly detection in traffic videos has recently received much interest. It remains a difficult problem due to a variety of factors influencing the video quality of a real-time traffic feed, such as temperature, perspective, lighting conditions, and so on. Even though state-of-the-art methods perform well on the available benchmark datase… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

    Comments: Accepted to CVPR 2021 - AI City Workshop

  10. arXiv:2103.11299  [pdf, other

    cs.CV

    A Modular and Unified Framework for Detecting and Localizing Video Anomalies

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Anomaly detection in videos has been attracting an increasing amount of attention. Despite the competitive performance of recent methods on benchmark datasets, they typically lack desirable features such as modularity, cross-domain adaptivity, interpretability, and real-time anomalous event detection. Furthermore, current state-of-the-art approaches are evaluated using the standard instance-based… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

  11. arXiv:2011.00728  [pdf, other

    cs.CV cs.LG

    Road Damage Detection using Deep Ensemble Learning

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Road damage detection is critical for the maintenance of a road, which traditionally has been performed using expensive high-performance sensors. With the recent advances in technology, especially in computer vision, it is now possible to detect and categorize different types of road damages, which can facilitate efficient maintenance and resource management. In this work, we present an ensemble m… ▽ More

    Submitted 29 October, 2020; originally announced November 2020.

    Comments: Submitted to IEEE BigData 2020. arXiv admin note: text overlap with arXiv:2008.13101, arXiv:1811.04535 by other authors

  12. arXiv:2010.07110  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Online Anomaly Detection in Surveillance Videos with Asymptotic Bounds on False Alarm Rate

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Anomaly detection in surveillance videos is attracting an increasing amount of attention. Despite the competitive performance of recent methods, they lack theoretical performance analysis, particularly due to the complex deep neural network architectures used in decision making. Additionally, online decision making is an important but mostly neglected factor in this domain. Much of the existing me… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

    Comments: Submitted to Pattern Recognition. arXiv admin note: substantial text overlap with arXiv:2004.07941

  13. arXiv:2006.08064  [pdf, other

    cs.CR cs.NI stat.ML

    Timely Detection and Mitigation of Stealthy DDoS Attacks via IoT Networks

    Authors: Keval Doshi, Yasin Yilmaz, Suleyman Uludag

    Abstract: Internet of Things (IoT) networks consist of sensors, actuators, mobile and wearable devices that can connect to the Internet. With billions of such devices already in the market which have significant vulnerabilities, there is a dangerous threat to the Internet services and also some cyber-physical systems that are also connected to the Internet. Specifically, due to their existing vulnerabilitie… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

    Comments: Submitted to IEEE Transactions on Dependable and Secure Computing

  14. arXiv:2004.07941  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Continual Learning for Anomaly Detection in Surveillance Videos

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Anomaly detection in surveillance videos has been recently gaining attention. A challenging aspect of high-dimensional applications such as video surveillance is continual learning. While current state-of-the-art deep learning approaches perform well on existing public datasets, they fail to work in a continual learning framework due to computational and storage issues. Furthermore, online decisio… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: accepted to CVPR 2020: Workshop on Continual Learning in Computer Vision. arXiv admin note: text overlap with arXiv:2004.02072

  15. arXiv:2004.02072  [pdf, other

    cs.CV cs.LG

    Any-Shot Sequential Anomaly Detection in Surveillance Videos

    Authors: Keval Doshi, Yasin Yilmaz

    Abstract: Anomaly detection in surveillance videos has been recently gaining attention. Even though the performance of state-of-the-art methods on publicly available data sets has been competitive, they demand a massive amount of training data. Also, they lack a concrete approach for continuously updating the trained model once new data is available. Furthermore, online decision making is an important but m… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: Accepted to CVPR 2020: Workshop on Continual Learning in Computer Vision

  16. arXiv:1907.13576  [pdf, other

    cs.CV

    Synthetic Image Augmentation for Improved Classification using Generative Adversarial Networks

    Authors: Keval Doshi

    Abstract: Object detection and recognition has been an ongoing research topic for a long time in the field of computer vision. Even in robotics, detecting the state of an object by a robot still remains a challenging task. Also, collecting data for each possible state is also not feasible. In this literature, we use a deep convolutional neural network with SVM as a classifier to help with recognizing the st… ▽ More

    Submitted 31 July, 2019; originally announced July 2019.

    Comments: State Recognition Symposium

  17. arXiv:1806.01108  [pdf, other

    cs.DC cs.AR

    Hardware Transactional Persistent Memory

    Authors: Ellis Giles, Kshitij Doshi, Peter Varman

    Abstract: Emerging Persistent Memory technologies (also PM, Non-Volatile DIMMs, Storage Class Memory or SCM) hold tremendous promise for accelerating popular data-management applications like in-memory databases. However, programmers now need to deal with ensuring the atomicity of transactions on Persistent Memory resident data and maintaining consistency between the order in which processors perform stores… ▽ More

    Submitted 22 May, 2018; originally announced June 2018.

    Comments: 16 pages, 17 figures

    ACM Class: C.1.2; B.3.0