Skip to main content

Showing 1–50 of 79 results for author: Jha, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04168  [pdf, other

    cs.LG

    Learning Interpretable Differentiable Logic Networks

    Authors: Chang Yue, Niraj K. Jha

    Abstract: The ubiquity of neural networks (NNs) in real-world applications, from healthcare to natural language processing, underscores their immense utility in capturing complex relationships within high-dimensional data. However, NNs come with notable disadvantages, such as their "black-box" nature, which hampers interpretability, as well as their tendency to overfit the training data. We introduce a nove… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2406.16351  [pdf, other

    cs.LG stat.ME

    METRIK: Measurement-Efficient Randomized Controlled Trials using Transformers with Input Masking

    Authors: Sayeri Lala, Niraj K. Jha

    Abstract: Clinical randomized controlled trials (RCTs) collect hundreds of measurements spanning various metric types (e.g., laboratory tests, cognitive/motor assessments, etc.) across 100s-1000s of subjects to evaluate the effect of a treatment, but do so at the cost of significant trial expense. To reduce the number of measurements, trial protocols can be revised to remove metrics extraneous to the study'… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 18 pages, 11 figures

  3. arXiv:2406.00539  [pdf, other

    cs.LG stat.ML

    CONFINE: Conformal Prediction for Interpretable Neural Networks

    Authors: Linhui Huang, Sayeri Lala, Niraj K. Jha

    Abstract: Deep neural networks exhibit remarkable performance, yet their black-box nature limits their utility in fields like healthcare where interpretability is crucial. Existing explainability approaches often sacrifice accuracy and lack quantifiable measures of prediction uncertainty. In this study, we introduce Conformal Prediction for Interpretable Neural Networks (CONFINE), a versatile framework that… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  4. arXiv:2405.05252  [pdf, other

    cs.CV cs.AI cs.LG eess.IV eess.SP

    Attention-Driven Training-Free Efficiency Enhancement of Diffusion Models

    Authors: Hongjie Wang, Difan Liu, Yan Kang, Yijun Li, Zhe Lin, Niraj K. Jha, Yuchen Liu

    Abstract: Diffusion Models (DMs) have exhibited superior performance in generating high-quality and diverse images. However, this exceptional performance comes at the cost of expensive architectural design, particularly due to the attention module heavily used in leading models. Existing works mainly adopt a retraining process to enhance DM efficiency. This is computationally expensive and not very scalable… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted to IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024

  5. arXiv:2405.00888  [pdf, other

    cs.CL

    DynaMo: Accelerating Language Model Inference with Dynamic Multi-Token Sampling

    Authors: Shikhar Tuli, Chi-Heng Lin, Yen-Chang Hsu, Niraj K. Jha, Yilin Shen, Hongxia **

    Abstract: Traditional language models operate autoregressively, i.e., they predict one token at a time. Rapid explosion in model sizes has resulted in high inference times. In this work, we propose DynaMo, a suite of multi-token prediction language models that reduce net inference times. Our models $\textit{dynamically}$ predict multiple tokens based on their confidence in the predicted joint probability di… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: Accepted at NAACL 2024

  6. arXiv:2403.08197  [pdf, other

    cs.LG cs.AI

    PAGE: Domain-Incremental Adaptation with Past-Agnostic Generative Replay for Smart Healthcare

    Authors: Chia-Hao Li, Niraj K. Jha

    Abstract: We propose PAGE, a domain-incremental adaptation strategy with past-agnostic generative replay for smart healthcare. PAGE enables generative replay without the aid of any preserved data or information from prior domains. When adapting to a new domain, it exploits real data from the new distribution and the current model to generate synthetic data that retain the learned knowledge of previous domai… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: 30 pages, 7 figures. arXiv admin note: text overlap with arXiv:2305.05738

  7. arXiv:2403.07887  [pdf, other

    cs.CV cs.AI

    Neural Slot Interpreters: Grounding Object Semantics in Emergent Slot Representations

    Authors: Bhishma Dedhia, Niraj K. Jha

    Abstract: Object-centric methods have seen significant progress in unsupervised decomposition of raw perception into rich object-like abstractions. However, limited ability to ground object semantics of the real world into the learned abstractions has hindered their adoption in downstream understanding applications. We present the Neural Slot Interpreter (NSI) that learns to ground and generate object seman… ▽ More

    Submitted 2 February, 2024; originally announced March 2024.

  8. arXiv:2402.18321  [pdf, other

    cs.CY

    Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time

    Authors: Nikhil Jha, Martino Trevisan, Marco Mellia, Daniel Fernandez, Rodrigo Irarrazaval

    Abstract: In response to growing concerns about user privacy, legislators have introduced new regulations and laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) that force websites to obtain user consent before activating personal data collection, fundamental to providing targeted advertising. The cornerstone of this consent-seeking process involves the… ▽ More

    Submitted 29 February, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  9. arXiv:2308.08666  [pdf, other

    cs.LG

    BREATHE: Second-Order Gradients and Heteroscedastic Emulation based Design Space Exploration

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Researchers constantly strive to explore larger and more complex search spaces in various scientific studies and physical experiments. However, such investigations often involve sophisticated simulators or time-consuming experiments that make exploring and observing new design samples challenging. Previous works that target such applications are typically sample-inefficient and restricted to vecto… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

  10. arXiv:2306.05094  [pdf, other

    cs.CY cs.CR

    On the Robustness of Topics API to a Re-Identification Attack

    Authors: Nikhil Jha, Martino Trevisan, Emilio Leonardi, Marco Mellia

    Abstract: Web tracking through third-party cookies is considered a threat to users' privacy and is supposed to be abandoned in the near future. Recently, Google proposed the Topics API framework as a privacy-friendly alternative for behavioural advertising. Using this approach, the browser builds a user profile based on navigation history, which advertisers can access. The Topics API has the possibility of… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: Privacy Enhancing Technologies Symposium (PETS) 2023

  11. arXiv:2305.17328  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Zero-TPrune: Zero-Shot Token Pruning through Leveraging of the Attention Graph in Pre-Trained Transformers

    Authors: Hongjie Wang, Bhishma Dedhia, Niraj K. Jha

    Abstract: Deployment of Transformer models on edge devices is becoming increasingly challenging due to the exponentially growing inference cost that scales quadratically with the number of tokens in the input sequence. Token pruning is an emerging solution to address this challenge due to its ease of deployment on various Transformer backbones. However, most token pruning methods require computationally exp… ▽ More

    Submitted 7 April, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024

  12. arXiv:2305.17262  [pdf, other

    cs.CV cs.AI

    Im-Promptu: In-Context Composition from Image Prompts

    Authors: Bhishma Dedhia, Michael Chang, Jake C. Snell, Thomas L. Griffiths, Niraj K. Jha

    Abstract: Large language models are few-shot learners that can solve diverse tasks from a handful of demonstrations. This implicit understanding of tasks suggests that the attention mechanisms over word tokens may play a role in analogical reasoning. In this work, we investigate whether analogical reasoning can enable in-context composition over composable elements of visual stimuli. First, we introduce a s… ▽ More

    Submitted 22 October, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

  13. arXiv:2305.05738  [pdf, other

    cs.LG cs.HC eess.SP

    DOCTOR: A Multi-Disease Detection Continual Learning Framework Based on Wearable Medical Sensors

    Authors: Chia-Hao Li, Niraj K. Jha

    Abstract: Modern advances in machine learning (ML) and wearable medical sensors (WMSs) in edge devices have enabled ML-driven disease detection for smart healthcare. Conventional ML-driven methods for disease detection rely on customizing individual models for each disease and its corresponding WMS data. However, such methods lack adaptability to distribution shifts and new task classification classes. In a… ▽ More

    Submitted 18 June, 2024; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: 39 pages, 14 figures. This work has been submitted to the ACM for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  14. arXiv:2305.05078  [pdf, other

    eess.SP cs.LG stat.AP stat.ME

    SECRETS: Subject-Efficient Clinical Randomized Controlled Trials using Synthetic Intervention

    Authors: Sayeri Lala, Niraj K. Jha

    Abstract: The randomized controlled trial (RCT) is the gold standard for estimating the average treatment effect (ATE) of a medical intervention but requires 100s-1000s of subjects, making it expensive and difficult to implement. While a cross-over trial can reduce sample size requirements by measuring the treatment effect per individual, it is only applicable to chronic conditions and interventions whose e… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: 23 pages, 4 figures. This work has been submitted to the IEEE for possible publication

  15. arXiv:2304.10593  [pdf, other

    cs.CR

    DeepReShape: Redesigning Neural Networks for Efficient Private Inference

    Authors: Nandan Kumar Jha, Brandon Reagen

    Abstract: Prior work on Private Inference (PI) -- inferences performed directly on encrypted input -- has focused on minimizing a network's ReLUs, which have been assumed to dominate PI latency rather than FLOPs. Recent work has shown that FLOPs for PI can no longer be ignored and incur high latency penalties. In this paper, we develop DeepReShape, a technique that optimizes neural network architectures und… ▽ More

    Submitted 24 June, 2024; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: Accepted to Transactions on Machine Learning Research (TMLR), 2024

  16. arXiv:2303.14882  [pdf, other

    cs.LG cs.AR

    TransCODE: Co-design of Transformers and Accelerators for Efficient Training and Inference

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Automated co-design of machine learning models and evaluation hardware is critical for efficiently deploying such models at scale. Despite the state-of-the-art performance of transformer models, they are not yet ready for execution on resource-constrained hardware platforms. High memory requirements and low parallelizability of the transformer architecture exacerbate this problem. Recently-propose… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  17. arXiv:2303.13745  [pdf, other

    cs.LG

    EdgeTran: Co-designing Transformers for Efficient Inference on Mobile Edge Platforms

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Automated design of efficient transformer models has recently attracted significant attention from industry and academia. However, most works only focus on certain metrics while searching for the best-performing transformer architecture. Furthermore, running traditional, complex, and large transformer models on low-compute edge platforms is a challenging problem. In this work, we propose a framewo… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  18. arXiv:2302.14705  [pdf, other

    cs.AR cs.LG

    AccelTran: A Sparsity-Aware Accelerator for Dynamic Inference with Transformers

    Authors: Shikhar Tuli, Niraj K. Jha

    Abstract: Self-attention-based transformer models have achieved tremendous success in the domain of natural language processing. Despite their efficacy, accelerating the transformer is challenging due to its quadratic computational complexity and large activation sizes. Existing transformer accelerators attempt to prune its tokens to reduce memory access, albeit with high compute overheads. Moreover, previo… ▽ More

    Submitted 1 May, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

  19. arXiv:2301.04314  [pdf, other

    cs.CR

    ML-FEED: Machine Learning Framework for Efficient Exploit Detection

    Authors: Tanujay Saha, Tamjid Al-Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha

    Abstract: Machine learning (ML)-based methods have recently become attractive for detecting security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term memories (LSTMs) and transformers incur significant computation overheads. This overhead makes it infeasible to deploy them in real-time environments. We propose a novel ML-based exploit detection model, ML-FEED, that enab… ▽ More

    Submitted 6 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: This paper has been published in The Fourth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, 2022

  20. arXiv:2212.03965  [pdf, other

    cs.AR cs.LG eess.IV

    CODEBench: A Neural Architecture and Hardware Accelerator Co-Design Framework

    Authors: Shikhar Tuli, Chia-Hao Li, Ritvik Sharma, Niraj K. Jha

    Abstract: Recently, automated co-design of machine learning (ML) models and accelerator architectures has attracted significant attention from both the industry and academia. However, most co-design frameworks either explore a limited search space or employ suboptimal exploration techniques for simultaneous design decision investigations of the ML model and the accelerator. Furthermore, training the ML mode… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: Published at ACM Transactions on Embedded Computing Systems. Code available at https://github.com/jha-lab/codebench

  21. arXiv:2210.11691  [pdf, other

    cs.RO

    FogROS G: Enabling Secure, Connected and Mobile Fog Robotics with Global Addressability

    Authors: Kaiyuan Chen, Jiachen Yuan, Nikhil Jha, Jeffrey Ichnowski, John Kubiatowicz, Ken Goldberg

    Abstract: Fog Robotics renders networked robots with greater mobility, on-demand compute capabilities and better energy efficiency by offloading heavy robotics workloads to nearby Edge and distant Cloud data centers. However, as the de-facto standard for implementing fog robotics applications, Robot Operating System (ROS) and its successor ROS2 fail to provide fog robots with a mobile-friendly and secure co… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: 5 pages, 5 figures. Published at IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2022 Cloud Robotics Workshop

  22. OysterSim: Underwater Simulation for Enhancing Oyster Reef Monitoring

    Authors: Xiaomin Lin, Nitesh Jha, Mayank Joshi, Nare Karapetyan, Yiannis Aloimonos, Miao Yu

    Abstract: Oysters are the living vacuum cleaners of the oceans. There is an exponential decline in the oyster population due to over-harvesting. With the current development of the automation and AI, robots are becoming an integral part of the environmental monitoring process that can be also utilized for oyster reef preservation. Nevertheless, the underwater environment poses many difficulties, both from t… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: OCEANS 2022, Hampton Roads, 2022, pp. 1-6

  23. arXiv:2208.08464  [pdf, other

    cs.LG

    CTRL: Clustering Training Losses for Label Error Detection

    Authors: Chang Yue, Niraj K. Jha

    Abstract: In supervised machine learning, use of correct labels is extremely important to ensure high accuracy. Unfortunately, most datasets contain corrupted labels. Machine learning models trained on such datasets do not generalize well. Thus, detecting their label errors can significantly increase their efficacy. We propose a novel framework, called CTRL (Clustering TRaining Losses for label error detect… ▽ More

    Submitted 12 September, 2023; v1 submitted 17 August, 2022; originally announced August 2022.

  24. Characterizing and Optimizing End-to-End Systems for Private Inference

    Authors: Karthik Garimella, Zahra Ghodsi, Nandan Kumar Jha, Siddharth Garg, Brandon Reagen

    Abstract: In two-party machine learning prediction services, the client's goal is to query a remote server's trained machine learning model to perform neural network inference in some application domain. However, sensitive information can be obtained during this process by either the client or the server, leading to potential collection, unauthorized secondary use, and inappropriate access to personal infor… ▽ More

    Submitted 16 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted to the 28th edition of the Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2023 Conference

  25. arXiv:2207.04208  [pdf, other

    cs.AI cs.LG

    SCouT: Synthetic Counterfactuals via Spatiotemporal Transformers for Actionable Healthcare

    Authors: Bhishma Dedhia, Roshini Balasubramanian, Niraj K. Jha

    Abstract: The Synthetic Control method has pioneered a class of powerful data-driven techniques to estimate the counterfactual reality of a unit from donor units. At its core, the technique involves a linear model fitted on the pre-intervention period that combines donor outcomes to yield the counterfactual. However, linearly combining spatial information at each time instance using time-agnostic weights fa… ▽ More

    Submitted 23 November, 2022; v1 submitted 9 July, 2022; originally announced July 2022.

  26. arXiv:2205.11656  [pdf, other

    cs.LG cs.CL

    FlexiBERT: Are Current Transformer Architectures too Homogeneous and Rigid?

    Authors: Shikhar Tuli, Bhishma Dedhia, Shreshth Tuli, Niraj K. Jha

    Abstract: The existence of a plethora of language models makes the problem of selecting the best one for a custom task challenging. Most state-of-the-art methods leverage transformer-based models (e.g., BERT) or their variants. Training such models and exploring their hyperparameter space, however, is computationally expensive. Prior work proposes several neural architecture search (NAS) methods that employ… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: Preprint. In review

  27. arXiv:2205.09778  [pdf, other

    cs.RO

    FogROS2: An Adaptive Platform for Cloud and Fog Robotics Using ROS 2

    Authors: Jeffrey Ichnowski, Kaiyuan Chen, Karthik Dharmarajan, Simeon Adebola, Michael Danielczuk, Vıctor Mayoral-Vilches, Nikhil Jha, Hugo Zhan, Edith LLontop, Derek Xu, Camilo Buscaron, John Kubiatowicz, Ion Stoica, Joseph Gonzalez, Ken Goldberg

    Abstract: Mobility, power, and price points often dictate that robots do not have sufficient computing power on board to run contemporary robot algorithms at desired rates. Cloud computing providers such as AWS, GCP, and Azure offer immense computing power and increasingly low latency on demand, but tap** into that power from a robot is non-trivial. We present FogROS2, an open-source platform to facilitat… ▽ More

    Submitted 24 April, 2023; v1 submitted 19 May, 2022; originally announced May 2022.

  28. arXiv:2203.16127  [pdf

    cs.CL

    An Overview of Indian Language Datasets used for Text Summarization

    Authors: Shagun Sinha, Girish Nath Jha

    Abstract: In this paper, we survey Text Summarization (TS) datasets in Indian Languages (ILs), which are also low-resource languages (LRLs). We seek to answer one primary question: is the pool of Indian Language Text Summarization (ILTS) dataset growing or is there a resource poverty? To an-swer the primary question, we pose two sub-questions that we seek about ILTS datasets: first, what characteristics: fo… ▽ More

    Submitted 26 April, 2022; v1 submitted 30 March, 2022; originally announced March 2022.

  29. arXiv:2112.05973  [pdf, other

    cs.CL

    Prosody Labelled Dataset for Hindi using Semi-Automated Approach

    Authors: Esha Banerjee, Atul Kr. Ojha, Girish Nath Jha

    Abstract: This study aims to develop a semi-automatically labelled prosody database for Hindi, for enhancing the intonation component in ASR and TTS systems, which is also helpful for building Speech to Speech Machine Translation systems. Although no single standard for prosody labelling exists in Hindi, researchers in the past have employed perceptual and statistical methods in literature to draw inference… ▽ More

    Submitted 11 December, 2021; originally announced December 2021.

    Comments: 6

  30. arXiv:2112.01822  [pdf

    cs.CL

    Translating Politeness Across Cultures: Case of Hindi and English

    Authors: Ritesh Kumar, Girish Nath Jha

    Abstract: In this paper, we present a corpus based study of politeness across two languages-English and Hindi. It studies the politeness in a translated parallel corpus of Hindi and English and sees how politeness in a Hindi text is translated into English. We provide a detailed theoretical background in which the comparison is carried out, followed by a brief description of the translated data within this… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Journal ref: Proceedings of the 3rd ACM International Conference on Inter-Cultural Collaboration (ICIC-2010), Copenhagen Business School, Denmark, pp. 175-178, 2010

  31. arXiv:2112.01764  [pdf

    cs.CL

    Creating and Managing a large annotated parallel corpora of Indian languages

    Authors: Ritesh Kumar, Shiv Bhusan Kaushik, Pinkey Nainwani, Girish Nath Jha

    Abstract: This paper presents the challenges in creating and managing large parallel corpora of 12 major Indian languages (which is soon to be extended to 23 languages) as part of a major consortium project funded by the Department of Information Technology (DIT), Govt. of India, and running parallel in 10 different universities of India. In order to efficiently manage the process of creation and disseminat… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Journal ref: Proceedings of Workshop on Challenges in the management of large corpora (CMLC-2012), 8th International Conference on Language Resources and Evaluation (LREC 2012), pp. 18 - 22, 2012

  32. arXiv:2111.02583  [pdf, other

    cs.CR

    CryptoNite: Revealing the Pitfalls of End-to-End Private Inference at Scale

    Authors: Karthik Garimella, Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The privacy concerns of providing deep learning inference as a service have underscored the need for private inference (PI) protocols that protect users' data and the service provider's model using cryptographic methods. Recently proposed PI protocols have achieved significant reductions in PI latency by moving the computationally heavy homomorphic encryption (HE) parts to an offline/pre-compute p… ▽ More

    Submitted 18 July, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 4 Figures and 3 Tables

  33. arXiv:2109.00395  [pdf, other

    cs.CR cs.NI

    The Internet with Privacy Policies: Measuring The Web Upon Consent

    Authors: Nikhil Jha, Martino Trevisan, Luca Vassio, Marco Mellia

    Abstract: To protect users' privacy, legislators have regulated the usage of tracking technologies, mandating the acquisition of users' consent before collecting data. Consequently, websites started showing more and more consent management modules -- i.e., Privacy Banners -- the visitors have to interact with to access the website content. They challenge the automatic collection of Web measurements, primari… ▽ More

    Submitted 13 September, 2022; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: ACM Transactions on the Web (2022)

  34. arXiv:2108.11355  [pdf, other

    cs.RO

    FogROS: An Adaptive Framework for Automating Fog Robotics Deployment

    Authors: Kaiyuan, Chen, Yafei Liang, Nikhil Jha, Jeffrey Ichnowski, Michael Danielczuk, Joseph Gonzalez, John Kubiatowicz, Ken Goldberg

    Abstract: As many robot automation applications increasingly rely on multi-core processing or deep-learning models, cloud computing is becoming an attractive and economically viable resource for systems that do not contain high computing power onboard. Despite its immense computing capacity, it is often underused by the robotics and automation community due to lack of expertise in cloud computing and cloud-… ▽ More

    Submitted 25 August, 2021; originally announced August 2021.

    Comments: 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). 8 pages

  35. arXiv:2108.03514  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

    Authors: Tanujay Saha, Najwa Aaraj, Niraj K. Jha

    Abstract: The core network architecture of telecommunication systems has undergone a paradigm shift in the fifth-generation (5G)networks. 5G networks have transitioned to software-defined infrastructures, thereby reducing their dependence on hardware-based network functions. New technologies, like network function virtualization and software-defined networking, have been incorporated in the 5G core network… ▽ More

    Submitted 7 August, 2021; originally announced August 2021.

    Comments: 17 pages, 11 figures, 13 tables, This paper has been submitted for review in IEEE Transactions on Emerging Topics in Computing. Copyright IEEE 2021

  36. arXiv:2107.12342  [pdf, other

    cs.LG cs.CR

    Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

    Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen

    Abstract: Privacy concerns in client-server machine learning have given rise to private inference (PI), where neural inference occurs directly on encrypted inputs. PI protects clients' personal data and the server's intellectual property. A common practice in PI is to use garbled circuits to compute nonlinear functions privately, namely ReLUs. However, garbled circuits suffer from high storage, bandwidth, a… ▽ More

    Submitted 2 November, 2021; v1 submitted 26 July, 2021; originally announced July 2021.

    Comments: Accepted to PPML (ACM CCS) 2021

  37. arXiv:2106.08475  [pdf, other

    cs.LG cs.CR

    Circa: Stochastic ReLUs for Private Deep Learning

    Authors: Zahra Ghodsi, Nandan Kumar Jha, Brandon Reagen, Siddharth Garg

    Abstract: The simultaneous rise of machine learning as a service and concerns over user privacy have increasingly motivated the need for private inference (PI). While recent work demonstrates PI is possible using cryptographic primitives, the computational overheads render it impractical. The community is largely unprepared to address these overheads, as the source of slowdown in PI stems from the ReLU oper… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

  38. z-anonymity: Zero-Delay Anonymization for Data Streams

    Authors: Nikhil Jha, Thomas Favale, Luca Vassio, Martino Trevisan, Marco Mellia

    Abstract: With the advent of big data and the birth of the data markets that sell personal information, individuals' privacy is of utmost importance. The classical response is anonymization, i.e., sanitizing the information that can directly or indirectly allow users' re-identification. The most popular solution in the literature is the k-anonymity. However, it is hard to achieve k-anonymity on a continuous… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Journal ref: In 2020 IEEE International Conference on Big Data (Big Data), pp. 3996-4005. IEEE, 2020

  39. arXiv:2106.00073  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

    Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha

    Abstract: Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of devices connected in a complex network topology. The diversity and complexity of these components present an enormous attack surface, allowing an adversary to exploit security vulnerabilities of different devices to execute a potent attack. Though significant efforts have been made to improve the security of ind… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

    Comments: This article has been published in IEEE Transactions on Emerging Topics in Computing, 2021

  40. arXiv:2104.02464  [pdf, other

    eess.SY cs.AI cs.LG cs.NE

    Fast Design Space Exploration of Nonlinear Systems: Part II

    Authors: Prerit Terway, Kenza Hamidouche, Niraj K. Jha

    Abstract: Nonlinear system design is often a multi-objective optimization problem involving search for a design that satisfies a number of predefined constraints. The design space is typically very large since it includes all possible system architectures with different combinations of components composing each architecture. In this article, we address nonlinear system design space exploration through a two… ▽ More

    Submitted 8 April, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

    Comments: 14 pages, 24 figures. arXiv admin note: substantial text overlap with arXiv:2009.10214

  41. arXiv:2104.01747  [pdf

    cs.LG cs.AI

    Fast Design Space Exploration of Nonlinear Systems: Part I

    Authors: Sanjai Narain, Emily Mak, Dana Chee, Brendan Englot, Kishore Pochiraju, Niraj K. Jha, Karthik Narayan

    Abstract: System design tools are often only available as input-output blackboxes: for a given design as input they compute an output representing system behavior. Blackboxes are intended to be run in the forward direction. This paper presents a new method of solving the inverse design problem namely, given requirements or constraints on output, find an input that also optimizes an objective function. This… ▽ More

    Submitted 6 April, 2022; v1 submitted 4 April, 2021; originally announced April 2021.

    Comments: 16 pages, 27 figures. arXiv admin note: text overlap with arXiv:2010.09842

  42. arXiv:2103.01781  [pdf, other

    cs.CR eess.SY

    HW/SW Framework for Improving the Safety of Implantable and Wearable Medical Devices

    Authors: Malin Prematilake, Younghyun Kim, Vijay Raghunathan, Anand Raghunathan, N. K. Jha

    Abstract: Implantable and wearable medical devices (IWMDs) are widely used for the monitoring and therapy of an increasing range of medical conditions. Improvements in medical devices, enabled by advances in low-power processors, more complex firmware, and wireless connectivity, have greatly improved therapeutic outcomes and patients' quality-of-life. However, security attacks, malfunctions and sometimes us… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

  43. arXiv:2103.01396  [pdf, other

    cs.LG cs.CR

    DeepReDuce: ReLU Reduction for Fast Private Inference

    Authors: Nandan Kumar Jha, Zahra Ghodsi, Siddharth Garg, Brandon Reagen

    Abstract: The recent rise of privacy concerns has led researchers to devise methods for private neural inference -- where inferences are made directly on encrypted data, never seeing inputs. The primary challenge facing private inference is that computing on encrypted data levies an impractically-high latency penalty, stemming mostly from non-linear operators like ReLU. Enabling practical and private infere… ▽ More

    Submitted 22 June, 2021; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: ICML 2021

    ACM Class: I.2.m

  44. arXiv:2102.10435  [pdf, other

    cs.LG cs.HC cs.NE

    MHDeep: Mental Health Disorder Detection System based on Body-Area and Deep Neural Networks

    Authors: Shayan Hassantabar, Joe Zhang, Hongxu Yin, Niraj K. Jha

    Abstract: Mental health problems impact quality of life of millions of people around the world. However, diagnosis of mental health disorders is a challenging problem that often relies on self-reporting by patients about their behavioral patterns. Therefore, there is a need for new strategies for diagnosis of mental health problems. The recent introduction of body-area networks consisting of a plethora of a… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: 11 pages, 6 figures

  45. SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

    Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha

    Abstract: Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being deployed across multiple functionalities, ranging from healthcare devices and wearables to critical infrastructures, e.g., nuclear power plants, autonomous vehicles, smart cities, and smart homes. These devices are inherently not secure across their comprehensive software, hardware, and network stacks, thus pr… ▽ More

    Submitted 19 October, 2022; v1 submitted 7 January, 2021; originally announced January 2021.

    Comments: This article has been accepted in IEEE Transactions on Emerging Topics in Computing. 17 pages, 12 figures, IEEE copyright

    Journal ref: IEEE Transactions on Emerging Topics in Computing, 2021

  46. arXiv:2010.09842  [pdf

    cs.AI cs.LG cs.RO

    Robot Design With Neural Networks, MILP Solvers and Active Learning

    Authors: Sanjai Narain, Emily Mak, Dana Chee, Todd Huster, Jeremy Cohen, Kishore Pochiraju, Brendan Englot, Niraj K. Jha, Karthik Narayan

    Abstract: Central to the design of many robot systems and their controllers is solving a constrained blackbox optimization problem. This paper presents CNMA, a new method of solving this problem that is conservative in the number of potentially expensive blackbox function evaluations; allows specifying complex, even recursive constraints directly rather than as hard-to-design penalty or barrier functions; a… ▽ More

    Submitted 8 February, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: 22 pages, 8 figures

  47. arXiv:2010.05429  [pdf, other

    cs.NE cs.LG

    TUTOR: Training Neural Networks Using Decision Rules as Model Priors

    Authors: Shayan Hassantabar, Prerit Terway, Niraj K. Jha

    Abstract: The human brain has the ability to carry out new tasks with limited experience. It utilizes prior learning experiences to adapt the solution strategy to new domains. On the other hand, deep neural networks (DNNs) generally need large amounts of data and computational resources for training. However, this requirement is not met in many settings. To address these challenges, we propose the TUTOR DNN… ▽ More

    Submitted 15 February, 2022; v1 submitted 11 October, 2020; originally announced October 2020.

    Comments: 14 pages, 4 figures

  48. arXiv:2009.10214  [pdf, other

    cs.LG cs.NE eess.SY

    DISPATCH: Design Space Exploration of Cyber-Physical Systems

    Authors: Prerit Terway, Kenza Hamidouche, Niraj K. Jha

    Abstract: Design of cyber-physical systems (CPSs) is a challenging task that involves searching over a large search space of various CPS configurations and possible values of components composing the system. Hence, there is a need for sample-efficient CPS design space exploration to select the system architecture and component values that meet the target system requirements. We address this challenge by for… ▽ More

    Submitted 24 September, 2020; v1 submitted 21 September, 2020; originally announced September 2020.

    Comments: 14 pages

  49. arXiv:2008.02565  [pdf, other

    cs.CV cs.AR

    Modeling Data Reuse in Deep Neural Networks by Taking Data-Types into Cognizance

    Authors: Nandan Kumar Jha, Sparsh Mittal

    Abstract: In recent years, researchers have focused on reducing the model size and number of computations (measured as "multiply-accumulate" or MAC operations) of DNNs. The energy consumption of a DNN depends on both the number of MAC operations and the energy efficiency of each MAC operation. The former can be estimated at design time; however, the latter depends on the intricate data reuse patterns and un… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: Accepted at IEEE Transactions on Computers (Special Issue on Machine-Learning Architectures and Accelerators) 2020

    ACM Class: C.0; I.5.1

  50. arXiv:2007.15248  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

    Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela

    Abstract: The remarkable predictive performance of deep neural networks (DNNs) has led to their adoption in service domains of unprecedented scale and scope. However, the widespread adoption and growing commercialization of DNNs have underscored the importance of intellectual property (IP) protection. Devising techniques to ensure IP protection has become necessary due to the increasing trend of outsourcing… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: Accepted at The ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020. 25 pages, 11 tables, and 11 figures

    ACM Class: K.4.1; K.4.4