Skip to main content

Showing 1–25 of 25 results for author: Joshi, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16021  [pdf, other

    cs.RO

    VADER: Visual Affordance Detection and Error Recovery for Multi Robot Human Collaboration

    Authors: Michael Ahn, Montserrat Gonzalez Arenas, Matthew Bennice, Noah Brown, Christine Chan, Byron David, Anthony Francis, Gavin Gonzalez, Rainer Hessmer, Tomas Jackson, Nikhil J Joshi, Daniel Lam, Tsang-Wei Edward Lee, Alex Luong, Sharath Maddineni, Harsh Patel, Jodilyn Peralta, Jornell Quiambao, Diego Reyes, Rosario M Jauregui Ruano, Dorsa Sadigh, Pannag Sanketi, Leila Takayama, Pavel Vodenski, Fei Xia

    Abstract: Robots today can exploit the rich world knowledge of large language models to chain simple behavioral skills into long-horizon tasks. However, robots often get interrupted during long-horizon tasks due to primitive skill failures and dynamic environments. We propose VADER, a plan, execute, detect framework with seeking help as a new skill that enables robots to recover and complete long-horizon ta… ▽ More

    Submitted 30 May, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

    Comments: 9 pages, 4 figures

  2. arXiv:2404.09790  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Zongwei Wu, Eduard Zamfir, Kai Zhang, Yulun Zhang, Radu Timofte, Xiaokang Yang, Hongyuan Yu, Cheng Wan, Yuxin Hong, Zhijuan Huang, Yajun Zou, Yuan Huang, Jiamin Lin, Bingnan Han, Xianyu Guan, Yongsheng Yu, Daoan Zhang, Xuanwu Yin, Kunlong Zuo, **hua Hao, Kai Zhao, Kun Yuan, Ming Sun, Chao Zhou , et al. (63 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 challenge on image super-resolution ($\times$4), highlighting the solutions proposed and the outcomes obtained. The challenge involves generating corresponding high-resolution (HR) images, magnified by a factor of four, from low-resolution (LR) inputs using prior information. The LR images originate from bicubic downsampling degradation. The aim of the challenge i… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 webpage: https://cvlai.net/ntire/2024. Code: https://github.com/zhengchen1999/NTIRE2024_ImageSR_x4

  3. arXiv:2403.12943  [pdf, other

    cs.RO cs.AI

    Vid2Robot: End-to-end Video-conditioned Policy Learning with Cross-Attention Transformers

    Authors: Vidhi Jain, Maria Attarian, Nikhil J Joshi, Ayzaan Wahid, Danny Driess, Quan Vuong, Pannag R Sanketi, Pierre Sermanet, Stefan Welker, Christine Chan, Igor Gilitschenski, Yonatan Bisk, Debidatta Dwibedi

    Abstract: While large-scale robotic systems typically rely on textual instructions for tasks, this work explores a different approach: can robots infer the task directly from observing humans? This shift necessitates the robot's ability to decode human intent and translate it into executable actions within its physical constraints and environment. We introduce Vid2Robot, a novel end-to-end video-based learn… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: Robot learning: Imitation Learning, Robot Perception, Sensing & Vision, Gras** & Manipulation

  4. arXiv:2311.00899  [pdf, other

    cs.RO

    RoboVQA: Multimodal Long-Horizon Reasoning for Robotics

    Authors: Pierre Sermanet, Tianli Ding, Jeffrey Zhao, Fei Xia, Debidatta Dwibedi, Keerthana Gopalakrishnan, Christine Chan, Gabriel Dulac-Arnold, Sharath Maddineni, Nikhil J Joshi, Pete Florence, Wei Han, Robert Baruch, Yao Lu, Suvir Mirchandani, Peng Xu, Pannag Sanketi, Karol Hausman, Izhak Shafran, Brian Ichter, Yuan Cao

    Abstract: We present a scalable, bottom-up and intrinsically diverse data collection scheme that can be used for high-level reasoning with long and medium horizons and that has 2.2x higher throughput compared to traditional narrow top-down step-by-step collection. We collect realistic data by performing any user requests within the entirety of 3 office buildings and using multiple robot and human embodiment… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  5. arXiv:2310.14342  [pdf

    cs.HC cs.CY

    PulmoBell: Home-based Pulmonary Rehabilitation Assistive Technology for People with COPD

    Authors: Yuanxiang Ma, Andreas Polydorides, Jitesh Joshi, Youngjun Cho

    Abstract: Chronic Obstructive Pulmonary Disease (COPD) can be fatal and is challenging to live with due to its severe symptoms. Pulmonary rehabilitation (PR) is one of the managements means to maintain COPD in a stable status. However, implementation of PR in the UK has been challenging due to the environmental and personal barriers faced by patients, which hinder their uptake, adherence, and completion of… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: Short Technical Report: Best student-led project in COMP0145: Research Methods and Making Skills (2022/23)

  6. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, A**kya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (267 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 1 June, 2024; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  7. arXiv:2309.07297  [pdf, other

    cs.CV

    Multi-Modal Hybrid Learning and Sequential Training for RGB-T Saliency Detection

    Authors: Guangyu Ren, Jitesh Joshi, Youngjun Cho

    Abstract: RGB-T saliency detection has emerged as an important computer vision task, identifying conspicuous objects in challenging scenes such as dark environments. However, existing methods neglect the characteristics of cross-modal features and rely solely on network structures to fuse RGB and thermal features. To address this, we first propose a Multi-Modal Hybrid loss (MMHL) that comprises supervised a… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: 8 Pages main text, 3 pages supplementary information, 12 figures

  8. arXiv:2308.02756  [pdf, other

    cs.HC

    PhysioKit: Open-source, Low-cost Physiological Computing Toolkit for Single and Multi-user Studies

    Authors: Jitesh Joshi, Katherine Wang, Youngjun Cho

    Abstract: The proliferation of physiological sensors opens new opportunities to explore interactions, conduct experiments and evaluate the user experience with continuous monitoring of bodily functions. Commercial devices, however, can be costly or limit access to raw waveform data, while low-cost sensors are efforts-intensive to setup. To address these challenges, we introduce PhysioKit, an open-source, lo… ▽ More

    Submitted 12 September, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: 25 pages, 8 figures, 4 tables

  9. arXiv:2212.06817  [pdf, other

    cs.RO cs.AI cs.CL cs.CV cs.LG

    RT-1: Robotics Transformer for Real-World Control at Scale

    Authors: Anthony Brohan, Noah Brown, Justice Carbajal, Yevgen Chebotar, Joseph Dabis, Chelsea Finn, Keerthana Gopalakrishnan, Karol Hausman, Alex Herzog, Jasmine Hsu, Julian Ibarz, Brian Ichter, Alex Irpan, Tomas Jackson, Sally Jesmonth, Nikhil J Joshi, Ryan Julian, Dmitry Kalashnikov, Yuheng Kuang, Isabel Leal, Kuang-Huei Lee, Sergey Levine, Yao Lu, Utsav Malla, Deeksha Manjunath , et al. (26 additional authors not shown)

    Abstract: By transferring knowledge from large, diverse, task-agnostic datasets, modern machine learning models can solve specific downstream tasks either zero-shot or with small task-specific datasets to a high level of performance. While this capability has been demonstrated in other fields such as computer vision, natural language processing or speech recognition, it remains to be shown in robotics, wher… ▽ More

    Submitted 11 August, 2023; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: See website at robotics-transformer1.github.io

  10. arXiv:2209.10700  [pdf, other

    cs.CV

    Self-adversarial Multi-scale Contrastive Learning for Semantic Segmentation of Thermal Facial Images

    Authors: Jitesh Joshi, Nadia Bianchi-Berthouze, Youngjun Cho

    Abstract: Segmentation of thermal facial images is a challenging task. This is because facial features often lack salience due to high-dynamic thermal range scenes and occlusion issues. Limited availability of datasets from unconstrained settings further limits the use of the state-of-the-art segmentation networks, loss functions and learning strategies which have been built and validated for RGB images. To… ▽ More

    Submitted 7 October, 2022; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted at the British Machine Vision Conference (BMVC), 2022

  11. arXiv:2204.01691  [pdf, other

    cs.RO cs.CL cs.LG

    Do As I Can, Not As I Say: Grounding Language in Robotic Affordances

    Authors: Michael Ahn, Anthony Brohan, Noah Brown, Yevgen Chebotar, Omar Cortes, Byron David, Chelsea Finn, Chuyuan Fu, Keerthana Gopalakrishnan, Karol Hausman, Alex Herzog, Daniel Ho, Jasmine Hsu, Julian Ibarz, Brian Ichter, Alex Irpan, Eric Jang, Rosario Jauregui Ruano, Kyle Jeffrey, Sally Jesmonth, Nikhil J Joshi, Ryan Julian, Dmitry Kalashnikov, Yuheng Kuang, Kuang-Huei Lee , et al. (20 additional authors not shown)

    Abstract: Large language models can encode a wealth of semantic knowledge about the world. Such knowledge could be extremely useful to robots aiming to act upon high-level, temporally extended instructions expressed in natural language. However, a significant weakness of language models is that they lack real-world experience, which makes it difficult to leverage them for decision making within a given embo… ▽ More

    Submitted 16 August, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: See website at https://say-can.github.io/ V1. Initial Upload. V2. Added PaLM results. Added study about new capabilities (drawer manipulation, chain of thought prompting, multilingual instructions). Added an ablation study of language model size. Added an open-source version of \algname on a simulated tabletop environment. Improved readability

  12. arXiv:2109.04194  [pdf, other

    cs.HC eess.SP

    Novel Time Domain Based Upper-Limb Prosthesis Control using Incremental Learning Approach

    Authors: Sidharth Pancholi, Amit M. Joshi Deepak Joshi, Bradly S. Duerstock

    Abstract: The upper limb of the body is a vital for various kind of activities for human. The complete or partial loss of the upper limb would lead to a significant impact on daily activities of the amputees. EMG carries important information of human physique which helps to decode the various functionalities of human arm. EMG signal based bionics and prosthesis have gained huge research attention over the… ▽ More

    Submitted 13 January, 2024; v1 submitted 25 August, 2021; originally announced September 2021.

    Comments: 15 Pages, 8 Figures, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  13. arXiv:2108.04417  [pdf, other

    cs.LG cs.AI cs.CR

    Privacy-Preserving Machine Learning: Methods, Challenges and Directions

    Authors: Runhua Xu, Nathalie Baracaldo, James Joshi

    Abstract: Machine learning (ML) is increasingly being adopted in a wide variety of application domains. Usually, a well-performing ML model relies on a large volume of training data and high-powered computational resources. Such a need for and the use of huge volumes of data raise serious privacy concerns because of the potential risks of leakage of highly privacy-sensitive information; further, the evolvin… ▽ More

    Submitted 22 September, 2021; v1 submitted 9 August, 2021; originally announced August 2021.

  14. arXiv:2105.08587  [pdf, other

    cs.LG cs.AI cs.CR

    Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

    Authors: Leila Karimi, Mai Abdelhakim, James Joshi

    Abstract: With rapid advances in computing systems, there is an increasing demand for more effective and efficient access control (AC) approaches. Recently, Attribute Based Access Control (ABAC) approaches have been shown to be promising in fulfilling the AC needs of such emerging complex computing environments. An ABAC model grants access to a requester based on attributes of entities in a system and an au… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  15. arXiv:2104.11349  [pdf

    cs.DC cs.LG

    Scalable Predictive Time-Series Analysis of COVID-19: Cases and Fatalities

    Authors: Shradha Shinde, Jay Joshi, Sowmya Mareedu, Yeon Pyo Kim, Jongwook Woo

    Abstract: COVID 19 is an acute disease that started spreading throughout the world, beginning in December 2019. It has spread worldwide and has affected more than 7 million people, and 200 thousand people have died due to this infection as of Oct 2020. In this paper, we have forecasted the number of deaths and the confirmed cases in Los Angeles and New York of the United States using the traditional and Big… ▽ More

    Submitted 22 April, 2021; originally announced April 2021.

    Comments: 8 pages, 7 figures, 4 tables

  16. arXiv:2103.03918  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

    Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig

    Abstract: Federated learning (FL) has been proposed to allow collaborative training of machine learning (ML) models among multiple parties where each party can keep its data private. In this paradigm, only model updates, such as model weights or gradients, are shared. Many existing approaches have focused on horizontal FL, where each party has the entire feature set and labels in the training data set. Howe… ▽ More

    Submitted 16 June, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

  17. Blockchain-based Transparency Framework for Privacy Preserving Third-party Services

    Authors: Runhua Xu, Chao Li, James Joshi

    Abstract: Increasingly, information systems rely on computational, storage, and network resources deployed in third-party facilities such as cloud centers and edge nodes. Such an approach further exacerbates cybersecurity concerns constantly raised by numerous incidents of security and privacy attacks resulting in data leakage and identity theft, among others. These have, in turn, forced the creation of str… ▽ More

    Submitted 3 June, 2022; v1 submitted 1 February, 2021; originally announced February 2021.

    Comments: 12 pages

    Journal ref: IEEE TDSC 2022

  18. arXiv:2012.10547  [pdf, other

    cs.LG cs.CR

    NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

    Authors: Runhua Xu, James Joshi, Chao Li

    Abstract: Training a machine learning model over an encrypted dataset is an existing promising approach to address the privacy-preserving machine learning task, however, it is extremely challenging to efficiently train a deep neural network (DNN) model over encrypted data for two reasons: first, it requires large-scale computation over huge datasets; second, the existing solutions for computation over encry… ▽ More

    Submitted 17 April, 2021; v1 submitted 18 December, 2020; originally announced December 2020.

  19. arXiv:2011.06191  [pdf, other

    cs.CR

    Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions

    Authors: Runhua Xu, James Joshi

    Abstract: Increasing incidents of security compromises and privacy leakage have raised serious privacy concerns related to cyberspace. Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data. The secure computation problem, initially and formally introduced as secure two-party computation by Andrew Yao in 198… ▽ More

    Submitted 7 December, 2020; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: 15 pages, 2 figures, IEEE TPS 2020

  20. arXiv:2009.13323  [pdf

    eess.IV cs.CV cs.LG

    AI Progress in Skin Lesion Analysis

    Authors: Philippe M. Burlina, William Paul, Phil A. Mathew, Neil J. Joshi, Alison W. Rebman, John N. Aucott

    Abstract: We examine progress in the use of AI for detecting skin lesions, with particular emphasis on the erythema migrans rash of acute Lyme disease, and other lesions, such as those from conditions like herpes zoster (shingles), tinea corporis, erythema multiforme, cellulitis, insect bites, or tick bites. We discuss important challenges for these applications, in particular the problems of AI bias regard… ▽ More

    Submitted 9 October, 2020; v1 submitted 28 September, 2020; originally announced September 2020.

  21. arXiv:2003.07270  [pdf, other

    cs.CR cs.AI cs.LG

    An Automatic Attribute Based Access Control Policy Extraction from Access Logs

    Authors: Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim

    Abstract: With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based access control (ABAC) model provides a more flexible approach for addressing the authorization needs of complex and dynamic systems. While organizations… ▽ More

    Submitted 30 January, 2021; v1 submitted 16 March, 2020; originally announced March 2020.

  22. arXiv:1904.07303  [pdf, other

    cs.CR cs.LG

    CryptoNN: Training Neural Networks over Encrypted Data

    Authors: Runhua Xu, James B. D. Joshi, Chao Li

    Abstract: Emerging neural networks based machine learning techniques such as deep learning and its variants have shown tremendous potential in many application domains. However, they raise serious privacy concerns due to the risk of leakage of highly privacy-sensitive data when data collected from users is used to train neural network models to support predictive tasks. To tackle such serious privacy concer… ▽ More

    Submitted 26 April, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: ePrint

  23. arXiv:1808.07269  [pdf, other

    hep-ex cs.CV physics.data-an physics.ins-det

    A Deep Neural Network for Pixel-Level Electromagnetic Particle Identification in the MicroBooNE Liquid Argon Time Projection Chamber

    Authors: MicroBooNE collaboration, C. Adams, M. Alrashed, R. An, J. Anthony, J. Asaadi, A. Ashkenazi, M. Auger, S. Balasubramanian, B. Baller, C. Barnes, G. Barr, M. Bass, F. Bay, A. Bhat, K. Bhattacharya, M. Bishai, A. Blake, T. Bolton, L. Camilleri, D. Caratelli, I. Caro Terrazas, R. Carr, R. Castillo Fernandez, F. Cavanna , et al. (148 additional authors not shown)

    Abstract: We have developed a convolutional neural network (CNN) that can make a pixel-level prediction of objects in image data recorded by a liquid argon time projection chamber (LArTPC) for the first time. We describe the network design, training techniques, and software tools developed to train this network. The goal of this work is to develop a complete deep neural network based data reconstruction cha… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Journal ref: Phys. Rev. D 99, 092001 (2019)

  24. arXiv:1309.6204   

    cs.SI cs.CR physics.soc-ph

    A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social Networks

    Authors: Lei **, Xuelian Long, James Joshi

    Abstract: In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be consistent. Even if one of them conceals the link… ▽ More

    Submitted 1 December, 2013; v1 submitted 24 September, 2013; originally announced September 2013.

    Comments: This paper has been withdrawn by the authors

  25. arXiv:1209.0126  [pdf

    cs.IR

    Evaluation of some Information Retrieval models for Gujarati Ad hoc Monolingual Tasks

    Authors: Hardik J. Joshi, Pareek Jyoti

    Abstract: This paper describes the work towards Gujarati Ad hoc Monolingual Retrieval task for widely used Information Retrieval (IR) models. We present an indexing baseline for the Gujarati Language represented by Mean Average Precision (MAP) values. Our objective is to obtain a relative picture of a better IR model for Gujarati Language. Results show that Classical IR models like Term Frequency Inverse Do… ▽ More

    Submitted 1 September, 2012; originally announced September 2012.

    Comments: 6 pages, Some text in Gujarati Language

    Journal ref: VNSGU Journal of Science and Technology,3,2,176-181,2012