Skip to main content

Showing 1–29 of 29 results for author: Kamath, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05483  [pdf, other

    cs.SE

    Component Matching Approach in Linking Business and Application Architecture

    Authors: Suresh Kamath

    Abstract: The development of an IT strategy and ensuring that it is the best possible one for business is a key problem many organizations face. This problem is that of linking business architecture to IT architecture in general and application architecture specifically. In our earlier work we proposed Category theory as the formal language to unify the business and IT worlds with the ability to represent t… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

    Comments: 8 pages, one figure

  2. arXiv:2406.05114  [pdf, other

    cs.LG cs.CV

    The Expanding Scope of the Stability Gap: Unveiling its Presence in Joint Incremental Learning of Homogeneous Tasks

    Authors: Sandesh Kamath, Albin Soutif-Cormerais, Joost van de Weijer, Bogdan Raducanu

    Abstract: Recent research identified a temporary performance drop on previously learned tasks when transitioning to a new one. This drop is called the stability gap and has great consequences for continual learning: it complicates the direct employment of continually learning since the worse-case performance at task-boundaries is dramatic, it limits its potential as an energy-efficient training paradigm, an… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Accepted at CVPR 2024 Workshop on Continual Learning in Computer Vision (CLVision)

  3. arXiv:2405.19074  [pdf, other

    cs.CV cs.AI

    Resurrecting Old Classes with New Data for Exemplar-Free Continual Learning

    Authors: Dipam Goswami, Albin Soutif--Cormerais, Yuyang Liu, Sandesh Kamath, Bartłomiej Twardowski, Joost van de Weijer

    Abstract: Continual learning methods are known to suffer from catastrophic forgetting, a phenomenon that is particularly hard to counter for methods that do not store exemplars of previous tasks. Therefore, to reduce potential drift in the feature extractor, existing exemplar-free methods are typically evaluated in settings where the first task is significantly larger than subsequent tasks. Their performanc… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: Accepted at CVPR 2024

  4. arXiv:2403.02568  [pdf, other

    cs.HC

    Designing Born-Accessible Courses in Data Science and Visualization: Challenges and Opportunities of a Remote Curriculum Taught by Blind Instructors to Blind Students

    Authors: JooYoung Seo, Sile O'Modhrain, Yilin Xia, Sanchita Kamath, Bongshin Lee, James M. Coughlan

    Abstract: While recent years have seen a growing interest in accessible visualization tools and techniques for blind people, little attention is paid to the learning opportunities and teaching strategies of data science and visualization tailored for blind individuals. Whereas the former focuses on the accessibility issues of data visualization tools, the latter is concerned with the learnability of concept… ▽ More

    Submitted 22 May, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

  5. arXiv:2312.10534  [pdf, other

    cs.LG cs.CR cs.CV

    Rethinking Robustness of Model Attributions

    Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian

    Abstract: For machine learning models to be reliable and trustworthy, their decisions must be interpretable. As these models find increasing use in safety-critical applications, it is important that not just the model predictions but also their explanations (as feature attributions) be robust to small human-imperceptible input perturbations. Recent works have shown that many attribution methods are fragile… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: Accepted AAAI 2024

  6. arXiv:2310.17120  [pdf, other

    cs.CL cs.AI cs.LG

    Topic Segmentation of Semi-Structured and Unstructured Conversational Datasets using Language Models

    Authors: Reshmi Ghosh, Harjeet Singh Kajal, Sharanya Kamath, Dhuri Shrivastava, Samyadeep Basu, Hansi Zeng, Soundararajan Srinivasan

    Abstract: Breaking down a document or a conversation into multiple contiguous segments based on its semantic structure is an important and challenging problem in NLP, which can assist many downstream tasks. However, current works on topic segmentation often focus on segmentation of structured texts. In this paper, we comprehensively analyze the generalization capabilities of state-of-the-art topic segmentat… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted to IntelliSys 2023. arXiv admin note: substantial text overlap with arXiv:2211.14954

  7. arXiv:2306.06613  [pdf, ps, other

    cs.LG math.OC

    Parameter-free version of Adaptive Gradient Methods for Strongly-Convex Functions

    Authors: Deepak Gouda, Hassan Naveed, Salil Kamath

    Abstract: The optimal learning rate for adaptive gradient methods applied to λ-strongly convex functions relies on the parameters λ and learning rate η. In this paper, we adapt a universal algorithm along the lines of Metagrad, to get rid of this dependence on λ and η. The main idea is to concurrently run multiple experts and combine their predictions to a master algorithm. This master enjoys O(d log T) reg… ▽ More

    Submitted 14 July, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

  8. arXiv:2212.04617  [pdf, other

    eess.IV cs.CV cs.LG

    UNet Based Pipeline for Lung Segmentation from Chest X-Ray Images

    Authors: Shashank Shekhar, Ritika Nandi, H Srikanth Kamath

    Abstract: Biomedical image segmentation is one of the fastest growing fields which has seen extensive automation through the use of Artificial Intelligence. This has enabled widespread adoption of accurate techniques to expedite the screening and diagnostic processes which would otherwise take several days to finalize. In this paper, we present an end-to-end pipeline to segment lungs from chest X-ray images… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: 6 Pages

  9. arXiv:2211.14954  [pdf, other

    cs.CL cs.AI

    Topic Segmentation in the Wild: Towards Segmentation of Semi-structured & Unstructured Chats

    Authors: Reshmi Ghosh, Harjeet Singh Kajal, Sharanya Kamath, Dhuri Shrivastava, Samyadeep Basu, Soundararajan Srinivasan

    Abstract: Breaking down a document or a conversation into multiple contiguous segments based on its semantic structure is an important and challenging problem in NLP, which can assist many downstream tasks. However, current works on topic segmentation often focus on segmentation of structured texts. In this paper, we comprehensively analyze the generalization capabilities of state-of-the-art topic segmentat… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

    Comments: NeurIPS 2022 : ENLSP

  10. arXiv:2211.04780  [pdf, other

    cs.LG cs.CR cs.CV

    On the Robustness of Explanations of Deep Neural Network Models: A Survey

    Authors: Amlan Jyoti, Karthik Balaji Ganesh, Manoj Gayala, Nandita Lakshmi Tunuguntla, Sandesh Kamath, Vineeth N Balasubramanian

    Abstract: Explainability has been widely stated as a cornerstone of the responsible and trustworthy use of machine learning models. With the ubiquitous use of Deep Neural Network (DNN) models expanding to risk-sensitive and safety-critical domains, many methods have been proposed to explain the decisions of these models. Recent years have also seen concerted efforts that have shown how such explanations can… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: Under Review ACM Computing Surveys "Special Issue on Trustworthy AI"

  11. arXiv:2210.01761  [pdf, other

    cs.LG

    A Framework for Web Services Retrieval Using Bio Inspired Clustering

    Authors: Anirudha Rayasam, Siddhartha R Thota, Avinash N Bukkittu, Sowmya Kamath

    Abstract: Efficiently discovering relevant Web services with respect to a specific user query has become a growing challenge owing to the incredible growth in the field of web technologies. In previous works, different clustering models have been used to address these issues. But, most of the traditional clustering techniques are computationally intensive and fail to address all the problems involved. Also,… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

  12. arXiv:2101.07127  [pdf, other

    cs.IT

    Fundamental Limits of Demand-Private Coded Caching

    Authors: Chinmay Gurjarpadhye, Jithin Ravi, Sneha Kamath, Bikash Kumar Dey, Nikhil Karamchandani

    Abstract: We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We first show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that serves only a subset of the demands for the $N$ files and $NK$ users problem. We further use this fact to construct a demand-… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 43 pages, 6 figures

  13. arXiv:2012.02515  [pdf, other

    cs.CV cs.LG eess.IV

    AuthNet: A Deep Learning based Authentication Mechanism using Temporal Facial Feature Movements

    Authors: Mohit Raghavendra, Pravan Omprakash, B R Mukesh, Sowmya Kamath

    Abstract: Biometric systems based on Machine learning and Deep learning are being extensively used as authentication mechanisms in resource-constrained environments like smartphones and other small computing devices. These AI-powered facial recognition mechanisms have gained enormous popularity in recent years due to their transparent, contact-less and non-invasive nature. While they are effective to a larg… ▽ More

    Submitted 19 December, 2020; v1 submitted 4 December, 2020; originally announced December 2020.

    Comments: 2-page version accepted in AAAI-21 Student Abstract and Poster Program

  14. arXiv:2006.11604  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    How do SGD hyperparameters in natural training affect adversarial robustness?

    Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam

    Abstract: Learning rate, batch size and momentum are three important hyperparameters in the SGD algorithm. It is known from the work of Jastrzebski et al. arXiv:1711.04623 that large batch size training of neural networks yields models which do not generalize well. Yao et al. arXiv:1802.08241 observe that large batch training yields models that have poor adversarial robustness. In the same paper, the author… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

    Comments: Preliminary version presented in ICML 2019 Workshop on "Understanding and Improving Generalization in Deep Learning" as "On Adversarial Robustness of Small vs Large Batch Training"

  15. arXiv:2006.04449  [pdf, other

    cs.LG cs.CV stat.ML

    On Universalized Adversarial and Invariant Perturbations

    Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam

    Abstract: Convolutional neural networks or standard CNNs (StdCNNs) are translation-equivariant models that achieve translation invariance when trained on data augmented with sufficient translations. Recent work on equivariant models for a given group of transformations (e.g., rotations) has lead to group-equivariant convolutional neural networks (GCNNs). GCNNs trained on data augmented with sufficient rotat… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: Some part of this work was presented in ICML 2018 Workshop on "Towards learning with limited labels: Equivariance, Invariance,and Beyond" as "Understanding Adversarial Robustness of Symmetric Networks"

  16. arXiv:2005.08632  [pdf, other

    cs.LG cs.CV stat.ML

    Universalization of any adversarial attack using very few test examples

    Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian

    Abstract: Deep learning models are known to be vulnerable not only to input-dependent adversarial attacks but also to input-agnostic or universal adversarial attacks. Dezfooli et al. \cite{Dezfooli17,Dezfooli17anal} construct universal adversarial attack on a given model by looking at a large number of training data points and the geometry of the decision boundary near them. Subsequent work \cite{Khrulkov18… ▽ More

    Submitted 28 October, 2022; v1 submitted 18 May, 2020; originally announced May 2020.

    Comments: Appeared in ACM CODS-COMAD 2022 (Research Track)

  17. arXiv:2002.11318  [pdf, other

    cs.LG cs.CV cs.NE stat.ML

    Can we have it all? On the Trade-off between Spatial and Adversarial Robustness of Neural Networks

    Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian

    Abstract: (Non-)robustness of neural networks to small, adversarial pixel-wise perturbations, and as more recently shown, to even random spatial transformations (e.g., translations, rotations) entreats both theoretical and empirical understanding. Spatial robustness to random translations and rotations is commonly attained via equivariant models (e.g., StdCNNs, GCNNs) and training augmentation, whereas adve… ▽ More

    Submitted 10 November, 2021; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: Accepted NeurIPS 2021. Preliminary version consisting early experimental results was presented in ICML 2018 Workshop on "Towards learning with limited labels: Equivariance, Invariance,and Beyond" as "Understanding Adversarial Robustness of Symmetric Networks"

  18. arXiv:1911.06995  [pdf, other

    cs.IT

    Demand-Private Coded Caching and the Exact Trade-off for N=K=2

    Authors: Sneha Kamath, Jithin Ravi, Bikash Kumar Dey

    Abstract: The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other use… ▽ More

    Submitted 18 February, 2020; v1 submitted 16 November, 2019; originally announced November 2019.

    Comments: 8 pages, 2 figures

  19. arXiv:1911.00712  [pdf, other

    cs.CL cs.LG

    How to Pre-Train Your Model? Comparison of Different Pre-Training Models for Biomedical Question Answering

    Authors: Sanjay Kamath, Brigitte Grau, Yue Ma

    Abstract: Using deep learning models on small scale datasets would result in overfitting. To overcome this problem, the process of pre-training a model and fine-tuning it to the small scale dataset has been used extensively in domains such as image processing. Similarly for question answering, pre-training and fine-tuning can be done in several ways. Commonly reading comprehension models are used for pre-tr… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

  20. arXiv:1909.03324  [pdf, other

    cs.IT

    Demand Private Coded Caching

    Authors: Sneha Kamath

    Abstract: The work by Maddah-Ali and Niesen demonstrated the benefits in reducing the transmission rate in a noiseless broadcast network by joint design of caching and delivery schemes. In their setup, each user learns the demands of all other users in the delivery phase. In this paper, we introduce the problem of demand private coded caching where we impose a privacy requirement that no user learns any inf… ▽ More

    Submitted 7 September, 2019; originally announced September 2019.

    Comments: 14 pages, 3 figures

  21. arXiv:1807.07878  [pdf, other

    cs.IT

    An Operational Approach to Information Leakage

    Authors: Ibrahim Issa, Aaron B. Wagner, Sudeep Kamath

    Abstract: Given two random variables $X$ and $Y$, an operational approach is undertaken to quantify the ``leakage'' of information from $X$ to $Y$. The resulting measure $\mathcal{L}(X \!\! \to \!\! Y)$ is called \emph{maximal leakage}, and is defined as the multiplicative increase, upon observing $Y$, of the probability of correctly guessing a randomized function of $X$, maximized over all such randomized… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: Submitted to IEEE Transactions on Information Theory (appeared in part in CISS 2016, ISIT 2016 & 2017)

  22. arXiv:1506.01105  [pdf, other

    cs.IT

    The two-unicast problem

    Authors: Sudeep Kamath, Venkat Anantharam, David Tse, Chih-Chun Wang

    Abstract: We consider the communication capacity of wireline networks for a two-unicast traffic pattern. The network has two sources and two destinations with each source communicating a message to its own destination, subject to the capacity constraints on the directed edges of the network. We propose a simple outer bound for the problem that we call the Generalized Network Sharing (GNS) bound. We show thi… ▽ More

    Submitted 2 June, 2015; originally announced June 2015.

    Comments: 23 pages, 22 figures

  23. arXiv:1505.00769  [pdf, other

    cs.IT

    On Non-Interactive Simulation of Joint Distributions

    Authors: Sudeep Kamath, Venkat Anantharam

    Abstract: We consider the following non-interactive simulation problem: Alice and Bob observe sequences $X^n$ and $Y^n$ respectively where $\{(X_i, Y_i)\}_{i=1}^n$ are drawn i.i.d. from $P(x,y),$ and they output $U$ and $V$ respectively which is required to have a joint law that is close in total variation to a specified $Q(u,v).$ It is known that the maximal correlation of $U$ and $V$ must necessarily be n… ▽ More

    Submitted 9 April, 2016; v1 submitted 4 May, 2015; originally announced May 2015.

    Comments: 25 pages, 13 figures

  24. arXiv:1306.6839  [pdf

    cs.CR

    W3-Scrape - A Windows based Reconnaissance Tool for Web Application Fingerprinting

    Authors: Karthik R, Raghavendra Karthik, Pramod S, Sowmya Kamath

    Abstract: Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize it… ▽ More

    Submitted 24 June, 2013; originally announced June 2013.

    Comments: International Conference on Emerging Trends in Electrical, Communication and Information Technologies (ICECIT 2012), 6 pages; Organised by SRIT, Ananthpur, India during Dec 21 - 23, 2012. (Publisher - Elsevier Science & Technology; ISBN 8131234118, 9788131234112)

    ACM Class: D.4.6; E.3

  25. arXiv:1304.6133  [pdf, other

    cs.IT

    On Maximal Correlation, Hypercontractivity, and the Data Processing Inequality studied by Erkip and Cover

    Authors: Venkat Anantharam, Amin Gohari, Sudeep Kamath, Chandra Nair

    Abstract: In this paper we provide a new geometric characterization of the Hirschfeld-Gebelein-Rényi maximal correlation of a pair of random $(X,Y)$, as well as of the chordal slope of the nontrivial boundary of the hypercontractivity ribbon of $(X,Y)$ at infinity. The new characterizations lead to simple proofs for some of the known facts about these quantities. We also provide a counterexample to a data p… ▽ More

    Submitted 22 April, 2013; originally announced April 2013.

    Comments: 11 pages

  26. arXiv:1304.1677  [pdf

    cs.SE cs.IR cs.LG

    Bug Classification: Feature Extraction and Comparison of Event Model using Naïve Bayes Approach

    Authors: Sunil Joy Dommati, Ruchi Agrawal, Ram Mohana Reddy G., S. Sowmya Kamath

    Abstract: In software industries, individuals at different levels from customer to an engineer apply diverse mechanisms to detect to which class a particular bug should be allocated. Sometimes while a simple search in Internet might help, in many other cases a lot of effort is spent in analyzing the bug report to classify the bug. So there is a great need of a structured mining algorithm - where given a cra… ▽ More

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: 5 pages, International Conference on Recent Trends in Computer and Information Engineering (ICRTCIE'2012) April 13-15, 2012 Pattaya, http://psrcentre.org/images/extraimages/412138.pdf

  27. arXiv:1304.1676  [pdf

    cs.SE cs.CY cs.DC

    Research on Potential Semantic Web Service Discovery Mechanisms

    Authors: A Anji Reddy, S Sowmya Kamath

    Abstract: The field of Web services is an important paradigm in distributed application development. Currently, many businesses are seeking to convert their applications into web services because of its ability to promote inter-operability among applications. As a number of web services increase, the process of discovering appropriate web services for consumption from user's perspective gains importance. In… ▽ More

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: 6 pages, International Conference on Recent Trends in Computer Science and Engineering (ICRTCSE' 2012) May 3 - 4, 2012 Chennai, INDIA ISBN: 978-81-9089-807-2

  28. arXiv:1105.6326  [pdf, other

    cs.IT

    Two Unicast Information Flows over Linear Deterministic Networks

    Authors: I-Hsiang Wang, Sudeep U. Kamath, David N. C. Tse

    Abstract: We investigate the two unicast flow problem over layered linear deterministic networks with arbitrary number of nodes. When the minimum cut value between each source-destination pair is constrained to be 1, it is obvious that the triangular rate region {(R_1,R_2):R_1,R_2> 0, R_1+R_2< 1} can be achieved, and that one cannot achieve beyond the square rate region {(R_1,R_2):R_1,R_2> 0, R_1< 1,R_2< 1}… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: Extended version of the conference paper to be presented at ISIT 2011

  29. arXiv:0805.0337  [pdf, other

    cs.IT

    On Distributed Function Computation in Structure-Free Random Networks

    Authors: Sudeep Kamath, D. Manjunath

    Abstract: We consider in-network computation of MAX in a structure-free random multihop wireless network. Nodes do not know their relative or absolute locations and use the Aloha MAC protocol. For one-shot computation, we describe a protocol in which the MAX value becomes available at the origin in $O(\sqrt{n/\log n})$ slots with high probability. This is within a constant factor of that required by the b… ▽ More

    Submitted 5 May, 2008; originally announced May 2008.

    Comments: 13 pages, 1 figure. Accepted at IEEE International Symposium on Information Theory 2008