Skip to main content

Showing 1–33 of 33 results for author: Krishnamurthy, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19461  [pdf, other

    cs.RO cs.CV

    Efficient and Distributed Large-Scale 3D Map Registration using Tomographic Features

    Authors: Halil Utku Unlu, Anthony Tzes, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: A robust, resource-efficient, distributed, and minimally parameterized 3D map matching and merging algorithm is proposed. The suggested algorithm utilizes tomographic features from 2D projections of horizontal cross-sections of gravity-aligned local maps, and matches these projection slices at all possible height differences, enabling the estimation of four degrees of freedom in an efficient and p… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: Submitted to Elsevier Journal: Robotics and Autonomous Systems (RAS)

  2. arXiv:2406.05590  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

    Authors: Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess LLMs in solving CTF challenges by creating a scalable, open-source benchmark database specifically designed for these applications. This database incl… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  3. arXiv:2405.14737  [pdf, other

    cs.CV

    CLIPScope: Enhancing Zero-Shot OOD Detection with Bayesian Scoring

    Authors: Hao Fu, Naman Patel, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Detection of out-of-distribution (OOD) samples is crucial for safe real-world deployment of machine learning models. Recent advances in vision language foundation models have made them capable of detecting OOD samples without requiring in-distribution (ID) images. However, these zero-shot methods often underperform as they do not adequately consider ID class likelihoods in their detection confiden… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  4. arXiv:2405.04829  [pdf, other

    cs.CL

    Fine-tuning Pre-trained Named Entity Recognition Models For Indian Languages

    Authors: Sankalp Bahad, Pruthwik Mishra, Karunesh Arora, Rakesh Chandra Balabantaray, Dipti Misra Sharma, Parameswari Krishnamurthy

    Abstract: Named Entity Recognition (NER) is a useful component in Natural Language Processing (NLP) applications. It is used in various tasks such as Machine Translation, Summarization, Information Retrieval, and Question-Answering systems. The research on NER is centered around English and some other major languages, whereas limited attention has been given to Indian languages. We analyze the challenges an… ▽ More

    Submitted 10 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

    Comments: 8 pages, accepted in NAACL-SRW, 2024

  5. arXiv:2405.00717  [pdf, other

    cs.CL cs.AI

    Exploring News Summarization and Enrichment in a Highly Resource-Scarce Indian Language: A Case Study of Mizo

    Authors: Abhinaba Bala, Ashok Urlana, Rahul Mishra, Parameswari Krishnamurthy

    Abstract: Obtaining sufficient information in one's mother tongue is crucial for satisfying the information needs of the users. While high-resource languages have abundant online resources, the situation is less than ideal for very low-resource languages. Moreover, the insufficient reporting of vital national and international events continues to be a worry, especially in languages with scarce resources, li… ▽ More

    Submitted 25 April, 2024; originally announced May 2024.

    Comments: Accepted at LREC-COLING2024 WILDRE Workshop

    ACM Class: I.2.7

  6. arXiv:2404.15446  [pdf, other

    cs.CR eess.SY

    OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems

    Authors: Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri

    Abstract: Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compr… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  7. arXiv:2403.18206  [pdf, other

    cs.RO

    Sailing Through Point Clouds: Safe Navigation Using Point Cloud Based Control Barrier Functions

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: The capability to navigate safely in an unstructured environment is crucial when deploying robotic systems in real-world scenarios. Recently, control barrier function (CBF) based approaches have been highly effective in synthesizing safety-critical controllers. In this work, we propose a novel CBF-based local planner comprised of two components: Vessel and Mariner. The Vessel is a novel scaling fa… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  8. arXiv:2402.16926  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem

    Authors: Georg Pichler, Marco Romanelli, Divya Prakash Manivannan, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg

    Abstract: We introduce a formal statistical definition for the problem of backdoor detection in machine learning systems and use it to analyze the feasibility of such problems, providing evidence for the utility and applicability of our definition. The main contributions of this work are an impossibility result and an achievability result for backdoor detection. We show a no-free-lunch theorem, proving that… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  9. arXiv:2402.08546  [pdf, other

    cs.RO

    Grounding LLMs For Robot Task Planning Using Closed-loop State Feedback

    Authors: Vineet Bhat, Ali Umut Kaypak, Prashanth Krishnamurthy, Ramesh Karri, Farshad Khorrami

    Abstract: Robotic planning algorithms direct agents to perform actions within diverse environments to accomplish a task. Large Language Models (LLMs) like PaLM 2, GPT-3.5, and GPT-4 have revolutionized this domain, using their embedded real-world knowledge to tackle complex tasks involving multiple agents and objects. This paper introduces an innovative planning algorithm that integrates LLMs into the robot… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  10. arXiv:2311.09216  [pdf, other

    cs.CL cs.AI

    Assessing Translation capabilities of Large Language Models involving English and Indian Languages

    Authors: Vandan Mujadia, Ashok Urlana, Yash Bhaskar, Penumalla Aditya Pavani, Kukkapalli Shravya, Parameswari Krishnamurthy, Dipti Misra Sharma

    Abstract: Generative Large Language Models (LLMs) have achieved remarkable advancements in various NLP tasks. In this work, our aim is to explore the multilingual capabilities of large language models by using machine translation as a task involving English and 22 Indian languages. We first investigate the translation capabilities of raw large language models, followed by exploring the in-context learning c… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  11. arXiv:2310.18274  [pdf, other

    cs.CV cs.LG

    LipSim: A Provably Robust Perceptual Similarity Metric

    Authors: Sara Ghazanfari, Alexandre Araujo, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg

    Abstract: Recent years have seen growing interest in develo** and applying perceptual similarity metrics. Research has shown the superiority of perceptual metrics over pixel-wise metrics in aligning with human perception and serving as a proxy for the human visual system. On the other hand, as perceptual metrics rely on neural networks, there is a growing concern regarding their resilience, given the esta… ▽ More

    Submitted 29 March, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

  12. arXiv:2309.17226  [pdf, other

    cs.RO

    Differentiable Optimization Based Time-Varying Control Barrier Functions for Dynamic Obstacle Avoidance

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) provide a simple yet effective way for safe control synthesis. Recently, work has been done using differentiable optimization (diffOpt) based methods to systematically construct CBFs for static obstacle avoidance tasks between geometric shapes. In this work, we extend the application of diffOpt CBFs to perform dynamic obstacle avoidance tasks. We show that by using… ▽ More

    Submitted 23 January, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

  13. arXiv:2307.15157  [pdf, other

    cs.CV cs.LG eess.IV

    R-LPIPS: An Adversarially Robust Perceptual Similarity Metric

    Authors: Sara Ghazanfari, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Alexandre Araujo

    Abstract: Similarity metrics have played a significant role in computer vision to capture the underlying semantics of images. In recent years, advanced similarity metrics, such as the Learned Perceptual Image Patch Similarity (LPIPS), have emerged. These metrics leverage deep features extracted from trained neural networks and have demonstrated a remarkable ability to closely align with human perception whe… ▽ More

    Submitted 31 July, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

  14. arXiv:2307.05422  [pdf, other

    cs.CR cs.LG

    Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection

    Authors: Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes a data-efficient detection method for deep neural networks against backdoor attacks under a black-box scenario. The proposed approach is motivated by the intuition that features corresponding to triggers have a higher influence in determining the backdoored network output than any other benign features. To quantitatively measure the effects of triggers and benign features on de… ▽ More

    Submitted 14 July, 2023; v1 submitted 11 July, 2023; originally announced July 2023.

    Comments: Published in the IEEE Transactions on Information Forensics and Security

    Journal ref: IEEE Transactions on Information Forensics and Security 2023

  15. arXiv:2305.06902  [pdf, other

    cs.CR

    REMaQE: Reverse Engineering Math Equations from Executables

    Authors: Meet Udeshi, Prashanth Krishnamurthy, Hammond Pearce, Ramesh Karri, Farshad Khorrami

    Abstract: Cybersecurity attacks on embedded devices for industrial control systems and cyber-physical systems may cause catastrophic physical damage as well as economic loss. This could be achieved by infecting device binaries with malware that modifies the physical characteristics of the system operation. Mitigating such attacks benefits from reverse engineering tools that recover sufficient semantic knowl… ▽ More

    Submitted 11 April, 2024; v1 submitted 11 May, 2023; originally announced May 2023.

    ACM Class: C.3; D.2.5

  16. Safe Navigation and Obstacle Avoidance Using Differentiable Optimization Based Control Barrier Functions

    Authors: Bolun Dai, Rooholla Khorrambakht, Prashanth Krishnamurthy, Vinícius Gonçalves, Anthony Tzes, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) have been widely applied to safety-critical robotic applications. However, the construction of control barrier functions for robotic systems remains a challenging task. Recently, collision detection using differentiable optimization has provided a way to compute the minimum uniform scaling factor that results in an intersection between two convex shapes and to also… ▽ More

    Submitted 21 November, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

  17. arXiv:2302.00128  [pdf, other

    cs.SI

    TBAM: Towards An Agent-Based Model to Enrich Twitter Data

    Authors: Usman Anjum, Vladimir Zadorozhny, Prashant Krishnamurthy

    Abstract: Twitter (one example of microblogging) is widely being used by researchers to understand human behavior, specifically how people behave when a significant event occurs and how it changes user microblogging patterns. The changing microblogging behavior can reveal patterns that can help in detecting real-world events. However, the Twitter data that is available has limitations, such as, it is incomp… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Journal ref: 18th ISCRAM Conference Proceedings 2021

  18. arXiv:2212.08701  [pdf, other

    cs.LG

    An Upper Bound for the Distribution Overlap Index and Its Applications

    Authors: Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes an easy-to-compute upper bound for the overlap index between two probability distributions without requiring any knowledge of the distribution models. The computation of our bound is time-efficient and memory-efficient and only requires finite samples. The proposed bound shows its value in one-class classification and domain shift analysis. Specifically, in one-class classifica… ▽ More

    Submitted 11 February, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  19. arXiv:2212.06322  [pdf, other

    cs.LG cs.CR

    Privacy-Preserving Collaborative Learning through Feature Extraction

    Authors: Alireza Sarmadi, Hao Fu, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: We propose a framework in which multiple entities collaborate to build a machine learning model while preserving privacy of their data. The approach utilizes feature embeddings from shared/per-entity feature extractors transforming data into a feature space for cooperation between entities. We propose two specific methods and compare them with a baseline method. In Shared Feature Extractor (SFE) L… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  20. arXiv:2205.05429  [pdf, other

    eess.SY cs.RO

    Learning a Better Control Barrier Function

    Authors: Bolun Dai, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Control barrier functions (CBFs) are widely used in safety-critical controllers. However, constructing a valid CBF is challenging, especially under nonlinear or non-convex constraints and for high relative degree systems. Meanwhile, finding a conservative CBF that only recovers a portion of the true safe set is usually possible. In this work, starting from a "conservative" handcrafted CBF (HCBF),… ▽ More

    Submitted 11 October, 2022; v1 submitted 11 May, 2022; originally announced May 2022.

    Comments: Accepted at 61st IEEE Conference on Decision and Control (CDC) 2022

  21. Spotting Anomalous Trades in NFT Markets: The Case of NBA Topshot

    Authors: Konstantinos Pelechrinis, Xin Liu, Prashant Krishnamurthy, Amy Babay

    Abstract: Non-Fungible Token (NFT) markets are one of the fastest growing digital markets today, with the sales during the third quarter of 2021 exceeding $10 billions! Nevertheless, these emerging markets - similar to traditional emerging marketplaces - can be seen as a great opportunity for illegal activities (e.g., money laundering, sale of illegal goods etc.). In this study we focus on a specific market… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  22. arXiv:2202.01142  [pdf, other

    cs.SE cs.CR cs.LG

    Pop Quiz! Can a Large Language Model Help With Reverse Engineering?

    Authors: Hammond Pearce, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt

    Abstract: Large language models (such as OpenAI's Codex) have demonstrated impressive zero-shot multi-task capabilities in the software domain, including code explanation. In this work, we examine if this ability can be used to help with reverse engineering. Specifically, we investigate prompting Codex to identify the purpose, capabilities, and important variable names or values from code, even when the cod… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 18 pages, 19 figures. Linked dataset: https://doi.org/10.5281/zenodo.5949075

  23. arXiv:2112.04114  [pdf, other

    cs.CR cs.NI

    ESAFE: Enterprise Security and Forensics at Scale

    Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: Securing enterprise networks presents challenges in terms of both their size and distributed structure. Data required to detect and characterize malicious activities may be diffused and may be located across network and endpoint devices. Further, cyber-relevant data routinely exceeds total available storage, bandwidth, and analysis capability, often by several orders of magnitude. Real-time detect… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: 15 pages, 7 figures

  24. arXiv:2107.07931  [pdf, other

    cs.RO

    Learning Locomotion Controllers for Walking Using Deep FBSDE

    Authors: Bolun Dai, Virinchi Roy Surabhi, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: In this paper, we propose a deep forward-backward stochastic differential equation (FBSDE) based control algorithm for locomotion tasks. We also include state constraints in the FBSDE formulation to impose stable walking solutions or other constraints that one may want to consider (e.g., energy). Our approach utilizes a deep neural network (i.e., LSTM) to solve, in general, high-dimensional Hamilt… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: Submitted to IROS

  25. arXiv:2011.04065  [pdf, other

    cs.LG cs.CR

    Bait and Switch: Online Training Data Poisoning of Autonomous Driving Systems

    Authors: Naman Patel, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: We show that by controlling parts of a physical environment in which a pre-trained deep neural network (DNN) is being fine-tuned online, an adversary can launch subtle data poisoning attacks that degrade the performance of the system. While the attack can be applied in general to any perception task, we consider a DNN based traffic light classifier for an autonomous car that has been trained in on… ▽ More

    Submitted 7 December, 2020; v1 submitted 8 November, 2020; originally announced November 2020.

    Comments: To appear in the NeurIPS 2020 Workshop on Dataset Curation and Security

  26. Detecting Backdoors in Neural Networks Using Novel Feature-Based Anomaly Detection

    Authors: Hao Fu, Akshaj Kumar Veldanda, Prashanth Krishnamurthy, Siddharth Garg, Farshad Khorrami

    Abstract: This paper proposes a new defense against neural network backdooring attacks that are maliciously trained to mispredict in the presence of attacker-chosen triggers. Our defense is based on the intuition that the feature extraction layers of a backdoored network embed new features to detect the presence of a trigger and the subsequent classification layers learn to mispredict when triggers are dete… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Journal ref: IEEE Access 10 (2022): 5545-5558

  27. Hardware Trojan Detection Using Controlled Circuit Aging

    Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami

    Abstract: This paper reports a novel approach that uses transistor aging in an integrated circuit (IC) to detect hardware Trojans. When a transistor is aged, it results in delays along several paths of the IC. This increase in delay results in timing violations that reveal as timing errors at the output of the IC during its operation. We present experiments using aging-aware standard cell libraries to illus… ▽ More

    Submitted 20 April, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: 21 pages, 34 figures

  28. NNoculation: Catching BadNets in the Wild

    Authors: Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg

    Abstract: This paper proposes a novel two-stage defense (NNoculation) against backdoored neural networks (BadNets) that, repairs a BadNet both pre-deployment and online in response to backdoored test inputs encountered in the field. In the pre-deployment stage, NNoculation retrains the BadNet with random perturbations of clean validation inputs to partially reduce the adversarial impact of a backdoor. Post-… ▽ More

    Submitted 15 November, 2021; v1 submitted 19 February, 2020; originally announced February 2020.

  29. arXiv:1811.04539  [pdf, other

    cs.LG cs.RO stat.ML

    Adversarial Learning-Based On-Line Anomaly Monitoring for Assured Autonomy

    Authors: Naman Patel, Apoorva Nandini Saridena, Anna Choromanska, Prashanth Krishnamurthy, Farshad Khorrami

    Abstract: The paper proposes an on-line monitoring framework for continuous real-time safety/security in learning-based control systems (specifically application to a unmanned ground vehicle). We monitor validity of map**s from sensor inputs to actuator commands, controller-focused anomaly detection (CFAM), and from actuator commands to sensor inputs, system-focused anomaly detection (SFAM). CFAM is an im… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

    Comments: Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2018)

  30. arXiv:1701.05948  [pdf, other

    cs.GT

    Sponsored Search Auctions with Rich Ads

    Authors: Ruggiero Cavallo, Prabhakar Krishnamurthy, Maxim Sviridenko, Christopher A. Wilkens

    Abstract: The generalized second price (GSP) auction has served as the core selling mechanism for sponsored search ads for over a decade. However, recent trends expanding the set of allowed ad formats---to include a variety of sizes, decorations, and other distinguishing features---have raised critical problems for GSP-based platforms. Alternatives such as the Vickrey-Clarke-Groves (VCG) auction raise diffe… ▽ More

    Submitted 20 January, 2017; originally announced January 2017.

    Comments: Accepted to WWW 2017

  31. arXiv:1210.4517  [pdf, ps, other

    cs.SI cs.CR

    Gaming the Game: Honeypot Venues Against Cheaters in Location-based Social Networks

    Authors: Konstantinos Pelechrinis, Prashant Krishnamurthy, Ke Zhang

    Abstract: The proliferation of location-based social networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the vicinity of a user, recommendations for an area never explored before provided by other peers, tracking of… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

    Comments: Preprint - ACM HotMobile Submission

  32. arXiv:1209.2154  [pdf, ps, other

    cs.NI

    Cognitive Radio Networks: Realistic or Not?

    Authors: Konstantinos Pelechrinis, Prashant Krishnamurthy, Martin Weiss, Taied Znati

    Abstract: A large volume of research has been conducted in the cognitive radio (CR) area the last decade. However, the deployment of a commercial CR network is yet to emerge. A large portion of the existing literature does not build on real world scenarios, hence, neglecting various important interactions of the research with commercial telecommunication networks. For instance, a lot of attention has been p… ▽ More

    Submitted 10 September, 2012; originally announced September 2012.

    Comments: Work in progress

  33. arXiv:1206.6824  [pdf

    cs.LG cs.CE stat.ML

    Gene Expression Time Course Clustering with Countably Infinite Hidden Markov Models

    Authors: Matthew Beal, Praveen Krishnamurthy

    Abstract: Most existing approaches to clustering gene expression time course data treat the different time points as independent dimensions and are invariant to permutations, such as reversal, of the experimental time course. Approaches utilizing HMMs have been shown to be helpful in this regard, but are hampered by having to choose model architectures with appropriate complexities. Here we propose for a cl… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence (UAI2006)

    Report number: UAI-P-2006-PG-23-30