Skip to main content

Showing 1–50 of 63 results for author: Manjunath, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.09566  [pdf, ps, other

    eess.SP cs.LG

    Detection of Sleep Oxygen Desaturations from Electroencephalogram Signals

    Authors: Shashank Manjunath, Aarti Sathyanarayana

    Abstract: In this work, we leverage machine learning techniques to identify potential biomarkers of oxygen desaturation during sleep exclusively from electroencephalogram (EEG) signals in pediatric patients with sleep apnea. Development of a machine learning technique which can successfully identify EEG signals from patients with sleep apnea as well as identify latent EEG signals which come from subjects wh… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 4 Pages

  2. arXiv:2405.00808  [pdf, other

    cs.DS cs.CE cs.SI

    ReeSPOT: Reeb Graph Models Semantic Patterns of Normalcy in Human Trajectories

    Authors: Bowen Zhang, S. Shailja, Chandrakanth Gudavalli, Connor Levenson, Amil Khan, B. S. Manjunath

    Abstract: This paper introduces ReeSPOT, a novel Reeb graph-based method to model patterns of life in human trajectories (akin to a fingerprint). Human behavior typically follows a pattern of normalcy in day-to-day activities. This is marked by recurring activities within specific time periods. In this paper, we model this behavior using Reeb graphs where any deviation from usual day-to-day activities is en… ▽ More

    Submitted 13 May, 2024; v1 submitted 1 May, 2024; originally announced May 2024.

  3. arXiv:2401.13006  [pdf, other

    cs.AI cs.LG eess.IV

    CIMGEN: Controlled Image Manipulation by Finetuning Pretrained Generative Models on Limited Data

    Authors: Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Content creation and image editing can benefit from flexible user controls. A common intermediate representation for conditional image generation is a semantic map, that has information of objects present in the image. When compared to raw RGB pixels, the modification of semantic map is much easier. One can take a semantic map and easily modify the map to selectively insert, remove, or replace obj… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  4. arXiv:2312.07383  [pdf, ps, other

    cs.NI

    Delay analysis of the IEEE 802.11bd EDCA with repetitions

    Authors: Aditya Sarkar, Sreelakshmi Manjunath

    Abstract: We analyse the performance of the IEEE 802.11bd MAC protocol, with Enhanced Distributed Channel Access (EDCA) and repeated transmissions, in terms of the MAC access delay of packets pertaining to safety-related events. We outline Markov chain models for the contention mechanism of priority-based access categories, and derive the associated steady-state probabilities. Using these probabilities, we… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  5. arXiv:2310.10879  [pdf, other

    cs.LG cs.DC

    BLoad: Enhancing Neural Network Training with Efficient Sequential Data Handling

    Authors: Raphael Ruschel, A. S. M. Iftekhar, B. S. Manjunath, Suya You

    Abstract: The increasing complexity of modern deep neural network models and the expanding sizes of datasets necessitate the development of optimized and scalable training methods. In this white paper, we addressed the challenge of efficiently training neural network models using sequences of varying sizes. To address this challenge, we propose a novel training scheme that enables efficient distributed data… ▽ More

    Submitted 25 April, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

  6. arXiv:2306.16672  [pdf, ps, other

    cs.NI

    Towards understanding the performance of IEEE 802.11p MAC in heterogeneous traffic conditions

    Authors: MS Gayathree, Sreelakshmi Manjunath

    Abstract: Motivated by the need to study the performance of vehicular communication protocols as applicable to heterogeneous traffic conditions, we study the performance of IEEE 802.11p medium access protocol under such a traffic setup. We consider a setup comprising connected vehicles and human-driven Motorised Two Wheelers (MTWs), where the connected vehicles are required to move as platoon with a desired… ▽ More

    Submitted 12 December, 2023; v1 submitted 29 June, 2023; originally announced June 2023.

    Comments: 15 pages

  7. Topological Data Analysis of Electroencephalogram Signals for Pediatric Obstructive Sleep Apnea

    Authors: Shashank Manjunath, Jose A. Perea, Aarti Sathyanarayana

    Abstract: Topological data analysis (TDA) is an emerging technique for biological signal processing. TDA leverages the invariant topological features of signals in a metric space for robust analysis of signals even in the presence of noise. In this paper, we leverage TDA on brain connectivity networks derived from electroencephalogram (EEG) signals to identify statistical differences between pediatric patie… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  8. arXiv:2304.02767  [pdf, other

    eess.IV cs.CV cs.LG stat.ML

    MethaneMapper: Spectral Absorption aware Hyperspectral Transformer for Methane Detection

    Authors: Satish Kumar, Ivan Arevalo, ASM Iftekhar, B S Manjunath

    Abstract: Methane (CH$_4$) is the chief contributor to global climate change. Recent Airborne Visible-Infrared Imaging Spectrometer-Next Generation (AVIRIS-NG) has been very useful in quantitative map** of methane emissions. Existing methods for analyzing this data are sensitive to local terrain conditions, often require manual inspection from domain experts, prone to significant error and hence are not s… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 16 pages, 9 figures, 3 tables, Accepted to Computer Vision and Pattern Recognition (CVPR 2023) conference. CVPR 2023 Highlights paper

    ACM Class: I.2; I.3; I.5; I.7; I.m

  9. arXiv:2303.10722  [pdf, other

    cs.LG cs.AI cs.CV

    Q-RBSA: High-Resolution 3D EBSD Map Generation Using An Efficient Quaternion Transformer Network

    Authors: Devendra K. Jangid, Neal R. Brodnik, McLean P. Echlin, Tresa M. Pollock, Samantha H. Daly, B. S. Manjunath

    Abstract: Gathering 3D material microstructural information is time-consuming, expensive, and energy-intensive. Acquisition of 3D data has been accelerated by developments in serial sectioning instrument capabilities; however, for crystallographic information, the electron backscatter diffraction (EBSD) imaging modality remains rate limiting. We propose a physics-based efficient deep learning framework to r… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  10. arXiv:2301.07666  [pdf, other

    cs.CV

    DDS: Decoupled Dynamic Scene-Graph Generation Network

    Authors: A S M Iftekhar, Raphael Ruschel, Satish Kumar, Suya You, B. S. Manjunath

    Abstract: Scene-graph generation involves creating a structural representation of the relationships between objects in a scene by predicting subject-object-relation triplets from input data. However, existing methods show poor performance in detecting triplets outside of a predefined set, primarily due to their reliance on dependent feature learning. To address this issue we propose DDS -- a decoupled dynam… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  11. arXiv:2212.07044  [pdf, other

    cs.CV cs.CG q-bio.QM

    3D Neuron Morphology Analysis

    Authors: Jiaxiang Jiang, Michael Goebel, Cezar Borba, William Smith, B. S. Manjunath

    Abstract: We consider the problem of finding an accurate representation of neuron shapes, extracting sub-cellular features, and classifying neurons based on neuron shapes. In neuroscience research, the skeleton representation is often used as a compact and abstract representation of neuron shapes. However, existing methods are limited to getting and analyzing "curve" skeletons which can only be applied for… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  12. arXiv:2211.09363  [pdf, other

    cs.CV

    Generalizable Deepfake Detection with Phase-Based Motion Analysis

    Authors: Ekta Prashnani, Michael Goebel, B. S. Manjunath

    Abstract: We propose PhaseForensics, a DeepFake (DF) video detection method that leverages a phase-based motion representation of facial temporal dynamics. Existing methods relying on temporal inconsistencies for DF detection present many advantages over the typical frame-based methods. However, they still show limited cross-dataset generalization and robustness to common distortions. These shortcomings are… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

  13. arXiv:2211.08479  [pdf, other

    cs.CV cs.MM

    Context-Matched Collage Generation for Underwater Invertebrate Detection

    Authors: R. Austin McEver, Bowen Zhang, B. S. Manjunath

    Abstract: The quality and size of training sets often limit the performance of many state of the art object detectors. However, in many scenarios, it can be difficult to collect images for training, not to mention the costs associated with collecting annotations suitable for training these object detectors. For these reasons, on challenging video datasets such as the Dataset for Underwater Substrate and Inv… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  14. arXiv:2211.02696  [pdf, other

    cs.CR cs.CV cs.HC cs.LG eess.IV eess.SP

    MalGrid: Visualization Of Binary Features In Large Malware Corpora

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: The number of malware is constantly on the rise. Though most new malware are modifications of existing ones, their sheer number is quite overwhelming. In this paper, we present a novel system to visualize and map millions of malware to points in a 2-dimensional (2D) spatial grid. This enables visualizing relationships within large malware datasets that can be used to develop triage solutions to sc… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: Submitted version - MILCOM 2022 IEEE Military Communications Conference. The high-quality images in this paper can be found on Github (https://github.com/Mayachitra-Inc/MalGrid)

  15. arXiv:2210.03780  [pdf, other

    cs.CV cs.LG

    LOCL: Learning Object-Attribute Composition using Localization

    Authors: Satish Kumar, ASM Iftekhar, Ekta Prashnani, B. S. Manjunath

    Abstract: This paper describes LOCL (Learning Object Attribute Composition using Localization) that generalizes composition zero shot learning to objects in cluttered and more realistic settings. The problem of unseen Object Attribute (OA) associations has been well studied in the field, however, the performance of existing methods is limited in challenging scenes. In this context, our key contribution is a… ▽ More

    Submitted 7 October, 2022; originally announced October 2022.

    Comments: 20 pages, 7 figures, 11 tables, Accepted in British Machine Vision Conference 2022

    ACM Class: I.2; I.4; I.5; I.7; I.m

  16. arXiv:2208.07997  [pdf, other

    cs.CV q-bio.QM

    Deep Learning Enabled Time-Lapse 3D Cell Analysis

    Authors: Jiaxiang Jiang, Amil Khan, S. Shailja, Samuel A. Belteton, Michael Goebel, Daniel B. Szymanski, B. S. Manjunath

    Abstract: This paper presents a method for time-lapse 3D cell analysis. Specifically, we consider the problem of accurately localizing and quantitatively analyzing sub-cellular features, and for tracking individual cells from time-lapse 3D confocal cell image stacks. The heterogeneity of cells and the volume of multi-dimensional images presents a major challenge for fully automated analysis of morphogenesis… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

  17. arXiv:2206.08396  [pdf, other

    cs.CR

    User Customizable and Robust Geo-Indistinguishability for Location Privacy

    Authors: Primal Pappachan, Chenxi Qiu, Anna Squicciarini, Vishnu Sharma Hunsur Manjunath

    Abstract: Location obfuscation functions generated by existing systems for ensuring location privacy are monolithic and do not allow users to customize their obfuscation range. This can lead to the user being mapped in undesirable locations (e.g., shady neighborhoods) to the location-requesting services. Modifying the obfuscation function generated by a centralized server on the user side can result in poor… ▽ More

    Submitted 1 October, 2022; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: Under review

  18. Context-Driven Detection of Invertebrate Species in Deep-Sea Video

    Authors: R. Austin McEver, Bowen Zhang, Connor Levenson, A S M Iftekhar, B. S. Manjunath

    Abstract: Each year, underwater remotely operated vehicles (ROVs) collect thousands of hours of video of unexplored ocean habitats revealing a plethora of information regarding biodiversity on Earth. However, fully utilizing this information remains a challenge as proper annotations and analysis require trained scientists time, which is both limited and costly. To this end, we present a Dataset for Underwat… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Journal ref: International Journal of Computer Vision 2023

  19. arXiv:2111.04710  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    OMD: Orthogonal Malware Detection Using Audio, Image, and Static Features

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Tejaswi Nanjundaswamy, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: With the growing number of malware and cyber attacks, there is a need for "orthogonal" cyber defense approaches, which are complementary to existing methods by detecting unique malware samples that are not predicted by other methods. In this paper, we propose a novel and orthogonal malware detection (OMD) approach to identify malware using a combination of audio descriptors, image similarity descr… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  20. arXiv:2111.04703  [pdf, other

    cs.CR cs.LG eess.SP

    HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Malicious PDF documents present a serious threat to various security organizations that require modern threat intelligence platforms to effectively analyze and characterize the identity and behavior of PDF malware. State-of-the-art approaches use machine learning (ML) to learn features that characterize PDF malware. However, ML models are often susceptible to evasion attacks, in which an adversary… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: Submitted version - MILCOM 2021 IEEE Military Communications Conference

  21. arXiv:2109.14696  [pdf, other

    cs.NI cs.LG

    Time-Distributed Feature Learning in Network Traffic Classification for Internet of Things

    Authors: Yoga Suhas Kuruba Manjunath, Sihao Zhao, Xiao-** Zhang

    Abstract: The plethora of Internet of Things (IoT) devices leads to explosive network traffic. The network traffic classification (NTC) is an essential tool to explore behaviours of network flows, and NTC is required for Internet service providers (ISPs) to manage the performance of the IoT network. We propose a novel network data representation, treating the traffic data as a series of images. Thus, the ne… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

  22. arXiv:2109.10114  [pdf, other

    eess.SP cs.NI

    Virtual Reality Gaming on the Cloud: A Reality Check

    Authors: Sihao Zhao, Hatem Abou-zeid, Ramy Atawia, Yoga Suhas Kuruba Manjunath, Akram Bin Sediq, Xiao-** Zhang

    Abstract: Cloud virtual reality (VR) gaming traffic characteristics such as frame size, inter-arrival time, and latency need to be carefully studied as a first step toward scalable VR cloud service provisioning. To this end, in this paper we analyze the behavior of VR gaming traffic and Quality of Service (QoS) when VR rendering is conducted remotely in the cloud. We first build a VR testbed utilizing a clo… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

  23. Seam Carving Detection and Localization using Two-Stage Deep Neural Networks

    Authors: Lakshmanan Nataraj, Chandrakanth Gudavalli, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Seam carving is a method to resize an image in a content aware fashion. However, this method can also be used to carve out objects from images. In this paper, we propose a two-step method to detect and localize seam carved images. First, we build a detector to detect small patches in an image that has been seam carved. Next, we compute a heatmap on an image based on the patch detector's output. Us… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  24. arXiv:2108.12534  [pdf, other

    cs.CV

    SeeTheSeams: Localized Detection of Seam Carving based Image Forgery in Satellite Imagery

    Authors: Chandrakanth Gudavalli, Erik Rosten, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Seam carving is a popular technique for content aware image retargeting. It can be used to deliberately manipulate images, for example, change the GPS locations of a building or insert/remove roads in a satellite image. This paper proposes a novel approach for detecting and localizing seams in such images. While there are methods to detect seam carving based manipulations, this is the first time t… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

  25. arXiv:2108.01175  [pdf, other

    cs.CV

    A computational geometry approach for modeling neuronal fiber pathways

    Authors: S. Shailja, Angela Zhang, B. S. Manjunath

    Abstract: We propose a novel and efficient algorithm to model high-level topological structures of neuronal fibers. Tractography constructs complex neuronal fibers in three dimensions that exhibit the geometry of white matter pathways in the brain. However, most tractography analysis methods are time consuming and intractable. We develop a computational geometry-based tractography representation that aims t… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

  26. arXiv:2108.00596  [pdf, other

    cs.CV

    GTNet:Guided Transformer Network for Detecting Human-Object Interactions

    Authors: A S M Iftekhar, Satish Kumar, R. Austin McEver, Suya You, B. S. Manjunath

    Abstract: The human-object interaction (HOI) detection task refers to localizing humans, localizing objects, and predicting the interactions between each human-object pair. HOI is considered one of the fundamental steps in truly understanding complex visual scenes. For detecting HOI, it is important to utilize relative spatial configurations and object semantics to find salient spatial regions of images tha… ▽ More

    Submitted 11 September, 2023; v1 submitted 1 August, 2021; originally announced August 2021.

    Comments: accepted for presentation in Pattern Recognition and Tracking XXXIV at SPIE commerce+ defence Program

  27. arXiv:2105.14173  [pdf, other

    cs.CV

    FoveaTer: Foveated Transformer for Image Classification

    Authors: Aditya Jonnalagadda, William Yang Wang, B. S. Manjunath, Miguel P. Eckstein

    Abstract: Many animals and humans process the visual field with a varying spatial resolution (foveated vision) and use peripheral processing to make eye movements and point the fovea to acquire high-resolution information about objects of interest. This architecture results in computationally efficient rapid scene exploration. Recent progress in self-attention-based Vision Transformers, an alternative to th… ▽ More

    Submitted 2 October, 2022; v1 submitted 28 May, 2021; originally announced May 2021.

  28. arXiv:2104.05693  [pdf, other

    cs.CV

    Holistic Image Manipulation Detection using Pixel Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Michael Goebel, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Digital image forensics aims to detect images that have been digitally manipulated. Realistic image forgeries involve a combination of splicing, resampling, region removal, smoothing and other manipulation methods. While most detection methods in literature focus on detecting a particular type of manipulation, it is challenging to identify doctored images that involve a host of manipulations. In t… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  29. arXiv:2103.11589  [pdf, other

    cs.LG cs.CV

    Adversarially Optimized Mixup for Robust Classification

    Authors: Jason Bunk, Srinjoy Chattopadhyay, B. S. Manjunath, Shivkumar Chandrasekaran

    Abstract: Mixup is a procedure for data augmentation that trains networks to make smoothly interpolated predictions between datapoints. Adversarial training is a strong form of data augmentation that optimizes for worst-case predictions in a compact space around each data-point, resulting in neural networks that make much more robust predictions. In this paper, we bring these ideas together by adversarially… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  30. arXiv:2103.11002  [pdf, other

    cs.CR cs.CV

    Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

    Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Machine Learning (ML) algorithms are susceptible to adversarial attacks and deception both during training and deployment. Automatic reverse engineering of the toolchains behind these adversarial machine learning attacks will aid in recovering the tools and processes used in these attacks. In this paper, we present two techniques that support automated identification and attribution of adversarial… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

  31. arXiv:2101.10578  [pdf, other

    cs.CR cs.CV cs.LG

    Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

    Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-networ… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Submitted version - Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS) 2021

  32. arXiv:2011.09540  [pdf, other

    cs.CV eess.IV eess.SP

    StressNet: Detecting Stress in Thermal Videos

    Authors: Satish Kumar, A S M Iftekhar, Michael Goebel, Tom Bullock, Mary H. MacLean, Michael B. Miller, Tyler Santander, Barry Giesbrecht, Scott T. Grafton, B. S. Manjunath

    Abstract: Precise measurement of physiological signals is critical for the effective monitoring of human vital signs. Recent developments in computer vision have demonstrated that signals such as pulse rate and respiration rate can be extracted from digital video of humans, increasing the possibility of contact-less monitoring. This paper presents a novel approach to obtaining physiological signals and clas… ▽ More

    Submitted 23 November, 2020; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 11 pages, 10 figues, 2 tables, Conference WACV2021

    ACM Class: H.1; I.2; I.3; I.4; I.5; J.3; J.4

  33. Semi supervised segmentation and graph-based tracking of 3D nuclei in time-lapse microscopy

    Authors: S. Shailja, Jiaxiang Jiang, B. S. Manjunath

    Abstract: We propose a novel weakly supervised method to improve the boundary of the 3D segmented nuclei utilizing an over-segmented image. This is motivated by the observation that current state-of-the-art deep learning methods do not result in accurate boundaries when the training data is weakly annotated. Towards this, a 3D U-Net is trained to get the centroid of the nuclei and integrated with a simple l… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: To be submitted to ISBI 2021

    Report number: 20764170

    Journal ref: 2021 IEEE 18th International Symposium on Biomedical Imaging (ISBI)

  34. arXiv:2010.09066  [pdf, other

    cs.CV cs.LG

    Exploiting Context for Robustness to Label Noise in Active Learning

    Authors: Sudipta Paul, Shivkumar Chandrasekaran, B. S. Manjunath, Amit K. Roy-Chowdhury

    Abstract: Several works in computer vision have demonstrated the effectiveness of active learning for adapting the recognition model when new unlabeled data becomes available. Most of these works consider that labels obtained from the annotator are correct. However, in a practical scenario, as the quality of the labels depends on the annotator, some of the labels might be wrong, which results in degraded re… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

  35. arXiv:2008.05381  [pdf, other

    cs.CV cs.LG

    Improving the Performance of Fine-Grain Image Classifiers via Generative Data Augmentation

    Authors: Shashank Manjunath, Aitzaz Nathaniel, Jeff Druce, Stan German

    Abstract: Recent advances in machine learning (ML) and computer vision tools have enabled applications in a wide variety of arenas such as financial analytics, medical diagnostics, and even within the Department of Defense. However, their widespread implementation in real-world use cases poses several challenges: (1) many applications are highly specialized, and hence operate in a \emph{sparse data} domain;… ▽ More

    Submitted 12 August, 2020; originally announced August 2020.

  36. arXiv:2007.13887  [pdf, other

    cs.CV cs.LG eess.IV

    3DMaterialGAN: Learning 3D Shape Representation from Latent Space for Materials Science Applications

    Authors: Devendra K. Jangid, Neal R. Brodnik, Amil Khan, McLean P. Echlin, Tresa M. Pollock, Sam Daly, B. S. Manjunath

    Abstract: In the field of computer vision, unsupervised learning for 2D object generation has advanced rapidly in the past few years. However, 3D object generation has not garnered the same attention or success as its predecessor. To facilitate novel progress at the intersection of computer vision and materials science, we propose a 3DMaterialGAN network that is capable of recognizing and synthesizing indiv… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

  37. arXiv:2007.10466  [pdf, other

    eess.IV cs.CV

    Detection, Attribution and Localization of GAN Generated Images

    Authors: Michael Goebel, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, B. S. Manjunath

    Abstract: Recent advances in Generative Adversarial Networks (GANs) have led to the creation of realistic-looking digital images that pose a major challenge to their detection by humans or computers. GANs are used in a wide range of tasks, from modifying small attributes of an image (StarGAN [14]), transferring attributes between image pairs (CycleGAN [91]), as well as generating entirely new images (ProGAN… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  38. arXiv:2007.05615  [pdf, other

    cs.CV

    PCAMs: Weakly Supervised Semantic Segmentation Using Point Supervision

    Authors: R. Austin McEver, B. S. Manjunath

    Abstract: Current state of the art methods for generating semantic segmentation rely heavily on a large set of images that have each pixel labeled with a class of interest label or background. Coming up with such labels, especially in domains that require an expert to do annotations, comes at a heavy cost in time and money. Several methods have shown that we can learn semantic segmentation from less expensi… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

  39. arXiv:2003.05541  [pdf, other

    cs.CV

    VSGNet: Spatial Attention Network for Detecting Human Object Interactions Using Graph Convolutions

    Authors: Oytun Ulutan, A S M Iftekhar, B. S. Manjunath

    Abstract: Comprehensive visual understanding requires detection frameworks that can effectively learn and utilize object interactions while analyzing objects individually. This is the main objective in Human-Object Interaction (HOI) detection task. In particular, relative spatial reasoning and structural connections between objects are essential cues for analyzing interactions, which is addressed by the pro… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: Accepted in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2020)

  40. arXiv:1907.10419  [pdf, other

    eess.IV cs.LG q-bio.QM stat.ML

    Predicting Clinical Outcome of Stroke Patients with Tractographic Feature

    Authors: Po-Yu Kao, Jefferson W. Chen, B. S. Manjunath

    Abstract: The volume of stroke lesion is the gold standard for predicting the clinical outcome of stroke patients. However, the presence of stroke lesion may cause neural disruptions to other brain regions, and these potentially damaged regions may affect the clinical outcome of stroke patients. In this paper, we introduce the tractographic feature to capture these potentially damaged regions and predict th… ▽ More

    Submitted 19 September, 2019; v1 submitted 22 July, 2019; originally announced July 2019.

    Comments: 12 pages, 4 figures, 3 tables. Accepted by MICCAI-BrainLesion 2019 as an oral presentation

  41. arXiv:1907.06302  [pdf, ps, other

    cs.NI eess.SY

    Compound TCP with Random Early Detection (RED): stability, bifurcation and performance analyses

    Authors: Sreelakshmi Manjunath, Gaurav Raina

    Abstract: The problem of increased queueing delays in the Internet motivates the study of currently implemented transport protocols and active queue management (AQM) policies. We study Compound TCP (default protocol in Windows) with Random Early Detection (RED). RED uses an exponentially weighted moving average of the queue size to make packet-drop** decisions, aiming to control the queue size. One must s… ▽ More

    Submitted 14 July, 2019; originally announced July 2019.

    Comments: 46 pages, 19 figures

  42. arXiv:1907.00281  [pdf, other

    cs.CV cs.LG eess.IV

    Improving 3D U-Net for Brain Tumor Segmentation by Utilizing Lesion Prior

    Authors: Po-Yu Kao, Jefferson W. Chen, B. S. Manjunath

    Abstract: We propose a novel, simple and effective method to integrate lesion prior and a 3D U-Net for improving brain tumor segmentation. First, we utilize the ground-truth brain tumor lesions from a group of patients to generate the heatmaps of different types of lesions. These heatmaps are used to create the volume-of-interest (VOI) map which contains prior information about brain tumor lesions. The VOI… ▽ More

    Submitted 19 February, 2020; v1 submitted 29 June, 2019; originally announced July 2019.

    Comments: 5 pages, 4 figures, 1 table, LNCS format

  43. arXiv:1904.07387  [pdf, other

    cs.LG cs.CV stat.ML

    Predicting Fluid Intelligence of Children using T1-weighted MR Images and a StackNet

    Authors: Po-Yu Kao, Angela Zhang, Michael Goebel, Jefferson W. Chen, B. S. Manjunath

    Abstract: In this work, we utilize T1-weighted MR images and StackNet to predict fluid intelligence in adolescents. Our framework includes feature extraction, feature normalization, feature denoising, feature selection, training a StackNet, and predicting fluid intelligence. The extracted feature is the distribution of different brain tissues in different brain parcellation regions. The proposed StackNet co… ▽ More

    Submitted 11 May, 2020; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: 8 pages, 2 figures, 3 tables, Accepted by MICCAI ABCD-NP Challenge 2019; Added NDA

  44. arXiv:1903.06836  [pdf, other

    cs.CV eess.IV

    Detecting GAN generated Fake Images using Co-occurrence Matrices

    Authors: Lakshmanan Nataraj, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, Amit K. Roy-Chowdhury, B. S. Manjunath

    Abstract: The advent of Generative Adversarial Networks (GANs) has brought about completely novel ways of transforming and manipulating pixels in digital images. GAN based techniques such as Image-to-Image translations, DeepFakes, and other automated methods have become increasingly popular in creating fake images. In this paper, we propose a novel approach to detect GAN generated fake images using a combin… ▽ More

    Submitted 2 October, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

  45. Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries

    Authors: Jawadul H. Bappy, Cody Simons, Lakshmanan Nataraj, B. S. Manjunath, Amit K. Roy-Chowdhury

    Abstract: With advanced image journaling tools, one can easily alter the semantic meaning of an image by exploiting certain manipulation techniques such as copy-clone, object splicing, and removal, which mislead the viewers. In contrast, the identification of these manipulations becomes a very challenging task as manipulated regions are not visually apparent. This paper proposes a high-confidence manipulati… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

  46. Accurate 3D Cell Segmentation using Deep Feature and CRF Refinement

    Authors: Jiaxiang Jiang, Po-Yu Kao, Samuel A. Belteton, Daniel B. Szymanski, B. S. Manjunath

    Abstract: We consider the problem of accurately identifying cell boundaries and labeling individual cells in confocal microscopy images, specifically, 3D image stacks of cells with tagged cell membranes. Precise identification of cell boundaries, their shapes, and quantifying inter-cellular space leads to a better understanding of cell morphogenesis. Towards this, we outline a cell segmentation method that… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

    Comments: 5 pages, 5 figures, 3 tables

    Journal ref: 2019 IEEE International Conference on Image Processing (ICIP)

  47. arXiv:1902.04038  [pdf, other

    cs.CV

    Deep Learning Methods for Event Verification and Image Repurposing Detection

    Authors: M. Goebel, A. Flenner, L. Nataraj, B. S. Manjunath

    Abstract: The authenticity of images posted on social media is an issue of growing concern. Many algorithms have been developed to detect manipulated images, but few have investigated the ability of deep neural network based approaches to verify the authenticity of image labels, such as event names. In this paper, we propose several novel methods to predict if an image was captured at one of several notewor… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  48. arXiv:1901.09088  [pdf, other

    eess.IV cs.CV physics.med-ph

    Automated Segmentation of CT Scans for Normal Pressure Hydrocephalus

    Authors: Angela Zhang, Po-Yu Kao, Ronald Sahyouni, Ashutosh Shelat, Jefferson Chen, B. S. Manjunath

    Abstract: Normal Pressure Hydrocephalus (NPH) is one of the few reversible forms of dementia, Due to their low cost and versatility, Computed Tomography (CT) scans have long been used as an aid to help diagnose intracerebral anomalies such as NPH. However, no well-defined and effective protocol currently exists for the analysis of CT scan-based ventricular, cerebral mass and subarachnoid space volumes in th… ▽ More

    Submitted 23 July, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    MSC Class: 92-04

  49. arXiv:1812.11631  [pdf, other

    cs.CV

    Actor Conditioned Attention Maps for Video Action Detection

    Authors: Oytun Ulutan, Swati Rallapalli, Mudhakar Srivatsa, Carlos Torres, B. S. Manjunath

    Abstract: While observing complex events with multiple actors, humans do not assess each actor separately, but infer from the context. The surrounding context provides essential information for understanding actions. To this end, we propose to replace region of interest(RoI) pooling with an attention module, which ranks each spatio-temporal region's relevance to a detected actor instead of crop**. We refe… ▽ More

    Submitted 10 May, 2020; v1 submitted 30 December, 2018; originally announced December 2018.

    Comments: WACV2020 Paper

    Journal ref: In The IEEE Winter Conference on Applications of Computer Vision (pp. 527-536) 2020

  50. arXiv:1811.02629  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    Identifying the Best Machine Learning Algorithms for Brain Tumor Segmentation, Progression Assessment, and Overall Survival Prediction in the BRATS Challenge

    Authors: Spyridon Bakas, Mauricio Reyes, Andras Jakab, Stefan Bauer, Markus Rempfler, Alessandro Crimi, Russell Takeshi Shinohara, Christoph Berger, Sung Min Ha, Martin Rozycki, Marcel Prastawa, Esther Alberts, Jana Lipkova, John Freymann, Justin Kirby, Michel Bilello, Hassan Fathallah-Shaykh, Roland Wiest, Jan Kirschke, Benedikt Wiestler, Rivka Colen, Aikaterini Kotrotsou, Pamela Lamontagne, Daniel Marcus, Mikhail Milchenko , et al. (402 additional authors not shown)

    Abstract: Gliomas are the most common primary brain malignancies, with different degrees of aggressiveness, variable prognosis and various heterogeneous histologic sub-regions, i.e., peritumoral edematous/invaded tissue, necrotic core, active and non-enhancing core. This intrinsic heterogeneity is also portrayed in their radio-phenotype, as their sub-regions are depicted by varying intensity profiles dissem… ▽ More

    Submitted 23 April, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

    Comments: The International Multimodal Brain Tumor Segmentation (BraTS) Challenge