Skip to main content

Showing 1–29 of 29 results for author: Mehra, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10737  [pdf, other

    cs.LG cs.CV

    Dynamic Domains, Dynamic Solutions: DPCore for Continual Test-Time Adaptation

    Authors: Yunbei Zhang, Akshay Mehra, Jihun Hamm

    Abstract: Continual Test-Time Adaptation (TTA) seeks to adapt a source pre-trained model to continually changing, unlabeled target domains. Existing TTA methods are typically designed for environments where domain changes occur gradually and can struggle in more dynamic scenarios. Inspired by the principles of online K-Means, this paper introduces a novel approach to continual TTA through visual prompting.… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

  2. arXiv:2405.01451  [pdf, other

    cs.LG

    Test-time Assessment of a Model's Performance on Unseen Domains via Optimal Transport

    Authors: Akshay Mehra, Yunbei Zhang, Jihun Hamm

    Abstract: Gauging the performance of ML models on data from unseen domains at test-time is essential yet a challenging problem due to the lack of labels in this setting. Moreover, the performance of these models on in-distribution data is a poor indicator of their performance on data from unseen domains. Thus, it is essential to develop metrics that can provide insights into the model's performance at test… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2404.01542  [pdf, other

    cs.LG

    Predicting the Performance of Foundation Models via Agreement-on-the-Line

    Authors: Aman Mehra, Rahul Saxena, Taeyoun Kim, Christina Baek, Zico Kolter, Aditi Raghunathan

    Abstract: Estimating the out-of-distribution performance in regimes where labels are scarce is critical to safely deploy foundation models. Recently, it was shown that ensembles of neural networks observe the phenomena ``agreement-on-the-line'', which can be leveraged to reliably predict OOD performance without labels. However, in contrast to classical neural networks that are trained on in-distribution dat… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  4. arXiv:2401.15595  [pdf, other

    cs.HC cs.CY

    Comuniqa : Exploring Large Language Models for improving speaking skills

    Authors: Manas Mhasakar, Shikhar Sharma, Apurv Mehra, Utkarsh Venaik, Ujjwal Singhal, Dhruv Kumar, Kashish Mittal

    Abstract: In this paper, we investigate the potential of Large Language Models (LLMs) to improve English speaking skills. This is particularly relevant in countries like India, where English is crucial for academic, professional, and personal communication but remains a non-native language for many. Traditional methods for enhancing speaking skills often rely on human experts, which can be limited in terms… ▽ More

    Submitted 14 May, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

    Comments: Accepted at 7th ACM SIGCAS/SIGCHI Conference of Computing and Sustainable Societies : ACM COMPASS 2024

  5. arXiv:2312.08577  [pdf, ps, other

    cs.IT

    Federated Learning for Wireless Applications: A Prototype

    Authors: Varun Laxman Muttepawar, Arjun Mehra, Zubair Shaban, Ranjitha Prasad, Harshan Jagadeesh

    Abstract: Wireless embedded edge devices are ubiquitous in our daily lives, enabling them to gather immense data via onboard sensors and mobile applications. This offers an amazing opportunity to train machine learning (ML) models in the realm of wireless devices for decision-making. Training ML models in a wireless setting necessitates transmitting datasets collected at the edge to a cloud parameter server… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Comments: COMSNETS 2024 Demo Track (Accepted)

  6. arXiv:2311.02017  [pdf, other

    cs.LG cs.AI

    DeliverAI: Reinforcement Learning Based Distributed Path-Sharing Network for Food Deliveries

    Authors: Ashman Mehra, Snehanshu Saha, Vaskar Raychoudhury, Archana Mathur

    Abstract: Delivery of items from the producer to the consumer has experienced significant growth over the past decade and has been greatly fueled by the recent pandemic. Amazon Fresh, Shopify, UberEats, InstaCart, and DoorDash are rapidly growing and are sharing the same business model of consumer items or food delivery. Existing food delivery methods are sub-optimal because each delivery is individually op… ▽ More

    Submitted 11 February, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

  7. arXiv:2307.08551  [pdf, other

    cs.CV

    On the Fly Neural Style Smoothing for Risk-Averse Domain Generalization

    Authors: Akshay Mehra, Yunbei Zhang, Bhavya Kailkhura, Jihun Hamm

    Abstract: Achieving high accuracy on data from domains unseen during training is a fundamental challenge in domain generalization (DG). While state-of-the-art DG classifiers have demonstrated impressive performance across various tasks, they have shown a bias towards domain-dependent information, such as image styles, rather than domain-invariant information, such as image content. This bias renders them un… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  8. arXiv:2307.00823  [pdf, other

    cs.LG

    Analysis of Task Transferability in Large Pre-trained Classifiers

    Authors: Akshay Mehra, Yunbei Zhang, Jihun Hamm

    Abstract: Transfer learning transfers the knowledge acquired by a model from a source task to multiple downstream target tasks with minimal fine-tuning. The success of transfer learning at improving performance, especially with the use of large pre-trained models has made transfer learning an essential tool in the machine learning toolbox. However, the conditions under which the performance is transferable… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  9. arXiv:2212.01562  [pdf, other

    cs.LG cs.CV

    Understanding the Robustness of Multi-Exit Models under Common Corruptions

    Authors: Akshay Mehra, Skyler Seto, Navdeep Jaitly, Barry-John Theobald

    Abstract: Multi-Exit models (MEMs) use an early-exit strategy to improve the accuracy and efficiency of deep neural networks (DNNs) by allowing samples to exit the network before the last layer. However, the effectiveness of MEMs in the presence of distribution shifts remains largely unexplored. Our work examines how distribution shifts generated by common image corruptions affect the accuracy/efficiency of… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

    Comments: 16 pages, 22 figures

  10. arXiv:2208.04489  [pdf, other

    cs.CL

    Exploring Hate Speech Detection with HateXplain and BERT

    Authors: Arvind Subramaniam, Aryan Mehra, Sayani Kundu

    Abstract: Hate Speech takes many forms to target communities with derogatory comments, and takes humanity a step back in societal progress. HateXplain is a recently published and first dataset to use annotated spans in the form of rationales, along with speech classification categories and targeted communities to make the classification more humanlike, explainable, accurate and less biased. We tune BERT to… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2012.10289 by other authors

  11. arXiv:2206.12364  [pdf, other

    cs.LG

    On Certifying and Improving Generalization to Unseen Domains

    Authors: Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

    Abstract: Domain Generalization (DG) aims to learn models whose performance remains high on unseen domains encountered at test-time by using data from multiple related source domains. Many existing DG algorithms reduce the divergence between source distributions in a representation space to potentially align the unseen domain close to the sources. This is motivated by the analysis that explains generalizati… ▽ More

    Submitted 24 June, 2022; originally announced June 2022.

  12. Telechain: Bridging Telecom Policy and Blockchain Practice

    Authors: Sudheesh Singanamalla, Apurv Mehra, Nishanth Chandran, Himanshi Lohchab, Seshanuradha Chava, Asit Kadayan, Sunil Bajpai, Kurtis Heimerl, Richard Anderson, Satya Lokam

    Abstract: The use of blockchain in regulatory ecosystems is a promising approach to address challenges of compliance among mutually untrusted entities. In this work, we consider applications of blockchain technologies in telecom regulations. In particular, we address growing concerns around Unsolicited Commercial Communication (UCC aka. spam) sent through text messages (SMS) and phone calls in India. Despit… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 20 pages, 6 figures, 1 table

    ACM Class: J.7; K.4.1; K.4.3

    Journal ref: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies (COMPASS) (COMPASS '22), June 29-July 1, 2022, Seattle, WA, USA

  13. arXiv:2112.00659  [pdf, other

    cs.LG cs.AI cs.CR

    Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines

    Authors: Jiachen Sun, Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Dan Hendrycks, Jihun Hamm, Z. Morley Mao

    Abstract: Certified robustness guarantee gauges a model's robustness to test-time attacks and can assess the model's readiness for deployment in the real world. In this work, we critically examine how the adversarial robustness guarantees from randomized smoothing-based certification methods change when state-of-the-art certifiably robust models encounter out-of-distribution (OOD) data. Our analysis demonst… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

    Comments: 21 pages, 15 figures, and 9 tables

  14. arXiv:2107.03919  [pdf, other

    cs.LG

    Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning

    Authors: Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

    Abstract: Unsupervised domain adaptation (UDA) enables cross-domain learning without target domain labels by transferring knowledge from a labeled source domain whose distribution differs from that of the target. However, UDA is not always successful and several accounts of `negative transfer' have been reported in the literature. In this work, we prove a simple lower bound on the target domain error that c… ▽ More

    Submitted 3 November, 2021; v1 submitted 8 July, 2021; originally announced July 2021.

    Comments: Neurips 2021

  15. arXiv:2106.07925  [pdf, other

    cs.LG cs.AI

    Machine Learning with Electronic Health Records is vulnerable to Backdoor Trigger Attacks

    Authors: Byunggill Joe, Akshay Mehra, Insik Shin, Jihun Hamm

    Abstract: Electronic Health Records (EHRs) provide a wealth of information for machine learning algorithms to predict the patient outcome from the data including diagnostic information, vital signals, lab tests, drug administration, and demographic information. Machine learning models can be built, for example, to evaluate patients based on their predicted mortality or morbidity and to predict required reso… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Journal ref: AAAI 2021 Workshop on Trustworthy AI for Healthcare

  16. arXiv:2101.01693  [pdf, other

    cs.CY

    COVID-19 Tests Gone Rogue: Privacy, Efficacy, Mismanagement and Misunderstandings

    Authors: Manuel Morales, Rachel Barbar, Darshan Gandhi, Sanskruti Landage, Joseph Bae, Arpita Vats, Jil Kothari, Sheshank Shankar, Rohan Sukumaran, Himi Mathur, Krutika Misra, Aishwarya Saxena, Parth Patwa, Sethuraman T. V., Maurizio Arseni, Shailesh Advani, Kasia Jakimowicz, Sunaina Anand, Priyanshi Katiyar, Ashley Mehra, Rohan Iyer, Srinidhi Murali, Aryan Mahindra, Mikhail Dmitrienko, Saurish Srivastava , et al. (5 additional authors not shown)

    Abstract: COVID-19 testing, the cornerstone for effective screening and identification of COVID-19 cases, remains paramount as an intervention tool to curb the spread of COVID-19 both at local and national levels. However, the speed at which the pandemic struck and the response was rolled out, the widespread impact on healthcare infrastructure, the lack of sufficient preparation within the public health sys… ▽ More

    Submitted 7 May, 2021; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: 22 pages, 2 figures

  17. arXiv:2012.01772  [pdf, other

    cs.CY

    Digital Landscape of COVID-19 Testing: Challenges and Opportunities

    Authors: Darshan Gandhi, Rohan Sukumaran, Priyanshi Katiyar, Alex Radunsky, Sunaina Anand, Shailesh Advani, Jil Kothari, Kasia Jakimowicz, Sheshank Shankar, Sethuraman T. V., Krutika Misra, Aishwarya Saxena, Sanskruti Landage, Richa Sonker, Parth Patwa, Aryan Mahindra, Mikhail Dmitrienko, Kanishka Vaish, Ashley Mehra, Srinidhi Murali, Rohan Iyer, Joseph Bae, Vivek Sharma, Abhishek Singh, Rachel Barbar , et al. (1 additional authors not shown)

    Abstract: The COVID-19 Pandemic has left a devastating trail all over the world, in terms of loss of lives, economic decline, travel restrictions, trade deficit, and collapsing economy including real-estate, job loss, loss of health benefits, the decline in quality of access to care and services and overall quality of life. Immunization from the anticipated vaccines will not be the stand-alone guideline tha… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: 28 pages, 4 figures

  18. arXiv:2012.01274  [pdf, other

    cs.LG

    How Robust are Randomized Smoothing based Defenses to Data Poisoning?

    Authors: Akshay Mehra, Bhavya Kailkhura, Pin-Yu Chen, Jihun Hamm

    Abstract: Predictions of certifiably robust classifiers remain constant in a neighborhood of a point, making them resilient to test-time attacks with a guarantee. In this work, we present a previously unrecognized threat to robust machine learning models that highlights the importance of training-data quality in achieving high certified adversarial robustness. Specifically, we propose a novel bilevel optimi… ▽ More

    Submitted 30 March, 2021; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: CVPR 2021

  19. arXiv:2010.07277  [pdf, other

    cs.DC

    Blockene: A High-throughput Blockchain Over Mobile Devices

    Authors: Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam

    Abstract: We introduce Blockene, a blockchain that reduces resource usage at member nodes by orders of magnitude, requiring only a smartphone to participate in block validation and consensus. Despite being lightweight, Blockene provides a high throughput of transactions and scales to a large number of participants. Blockene consumes negligible battery and data in smartphones, enabling millions of users to p… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: A version of this paper (without the appendix) will appear in OSDI 2020

  20. arXiv:2006.05812  [pdf

    cs.CY cs.CR cs.NI

    COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers

    Authors: Ramesh Raskar, Greg Nadeau, John Werner, Rachel Barbar, Ashley Mehra, Gabriel Harp, Markus Leopoldseder, Bryan Wilson, Derrick Flakoll, Praneeth Vepakomma, Deepti Pahwa, Robson Beaudry, Emelin Flores, Maciej Popielarz, Akanksha Bhatia, Andrea Nuzzo, Matt Gee, Jay Summet, Rajeev Surati, Bikram Khastgir, Francesco Maria Benedetti, Kristen Vilcans, Sienna Leis, Khahlil Louisy

    Abstract: A number of groups, from governments to non-profits, have quickly acted to innovate the contact-tracing process: they are designing, building, and launching contact-tracing apps in response to the COVID-19 crisis. A diverse range of approaches exist, creating challenging choices for officials looking to implement contact-tracing technology in their community and raising concerns about these choice… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: 32 pages

  21. arXiv:2006.03204  [pdf, other

    cs.CV cs.AI cs.LG

    Black-box Explanation of Object Detectors via Saliency Maps

    Authors: Vitali Petsiuk, Rajiv Jain, Varun Manjunatha, Vlad I. Morariu, Ashutosh Mehra, Vicente Ordonez, Kate Saenko

    Abstract: We propose D-RISE, a method for generating visual explanations for the predictions of object detectors. Utilizing the proposed similarity metric that accounts for both localization and categorization aspects of object detection allows our method to produce saliency maps that show image areas that most affect the prediction. D-RISE can be considered "black-box" in the software testing sense, as it… ▽ More

    Submitted 10 June, 2021; v1 submitted 4 June, 2020; originally announced June 2020.

    Comments: CVPR 2021 (oral). Project page https://cs-people.bu.edu/vpetsiuk/drise/

  22. arXiv:2005.03457  [pdf, other

    cs.CV

    NTIRE 2020 Challenge on NonHomogeneous Dehazing

    Authors: Codruta O. Ancuti, Cosmin Ancuti, Florin-Alexandru Vasluianu, Radu Timofte, **g Liu, Haiyan Wu, Yuan Xie, Yanyun Qu, Lizhuang Ma, Ziling Huang, Qili Deng, Ju-Chin Chao, Tsung-Shan Yang, Peng-Wen Chen, Po-Min Hsu, Tzu-Yi Liao, Chung-En Sun, Pei-Yuan Wu, Jeonghyeok Do, Jongmin Park, Munchurl Kim, Kareem Metwaly, Xuelu Li, Tiantong Guo, Vishal Monga , et al. (27 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2020 Challenge on NonHomogeneous Dehazing of images (restoration of rich details in hazy image). We focus on the proposed solutions and their results evaluated on NH-Haze, a novel dataset consisting of 55 pairs of real haze free and nonhomogeneous hazy images recorded outdoor. NH-Haze is the first realistic nonhomogeneous haze dataset that provides ground truth images.… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: CVPR Workshops Proceedings 2020

  23. arXiv:2004.07800  [pdf, other

    cs.HC eess.AS

    Leveraging GANs to Improve Continuous Path Keyboard Input Models

    Authors: Akash Mehra, Jerome R. Bellegarda, Ojas Bapat, Partha Lal, Xin Wang

    Abstract: Continuous path keyboard input has higher inherent ambiguity than standard tap**, because the path trace may exhibit not only local overshoots/undershoots (as in tap**) but also, depending on the user, substantial mid-path excursions. Deploying a robust solution thus requires a large amount of high-quality training data, which is difficult to collect/annotate. In this work, we address this cha… ▽ More

    Submitted 6 October, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

  24. arXiv:1911.03432  [pdf, other

    cs.LG math.OC stat.ML

    Penalty Method for Inversion-Free Deep Bilevel Optimization

    Authors: Akshay Mehra, Jihun Hamm

    Abstract: Solving a bilevel optimization problem is at the core of several machine learning problems such as hyperparameter tuning, data denoising, meta- and few-shot learning, and training-data poisoning. Different from simultaneous or multi-objective optimization, the steepest descent direction for minimizing the upper-level cost in a bilevel problem requires the inverse of the Hessian of the lower-level… ▽ More

    Submitted 5 October, 2021; v1 submitted 8 November, 2019; originally announced November 2019.

    Comments: ACML 2021

  25. arXiv:1802.04204  [pdf, other

    cs.LG stat.ML

    Fast Interactive Image Retrieval using large-scale unlabeled data

    Authors: Akshay Mehra, Jihun Hamm, Mikhail Belkin

    Abstract: An interactive image retrieval system learns which images in the database belong to a user's query concept, by analyzing the example images and feedback provided by the user. The challenge is to retrieve the relevant images with minimal user interaction. In this work, we propose to solve this problem by posing it as a binary classification task of classifying all images in the database as being re… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: 15 Pages, Submitted to KDD 2018

  26. arXiv:1711.04368  [pdf, other

    cs.LG stat.ML

    Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples

    Authors: Jihun Hamm, Akshay Mehra

    Abstract: Recently, researchers have discovered that the state-of-the-art object classifiers can be fooled easily by small perturbations in the input unnoticeable to human eyes. It is also known that an attacker can generate strong adversarial examples if she knows the classifier parameters. Conversely, a defender can robustify the classifier by retraining if she has access to the adversarial examples. We e… ▽ More

    Submitted 26 June, 2018; v1 submitted 12 November, 2017; originally announced November 2017.

  27. arXiv:1606.02480  [pdf

    cs.CY

    A Framework for Techniques for Information Technology Enabled Innovation

    Authors: Yajur Chadha, Aditi Mehra, Shirley Gregor, Alex Richardson

    Abstract: Australia is seen as lagging in the innovation that is needed for corporate success and national productivity gains. There is an apparent lack of consistent and integrated advice to managers on how to undertake innovation. Thus, this study aims to develop and investigate a framework that relates innovation practices to the type of innovation outcome, in the context of Information Technology (IT) e… ▽ More

    Submitted 8 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/158

  28. arXiv:1005.4030  [pdf

    cs.CY

    Scope of cloud computing for SMEs in India

    Authors: Monika Sharma, Ashwani Mehra, Haresh Jola, Anand Kumar, Madhvendra Misra, Vijayshri Tiwari

    Abstract: Cloud computing is a set of services that provide infrastructure resources using internet media and data storage on a third party server. SMEs are said to be the lifeblood of any vibrant economy. They are known to be the silent drivers of a nation's economy. SMEs of India are one of the most aggressive adopters of ERP Packages. Most of the Indian SMEs have adopted the traditional ERP Systems and h… ▽ More

    Submitted 21 May, 2010; originally announced May 2010.

    Comments: http://www.journalofcomputing.org

    Journal ref: Journal of Computing, Volume 2, Issue 5, May 2010

  29. arXiv:1004.4478  [pdf

    cs.SD

    Intelligent System for Speaker Identification using Lip features with PCA and ICA

    Authors: Anuj Mehra, Anupam Shukla, Mahender Kumawat, Rajiv Ranjan, Ritu Tiwari

    Abstract: Biometric authentication techniques are more consistent and efficient than conventional authentication techniques and can be used in monitoring, transaction authentication, information retrieval, access control, forensics, etc. In this paper, we have presented a detailed comparative analysis between Principle Component Analysis (PCA) and Independent Component Analysis (ICA) which are used for feat… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010, 120-127