Skip to main content

Showing 1–6 of 6 results for author: Mehrotra, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06715  [pdf, other

    cs.CL cs.AI

    Enhancing Creativity in Large Language Models through Associative Thinking Strategies

    Authors: Pronita Mehrotra, Aishni Parab, Sumit Gulwani

    Abstract: This paper explores the enhancement of creativity in Large Language Models (LLMs) like vGPT-4 through associative thinking, a cognitive process where creative ideas emerge from linking seemingly unrelated concepts. Associative thinking strategies have been found to effectively help humans boost creativity. However, whether the same strategies can help LLMs become more creative remains under-explor… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  2. arXiv:2404.00766  [pdf, other

    cs.DB

    SoK: The Faults in our Graph Benchmarks

    Authors: Puneet Mehrotra, Vaastav Anand, Daniel Margo, Milad Rezaei Hajidehi, Margo Seltzer

    Abstract: Graph-structured data is prevalent in domains such as social networks, financial transactions, brain networks, and protein interactions. As a result, the research community has produced new databases and analytics engines to process such data. Unfortunately, there is not yet widespread benchmark standardization in graph processing, and the heterogeneity of evaluations found in the literature can l… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

  3. arXiv:2403.00861  [pdf, ps, other

    cs.AI cs.LG

    Pivoting Retail Supply Chain with Deep Generative Techniques: Taxonomy, Survey and Insights

    Authors: Yuan Wang, Lokesh Kumar Sambasivan, Mingang Fu, Prakhar Mehrotra

    Abstract: Generative AI applications, such as ChatGPT or DALL-E, have shown the world their impressive capabilities in generating human-like text or image. Diving deeper, the science stakeholder for those AI applications are Deep Generative Models, a.k.a DGMs, which are designed to learn the underlying distribution of the data and generate new data points that are statistically similar to the original datas… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

  4. arXiv:2210.01594  [pdf, other

    cs.CR cs.CV

    GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

    Authors: Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

    Abstract: Previous studies have shown that commonly studied (vanilla) implementations of touch-based continuous authentication systems (V-TCAS) are susceptible to active adversarial attempts. This study presents a novel Generative Adversarial Network assisted TCAS (G-TCAS) framework and compares it to the V-TCAS under three active adversarial environments viz. Zero-effort, Population, and Random-vector. The… ▽ More

    Submitted 2 October, 2022; originally announced October 2022.

    Comments: 11 pages, 7 figures, 2 tables, 3 algorithms, in IEEE TBIOM 2022

    ACM Class: K.6.5

  5. arXiv:2106.07867  [pdf, other

    cs.CR cs.CV cs.HC

    Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

    Authors: Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

    Abstract: Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network assisted TCAS (G-TCAS) framework, which showed more resilience to the population attack. G-TCAS framework was tested on a dataset of 117 users who interacted with a smartphone and t… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: 2021 IEEE International Joint Conference on Biometrics (IJCB), 8 pages

    ACM Class: K.6.5

  6. arXiv:1203.3654  [pdf

    cs.NI

    Comparative Analysis of Congestion Control Algorithms Using ns-2

    Authors: Sanjeev Patel, P. K. Gupta, Arjun Garg, Prateek Mehrotra, Manish Chhabra

    Abstract: In order to curtail the escalating packet loss rates caused by an exponential increase in network traffic, active queue management techniques such as Random Early Detection (RED) have come into picture. Flow Random Early Drop (FRED) keeps state based on instantaneous queue occupancy of a given flow. FRED protects fragile flows by deterministically accepting flows from low bandwidth connections and… ▽ More

    Submitted 16 March, 2012; originally announced March 2012.

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011, ISSN (Online): 1694-0814