Skip to main content

Showing 1–21 of 21 results for author: Mohan, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07332  [pdf, other

    cs.CV

    Minimizing Energy Costs in Deep Learning Model Training: The Gaussian Sampling Approach

    Authors: Challapalli Phanindra Revanth, Sumohana S. Channappayya, C Krishna Mohan

    Abstract: Computing the loss gradient via backpropagation consumes considerable energy during deep learning (DL) model training. In this paper, we propose a novel approach to efficiently compute DL models' gradients to mitigate the substantial energy overhead associated with backpropagation. Exploiting the over-parameterized nature of DL models and the smoothness of their loss landscapes, we propose a metho… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2404.04139  [pdf

    cs.CR cs.AI

    Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning

    Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry

    Abstract: Federated Learning (FL) is a collaborative learning paradigm enabling participants to collectively train a shared machine learning model while preserving the privacy of their sensitive data. Nevertheless, the inherent decentralized and data-opaque characteristics of FL render its susceptibility to data poisoning attacks. These attacks introduce malformed or malicious inputs during local model trai… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 14 pages, 11 figures, 5 tables, Accepted in ACM CODASPY 2024

  3. arXiv:2311.14971  [pdf

    cs.CV cs.LG q-bio.TO

    Segmentation of diagnostic tissue compartments on whole slide images with renal thrombotic microangiopathies (TMAs)

    Authors: Huy Q. Vo, Pietro A. Cicalese, Surya Seshan, Syed A. Rizvi, Aneesh Vathul, Gloria Bueno, Anibal Pedraza Dorado, Niels Grabe, Katharina Stolle, Francesco Pesce, Joris J. T. H. Roelofs, Jesper Kers, Vitoantonio Bevilacqua, Nicola Altini, Bernd Schröppel, Dario Roccatello, Antonella Barreca, Savino Sciascia, Chandra Mohan, Hien V. Nguyen, Jan U. Becker

    Abstract: The thrombotic microangiopathies (TMAs) manifest in renal biopsy histology with a broad spectrum of acute and chronic findings. Precise diagnostic criteria for a renal biopsy diagnosis of TMA are missing. As a first step towards a machine learning- and computer vision-based analysis of wholes slide images from renal biopsies, we trained a segmentation model for the decisive diagnostic kidney tissu… ▽ More

    Submitted 28 November, 2023; v1 submitted 25 November, 2023; originally announced November 2023.

    Comments: 12 pages, 3 figures

  4. arXiv:2311.08503  [pdf, other

    cs.CV cs.LG

    MADG: Margin-based Adversarial Learning for Domain Generalization

    Authors: Aveen Dayal, Vimal K. B., Linga Reddy Cenkeramaddi, C. Krishna Mohan, Abhinav Kumar, Vineeth N Balasubramanian

    Abstract: Domain Generalization (DG) techniques have emerged as a popular approach to address the challenges of domain shift in Deep Learning (DL), with the goal of generalizing well to the target domain unseen during the training. In recent years, numerous methods have been proposed to address the DG setting, among which one popular approach is the adversarial learning-based methodology. The main idea behi… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  5. arXiv:2309.11766  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    Dictionary Attack on IMU-based Gait Authentication

    Authors: Rajesh Kumar, Can Isik, Chilukuri K. Mohan

    Abstract: We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems. In particular, this work investigates whether it is possible to build a dictionary of IMUGait patt… ▽ More

    Submitted 31 December, 2023; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: 12 pages, 9 figures, accepted at AISec23 colocated with ACM CCS, November 30, 2023, Copenhagen, Denmark

    ACM Class: K.6.5

  6. arXiv:2211.08152  [pdf, ps, other

    cs.ET cond-mat.dis-nn cond-mat.other nlin.AO physics.app-ph

    Evidence of In-Memory Computing in a Ferrofluid

    Authors: Marco Crepaldi, Charanraj Mohan, Erik Garofalo, Andrew Adamatzky, Konrad Szaciłowski, Alessandro Chiolerio

    Abstract: Magnetic fluids are excellent candidates for important research fields including energy harvesting, biomedical applications, soft robotics and exploration. However, notwithstanding relevant advancements such as shape reconfigurability, that have been demonstrated, there is no evidence for their computation capability, including the emulation of synaptic functions. Here, we experimentally demonstra… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

  7. ACLNet: An Attention and Clustering-based Cloud Segmentation Network

    Authors: Dhruv Makwana, Subhrajit Nag, Onkar Susladkar, Gayatri Deshmukh, Sai Chandra Teja R, Sparsh Mittal, C Krishna Mohan

    Abstract: We propose a novel deep learning model named ACLNet, for cloud segmentation from ground images. ACLNet uses both deep neural network and machine learning (ML) algorithm to extract complementary features. Specifically, it uses EfficientNet-B0 as the backbone, "`a trous spatial pyramid pooling" (ASPP) to learn at multiple receptive fields, and "global attention module" (GAM) to extract finegrained d… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

    Comments: 11 pages, 3 figures, 5 tables, Published in remote sensing letters

    Journal ref: volume 13, pages 865-875, year 2022

  8. WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects

    Authors: Subhrajit Nag, Dhruv Makwana, Sai Chandra Teja R, Sparsh Mittal, C Krishna Mohan

    Abstract: As the integration density and design intricacy of semiconductor wafers increase, the magnitude and complexity of defects in them are also on the rise. Since the manual inspection of wafer defects is costly, an automated artificial intelligence (AI) based computer-vision approach is highly desired. The previous works on defect analysis have several limitations, such as low accuracy and the need fo… ▽ More

    Submitted 3 July, 2022; originally announced July 2022.

    Comments: 11 pages, 2 figures, 7 tables, Published in Computers in Industry

    Journal ref: Volume 142, 2022, 103720, ISSN 0166-3615,

  9. arXiv:2108.03614  [pdf, other

    cs.CV

    Monte Carlo DropBlock for Modelling Uncertainty in Object Detection

    Authors: Kumari Deepshikha, Sai Harsha Yelleni, P. K. Srijith, C Krishna Mohan

    Abstract: With the advancements made in deep learning, computer vision problems like object detection and segmentation have seen a great improvement in performance. However, in many real-world applications such as autonomous driving vehicles, the risk associated with incorrect predictions of objects is very high. Standard deep learning models for object detection such as YOLO models are often overconfident… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  10. Experimental Body-input Three-stage DC offset Calibration Scheme for Memristive Crossbar

    Authors: Charanraj Mohan, L. A. Camuñas-Mesa, Elisa Vianello, Carlo Reita, José M. de la Rosa, Teresa Serrano-Gotarredona, Bernabé Linares-Barranco

    Abstract: Reading several ReRAMs simultaneously in a neuromorphic circuit increases power consumption and limits scalability. Applying small inference read pulses is a vain attempt when offset voltages of the read-out circuit are decisively more. This paper presents an experimental validation of a three-stage calibration scheme to calibrate the DC offset voltage across the rows of the memristive crossbar. T… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: 5 pages, 9 figures, conference paper published in ISCAS20

    ACM Class: B.7

  11. Implementation of binary stochastic STDP learning using chalcogenide-based memristive devices

    Authors: C. Mohan, L. A. Camuñas-Mesa, J. M. de la Rosa, T. Serrano-Gotarredona, B. Linares-Barranco

    Abstract: The emergence of nano-scale memristive devices encouraged many different research areas to exploit their use in multiple applications. One of the proposed applications was to implement synaptic connections in bio-inspired neuromorphic systems. Large-scale neuromorphic hardware platforms are being developed with increasing number of neurons and synapses, having a critical bottleneck in the online l… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Journal ref: 2021 IEEE International Symposium on Circuits and Systems (ISCAS), 2021, pp. 1-5

  12. arXiv:2101.06092  [pdf, other

    cs.CV cs.AI

    Black-box Adversarial Attacks in Autonomous Vehicle Technology

    Authors: K Naveen Kumar, C Vishnu, Reshmi Mitra, C Krishna Mohan

    Abstract: Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 7 pages, 10 figures, published in 49th Annual IEEE AIPR 2020: Trusted Computing, Privacy, and Securing Multimedia Washington, D.C. October 13-15, 2020

  13. arXiv:2008.00827  [pdf, other

    cs.CV cs.AI eess.SP

    Defining Traffic States using Spatio-temporal Traffic Graphs

    Authors: Debaditya Roy, K. Naveen Kumar, C. Krishna Mohan

    Abstract: Intersections are one of the main sources of congestion and hence, it is important to understand traffic behavior at intersections. Particularly, in develo** countries with high vehicle density, mixed traffic type, and lane-less driving behavior, it is difficult to distinguish between congested and normal traffic behavior. In this work, we propose a way to understand the traffic state of smaller… ▽ More

    Submitted 27 July, 2020; originally announced August 2020.

    Comments: Accepted in 23rd IEEE International Conference on Intelligent Transportation Systems September 20 to 23, 2020. 6 pages, 6 figures

  14. arXiv:2007.05008  [pdf, other

    cs.CV eess.IV

    StyPath: Style-Transfer Data Augmentation For Robust Histology Image Classification

    Authors: Pietro Antonio Cicalese, Aryan Mobiny, Pengyu Yuan, Jan Becker, Chandra Mohan, Hien Van Nguyen

    Abstract: The classification of Antibody Mediated Rejection (AMR) in kidney transplant remains challenging even for experienced nephropathologists; this is partly because histological tissue stain analysis is often characterized by low inter-observer agreement and poor reproducibility. One of the implicated causes for inter-observer disagreement is the variability of tissue stain quality between (and within… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

  15. ULSAM: Ultra-Lightweight Subspace Attention Module for Compact Convolutional Neural Networks

    Authors: Rajat Saini, Nandan Kumar Jha, Bedanta Das, Sparsh Mittal, C. Krishna Mohan

    Abstract: The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for c… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 IEEE Winter Conference on Applications of Computer Vision (WACV)

    ACM Class: I.5.1; I.5.2; I.5.4

    Journal ref: WACV (2020) 1627-1636

  16. arXiv:1911.00643  [pdf, other

    cs.CL cs.SI

    Credibility-based Fake News Detection

    Authors: Niraj Sitaula, Chilukuri K. Mohan, Jennifer Grygiel, Xinyi Zhou, Reza Zafarani

    Abstract: Fake news can significantly misinform people who often rely on online sources and social media for their information. Current research on fake news detection has mostly focused on analyzing fake news content and how it propagates on a network of users. In this paper, we emphasize the detection of fake news by assessing its credibility. By analyzing public fake news data, we show that information o… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

  17. arXiv:1908.01908  [pdf, other

    cs.DB

    WiSer: A Highly Available HTAP DBMS for IoT Applications

    Authors: Ronald Barber, Christian Garcia-Arellano, Ronen Grosman, Guy Lohman, C. Mohan, Rene Muller, Hamid Pirahesh, Vijayshankar Raman, Richard Sidle, Adam Storm, Yuanyuan Tian, Pinar Tozun, Yingjun Wu

    Abstract: In a classic transactional distributed database management system (DBMS), write transactions invariably synchronize with a coordinator before final commitment. While enforcing serializability, this model has long been criticized for not satisfying the applications' availability requirements. When entering the era of Internet of Things (IoT), this problem has become more severe, as an increasing nu… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  18. arXiv:1406.4123  [pdf

    cs.SE

    A strategy to identify components using clustering approach for component reusability

    Authors: N. Md Jubair Basha, Chandra Mohan

    Abstract: Component Based Software Engineering (CBSE) has played a very important role for building larger software systems The current practices of software industry demands development of a software within time and budget which is highly productive. It is necessary to achieve how much effectively the software component is reusable. To achieve this, the component identification is mandatory. The traditiona… ▽ More

    Submitted 14 June, 2014; originally announced June 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1207.4938, arXiv:1202.5609, arXiv:1406.3727

  19. arXiv:1406.3727  [pdf

    cs.SE

    A methodology to identify the level of reuse using template factors

    Authors: N. Md Jubair Basha, Chandra Mohan

    Abstract: To build large scale software systems, Component Based Software Engineering (CBSE) has played a vital role. The current practices of software industry demands more development of a software within time and budget which is highly productive to them. It became so necessary to achieve how effectively the software component is reusable. In order to meet this, the component level reuse, in terms of bot… ▽ More

    Submitted 14 June, 2014; originally announced June 2014.

    Comments: arXiv admin note: text overlap with arXiv:1203.1328, arXiv:1207.4938, arXiv:1202.5609

  20. Content Based Image Retrieval Using Exact Legendre Moments and Support Vector Machine

    Authors: Ch. Srinivasa Rao, S. Srinivas Kumar, B. Chandra Mohan

    Abstract: Content Based Image Retrieval (CBIR) systems based on shape using invariant image moments, viz., Moment Invariants (MI) and Zernike Moments (ZM) are available in the literature. MI and ZM are good at representing the shape features of an image. However, non-orthogonality of MI and poor reconstruction of ZM restrict their application in CBIR. Therefore, an efficient and orthogonal moment based CBIR… ▽ More

    Submitted 29 May, 2010; originally announced May 2010.

    Comments: 11 Pages, IJMA

    Journal ref: International journal of Multimedia & Its Applications 2.2 (2010) 69-79

  21. Image Compression and Watermarking scheme using Scalar Quantization

    Authors: Kilari Veera Swamy, B. Chandra Mohan, Y. V. Bhaskar Reddy, S. Srinivas Kumar

    Abstract: This paper presents a new compression technique and image watermarking algorithm based on Contourlet Transform (CT). For image compression, an energy based quantization is used. Scalar quantization is explored for image watermarking. Double filter bank structure is used in CT. The Laplacian Pyramid (LP) is used to capture the point discontinuities, and then followed by a Directional Filter Bank (D… ▽ More

    Submitted 29 March, 2010; originally announced March 2010.

    Comments: 11 Pages, IJNGN Journal 2010

    Journal ref: International Journal of Next-Generation Networks 2.1 (2010) 37-47