Skip to main content

Showing 1–21 of 21 results for author: Pal, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18435  [pdf, other

    eess.IV cs.CV

    QUBIQ: Uncertainty Quantification for Biomedical Image Segmentation Challenge

    Authors: Hongwei Bran Li, Fernando Navarro, Ivan Ezhov, Amirhossein Bayat, Dhritiman Das, Florian Kofler, Suprosanna Shit, Diana Waldmannstetter, Johannes C. Paetzold, Xiaobin Hu, Benedikt Wiestler, Lucas Zimmer, Tamaz Amiranashvili, Chinmay Prabhakar, Christoph Berger, Jonas Weidner, Michelle Alonso-Basant, Arif Rashid, Ujjwal Baid, Wesam Adel, Deniz Ali, Bhakti Baheti, Yingbin Bai, Ishaan Bhatt, Sabri Can Cetindag , et al. (55 additional authors not shown)

    Abstract: Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the de… ▽ More

    Submitted 24 June, 2024; v1 submitted 19 March, 2024; originally announced May 2024.

    Comments: initial technical report

  2. arXiv:2402.16903  [pdf, other

    cs.LG math.NA

    A novel data generation scheme for surrogate modelling with deep operator networks

    Authors: Shivam Choubey, Birupaksha Pal, Manish Agrawal

    Abstract: Operator-based neural network architectures such as DeepONets have emerged as a promising tool for the surrogate modeling of physical systems. In general, towards operator surrogate modeling, the training data is generated by solving the PDEs using techniques such as Finite Element Method (FEM). The computationally intensive nature of data generation is one of the biggest bottleneck in deploying t… ▽ More

    Submitted 24 February, 2024; originally announced February 2024.

  3. arXiv:2401.05329  [pdf, other

    cs.NI

    SmartMME: Implementation of Base Station Switching Off Strategy in ns-3

    Authors: Argha Sen, Bhupendra Pal, Seemant Achari, Sandip Chakraborty

    Abstract: In the landscape of next-generation cellular networks, a projected surge of over 12 billion subscriptions foreshadows a considerable upswing in the network's overall energy consumption. The proliferation of User Equipment (UE) drives this energy demand, urging 5G deployments to seek more energy-efficient methodologies. In this work, we propose SmartMME, as a pivotal solution aimed at optimizing Ba… ▽ More

    Submitted 12 January, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

  4. arXiv:2401.04648  [pdf, other

    cs.LG cs.AI math.AP

    A novel framework for generalization of deep hidden physics models

    Authors: Vijay Kag, Birupaksha Pal

    Abstract: Modelling of systems where the full system information is unknown is an oft encountered problem for various engineering and industrial applications, as it's either impossible to consider all the complex physics involved or simpler models are considered to keep within the limits of the available resources. Recent advances in greybox modelling like the deep hidden physics models address this space b… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  5. arXiv:2312.14976  [pdf, other

    cs.CV cs.CY

    Gaussian Harmony: Attaining Fairness in Diffusion-based Face Generation Models

    Authors: Basudha Pal, Arunkumar Kannan, Ram Prabhakar Kathirvel, Alice J. O'Toole, Rama Chellappa

    Abstract: Diffusion models have achieved great progress in face generation. However, these models amplify the bias in the generation process, leading to an imbalance in distribution of sensitive attributes such as age, gender and race. This paper proposes a novel solution to this problem by balancing the facial attributes of the generated images. We mitigate the bias by localizing the means of the facial at… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  6. arXiv:2305.02085  [pdf, other

    cs.CV cs.AI cs.CE cs.RO

    A Systematic Study on Object Recognition Using Millimeter-wave Radar

    Authors: Maloy Kumar Devnath, Avijoy Chakma, Mohammad Saeid Anwar, Emon Dey, Zahid Hasan, Marc Conn, Biplab Pal, Nirmalya Roy

    Abstract: Due to its light and weather-independent sensing, millimeter-wave (MMW) radar is essential in smart environments. Intelligent vehicle systems and industry-grade MMW radars have integrated such capabilities. Industry-grade MMW radars are expensive and hard to get for community-purpose smart environment applications. However, commercially available MMW radars have hidden underpinning challenges that… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

  7. arXiv:2212.08568  [pdf, other

    cs.CV cs.LG

    Biomedical image analysis competitions: The state of current participation practice

    Authors: Matthias Eisenmann, Annika Reinke, Vivienn Weru, Minu Dietlinde Tizabi, Fabian Isensee, Tim J. Adler, Patrick Godau, Veronika Cheplygina, Michal Kozubek, Sharib Ali, Anubha Gupta, Jan Kybic, Alison Noble, Carlos Ortiz de Solórzano, Samiksha Pachade, Caroline Petitjean, Daniel Sage, Donglai Wei, Elizabeth Wilden, Deepak Alapatt, Vincent Andrearczyk, Ujjwal Baid, Spyridon Bakas, Niranjan Balu, Sophia Bano , et al. (331 additional authors not shown)

    Abstract: The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,… ▽ More

    Submitted 12 September, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  8. arXiv:2109.14490  [pdf

    cs.CR

    Might I Get Pwned: A Second Generation Compromised Credential Checking Service

    Authors: Bijeeta Pal, Mazharul Islam, Marina Sanusi, Nick Sullivan, Luke Valenta, Tara Whalen, Christopher Wood, Thomas Ristenpart, Rahul Chattejee

    Abstract: Credential stuffing attacks use stolen passwords to log into victim accounts. To defend against these attacks, recently deployed compromised credential checking (C3) services provide APIs that help users and companies check whether a username, password pair is exposed. These services however only check if the exact password is leaked, and therefore do not mitigate credential tweaking attacks - att… ▽ More

    Submitted 18 March, 2022; v1 submitted 29 September, 2021; originally announced September 2021.

  9. arXiv:2105.04598  [pdf, other

    cs.MA

    A Social Distancing-Based Facility Location Approach for Combating COVID-19

    Authors: Suman Banerjee, Bithika Pal, Maheswar Singhamahapatra

    Abstract: In this paper, we introduce and study the problem of facility location along with the notion of \emph{`social distancing'}. The input to the problem is the road network of a city where the nodes are the residential zones, edges are the road segments connecting the zones along with their respective distance. We also have the information about the population at each zone, different types of faciliti… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: 16 Pages, 9 Figures

  10. arXiv:2104.08504  [pdf, other

    cs.DB

    Budgeted Influence and Earned Benefit Maximization with Tags in Social Networks

    Authors: Suman Banerjee, Bithika Pal

    Abstract: Given a social network, where each user is associated with a selection cost, the problem of \textsc{Budgeted Influence Maximization} (\emph{BIM Problem} in short) asks to choose a subset of them (known as seed users) within an allocated budget whose initial activation leads to the maximum number of influenced nodes. Existing Studies on this problem do not consider the tag-specific influence probab… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

    Comments: 42 pages

  11. arXiv:2007.04411  [pdf, other

    cs.DS cs.DB cs.SI

    An Efficient Updation Approach for Enumerating Maximal $(Δ, γ)$\mbox{-}Cliques of a Temporal Network

    Authors: Suman Banerjee, Bithika Pal

    Abstract: Given a temporal network $\mathcal{G}(\mathcal{V}, \mathcal{E}, \mathcal{T})$, $(\mathcal{X},[t_a,t_b])$ (where $\mathcal{X} \subseteq \mathcal{V}(\mathcal{G})$ and $[t_a,t_b] \subseteq \mathcal{T}$) is said to be a $(Δ, γ)$\mbox{-}clique of $\mathcal{G}$, if for every pair of vertices in $\mathcal{X}$, there must exist at least $γ$ links in each $Δ$ duration within the time interval $[t_a,t_b]$.… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

    Comments: 37 Pages, Submitted to a Journal

  12. arXiv:2006.11373  [pdf, other

    cs.CV cs.CY cs.LG

    Deceiving computers in Reverse Turing Test through Deep Learning

    Authors: Jimut Bahan Pal

    Abstract: It is increasingly becoming difficult for human beings to work on their day to day life without going through the process of reverse Turing test, where the Computers tests the users to be humans or not. Almost every website and service providers today have the process of checking whether their website is being crawled or not by automated bots which could extract valuable information from their sit… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: Masters thesis. All Text CAPTCHAs are broken with over 99% accuracy, hence they are proved to be unreliable

    Report number: B1930050

  13. arXiv:2004.05935  [pdf, ps, other

    cs.DS cs.DB cs.MA

    First Stretch then Shrink and Bulk: A Two Phase Approach for Enumeration of Maximal $(Δ, γ)$\mbox{-}Cliques of a Temporal Network

    Authors: Suman Banerjee, Bithika Pal

    Abstract: A \emph{Temporal Network} (also known as \emph{Link Stream} or \emph{Time-Varying Graph}) is often used to model a time-varying relationship among a group of agents. It is typically represented as a collection of triplets of the form $(u,v,t)$ that denotes the interaction between the agents $u$ and $v$ at time $t$. For analyzing the contact patterns of the agents forming a temporal network, recent… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  14. arXiv:2004.02564  [pdf, other

    cs.DB

    DySky: Dynamic Skyline Queries on Uncertain Graphs

    Authors: Suman Banerjee, Bithika Pal

    Abstract: Given a graph, and a set of query vertices (subset of the vertices), the dynamic skyline query problem returns a subset of data vertices (other than query vertices) which are not dominated by other data vertices based on certain distance measure. In this paper, we study the dynamic skyline query problem on uncertain graphs (DySky). The input to this problem is an uncertain graph, a subset of its n… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

  15. arXiv:2002.05886  [pdf, other

    cs.HC

    How to cluster nearest unique nodes from different classes using JJCluster in Wisp application?

    Authors: Jimut Bahan Pal

    Abstract: The work of finding the best place according to user preference is a tedious task. It needs manual research and lot of intuitive process to find the best location according to some earlier knowledge about the place. It is mainly about accessing publicly available spatial data, applying a simple algorithm to summarize the data according to given preferences, and visualizing the result on a map. We… ▽ More

    Submitted 17 February, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: A new type of clustering algorithm is built which helps to find the best place for any location by giving a set of preferences to the application. Source code can be found here: https://github.com/Jimut123/wisp

  16. arXiv:2001.11302  [pdf, other

    cs.CV

    A Deeper Look into Hybrid Images

    Authors: Jimut Bahan Pal

    Abstract: $Hybrid$ $images$ was first introduced by Olivia et al., that produced static images with two interpretations such that the images changes as a function of viewing distance. Hybrid images are built by studying human processing of multiscale images and are motivated by masking studies in visual perception. The first introduction of hybrid images showed that two images can be blend together with a h… ▽ More

    Submitted 10 February, 2020; v1 submitted 30 January, 2020; originally announced January 2020.

    Comments: A deeper analysis for creating Hybrid Images

  17. arXiv:2001.02438  [pdf, other

    cs.LG cs.CR cs.IR stat.ML

    To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

    Authors: Bijeeta Pal, Shruti Tople

    Abstract: Transfer learning --- transferring learned knowledge --- has brought a paradigm shift in the way models are trained. The lucrative benefits of improved accuracy and reduced training time have shown promise in training models with constrained computational resources and fewer training samples. Specifically, publicly available text-based models such as GloVe and BERT that are trained on large corpus… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

  18. arXiv:1905.13737  [pdf, other

    cs.CR

    Protocols for Checking Compromised Credentials

    Authors: Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart

    Abstract: To prevent credential stuffing attacks, industry best practice now proactively checks if user credentials are present in known data breaches. Recently, some web services, such as HaveIBeenPwned (HIBP) and Google Password Checkup (GPC), have started providing APIs to check for breached passwords. We refer to such services as compromised credential checking (C3) services. We give the first formal de… ▽ More

    Submitted 4 September, 2019; v1 submitted 31 May, 2019; originally announced May 2019.

  19. arXiv:1809.03758  [pdf, ps, other

    cs.SI

    Threshold-Based Heuristics for Trust Inference in a Social Network

    Authors: Bithika Pal, Suman Banerjee, Mamata Jenamani

    Abstract: Trust among the users of a social network plays a pivotal role in item recommendation, particularly for the cold start users. Due to the sparse nature of these networks, trust information between any two users may not be always available. To infer the missing trust values, one well-known approach is path based trust estimation, which suggests a user to believe all of its neighbors in the network.… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: Presented in 11th International Conference on Contemporary Computing, IC3-2018

  20. arXiv:1804.10981  [pdf, ps, other

    cs.DS

    On the Enumeration of Maximal $(Δ, γ)$-Cliques of a Temporal Network

    Authors: Suman Banerjee, Bithika Pal

    Abstract: A temporal network is a mathematical way of precisely representing a time varying relationship among a group of agents. In this paper, we introduce the notion of $(Δ, γ)$-Cliques of a temporal network, where every pair of vertices present in the clique communicates atleast $γ$ times in each $Δ$ period within a given time duration. We present an algorithm for enumerating all such maximal cliques pr… ▽ More

    Submitted 29 April, 2018; originally announced April 2018.

    Comments: 9 pages. Both the authors have done equal contributions in this work

  21. Analysis of Various Symbol Detection Techniques in Multiple-Input Multiple-Output System (MIMO)

    Authors: Shrikrishan Yadav, Shuchi Jani, B. L. Pal

    Abstract: Wireless communication is the fastest growing area of the communication industry. To keep swiftness with the indefinite increase in customers' demands and expectations, and the market competition among companies for the services offered,there is need for higher data rate along with reliable communication at low cost so that the applications can reach all. Until now, many technical challenges remai… ▽ More

    Submitted 26 April, 2012; originally announced April 2012.

    Comments: 11 pages,9 figures

    Journal ref: Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.2, March 2012