Skip to main content

Showing 1–7 of 7 results for author: Panchal, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15551  [pdf, other

    cs.LG

    Thinking Forward: Memory-Efficient Federated Finetuning of Language Models

    Authors: Kunjal Panchal, Nisarg Parikh, Sunav Choudhary, Lijun Zhang, Yuriy Brun, Hui Guan

    Abstract: Finetuning large language models (LLMs) in federated learning (FL) settings has become important as it allows resource-constrained devices to finetune a model using private data. However, finetuning LLMs using backpropagation requires excessive memory (especially from intermediate activations) for resource-constrained devices. While Forward-mode Auto-Differentiation (AD) can reduce memory footprin… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. arXiv:2211.15281  [pdf, other

    cs.LG

    Flow: Per-Instance Personalized Federated Learning Through Dynamic Routing

    Authors: Kunjal Panchal, Sunav Choudhary, Nisarg Parikh, Lijun Zhang, Hui Guan

    Abstract: Personalization in Federated Learning (FL) aims to modify a collaboratively trained global model according to each client. Current approaches to personalization in FL are at a coarse granularity, i.e. all the input instances of a client use the same personalized model. This ignores the fact that some instances are more accurately handled by the global model due to better generalizability. To addre… ▽ More

    Submitted 10 February, 2024; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: 37th Annual Conference on Neural Information Processing Systems (NeurIPS), 2023

  3. arXiv:2208.06882  [pdf, other

    cs.CV

    CoShNet: A Hybrid Complex Valued Neural Network using Shearlets

    Authors: Manny Ko, Ujjawal K. Panchal, Héctor Andrade-Loarca, Andres Mendez-Vazquez

    Abstract: In a hybrid neural network, the expensive convolutional layers are replaced by a non-trainable fixed transform with a great reduction in parameters. In previous works, good results were obtained by replacing the convolutions with wavelets. However, wavelet based hybrid network inherited wavelet's lack of vanishing moments along curves and its axis-bias. We propose to use Shearlets with its robust… ▽ More

    Submitted 29 October, 2022; v1 submitted 14 August, 2022; originally announced August 2022.

    Comments: 16 pages, 11 figures

  4. arXiv:2011.10916   

    cs.CV cs.CL cs.LG

    Hierachical Delta-Attention Method for Multimodal Fusion

    Authors: Kunjal Panchal

    Abstract: In vision and linguistics; the main input modalities are facial expressions, speech patterns, and the words uttered. The issue with analysis of any one mode of expression (Visual, Verbal or Vocal) is that lot of contextual information can get lost. This asks researchers to inspect multiple modalities to get a thorough understanding of the cross-modal dependencies and temporal context of the situat… ▽ More

    Submitted 28 November, 2022; v1 submitted 21 November, 2020; originally announced November 2020.

    Comments: Need to update the results

  5. arXiv:2011.02579  [pdf, other

    cs.CV

    Improved Algorithm for Seamlessly Creating Infinite Loops from a Video Clip, while Preserving Variety in Textures

    Authors: Kunjal Panchal

    Abstract: This project implements the paper "Video Textures" by Szeliski. The aim is to create a "Moving Picture" or as we popularly call it, a GIF; which is "somewhere between a photograph and a video". The idea is to input a video which has some repeated motion (the texture), such as a flag waving, rain, or a candle flame. The output is a new video that infinitely extends the original video in a seamless… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

  6. arXiv:2010.15985  [pdf, other

    cs.CR cs.LG

    Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

    Authors: Kunjal Panchal

    Abstract: Honey Encryption is an approach to encrypt the messages using low min-entropy keys, such as weak passwords, OTPs, PINs, credit card numbers. The ciphertext is produces, when decrypted with any number of incorrect keys, produces plausible-looking but bogus plaintext called "honey messages". But the current techniques used in producing the decoy plaintexts do not model human language entirely. A gib… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

  7. arXiv:0912.1009  [pdf

    cs.CV cs.LG

    Biogeography based Satellite Image Classification

    Authors: V. K. Panchal, Parminder Singh, Navdeep Kaur, Harish Kundra

    Abstract: Biogeography is the study of the geographical distribution of biological organisms. The mindset of the engineer is that we can learn from nature. Biogeography Based Optimization is a burgeoning nature inspired technique to find the optimal solution of the problem. Satellite image classification is an important task because it is the only way we can know about the land cover map of inaccessible a… ▽ More

    Submitted 5 December, 2009; originally announced December 2009.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 269-274, November 2009, USA