Skip to main content

Showing 1–18 of 18 results for author: Prakash, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03004  [pdf, other

    cs.CL cs.AI

    SemioLLM: Assessing Large Language Models for Semiological Analysis in Epilepsy Research

    Authors: Meghal Dani, Muthu Jeyanthi Prakash, Zeynep Akata, Stefanie Liebe

    Abstract: Large Language Models have shown promising results in their ability to encode general medical knowledge in standard medical question-answering datasets. However, their potential application in clinical practice requires evaluation in domain-specific tasks, where benchmarks are largely missing. In this study semioLLM, we test the ability of state-of-the-art LLMs (GPT-3.5, GPT-4, Mixtral 8x7B, and Q… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2308.04847  [pdf, ps, other

    cs.RO

    Vehicle State Estimation through Modular Factor Graph-based Fusion of Multiple Sensors

    Authors: Pragyan Dahal, Jai Prakash, Stefano Arrigoni, Francesco Braghin

    Abstract: This study focuses on the critical aspect of robust state estimation for the safe navigation of an Autonomous Vehicle (AV). Existing literature primarily employs two prevalent techniques for state estimation, namely filtering-based and graph-based approaches. Factor Graph (FG) is a graph-based approach, constructed using Values and Factors for Maximum Aposteriori (MAP) estimation, that offers a mo… ▽ More

    Submitted 2 October, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

  3. arXiv:2305.11674  [pdf, ps, other

    cs.RO

    Vehicle Teleoperation: Performance Assessment of SRPT Approach Under State Estimation Errors

    Authors: Jai Prakash, Michele Vignati, Edoardo Sabbioni

    Abstract: Vehicle teleoperation has numerous potential applications, including serving as a backup solution for autonomous vehicles, facilitating remote delivery services, and enabling hazardous remote operations. However, complex urban scenarios, limited situational awareness, and network delay increase the cognitive workload of human operators and degrade teleoperation performance. To address this, the su… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: This work has been submitted to Elsevier for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2305.03916  [pdf, other

    cs.SE cs.PL

    Unifying Pointer Analyses for Polyglot Inter-operations through Summary Specialization

    Authors: Jyoti Prakash, Abhishek Tiwari, Christian Hammer

    Abstract: Modular analysis of polyglot applications is challenging because heap object flows across language boundaries must be resolved. The state-of-the-art analyses for polyglot applications have two fundamental limitations. First, they assume explicit boundaries between the host and the guest language to determine inter-language dataflows. Second, they rely on specific analyses of the host and guest lan… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  5. arXiv:2305.00911  [pdf, ps, other

    cs.RO eess.SY

    SRPT vs Smith Predictor for Vehicle Teleoperation

    Authors: Jai Prakash, Michele Vignati, Edoardo Sabbioni

    Abstract: Vehicle teleoperation has potential applications in fallback solutions for autonomous vehicles, remote delivery services, and hazardous operations. However, network delays and limited situational awareness can compromise teleoperation performance and increase the cognitive workload of human operators. To address these issues, we previously introduced the novel successive reference pose tracking (S… ▽ More

    Submitted 27 April, 2023; originally announced May 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  6. Predictive Display with Perspective Projection of Surroundings in Vehicle Teleoperation to Account Time-delays

    Authors: Jai Prakash, Michele Vignati, Daniele Vignarca, Edoardo Sabbioni, Federico Cheli

    Abstract: Teleoperation provides human operator sophisticated perceptual and cognitive skills into an over the network control loop. It gives hope of addressing some challenges related to vehicular autonomy which is based on artificial intelligence by providing a backup plan. Variable network time delays in data transmission is the major problem in teleoperating a vehicle. On 4G network, variability of thes… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  7. arXiv:2208.01968  [pdf, other

    cs.CR cs.SE

    Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView

    Authors: Abhishek Tiwari, Jyoti Prakash, Alimerdan Rahimov, Christian Hammer

    Abstract: Numerous studies demonstrated that browser fingerprinting is detrimental to users' security and privacy. However, little is known about the effects of browser fingerprinting on Android hybrid apps -- where a stripped-down Chromium browser is integrated into an app. These apps expand the attack surface by employing two-way communication between native apps and the web. This paper studies the impact… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

  8. arXiv:2207.13916  [pdf, other

    cs.CV cs.AI cs.LG

    A Novel Data Augmentation Technique for Out-of-Distribution Sample Detection using Compounded Corruptions

    Authors: Ramya S. Hebbalaguppe, Soumya Suvra Goshal, Jatin Prakash, Harshad Khadilkar, Chetan Arora

    Abstract: Modern deep neural network models are known to erroneously classify out-of-distribution (OOD) test data into one of the in-distribution (ID) training classes with high confidence. This can have disastrous consequences for safety-critical applications. A popular mitigation strategy is to train a separate classifier that can detect such OOD samples at the test time. In most practical settings OOD ex… ▽ More

    Submitted 21 September, 2022; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: 16 pages of the main text, and supplemental material. Accepted in Research Track ECML'22. Project webpage: https://cnc-ood.github.io/

  9. Vehicle Teleoperation: Successive Reference-Pose Tracking

    Authors: Jai Prakash, Michele Vignati, Edoardo Sabbioni, Federico Cheli

    Abstract: Vehicle teleoperation is an interesting feature in many fields. A typical problem of teleoperation is communication time delay which, together with actuator saturation and environmental disturbance, can cause a vehicle deviation from the target trajectory imposed by the human operator who imposes to the vehicle a steering wheel angle reference and a speed/acceleration reference. With predictive te… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: VPPC2022 conference submitted

  10. arXiv:2203.13834  [pdf, other

    cs.CV cs.AI cs.LG

    A Stitch in Time Saves Nine: A Train-Time Regularizing Loss for Improved Neural Network Calibration

    Authors: Ramya Hebbalaguppe, Jatin Prakash, Neelabh Madan, Chetan Arora

    Abstract: Deep Neural Networks ( DNN s) are known to make overconfident mistakes, which makes their use problematic in safety-critical applications. State-of-the-art ( SOTA ) calibration techniques improve on the confidence of predicted labels alone and leave the confidence of non-max classes (e.g. top-2, top-5) uncalibrated. Such calibration is not suitable for label refinement using post-processing. Furth… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

    Comments: Accepted in IEEE Computer Vision and Pattern Recognition 2022

  11. arXiv:2008.01725  [pdf, other

    cs.CR cs.PL cs.SE

    A Large Scale Analysis of Android-Web Hybridization

    Authors: Abhishek Tiwari, Jyoti Prakash, Sascha Gross, Christian Hammer

    Abstract: Many Android applications embed webpages via WebView components and execute JavaScript code within Android. Hybrid applications leverage dedicated APIs to load a resource and render it in a WebView. Furthermore, Android objects can be shared with the JavaScript world. However, bridging the interfaces of the Android and JavaScript world might also incur severe security threats: Potentially untruste… ▽ More

    Submitted 4 August, 2020; v1 submitted 4 August, 2020; originally announced August 2020.

  12. arXiv:2005.00325  [pdf, ps, other

    cs.CR cs.NI

    Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults

    Authors: Chuadhry Mujeeb Ahmed, Jay Prakash, Jianying Zhou

    Abstract: In an Industrial Control System (ICS), its complex network of sensors, actuators and controllers have raised security concerns for critical infrastructures and industrial production units. This opinion paper strives to initiate discussion on the design algorithms which can segregate attacks from faults. Most of the proposed anomaly detection mechanisms are not able to differentiate between an atta… ▽ More

    Submitted 25 April, 2020; originally announced May 2020.

  13. arXiv:2002.03144  [pdf, other

    cs.CR cs.HC cs.NI

    Why is My Secret Leaked? Discovering Vulnerabilities in Device-to-Device File Sharing

    Authors: Andrei Bytes, Jay Prakash, Jianying Zhou, Tony Q. S. Quek

    Abstract: The number of active users of Wi-Fi Direct Device-to-Device file sharing applications on Android has exceeded 1.8 billion. Wi-Fi Direct, also known as Wi-Fi P2P, is commonly used for peer-to-peer, high-speed file transfer between mobile devices, as well as a close proximity connection mode for wireless cameras, network printers, TVs and other IoT and mobile devices. For its end users, such type of… ▽ More

    Submitted 26 April, 2020; v1 submitted 8 February, 2020; originally announced February 2020.

  14. arXiv:1912.00429  [pdf, other

    cs.SE cs.PL

    PointEval: On the Impact of Pointer Analysis Frameworks

    Authors: Jyoti Prakash, Abhishek Tiwari, Christian Hammer

    Abstract: Pointer analysis is a foundational analysis leveraged by various static analyses. Therefore, it gathered wide attention in research for decades. Some pointer analysis frameworks are based on succinct declarative specifications. However, these tools are heterogeneous in terms of the underlying intermediate representation (IR), heap abstraction, and programming methodology. This situation complicate… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  15. arXiv:1803.07358  [pdf, ps, other

    cs.IT

    Self-Controlled Jamming Resilient Design Using Physical Layer Secret Keys

    Authors: Jay Prakash, Chenxi Liu, Jemin Lee, Tony Q. S. Quek

    Abstract: Direct-sequence spread spectrum (DSSS) has been recognized as an effective jamming resilient technique. However, the effectiveness of DSSS relies on the use of either pre-shared unique secret keys or a bank of public codes, which can be prohibitively expensive in future large-scale decentralized wireless networks, e.g., the Internet of Things. To tackle this problem, in this work we develop a new… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  16. arXiv:1707.08391  [pdf, other

    physics.med-ph cs.CV eess.IV physics.optics

    Maximum entropy based non-negative optoacoustic tomographic image reconstruction

    Authors: Jaya Prakash, Subhamoy Mandal, Daniel Razansky, Vasilis Ntziachristos

    Abstract: Objective:Optoacoustic (photoacoustic) tomography is aimed at reconstructing maps of the initial pressure rise induced by the absorption of light pulses in tissue. In practice, due to inaccurate assumptions in the forward model, noise and other experimental factors, the images are often afflicted by artifacts, occasionally manifested as negative values. The aim of the work is to develop an inversi… ▽ More

    Submitted 11 January, 2019; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: This article has been accepted for publication in IEEE Transactions on Biomedical Engineering (30 Dec 2018)

  17. arXiv:1405.1514  [pdf

    cs.NI

    ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff

    Authors: A. Bhuvaneswari, E. George Dharma Prakash Raj, V. Sinthu Janita Prakash

    Abstract: The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in i… ▽ More

    Submitted 7 May, 2014; originally announced May 2014.

    Comments: 7 Pages, 8 figures

    Journal ref: IJASCSE, Vol.3,Issue 4, April 30 2014

  18. A Survey on Semi-Supervised Learning Techniques

    Authors: V. Jothi Prakash, Dr. L. M. Nithya

    Abstract: Semisupervised learning is a learning standard which deals with the study of how computers and natural systems such as human beings acquire knowledge in the presence of both labeled and unlabeled data. Semisupervised learning based methods are preferred when compared to the supervised and unsupervised learning because of the improved performance shown by the semisupervised approaches in the presen… ▽ More

    Submitted 19 February, 2014; originally announced February 2014.

    Comments: 5 Pages, 3 figures, Published with International Journal of Computer Trends and Technology (IJCTT)

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) 8(1):25-29, February 2014. ISSN:2231-2803.Published by Seventh Sense Research Group