Skip to main content

Showing 1–50 of 175 results for author: Rajendran

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.07296  [pdf

    physics.med-ph cs.AI cs.CV

    Large Language Model-Augmented Auto-Delineation of Treatment Target Volume in Radiation Therapy

    Authors: Praveenbalaji Rajendran, Yong Yang, Thomas R. Niedermayr, Michael Gensheimer, Beth Beadle, Quynh-Thu Le, Lei Xing, Xian** Dai

    Abstract: Radiation therapy (RT) is one of the most effective treatments for cancer, and its success relies on the accurate delineation of targets. However, target delineation is a comprehensive medical decision that currently relies purely on manual processes by human experts. Manual delineation is time-consuming, laborious, and subject to interobserver variations. Although the advancements in artificial i… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  2. arXiv:2407.01739  [pdf, other

    cs.RO

    Enabling Tactile Feedback for Robotic Strawberry Handling using AST Skin

    Authors: Vishnu Rajendran, Kiyanoush Nazari, Simon Parsons, Amir Ghalamzan

    Abstract: Acoustic Soft Tactile (AST) skin is a novel sensing technology which derives tactile information from the modulation of acoustic waves travelling through the skin's embedded acoustic channels. A generalisable data-driven calibration model maps the acoustic modulations to the corresponding tactile information in the form of contact forces with their contact locations and contact geometries. AST ski… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: TAROS 2024

  3. arXiv:2406.18400  [pdf, other

    cs.CL cs.LG stat.ML

    Do LLMs dream of elephants (when told not to)? Latent concept association and associative memory in transformers

    Authors: Yibo Jiang, Goutham Rajendran, Pradeep Ravikumar, Bryon Aragam

    Abstract: Large Language Models (LLMs) have the capacity to store and recall facts. Through experimentation with open-source models, we observe that this ability to retrieve facts can be easily manipulated by changing contexts, even without altering their factual meanings. These findings highlight that LLMs might behave like an associative memory model where certain tokens in the contexts serve as clues to… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  4. arXiv:2405.15084  [pdf, other

    cs.DS cs.LG stat.ML

    Efficient Certificates of Anti-Concentration Beyond Gaussians

    Authors: Ainesh Bakshi, Pravesh Kothari, Goutham Rajendran, Madhur Tulsiani, Aravindan Vijayaraghavan

    Abstract: A set of high dimensional points $X=\{x_1, x_2,\ldots, x_n\} \subset R^d$ in isotropic position is said to be $δ$-anti concentrated if for every direction $v$, the fraction of points in $X$ satisfying $|\langle x_i,v \rangle |\leq δ$ is at most $O(δ)$. Motivated by applications to list-decodable learning and clustering, recent works have considered the problem of constructing efficient certificate… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  5. arXiv:2405.10576  [pdf, other

    cs.RO

    An Efficient Learning Control Framework With Sim-to-Real for String-Type Artificial Muscle-Driven Robotic Systems

    Authors: Jiyue Tao, Yunsong Zhang, Sunil Kumar Rajendran, Feitian Zhang, Dexin Zhao, Tongsheng Shen

    Abstract: Robotic systems driven by artificial muscles present unique challenges due to the nonlinear dynamics of actuators and the complex designs of mechanical structures. Traditional model-based controllers often struggle to achieve desired control performance in such systems. Deep reinforcement learning (DRL), a trending machine learning technique widely adopted in robot control, offers a promising alte… ▽ More

    Submitted 7 June, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

  6. arXiv:2405.03725  [pdf, other

    cs.NE cs.AI cs.LG

    Deep Oscillatory Neural Network

    Authors: Nurani Rajagopal Rohan, Vigneswaran C, Sayan Ghosh, Kishore Rajendran, Gaurav A, V Srinivasa Chakravarthy

    Abstract: We propose a novel, brain-inspired deep neural network model known as the Deep Oscillatory Neural Network (DONN). Deep neural networks like the Recurrent Neural Networks indeed possess sequence processing capabilities but the internal states of the network are not designed to exhibit brain-like oscillatory activity. With this motivation, the DONN is designed to have oscillatory internal dynamics.… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  7. arXiv:2405.01684  [pdf, other

    cs.LG cs.AI

    Intelligent Switching for Reset-Free RL

    Authors: Darshan Patil, Janarthanan Rajendran, Glen Berseth, Sarath Chandar

    Abstract: In the real world, the strong episode resetting mechanisms that are needed to train agents in simulation are unavailable. The \textit{resetting} assumption limits the potential of reinforcement learning in the real world, as providing resets to an agent usually requires the creation of additional handcrafted mechanisms or human interventions. Recent work aims to train agents (\textit{forward}) wit… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Published at ICLR 2024

  8. arXiv:2405.00724  [pdf, other

    eess.SP cs.LG

    Baseline Drift Tolerant Signal Encoding for ECG Classification with Deep Learning

    Authors: Robert O Shea, Prabodh Katti, Bipin Rajendran

    Abstract: Common artefacts such as baseline drift, rescaling, and noise critically limit the performance of machine learningbased automated ECG analysis and interpretation. This study proposes Derived Peak (DP) encoding, a non-parametric method that generates signed spikes corresponding to zero crossings of the signals first and second-order time derivatives. Notably, DP encoding is invariant to shift and s… ▽ More

    Submitted 26 April, 2024; originally announced May 2024.

    Comments: 4 pages, 3 figures. Submitted to 46th Annual International Conference of the IEEE Engineering in Medicine and Biology 2024

    ACM Class: I.5.4

  9. arXiv:2404.14620  [pdf, other

    cs.LG cs.CY

    Fairness Incentives in Response to Unfair Dynamic Pricing

    Authors: Jesse Thibodeau, Hadi Nekoei, Afaf Taïk, Janarthanan Rajendran, Golnoosh Farnadi

    Abstract: The use of dynamic pricing by profit-maximizing firms gives rise to demand fairness concerns, measured by discrepancies in consumer groups' demand responses to a given pricing strategy. Notably, dynamic pricing may result in buyer distributions unreflective of those of the underlying population, which can be problematic in markets where fair representation is socially desirable. To address this, p… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  10. arXiv:2404.08806  [pdf, other

    cs.CL

    CreativEval: Evaluating Creativity of LLM-Based Hardware Code Generation

    Authors: Matthew DeLorenzo, Vasudev Gohil, Jeyavijayan Rajendran

    Abstract: Large Language Models (LLMs) have proved effective and efficient in generating code, leading to their utilization within the hardware design process. Prior works evaluating LLMs' abilities for register transfer level code generation solely focus on functional correctness. However, the creativity associated with these LLMs, or the ability to generate novel and unique solutions, is a metric not as w… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  11. arXiv:2404.06856  [pdf, other

    cs.SE cs.AR cs.CR cs.LG

    Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

    Authors: Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi

    Abstract: Modern computing systems heavily rely on hardware as the root of trust. However, their increasing complexity has given rise to security-critical vulnerabilities that cross-layer at-tacks can exploit. Traditional hardware vulnerability detection methods, such as random regression and formal verification, have limitations. Random regression, while scalable, is slow in exploring hardware, and formal… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  12. Quality-Aware Dynamic Resolution Adaptation Framework for Adaptive Video Streaming

    Authors: Amritha Premkumar, Prajit T Rajendran, Vignesh V Menon, Adam Wieckowski, Benjamin Bross, Detlev Marpe

    Abstract: Traditional per-title encoding schemes aim to optimize encoding resolutions to deliver the highest perceptual quality for each representation. XPSNR is observed to correlate better with the subjective quality of VVC-coded bitstreams. Towards this realization, we predict the average XPSNR of VVC-coded bitstreams using spatiotemporal complexity features of the video and the target encoding configura… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: ACM MMSys '24 | Open-Source Software and Dataset. arXiv admin note: substantial text overlap with arXiv:2401.15346

  13. arXiv:2403.04253  [pdf, other

    cs.LG

    Mastering Memory Tasks with World Models

    Authors: Mohammad Reza Samsami, Artem Zholus, Janarthanan Rajendran, Sarath Chandar

    Abstract: Current model-based reinforcement learning (MBRL) agents struggle with long-term dependencies. This limits their ability to effectively solve tasks involving extended time gaps between actions and outcomes, or tasks demanding the recalling of distant observations to inform current actions. To improve temporal coherence, we integrate a new family of state space models (SSMs) in world models of MBRL… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

    Comments: Published as a conference paper at The International Conference on Learning Representations 2024

  14. arXiv:2403.03867  [pdf, other

    cs.CL cs.LG stat.ML

    On the Origins of Linear Representations in Large Language Models

    Authors: Yibo Jiang, Goutham Rajendran, Pradeep Ravikumar, Bryon Aragam, Victor Veitch

    Abstract: Recent works have argued that high-level semantic concepts are encoded "linearly" in the representation space of large language models. In this work, we study the origins of such linear representations. To that end, we introduce a simple latent variable model to abstract and formalize the concept dynamics of the next token prediction. We use this formalism to show that the next token prediction ob… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  15. arXiv:2402.18208  [pdf, other

    cs.SI cs.MM

    Shorts on the Rise: Assessing the Effects of YouTube Shorts on Long-Form Video Content

    Authors: Prajit T. Rajendran, Kevin Creusy, Vivien Garnes

    Abstract: Short form content has permeated into the video creator space over the past few years, led by industry leading products such as TikTok, YouTube Shorts and Instagram Reels. YouTube in particular was previously synonymous with being the main hub for long form video content consumption. The monetization of long form videos was easier as it allowed multiple advertisement placements during the course o… ▽ More

    Submitted 8 April, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  16. arXiv:2402.14152  [pdf, other

    cs.AR cs.CR

    ModSRAM: Algorithm-Hardware Co-Design for Large Number Modular Multiplication in SRAM

    Authors: Jonathan Ku, Junyao Zhang, Haoxuan Shan, Saichand Samudrala, Jiawen Wu, Qilin Zheng, Ziru Li, JV Rajendran, Yiran Chen

    Abstract: Elliptic curve cryptography (ECC) is widely used in security applications such as public key cryptography (PKC) and zero-knowledge proofs (ZKP). ECC is composed of modular arithmetic, where modular multiplication takes most of the processing time. Computational complexity and memory constraints of ECC limit the performance. Therefore, hardware acceleration on ECC is an active field of research. Pr… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: DAC 2024

  17. arXiv:2402.13946  [pdf, other

    cs.LG cs.CR

    AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning

    Authors: Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran

    Abstract: Machine learning has shown great promise in addressing several critical hardware security problems. In particular, researchers have developed novel graph neural network (GNN)-based techniques for detecting intellectual property (IP) piracy, detecting hardware Trojans (HTs), and reverse engineering circuits, to name a few. These techniques have demonstrated outstanding accuracy and have received mu… ▽ More

    Submitted 26 February, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

    Comments: To appear in USENIX Security Symposium, 2024

  18. arXiv:2402.09236  [pdf, other

    cs.LG cs.AI math.ST stat.ML

    Learning Interpretable Concepts: Unifying Causal Representation Learning and Foundation Models

    Authors: Goutham Rajendran, Simon Buchholz, Bryon Aragam, Bernhard Schölkopf, Pradeep Ravikumar

    Abstract: To build intelligent machine learning systems, there are two broad approaches. One approach is to build inherently interpretable models, as endeavored by the growing field of causal representation learning. The other approach is to build highly-performant foundation models and then invest efforts into understanding how they work. In this work, we relate these two approaches and study how to learn… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: 36 pages

  19. arXiv:2402.09109  [pdf, other

    cs.AR cs.AI cs.LG cs.NE eess.SP

    Stochastic Spiking Attention: Accelerating Attention with Stochastic Computing in Spiking Networks

    Authors: Zihang Song, Prabodh Katti, Osvaldo Simeone, Bipin Rajendran

    Abstract: Spiking Neural Networks (SNNs) have been recently integrated into Transformer architectures due to their potential to reduce computational demands and to improve power efficiency. Yet, the implementation of the attention mechanism using spiking signals on general-purpose computing platforms remains inefficient. In this paper, we propose a novel framework leveraging stochastic computing (SC) to eff… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  20. arXiv:2402.03704  [pdf, other

    cs.CR

    WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

    Authors: Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran

    Abstract: Timing vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing techniques, traditionally used for detecting software vulnerabilities, have shown promising results for uncovering vulnerabilities in large-scale hardware designs, such as processors. Researchers have adapted black-b… ▽ More

    Submitted 14 March, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted to USENIX Sec'24

  21. arXiv:2402.03513  [pdf, other

    cs.MM

    Video Super-Resolution for Optimized Bitrate and Green Online Streaming

    Authors: Vignesh V Menon, Prajit T Rajendran, Amritha Premkumar, Benjamin Bross, Detlev Marpe

    Abstract: Conventional per-title encoding schemes strive to optimize encoding resolutions to deliver the utmost perceptual quality for each bitrate ladder representation. Nevertheless, maintaining encoding time within an acceptable threshold is equally imperative in online streaming applications. Furthermore, modern client devices are equipped with the capability for fast deep-learning-based video super-res… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 2024 Picture Coding Symposium (PCS)

  22. arXiv:2402.03289  [pdf, other

    cs.LG cs.AI cs.AR

    Make Every Move Count: LLM-based High-Quality RTL Code Generation Using MCTS

    Authors: Matthew DeLorenzo, Animesh Basak Chowdhury, Vasudev Gohil, Shailja Thakur, Ramesh Karri, Siddharth Garg, Jeyavijayan Rajendran

    Abstract: Existing large language models (LLMs) for register transfer level code generation face challenges like compilation failures and suboptimal power, performance, and area (PPA) efficiency. This is due to the lack of PPA awareness in conventional transformer decoding algorithms. In response, we present an automated transformer decoding algorithm that integrates Monte Carlo tree-search for lookahead, g… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  23. arXiv:2402.00004  [pdf

    cs.RO cs.CV

    Revolutionizing Underwater Exploration of Autonomous Underwater Vehicles (AUVs) and Seabed Image Processing Techniques

    Authors: Rajesh Sharma R, Akey Sungheetha, Dr Chinnaiyan R

    Abstract: The oceans in the Earth's in one of the last border lines on the World, with only a fraction of their depths having been explored. Advancements in technology have led to the development of Autonomous Underwater Vehicles (AUVs) that can operate independently and perform complex tasks underwater. These vehicles have revolutionized underwater exploration, allowing us to study and understand our ocean… ▽ More

    Submitted 22 November, 2023; originally announced February 2024.

    Comments: 7 pages

  24. arXiv:2401.15453  [pdf, other

    cs.NE

    Bayesian Inference Accelerator for Spiking Neural Networks

    Authors: Prabodh Katti, Anagha Nimbekar, Chen Li, Amit Acharyya, Bashir M. Al-Hashimi, Bipin Rajendran

    Abstract: Bayesian neural networks offer better estimates of model uncertainty compared to frequentist networks. However, inference involving Bayesian models requires multiple instantiations or sampling of the network parameters, requiring significant computational resources. Compared to traditional deep learning networks, spiking neural networks (SNNs) have the potential to reduce computational area and po… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: Submitted and Accepted in ISCAS 2024

  25. Energy-efficient Adaptive Video Streaming with Latency-Aware Dynamic Resolution Encoding

    Authors: Vignesh V Menon, Amritha Premkumar, Prajit T Rajendran, Adam Wieckowski, Benjamin Bross, Christian Timmerer, Detlev Marpe

    Abstract: Traditional per-title encoding schemes aim to optimize encoding resolutions to deliver the highest perceptual quality for each representation. However, kee** the encoding time within an acceptable threshold for a smooth user experience is important to reduce the carbon footprint and energy consumption on encoding servers in video streaming applications. Toward this realization, we introduce an e… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: 2024 Mile High Video (MHV)

  26. Optimal Quality and Efficiency in Adaptive Live Streaming with JND-Aware Low latency Encoding

    Authors: Vignesh V Menon, **gwen Zhu, Prajit T Rajendran, Samira Afzal, Klaus Schoeffmann, Patrick Le Callet, Christian Timmerer

    Abstract: In HTTP adaptive live streaming applications, video segments are encoded at a fixed set of bitrate-resolution pairs known as bitrate ladder. Live encoders use the fastest available encoding configuration, referred to as preset, to ensure the minimum possible latency in video encoding. However, an optimized preset and optimized number of CPU threads for each encoding instance may result in (i) incr… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: 2024 Mile High Video (MHV)

  27. arXiv:2401.14292  [pdf, other

    cs.RO cs.AI

    Single and bi-layered 2-D acoustic soft tactile skin (AST2)

    Authors: Vishnu Rajendran, Simon Parsons, Amir Ghalamzan E

    Abstract: This paper aims to present an innovative and cost-effective design for Acoustic Soft Tactile (AST) Skin, with the primary goal of significantly enhancing the accuracy of 2-D tactile feature estimation. The existing challenge lies in achieving precise tactile feature estimation, especially concerning contact geometry characteristics, using cost-effective solutions. We hypothesise that by harnessing… ▽ More

    Submitted 29 February, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: IEEE Robosoft conference 2024 (accepted)

  28. arXiv:2401.05414  [pdf, other

    q-fin.ST cs.LG stat.ME

    On the Three Demons in Causality in Finance: Time Resolution, Nonstationarity, and Latent Factors

    Authors: Xinshuai Dong, Haoyue Dai, Yewen Fan, Songyao **, Sathyamoorthy Rajendran, Kun Zhang

    Abstract: Financial data is generally time series in essence and thus suffers from three fundamental issues: the mismatch in time resolution, the time-varying property of the distribution - nonstationarity, and causal factors that are important but unknown/unobserved. In this paper, we follow a causal perspective to systematically look into these three demons in finance. Specifically, we reexamine these iss… ▽ More

    Submitted 12 January, 2024; v1 submitted 28 December, 2023; originally announced January 2024.

  29. arXiv:2312.16362  [pdf

    cs.LG cs.CY cs.HC

    Kee** Teams in the Game: Predicting Dropouts in Online Problem-Based Learning Competition

    Authors: Aditya Panwar, Ashwin T S, Ramkumar Rajendran, Kavi Arya

    Abstract: Online learning and MOOCs have become increasingly popular in recent years, and the trend will continue, given the technology boom. There is a dire need to observe learners' behavior in these online courses, similar to what instructors do in a face-to-face classroom. Learners' strategies and activities become crucial to understanding their behavior. One major challenge in online courses is predict… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

    ACM Class: K.3

    Journal ref: 31st International Conference on Computers in Education, Volume 1, 2023

  30. arXiv:2312.16361  [pdf

    cs.HC

    DLOT: An Open-Source Application to Assist Human Observers

    Authors: T S Ashwin, Shaikh Danish Shafi, Rajendran Ramkumar

    Abstract: Adaptive intelligent educational systems are gaining popularity, offering personalized learning experiences to students based on their individual needs and styles. One crucial feature of such systems is real-time personalized feedback. However, identifying real-time learning processes impacting student performance remains challenging due to data volume constraints. Current research often relies on… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

    ACM Class: K.3

    Journal ref: 31st International Conference on Computers in Education, Volume 1, 2023

  31. arXiv:2312.05290  [pdf, other

    cs.CV

    Noise Adaptor in Spiking Neural Networks

    Authors: Chen Li, Bipin Rajendran

    Abstract: Recent strides in low-latency spiking neural network (SNN) algorithms have drawn significant interest, particularly due to their event-driven computing nature and fast inference capability. One of the most efficient ways to construct a low-latency SNN is by converting a pre-trained, low-bit artificial neural network (ANN) into an SNN. However, this conversion process faces two main challenges: Fir… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  32. arXiv:2311.18048  [pdf, other

    cs.LG cs.CE eess.SY stat.ME

    An Interventional Perspective on Identifiability in Gaussian LTI Systems with Independent Component Analysis

    Authors: Goutham Rajendran, Patrik Reizinger, Wieland Brendel, Pradeep Ravikumar

    Abstract: We investigate the relationship between system identification and intervention design in dynamical systems. While previous research demonstrated how identifiable representation learning methods, such as Independent Component Analysis (ICA), can reveal cause-effect relationships, it relied on a passive perspective without considering how to collect data. Our work shows that in Gaussian Linear Time-… ▽ More

    Submitted 16 February, 2024; v1 submitted 29 November, 2023; originally announced November 2023.

    Comments: CLeaR2024 camera ready. Code available at https://github.com/rpatrik96/lti-ica

  33. arXiv:2311.14594  [pdf, other

    cs.CR

    MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors

    Authors: Vasudev Gohil, Rahul Kande, Chen Chen, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran

    Abstract: As the complexities of processors keep increasing, the task of effectively verifying their integrity and security becomes ever more daunting. The intricate web of instructions, microarchitectural features, and interdependencies woven into modern processors pose a formidable challenge for even the most diligent verification and security engineers. To tackle this growing concern, recently, researche… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Comments: To be published at Design, Automation and Test in Europe Conference, 2024

  34. arXiv:2311.10399  [pdf

    cs.CV

    Optimized Deep Learning Models for AUV Seabed Image Analysis

    Authors: Rajesh Sharma R, Akey Sungheetha, Chinnaiyan R

    Abstract: Using autonomous underwater vehicles, or AUVs, has completely changed how we gather data from the ocean floor. AUV innovation has advanced significantly, especially in the analysis of images, due to the increasing need for accurate and efficient seafloor map**. This blog post provides a detailed summary and comparison of the most current advancements in AUV seafloor image processing. We will go… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 6 pages , 4 figures

  35. arXiv:2311.08074  [pdf, other

    cs.MM

    Content-Adaptive Variable Framerate Encoding Scheme for Green Live Streaming

    Authors: Vignesh V Menon, Samira Afzal, Prajit T Rajendran, Klaus Schoeffmann, Radu Prodan, Christian Timmerer

    Abstract: Adaptive live video streaming applications use a fixed predefined configuration for the bitrate ladder with constant framerate and encoding presets in a session. However, selecting optimized framerates and presets for every bitrate ladder representation can enhance perceptual quality, improve computational resource allocation, and thus, the streaming energy efficiency. In particular, low framerate… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  36. arXiv:2311.07687  [pdf, other

    cs.CL cs.AI cs.LG

    Language Model-In-The-Loop: Data Optimal Approach to Learn-To-Recommend Actions in Text Games

    Authors: Arjun Vaithilingam Sudhakar, Prasanna Parthasarathi, Janarthanan Rajendran, Sarath Chandar

    Abstract: Large Language Models (LLMs) have demonstrated superior performance in language understanding benchmarks. CALM, a popular approach, leverages linguistic priors of LLMs -- GPT-2 -- for action candidate recommendations to improve the performance in text games in Jericho without environment-provided actions. However, CALM adapts GPT-2 with annotated human gameplays and keeps the LLM fixed during the… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  37. arXiv:2310.09570  [pdf, other

    cs.MM

    Energy-Efficient Multi-Codec Bitrate-Ladder Estimation for Adaptive Video Streaming

    Authors: Vignesh V Menon, Reza Farahani, Prajit T Rajendran, Samira Afzal, Klaus Schoeffmann, Christian Timmerer

    Abstract: With the emergence of multiple modern video codecs, streaming service providers are forced to encode, store, and transmit bitrate ladders of multiple codecs separately, consequently suffering from additional energy costs for encoding, storage, and transmission. To tackle this issue, we introduce an online energy-efficient Multi-Codec Bitrate ladder Estimation scheme (MCBE) for adaptive video strea… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE International Conference on Visual Communications and Image Processing (VCIP), 2023

  38. Performance Evaluation of Video Streaming Applications with Target Wake Time in Wi-Fi 6

    Authors: Govind Rajendran, Rishabh Roy, Preyas Hathi, Nadeem Akhtar, Samar Agnihotri

    Abstract: The Target Wake Time (TWT) feature, introduced in Wi-Fi 6, was primarily meant as an advanced power save mechanism. However, it has some interesting applications in scheduling and resource allocation. TWT-based resource allocation can be used to improve the user experience for certain applications, e.g., VoIP, IoT, video streaming, etc. In this work, we analyze the packet arrival pattern for strea… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: This paper was part of 15th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 2023

  39. arXiv:2309.15942  [pdf, other

    cs.AI cs.ET cs.IT

    Towards Efficient and Trustworthy AI Through Hardware-Algorithm-Communication Co-Design

    Authors: Bipin Rajendran, Osvaldo Simeone, Bashir M. Al-Hashimi

    Abstract: Artificial intelligence (AI) algorithms based on neural networks have been designed for decades with the goal of maximising some measure of accuracy. This has led to two undesired effects. First, model complexity has risen exponentially when measured in terms of computation and memory requirements. Second, state-of-the-art AI models are largely incapable of providing trustworthy measures of their… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  40. arXiv:2309.10881  [pdf

    cs.RO q-bio.TO

    Nanorobotics in Medicine: A Systematic Review of Advances, Challenges, and Future Prospects

    Authors: Shishir Rajendran, Prathic Sundararajan, Ashi Awasthi, Suraj Rajendran

    Abstract: Nanorobotics offers an emerging frontier in biomedicine, holding the potential to revolutionize diagnostic and therapeutic applications through its unique capabilities in manipulating biological systems at the nanoscale. Following PRISMA guidelines, a comprehensive literature search was conducted using IEEE Xplore and PubMed databases, resulting in the identification and analysis of a total of 414… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  41. arXiv:2309.07156  [pdf, other

    eess.SP cs.LG

    Transparency in Sleep Staging: Deep Learning Method for EEG Sleep Stage Classification with Model Interpretability

    Authors: Shivam Sharma, Suvadeep Maiti, S. Mythirayee, Srijithesh Rajendran, Raju Surampudi Bapi

    Abstract: Automated Sleep stage classification using raw single channel EEG is a critical tool for sleep quality assessment and disorder diagnosis. However, modelling the complexity and variability inherent in this signal is a challenging task, limiting their practicality and effectiveness in clinical settings. To mitigate these challenges, this study presents an end-to-end deep learning (DL) model which in… ▽ More

    Submitted 14 January, 2024; v1 submitted 10 September, 2023; originally announced September 2023.

    Comments: 12 pages, 9 figures, Under review at IEEE Journal of Biomedical and Health Informatics

  42. arXiv:2308.13877  [pdf

    q-bio.SC cs.LG q-bio.BM

    Applications of machine Learning to improve the efficiency and range of microbial biosynthesis: a review of state-of-art techniques

    Authors: Akshay Bhalla, Suraj Rajendran

    Abstract: In the modern world, technology is at its peak. Different avenues in programming and technology have been explored for data analysis, automation, and robotics. Machine learning is key to optimize data analysis, make accurate predictions, and hasten/improve existing functions. Thus, presently, the field of machine learning in artificial intelligence is being developed and its uses in varying fields… ▽ More

    Submitted 14 October, 2023; v1 submitted 26 August, 2023; originally announced August 2023.

  43. arXiv:2308.11152  [pdf, other

    eess.SY cs.LG

    Energy-Efficient On-Board Radio Resource Management for Satellite Communications via Neuromorphic Computing

    Authors: Flor Ortiz, Nicolas Skatchkovsky, Eva Lagunas, Wallace A. Martins, Geoffrey Eappen, Saed Daoud, Osvaldo Simeone, Bipin Rajendran, Symeon Chatzinotas

    Abstract: The latest satellite communication (SatCom) missions are characterized by a fully reconfigurable on-board software-defined payload, capable of adapting radio resources to the temporal and spatial variations of the system traffic. As pure optimization-based solutions have shown to be computationally tedious and to lack flexibility, machine learning (ML)-based methods have emerged as promising alter… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: currently under review at IEEE Transactions on Machine Learning in Communications and Networking

  44. arXiv:2308.10284  [pdf, other

    cs.LG cs.AI cs.MA

    Towards Few-shot Coordination: Revisiting Ad-hoc Teamplay Challenge In the Game of Hanabi

    Authors: Hadi Nekoei, Xutong Zhao, Janarthanan Rajendran, Miao Liu, Sarath Chandar

    Abstract: Cooperative Multi-agent Reinforcement Learning (MARL) algorithms with Zero-Shot Coordination (ZSC) have gained significant attention in recent years. ZSC refers to the ability of agents to coordinate zero-shot (without additional interaction experience) with independently trained agents. While ZSC is crucial for cooperative MARL agents, it might not be possible for complex tasks and changing envir… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

  45. arXiv:2307.14480  [pdf, other

    cs.CR

    PSOFuzz: Fuzzing Processors with Particle Swarm Optimization

    Authors: Chen Chen, Vasudev Gohil, Rahul Kande, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran

    Abstract: Hardware security vulnerabilities in computing systems compromise the security defenses of not only the hardware but also the software running on it. Recent research has shown that hardware fuzzing is a promising technique to efficiently detect such vulnerabilities in large-scale designs such as modern processors. However, the current fuzzing techniques do not adjust their strategies dynamically t… ▽ More

    Submitted 18 August, 2023; v1 submitted 26 July, 2023; originally announced July 2023.

    Comments: To be published in the proceedings of the ICCAD, 2023

  46. arXiv:2307.02569  [pdf, other

    cs.CR

    Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES

    Authors: Nithyashankari Gummidipoondi Jayasankaran, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran, Jiang Hu

    Abstract: The various benefits of multi-tenanting, such as higher device utilization and increased profit margin, intrigue the cloud field-programmable gate array (FPGA) servers to include multi-tenanting in their infrastructure. However, this property makes these servers vulnerable to power side-channel (PSC) attacks. Logic designs such as ring oscillator (RO) and time-to-digital converter (TDC) are used t… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

  47. arXiv:2306.16786  [pdf, other

    cs.MM

    All-intra rate control using low complexity video features for Versatile Video Coding

    Authors: Vignesh V Menon, Anastasia Henkel, Prajit T Rajendran, Christian R. Helmrich, Adam Wieckowski, Benjamin Bross, Christian Timmerer, Detlev Marpe

    Abstract: Versatile Video Coding (VVC) allows for large compression efficiency gains over its predecessor, High Efficiency Video Coding (HEVC). The added efficiency comes at the cost of increased runtime complexity, especially for encoding. It is thus highly relevant to explore all available runtime reduction options. This paper proposes a novel first pass for two-pass rate control in all-intra configuratio… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: Accepted in IEEE International Conference on Image Processing (ICIP), 2023

  48. (Security) Assertions by Large Language Models

    Authors: Rahul Kande, Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, Shailja Thakur, Ramesh Karri, Jeyavijayan Rajendran

    Abstract: The security of computer systems typically relies on a hardware root of trust. As vulnerabilities in hardware can have severe implications on a system, there is a need for techniques to support security verification activities. Assertion-based verification is a popular verification technique that involves capturing design intent in a set of assertions that can be used in formal verification or tes… ▽ More

    Submitted 9 July, 2024; v1 submitted 24 June, 2023; originally announced June 2023.

    Comments: This article has been accepted for publication in IEEE Transactions on Information Forensics and Security. This is the author's version. See https://ieeexplore.ieee.org/document/10458667 for the published version of the paper. Citation information: DOI 10.1109/TIFS.2024.3372809. See https://www.ieee.org/publications/rights/index.html for information on publication rights

    Journal ref: IEEE Transactions on Information Forensics and Security. 2024 Mar 4

  49. arXiv:2306.05532  [pdf, other

    cs.CR

    FuncTeller: How Well Does eFPGA Hide Functionality?

    Authors: Zhaokun Han, Mohammed Shayan, Aneesh Dixit, Mustafa Shihab, Yiorgos Makris, Jeyavijayan Rajendran

    Abstract: Hardware intellectual property (IP) piracy is an emerging threat to the global supply chain. Correspondingly, various countermeasures aim to protect hardware IPs, such as logic locking, camouflaging, and split manufacturing. However, these countermeasures cannot always guarantee IP security. A malicious attacker can access the layout/netlist of the hardware IP protected by these countermeasures an… ▽ More

    Submitted 20 June, 2023; v1 submitted 8 June, 2023; originally announced June 2023.

    Comments: To be published in the proceedings of the 32nd USENIX Security Symposium, 2023

  50. arXiv:2306.02235  [pdf, other

    cs.LG cs.AI math.ST stat.ME stat.ML

    Learning Linear Causal Representations from Interventions under General Nonlinear Mixing

    Authors: Simon Buchholz, Goutham Rajendran, Elan Rosenfeld, Bryon Aragam, Bernhard Schölkopf, Pradeep Ravikumar

    Abstract: We study the problem of learning causal representations from unknown, latent interventions in a general setting, where the latent distribution is Gaussian but the mixing function is completely general. We prove strong identifiability results given unknown single-node interventions, i.e., without having access to the intervention targets. This generalizes prior works which have focused on weaker cl… ▽ More

    Submitted 18 December, 2023; v1 submitted 3 June, 2023; originally announced June 2023.

    Comments: Accepted as Oral paper at NeurIPS 2023