Skip to main content

Showing 1–17 of 17 results for author: Sarkar, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.04245  [pdf

    cs.CR cs.CV cs.LG

    Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

    Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen

    Abstract: This technical report delves into an in-depth exploration of adversarial attacks specifically targeted at Deep Neural Networks (DNNs) utilized for image classification. The study also investigates defense mechanisms aimed at bolstering the robustness of machine learning models. The research focuses on comprehending the ramifications of two prominent attack methodologies: the Fast Gradient Sign Met… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: This report pertains to the Capstone Project done by Group 1 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 35 pages and it includes 15 figures and 10 tables. This is the preprint which will be submitted to to an IEEE international conference for review

  2. arXiv:2307.15768  [pdf, other

    cs.CY

    DARSAN: A Decentralized Review System Suitable for NFT Marketplaces

    Authors: Sulyab Thottungal Valapu, Tamoghna Sarkar, Jared Coleman, Anusha Avyukt, Hugo Embrechts, Dimitri Torfs, Michele Minelli, Bhaskar Krishnamachari

    Abstract: We introduce DARSAN, a decentralized review system designed for Non-Fungible Token (NFT) marketplaces, to address the challenge of verifying the quality of highly resalable products with few verified buyers by incentivizing unbiased reviews. DARSAN works by iteratively selecting a group of reviewers (called ``experts'') who are likely to both accurately predict the objective popularity and assess… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  3. arXiv:2107.09710  [pdf, ps, other

    cs.CL

    TLA: Twitter Linguistic Analysis

    Authors: Tushar Sarkar, Nishant Rajadhyaksha

    Abstract: Linguistics has been instrumental in develo** a deeper understanding of human nature. Words are indispensable to bequeath the thoughts, emotions, and purpose of any human interaction, and critically analyzing these words can elucidate the social and psychological behavior and characteristics of these social animals. Social media has become a platform for human interaction on a large scale and th… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

  4. arXiv:2106.12888  [pdf

    cs.LG stat.AP

    COVID-19 cases prediction using regression and novel SSM model for non-converged countries

    Authors: Tushar Sarkar, Umang Patel, Rupali Patil

    Abstract: Anticipating the quantity of new associated or affirmed cases with novel coronavirus ailment 2019 (COVID-19) is critical in the counteraction and control of the COVID-19 flare-up. The new associated cases with COVID-19 information were gathered from 20 January 2020 to 21 July 2020. We filtered out the countries which are converging and used those for training the network. We utilized the SARIMAX,… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

    Journal ref: J. Appl. Sci. Eng. Technol. Educ., vol. 3, no. 1, pp. 74-81, Feb. 2021

  5. arXiv:2106.05239  [pdf, other

    cs.LG

    XBNet : An Extremely Boosted Neural Network

    Authors: Tushar Sarkar

    Abstract: Neural networks have proved to be very robust at processing unstructured data like images, text, videos, and audio. However, it has been observed that their performance is not up to the mark in tabular data; hence tree-based models are preferred in such scenarios. A popular model for tabular data is boosted trees, a highly efficacious and extensively used machine learning method, and it also provi… ▽ More

    Submitted 21 April, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

  6. arXiv:2102.05164  [pdf, other

    cs.LG stat.ML

    Nonstochastic Bandits with Infinitely Many Experts

    Authors: X. Flora Meng, Tuhin Sarkar, Munther A. Dahleh

    Abstract: We study the problem of nonstochastic bandits with expert advice, extending the setting from finitely many experts to any countably infinite set: A learner aims to maximize the total reward by taking actions sequentially based on bandit feedback while benchmarking against a set of experts. We propose a variant of Exp4.P that, for finitely many experts, enables inference of correct expert rankings… ▽ More

    Submitted 25 March, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: Added numerical experiments

  7. arXiv:2004.14681  [pdf, other

    cs.LG math.OC math.ST stat.ML

    Learning nonlinear dynamical systems from a single trajectory

    Authors: Dylan J. Foster, Alexander Rakhlin, Tuhin Sarkar

    Abstract: We introduce algorithms for learning nonlinear dynamical systems of the form $x_{t+1}=σ(Θ^{\star}x_t)+\varepsilon_t$, where $Θ^{\star}$ is a weight matrix, $σ$ is a nonlinear link function, and $\varepsilon_t$ is a mean-zero noise process. We give an algorithm that recovers the weight matrix $Θ^{\star}$ from a single trajectory with optimal sample complexity and linear running time. The algorithm… ▽ More

    Submitted 30 April, 2020; originally announced April 2020.

    Comments: To appear at L4DC 2020

  8. arXiv:2004.11726  [pdf, other

    cs.CV

    A Two-Stage Multiple Instance Learning Framework for the Detection of Breast Cancer in Mammograms

    Authors: Sarath Chandra K, Arunava Chakravarty, Nirmalya Ghosh, Tandra Sarkar, Ramanathan Sethuraman, Debdoot Sheet

    Abstract: Mammograms are commonly employed in the large scale screening of breast cancer which is primarily characterized by the presence of malignant masses. However, automated image-level detection of malignancy is a challenging task given the small size of the mass regions and difficulty in discriminating between malignant, benign mass and healthy dense fibro-glandular tissue. To address these issues, we… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: accepted in EMBC 2020, 4 pg+1 pg Supplementary

  9. arXiv:2004.11721  [pdf, other

    cs.CV cs.LG eess.IV

    Learning Decision Ensemble using a Graph Neural Network for Comorbidity Aware Chest Radiograph Screening

    Authors: Arunava Chakravarty, Tandra Sarkar, Nirmalya Ghosh, Ramanathan Sethuraman, Debdoot Sheet

    Abstract: Chest radiographs are primarily employed for the screening of cardio, thoracic and pulmonary conditions. Machine learning based automated solutions are being developed to reduce the burden of routine screening on Radiologists, allowing them to focus on critical cases. While recent efforts demonstrate the use of ensemble of deep convolutional neural networks(CNN), they do not take disease comorbidi… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: accepted in EMBC 2020, 4pg+2pg Supplementary Material

  10. arXiv:2004.11693  [pdf, other

    cs.CV cs.LG

    A Systematic Search over Deep Convolutional Neural Network Architectures for Screening Chest Radiographs

    Authors: Arka Mitra, Arunava Chakravarty, Nirmalya Ghosh, Tandra Sarkar, Ramanathan Sethuraman, Debdoot Sheet

    Abstract: Chest radiographs are primarily employed for the screening of pulmonary and cardio-/thoracic conditions. Being undertaken at primary healthcare centers, they require the presence of an on-premise reporting Radiologist, which is a challenge in low and middle income countries. This has inspired the development of machine learning based automation of the screening process. While recent efforts demons… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: accepted in EMBC 2020, 4 pages+2 page Appendix

  11. arXiv:1805.08125  [pdf, other

    cs.GT

    A Marketplace for Data: An Algorithmic Solution

    Authors: Anish Agarwal, Munther Dahleh, Tuhin Sarkar

    Abstract: In this work, we aim to design a data marketplace; a robust real-time matching mechanism to efficiently buy and sell training data for Machine Learning tasks. While the monetization of data and pre-trained models is an essential focus of industry today, there does not exist a market mechanism to price training data and match buyers to sellers while still addressing the associated (computational an… ▽ More

    Submitted 12 May, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

  12. arXiv:1407.6482  [pdf

    cs.CR

    Securing Cloud from Cloud Drain

    Authors: Niva Das, Tanmoy Sarkar

    Abstract: Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role.The u… ▽ More

    Submitted 29 September, 2014; v1 submitted 24 July, 2014; originally announced July 2014.

  13. arXiv:1406.2146  [pdf

    cs.CR

    Digital Watermarking Techniques in Spatial and Frequency Domain

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Digital watermarking is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover data) with minimum distortion of the cover data. Due to these watermarking techniques the watermark image is almost negligible visible. In this paper we will discuss a… ▽ More

    Submitted 13 October, 2014; v1 submitted 9 June, 2014; originally announced June 2014.

    Comments: 5 pages, 5 figures

  14. arXiv:1405.5119  [pdf

    cs.MM cs.CR

    Steganalysis: Detecting LSB Steganographic Techniques

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved steganography techniques are developed and proposed by researchers which require robust steganalysis techniques to detect the stego images having minimum false alarm rate.… ▽ More

    Submitted 20 May, 2014; originally announced May 2014.

    Comments: 5 pages, 1 figure

  15. arXiv:1405.2684  [pdf

    cs.CR

    Reversible and Irreversible Data Hiding Technique

    Authors: Tanmoy Sarkar, Sugata Sanyal

    Abstract: Steganography (literally meaning covered writing) is the art and science of embedding secret message into seemingly harmless message. Stenography is practice from olden days where in ancient Greece people used wooden blocks to inscribe secret data and cover the date with wax and write normal message on it. Today stenography is used in various field like multimedia, networks, medical, military etc.… ▽ More

    Submitted 20 May, 2014; v1 submitted 12 May, 2014; originally announced May 2014.

    Comments: 4 pages, 3 figures

  16. Lossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding

    Authors: Ramji Venkataramanan, Tuhin Sarkar, Sekhar Tatikonda

    Abstract: We propose computationally efficient encoders and decoders for lossy compression using a Sparse Regression Code. The codebook is defined by a design matrix and codewords are structured linear combinations of columns of this matrix. The proposed encoding algorithm sequentially chooses columns of the design matrix to successively approximate the source sequence. It is shown to achieve the optimal di… ▽ More

    Submitted 28 March, 2014; v1 submitted 7 December, 2012; originally announced December 2012.

    Comments: 14 pages, to appear in IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 6, pp. 3265-3278, June 2014

  17. arXiv:1109.1653  [pdf

    cs.ET physics.comp-ph

    A Study of Computer-Based Simulations for Nano-Systems and their types

    Authors: Tamal Sarkar, Samir Chandra Das, Ardhendu Mandal

    Abstract: In most of the cases, the experimental study of Nanotechnology involves high cost for Laboratory set-up and the experimentation processes were also slow. So, one cannot rely on experimental nanotechnology alone. As such, the Computer-Based molecular simulations and modeling are one of the foundations of computational nanotechnology. The computer based modeling and simulations were also referred as… ▽ More

    Submitted 8 September, 2011; originally announced September 2011.

    Comments: 6 Pages; Proceedings of 2nd National Conference on Nano-materials and Nanotechnology (21-23 December, 2009), ISBN: 978-93-80043-61-6