Skip to main content

Showing 1–6 of 6 results for author: Seetharaman, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.06407  [pdf, ps, other

    cs.DS

    Quick-Sort Style Approximation Algorithms for Generalizations of Feedback Vertex Set in Tournaments

    Authors: Sushmita Gupta, Sounak Modak, Saket Saurabh, Sanjay Seetharaman

    Abstract: A feedback vertex set (FVS) in a digraph is a subset of vertices whose removal makes the digraph acyclic. In other words, it hits all cycles in the digraph. Lokshtanov et al. [TALG '21] gave a factor 2 randomized approximation algorithm for finding a minimum weight FVS in tournaments. We generalize the result by presenting a factor $2α$ randomized approximation algorithm for finding a minimum weig… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: Accepted in Latin American Theoretical Informatics 2024(LATIN 2024)

  2. arXiv:2303.00176  [pdf, other

    physics.bio-ph cond-mat.soft cs.LG

    Zyxin is all you need: machine learning adherent cell mechanics

    Authors: Matthew S. Schmitt, Jonathan Colen, Stefano Sala, John Devany, Shailaja Seetharaman, Margaret L. Gardel, Patrick W. Oakes, Vincenzo Vitelli

    Abstract: Cellular form and function emerge from complex mechanochemical systems within the cytoplasm. No systematic strategy currently exists to infer large-scale physical properties of a cell from its many molecular components. This is a significant obstacle to understanding biophysical processes such as cell adhesion and migration. Here, we develop a data-driven biophysical modeling approach to learn the… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 30 pages, 7 figures

  3. arXiv:2208.02766  [pdf, ps, other

    cs.GT cs.DS

    More Effort Towards Multiagent Knapsack

    Authors: Sushmita Gupta, Pallavi Jain, Sanjay Seetharaman

    Abstract: In this paper, we study some multiagent variants of the knapsack problem. Fluschnik et al. [AAAI 2019] considered the model in which every agent assigns some utility to every item. They studied three preference aggregation rules for finding a subset (knapsack) of items: individually best, diverse, and Nash-welfare-based. Informally, diversity is achieved by satisfying as many voters as possible. M… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: 23 pages

  4. arXiv:2105.14803  [pdf, other

    cs.LG cs.AI cs.CR

    Gradient-based Data Subversion Attack Against Binary Classifiers

    Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha

    Abstract: Machine learning based data-driven technologies have shown impressive performances in a variety of application domains. Most enterprises use data from multiple sources to provide quality applications. The reliability of the external data sources raises concerns for the security of the machine learning techniques adopted. An attacker can tamper the training or test datasets to subvert the predictio… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: 26 pages, 3 Figures, 8 tables, adversarial attacks, data poisoning attacks, label contamination, transferability of attack, susceptibility

  5. arXiv:2104.13230  [pdf, other

    cs.LG cs.AI cs.CR

    Influence Based Defense Against Data Poisoning Attacks in Online Learning

    Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha

    Abstract: Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. Therefore, applications that rely on external data-sources for training data are at a significantly higher risk. There are several known defensive mechanisms that can help in mitigating the threat from such attacks. For example, data… ▽ More

    Submitted 24 April, 2021; originally announced April 2021.

    Comments: 18 pages, 3 Figures, 2 Tables, Adversarial Machine Learning, Data Poisoning, Online Learning, Defense, Influence Function

  6. arXiv:1603.08018  [pdf

    cs.NI

    Survivability in IP over WDM networks

    Authors: Kulathumani Vinodkrishnan, Nikhil Chandhok, Arjan Durresi, Raj Jain, Ramesh Jagannathan, Srinivasan Seetharaman

    Abstract: The Internet is emerging as the new universal telecommunication medium. IP over WDM has been envisioned as one of the most attractive architectures for the new Internet. Consequently survivability is a crucial concern in designing IP over WDM networks. This paper presents a survey of the survivability mechanisms for IP over WDM networks and thus is intended to provide a summary of what has been do… ▽ More

    Submitted 25 March, 2016; originally announced March 2016.

    Journal ref: Journal of High Speed Networks, Vol. 10, No. 2, 2001, pp. 79-90