-
Alignment For Performance Improvement in Conversation Bots
Authors:
Raghav Garg,
Kapil Sharma,
Shrey Singla
Abstract:
This paper shows that alignment methods can achieve superior adherence to guardrails compared to instruction fine-tuning alone in conversational agents, also known as bots, within predefined guidelines or 'guardrails'. It examines traditional training approaches such as instruction fine-tuning and the recent advancements in direct alignment methods like Identity Preference Optimization (IPO), and…
▽ More
This paper shows that alignment methods can achieve superior adherence to guardrails compared to instruction fine-tuning alone in conversational agents, also known as bots, within predefined guidelines or 'guardrails'. It examines traditional training approaches such as instruction fine-tuning and the recent advancements in direct alignment methods like Identity Preference Optimization (IPO), and Kahneman-Tversky Optimization (KTO). The effectiveness of alignment techniques both pre and post-instruction tuning is highlighted, illustrating their potential to optimize conversational bots in domains that require strict adherence to specified rules, such as customer care.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Overlay Space-Air-Ground Integrated Networks with SWIPT-Empowered Aerial Communications
Authors:
Anuradha Verma,
Pankaj Kumar Sharma,
Pawan Kumar,
Dong In Kim
Abstract:
In this article, we consider overlay space-air-ground integrated networks (OSAGINs) where a low earth orbit (LEO) satellite communicates with ground users (GUs) with the assistance of an energy-constrained coexisting air-to-air (A2A) network. Particularly, a non-linear energy harvester with a hybrid SWIPT utilizing both power-splitting and time-switching energy harvesting (EH) techniques is employ…
▽ More
In this article, we consider overlay space-air-ground integrated networks (OSAGINs) where a low earth orbit (LEO) satellite communicates with ground users (GUs) with the assistance of an energy-constrained coexisting air-to-air (A2A) network. Particularly, a non-linear energy harvester with a hybrid SWIPT utilizing both power-splitting and time-switching energy harvesting (EH) techniques is employed at the aerial transmitter. Specifically, we take the random locations of the satellite, ground and aerial receivers to investigate the outage performance of both the satellite-to-ground and aerial networks leveraging the stochastic tools. By taking into account the Shadowed-Rician fading for satellite link, the Nakagami-\emph{m} for ground link, and the Rician fading for aerial link, we derive analytical expressions for the outage probability of these networks. For a comprehensive analysis of aerial network, we consider both the perfect and imperfect successive interference cancellation (SIC) scenarios. Through our analysis, we illustrate that, unlike linear EH, the implementation of non-linear EH provides accurate figures for any target rate, underscoring the significance of using non-linear EH models. Additionally, the influence of key parameters is emphasized, providing guidelines for the practical design of an energy-efficient as well as spectrum-efficient future non-terrestrial networks. Monte Carlo simulations validate the accuracy of our theoretical developments.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
A Pipelined Memristive Neural Network Analog-to-Digital Converter
Authors:
Loai Danial,
Kanishka Sharma,
Shahar Kvatinsky
Abstract:
With the advent of high-speed, high-precision, and low-power mixed-signal systems, there is an ever-growing demand for accurate, fast, and energy-efficient analog-to-digital (ADCs) and digital-to-analog converters (DACs). Unfortunately, with the downscaling of CMOS technology, modern ADCs trade off speed, power and accuracy. Recently, memristive neuromorphic architectures of four-bit ADC/DAC have…
▽ More
With the advent of high-speed, high-precision, and low-power mixed-signal systems, there is an ever-growing demand for accurate, fast, and energy-efficient analog-to-digital (ADCs) and digital-to-analog converters (DACs). Unfortunately, with the downscaling of CMOS technology, modern ADCs trade off speed, power and accuracy. Recently, memristive neuromorphic architectures of four-bit ADC/DAC have been proposed. Such converters can be trained in real-time using machine learning algorithms, to break through the speedpower-accuracy trade-off while optimizing the conversion performance for different applications. However, scaling such architectures above four bits is challenging. This paper proposes a scalable and modular neural network ADC architecture based on a pipeline of four-bit converters, preserving their inherent advantages in application reconfiguration, mismatch selfcalibration, noise tolerance, and power optimization, while approaching higher resolution and throughput in penalty of latency. SPICE evaluation shows that an 8-bit pipelined ADC achieves 0.18 LSB INL, 0.20 LSB DNL, 7.6 ENOB, and 0.97 fJ/conv FOM. This work presents a significant step towards the realization of large-scale neuromorphic data converters.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
UAV-assisted C-RAN for On-demand Cellular Coverage: Opportunities and Challenges
Authors:
Byomakesh Mahapatra,
Deepika Gupta,
Pankaj Kumar Sharma
Abstract:
The deployment of beyond fifth-generation (5G) infrastructure over disaster-affected regions, temporary hotspot situations (e.g., massive gatherings, etc.), complex terrains (e.g., sea, hills, marshes, etc.) poses numerous challenges for cellular service providers. Recently, unmanned aerial vehicles (UAVs) have emerged as potential candidates to overcome the aforementioned technical issues based o…
▽ More
The deployment of beyond fifth-generation (5G) infrastructure over disaster-affected regions, temporary hotspot situations (e.g., massive gatherings, etc.), complex terrains (e.g., sea, hills, marshes, etc.) poses numerous challenges for cellular service providers. Recently, unmanned aerial vehicles (UAVs) have emerged as potential candidates to overcome the aforementioned technical issues based on their multi-role capabilities to serve as aerial base stations, mobile relays, and flying wireless access points. As such, the UAVs can act as portable platforms that can be deployed immediately on demand without requiring massive ground infrastructure to support wireless services. This article introduces the integration of UAVs to cloud radio access networks (C-RAN) for beyond 5G applications. The article mainly focuses on the underlying opportunities and challenges to realize the UAV-assisted C-RAN (UC-RAN) architecture in view of three generic application scenarios, i.e., disaster management, hotspots, and complex terrains. A preliminary performance analysis via simulation is further provided for the proposed UC-RAN under hotspot application scenario based on the relevant metrics.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Fault-Tolerant Quantum LDPC Encoders
Authors:
Abhi Kumar Sharma,
Shayan Srinivasa Garani
Abstract:
We propose fault-tolerant encoders for quantum low-density parity check (LDPC) codes. By grou** qubits within a quantum code over contiguous blocks and applying preshared entanglement across these blocks, we show how transversal implementation can be realized. The proposed encoder reduces the error propagation while using multi-qubit gates and is applicable for both entanglement-unassisted and e…
▽ More
We propose fault-tolerant encoders for quantum low-density parity check (LDPC) codes. By grou** qubits within a quantum code over contiguous blocks and applying preshared entanglement across these blocks, we show how transversal implementation can be realized. The proposed encoder reduces the error propagation while using multi-qubit gates and is applicable for both entanglement-unassisted and entanglement-assisted quantum LDPC codes.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Mental health of computing professionals and students: A systematic literature review
Authors:
Alicia Julia Wilson Takaoka,
Kshitij Sharma
Abstract:
The intersections of mental health and computing education is under-examined. In this systematic literature review, we evaluate the state-of-the-art of research in mental health and well-being interventions, assessments, and concerns like anxiety and depression in computer science and computing education. The studies evaluated occurred across the computing education pipeline from introductory to P…
▽ More
The intersections of mental health and computing education is under-examined. In this systematic literature review, we evaluate the state-of-the-art of research in mental health and well-being interventions, assessments, and concerns like anxiety and depression in computer science and computing education. The studies evaluated occurred across the computing education pipeline from introductory to PhD courses and found some commonalities contributing to high reporting of anxiety and depression in those studied. In addition, interventions that were designed to address mental health topics often revolved around self-guidance. Based on our review of the literature, we recommend increasing sample sizes and focusing on the design and development of tools and interventions specifically designed for computing professionals and students.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
A Review of Barren Plateaus in Variational Quantum Computing
Authors:
Martin Larocca,
Supanut Thanasilp,
Samson Wang,
Kunal Sharma,
Jacob Biamonte,
Patrick J. Coles,
Lukasz Cincio,
Jarrod R. McClean,
Zoë Holmes,
M. Cerezo
Abstract:
Variational quantum computing offers a flexible computational paradigm with applications in diverse areas. However, a key obstacle to realizing their potential is the Barren Plateau (BP) phenomenon. When a model exhibits a BP, its parameter optimization landscape becomes exponentially flat and featureless as the problem size increases. Importantly, all the moving pieces of an algorithm -- choices…
▽ More
Variational quantum computing offers a flexible computational paradigm with applications in diverse areas. However, a key obstacle to realizing their potential is the Barren Plateau (BP) phenomenon. When a model exhibits a BP, its parameter optimization landscape becomes exponentially flat and featureless as the problem size increases. Importantly, all the moving pieces of an algorithm -- choices of ansatz, initial state, observable, loss function and hardware noise -- can lead to BPs when ill-suited. Due to the significant impact of BPs on trainability, researchers have dedicated considerable effort to develop theoretical and heuristic methods to understand and mitigate their effects. As a result, the study of BPs has become a thriving area of research, influencing and cross-fertilizing other fields such as quantum optimal control, tensor networks, and learning theory. This article provides a comprehensive review of the current understanding of the BP phenomenon.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Two Decades of Scientific Misconduct in India: Retraction Reasons and Journal Quality among Inter-country and Intra-country Institutional Collaboration
Authors:
Kiran Sharma
Abstract:
Research stands as a pivotal factor in propelling the progress of any nation forward. However, if tainted by misconduct, it poses a significant threat to the nation's development. This study aims to scrutinize various cases of deliberate scientific misconduct by Indian researchers. A comprehensive analysis was conducted on 3,244 retracted publications sourced from the Retraction Watch database. Th…
▽ More
Research stands as a pivotal factor in propelling the progress of any nation forward. However, if tainted by misconduct, it poses a significant threat to the nation's development. This study aims to scrutinize various cases of deliberate scientific misconduct by Indian researchers. A comprehensive analysis was conducted on 3,244 retracted publications sourced from the Retraction Watch database. The upward trend in retractions is alarming, although the decreasing duration of retractions indicates proactive measures by journals against misconduct. Approximately 60% of retractions stem from private institutions, with fake peer reviews identified as the primary cause of misconduct. This trend could be attributed to incentivizing publication quantity over quality in private institutions, potentially fostering unfair publishing practices. Retractions due to data integrity issues are predominantly observed in public and medical institutions, while retractions due to plagiarism occur in conference proceedings and non-Scopus-indexed journals. Examining retractions resulting from institutional collaborations reveals that 80% originate from within the country, with the remaining 20% being international collaborations. Among inter-country collaborations, one-third of retractions come from the top two journal quartiles, whereas, in intra-country collaborations, half of the retractions stem from Q1 and Q2 journals. Clinical studies retracted from intra-country collaborations are mostly from Q3 and Q4 journals, whereas in inter-country collaborations, they primarily come from Q1 journals. Regarding top journals by the number of retractions in intra-country collaborations, they belong to the Q2 and Q4 categories, whereas in inter-country collaborations, they are in Q1.
△ Less
Submitted 29 March, 2024;
originally announced April 2024.
-
Unraveling Retraction Dynamics in COVID-19 Research: Patterns, Reasons, and Implications
Authors:
Parul Khurana,
Ziya Uddin,
Kiran Sharma
Abstract:
Amid the COVID-19 pandemic, while the world sought solutions, some scholars exploited the situation for personal gains through deceptive studies and manipulated data. This paper presents the extent of 400 retracted COVID-19 papers listed by the Retraction Watch database until February 2024. The primary purpose of the research was to analyze journal quality and retraction trends. For all stakeholde…
▽ More
Amid the COVID-19 pandemic, while the world sought solutions, some scholars exploited the situation for personal gains through deceptive studies and manipulated data. This paper presents the extent of 400 retracted COVID-19 papers listed by the Retraction Watch database until February 2024. The primary purpose of the research was to analyze journal quality and retraction trends. For all stakeholders involved, such as editors, relevant researchers, and policymakers, evaluating the journal's quality is crucial information since it could help them effectively stop such incidents and their negative effects in the future. The present research results imply that one-fourth of publications were retracted within the first month of their publication, followed by an additional 6\% within six months of publication. One-third of the retractions originated from Q1 journals, with another significant portion coming from Q2 (29.8). A notable percentage of the retracted papers (23.2\%) lacked publishing impact, signifying their publication as conference papers or in journals not indexed by Scopus. An examination of the retraction reasons reveals that one-fourth of retractions were due to numerous causes, mostly in Q2 journals, and another quarter were due to data problems, with the majority happening in Q1 publications. Elsevier retracted 31 of the papers, with the majority published in Q1, followed by Springer (11.5), predominantly in Q2. Retracted papers were mainly associated with the USA, China, and India. In the USA, retractions were primarily from Q1 journals followed by no-impact publications; in China, it was Q1 followed by Q2, and in India, it was Q2 followed by no-impact publications. The study also examined author contributions, revealing that 69.3 were male contributors, with females (30.7) mainly holding middle author positions.
△ Less
Submitted 26 March, 2024;
originally announced April 2024.
-
Sparse Wearable Sonomyography Sensor-based Proprioceptive Proportional Control Across Multiple Gestures
Authors:
Anne Tryphosa Kamatham,
Kavita Sharma,
Srikumar Venkataraman,
Biswarup Mukherjee
Abstract:
Sonomyography (SMG) is a non-invasive technique that uses ultrasound imaging to detect the dynamic activity of muscles. Wearable SMG systems have recently gained popularity due to their potential as human-computer interfaces for their superior performance compared to conventional methods. This paper demonstrates real-time positional proportional control of multiple gestures using a multiplexed 8-c…
▽ More
Sonomyography (SMG) is a non-invasive technique that uses ultrasound imaging to detect the dynamic activity of muscles. Wearable SMG systems have recently gained popularity due to their potential as human-computer interfaces for their superior performance compared to conventional methods. This paper demonstrates real-time positional proportional control of multiple gestures using a multiplexed 8-channel wearable SMG system. The amplitude-mode ultrasound signals from the SMG system were utilized to detect muscle activity from the forearm of 8 healthy individuals. The derived signals were used to control the on-screen movement of the cursor. A target achievement task was performed to analyze the performance of our SMG-based human-machine interface. Our wearable SMG system provided accurate, stable, and intuitive control in real-time by achieving an average success rate greater than 80% with all gestures. Furthermore, the wearable SMG system's abilities to detect volitional movement and decode movement kinematic information from SMG trajectories using standard performance metrics were evaluated. Our results provide insights to validate SMG as an intuitive human-machine interface.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Sampling-based Safe Reinforcement Learning for Nonlinear Dynamical Systems
Authors:
Wesley A. Suttle,
Vipul K. Sharma,
Krishna C. Kosaraju,
S. Sivaranjani,
Ji Liu,
Vijay Gupta,
Brian M. Sadler
Abstract:
We develop provably safe and convergent reinforcement learning (RL) algorithms for control of nonlinear dynamical systems, bridging the gap between the hard safety guarantees of control theory and the convergence guarantees of RL theory. Recent advances at the intersection of control and RL follow a two-stage, safety filter approach to enforcing hard safety constraints: model-free RL is used to le…
▽ More
We develop provably safe and convergent reinforcement learning (RL) algorithms for control of nonlinear dynamical systems, bridging the gap between the hard safety guarantees of control theory and the convergence guarantees of RL theory. Recent advances at the intersection of control and RL follow a two-stage, safety filter approach to enforcing hard safety constraints: model-free RL is used to learn a potentially unsafe controller, whose actions are projected onto safe sets prescribed, for example, by a control barrier function. Though safe, such approaches lose any convergence guarantees enjoyed by the underlying RL methods. In this paper, we develop a single-stage, sampling-based approach to hard constraint satisfaction that learns RL controllers enjoying classical convergence guarantees while satisfying hard safety constraints throughout training and deployment. We validate the efficacy of our approach in simulation, including safe control of a quadcopter in a challenging obstacle avoidance problem, and demonstrate that it outperforms existing benchmarks.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Mysterious Projections: Multimodal LLMs Gain Domain-Specific Visual Capabilities Without Richer Cross-Modal Projections
Authors:
Gaurav Verma,
Minje Choi,
Kartik Sharma,
Jamelle Watson-Daniels,
Sejoon Oh,
Srijan Kumar
Abstract:
Multimodal large language models (MLLMs) like LLaVA and GPT-4(V) enable general-purpose conversations about images with the language modality. As off-the-shelf MLLMs may have limited capabilities on images from domains like dermatology and agriculture, they must be fine-tuned to unlock domain-specific applications. The prevalent architecture of current open-source MLLMs comprises two major modules…
▽ More
Multimodal large language models (MLLMs) like LLaVA and GPT-4(V) enable general-purpose conversations about images with the language modality. As off-the-shelf MLLMs may have limited capabilities on images from domains like dermatology and agriculture, they must be fine-tuned to unlock domain-specific applications. The prevalent architecture of current open-source MLLMs comprises two major modules: an image-language (cross-modal) projection network and a large language model. It is desirable to understand the roles of these two modules in modeling domain-specific visual attributes to inform the design of future models and streamline the interpretability efforts on the current models. To this end, via experiments on 4 datasets and under 2 fine-tuning settings, we find that as the MLLM is fine-tuned, it indeed gains domain-specific visual capabilities, but the updates do not lead to the projection extracting relevant domain-specific visual attributes. Our results indicate that the domain-specific visual attributes are modeled by the LLM, even when only the projection is fine-tuned. Through this study, we offer a potential reinterpretation of the role of cross-modal projections in MLLM architectures. Projection webpage: https://claws-lab.github.io/projection-in-MLLMs/
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
SPML: A DSL for Defending Language Models Against Prompt Attacks
Authors:
Reshabh K Sharma,
Vinayak Gupta,
Dan Grossman
Abstract:
Large language models (LLMs) have profoundly transformed natural language applications, with a growing reliance on instruction-based definitions for designing chatbots. However, post-deployment the chatbot definitions are fixed and are vulnerable to attacks by malicious users, emphasizing the need to prevent unethical applications and financial losses. Existing studies explore user prompts' impact…
▽ More
Large language models (LLMs) have profoundly transformed natural language applications, with a growing reliance on instruction-based definitions for designing chatbots. However, post-deployment the chatbot definitions are fixed and are vulnerable to attacks by malicious users, emphasizing the need to prevent unethical applications and financial losses. Existing studies explore user prompts' impact on LLM-based chatbots, yet practical methods to contain attacks on application-specific chatbots remain unexplored. This paper presents System Prompt Meta Language (SPML), a domain-specific language for refining prompts and monitoring the inputs to the LLM-based chatbots. SPML actively checks attack prompts, ensuring user inputs align with chatbot definitions to prevent malicious execution on the LLM backbone, optimizing costs. It also streamlines chatbot definition crafting with programming language capabilities, overcoming natural language design challenges. Additionally, we introduce a groundbreaking benchmark with 1.8k system prompts and 20k user inputs, offering the inaugural language and benchmark for chatbot definition evaluation. Experiments across datasets demonstrate SPML's proficiency in understanding attacker prompts, surpassing models like GPT-4, GPT-3.5, and LLAMA. Our data and codes are publicly available at: https://prompt-compiler.github.io/SPML/.
△ Less
Submitted 18 February, 2024;
originally announced February 2024.
-
Research status of the Mendeleev Periodic Table: a bibliometric analysis
Authors:
Kamna Sharma,
Deepak Kumar Das,
Saibal Ray
Abstract:
In this paper, we present a bibliometric analysis of the Mendeleev Periodic Table. We have conducted a comprehensive analysis of the Scopus-based database using the keyword "Mendeleev Periodic Table". Our findings suggest that the Mendeleev Periodic Table is an influential topic in the field of Inorganic as well as Organic Chemistry. Future researchers may focus on expanding our analysis to includ…
▽ More
In this paper, we present a bibliometric analysis of the Mendeleev Periodic Table. We have conducted a comprehensive analysis of the Scopus-based database using the keyword "Mendeleev Periodic Table". Our findings suggest that the Mendeleev Periodic Table is an influential topic in the field of Inorganic as well as Organic Chemistry. Future researchers may focus on expanding our analysis to include other bibliometric indicators to gain a more comprehensive understanding of the impact of the Mendeleev Periodic Table in chemistry-based scientific investigations and even in the field of astrochemistry.
△ Less
Submitted 18 February, 2024;
originally announced February 2024.
-
A Dynamic Agent Based Model of the Real Economy with Monopolistic Competition, Perfect Product Differentiation, Heterogeneous Agents, Increasing Returns to Scale and Trade in Disequilibrium
Authors:
Subhamon Supantha,
Naresh Kumar Sharma
Abstract:
We have used agent-based modeling as our numerical method to artificially simulate a dynamic real economy where agents are rational maximizers of an objective function of Cobb-Douglas type. The economy is characterised by heterogeneous agents, acting out of local or imperfect information, monopolistic competition, perfect product differentiation, allowance for increasing returns to scale technolog…
▽ More
We have used agent-based modeling as our numerical method to artificially simulate a dynamic real economy where agents are rational maximizers of an objective function of Cobb-Douglas type. The economy is characterised by heterogeneous agents, acting out of local or imperfect information, monopolistic competition, perfect product differentiation, allowance for increasing returns to scale technology and trade in disequilibrium. An algorithm for economic activity in each period is devised and a general purpose open source agent-based model is developed which allows for counterfactual inquiries, testing out treatments, analysing causality of various economic processes, outcomes and studying emergent properties. 10,000 simulations, with 10 firms and 80 consumers are run with varying parameters and the results show that from only a few initial conditions the economy reaches equilibrium while in most of the other cases it remains in perpetual disequilibrium. It also shows that from a few initial conditions the economy reaches a disaster where all the consumer wealth falls to zero or only a single producer remains. Furthermore, from some initial conditions, an ideal economy with high wage rate, high consumer utility and no unemployment is also reached. It was also observed that starting from an equal endowment of wealth in consumers and in producers, inequality emerged in the economy. In majority of the cases most of the firms(6-7) shut down because they were not profitable enough and only a few firms remained. Our results highlight that all these varying outcomes are possible for a decentralized market economy with rational optimizing agents.
△ Less
Submitted 13 January, 2024;
originally announced January 2024.
-
Nurse-in-the-Loop Artificial Intelligence for Precision Management of Type 2 Diabetes in a Clinical Trial Utilizing Transfer-Learned Predictive Digital Twin
Authors:
Syed Hasib Akhter Faruqui,
Adel Alaeddini,
Yan Du,
Shiyu Li,
Kumar Sharma,
**g Wang
Abstract:
Background: Type 2 diabetes (T2D) is a prevalent chronic disease with a significant risk of serious health complications and negative impacts on the quality of life. Given the impact of individual characteristics and lifestyle on the treatment plan and patient outcomes, it is crucial to develop precise and personalized management strategies. Artificial intelligence (AI) provides great promise in c…
▽ More
Background: Type 2 diabetes (T2D) is a prevalent chronic disease with a significant risk of serious health complications and negative impacts on the quality of life. Given the impact of individual characteristics and lifestyle on the treatment plan and patient outcomes, it is crucial to develop precise and personalized management strategies. Artificial intelligence (AI) provides great promise in combining patterns from various data sources with nurses' expertise to achieve optimal care. Methods: This is a 6-month ancillary study among T2D patients (n = 20, age = 57 +- 10). Participants were randomly assigned to an intervention (AI, n=10) group to receive daily AI-generated individualized feedback or a control group without receiving the daily feedback (non-AI, n=10) in the last three months. The study developed an online nurse-in-the-loop predictive control (ONLC) model that utilizes a predictive digital twin (PDT). The PDT was developed using a transfer-learning-based Artificial Neural Network. The PDT was trained on participants self-monitoring data (weight, food logs, physical activity, glucose) from the first three months, and the online control algorithm applied particle swarm optimization to identify impactful behavioral changes for maintaining the patient's glucose and weight levels for the next three months. The ONLC provided the intervention group with individualized feedback and recommendations via text messages. The PDT was re-trained weekly to improve its performance. Findings: The trained ONLC model achieved >=80% prediction accuracy across all patients while the model was tuned online. Participants in the intervention group exhibited a trend of improved daily steps and stable or improved total caloric and total carb intake as recommended.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
Knowledge Graph Enhanced Aspect-Level Sentiment Analysis
Authors:
Kavita Sharma,
Ritu Patel,
Sunita Iyer
Abstract:
In this paper, we propose a novel method to enhance sentiment analysis by addressing the challenge of context-specific word meanings. It combines the advantages of a BERT model with a knowledge graph based synonym data. This synergy leverages a dynamic attention mechanism to develop a knowledge-driven state vector. For classifying sentiments linked to specific aspects, the approach constructs a me…
▽ More
In this paper, we propose a novel method to enhance sentiment analysis by addressing the challenge of context-specific word meanings. It combines the advantages of a BERT model with a knowledge graph based synonym data. This synergy leverages a dynamic attention mechanism to develop a knowledge-driven state vector. For classifying sentiments linked to specific aspects, the approach constructs a memory bank integrating positional data. The data are then analyzed using a DCGRU to pinpoint sentiment characteristics related to specific aspect terms. Experiments on three widely used datasets demonstrate the superior performance of our method in sentiment classification.
△ Less
Submitted 26 January, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
Online Continual Knowledge Learning for Language Models
Authors:
Yuhao Wu,
Tongjun Shi,
Karthick Sharma,
Chun Wei Seah,
Shuhao Zhang
Abstract:
Large Language Models (LLMs) serve as repositories of extensive world knowledge, enabling them to perform tasks such as question-answering and fact-checking. However, this knowledge can become obsolete as global contexts change. In this paper, we introduce a novel problem in the realm of continual learning: Online Continual Knowledge Learning (OCKL). This problem formulation aims to manage the dyn…
▽ More
Large Language Models (LLMs) serve as repositories of extensive world knowledge, enabling them to perform tasks such as question-answering and fact-checking. However, this knowledge can become obsolete as global contexts change. In this paper, we introduce a novel problem in the realm of continual learning: Online Continual Knowledge Learning (OCKL). This problem formulation aims to manage the dynamic nature of world knowledge in LMs under real-time constraints. We propose a new benchmark and evaluation metric designed to measure both the rate of new knowledge acquisition and the retention of previously learned knowledge. Our empirical evaluation, conducted using a variety of state-of-the-art methods, establishes robust base-lines for OCKL. Our results reveal that existing continual learning approaches are unfortunately insufficient for tackling the unique challenges posed by OCKL. We identify key factors that influence the trade-off between knowledge acquisition and retention, thereby advancing our understanding of how to train LMs in a continually evolving environment.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Multi-fingered Dynamic Gras** for Unknown Objects
Authors:
Yannick Burkhardt,
Qian Feng,
Jianxiang Feng,
Karan Sharma,
Zhaopeng Chen,
Alois Knoll
Abstract:
Dexterous gras** of unseen objects in dynamic environments is an essential prerequisite for the advanced manipulation of autonomous robots. Prior advances rely on several assumptions that simplify the setup, including environment stationarity, pre-defined objects, and low-dimensional end-effectors. Though easing the problem and enabling progress, it undermined the complexity of the real world. A…
▽ More
Dexterous gras** of unseen objects in dynamic environments is an essential prerequisite for the advanced manipulation of autonomous robots. Prior advances rely on several assumptions that simplify the setup, including environment stationarity, pre-defined objects, and low-dimensional end-effectors. Though easing the problem and enabling progress, it undermined the complexity of the real world. Aiming to relax these assumptions, we present a dynamic gras** framework for unknown objects in this work, which uses a five-fingered hand with visual servo control and can compensate for external disturbances. To establish such a system on real hardware, we leverage the recent advances in real-time dexterous generative grasp synthesis and introduce several techniques to secure the robustness and performance of the overall system. Our experiments on real hardware verify the ability of the proposed system to reliably grasp unknown dynamic objects in two realistic scenarios: objects on a conveyor belt and human-robot handover. Note that there has been no prior work that can achieve dynamic multi-fingered gras** for unknown objects like ours up to the time of writing this paper. We hope our pioneering work in this direction can provide inspiration to the community and pave the way for further algorithmic and engineering advances on this challenging task. A video of the experiments is available at https://youtu.be/b87zGNoKELg.
△ Less
Submitted 7 April, 2024; v1 submitted 27 October, 2023;
originally announced October 2023.
-
Serverless Federated Learning with flwr-serverless
Authors:
Sanjeev V. Namjoshi,
Reese Green,
Krishi Sharma,
Zhangzhang Si
Abstract:
Federated learning is becoming increasingly relevant and popular as we witness a surge in data collection and storage of personally identifiable information. Alongside these developments there have been many proposals from governments around the world to provide more protections for individuals' data and a heightened interest in data privacy measures. As deep learning continues to become more rele…
▽ More
Federated learning is becoming increasingly relevant and popular as we witness a surge in data collection and storage of personally identifiable information. Alongside these developments there have been many proposals from governments around the world to provide more protections for individuals' data and a heightened interest in data privacy measures. As deep learning continues to become more relevant in new and existing domains, it is vital to develop strategies like federated learning that can effectively train data from different sources, such as edge devices, without compromising security and privacy. Recently, the Flower (\texttt{Flwr}) Python package was introduced to provide a scalable, flexible, and easy-to-use framework for implementing federated learning. However, to date, Flower is only able to run synchronous federated learning which can be costly and time-consuming to run because the process is bottlenecked by client-side training jobs that are slow or fragile. Here, we introduce \texttt{flwr-serverless}, a wrapper around the Flower package that extends its functionality to allow for both synchronous and asynchronous federated learning with minimal modification to Flower's design paradigm. Furthermore, our approach to federated learning allows the process to run without a central server, which increases the domains of application and accessibility of its use. This paper presents the design details and usage of this approach through a series of experiments that were conducted using public datasets. Overall, we believe that our approach decreases the time and cost to run federated training and provides an easier way to implement and experiment with federated learning systems.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Additive one-rank hull codes over finite fields
Authors:
Astha Agrawal,
R. K. Sharma
Abstract:
This article explores additive codes with one-rank hull, offering key insights and constructions. The article introduces a novel approach to finding one-rank hull codes over finite fields by establishing a connection between self-orthogonal elements and solutions of quadratic forms. It also provides a precise count of self-orthogonal elements for any duality over the finite field $\mathbb{F}_q$, p…
▽ More
This article explores additive codes with one-rank hull, offering key insights and constructions. The article introduces a novel approach to finding one-rank hull codes over finite fields by establishing a connection between self-orthogonal elements and solutions of quadratic forms. It also provides a precise count of self-orthogonal elements for any duality over the finite field $\mathbb{F}_q$, particularly odd primes. Additionally, construction methods for small rank hull codes are introduced. The highest possible minimum distance among additive one-rank hull codes is denoted by $d_1[n,k]_{p^e,M}$. The value of $d_1[n,k]_{p^e,M}$ for $k=1,2$ and $n\geq 2$ with respect to any duality $M$ over any finite field $\mathbb{F}_{p^e}$ is determined. Furthermore, the new quaternary one-rank hull codes are identified over non-symmetric dualities with better parameters than symmetric ones.
△ Less
Submitted 2 January, 2024; v1 submitted 12 October, 2023;
originally announced October 2023.
-
Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices
Authors:
Akhil M R,
Adithya Krishna V Sharma,
Harivardhan Swamy,
Pavan A,
Ashray Shetty,
Anirudh B Sathyanarayana
Abstract:
With the increasing extent of malware attacks in the present day along with the difficulty in detecting modern malware, it is necessary to evaluate the effectiveness and performance of Deep Neural Networks (DNNs) for malware classification. Multiple DNN architectures can be designed and trained to detect and classify malware binaries. Results demonstrate the potential of DNNs in accurately classif…
▽ More
With the increasing extent of malware attacks in the present day along with the difficulty in detecting modern malware, it is necessary to evaluate the effectiveness and performance of Deep Neural Networks (DNNs) for malware classification. Multiple DNN architectures can be designed and trained to detect and classify malware binaries. Results demonstrate the potential of DNNs in accurately classifying malware with high accuracy rates observed across different malware types. Additionally, the feasibility of deploying these DNN models on edge devices to enable real-time classification, particularly in resource-constrained scenarios proves to be integral to large IoT systems. By optimizing model architectures and leveraging edge computing capabilities, the proposed methodologies achieve efficient performance even with limited resources. This study contributes to advancing malware detection techniques and emphasizes the significance of integrating cybersecurity measures for the early detection of malware and further preventing the adverse effects caused by such attacks. Optimal considerations regarding the distribution of security tasks to edge devices are addressed to ensure that the integrity and availability of large scale IoT systems are not compromised due to malware attacks, advocating for a more resilient and secure digital ecosystem.
△ Less
Submitted 21 August, 2023;
originally announced October 2023.
-
The Ripple Effect of Retraction on an Author's Collaboration Network
Authors:
Kiran Sharma,
Satyam Mukherjee
Abstract:
Scientists involved in scientific misconduct may face social stigmatization, leading to isolation and limited opportunities for collaboration. The reputation of every individual is reflected on the team, as the fraud attempted by any member will be reflected on the team. Earlier studies pointed out the impact of citation penalty on the prior work of coauthors, the effect of retraction on a co-auth…
▽ More
Scientists involved in scientific misconduct may face social stigmatization, leading to isolation and limited opportunities for collaboration. The reputation of every individual is reflected on the team, as the fraud attempted by any member will be reflected on the team. Earlier studies pointed out the impact of citation penalty on the prior work of coauthors, the effect of retraction on a co-author's research career, and stigmatization through mere association. This paper explores the formation and dynamics of the networks of authors who faced retractions and their "innocent coauthors" who never faced retractions in their careers. Leveraging a dataset of 5972 retracted papers involving 24209 authors, we investigate whether scientific misconduct reduces collaborative ties of misconducting authors as opposed to those who never faced allegations of academic misconduct. We observe that the network structure of authors involved in retractions does not change significantly over the years compared to that of the "innocent coauthors". Our results suggest that stigmatization rarely affects the collaboration network of stigmatized authors. Our findings have implications for institutions adopting stringent measures and fostering ethical practices research.
△ Less
Submitted 27 August, 2023;
originally announced October 2023.
-
Counter Turing Test CT^2: AI-Generated Text Detection is Not as Easy as You May Think -- Introducing AI Detectability Index
Authors:
Megha Chakraborty,
S. M Towhidul Islam Tonmoy,
S M Mehedi Zaman,
Krish Sharma,
Niyar R Barman,
Chandan Gupta,
Shreya Gautam,
Tanay Kumar,
Vinija Jain,
Aman Chadha,
Amit P. Sheth,
Amitava Das
Abstract:
With the rise of prolific ChatGPT, the risk and consequences of AI-generated text has increased alarmingly. To address the inevitable question of ownership attribution for AI-generated artifacts, the US Copyright Office released a statement stating that 'If a work's traditional elements of authorship were produced by a machine, the work lacks human authorship and the Office will not register it'.…
▽ More
With the rise of prolific ChatGPT, the risk and consequences of AI-generated text has increased alarmingly. To address the inevitable question of ownership attribution for AI-generated artifacts, the US Copyright Office released a statement stating that 'If a work's traditional elements of authorship were produced by a machine, the work lacks human authorship and the Office will not register it'. Furthermore, both the US and the EU governments have recently drafted their initial proposals regarding the regulatory framework for AI. Given this cynosural spotlight on generative AI, AI-generated text detection (AGTD) has emerged as a topic that has already received immediate attention in research, with some initial methods having been proposed, soon followed by emergence of techniques to bypass detection. This paper introduces the Counter Turing Test (CT^2), a benchmark consisting of techniques aiming to offer a comprehensive evaluation of the robustness of existing AGTD techniques. Our empirical findings unequivocally highlight the fragility of the proposed AGTD methods under scrutiny. Amidst the extensive deliberations on policy-making for regulating AI development, it is of utmost importance to assess the detectability of content generated by LLMs. Thus, to establish a quantifiable spectrum facilitating the evaluation and ranking of LLMs according to their detectability levels, we propose the AI Detectability Index (ADI). We conduct a thorough examination of 15 contemporary LLMs, empirically demonstrating that larger LLMs tend to have a higher ADI, indicating they are less detectable compared to smaller LLMs. We firmly believe that ADI holds significant value as a tool for the wider NLP community, with the potential to serve as a rubric in AI-related policy-making.
△ Less
Submitted 23 October, 2023; v1 submitted 8 October, 2023;
originally announced October 2023.
-
Enhancing Healthcare with EOG: A Novel Approach to Sleep Stage Classification
Authors:
Suvadeep Maiti,
Shivam Kumar Sharma,
Raju S. Bapi
Abstract:
We introduce an innovative approach to automated sleep stage classification using EOG signals, addressing the discomfort and impracticality associated with EEG data acquisition. In addition, it is important to note that this approach is untapped in the field, highlighting its potential for novel insights and contributions. Our proposed SE-Resnet-Transformer model provides an accurate classificatio…
▽ More
We introduce an innovative approach to automated sleep stage classification using EOG signals, addressing the discomfort and impracticality associated with EEG data acquisition. In addition, it is important to note that this approach is untapped in the field, highlighting its potential for novel insights and contributions. Our proposed SE-Resnet-Transformer model provides an accurate classification of five distinct sleep stages from raw EOG signal. Extensive validation on publically available databases (SleepEDF-20, SleepEDF-78, and SHHS) reveals noteworthy performance, with macro-F1 scores of 74.72, 70.63, and 69.26, respectively. Our model excels in identifying REM sleep, a crucial aspect of sleep disorder investigations. We also provide insight into the internal mechanisms of our model using techniques such as 1D-GradCAM and t-SNE plots. Our method improves the accessibility of sleep stage classification while decreasing the need for EEG modalities. This development will have promising implications for healthcare and the incorporation of wearable technology into sleep studies, thereby advancing the field's potential for enhanced diagnostics and patient comfort.
△ Less
Submitted 25 September, 2023;
originally announced October 2023.
-
PTPerf: On the performance evaluation of Tor Pluggable Transports
Authors:
Zeya Umayya,
Dhruv Malik,
Devashish Gosain,
Piyush Kumar Sharma
Abstract:
Tor, one of the most popular censorship circumvention systems, faces regular blocking attempts by censors. Thus, to facilitate access, it relies on "pluggable transports" (PTs) that disguise Tor's traffic and make it hard for the adversary to block Tor. However, these are not yet well studied and compared for the performance they provide to the users. Thus, we conduct a first comparative performan…
▽ More
Tor, one of the most popular censorship circumvention systems, faces regular blocking attempts by censors. Thus, to facilitate access, it relies on "pluggable transports" (PTs) that disguise Tor's traffic and make it hard for the adversary to block Tor. However, these are not yet well studied and compared for the performance they provide to the users. Thus, we conduct a first comparative performance evaluation of a total of 12 PTs -- the ones currently supported by the Tor project and those that can be integrated in the future.
Our results reveal multiple facets of the PT ecosystem. (1) PTs' download time significantly varies even under similar network conditions. (2) All PTs are not equally reliable. Thus, clients who regularly suffer censorship may falsely believe that such PTs are blocked. (3) PT performance depends on the underlying communication primitive. (4) PTs performance significantly depends on the website access method (browser or command-line). Surprisingly, for some PTs, website access time was even less than vanilla Tor.
Based on our findings from more than 1.25M measurements, we provide recommendations about selecting PTs and believe that our study can facilitate access for users who face censorship.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
Speech Diarization and ASR with GMM
Authors:
Aayush Kumar Sharma,
Vineet Bhavikatti,
Amogh Nidawani,
Dr. Siddappaji,
Sanath P,
Dr Geetishree Mishra
Abstract:
In this research paper, we delve into the topics of Speech Diarization and Automatic Speech Recognition (ASR). Speech diarization involves the separation of individual speakers within an audio stream. By employing the ASR transcript, the diarization process aims to segregate each speaker's utterances, grou** them based on their unique audio characteristics. On the other hand, Automatic Speech Re…
▽ More
In this research paper, we delve into the topics of Speech Diarization and Automatic Speech Recognition (ASR). Speech diarization involves the separation of individual speakers within an audio stream. By employing the ASR transcript, the diarization process aims to segregate each speaker's utterances, grou** them based on their unique audio characteristics. On the other hand, Automatic Speech Recognition refers to the capability of a machine or program to identify and convert spoken words and phrases into a machine-readable format. In our speech diarization approach, we utilize the Gaussian Mixer Model (GMM) to represent speech segments. The inter-cluster distance is computed based on the GMM parameters, and the distance threshold serves as the stop** criterion. ASR entails the conversion of an unknown speech waveform into a corresponding written transcription. The speech signal is analyzed using synchronized algorithms, taking into account the pitch frequency. Our primary objective typically revolves around develo** a model that minimizes the Word Error Rate (WER) metric during speech transcription.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
A Review of Driver Gaze Estimation and Application in Gaze Behavior Understanding
Authors:
Pavan Kumar Sharma,
Pranamesh Chakraborty
Abstract:
Driver gaze plays an important role in different gaze-based applications such as driver attentiveness detection, visual distraction detection, gaze behavior understanding, and building driver assistance system. The main objective of this study is to perform a comprehensive summary of driver gaze fundamentals, methods to estimate driver gaze, and it's applications in real world driving scenarios. W…
▽ More
Driver gaze plays an important role in different gaze-based applications such as driver attentiveness detection, visual distraction detection, gaze behavior understanding, and building driver assistance system. The main objective of this study is to perform a comprehensive summary of driver gaze fundamentals, methods to estimate driver gaze, and it's applications in real world driving scenarios. We first discuss the fundamentals related to driver gaze, involving head-mounted and remote setup based gaze estimation and the terminologies used for each of these data collection methods. Next, we list out the existing benchmark driver gaze datasets, highlighting the collection methodology and the equipment used for such data collection. This is followed by a discussion of the algorithms used for driver gaze estimation, which primarily involves traditional machine learning and deep learning based techniques. The estimated driver gaze is then used for understanding gaze behavior while maneuvering through intersections, on-ramps, off-ramps, lane changing, and determining the effect of roadside advertising structures. Finally, we have discussed the limitations in the existing literature, challenges, and the future scope in driver gaze estimation and gaze-based applications.
△ Less
Submitted 21 February, 2024; v1 submitted 4 July, 2023;
originally announced July 2023.
-
Effect of non-unital noise on random circuit sampling
Authors:
Bill Fefferman,
Soumik Ghosh,
Michael Gullans,
Kohdai Kuroiwa,
Kunal Sharma
Abstract:
In this work, drawing inspiration from the type of noise present in real hardware, we study the output distribution of random quantum circuits under practical non-unital noise sources with constant noise rates. We show that even in the presence of unital sources like the depolarizing channel, the distribution, under the combined noise channel, never resembles a maximally entropic distribution at a…
▽ More
In this work, drawing inspiration from the type of noise present in real hardware, we study the output distribution of random quantum circuits under practical non-unital noise sources with constant noise rates. We show that even in the presence of unital sources like the depolarizing channel, the distribution, under the combined noise channel, never resembles a maximally entropic distribution at any depth. To show this, we prove that the output distribution of such circuits never anticoncentrates $\unicode{x2014}$ meaning it is never too "flat" $\unicode{x2014}$ regardless of the depth of the circuit. This is in stark contrast to the behavior of noiseless random quantum circuits or those with only unital noise, both of which anticoncentrate at sufficiently large depths. As consequences, our results have interesting algorithmic implications on both the hardness and easiness of noisy random circuit sampling, since anticoncentration is a critical property exploited by both state-of-the-art classical hardness and easiness results.
△ Less
Submitted 28 June, 2023;
originally announced June 2023.
-
Measuring the continuous research impact of a researcher: The Kz index
Authors:
Kiran Sharma,
Ziya Uddin
Abstract:
The ongoing discussion regarding the utilization of individual research performance for academic hiring, funding allocation, and resource distribution has prompted the need for improved metrics. While traditional measures such as total publications, citations count, and the h-index provide a general overview of research impact, they fall short of capturing the continuous contribution of researcher…
▽ More
The ongoing discussion regarding the utilization of individual research performance for academic hiring, funding allocation, and resource distribution has prompted the need for improved metrics. While traditional measures such as total publications, citations count, and the h-index provide a general overview of research impact, they fall short of capturing the continuous contribution of researchers over time. To address this limitation, we propose the implementation of the Kz index, which takes into account both publication impact and age. In this study, we calculated Kz scores for 376 research profiles. Kz reveals that the researchers with the same h-index can exhibit different Kz scores, and vice versa. Furthermore, we observed instances where researchers with lower citation counts obtained higher Kz scores, and vice versa. Interestingly, the Kz metric follows a log-normal distribution. It highlights its potential as a valuable tool for ranking researchers and facilitating informed decision-making processes. By measuring the continuous research impact, we enable fair evaluations, enhance decision-making processes, and provide focused career advancement support and funding opportunities.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
Energy Efficient RAN Slicing and Beams Selection for Multiplexing of Heterogeneous Services in 5G mmWave Networks
Authors:
PraveenKumar Korrai,
Eva Lagunas,
Shree Krishna Sharma,
Symeon Chatzinotas
Abstract:
In this paper, we study a RAN resource-slicing problem for energy-efficient communication in an orthogonal frequency division multiple access (OFDMA) based millimeter-wave (mmWave) downlink (DL) network consisting of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Specifically, assuming a fixed set of predefined beams, we address an energy efficiency…
▽ More
In this paper, we study a RAN resource-slicing problem for energy-efficient communication in an orthogonal frequency division multiple access (OFDMA) based millimeter-wave (mmWave) downlink (DL) network consisting of enhanced mobile broadband (eMBB) and ultra-reliable low-latency communication (URLLC) services. Specifically, assuming a fixed set of predefined beams, we address an energy efficiency (EE) maximization problem to obtain the optimal beam selection, Resource Block (RB), and transmit power allocation policy to serve URLLC and eMBB users on the same physical radio resources. The problem is formulated as a mixed-integer non-linear fractional programming (MINLFP) problem considering minimum data rate and latency in packet delivery constraints. By leveraging the properties of fractional programming theory, we first transform the formulated non-convex optimization problem in fractional form into a tractable subtractive form. Subsequently, we solve the transformed problem using a two-loop iterative algorithm. The main resource-slicing problem is solved in the inner loop utilizing the difference of convex (DC) programming and successive convex approximation (SCA) techniques. Subsequently, the outer loop is solved using the Dinkelbach method to acquire an improved solution in every iteration until it converges. Our simulation results illustrate the performance gains of the proposed methodology with respect to baseline algorithms with the fixed and mixed resource grid models.
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
Predicting Information Pathways Across Online Communities
Authors:
Yiqiao **,
Yeon-Chang Lee,
Kartik Sharma,
Meng Ye,
Karan Sikka,
Ajay Divakaran,
Srijan Kumar
Abstract:
The problem of community-level information pathway prediction (CLIPP) aims at predicting the transmission trajectory of content across online communities. A successful solution to CLIPP holds significance as it facilitates the distribution of valuable information to a larger audience and prevents the proliferation of misinformation. Notably, solving CLIPP is non-trivial as inter-community relation…
▽ More
The problem of community-level information pathway prediction (CLIPP) aims at predicting the transmission trajectory of content across online communities. A successful solution to CLIPP holds significance as it facilitates the distribution of valuable information to a larger audience and prevents the proliferation of misinformation. Notably, solving CLIPP is non-trivial as inter-community relationships and influence are unknown, information spread is multi-modal, and new content and new communities appear over time. In this work, we address CLIPP by collecting large-scale, multi-modal datasets to examine the diffusion of online YouTube videos on Reddit. We analyze these datasets to construct community influence graphs (CIGs) and develop a novel dynamic graph framework, INPAC (Information Pathway Across Online Communities), which incorporates CIGs to capture the temporal variability and multi-modal nature of video propagation across communities. Experimental results in both warm-start and cold-start scenarios show that INPAC outperforms seven baselines in CLIPP.
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
A Survey on Explainability of Graph Neural Networks
Authors:
Jaykumar Kakkad,
Jaspal Jannu,
Kartik Sharma,
Charu Aggarwal,
Sourav Medya
Abstract:
Graph neural networks (GNNs) are powerful graph-based deep-learning models that have gained significant attention and demonstrated remarkable performance in various domains, including natural language processing, drug discovery, and recommendation systems. However, combining feature information and combinatorial graph structures has led to complex non-linear GNN models. Consequently, this has incr…
▽ More
Graph neural networks (GNNs) are powerful graph-based deep-learning models that have gained significant attention and demonstrated remarkable performance in various domains, including natural language processing, drug discovery, and recommendation systems. However, combining feature information and combinatorial graph structures has led to complex non-linear GNN models. Consequently, this has increased the challenges of understanding the workings of GNNs and the underlying reasons behind their predictions. To address this, numerous explainability methods have been proposed to shed light on the inner mechanism of the GNNs. Explainable GNNs improve their security and enhance trust in their recommendations. This survey aims to provide a comprehensive overview of the existing explainability techniques for GNNs. We create a novel taxonomy and hierarchy to categorize these methods based on their objective and methodology. We also discuss the strengths, limitations, and application scenarios of each category. Furthermore, we highlight the key evaluation metrics and datasets commonly used to assess the explainability of GNNs. This survey aims to assist researchers and practitioners in understanding the existing landscape of explainability methods, identifying gaps, and fostering further advancements in interpretable graph-based machine learning.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
A Novel Vision Transformer with Residual in Self-attention for Biomedical Image Classification
Authors:
Arun K. Sharma,
Nishchal K. Verma
Abstract:
Biomedical image classification requires capturing of bio-informatics based on specific feature distribution. In most of such applications, there are mainly challenges due to limited availability of samples for diseased cases and imbalanced nature of dataset. This article presents the novel framework of multi-head self-attention for vision transformer (ViT) which makes capable of capturing the spe…
▽ More
Biomedical image classification requires capturing of bio-informatics based on specific feature distribution. In most of such applications, there are mainly challenges due to limited availability of samples for diseased cases and imbalanced nature of dataset. This article presents the novel framework of multi-head self-attention for vision transformer (ViT) which makes capable of capturing the specific image features for classification and analysis. The proposed method uses the concept of residual connection for accumulating the best attention output in each block of multi-head attention. The proposed framework has been evaluated on two small datasets: (i) blood cell classification dataset and (ii) brain tumor detection using brain MRI images. The results show the significant improvement over traditional ViT and other convolution based state-of-the-art classification models.
△ Less
Submitted 5 June, 2023; v1 submitted 2 June, 2023;
originally announced June 2023.
-
Coswara: A respiratory sounds and symptoms dataset for remote screening of SARS-CoV-2 infection
Authors:
Debarpan Bhattacharya,
Neeraj Kumar Sharma,
Debottam Dutta,
Srikanth Raj Chetupalli,
Pravin Mote,
Sriram Ganapathy,
Chandrakiran C,
Sahiti Nori,
Suhail K K,
Sadhana Gonuguntla,
Murali Alagesan
Abstract:
This paper presents the Coswara dataset, a dataset containing diverse set of respiratory sounds and rich meta-data, recorded between April-2020 and February-2022 from 2635 individuals (1819 SARS-CoV-2 negative, 674 positive, and 142 recovered subjects). The respiratory sounds contained nine sound categories associated with variants of breathing, cough and speech. The rich metadata contained demogr…
▽ More
This paper presents the Coswara dataset, a dataset containing diverse set of respiratory sounds and rich meta-data, recorded between April-2020 and February-2022 from 2635 individuals (1819 SARS-CoV-2 negative, 674 positive, and 142 recovered subjects). The respiratory sounds contained nine sound categories associated with variants of breathing, cough and speech. The rich metadata contained demographic information associated with age, gender and geographic location, as well as the health information relating to the symptoms, pre-existing respiratory ailments, comorbidity and SARS-CoV-2 test status. Our study is the first of its kind to manually annotate the audio quality of the entire dataset (amounting to 65~hours) through manual listening. The paper summarizes the data collection procedure, demographic, symptoms and audio data information. A COVID-19 classifier based on bi-directional long short-term (BLSTM) architecture, is trained and evaluated on the different population sub-groups contained in the dataset to understand the bias/fairness of the model. This enabled the analysis of the impact of gender, geographic location, date of recording, and language proficiency on the COVID-19 detection performance.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Gender imbalance in retracted publications is more favorable toward women authors
Authors:
Kiran Sharma,
Harsha V. Garine,
Satyam Mukherjee
Abstract:
Numerous studies in the literature highlight that women are underrepresented in the scientific domain which further leads to the underrepresentation of women in prestigious publications, authorship positions, and collaboration. However, the representation of women in scientific misconduct has not been studied yet, hence the study aims to investigate the female involvement and authorship position i…
▽ More
Numerous studies in the literature highlight that women are underrepresented in the scientific domain which further leads to the underrepresentation of women in prestigious publications, authorship positions, and collaboration. However, the representation of women in scientific misconduct has not been studied yet, hence the study aims to investigate the female involvement and authorship position in retracted publications. To conduct the analysis, 3750 retracted scientific papers were extracted from the Web of Science, and the respective gender was identified for each author. The evaluation included the year-wise representation of female authors, females at various authorship positions, collaboration, and female-to-male odds ratio. In all, 26.43% of authorship is held by women and the share of male-female collaborative retracted publications is 55.11%. In retracted publications, women are less likely to hold the last authorship and more likely to hold the middle authorship position.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
ACD codes over skew-symmetric dualities
Authors:
Astha Agrawal,
R. K. Sharma
Abstract:
The applications of additive codes mainly lie in quantum error correction and quantum computing. Due to their applications in quantum codes, additive codes have grown in importance. In addition to this, additive codes allow the implementation of a variety of dualities. The article begins by develo** the properties of Additive Complementary Dual (ACD) codes with respect to arbitrary dualities ove…
▽ More
The applications of additive codes mainly lie in quantum error correction and quantum computing. Due to their applications in quantum codes, additive codes have grown in importance. In addition to this, additive codes allow the implementation of a variety of dualities. The article begins by develo** the properties of Additive Complementary Dual (ACD) codes with respect to arbitrary dualities over finite abelian groups. Further, we introduce a subclass of non-symmetric dualities referred to as skew-symmetric dualities. Then, we precisely count symmetric and skew-symmetric dualities over finite fields. Two conditions have been obtained: one is a necessary and sufficient condition, and the other is a necessary condition. The necessary and sufficient condition is for an additive code to be an ACD code over arbitrary dualities. The necessary condition is on the generator matrix of an ACD code over skew-symmetric dualities. We provide bounds for the highest possible minimum distance of ACD codes over skew-symmetric dualities. Finally, we find some new quaternary ACD codes over non-symmetric dualities with better parameters than the symmetric ones.
△ Less
Submitted 2 January, 2024; v1 submitted 15 April, 2023;
originally announced April 2023.
-
NoisyTwins: Class-Consistent and Diverse Image Generation through StyleGANs
Authors:
Harsh Rangwani,
Lavish Bansal,
Kartik Sharma,
Tejan Karmali,
Varun Jampani,
R. Venkatesh Babu
Abstract:
StyleGANs are at the forefront of controllable image generation as they produce a latent space that is semantically disentangled, making it suitable for image editing and manipulation. However, the performance of StyleGANs severely degrades when trained via class-conditioning on large-scale long-tailed datasets. We find that one reason for degradation is the collapse of latents for each class in t…
▽ More
StyleGANs are at the forefront of controllable image generation as they produce a latent space that is semantically disentangled, making it suitable for image editing and manipulation. However, the performance of StyleGANs severely degrades when trained via class-conditioning on large-scale long-tailed datasets. We find that one reason for degradation is the collapse of latents for each class in the $\mathcal{W}$ latent space. With NoisyTwins, we first introduce an effective and inexpensive augmentation strategy for class embeddings, which then decorrelates the latents based on self-supervision in the $\mathcal{W}$ space. This decorrelation mitigates collapse, ensuring that our method preserves intra-class diversity with class-consistency in image generation. We show the effectiveness of our approach on large-scale real-world long-tailed datasets of ImageNet-LT and iNaturalist 2019, where our method outperforms other methods by $\sim 19\%$ on FID, establishing a new state-of-the-art.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
Evaluating XGBoost for Balanced and Imbalanced Data: Application to Fraud Detection
Authors:
Gissel Velarde,
Anindya Sudhir,
Sanjay Deshmane,
Anuj Deshmunkh,
Khushboo Sharma,
Vaibhav Joshi
Abstract:
This paper evaluates XGboost's performance given different dataset sizes and class distributions, from perfectly balanced to highly imbalanced. XGBoost has been selected for evaluation, as it stands out in several benchmarks due to its detection performance and speed. After introducing the problem of fraud detection, the paper reviews evaluation metrics for detection systems or binary classifiers,…
▽ More
This paper evaluates XGboost's performance given different dataset sizes and class distributions, from perfectly balanced to highly imbalanced. XGBoost has been selected for evaluation, as it stands out in several benchmarks due to its detection performance and speed. After introducing the problem of fraud detection, the paper reviews evaluation metrics for detection systems or binary classifiers, and illustrates with examples how different metrics work for balanced and imbalanced datasets. Then, it examines the principles of XGBoost. It proposes a pipeline for data preparation and compares a Vanilla XGBoost against a random search-tuned XGBoost. Random search fine-tuning provides consistent improvement for large datasets of 100 thousand samples, not so for medium and small datasets of 10 and 1 thousand samples, respectively. Besides, as expected, XGBoost recognition performance improves as more data is available, and deteriorates detection performance as the datasets become more imbalanced. Tests on distributions with 50, 45, 25, and 5 percent positive samples show that the largest drop in detection performance occurs for the distribution with only 5 percent positive samples. Sampling to balance the training set does not provide consistent improvement. Therefore, future work will include a systematic study of different techniques to deal with data imbalance and evaluating other approaches, including graphs, autoencoders, and generative adversarial methods, to deal with the lack of labels.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Security Analysis on Social Media Networks via STRIDE Model
Authors:
Kamal Raj Sharma,
Wei-Yang Chiu,
Weizhi Meng
Abstract:
Security associated threats are often increased for online social media during a pandemic, such as COVID-19, along with changes in a work environment. For example, employees in many companies and organizations have started to work from home due to the COVID-19 pandemic. Such working style has increased many remote activities and further relied on email for communication, thus creating an ideal con…
▽ More
Security associated threats are often increased for online social media during a pandemic, such as COVID-19, along with changes in a work environment. For example, employees in many companies and organizations have started to work from home due to the COVID-19 pandemic. Such working style has increased many remote activities and further relied on email for communication, thus creating an ideal condition for email fraud schemes. Motivated by this observation, the main purpose of this work is to evaluate the privacy policy of online social media and identify potential security associated problems. First, we perform a risk analysis of online social media networks such as Facebook, Twitter and LinkedIn by using the STRIDE model. This aims to find threats and vulnerabilities in the online social media. Then in this analysis, the phishing attack was found to be a main threat in online social media, which is a social engineering attack, where users are convinced through some fake messages or emails to extract their personal credentials.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Revolutionizing Modern Networks: Advances in AI, Machine Learning, and Blockchain for Quantum Satellites and UAV-based Communication
Authors:
Adarsh Kumar,
Ali Ismail Awad,
Gaurav Sharma,
Rajalakshmi Krishnamurthi,
Saurabh Jain,
P. Srikanth,
Kriti Sharma,
Mustapha Hedabou,
Surinder Sood
Abstract:
Quantum communication is the most secure technique of transmitting data available today. Fiber communication lines and satellite-to-ground links have served as the basis for the most successful quantum networks that have been developed so far. Using a UAV, satellite or both for free-space quantum communication reduces the need for permanent ground connections and takes advantage of the lower loss…
▽ More
Quantum communication is the most secure technique of transmitting data available today. Fiber communication lines and satellite-to-ground links have served as the basis for the most successful quantum networks that have been developed so far. Using a UAV, satellite or both for free-space quantum communication reduces the need for permanent ground connections and takes advantage of the lower loss limit in space, which makes it more efficient. This work surveys the recent development in Quantum Satellites and Quantum UAVs-based networks. Here, the importance of the latest technologies, including quantum artificial intelligence, blockchain quantum machine learning, quantum satellites and quantum UAVs, are explored from network perspectives. Further, this work discussed the role of satellite-based images and artificial intelligence.
△ Less
Submitted 24 April, 2024; v1 submitted 21 March, 2023;
originally announced March 2023.
-
Toward A Dynamic Comfort Model for Human-Building Interaction in Grid-Interactive Efficient Buildings: Supported by Field Data
Authors:
SungKu Kang,
Kunind Sharma,
Maharshi Pathak,
Emily Casavant,
Katherine Bassett,
Misha Pavel,
David Fannon,
Michael Kane
Abstract:
Controlling building electric loads could alleviate the increasing grid strain caused by the adoption of renewables and electrification. However, current approaches that automatically setback thermostats on the hottest day compromise their efficacy by neglecting human-building interaction (HBI). This study aims to define challenges and opportunities for develo** engineering models of HBI to be u…
▽ More
Controlling building electric loads could alleviate the increasing grid strain caused by the adoption of renewables and electrification. However, current approaches that automatically setback thermostats on the hottest day compromise their efficacy by neglecting human-building interaction (HBI). This study aims to define challenges and opportunities for develo** engineering models of HBI to be used in the design of controls for grid-interactive efficient buildings (GEBs). Building system and measured and just-in-time surveyed psychophysiological data were collected from 41 participants in 20 homes from April-September. ASHRAE Standard 55 thermal comfort models for building design were evaluated with these data. Increased error bias was observed with increasing spatiotemporal temperature variations. Unsurprising, considering these models neglect such variance, but questioning their suitability for GEBs controlling thermostat setpoints, and given the observed 4°F intra-home spatial temperature variation. The results highlight opportunities for reducing these biases in GEBs through a paradigm shift to modeling discomfort instead of comfort, increasing use of low-cost sensors, and models that account for the observed dynamic occupant behavior: of the thermostat setpoint overrides made with 140-minutes of a previous setpoint change, 95% of small changes ( 2°F) were made with 120-minutes, while 95% of larger changes ( 10°F) were made within only 70-minutes.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Additive complementary dual codes over $\mathbb{F}_{q^2}$
Authors:
Gyanendra K. Verma,
R. K. Sharma
Abstract:
Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive codes of length n over finite field Fq2 as additive subgroups of Fn q2 where q is a prime power. We associate an additive code with a matrix called a gen…
▽ More
Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive codes of length n over finite field Fq2 as additive subgroups of Fn q2 where q is a prime power. We associate an additive code with a matrix called a generator matrix. We characterize trace Euclidean ACD and trace Hermitian ACD codes in terms of generator matrices over the finite field Fq2 . Also, we construct these codes over Fq2 from linear LCD codes over Fq.
△ Less
Submitted 5 October, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Node Injection for Class-specific Network Poisoning
Authors:
Ansh Kumar Sharma,
Rahul Kukreja,
Mayank Kharbanda,
Tanmoy Chakraborty
Abstract:
Graph Neural Networks (GNNs) are powerful in learning rich network representations that aid the performance of downstream tasks. However, recent studies showed that GNNs are vulnerable to adversarial attacks involving node injection and network perturbation. Among these, node injection attacks are more practical as they don't require manipulation in the existing network and can be performed more r…
▽ More
Graph Neural Networks (GNNs) are powerful in learning rich network representations that aid the performance of downstream tasks. However, recent studies showed that GNNs are vulnerable to adversarial attacks involving node injection and network perturbation. Among these, node injection attacks are more practical as they don't require manipulation in the existing network and can be performed more realistically. In this paper, we propose a novel problem statement - a class-specific poison attack on graphs in which the attacker aims to misclassify specific nodes in the target class into a different class using node injection. Additionally, nodes are injected in such a way that they camouflage as benign nodes. We propose NICKI, a novel attacking strategy that utilizes an optimization-based approach to sabotage the performance of GNN-based node classifiers. NICKI works in two phases - it first learns the node representation and then generates the features and edges of the injected nodes. Extensive experiments and ablation studies on four benchmark networks show that NICKI is consistently better than four baseline attacking strategies for misclassifying nodes in the target class. We also show that the injected nodes are properly camouflaged as benign, thus making the poisoned graph indistinguishable from its clean version w.r.t various topological properties.
△ Less
Submitted 7 September, 2023; v1 submitted 28 January, 2023;
originally announced January 2023.
-
Role of Cybersecurity and Blockchain in Battlefield of Things
Authors:
Gaurav Sharma,
Deepak Kumar Sharma,
Adarsh Kumar
Abstract:
The Internet of Things is an essential component in the growth of an ecosystem that enables quick and precise judgments to be made for communication on the battleground. The usage of the battlefield of things (BoT) is, however, subject to several restrictions for a variety of reasons. There is a potential for instances of replay, data manipulation, breaches of privacy, and other similar occurrence…
▽ More
The Internet of Things is an essential component in the growth of an ecosystem that enables quick and precise judgments to be made for communication on the battleground. The usage of the battlefield of things (BoT) is, however, subject to several restrictions for a variety of reasons. There is a potential for instances of replay, data manipulation, breaches of privacy, and other similar occurrences. As a direct result of this, the implementation of a security mechanism to protect the communication that occurs within BoT has turned into an absolute requirement. To this aim, we propose a blockchain-based solution that is both safe and private for use in communications inside the BoT ecosystem. In addition, research is conducted on the benefits of integrating blockchain technology and cybersecurity into BoT application implementations. This work elaborates on the importance of integrating cybersecurity and blockchain-based tools, techniques and methodologies for BoT.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
Emergent Behaviors in Multi-Agent Target Acquisition
Authors:
Piyush K. Sharma,
Erin Zaroukian,
Derrik E. Asher,
Bryson Howell
Abstract:
Only limited studies and superficial evaluations are available on agents' behaviors and roles within a Multi-Agent System (MAS). We simulate a MAS using Reinforcement Learning (RL) in a pursuit-evasion (a.k.a predator-prey pursuit) game, which shares task goals with target acquisition, and we create different adversarial scenarios by replacing RL-trained pursuers' policies with two distinct (non-R…
▽ More
Only limited studies and superficial evaluations are available on agents' behaviors and roles within a Multi-Agent System (MAS). We simulate a MAS using Reinforcement Learning (RL) in a pursuit-evasion (a.k.a predator-prey pursuit) game, which shares task goals with target acquisition, and we create different adversarial scenarios by replacing RL-trained pursuers' policies with two distinct (non-RL) analytical strategies. Using heatmaps of agents' positions (state-space variable) over time, we are able to categorize an RL-trained evader's behaviors. The novelty of our approach entails the creation of an influential feature set that reveals underlying data regularities, which allow us to classify an agent's behavior. This classification may aid in catching the (enemy) targets by enabling us to identify and predict their behaviors, and when extended to pursuers, this approach towards identifying teammates' behavior may allow agents to coordinate more effectively.
△ Less
Submitted 15 December, 2022;
originally announced December 2022.
-
A Survey of Graph Neural Networks for Social Recommender Systems
Authors:
Kartik Sharma,
Yeon-Chang Lee,
Sivagami Nambi,
Aditya Salian,
Shlok Shah,
Sang-Wook Kim,
Srijan Kumar
Abstract:
Social recommender systems (SocialRS) simultaneously leverage the user-to-item interactions as well as the user-to-user social relations for the task of generating item recommendations to users. Additionally exploiting social relations is clearly effective in understanding users' tastes due to the effects of homophily and social influence. For this reason, SocialRS has increasingly attracted atten…
▽ More
Social recommender systems (SocialRS) simultaneously leverage the user-to-item interactions as well as the user-to-user social relations for the task of generating item recommendations to users. Additionally exploiting social relations is clearly effective in understanding users' tastes due to the effects of homophily and social influence. For this reason, SocialRS has increasingly attracted attention. In particular, with the advance of graph neural networks (GNN), many GNN-based SocialRS methods have been developed recently. Therefore, we conduct a comprehensive and systematic review of the literature on GNN-based SocialRS. In this survey, we first identify 84 papers on GNN-based SocialRS after annotating 2151 papers by following the PRISMA framework (preferred reporting items for systematic reviews and meta-analyses). Then, we comprehensively review them in terms of their inputs and architectures to propose a novel taxonomy: (1) input taxonomy includes 5 groups of input type notations and 7 groups of input representation notations; (2) architecture taxonomy includes 8 groups of GNN encoder notations, 2 groups of decoder notations, and 12 groups of loss function notations. We classify the GNN-based SocialRS methods into several categories as per the taxonomy and describe their details. Furthermore, we summarize benchmark datasets and metrics widely used to evaluate the GNN-based SocialRS methods. Finally, we conclude this survey by presenting some future research directions. GitHub repository with the curated list of papers are available at https://github.com/claws-lab/awesome-GNN-social-recsys.
△ Less
Submitted 1 May, 2024; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Photometric identification of compact galaxies, stars and quasars using multiple neural networks
Authors:
Siddharth Chaini,
Atharva Bagul,
Anish Deshpande,
Rishi Gondkar,
Kaushal Sharma,
M. Vivek,
Ajit Kembhavi
Abstract:
We present MargNet, a deep learning-based classifier for identifying stars, quasars and compact galaxies using photometric parameters and images from the Sloan Digital Sky Survey (SDSS) Data Release 16 (DR16) catalogue. MargNet consists of a combination of Convolutional Neural Network (CNN) and Artificial Neural Network (ANN) architectures. Using a carefully curated dataset consisting of 240,000 c…
▽ More
We present MargNet, a deep learning-based classifier for identifying stars, quasars and compact galaxies using photometric parameters and images from the Sloan Digital Sky Survey (SDSS) Data Release 16 (DR16) catalogue. MargNet consists of a combination of Convolutional Neural Network (CNN) and Artificial Neural Network (ANN) architectures. Using a carefully curated dataset consisting of 240,000 compact objects and an additional 150,000 faint objects, the machine learns classification directly from the data, minimising the need for human intervention. MargNet is the first classifier focusing exclusively on compact galaxies and performs better than other methods to classify compact galaxies from stars and quasars, even at fainter magnitudes. This model and feature engineering in such deep learning architectures will provide greater success in identifying objects in the ongoing and upcoming surveys, such as Dark Energy Survey (DES) and images from the Vera C. Rubin Observatory.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Re-visiting Reservoir Computing architectures optimized by Evolutionary Algorithms
Authors:
Sebastián Basterrech,
Tarun Kumar Sharma
Abstract:
For many years, Evolutionary Algorithms (EAs) have been applied to improve Neural Networks (NNs) architectures. They have been used for solving different problems, such as training the networks (adjusting the weights), designing network topology, optimizing global parameters, and selecting features. Here, we provide a systematic brief survey about applications of the EAs on the specific domain of…
▽ More
For many years, Evolutionary Algorithms (EAs) have been applied to improve Neural Networks (NNs) architectures. They have been used for solving different problems, such as training the networks (adjusting the weights), designing network topology, optimizing global parameters, and selecting features. Here, we provide a systematic brief survey about applications of the EAs on the specific domain of the recurrent NNs named Reservoir Computing (RC). At the beginning of the 2000s, the RC paradigm appeared as a good option for employing recurrent NNs without dealing with the inconveniences of the training algorithms. RC models use a nonlinear dynamic system, with fixed recurrent neural network named the \textit{reservoir}, and learning process is restricted to adjusting a linear parametric function. %so the performance of learning is fast and precise. However, an RC model has several hyper-parameters, therefore EAs are helpful tools to figure out optimal RC architectures. We provide an overview of the results on the area, discuss novel advances, and we present our vision regarding the new trends and still open questions.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Multi-signer Strong Designated Multi-verifier Signature Schemes based on Multiple Cryptographic Algorithms
Authors:
Neha Arora,
R. K. Sharma
Abstract:
A designated verifier signature scheme allows a signer to generate a signature that only the designated verifier can verify. This paper proposes multi-signer strong designated multi-verifier signature schemes based on multiple cryptographic algorithms and has proven their security in the random oracle model.
A designated verifier signature scheme allows a signer to generate a signature that only the designated verifier can verify. This paper proposes multi-signer strong designated multi-verifier signature schemes based on multiple cryptographic algorithms and has proven their security in the random oracle model.
△ Less
Submitted 8 September, 2022;
originally announced September 2022.