Skip to main content

Showing 1–12 of 12 results for author: Shastri, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.10085  [pdf

    cs.NE

    Solution to Advanced Manufacturing Process Problems using Cohort Intelligence Algorithm with Improved Constraint Handling Approaches

    Authors: Aniket Nargundkar, Madhav Rawal, Aryaman Patel, Anand J Kulkarni, Apoorva S Shastri

    Abstract: Recently, various Artificial Intelligence (AI) based optimization metaheuristics are proposed and applied for a variety of problems. Cohort Intelligence (CI) algorithm is a socio inspired optimization technique which is successfully applied for solving several unconstrained & constrained real-world problems from the domains such as design, manufacturing, supply chain, healthcare, etc. Generally, r… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  2. arXiv:2206.05049  [pdf, other

    eess.IV cs.CV cs.IT

    Denoising Generalized Expectation-Consistent Approximation for MR Image Recovery

    Authors: Saurav K. Shastri, Rizwan Ahmad, Christopher A. Metzler, Philip Schniter

    Abstract: To solve inverse problems, plug-and-play (PnP) methods replace the proximal step in a convex optimization algorithm with a call to an application-specific denoiser, often implemented using a deep neural network (DNN). Although such methods yield accurate solutions, they can be improved. For example, denoisers are usually designed/trained to remove white Gaussian noise, but the denoiser input error… ▽ More

    Submitted 7 September, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

  3. arXiv:2204.11049  [pdf, other

    cs.NE

    LAB: A Leader-Advocate-Believer Based Optimization Algorithm

    Authors: Ruturaj Reddy, Anand J Kulkarni, Ganesh Krishnasamy, Apoorva S Shastri, Amir H. Gandomi

    Abstract: This manuscript introduces a new socio-inspired metaheuristic technique referred to as Leader-Advocate-Believer based optimization algorithm (LAB) for engineering and global optimization problems. The proposed algorithm is inspired by the AI-based competitive behaviour exhibited by the individuals in a group while simultaneously improving themselves and establishing a role (Leader, Advocate, Belie… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

    Comments: NIL

    MSC Class: 90-08 ACM Class: I.2

  4. arXiv:2204.09737  [pdf, other

    cs.CR cs.AI

    ARLIF-IDS -- Attention augmented Real-Time Isolation Forest Intrusion Detection System

    Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla

    Abstract: Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Emerging technologies such as the Internet of Things and Software Defined Networking leverage lightweight strategies for the early detection of DDoS attacks. Previous… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

    Comments: Paper accepted at the Poster session at the 43rd IEEE Symposium on Security and Privacy

  5. arXiv:2202.05820  [pdf, other

    cs.IT

    Expectation Consistent Plug-and-Play for MRI

    Authors: Saurav K Shastri, Rizwan Ahmad, Christopher A Metzler, Philip Schniter

    Abstract: For image recovery problems, plug-and-play (PnP) methods have been developed that replace the proximal step in an optimization algorithm with a call to an application-specific denoiser, often implemented using a deep neural network. Although such methods have been successful, they can be improved. For example, the denoiser is often trained using white Gaussian noise, while PnP's denoiser input err… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  6. arXiv:2012.00887  [pdf, other

    cs.IT

    Autotuning Plug-and-Play Algorithms for MRI

    Authors: Saurav K. Shastri, Rizwan Ahmad, Philip Schniter

    Abstract: For magnetic resonance imaging (MRI), recently proposed "plug-and-play" (PnP) image recovery algorithms have shown remarkable performance. These PnP algorithms are similar to traditional iterative algorithms like FISTA, ADMM, or primal-dual splitting (PDS), but differ in that the proximal update is replaced by a call to an application-specific image denoiser, such as BM3D or DnCNN. The fixed-point… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

  7. arXiv:1911.00498  [pdf, other

    cs.CY

    GDPR Anti-Patterns: How Design and Operation of Modern Cloud-scale Systems Conflict with GDPR

    Authors: Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram

    Abstract: In recent years, our society is being plagued by unprecedented levels of privacy and security breaches. To rein in this trend, the European Union, in 2018, introduced a comprehensive legislation called the General Data Protection Regulation (GDPR). In this article, we review GDPR from a systems perspective, and identify how the design and operation of modern cloud-scale systems conflict with this… ▽ More

    Submitted 31 October, 2019; originally announced November 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1903.09305

  8. Understanding and Benchmarking the Impact of GDPR on Database Systems

    Authors: Supreeth Shastri, Vinay Banakar, Melissa Wasserman, Arun Kumar, Vijay Chidambaram

    Abstract: The General Data Protection Regulation (GDPR) provides new rights and protections to European people concerning their personal data. We analyze GDPR from a systems perspective, translating its legal articles into a set of capabilities and characteristics that compliant systems must support. Our analysis reveals the phenomenon of metadata explosion, wherein large quantities of metadata needs to be… ▽ More

    Submitted 16 March, 2020; v1 submitted 1 October, 2019; originally announced October 2019.

    Journal ref: PVLDB, 13(7): 1064-1077, 2020

  9. arXiv:1903.09305  [pdf, other

    cs.CY cs.CR

    The Seven Sins of Personal-Data Processing Systems under GDPR

    Authors: Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram

    Abstract: In recent years, our society is being plagued by unprecedented levels of privacy and security breaches. To rein in this trend, the European Union, in 2018, introduced a comprehensive legislation called the General Data Protection Regulation (GDPR). In this paper, we review GDPR from a system design perspective, and identify how its regulations conflict with the design, architecture, and operation… ▽ More

    Submitted 15 May, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

    Comments: Accepted for publication at USENIX HotCloud 2019

  10. arXiv:1903.04880  [pdf, other

    cs.DC cs.DB

    Analyzing the Impact of GDPR on Storage Systems

    Authors: Aashaka Shah, Vinay Banakar, Supreeth Shastri, Melissa Wasserman, Vijay Chidambaram

    Abstract: The recently introduced General Data Protection Regulation (GDPR) is forcing several companies to make significant changes to their systems to achieve compliance. Motivated by the finding that more than 30% of GDPR articles are related to storage, we investigate the impact of GDPR compliance on storage systems. We illustrate the challenges of retrofitting existing systems into compliance by modify… ▽ More

    Submitted 16 May, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

  11. Cloud Index Tracking: Enabling Predictable Costs in Cloud Spot Markets

    Authors: Supreeth Shastri, David Irwin

    Abstract: Cloud spot markets rent VMs for a variable price that is typically much lower than the price of on-demand VMs, which makes them attractive for a wide range of large-scale applications. However, applications that run on spot VMs suffer from cost uncertainty, since spot prices fluctuate, in part, based on supply, demand, or both. The difficulty in predicting spot prices affects users and application… ▽ More

    Submitted 9 September, 2018; originally announced September 2018.

    Comments: ACM Symposium on Cloud Computing 2018

  12. arXiv:1806.01681  [pdf

    cs.NE

    Multi-Cohort Intelligence Algorithm: An Intra- and Inter-group Learning Behavior based Socio-inspired Optimization Methodology

    Authors: Apoorva S Shastri, Anand J Kulkarni

    Abstract: A Multi-Cohort Intelligence (Multi-CI) metaheuristic algorithm in emerging socio-inspired optimization domain is proposed. The algorithm implements intra-group and inter-group learning mechanisms. It focusses on the interaction amongst different cohorts. The performance of the algorithm is validated by solving 75 unconstrained test problems with dimensions up to 30. The solutions were comparing wi… ▽ More

    Submitted 1 May, 2018; originally announced June 2018.