Skip to main content

Showing 1–11 of 11 results for author: Shrivastava, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.02628  [pdf, other

    cs.CR

    SparseLock: Securing Neural Network Models in Deep Learning Accelerators

    Authors: Nivedita Shrivastava, Smruti R. Sarangi

    Abstract: Securing neural networks (NNs) against model extraction and parameter exfiltration attacks is an important problem primarily because modern NNs take a lot of time and resources to build and train. We observe that there are no countermeasures (CMs) against recently proposed attacks on sparse NNs and there is no single CM that effectively protects against all types of known attacks for both sparse a… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  2. arXiv:2306.06949  [pdf, other

    cs.CR

    SecOComp: A Fast and Secure Simultaneous Compression and Encryption Scheme

    Authors: Nivedita Shrivastava, Smruti R. Sarangi

    Abstract: We live in a data-driven era that involves the generation, collection and processing of a massive amount of data. This data often contains valuable intellectual property and sensitive user information that must be safeguarded. There is a need to both encrypt and compress the data at line speed and sometimes with added power constraints. The majority of the currently available simultaneous compress… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  3. arXiv:2204.08951  [pdf, other

    cs.CR cs.AR

    Seculator: A Fast and Secure Neural Processing Unit

    Authors: Nivedita Shrivastava, Smruti R. Sarangi

    Abstract: Securing deep neural networks (DNNs) is a problem of significant interest since an ML model incorporates high-quality intellectual property, features of data sets painstakingly collated by mechanical turks, and novel methods of training on large cluster computers. Sadly, attacks to extract model parameters are on the rise, and thus designers are being forced to create architectures for securing su… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: 11 pages and 2 pages of reference

  4. arXiv:1909.07806  [pdf, other

    cs.ET

    OpticalGAN : Generative Adversarial Networks for Continuous Variable Quantum Computation

    Authors: Nilay Shrivastava, Nikaash Puri, Piyush Gupta, Balaji Krishnamurthy, Sukriti Verma

    Abstract: We present OpticalGAN, an extension of quantum generative adversarial networks for continuous-variable quantum computation. OpticalGAN consists of photonic variational circuits comprising of optical Gaussian and Kerr gates. Photonic quantum computation is a realization of continuous variable quantum computing which involves encoding and processing information in the continuous quadrature amplitude… ▽ More

    Submitted 15 September, 2019; originally announced September 2019.

  5. arXiv:1905.03968  [pdf, other

    cs.CL cs.CV

    MobiVSR: A Visual Speech Recognition Solution for Mobile Devices

    Authors: Nilay Shrivastava, Astitwa Saxena, Yaman Kumar, Rajiv Ratn Shah, Debanjan Mahata, Amanda Stent

    Abstract: Visual speech recognition (VSR) is the task of recognizing spoken language from video input only, without any audio. VSR has many applications as an assistive technology, especially if it could be deployed in mobile devices and embedded systems. The need of intensive computational resources and large memory footprint are two of the major obstacles in develo** neural network models for VSR in a r… ▽ More

    Submitted 4 June, 2019; v1 submitted 10 May, 2019; originally announced May 2019.

  6. arXiv:1610.05009  [pdf, ps, other

    cs.LG cs.AI

    Wind ramp event prediction with parallelized Gradient Boosted Regression Trees

    Authors: Saurav Gupta, Nitin Anand Shrivastava, Abbas Khosravi, Bijaya Ketan Panigrahi

    Abstract: Accurate prediction of wind ramp events is critical for ensuring the reliability and stability of the power systems with high penetration of wind energy. This paper proposes a classification based approach for estimating the future class of wind ramp event based on certain thresholds. A parallelized gradient boosted regression tree based technique has been proposed to accurately classify the norma… ▽ More

    Submitted 17 October, 2016; originally announced October 2016.

    Comments: IJCNN 2016

  7. arXiv:1212.3390  [pdf, other

    cs.LG cs.IR

    Know Your Personalization: Learning Topic level Personalization in Online Services

    Authors: Anirban Majumder, Nisheeth Shrivastava

    Abstract: Online service platforms (OSPs), such as search engines, news-websites, ad-providers, etc., serve highly pe rsonalized content to the user, based on the profile extracted from his history with the OSP. Although personalization (generally) leads to a better user experience, it also raises privacy concerns for the user---he does not know what is present in his profile and more importantly, what is b… ▽ More

    Submitted 13 December, 2012; originally announced December 2012.

    Comments: privacy, personalization

  8. arXiv:1209.1887  [pdf, ps, other

    cs.NI

    Bulk content delivery using co-operating end-nodes with upload/download limits

    Authors: A. Majumder, Sharad Jaiswal, K. V. M. Naidu, Nisheeth Shrivastava

    Abstract: We study the problem of optimizing the cost of content delivery in a cooperative network of caches at end-nodes. The caches could be, for example, within the computers of users downloading videos from websites (such as Netflix, Blockbuster etc.), DVRs (such as TiVo, or cable boxes) used as part of video on demand services or public hot-spots (e.g. Wi-Fi access points with a cache) deployed over a… ▽ More

    Submitted 10 September, 2012; originally announced September 2012.

  9. arXiv:1003.1456  [pdf

    cs.SE

    A Methodology for Empirical Quality Assessment of Object-Oriented Design

    Authors: Devpriya Soni, Namita Shrivastava, M. Kumar

    Abstract: The direct measurement of quality is difficult because there is no way we can measure quality factors. For measuring these factors, we have to express them in terms of metrics or models. Researchers have developed quality models that attempt to measure quality in terms of attributes, characteristics and metrics. In this work we have proposed the methodology of controlled experimentation coupled wi… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS February 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 2, pp. 047-055, February 2010, USA

  10. arXiv:0906.4327  [pdf

    cs.DB

    A Rough Sets Partitioning Model for Mining Sequential Patterns with Time Constraint

    Authors: Jigyasa Bisaria, Namita Shrivastava, K. R. Pardasani

    Abstract: Now a days, data mining and knowledge discovery methods are applied to a variety of enterprise and engineering disciplines to uncover interesting patterns from databases. The study of Sequential patterns is an important data mining problem due to its wide applications to real world time dependent databases. Sequential patterns are inter-event patterns ordered over a time-period associated with s… ▽ More

    Submitted 23 June, 2009; originally announced June 2009.

    Comments: 9 pages, International Journal of Computer Science and Information Security, IJCSIS 2009

    Journal ref: IJCSIS, June 2009 Issue, Vol. 2, No.1

  11. arXiv:cs/0408039  [pdf, ps, other

    cs.DC cs.DB cs.DS

    Medians and Beyond: New Aggregation Techniques for Sensor Networks

    Authors: Nisheeth Shrivastava, Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri

    Abstract: Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensors, however, have significant power constraint (battery life), making communication very expensive. Another important issue in the context of sensor-based information systems is that individual sensor readings are inherently unreliable. In order to address these two aspects, sensor datab… ▽ More

    Submitted 16 August, 2004; originally announced August 2004.

    Journal ref: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004)