Skip to main content

Showing 1–26 of 26 results for author: Shukla, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  2. arXiv:2312.13334  [pdf, other

    cs.LG cs.AI cs.CR

    Transparency and Privacy: The Role of Explainable AI and Federated Learning in Financial Fraud Detection

    Authors: Tomisin Awosika, Raj Mani Shukla, Bernardi Pranggono

    Abstract: Fraudulent transactions and how to detect them remain a significant problem for financial institutions around the world. The need for advanced fraud detection systems to safeguard assets and maintain customer trust is paramount for financial institutions, but some factors make the development of effective and efficient fraud detection systems a challenge. One of such factors is the fact that fraud… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: Paper submitted to a journal for review

  3. arXiv:2311.08621  [pdf, other

    cs.NI

    Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT

    Authors: Angela Grace Famera, Raj Mani Shukla, Suman Bhunia

    Abstract: A botnet is an army of zombified computers infected with malware and controlled by malicious actors to carry out tasks such as Distributed Denial of Service (DDoS) attacks. Billions of Internet of Things (IoT) devices are primarily targeted to be infected as bots since they are configured with weak credentials or contain common vulnerabilities. Detecting botnet propagation by monitoring the networ… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: Paper submitted to conference

  4. arXiv:2310.18953  [pdf, other

    cs.LG cs.CV eess.IV

    TIC-TAC: A Framework for Improved Covariance Estimation in Deep Heteroscedastic Regression

    Authors: Megh Shukla, Mathieu Salzmann, Alexandre Alahi

    Abstract: Deep heteroscedastic regression involves jointly optimizing the mean and covariance of the predicted distribution using the negative log-likelihood. However, recent works show that this may result in sub-optimal convergence due to the challenges associated with covariance estimation. While the literature addresses this by proposing alternate formulations to mitigate the impact of the predicted cov… ▽ More

    Submitted 31 May, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: ICML 2024. Please feel free to provide feedback!

  5. arXiv:2310.07380  [pdf, other

    cs.LG cs.AI

    Histopathological Image Classification and Vulnerability Analysis using Federated Learning

    Authors: Sankalp Vyas, Amar Nath Patra, Raj Mani Shukla

    Abstract: Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly generated data. This is a major concern as models can access sensitive user information, which raises privacy concerns. A federated learning (FL) approach can help address this issue… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

  6. arXiv:2310.07354  [pdf, other

    cs.AI

    Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection

    Authors: Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta

    Abstract: The rapid growth in Internet of Things (IoT) technology has become an integral part of today's industries forming the Industrial IoT (IIoT) initiative, where industries are leveraging IoT to improve communication and connectivity via emerging solutions like data analytics and cloud computing. Unfortunately, the rapid use of IoT has made it an attractive target for cybercriminals. Therefore, protec… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

  7. arXiv:2310.04610  [pdf, other

    cs.AI cs.LG

    DeepSpeed4Science Initiative: Enabling Large-Scale Scientific Discovery through Sophisticated AI System Technologies

    Authors: Shuaiwen Leon Song, Bonnie Kruft, Minjia Zhang, Conglong Li, Shiyang Chen, Chengming Zhang, Masahiro Tanaka, Xiaoxia Wu, Jeff Rasley, Ammar Ahmad Awan, Connor Holmes, Martin Cai, Adam Ghanem, Zhongzhu Zhou, Yuxiong He, Pete Luferenko, Divya Kumar, Jonathan Weyn, Ruixiong Zhang, Sylwester Klocek, Volodymyr Vragov, Mohammed AlQuraishi, Gustaf Ahdritz, Christina Floristean, Cristina Negri , et al. (67 additional authors not shown)

    Abstract: In the upcoming decade, deep learning may revolutionize the natural sciences, enhancing our capacity to model and predict natural occurrences. This could herald a new era of scientific exploration, bringing significant advancements across sectors from drug development to renewable energy. To answer this call, we present DeepSpeed4Science initiative (deepspeed4science.ai) which aims to build unique… ▽ More

    Submitted 11 October, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

  8. arXiv:2307.08327  [pdf, other

    cs.LG cs.AI

    Analyzing the Impact of Adversarial Examples on Explainable Machine Learning

    Authors: Prathyusha Devabhakthini, Sasmita Parida, Raj Mani Shukla, Suvendu Chandan Nayak

    Abstract: Adversarial attacks are a type of attack on machine learning models where an attacker deliberately modifies the inputs to cause the model to make incorrect predictions. Adversarial attacks can have serious consequences, particularly in applications such as autonomous vehicles, medical diagnosis, and security systems. Work on the vulnerability of deep learning models to adversarial attacks has show… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  9. arXiv:2307.04777  [pdf, other

    cs.LG cs.CY

    MentalHealthAI: Utilizing Personal Health Device Data to Optimize Psychiatry Treatment

    Authors: Manan Shukla, Oshani Seneviratne

    Abstract: Mental health disorders remain a significant challenge in modern healthcare, with diagnosis and treatment often relying on subjective patient descriptions and past medical history. To address this issue, we propose a personalized mental health tracking and mood prediction system that utilizes patient physiological data collected through personal health devices. Our system leverages a decentralized… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Comments: Accepted at AMIA 2023 Annual Symposium

  10. arXiv:2307.03197  [pdf, ps, other

    cs.LG cs.AI

    Analyzing the vulnerabilities in SplitFed Learning: Assessing the robustness against Data Poisoning Attacks

    Authors: Aysha Thahsin Zahir Ismail, Raj Mani Shukla

    Abstract: Distributed Collaborative Machine Learning (DCML) is a potential alternative to address the privacy concerns associated with centralized machine learning. The Split learning (SL) and Federated Learning (FL) are the two effective learning approaches in DCML. Recently there have been an increased interest on the hybrid of FL and SL known as the SplitFed Learning (SFL). This research is the earliest… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  11. arXiv:2305.12528  [pdf, other

    cs.IR

    IR Models and the COVID-19 Pandemic: A Comparative Study of Performance and Challenges

    Authors: Moksh Shukla, Nitik Jain, Shubham Gupta

    Abstract: This research study investigates the efficiency of different information retrieval (IR) systems in accessing relevant information from the scientific literature during the COVID-19 pandemic. The study applies the TREC framework to the COVID-19 Open Research Dataset (CORD-19) and evaluates BM25, Contriever, and Bag of Embeddings IR frameworks. The objective is to build a test collection for search… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

    Comments: 7 pages, 2 figures

  12. arXiv:2305.07161  [pdf, other

    eess.IV cs.CV cs.LG

    A Deep Learning-based Compression and Classification Technique for Whole Slide Histopathology Images

    Authors: Agnes Barsi, Suvendu Chandan Nayak, Sasmita Parida, Raj Mani Shukla

    Abstract: This paper presents an autoencoder-based neural network architecture to compress histopathological images while retaining the denser and more meaningful representation of the original images. Current research into improving compression algorithms is focused on methods allowing lower compression rates for Regions of Interest (ROI-based approaches). Neural networks are great at extracting meaningful… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  13. arXiv:2210.06028  [pdf, other

    cs.CV

    VL4Pose: Active Learning Through Out-Of-Distribution Detection For Pose Estimation

    Authors: Megh Shukla, Roshan Roy, Pankaj Singh, Shuaib Ahmed, Alexandre Alahi

    Abstract: Advances in computing have enabled widespread access to pose estimation, creating new sources of data streams. Unlike mock set-ups for data collection, tap** into these data streams through on-device active learning allows us to directly sample from the real world to improve the spread of the training distribution. However, on-device computing power is limited, implying that any candidate active… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Accepted: BMVC 2022

  14. arXiv:2110.10123  [pdf, other

    cs.HC

    BlockIoT: Blockchain-based Health Data Integration using IoT Devices

    Authors: Manan Shukla, Jian**g Lin, Oshani Seneviratne

    Abstract: The development and adoption of Electronic Health Records (EHR) and health monitoring Internet of Things (IoT) Devices have enabled digitization of patient records and has also substantially transformed the healthcare delivery system in aspects such as remote patient monitoring, healthcare decision making, and medical research. However, data tends to be fragmented among health infrastructures and… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  15. arXiv:2108.03760  [pdf

    cs.AI

    Symptom based Hierarchical Classification of Diabetes and Thyroid disorders using Fuzzy Cognitive Maps

    Authors: Anand M. Shukla, Pooja D. Pandit, Vasudev M. Purandare, Anuradha Srinivasaraghavan

    Abstract: Fuzzy Cognitive Maps (FCMs) are soft computing technique that follows an approach similar to human reasoning and human decision-making process, making them a valuable modeling and simulation methodology. Medical Decision Systems are complex systems consisting of many factors that may be complementary, contradictory, and competitive; these factors influence each other and determine the overall diag… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  16. arXiv:2105.14803  [pdf, other

    cs.LG cs.AI cs.CR

    Gradient-based Data Subversion Attack Against Binary Classifiers

    Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha

    Abstract: Machine learning based data-driven technologies have shown impressive performances in a variety of application domains. Most enterprises use data from multiple sources to provide quality applications. The reliability of the external data sources raises concerns for the security of the machine learning techniques adopted. An attacker can tamper the training or test datasets to subvert the predictio… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: 26 pages, 3 Figures, 8 tables, adversarial attacks, data poisoning attacks, label contamination, transferability of attack, susceptibility

  17. Computational Intelligence based Intrusion Detection Systems for Wireless Communication

    Authors: Abhishek Gupta, Om Jee Pandey, Mahendra Shukla, Anjali Dadhich, Samar Mathur, Anup Ingle

    Abstract: The emerging trend of ubiquitous and pervasive computing aims at embedding everyday devices such as wristwatches, smart phones, home video systems, autofocus cameras, intelligent vehicles, musical instruments, kitchen appliances etc. with microprocessors and imparts them with wireless communication capability. This advanced computing paradigm, also known as the Internet of Things or cyber-physical… ▽ More

    Submitted 22 April, 2021; originally announced May 2021.

  18. arXiv:2104.13230  [pdf, other

    cs.LG cs.AI cs.CR

    Influence Based Defense Against Data Poisoning Attacks in Online Learning

    Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha

    Abstract: Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. Therefore, applications that rely on external data-sources for training data are at a significantly higher risk. There are several known defensive mechanisms that can help in mitigating the threat from such attacks. For example, data… ▽ More

    Submitted 24 April, 2021; originally announced April 2021.

    Comments: 18 pages, 3 Figures, 2 Tables, Adversarial Machine Learning, Data Poisoning, Online Learning, Defense, Influence Function

  19. Bayesian Uncertainty and Expected Gradient Length -- Regression: Two Sides Of The Same Coin?

    Authors: Megh Shukla

    Abstract: Active learning algorithms select a subset of data for annotation to maximize the model performance on a budget. One such algorithm is Expected Gradient Length, which as the name suggests uses the approximate gradient induced per example in the sampling process. While Expected Gradient Length has been successfully used for classification and regression, the formulation for regression remains intui… ▽ More

    Submitted 22 October, 2021; v1 submitted 19 April, 2021; originally announced April 2021.

    Comments: Accepted: WACV 2022, Algorithms track

  20. A Mathematical Analysis of Learning Loss for Active Learning in Regression

    Authors: Megh Shukla, Shuaib Ahmed

    Abstract: Active learning continues to remain significant in the industry since it is data efficient. Not only is it cost effective on a constrained budget, continuous refinement of the model allows for early detection and resolution of failure scenarios during the model development stage. Identifying and fixing failures with the model is crucial as industrial applications demand that the underlying model p… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

    Comments: Accepted: 2021 IEEE CVPR Workshop on Fair, Data Efficient and Trusted Computer Vision

  21. arXiv:2011.12466  [pdf, other

    q-bio.QM cs.LG

    Learning Curves for Drug Response Prediction in Cancer Cell Lines

    Authors: Alexander Partin, Thomas Brettin, Yvonne A. Evrard, Yitan Zhu, Hyunseung Yoo, Fangfang Xia, Songhao Jiang, Austin Clyde, Maulik Shukla, Michael Fonstein, James H. Doroshow, Rick Stevens

    Abstract: Motivated by the size of cell line drug sensitivity data, researchers have been develo** machine learning (ML) models for predicting drug response to advance cancer treatment. As drug sensitivity studies continue generating data, a common question is whether the proposed predictors can further improve the generalization performance with more training data. We utilize empirical learning curves fo… ▽ More

    Submitted 24 November, 2020; originally announced November 2020.

    Comments: 14 pages, 7 figures

  22. arXiv:2005.10634  [pdf, other

    cs.CR cs.CY

    A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications

    Authors: Rajan M A, Manish Shukla, Sachin Lodha

    Abstract: Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracin… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 Pages, 3 Figures

  23. arXiv:2005.09572  [pdf

    q-bio.QM cs.LG

    Ensemble Transfer Learning for the Prediction of Anti-Cancer Drug Response

    Authors: Yitan Zhu, Thomas Brettin, Yvonne A. Evrard, Alexander Partin, Fangfang Xia, Maulik Shukla, Hyunseung Yoo, James H. Doroshow, Rick Stevens

    Abstract: Transfer learning has been shown to be effective in many applications in which training data for the target problem are limited but data for a related (source) problem are abundant. In this paper, we apply transfer learning to the prediction of anti-cancer drug response. Previous transfer learning studies for drug response prediction focused on building models that predict the response of tumor ce… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  24. arXiv:2004.13328  [pdf, other

    cs.LG cs.CR cs.CY cs.DC

    Privacy Guidelines for Contact Tracing Applications

    Authors: Manish Shukla, Rajan M A, Sachin Lodha, Gautam Shroff, Ramesh Raskar

    Abstract: Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a comb… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: 10 pages, 0 images

  25. Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges

    Authors: Yalin Liu, Hong-Ning Dai, Qubeijian Wang, Mahendra K. Shukla, Muhammad Imran

    Abstract: The recent advances in information and communication technology (ICT) have further extended Internet of Things (IoT) from the sole "things" aspect to the omnipotent role of "intelligent connection of things". Meanwhile, the concept of internet of everything (IoE) is presented as such an omnipotent extension of IoT. However, the IoE realization meets critical challenges including the restricted net… ▽ More

    Submitted 12 April, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 21 pages, 9 figures

    Journal ref: Computer Communications, 2020

  26. LEt-SNE: A Hybrid Approach To Data Embedding and Visualization of Hyperspectral Imagery

    Authors: Megh Shukla, Biplab Banerjee, Krishna Mohan Buddhiraju

    Abstract: Hyperspectral Imagery (and Remote Sensing in general) captured from UAVs or satellites are highly voluminous in nature due to the large spatial extent and wavelengths captured by them. Since analyzing these images requires a huge amount of computational time and power, various dimensionality reduction techniques have been used for feature reduction. Some popular techniques among these falter when… ▽ More

    Submitted 8 February, 2020; v1 submitted 19 October, 2019; originally announced October 2019.

    Comments: Accepted, ICASSP 2020