Skip to main content

Showing 1–49 of 49 results for author: Tiwari, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18709  [pdf, other

    cs.CV

    SpY: A Context-Based Approach to Spacecraft Component Detection

    Authors: Trupti Mahendrakar, Ryan T. White, Madhur Tiwari

    Abstract: This paper focuses on autonomously characterizing components such as solar panels, body panels, antennas, and thrusters of an unknown resident space object (RSO) using camera feed to aid autonomous on-orbit servicing (OOS) and active debris removal. Significant research has been conducted in this area using convolutional neural networks (CNNs). While CNNs are powerful at learning patterns and perf… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 12 pages, 9 figures

  2. arXiv:2406.12592  [pdf, other

    cs.CV

    Unmasking the Veil: An Investigation into Concept Ablation for Privacy and Copyright Protection in Images

    Authors: Shivank Garg, Manyana Tiwari

    Abstract: In this paper, we extend the study of concept ablation within pre-trained models as introduced in 'Ablating Concepts in Text-to-Image Diffusion Models' by (Kumari et al.,2022). Our work focuses on reproducing the results achieved by the different variants of concept ablation proposed and validated through predefined metrics. We also introduce a novel variant of concept ablation, namely 'trademark… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  3. arXiv:2406.02875  [pdf, other

    cs.LG math.DS physics.app-ph physics.comp-ph

    Leveraging KANs For Enhanced Deep Koopman Operator Discovery

    Authors: George Nehma, Madhur Tiwari

    Abstract: Multi-layer perceptrons (MLP's) have been extensively utilized in discovering Deep Koopman operators for linearizing nonlinear dynamics. With the emergence of Kolmogorov-Arnold Networks (KANs) as a more efficient and accurate alternative to the MLP Neural Network, we propose a comparison of the performance of each network type in the context of learning Koopman operators with control. In this work… ▽ More

    Submitted 6 June, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

    Comments: 6 pages, 4 figures, 2 tables

  4. arXiv:2404.08763  [pdf, other

    cs.LG cs.CL

    CATS: Contextually-Aware Thresholding for Sparsity in Large Language Models

    Authors: Je-Yong Lee, Donghyun Lee, Genghan Zhang, Mo Tiwari, Azalia Mirhoseini

    Abstract: Large Language Models (LLMs) have dramatically advanced AI applications, yet their deployment remains challenging due to their immense inference costs. Recent studies ameliorate the computational costs of LLMs by increasing their activation sparsity but suffer from significant performance degradation on downstream tasks. In this work, we introduce a new framework for sparsifying the activations of… ▽ More

    Submitted 26 April, 2024; v1 submitted 12 April, 2024; originally announced April 2024.

  5. arXiv:2403.08965  [pdf, other

    math-ph astro-ph.EP cs.LG physics.space-ph

    Deep Learning Based Dynamics Identification and Linearization of Orbital Problems using Koopman Theory

    Authors: George Nehma, Madhur Tiwari, Manasvi Lingam

    Abstract: The study of the Two-Body and Circular Restricted Three-Body Problems in the field of aerospace engineering and sciences is deeply important because they help describe the motion of both celestial and artificial satellites. With the growing demand for satellites and satellite formation flying, fast and efficient control of these systems is becoming ever more important. Global linearization of thes… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  6. arXiv:2402.10985  [pdf, other

    cs.CR cs.AI

    Leveraging AI Planning For Detecting Cloud Security Vulnerabilities

    Authors: Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar

    Abstract: Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration. Alongside their growing popularity, concerns related to their security vulnerabilities leading to data breaches and sophisticated attacks such as ransomware are growing. To address these, first, we propose a generic framework to express relations between different cloud objects s… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  7. arXiv:2310.18844  [pdf, other

    cs.LG cs.AI

    BanditPAM++: Faster $k$-medoids Clustering

    Authors: Mo Tiwari, Ryan Kang, Donghyun Lee, Sebastian Thrun, Chris Piech, Ilan Shomorony, Martin **ye Zhang

    Abstract: Clustering is a fundamental task in data science with wide-ranging applications. In $k$-medoids clustering, cluster centers must be actual datapoints and arbitrary distance metrics may be used; these features allow for greater interpretability of the cluster centers and the clustering of exotic objects in $k$-medoids clustering, respectively. $k$-medoids clustering has recently grown in popularity… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

    Comments: NeurIPS 2023

    MSC Class: 68 ACM Class: I.m; I.2.0; I.2.6; K.3.2; I.2.m

  8. arXiv:2310.01551  [pdf, other

    cs.LG cs.AI cs.DS

    Harnessing the Power of Choices in Decision Tree Learning

    Authors: Guy Blanc, Jane Lange, Chirag Pabbaraju, Colin Sullivan, Li-Yang Tan, Mo Tiwari

    Abstract: We propose a simple generalization of standard and empirically successful decision tree learning algorithms such as ID3, C4.5, and CART. These algorithms, which have been central to machine learning for decades, are greedy in nature: they grow a decision tree by iteratively splitting on the best attribute. Our algorithm, Top-$k$, considers the $k$ best attributes as possible splits instead of just… ▽ More

    Submitted 25 October, 2023; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: NeurIPS 2023

    ACM Class: I.2.0; I.2.m

  9. arXiv:2309.15312  [pdf, other

    cs.LG cs.AI

    MAPTree: Beating "Optimal" Decision Trees with Bayesian Decision Trees

    Authors: Colin Sullivan, Mo Tiwari, Sebastian Thrun

    Abstract: Decision trees remain one of the most popular machine learning models today, largely due to their out-of-the-box performance and interpretability. In this work, we present a Bayesian approach to decision tree induction via maximum a posteriori inference of a posterior distribution over trees. We first demonstrate a connection between maximum a posteriori inference of decision trees and AND/OR sear… ▽ More

    Submitted 19 December, 2023; v1 submitted 26 September, 2023; originally announced September 2023.

    Comments: 19 pages

    ACM Class: I.2.0; I.2.6; I.2.m

  10. arXiv:2309.14221  [pdf, ps, other

    cs.LG cs.AI

    Accelerating Machine Learning Algorithms with Adaptive Sampling

    Authors: Mo Tiwari

    Abstract: The era of huge data necessitates highly efficient machine learning algorithms. Many common machine learning algorithms, however, rely on computationally intensive subroutines that are prohibitively expensive on large datasets. Oftentimes, existing techniques subsample the data or use other methods to improve computational efficiency, at the expense of incurring some approximation error. This thes… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: PhD Thesis

    ACM Class: I.1.2; I.5.3; I.2.0; I.2.m

  11. arXiv:2309.04074  [pdf, other

    eess.SY cs.AI

    Computationally Efficient Data-Driven Discovery and Linear Representation of Nonlinear Systems For Control

    Authors: Madhur Tiwari, George Nehma, Bethany Lusch

    Abstract: This work focuses on develo** a data-driven framework using Koopman operator theory for system identification and linearization of nonlinear systems for control. Our proposed method presents a deep learning framework with recursive learning. The resulting linear system is controlled using a linear quadratic control. An illustrative example using a pendulum system is presented with simulations on… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

  12. arXiv:2309.03442  [pdf, other

    cs.CR

    Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)

    Authors: Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann

    Abstract: We consider the problem of specifying and proving the security of non-trivial, concurrent programs that intentionally leak information. We present a method that decomposes the problem into (a) proving that the program only leaks information it has declassified via assume annotations already widely used in deductive program verification; and (b) auditing the declassifications against a declarative… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  13. arXiv:2306.15792  [pdf, other

    cs.DC cs.AR cs.PF

    Sidecars on the Central Lane: Impact of Network Proxies on Microservices

    Authors: Prateek Sahu, Lucy Zheng, Marco Bueso, Shijia Wei, Neeraja J. Yadwadkar, Mohit Tiwari

    Abstract: Cloud applications are moving away from monolithic model towards loosely-coupled microservices designs. Service meshes are widely used for implementing microservices applications mainly because they provide a modular architecture for modern applications by separating operational features from application business logic. Sidecar proxies in service meshes enable this modularity by applying security,… ▽ More

    Submitted 17 October, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

    Comments: Presented at HotInfra 2023 (co-located with ISCA 2023, Orlando, FL)

  14. arXiv:2305.07961  [pdf, other

    cs.IR cs.CL cs.LG

    Leveraging Large Language Models in Conversational Recommender Systems

    Authors: Luke Friedman, Sameer Ahuja, David Allen, Zhenning Tan, Hakim Sidahmed, Changbo Long, Jun Xie, Gabriel Schubiner, Ajay Patel, Harsh Lara, Brian Chu, Zexi Chen, Manoj Tiwari

    Abstract: A Conversational Recommender System (CRS) offers increased transparency and control to users by enabling them to engage with the system through a real-time multi-turn dialogue. Recently, Large Language Models (LLMs) have exhibited an unprecedented ability to converse naturally and incorporate world knowledge and common-sense reasoning into language understanding, unlocking the potential of this pa… ▽ More

    Submitted 16 May, 2023; v1 submitted 13 May, 2023; originally announced May 2023.

  15. arXiv:2305.07157  [pdf, other

    cs.CL cs.AI

    Exploring Zero and Few-shot Techniques for Intent Classification

    Authors: Soham Parikh, Quaizar Vohra, Prashil Tumbade, Mitul Tiwari

    Abstract: Conversational NLU providers often need to scale to thousands of intent-classification models where new customers often face the cold-start problem. Scaling to so many customers puts a constraint on storage space as well. In this paper, we explore four different zero and few-shot intent classification approaches with this low-resource constraint: 1) domain adaptation, 2) data augmentation, 3) zero… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: ACL 2023 Industry Track. 8 pages, 2 figures, 5 tables

  16. arXiv:2304.14540  [pdf, other

    cs.CR cs.SE

    Interactive Greybox Penetration Testing for Cloud Access Control using IAM Modeling and Deep Reinforcement Learning

    Authors: Yang Hu, Wenxi Wang, Sarfraz Khurshid, Mohit Tiwari

    Abstract: Identity and Access Management (IAM) is an access control service in cloud platforms. To securely manage cloud resources, customers need to configure IAM to specify the access control rules for their cloud organizations. However, incorrectly configured IAM can be exploited to cause a security attack such as privilege escalation (PE), leading to severe economic loss. To detect such PEs due to IAM m… ▽ More

    Submitted 8 June, 2024; v1 submitted 27 April, 2023; originally announced April 2023.

  17. arXiv:2302.07407  [pdf, ps, other

    cs.LG cs.AI

    Bayesian Decision Trees via Tractable Priors and Probabilistic Context-Free Grammars

    Authors: Colin Sullivan, Mo Tiwari, Sebastian Thrun, Chris Piech

    Abstract: Decision Trees are some of the most popular machine learning models today due to their out-of-the-box performance and interpretability. Often, Decision Trees models are constructed greedily in a top-down fashion via heuristic search criteria, such as Gini impurity or entropy. However, trees constructed in this manner are sensitive to minor fluctuations in training data and are prone to overfitting… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: 10 pages, 1 figure

    ACM Class: I.2.m; I.2.6; I.2.0

  18. arXiv:2302.00824  [pdf

    cs.CV

    SpaceYOLO: A Human-Inspired Model for Real-time, On-board Spacecraft Feature Detection

    Authors: Trupti Mahendrakar, Ryan T. White, Markus Wilde, Madhur Tiwari

    Abstract: The rapid proliferation of non-cooperative spacecraft and space debris in orbit has precipitated a surging demand for on-orbit servicing and space debris removal at a scale that only autonomous missions can address, but the prerequisite autonomous navigation and flightpath planning to safely capture an unknown, non-cooperative, tumbling space object is an open problem. This requires algorithms for… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: Accepted at IEEE Aerospace Conference 2023, 11 pages, 21 figures

  19. arXiv:2212.08167  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    Evaluation of Synthetic Datasets for Conversational Recommender Systems

    Authors: Harsh Lara, Manoj Tiwari

    Abstract: For researchers leveraging Large-Language Models (LLMs) in the generation of training datasets, especially for conversational recommender systems - the absence of robust evaluation frameworks has been a long-standing problem. The efficiency brought about by LLMs in the data generation phase is impeded during the process of evaluation of the generated data, since it generally requires human-raters… ▽ More

    Submitted 12 December, 2022; originally announced December 2022.

  20. arXiv:2212.07551  [pdf, ps, other

    cs.LG cs.AI

    Faster Maximum Inner Product Search in High Dimensions

    Authors: Mo Tiwari, Ryan Kang, Je-Yong Lee, Donghyun Lee, Chris Piech, Sebastian Thrun, Ilan Shomorony, Martin **ye Zhang

    Abstract: Maximum Inner Product Search (MIPS) is a ubiquitous task in machine learning applications such as recommendation systems. Given a query vector and $n$ atom vectors in $d$-dimensional space, the goal of MIPS is to find the atom that has the highest inner product with the query vector. Existing MIPS algorithms scale at least as $O(\sqrt{d})$, which becomes computationally prohibitive in high-dimensi… ▽ More

    Submitted 26 June, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: 24 pages

  21. arXiv:2212.07473  [pdf, ps, other

    cs.LG cs.DS

    MABSplit: Faster Forest Training Using Multi-Armed Bandits

    Authors: Mo Tiwari, Ryan Kang, Je-Yong Lee, Sebastian Thrun, Chris Piech, Ilan Shomorony, Martin **ye Zhang

    Abstract: Random forests are some of the most widely used machine learning models today, especially in domains that necessitate interpretability. We present an algorithm that accelerates the training of random forests and other popular tree-based learning methods. At the core of our algorithm is a novel node-splitting subroutine, dubbed MABSplit, used to efficiently find split points when constructing decis… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: Published at NeurIPS 2022, 30 pages

    ACM Class: I.2.8

  22. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  23. arXiv:2205.01240  [pdf, ps, other

    cs.CR cs.AI

    Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

    Authors: Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar

    Abstract: Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs significant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to properly configure and periodically update. Security negligence and human errors often lead to mis… ▽ More

    Submitted 13 June, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

    Comments: to be published in IJCAI/ECAI'22

  24. arXiv:2204.07025  [pdf, other

    astro-ph.IM cs.CV

    Autonomous Satellite Detection and Tracking using Optical Flow

    Authors: David Zuehlke, Daniel Posada, Madhur Tiwari, Troy Henderson

    Abstract: In this paper, an autonomous method of satellite detection and tracking in images is implemented using optical flow. Optical flow is used to estimate the image velocities of detected objects in a series of space images. Given that most objects in an image will be stars, the overall image velocity from star motion is used to estimate the image's frame-to-frame motion. Objects seen to be moving with… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

  25. arXiv:2201.08896  [pdf, other

    cs.LG cs.AI

    Environment Generation for Zero-Shot Compositional Reinforcement Learning

    Authors: Izzeddin Gur, Natasha Jaques, Yingjie Miao, Jongwook Choi, Manoj Tiwari, Honglak Lee, Aleksandra Faust

    Abstract: Many real-world problems are compositional - solving them requires completing interdependent sub-tasks, either in series or in parallel, that can be represented as a dependency graph. Deep reinforcement learning (RL) agents often struggle to learn such complex tasks due to the long time horizons and sparse rewards. To address this problem, we present Compositional Design of Environments (CoDE), wh… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

    Comments: Published in NeurIPS 2021

  26. arXiv:2201.07729  [pdf

    cs.HC

    Ergonomics Integrated Design Methodology using Parameter Optimization, Computer-Aided Design, and Digital Human Modelling: A Case Study of a Cleaning Equipment

    Authors: Neelesh Kr. Sharma, Mayank Tiwari, Atul Thakur, Anindya K. Ganguli

    Abstract: Challenges of enhancing productivity by amplifying efficiency and man-machine compatibility of equipment can be achieved by adopting advanced technologies. This study aims to present and exemplify methodology for incorporating ergonomics pro-actively into the design using computer-aided design and digital human modeling-based analysis. The cleaning equipment is parametrized to detect the critical… ▽ More

    Submitted 5 April, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: page count: 33; word count (Excluding references and abstract): 5413; abstract word count: 161; number of figures: 11; number of tables: 3

  27. arXiv:2112.02721  [pdf, other

    cs.CL cs.AI cs.LG

    NL-Augmenter: A Framework for Task-Sensitive Natural Language Augmentation

    Authors: Kaustubh D. Dhole, Varun Gangal, Sebastian Gehrmann, Aadesh Gupta, Zhenhao Li, Saad Mahamood, Abinaya Mahendiran, Simon Mille, Ashish Shrivastava, Samson Tan, Tongshuang Wu, Jascha Sohl-Dickstein, **ho D. Choi, Eduard Hovy, Ondrej Dusek, Sebastian Ruder, Sajant Anand, Nagender Aneja, Rabin Banjade, Lisa Barthe, Hanna Behnke, Ian Berlot-Attwell, Connor Boyle, Caroline Brun, Marco Antonio Sobrevilla Cabezudo , et al. (101 additional authors not shown)

    Abstract: Data augmentation is an important component in the robustness evaluation of models in natural language processing (NLP) and in enhancing the diversity of the data they are trained on. In this paper, we present NL-Augmenter, a new participatory Python-based natural language augmentation framework which supports the creation of both transformations (modifications to the data) and filters (data split… ▽ More

    Submitted 11 October, 2022; v1 submitted 5 December, 2021; originally announced December 2021.

    Comments: 39 pages, repository at https://github.com/GEM-benchmark/NL-Augmenter

  28. arXiv:2111.09266  [pdf, other

    cs.LG cs.AI stat.ML

    GFlowNet Foundations

    Authors: Yoshua Bengio, Salem Lahlou, Tristan Deleu, Edward J. Hu, Mo Tiwari, Emmanuel Bengio

    Abstract: Generative Flow Networks (GFlowNets) have been introduced as a method to sample a diverse set of candidates in an active learning context, with a training objective that makes them approximately sample in proportion to a given reward function. In this paper, we show a number of additional theoretical properties of GFlowNets. They can be used to estimate joint probability distributions and the corr… ▽ More

    Submitted 10 July, 2023; v1 submitted 17 November, 2021; originally announced November 2021.

  29. arXiv:2110.14053  [pdf, other

    cs.AI cs.LG

    NeuroBack: Improving CDCL SAT Solving using Graph Neural Networks

    Authors: Wenxi Wang, Yang Hu, Mohit Tiwari, Sarfraz Khurshid, Kenneth McMillan, Risto Miikkulainen

    Abstract: Propositional satisfiability (SAT) is an NP-complete problem that impacts many research fields, such as planning, verification, and security. Mainstream modern SAT solvers are based on the Conflict-Driven Clause Learning (CDCL) algorithm. Recent work aimed to enhance CDCL SAT solvers using Graph Neural Networks (GNNs). However, so far this approach either has not made solving more effective, or re… ▽ More

    Submitted 8 May, 2024; v1 submitted 26 October, 2021; originally announced October 2021.

    Comments: Paper has been accepted by ICLR'24

  30. arXiv:2110.07157  [pdf, other

    cs.CR

    Bandwidth Utilization Side-Channel on ML Inference Accelerators

    Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari

    Abstract: Accelerators used for machine learning (ML) inference provide great performance benefits over CPUs. Securing confidential model in inference against off-chip side-channel attacks is critical in harnessing the performance advantage in practice. Data and memory address encryption has been recently proposed to defend against off-chip attacks. In this paper, we demonstrate that bandwidth utilization o… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  31. arXiv:2110.05476  [pdf, other

    quant-ph cs.LG eess.IV

    Image Compression and Classification Using Qubits and Quantum Deep Learning

    Authors: Ali Mohsen, Mo Tiwari

    Abstract: Recent work suggests that quantum machine learning techniques can be used for classical image classification by encoding the images in quantum states and using a quantum neural network for inference. However, such work has been restricted to very small input images, at most 4 x 4, that are unrealistic and cannot even be accurately labeled by humans. The primary difficulties in using larger input i… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

  32. arXiv:2108.12579  [pdf, other

    cs.CR cs.LG

    Power-Based Attacks on Spatial DNN Accelerators

    Authors: Ge Li, Mohit Tiwari, Michael Orshansky

    Abstract: With proliferation of DNN-based applications, the confidentiality of DNN model is an important commercial goal. Spatial accelerators, that parallelize matrix/vector operations, are utilized for enhancing energy efficiency of DNN computation. Recently, model extraction attacks on simple accelerators, either with a single processing element or running a binarized network, were demonstrated using the… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

    Comments: 18 pages, 10 figures, accepted by the ACM Journal on Emerging Technologies in Computing Systems

  33. arXiv:2107.10344  [pdf

    cs.CY q-bio.PE

    Challenges in cybersecurity: Lessons from biological defense systems

    Authors: Edward Schrom, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. de Boer, Adam Doupé, Roya Ensafi, Stuart Feldman, Bryan T. Grenfell. Alex Halderman, Silvie Huijben, Carlo Maley, Melanie Mosesr, Alan S. Perelson, Charles Perrings, Joshua Plotkin, Jennifer Rexford, Mohit Tiwari

    Abstract: We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 20 pages

    MSC Class: A.0

  34. arXiv:2105.06176  [pdf, other

    cs.DC

    Efficient executions of Pipelined Conjugate Gradient Method on Heterogeneous Architectures

    Authors: Manasi Tiwari, Sathish Vadhiyar

    Abstract: The Preconditioned Conjugate Gradient (PCG) method is widely used for solving linear systems of equations with sparse matrices. A recent version of PCG, Pipelined PCG, eliminates the dependencies in the computations of the PCG algorithm so that the non-dependent computations can be overlapped with communication. In this paper, we propose three methods for efficient execution of the Pipelined PCG a… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  35. arXiv:2103.01991  [pdf, other

    cs.LG cs.AI cs.MA

    Adversarial Environment Generation for Learning to Navigate the Web

    Authors: Izzeddin Gur, Natasha Jaques, Kevin Malta, Manoj Tiwari, Honglak Lee, Aleksandra Faust

    Abstract: Learning to autonomously navigate the web is a difficult sequential decision making task. The state and action spaces are large and combinatorial in nature, and websites are dynamic environments consisting of several pages. One of the bottlenecks of training web navigation agents is providing a learnable curriculum of training environments that can cover the large variety of real-world websites. T… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

    Comments: Presented at Deep RL Workshop, NeurIPS, 2020

  36. arXiv:2012.00659  [pdf

    cs.CV

    Emotion Detection using Image Processing in Python

    Authors: Raghav Puri, Archit Gupta, Manas Sikri, Mohit Tiwari, Nitish Pathak, Shivendra Goel

    Abstract: In this work, user's emotion using its facial expressions will be detected. These expressions can be derived from the live feed via system's camera or any pre-exisiting image available in the memory. Emotions possessed by humans can be recognized and has a vast scope of study in the computer vision industry upon which several researches have already been done. The work has been implemented using P… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

  37. arXiv:2008.06908  [pdf, other

    cs.IR cs.MM

    Visually Aware Skip-Gram for Image Based Recommendations

    Authors: Parth Tiwari, Yash Jain, Shivansh Mundra, Jenny Harding, Manoj Kumar Tiwari

    Abstract: The visual appearance of a product significantly influences purchase decisions on e-commerce websites. We propose a novel framework VASG (Visually Aware Skip-Gram) for learning user and product representations in a common latent space using product image features. Our model is an amalgamation of the Skip-Gram architecture and a deep neural network based Decoder. Here the Skip-Gram attempts to capt… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

    Comments: 8 pages, 5 figures

  38. arXiv:2007.06751  [pdf, other

    cs.CR

    SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution

    Authors: Sarbartha Banerjee, Prakash Ramrakhyani, Shijia Wei, Mohit Tiwari

    Abstract: Hardware-enclaves that target complex CPU designs compromise both security and performance. Programs have little control over micro-architecture, which leads to side-channel leaks, and then have to be transformed to have worst-case control- and data-flow behaviors and thus incur considerable slowdown. We propose to address these security and performance problems by bringing enclaves into the realm… ▽ More

    Submitted 14 July, 2020; v1 submitted 13 July, 2020; originally announced July 2020.

  39. arXiv:2006.06856  [pdf, other

    cs.LG cs.AI stat.ML

    BanditPAM: Almost Linear Time $k$-Medoids Clustering via Multi-Armed Bandits

    Authors: Mo Tiwari, Martin **ye Zhang, James Mayclin, Sebastian Thrun, Chris Piech, Ilan Shomorony

    Abstract: Clustering is a ubiquitous task in data science. Compared to the commonly used $k$-means clustering, $k$-medoids clustering requires the cluster centers to be actual data points and support arbitrary distance metrics, which permits greater interpretability and the clustering of structured objects. Current state-of-the-art $k$-medoids clustering algorithms, such as Partitioning Around Medoids (PAM)… ▽ More

    Submitted 6 December, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: 21 pages, NeurIPS 2020

  40. arXiv:2004.03484  [pdf, other

    cs.CL cs.AI cs.LG

    Automated Utterance Generation

    Authors: Soham Parikh, Quaizar Vohra, Mitul Tiwari

    Abstract: Conversational AI assistants are becoming popular and question-answering is an important part of any conversational assistant. Using relevant utterances as features in question-answering has shown to improve both the precision and recall for retrieving the right answer by a conversational assistant. Hence, utterance generation has become an important problem with the goal of generating relevant ut… ▽ More

    Submitted 7 April, 2020; v1 submitted 7 April, 2020; originally announced April 2020.

    Comments: AAAI/IAAI-20, Emerging Application Track

  41. arXiv:2002.08897  [pdf

    eess.IV cs.GR

    STW and SPIHT Wavelet compression using MATLAB wavelet Tool for Color Image

    Authors: Manish Tiwari

    Abstract: Images can be represented by mathematical function using wavelets. Wavelet can be manipulated (shrink/expand) by applying some values to its function. It helps to localize the signals. Application of wavelet in images processing has larger scope as proved. Image compression is one of the dimension. There are various wavelet image compression techniques. This research paper focused on comparison of… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

    Comments: 3

  42. arXiv:1803.00883  [pdf, other

    cs.CR

    The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations

    Authors: Mikhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari

    Abstract: We introduce a new malware detector - Shape-GD - that aggregates per-machine detectors into a robust global detector. Shape-GD is based on two insights: 1. Structural: actions such as visiting a website (waterhole attack) by nodes correlate well with malware spread, and create dynamic neighborhoods of nodes that were exposed to the same attack vector. However, neighborhood sizes vary unpredictably… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1708.01864

  43. arXiv:1708.01864  [pdf, other

    cs.CR

    Exploiting Latent Attack Semantics for Intelligent Malware Detection

    Authors: Mkhail Kazdagli, Constantine Caramanis, Sanjay Shakkottai, Mohit Tiwari

    Abstract: Behavioral malware detectors promise to expose previously unknown malware and are an important security primitive. However, even the best behavioral detectors suffer from high false positives and negatives. In this paper, we address the challenge of aggregating weak per-device behavioral detectors in noisy communities (i.e., ones that produce alerts at unpredictable rates) into an accurate and rob… ▽ More

    Submitted 6 August, 2017; originally announced August 2017.

  44. arXiv:1603.03086  [pdf, other

    cs.CR

    EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses

    Authors: Mikhail Kazdagli, Ling Huang, Vijay Reddi, Mohit Tiwari

    Abstract: Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy computing platforms, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware typically adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, rea… ▽ More

    Submitted 10 March, 2016; v1 submitted 9 March, 2016; originally announced March 2016.

  45. arXiv:1403.1660  [pdf

    cs.CV

    Feature Extraction of ECG Signal Using HHT Algorithm

    Authors: Neha Soorma, Jaikaran Singh, Mukesh Tiwari

    Abstract: This paper describe the features extraction algorithm for electrocardiogram (ECG) signal using Huang Hilbert Transform and Wavelet Transform. ECG signal for an individual human being is different due to unique heart structure. The purpose of feature extraction of ECG signal would allow successful abnormality detection and efficient prognosis due to heart disorder. Some major important features wil… ▽ More

    Submitted 7 March, 2014; originally announced March 2014.

    Comments: 7 pages,"Published with International Journal of Engineering Trends and Technology (IJETT)"

  46. arXiv:1212.3228  [pdf

    cs.CL cs.IR cs.SI

    Language Without Words: A Pointillist Model for Natural Language Processing

    Authors: Peiyou Song, Anhei Shu, David Phipps, Dan Wallach, Mohit Tiwari, Jedidiah Crandall, George Luger

    Abstract: This paper explores two separate questions: Can we perform natural language processing tasks without a lexicon?; and, Should we? Existing natural language processing techniques are either based on words as units or use units such as grams only for basic classification tasks. How close can a machine come to reasoning about the meanings of words and phrases in a corpus without using any lexicon, bas… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 5 pages, 2 figures

    ACM Class: I.2.7; H.2.8; H.3.1

    Journal ref: The 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) Kobe, Japan

  47. arXiv:1005.4265  [pdf

    cs.OH

    Reduction in iron losses in Indirect Vector-Controlled IM Drive using FLC

    Authors: C. Srisailam, Mukesh Tiwari, Anurag Trivedi

    Abstract: This paper describes the use of fuzzy logic controller for efficiency optimization control of a drive while kee** good dynamic response. At steady-state light-load condition, the fuzzy controller adaptively adjusts the excitation current with respect to the torque current to give the minimum total copper and iron loss. The measured input power such that, for a given load torque and speed, the dr… ▽ More

    Submitted 24 May, 2010; originally announced May 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  48. arXiv:1004.1675  [pdf

    cs.RO

    Fuzzy Logic of Speed and Steering Control System for Three Dimensional Line Following of an Autonomous Vehicle

    Authors: Shailja Shukla, Mukesh Tiwari

    Abstract: ... This paper is to describe exploratory research on the design of a modular autonomous mobile robot controller. The controller incorporates a fuzzy logic [8] [9] approach for steering and speed control [37], a FL approach for ultrasound sensing and an overall expert system for guidance. The advantages of a modular system are related to portability and transportability, i.e. any vehicle can becom… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 3, March 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  49. arXiv:0912.2284  [pdf

    cs.NI

    Evaluation of Varrying Mobility Models & Network Loads on DSDV Protocol of MANETs

    Authors: C. P. Agrawal, O. P. Vyas, M. K Tiwari

    Abstract: A mobile ad-hoc network (MANET) is collection of intercommunicating mobile hosts forming a spontaneous network without using established network infrastructure. Unlike the cellular or infrastructure networks who have a wired backbone connecting the base-station, the MANETs have neither fixed routers nor fixed locations. Their performance largely depend upon the routing mechanism & nature of mobi… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

    Journal ref: IJCSE Volume 1 Issue 2 2009 40-46