Skip to main content

Showing 1–14 of 14 results for author: Varghese, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18012  [pdf, other

    cs.CV cs.AI

    View-Invariant Pixelwise Anomaly Detection in Multi-object Scenes with Adaptive View Synthesis

    Authors: Subin Varghese, Vedhus Hoskere

    Abstract: The inspection and monitoring of infrastructure assets typically requires identifying visual anomalies in scenes periodically photographed over time. Images collected manually or with robots such as unmanned aerial vehicles from the same scene at different instances in time are typically not perfectly aligned. Supervised segmentation methods can be applied to identify known problems, but unsupervi… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2403.13784  [pdf, ps, other

    cs.LG cs.AI cs.CY cs.SE

    The Model Openness Framework: Promoting Completeness and Openness for Reproducibility, Transparency, and Usability in Artificial Intelligence

    Authors: Matt White, Ibrahim Haddad, Cailean Osborne, Xiao-Yang Liu Yanglet, Ahmed Abdelmonsef, Sachin Varghese

    Abstract: Generative AI (GAI) offers unprecedented opportunities for research and innovation, but its commercialization has raised concerns about transparency, reproducibility, and safety. Many open GAI models lack the necessary components for full understanding and reproducibility, and some use restrictive licenses whilst claiming to be ``open-source''. To address these concerns, we propose the Model Openn… ▽ More

    Submitted 3 June, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

    Comments: 22 pages

  3. Digital Twin-based Intrusion Detection for Industrial Control Systems

    Authors: Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos

    Abstract: Digital twins have recently gained significant interest in simulation, optimization, and predictive maintenance of Industrial Control Systems (ICS). Recent studies discuss the possibility of using digital twins for intrusion detection in industrial systems. Accordingly, this study contributes to a digital twin-based security framework for industrial control systems, extending its capabilities for… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: 7 pages, 7 figures, 3 tables, workshop paper

    Journal ref: IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2022, pp. 611-617

  4. Inspect, Understand, Overcome: A Survey of Practical Methods for AI Safety

    Authors: Sebastian Houben, Stephanie Abrecht, Maram Akila, Andreas Bär, Felix Brockherde, Patrick Feifel, Tim Fingscheidt, Sujan Sai Gannamaneni, Seyed Eghbal Ghobadi, Ahmed Hammam, Anselm Haselhoff, Felix Hauser, Christian Heinzemann, Marco Hoffmann, Nikhil Kapoor, Falk Kappel, Marvin Klingner, Jan Kronenberger, Fabian Küppers, Jonas Löhdefink, Michael Mlynarski, Michael Mock, Firas Mualla, Svetlana Pavlitskaya, Maximilian Poretschkin , et al. (16 additional authors not shown)

    Abstract: The use of deep neural networks (DNNs) in safety-critical applications like mobile health and autonomous driving is challenging due to numerous model-inherent shortcomings. These shortcomings are diverse and range from a lack of generalization over insufficient interpretability to problems with malicious inputs. Cyber-physical systems employing DNNs are therefore likely to suffer from safety conce… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 94 pages

    Journal ref: Fingscheidt, T., Gottschalk, H., Houben, S. (eds) Deep Neural Networks and Data for Automated Driving, Springer, Cham (2022)

  5. The Vulnerability of Semantic Segmentation Networks to Adversarial Attacks in Autonomous Driving: Enhancing Extensive Environment Sensing

    Authors: Andreas Bär, Jonas Löhdefink, Nikhil Kapoor, Serin J. Varghese, Fabian Hüger, Peter Schlicht, Tim Fingscheidt

    Abstract: Enabling autonomous driving (AD) can be considered one of the biggest challenges in today's technology. AD is a complex task accomplished by several functionalities, with environment perception being one of its core functions. Environment perception is usually performed by combining the semantic information captured by several sensors, i.e., lidar or camera. The semantic information from the respe… ▽ More

    Submitted 13 January, 2021; v1 submitted 11 January, 2021; originally announced January 2021.

    Comments: IEEE Signal Processing Magazine (Volume: 38, Issue: 1, Jan. 2021), pp. 42 - 52

  6. arXiv:2012.07504  [pdf, other

    cs.CV cs.LG

    Improving Video Instance Segmentation by Light-weight Temporal Uncertainty Estimates

    Authors: Kira Maag, Matthias Rottmann, Serin Varghese, Fabian Hueger, Peter Schlicht, Hanno Gottschalk

    Abstract: Instance segmentation with neural networks is an essential task in environment perception. In many works, it has been observed that neural networks can predict false positive instances with high confidence values and true positives with low ones. Thus, it is important to accurately model the uncertainties of neural networks in order to prevent safety issues and foster interpretability. In applicat… ▽ More

    Submitted 13 April, 2021; v1 submitted 14 December, 2020; originally announced December 2020.

  7. arXiv:2012.01558  [pdf, other

    cs.CV cs.LG eess.IV

    From a Fourier-Domain Perspective on Adversarial Examples to a Wiener Filter Defense for Semantic Segmentation

    Authors: Nikhil Kapoor, Andreas Bär, Serin Varghese, Jan David Schneider, Fabian Hüger, Peter Schlicht, Tim Fingscheidt

    Abstract: Despite recent advancements, deep neural networks are not robust against adversarial perturbations. Many of the proposed adversarial defense approaches use computationally expensive training mechanisms that do not scale to complex real-world tasks such as semantic segmentation, and offer only marginal improvements. In addition, fundamental questions on the nature of adversarial perturbations and t… ▽ More

    Submitted 21 April, 2021; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: Accepted by The International Joint Conference on Neural Network (IJCNN) 2021

  8. arXiv:2012.01386  [pdf, other

    cs.CV cs.AI cs.LG

    A Self-Supervised Feature Map Augmentation (FMA) Loss and Combined Augmentations Finetuning to Efficiently Improve the Robustness of CNNs

    Authors: Nikhil Kapoor, Chun Yuan, Jonas Löhdefink, Roland Zimmermann, Serin Varghese, Fabian Hüger, Nico Schmidt, Peter Schlicht, Tim Fingscheidt

    Abstract: Deep neural networks are often not robust to semantically-irrelevant changes in the input. In this work we address the issue of robustness of state-of-the-art deep convolutional neural networks (CNNs) against commonly occurring distortions in the input such as photometric changes, or the addition of blur and noise. These changes in the input are often accounted for during training in the form of d… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Comments: Accepted at ACM CSCS 2020 (8 pages, 4 figures)

  9. arXiv:1903.05152  [pdf, other

    cs.CY

    Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA

    Authors: Noah Apthorpe, Sarah Varghese, Nick Feamster

    Abstract: Increased concern about data privacy has prompted new and updated data protection regulations worldwide. However, there has been no rigorous way to test whether the practices mandated by these regulations actually align with the privacy norms of affected populations. Here, we demonstrate that surveys based on the theory of contextual integrity provide a quantifiable and scalable method for measuri… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

    Comments: 18 pages, 1 table, 4 figures, 2 appendices

    Journal ref: 28th USENIX Security Symposium (2019)

  10. arXiv:1603.07243  [pdf, ps, other

    cs.DM math.CO

    Heredity for generalized power domination

    Authors: Paul Dorbec, Seethu Varghese, Ambat Vijayakumar

    Abstract: In this paper, we study the behaviour of the generalized power domination number of a graph by small changes on the graph, namely edge and vertex deletion and edge contraction. We prove optimal bounds for $γ\_{p,k}(G-e)$, $γ\_{p,k}(G/e)$ and for $γ\_{p,k}(G-v)$ in terms of $γ\_{p,k}(G)$, and give examples for which these bounds are tight. We characterize all graphs for which… ▽ More

    Submitted 23 March, 2016; originally announced March 2016.

    Comments: Discrete Mathematics and Theoretical Computer Science, 2016

  11. Contrast Enhancement And Brightness Preservation Using Multi- Decomposition Histogram Equalization

    Authors: Sayali Nimkar, Sanal Varghese, Sucheta Shrivastava

    Abstract: Histogram Equalization (HE) has been an essential addition to the Image Enhancement world. Enhancement techniques like Classical Histogram Equalization (CHE), Adaptive Histogram Equalization (ADHE), Bi-Histogram Equalization (BHE) and Recursive Mean Separate Histogram Equalization (RMSHE) methods enhance contrast, however, brightness is not well preserved with these methods, which gives an unpleas… ▽ More

    Submitted 11 July, 2013; originally announced July 2013.

    Comments: 9 pages,13 figures

    Journal ref: SIPIJ, Vol.4, Issue.3, pp. 85-93

  12. Multidimensional User Data Model for Web Personalization

    Authors: Nithin K. Anil, Sharath Basil Kurian, Aby Abahai T, Surekha Mariam Varghese

    Abstract: Personalization is being applied to great extend in many systems. This paper presents a multi-dimensional user data model and its application in web search. Online and Offline activities of the user are tracked for creating the user model. The main phases are identification of relevant documents and the representation of relevance and similarity of the documents. The concepts Keywords, Topics, URL… ▽ More

    Submitted 19 June, 2013; originally announced June 2013.

    Comments: 6 pages, 3 figures -"Published with International Journal of Computer Applications (IJCA)"

    MSC Class: 68U35; 68N99; 68T01 ACM Class: H.3.3; H.3.4

    Journal ref: International Journal of Computer Applications, Volume 69, No.12, May 2013

  13. arXiv:1202.1808  [pdf

    cs.MM cs.CV cs.GR

    Personalised product design using virtual interactive techniques

    Authors: Kurien Zacharia, Eldo P. Elias, Surekha Mariam Varghese

    Abstract: Use of Virtual Interactive Techniques for personalized product design is described in this paper. Usually products are designed and built by considering general usage patterns and Prototy** is used to mimic the static or working behaviour of an actual product before manufacturing the product. The user does not have any control on the design of the product. Personalized design postpones design to… ▽ More

    Submitted 8 February, 2012; originally announced February 2012.

    Comments: 10 pages; International Journal of Computer Graphics & Animation (IJCGA) Vol.2, No.1, January 2012

    MSC Class: 68u05; 68u20 ACM Class: H.5.2; I.3.7

  14. Modelling Gesture Based Ubiquitous Applications

    Authors: Kurien Zacharia, Eldo P. Elias, Surekha Mariam Varghese

    Abstract: A cost effective, gesture based modelling technique called Virtual Interactive Prototy** (VIP) is described in this paper. Prototy** is implemented by projecting a virtual model of the equipment to be prototyped. Users can interact with the virtual model like the original working equipment. For capturing and tracking the user interactions with the model image and sound processing techniques ar… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.

    Comments: 10 pages; The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011

    MSC Class: 68U20; 68U05 ACM Class: H.5.2; I.3.7