Skip to main content

Showing 1–50 of 50 results for author: Verma, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.20037  [pdf, other

    cs.LG cs.PL

    Explore as a Storm, Exploit as a Raindrop: On the Benefit of Fine-Tuning Kernel Schedulers with Coordinate Descent

    Authors: Michael Canesche, Gaurav Verma, Fernando Magno Quintao Pereira

    Abstract: Machine-learning models consist of kernels, which are algorithms applying operations on tensors -- data indexed by a linear combination of natural numbers. Examples of kernels include convolutions, transpositions, and vectorial products. There are many ways to implement a kernel. These implementations form the kernel's optimization space. Kernel scheduling is the problem of finding the best implem… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 22 pages, 19 figures, original work

    MSC Class: 68N20 ACM Class: D.3.4

  2. arXiv:2404.02179  [pdf, other

    cs.IT cs.AI stat.ML

    Distributed and Rate-Adaptive Feature Compression

    Authors: Aditya Deshmukh, Venugopal V. Veeravalli, Gunjan Verma

    Abstract: We study the problem of distributed and rate-adaptive feature compression for linear regression. A set of distributed sensors collect disjoint features of regressor data. A fusion center is assumed to contain a pretrained linear regression model, trained on a dataset of the entire uncompressed data. At inference time, the sensors compress their observations and send them to the fusion center throu… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  3. arXiv:2403.13743  [pdf, other

    cs.CR

    Quantum-Secure Certificate-Less Conditional Privacy-Preserving Authentication for VANET

    Authors: Girraj Kumar Verma, Nahida Majeed Wani, Prosanta Gope

    Abstract: Vehicular Ad-hoc Networks (VANETs) marked a pronounced change in the Intelligent Transport System and Smart Cities through seamless vehicle communication to intensify safety and efficacy. However, a few authentication schemes have been devised in the literature to ensure the authenticity of the source and information in the post-quantum era. The most popular base for such construction is lattice-b… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Paper submitted to IEEE TDSC under review

  4. arXiv:2402.16832  [pdf, other

    cs.CL cs.AI cs.CV

    Mysterious Projections: Multimodal LLMs Gain Domain-Specific Visual Capabilities Without Richer Cross-Modal Projections

    Authors: Gaurav Verma, Minje Choi, Kartik Sharma, Jamelle Watson-Daniels, Sejoon Oh, Srijan Kumar

    Abstract: Multimodal large language models (MLLMs) like LLaVA and GPT-4(V) enable general-purpose conversations about images with the language modality. As off-the-shelf MLLMs may have limited capabilities on images from domains like dermatology and agriculture, they must be fine-tuned to unlock domain-specific applications. The prevalent architecture of current open-source MLLMs comprises two major modules… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: 8 pages, 3 figures, 3 tables

  5. arXiv:2402.14154  [pdf, other

    cs.CL cs.CV cs.CY

    MM-Soc: Benchmarking Multimodal Large Language Models in Social Media Platforms

    Authors: Yiqiao **, Minje Choi, Gaurav Verma, **dong Wang, Srijan Kumar

    Abstract: Social media platforms are hubs for multimodal information exchange, encompassing text, images, and videos, making it challenging for machines to comprehend the information or emotions associated with interactions in online spaces. Multimodal Large Language Models (MLLMs) have emerged as a promising solution to address these challenges, yet struggle with accurately interpreting human emotions and… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 18 pages, 6 figures

  6. arXiv:2401.10297  [pdf, other

    eess.SP cs.LG cs.NI

    Learning Non-myopic Power Allocation in Constrained Scenarios

    Authors: Arindam Chowdhury, Santiago Paternain, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We propose a learning-based framework for efficient power allocation in ad hoc interference networks under episodic constraints. The problem of optimal power allocation -- for maximizing a given network utility metric -- under instantaneous constraints has recently gained significant popularity. Several learnable algorithms have been proposed to obtain fast, effective, and near-optimal performance… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

    Comments: ASILOMAR 2023

  7. arXiv:2312.02471  [pdf, other

    cs.NI cs.LG eess.SP

    Congestion-aware Distributed Task Offloading in Wireless Multi-hop Networks Using Graph Neural Networks

    Authors: Zhongyuan Zhao, Jake Perazzone, Gunjan Verma, Santiago Segarra

    Abstract: Computational offloading has become an enabling component for edge intelligence in mobile and smart devices. Existing offloading schemes mainly focus on mobile devices and servers, while ignoring the potential network congestion caused by tasks from multiple mobile devices, especially in wireless multi-hop networks. To fill this gap, we propose a low-overhead, congestion-aware distributed task off… ▽ More

    Submitted 21 January, 2024; v1 submitted 4 December, 2023; originally announced December 2023.

    Comments: 5 pages, 5 figures, accepted to IEEE ICASSP 2024

    MSC Class: 05C90 ACM Class: C.2.1; C.2.2

  8. arXiv:2310.13132  [pdf, other

    cs.CL cs.AI

    Better to Ask in English: Cross-Lingual Evaluation of Large Language Models for Healthcare Queries

    Authors: Yiqiao **, Mohit Chandra, Gaurav Verma, Yibo Hu, Munmun De Choudhury, Srijan Kumar

    Abstract: Large language models (LLMs) are transforming the ways the general public accesses and consumes information. Their influence is particularly pronounced in pivotal sectors like healthcare, where lay individuals are increasingly appropriating LLMs as conversational agents for everyday queries. While LLMs demonstrate impressive language understanding and generation proficiencies, concerns regarding t… ▽ More

    Submitted 23 October, 2023; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: 18 pages, 7 figures

  9. arXiv:2310.04364  [pdf, other

    cs.NI eess.SP

    Enhanced Backpressure Routing Using Wireless Link Features

    Authors: Zhongyuan Zhao, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: Backpressure (BP) routing is a well-established framework for distributed routing and scheduling in wireless multi-hop networks. However, the basic BP scheme suffers from poor end-to-end delay due to the drawbacks of slow startup, random walk, and the last packet problem. Biased BP with shortest path awareness can address the first two drawbacks, and sojourn time-based backlog metrics were propose… ▽ More

    Submitted 14 October, 2023; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: 5 pages, 5 figures, accepted to IEEE CAMSAP 2023. arXiv admin note: text overlap with arXiv:2211.10748

    MSC Class: 05C90 ACM Class: C.2.1; C.2.2

  10. arXiv:2310.02095  [pdf, other

    cs.SI

    A Survey on the Role of Crowds in Combating Online Misinformation: Annotators, Evaluators, and Creators

    Authors: Bing He, Yibo Hu, Yeon-Chang Lee, Soyoung Oh, Gaurav Verma, Srijan Kumar

    Abstract: Online misinformation poses a global risk with significant real-world consequences. To combat misinformation, current research relies on professionals like journalists and fact-checkers for annotating and debunking misinformation, and develops automated machine learning methods for detecting misinformation. Complementary to these approaches, recent research has increasingly concentrated on utilizi… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: GitHub repository with the curated list of papers: https://github.com/claws-lab/awesome-crowd-combat-misinformation

  11. arXiv:2309.00915  [pdf, ps, other

    cs.CR

    Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing

    Authors: J. L. Hall, Y. Hertzog, M. Loewy, M. P. Skerritt, D. Valladolid, G. Verma

    Abstract: We present a mechanism to manifest unobtainable secrets using a nested Shamir secret sharing scheme to create public/private key pairs for elliptic curves. A threshold secret sharing scheme can be used as a decentralised trust mechanism with applications in identity validation, message decryption, and agreement empowerment. Decentralising trust means that there is no single point vulnerability whi… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

  12. arXiv:2307.04996  [pdf, other

    cs.IR cs.AI cs.LG

    Empowering recommender systems using automatically generated Knowledge Graphs and Reinforcement Learning

    Authors: Ghanshyam Verma, Shovon Sengupta, Simon Simanta, Huan Chen, Janos A. Perge, Devishree Pillai, John P. McCrae, Paul Buitelaar

    Abstract: Personalized recommendations have a growing importance in direct marketing, which motivates research to enhance customer experiences by knowledge graph (KG) applications. For example, in financial services, companies may benefit from providing relevant financial articles to their customers to cultivate relationships, foster client engagement and promote informed financial decisions. While several… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Accepted at KDD (OARS) 2023 [https://oars-workshop.github.io/]

    MSC Class: 14J60 (Primary) 14F05; 14J26 (Secondary) ACM Class: F.2.2; I.2.7

  13. arXiv:2306.11066  [pdf, other

    cs.CL cs.LG

    Adversarial Robustness of Prompt-based Few-Shot Learning for Natural Language Understanding

    Authors: Venkata Prabhakara Sarath Nookala, Gaurav Verma, Subhabrata Mukherjee, Srijan Kumar

    Abstract: State-of-the-art few-shot learning (FSL) methods leverage prompt-based fine-tuning to obtain remarkable results for natural language understanding (NLU) tasks. While much of the prior FSL methods focus on improving downstream task performance, there is a limited understanding of the adversarial robustness of such methods. In this work, we conduct an extensive study of several state-of-the-art FSL… ▽ More

    Submitted 20 June, 2023; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: Accepted full paper at Findings of ACL 2023; Code available at https://github.com/claws-lab/few-shot-adversarial-robustness

  14. arXiv:2306.11065  [pdf, other

    cs.CL cs.AI cs.CV

    Cross-Modal Attribute Insertions for Assessing the Robustness of Vision-and-Language Learning

    Authors: Shivaen Ramshetty, Gaurav Verma, Srijan Kumar

    Abstract: The robustness of multimodal deep learning models to realistic changes in the input text is critical for their applicability to important tasks such as text-to-image retrieval and cross-modal entailment. To measure robustness, several existing approaches edit the text data, but do so without leveraging the cross-modal information present in multimodal data. Information from the visual modality, su… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: Accepted full paper at ACL 2023; 15 pages, 7 figures

  15. arXiv:2306.06574  [pdf, other

    cs.NI cs.LG eess.SY

    Learnable Digital Twin for Efficient Wireless Network Evaluation

    Authors: Boning Li, Timofey Efimov, Abhishek Kumar, Jose Cortes, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: Network digital twins (NDTs) facilitate the estimation of key performance indicators (KPIs) before physically implementing a network, thereby enabling efficient optimization of the network configuration. In this paper, we propose a learning-based NDT for network simulators. The proposed method offers a holistic representation of information flow in a wireless network by integrating node, edge, and… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  16. arXiv:2305.10434  [pdf, other

    cs.CL cs.AI cs.LG

    Learning the Visualness of Text Using Large Vision-Language Models

    Authors: Gaurav Verma, Ryan A. Rossi, Christopher Tensmeyer, Jiuxiang Gu, Ani Nenkova

    Abstract: Visual text evokes an image in a person's mind, while non-visual text fails to do so. A method to automatically detect visualness in text will enable text-to-image retrieval and generation models to augment text with relevant images. This is particularly challenging with long-form text as text-to-image generation and retrieval models are often triggered for text that is designed to be explicitly v… ▽ More

    Submitted 22 October, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: Accepted at EMNLP 2023 (Main, long); 9 pages, 5 figures

  17. arXiv:2305.10383  [pdf

    cs.CL cs.IR

    Large-Scale Text Analysis Using Generative Language Models: A Case Study in Discovering Public Value Expressions in AI Patents

    Authors: Sergio Pelaez, Gaurav Verma, Barbara Ribeiro, Philip Shapira

    Abstract: Labeling data is essential for training text classifiers but is often difficult to accomplish accurately, especially for complex and abstract concepts. Seeking an improved method, this paper employs a novel approach using a generative language model (GPT-4) to produce labels and rationales for large-scale text analysis. We apply this approach to the task of discovering public value expressions in… ▽ More

    Submitted 18 May, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: 13 pages, 3 figures. Update corrects ORCID ID, adds arXiv citation. No other changes

  18. Transfer Learning Across Heterogeneous Features For Efficient Tensor Program Generation

    Authors: Gaurav Verma, Siddhisanket Raskar, Zhen Xie, Abid M Malik, Murali Emani, Barbara Chapman

    Abstract: Tuning tensor program generation involves searching for various possible program transformation combinations for a given program on target hardware to optimize the tensor program execution. It is already a complex process because of the massive search space and exponential combinations of transformations make auto-tuning tensor program generation more challenging, especially when we have a heterog… ▽ More

    Submitted 26 December, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  19. arXiv:2304.00446  [pdf, other

    eess.SP cs.LG

    Deep Graph Unfolding for Beamforming in MU-MIMO Interference Networks

    Authors: Arindam Chowdhury, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We develop an efficient and near-optimal solution for beamforming in multi-user multiple-input-multiple-output single-hop wireless ad-hoc interference networks. Inspired by the weighted minimum mean squared error (WMMSE) method, a classical approach to solving this problem, and the principle of algorithm unfolding, we present unfolded WMMSE (UWMMSE) for MU-MIMO. This method learns a parameterized… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: Under review at IEEE Trans. in Wireless Comm

  20. arXiv:2302.11791   

    cs.IT

    Additive complementary dual codes over $\mathbb{F}_{q^2}$

    Authors: Gyanendra K. Verma, R. K. Sharma

    Abstract: Shi et al. [Additive complementary dual codes over F4. Designs, Codes and Cryptography, 2022.] studied additive codes over the finite field F4 with respect to trace Hermitian and trace Euclidean inner products. In this article, we define additive codes of length n over finite field Fq2 as additive subgroups of Fn q2 where q is a prime power. We associate an additive code with a matrix called a gen… ▽ More

    Submitted 5 October, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Comments: There has been major changes in this manuscript we will submit new one

  21. arXiv:2211.10748  [pdf, other

    eess.SP cs.LG

    Delay-aware Backpressure Routing Using Graph Neural Networks

    Authors: Zhongyuan Zhao, Bojan Radojicic, Gunjan Verma, Ananthram Swami, Santiago Segarra

    Abstract: We propose a throughput-optimal biased backpressure (BP) algorithm for routing, where the bias is learned through a graph neural network that seeks to minimize end-to-end delay. Classical BP routing provides a simple yet powerful distributed solution for resource allocation in wireless multi-hop networks but has poor delay performance. A low-cost approach to improve this delay performance is to fa… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

    Comments: 5 pages, 5 figures, submitted to IEEE ICASSP 2023

    MSC Class: 05-08 ACM Class: C.2.1

  22. arXiv:2211.02646  [pdf, other

    cs.LG cs.AI cs.MM

    Robustness of Fusion-based Multimodal Classifiers to Cross-Modal Content Dilutions

    Authors: Gaurav Verma, Vishwa Vinay, Ryan A. Rossi, Srijan Kumar

    Abstract: As multimodal learning finds applications in a wide variety of high-stakes societal tasks, investigating their robustness becomes important. Existing work has focused on understanding the robustness of vision-and-language models to imperceptible variations on benchmark tasks. In this work, we investigate the robustness of multimodal classifiers to cross-modal dilutions - a plausible variation. We… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: Accepted at the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP); Full Paper (Oral)

  23. arXiv:2208.07708   

    cs.IT

    Construction Methods for Galois LCD codes over Finite Fields

    Authors: Gyanendra K. Verma, Astha Agrawal, R. K. Sharma

    Abstract: In this article, first we present a method for constructing many Hermitian LCD codes from a given Hermitian LCD code, and then provide several methods which utilize either a given [n, k, d] linear code or a given [n, k, d] Galois LCD code to construct new Galois LCD codes with different parameters. Using these construction methods, we construct several new [n, k, d] ternary LCD codes with better p… ▽ More

    Submitted 5 October, 2023; v1 submitted 16 August, 2022; originally announced August 2022.

    Comments: There are several mathematical and English language typos we will submit a new one soon

    MSC Class: 94B05; 94B60

  24. arXiv:2206.08725  [pdf, ps, other

    cs.IT

    Galois LCD Codes Over Fq + uFq + vFq + uvFq

    Authors: Astha Agrawal, Gyanendra K. Verma, R. K. Sharma

    Abstract: In \cite{anote}, Wu and Shi studied $ l $-Galois LCD codes over finite chain ring $\mathcal{R}=\mathbb{F}_q+u\mathbb{F}_q$, where $u^2=0$ and $ q=p^e$ for some prime $p$ and positive integer $e$. In this work, we extend the results to the finite non chain ring $ \mathcal{R} =\mathbb{F}_q+u\mathbb{F}_q+v\mathbb{F}_q+uv\mathbb{F}_q$, where $u^2=u,v^2=v $ and $ uv=vu $. We define a correspondence bet… ▽ More

    Submitted 17 June, 2022; originally announced June 2022.

  25. arXiv:2205.09744  [pdf, other

    cs.LG cs.CY cs.MM

    Overcoming Language Disparity in Online Content Classification with Multimodal Learning

    Authors: Gaurav Verma, Rohit Mujumdar, Zijie J. Wang, Munmun De Choudhury, Srijan Kumar

    Abstract: Advances in Natural Language Processing (NLP) have revolutionized the way researchers and practitioners address crucial societal problems. Large language models are now the standard to develop state-of-the-art solutions for text detection and classification tasks. However, the development of advanced computational techniques and resources is disproportionately focused on the English language, side… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

    Comments: Accepted for publication at ICWSM 2022 as a full paper

  26. arXiv:2205.09511  [pdf, other

    cs.SI cs.CL cs.HC cs.LG

    Minority Stress Experienced by LGBTQ Online Communities during the COVID-19 Pandemic

    Authors: Yunhao Yuan, Gaurav Verma, Barbara Keller, Talayeh Aledavood

    Abstract: The COVID-19 pandemic has disproportionately impacted the lives of minorities, such as members of the LGBTQ community (lesbian, gay, bisexual, transgender, and queer) due to pre-existing social disadvantages and health disparities. Although extensive research has been carried out on the impact of the COVID-19 pandemic on different aspects of the general population's lives, few studies are focused… ▽ More

    Submitted 10 May, 2023; v1 submitted 19 May, 2022; originally announced May 2022.

    Comments: 11 pages, 5 figures

    MSC Class: 68T50 (Primary) 62P15 (Secondary)

  27. arXiv:2202.05257  [pdf, other

    cs.SI cs.CY cs.LG

    Characterizing, Detecting, and Predicting Online Ban Evasion

    Authors: Manoj Niverthi, Gaurav Verma, Srijan Kumar

    Abstract: Moderators and automated methods enforce bans on malicious users who engage in disruptive behavior. However, malicious users can easily create a new account to evade such bans. Previous research has focused on other forms of online deception, like the simultaneous operation of multiple accounts by the same entities (sockpuppetry), impersonation of other individuals, and studying the effects of de-… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: Accepted full paper at The ACM WebConf 2022

  28. Graph-based Algorithm Unfolding for Energy-aware Power Allocation in Wireless Networks

    Authors: Boning Li, Gunjan Verma, Santiago Segarra

    Abstract: We develop a novel graph-based trainable framework to maximize the weighted sum energy efficiency (WSEE) for power allocation in wireless communication networks. To address the non-convex nature of the problem, the proposed method consists of modular structures inspired by a classical iterative suboptimal approach and enhanced with learnable components. More precisely, we propose a deep unfolding… ▽ More

    Submitted 17 April, 2023; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: Published in IEEE Transactions on Wireless Communications

    Journal ref: in IEEE Transactions on Wireless Communications, vol. 22, no. 2, pp. 1359-1373, Feb. 2023

  29. arXiv:2112.09738  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    Improving Ethical Outcomes with Machine-in-the-Loop: Broadening Human Understanding of Data Annotations

    Authors: Ashis Kumer Biswas, Geeta Verma, Justin Otto Barber

    Abstract: We introduce a machine-in-the-loop pipeline that aims to address root causes of unwanted bias in natural language based supervised machine learning tasks in the education domain. Learning from the experiences of students is foundational for education researchers, and academic administrators. 21st-century skills learned from experience are becoming a core part of college and career readiness as wel… ▽ More

    Submitted 15 December, 2021; originally announced December 2021.

    Comments: Accepted and presented at the Human Centered AI workshop at the 35th Conference on Neural Information Processing Systems (NeurIPS), Dec 13th 2021

  30. arXiv:2111.09413  [pdf, other

    cs.NI eess.SP

    Mixed Dual-Hop IRS-Assisted FSO-RF Communication System with H-ARQ Protocols

    Authors: Gyan Deep Verma, Aashish Mathur, Yun Ai, Michael Cheffena

    Abstract: Intelligent reflecting surface (IRS) is an emerging key technology for the fifth-generation (5G) and beyond wireless communication systems to provide more robust and reliable communication links. In this paper, we propose a mixed dual-hop free-space optical (FSO)-radio frequency (RF) communication system that serves the end user via a decode-and-forward (DF) relay employing hybrid automatic repeat… ▽ More

    Submitted 20 August, 2021; originally announced November 2021.

    Comments: 5 pages, 6 figures

  31. arXiv:2109.06992  [pdf, other

    cs.IT eess.SP

    ML-aided power allocation for Tactical MIMO

    Authors: Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of optimal power allocation in single-hop multi-antenna ad-hoc wireless networks. A standard technique to solve this problem involves optimizing a tri-convex function under power constraints using a block-coordinate-descent based iterative algorithm. This approach, termed WMMSE, tends to be computationally complex and time consuming. Several learning-based approaches have been… ▽ More

    Submitted 28 October, 2021; v1 submitted 14 September, 2021; originally announced September 2021.

    Comments: Accepted at MILCOM 2021

  32. arXiv:2109.06072   

    cs.IR cs.MM

    BeautifAI -- A Personalised Occasion-oriented Makeup Recommendation System

    Authors: Kshitij Gulati, Gaurav Verma, Mukesh Mohania, Ashish Kundu

    Abstract: With the global metamorphosis of the beauty industry and the rising demand for beauty products worldwide, the need for an efficacious makeup recommendation system has never been more. Despite the significant advancements made towards personalised makeup recommendation, the current research still falls short of incorporating the context of occasion in makeup recommendation and integrating feedback… ▽ More

    Submitted 28 March, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: Withdrawing due to issues with training the Makeup Style Transfer (section about style transfer). This renders the current methodology invalid

  33. Link Scheduling using Graph Neural Networks

    Authors: Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: Efficient scheduling of transmissions is a key problem in wireless networks. The main challenge stems from the fact that optimal link scheduling involves solving a maximum weighted independent set (MWIS) problem, which is known to be NP-hard. In practical schedulers, centralized and distributed greedy heuristics are commonly used to approximately solve the MWIS problem. However, most of these gree… ▽ More

    Submitted 14 November, 2022; v1 submitted 12 September, 2021; originally announced September 2021.

    Comments: Main: 15 pages, 12 figures. Supplement: 5 pages, 7 figures. Accepted to IEEE Transactions on Wireless Communications. arXiv admin note: text overlap with arXiv:2011.09430

    MSC Class: 05-08 ACM Class: C.2.1

    Journal ref: IEEE Transactions on Wireless Communications ( Volume: 22, Issue: 6, June 2023), Page(s): 3997 - 4012

  34. arXiv:2101.11836  [pdf, other

    cs.CL cs.AI cs.LG

    DRAG: Director-Generator Language Modelling Framework for Non-Parallel Author Stylized Rewriting

    Authors: Hrituraj Singh, Gaurav Verma, Aparna Garimella, Balaji Vasan Srinivasan

    Abstract: Author stylized rewriting is the task of rewriting an input text in a particular author's style. Recent works in this area have leveraged Transformer-based language models in a denoising autoencoder setup to generate author stylized text without relying on a parallel corpus of data. However, these approaches are limited by the lack of explicit control of target attributes and being entirely data-d… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: Accepted as Long Paper to EACL 2021

  35. arXiv:2012.02250  [pdf, other

    eess.SP cs.LG

    Efficient power allocation using graph neural networks and deep algorithm unfolding

    Authors: Arindam Chowdhury, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of optimal power allocation in a single-hop ad hoc wireless network. In solving this problem, we propose a hybrid neural architecture inspired by the algorithmic unfolding of the iterative weighted minimum mean squared error (WMMSE) method, that we denote as unfolded WMMSE (UWMMSE). The learnable weights within UWMMSE are parameterized using graph neural networks (GNNs), where… ▽ More

    Submitted 18 November, 2020; originally announced December 2020.

    Comments: Under review at IEEE ICASSP 2021. arXiv admin note: substantial text overlap with arXiv:2009.10812

  36. arXiv:2011.09430  [pdf, other

    eess.SP cs.LG

    Distributed Scheduling using Graph Neural Networks

    Authors: Zhongyuan Zhao, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: A fundamental problem in the design of wireless networks is to efficiently schedule transmission in a distributed manner. The main challenge stems from the fact that optimal link scheduling involves solving a maximum weighted independent set (MWIS) problem, which is NP-hard. For practical link scheduling schemes, distributed greedy approaches are commonly used to approximate the solution of the MW… ▽ More

    Submitted 6 February, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 5 pages, 6 figures, accepted to IEEE ICASSP 2021

    MSC Class: 05-08 ACM Class: C.2.1

  37. arXiv:2011.09418  [pdf, other

    eess.SP cs.LG

    Adaptive Contention Window Design using Deep Q-learning

    Authors: Abhishek Kumar, Gunjan Verma, Chirag Rao, Ananthram Swami, Santiago Segarra

    Abstract: We study the problem of adaptive contention window (CW) design for random-access wireless networks. More precisely, our goal is to design an intelligent node that can dynamically adapt its minimum CW (MCW) parameter to maximize a network-level utility knowing neither the MCWs of other nodes nor how these change over time. To achieve this goal, we adopt a reinforcement learning (RL) framework where… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

  38. arXiv:2011.01183  [pdf, other

    cs.CR cs.LG

    Adversarial Examples in Constrained Domains

    Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel

    Abstract: Machine learning algorithms have been shown to be vulnerable to adversarial manipulation through systematic modification of inputs (e.g., adversarial examples) in domains such as image recognition. Under the default threat model, the adversary exploits the unconstrained nature of images; each feature (pixel) is fully under control of the adversary. However, it is not clear how these attacks transl… ▽ More

    Submitted 9 September, 2022; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted to IOS Press Journal of Computer Security

  39. arXiv:2010.11553  [pdf, other

    cs.CL

    Incorporating Stylistic Lexical Preferences in Generative Language Models

    Authors: Hrituraj Singh, Gaurav Verma, Balaji Vasan Srinivasan

    Abstract: While recent advances in language modeling have resulted in powerful generation models, their generation style remains implicitly dependent on the training data and can not emulate a specific target style. Leveraging the generative capabilities of a transformer-based language models, we present an approach to induce certain target-author attributes by incorporating continuous multi-dimensional lex… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: To Appear in Findings of EMNLP 2020

  40. arXiv:2009.03849  [pdf, other

    cs.CL cs.SI

    LynyrdSkynyrd at WNUT-2020 Task 2: Semi-Supervised Learning for Identification of Informative COVID-19 English Tweets

    Authors: Abhilasha Sancheti, Kushal Chawla, Gaurav Verma

    Abstract: We describe our system for WNUT-2020 shared task on the identification of informative COVID-19 English tweets. Our system is an ensemble of various machine learning methods, leveraging both traditional feature-based classifiers as well as recent advances in pre-trained language models that help in capturing the syntactic, semantic, and contextual features from the tweets. We further employ pseudo-… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    ACM Class: I.2.7

  41. arXiv:2006.03256  [pdf, other

    cs.CL cs.SI

    "To Target or Not to Target": Identification and Analysis of Abusive Text Using Ensemble of Classifiers

    Authors: Gaurav Verma, Niyati Chhaya, Vishwa Vinay

    Abstract: With rising concern around abusive and hateful behavior on social media platforms, we present an ensemble learning method to identify and analyze the linguistic properties of such content. Our stacked ensemble comprises of three machine learning models that capture different aspects of language and provide diverse and coherent insights about inappropriate language. The proposed approach provides c… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Comments: In ICWSM'20 Safety Data Challenge

  42. arXiv:2003.00708  [pdf, other

    cs.IR cs.AI

    Using Image Captions and Multitask Learning for Recommending Query Reformulations

    Authors: Gaurav Verma, Vishwa Vinay, Sahil Bansal, Shashank Oberoi, Makkunda Sharma, Prakhar Gupta

    Abstract: Interactive search sessions often contain multiple queries, where the user submits a reformulated version of the previous query in response to the original results. We aim to enhance the query recommendation experience for a commercial image search engine. Our proposed methodology incorporates current state-of-the-art practices from relevant literature -- the use of generation-based sequence-to-se… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.

    Comments: Accepted as a full paper at ECIR 2020

  43. arXiv:2002.04244  [pdf, other

    cs.NI cs.CC

    Rapid Top-Down Synthesis of Large-Scale IoT Networks

    Authors: Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof, Marcos Vieira, Kevin Chan, Ramesh Govindan, Gaurav Sukhatme, Paulo Tabuada, Gunjan Verma

    Abstract: Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constrai… ▽ More

    Submitted 27 March, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

  44. arXiv:1910.11451  [pdf, other

    math.OC cs.IT

    Information Flow Optimization in Inference Networks

    Authors: Aditya Deshmukh, **g Liu, Venugopal V. Veeravalli, Gunjan Verma

    Abstract: The problem of maximizing the information flow through a sensor network tasked with an inference objective at the fusion center is considered. The sensor nodes take observations, compress and send them to the fusion center through a network of relays. The network imposes capacity constraints on the rate of transmission in each connection and flow conservation constraints. It is shown that this rat… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

  45. arXiv:1909.09962  [pdf, other

    cs.CL cs.LG

    Adapting Language Models for Non-Parallel Author-Stylized Rewriting

    Authors: Bakhtiyar Syed, Gaurav Verma, Balaji Vasan Srinivasan, Anandhavelu Natarajan, Vasudeva Varma

    Abstract: Given the recent progress in language modeling using Transformer-based neural models and an active interest in generating stylized text, we present an approach to leverage the generalization capabilities of a language model to rewrite an input text in a target author's style. Our proposed approach adapts a pre-trained language model to generate author-stylized text by fine-tuning on the author-spe… ▽ More

    Submitted 31 October, 2020; v1 submitted 22 September, 2019; originally announced September 2019.

    Comments: Accepted for publication in Main Technical Track at AAAI 20

  46. arXiv:1909.08349  [pdf, other

    cs.CL cs.LG

    A Lexical, Syntactic, and Semantic Perspective for Understanding Style in Text

    Authors: Gaurav Verma, Balaji Vasan Srinivasan

    Abstract: With a growing interest in modeling inherent subjectivity in natural language, we present a linguistically-motivated process to understand and analyze the writing style of individuals from three perspectives: lexical, syntactic, and semantic. We discuss the stylistically expressive elements within each of these levels and use existing methods to quantify the linguistic intuitions related to some o… ▽ More

    Submitted 18 September, 2019; originally announced September 2019.

  47. arXiv:1906.08973  [pdf, other

    cs.HC cs.IR

    Stuck? No worries!: Task-aware Command Recommendation and Proactive Help for Analysts

    Authors: Aadhavan M. Nambhi, Bhanu Prakash Reddy, Aarsh Prakash Agarwal, Gaurav Verma, Harvineet Singh, Iftikhar Ahamath Burhanuddin

    Abstract: Data analytics software applications have become an integral part of the decision-making process of analysts. Users of such a software face challenges due to insufficient product and domain knowledge, and find themselves in need of help. To alleviate this, we propose a task-aware command recommendation system, to guide the user on what commands could be executed next. We rely on topic modeling tec… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: 27th Conference on User Modeling, Adaptation and Personalization (UMAP'19)

  48. arXiv:1904.00150  [pdf, other

    cs.MM cs.LG cs.SD eess.AS

    Learning Affective Correspondence between Music and Image

    Authors: Gaurav Verma, Eeshan Gunesh Dhekane, Tanaya Guha

    Abstract: We introduce the problem of learning affective correspondence between audio (music) and visual data (images). For this task, a music clip and an image are considered similar (having true correspondence) if they have similar emotion content. In order to estimate this crossmodal, emotion-centric similarity, we propose a deep neural network architecture that learns to project the data from the two mo… ▽ More

    Submitted 16 April, 2019; v1 submitted 30 March, 2019; originally announced April 2019.

    Comments: 5 pages, International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2019

  49. arXiv:1903.05821  [pdf, other

    cs.LG stat.ML

    Attribution-driven Causal Analysis for Detection of Adversarial Examples

    Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami

    Abstract: Attribution methods have been developed to explain the decision of a machine learning model on a given input. We use the Integrated Gradient method for finding attributions to define the causal neighborhood of an input by incrementally masking high attribution features. We study the robustness of machine learning models on benign and adversarial inputs in this neighborhood. Our study indicates tha… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 11 pages, 6 figures

  50. arXiv:1404.1743  [pdf

    cs.NI

    Analysis, Review and Optimization of SONET/SDH Technology for today and future aspects

    Authors: Gourav Verma, Deepika Ramaiya

    Abstract: Network layers are analyzed for their design and issues of researches, while dense wavelength division multiplexing equipment has been deployed in networks of major telecommunications carriers for a long time, the efficiency of networking and relation with network control and management have not caught up to those of digital cross-connect systems and packet-switched counterparts in higher layer ne… ▽ More

    Submitted 7 April, 2014; originally announced April 2014.

    Journal ref: International Journal of Advanced Studies in Computer Science & Engineering IJASCSE, Volume 3, Issue 3, 2014