Zum Hauptinhalt springen

Showing 1–50 of 64 results for author: Aggarwal, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04585  [pdf, other

    cs.CL cs.AI cs.LG

    PoPE: Legendre Orthogonal Polynomials Based Position Encoding for Large Language Models

    Authors: Arpit Aggarwal

    Abstract: There are several improvements proposed over the baseline Absolute Positional Encoding (APE) method used in original transformer. In this study, we aim to investigate the implications of inadequately representing positional encoding in higher dimensions on crucial aspects of the attention mechanism, the model's capacity to learn relative positional information, and the convergence of models, all s… ▽ More

    Submitted 29 April, 2024; originally announced May 2024.

  2. arXiv:2312.07627  [pdf

    cs.CV cs.LG cs.SI

    Multimodal Sentiment Analysis: Perceived vs Induced Sentiments

    Authors: Aditi Aggarwal, Deepika Varshney, Saurabh Patel

    Abstract: Social media has created a global network where people can easily access and exchange vast information. This information gives rise to a variety of opinions, reflecting both positive and negative viewpoints. GIFs stand out as a multimedia format offering a visually engaging way for users to communicate. In this research, we propose a multimodal framework that integrates visual and textual features… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  3. arXiv:2312.06129  [pdf, other

    cs.RO

    Household navigation and manipulation for everyday object rearrangement tasks

    Authors: Shrutheesh R. Iyer, Anwesan Pal, Jiaming Hu, Akanimoh Adeleye, Aditya Aggarwal, Henrik I. Christensen

    Abstract: We consider the problem of building an assistive robotic system that can help humans in daily household cleanup tasks. Creating such an autonomous system in real-world environments is inherently quite challenging, as a general solution may not suit the preferences of a particular customer. Moreover, such a system consists of multi-objective tasks comprising -- (i) Detection of misplaced objects an… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: Paper accepted at IEEE IRC-2023

  4. arXiv:2311.18426  [pdf, other

    math.OC cs.LG math.NA

    Convergence Analysis of Fractional Gradient Descent

    Authors: Ashwani Aggarwal

    Abstract: Fractional derivatives are a well-studied generalization of integer order derivatives. Naturally, for optimization, it is of interest to understand the convergence properties of gradient descent using fractional derivatives. Convergence analysis of fractional gradient descent is currently limited both in the methods analyzed and the settings analyzed. This paper aims to fill in these gaps by analy… ▽ More

    Submitted 4 June, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

    Comments: 27 pages, 4 figures. Published in Transactions on Machine Learning Research

    ACM Class: G.1.6

  5. arXiv:2308.02748  [pdf

    cs.CV

    Discrimination of Radiologists Utilizing Eye-Tracking Technology and Machine Learning: A Case Study

    Authors: Stanford Martinez, Carolina Ramirez-Tamayo, Syed Hasib Akhter Faruqui, Kal L. Clark, Adel Alaeddini, Nicholas Czarnek, Aarushi Aggarwal, Sahra Emamzadeh, Jeffrey R. Mock, Edward J. Golob

    Abstract: Perception-related errors comprise most diagnostic mistakes in radiology. To mitigate this problem, radiologists employ personalized and high-dimensional visual search strategies, otherwise known as search patterns. Qualitative descriptions of these search patterns, which involve the physician verbalizing or annotating the order he/she analyzes the image, can be unreliable due to discrepancies in… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: Submitting for Review in "IEEE Journal of Biomedical and Health Informatics"

  6. arXiv:2306.15174  [pdf, other

    cs.NI

    Examining Lower Latency Routing with Overlay Networks

    Authors: Aakriti Kedia, Akhilan Ganesh, Aman Aggarwal

    Abstract: In today's rapidly expanding digital landscape, where access to timely online content is paramount to users, the underlying network infrastructure and latency performance significantly influence the user experience. We present an empirical study of the current Internet's connectivity and the achievable latencies to propose better routing paths if available. Understanding the severity of the non-op… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  7. arXiv:2305.06394  [pdf, other

    cs.CV cs.RO

    Local Region-to-Region Mapping-based Approach to Classify Articulated Objects

    Authors: Ayush Aggarwal, Rustam Stolkin, Naresh Marturi

    Abstract: Autonomous robots operating in real-world environments encounter a variety of objects that can be both rigid and articulated in nature. Having knowledge of these specific object properties not only helps in designing appropriate manipulation strategies but also aids in developing reliable tracking and pose estimation techniques for many robotic and vision applications. In this context, this paper… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: 7 pages, 4 figures, Conference on Robots and Vision, Articulated Object Classification

  8. arXiv:2305.03546  [pdf, other

    eess.IV cs.CV

    Breast Cancer Immunohistochemical Image Generation: a Benchmark Dataset and Challenge Review

    Authors: Chuang Zhu, Shengjie Liu, Zekuan Yu, Feng Xu, Arpit Aggarwal, Germán Corredor, Anant Madabhushi, Qixun Qu, Hongwei Fan, Fangda Li, Yueheng Li, Xianchao Guan, Yongbing Zhang, Vivek Kumar Singh, Farhan Akram, Md. Mostafa Kamal Sarker, Zhongyue Shi, Mulan Jin

    Abstract: For invasive breast cancer, immunohistochemical (IHC) techniques are often used to detect the expression level of human epidermal growth factor receptor-2 (HER2) in breast tissue to formulate a precise treatment plan. From the perspective of saving manpower, material and time costs, directly generating IHC-stained images from Hematoxylin and Eosin (H&E) stained images is a valuable research direct… ▽ More

    Submitted 22 September, 2023; v1 submitted 5 May, 2023; originally announced May 2023.

    Comments: 12 pages, 12 figures, 2tables

  9. arXiv:2302.03800  [pdf, other

    cs.AI

    MACOptions: Multi-Agent Learning with Centralized Controller and Options Framework

    Authors: Alakh Aggarwal, Rishita Bansal, Parth Padalkar, Sriraam Natarajan

    Abstract: These days automation is being applied everywhere. In every environment, planning for the actions to be taken by the agents is an important aspect. In this paper, we plan to implement planning for multi-agents with a centralized controller. We compare three approaches: random policy, Q-learning, and Q-learning with Options Framework. We also show the effectiveness of planners by showing performanc… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  10. arXiv:2212.01700  [pdf, other

    cs.CL

    Towards Robust NLG Bias Evaluation with Syntactically-diverse Prompts

    Authors: Arshiya Aggarwal, Jiao Sun, Nanyun Peng

    Abstract: We present a robust methodology for evaluating biases in natural language generation(NLG) systems. Previous works use fixed hand-crafted prefix templates with mentions of various demographic groups to prompt models to generate continuations for bias analysis. These fixed prefix templates could themselves be specific in terms of styles or linguistic structures, which may lead to unreliable fairness… ▽ More

    Submitted 3 December, 2022; originally announced December 2022.

    Comments: EMNLP Findings 2022

  11. arXiv:2211.11931  [pdf, other

    cs.CV cs.GR

    Layered-Garment Net: Generating Multiple Implicit Garment Layers from a Single Image

    Authors: Alakh Aggarwal, Jikai Wang, Steven Hogue, Saifeng Ni, Madhukar Budagavi, Xiaohu Guo

    Abstract: Recent research works have focused on generating human models and garments from their 2D images. However, state-of-the-art researches focus either on only a single layer of the garment on a human model or on generating multiple garment layers without any guarantee of the intersection-free geometric relationship between them. In reality, people wear multiple layers of garments in their daily life,… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: 16th Asian Conference on Computer Vision (ACCV2022)

  12. arXiv:2210.00868  [pdf, other

    cs.CE math.NA physics.bio-ph q-bio.TO

    Strain energy density as a Gaussian process and its utilization in stochastic finite element analysis: application to planar soft tissues

    Authors: Ankush Aggarwal, Bjørn Sand Jensen, Sanjay Pant, Chung-Hao Lee

    Abstract: Data-based approaches are promising alternatives to the traditional analytical constitutive models for solid mechanics. Herein, we propose a Gaussian process (GP) based constitutive modeling framework, specifically focusing on planar, hyperelastic and incompressible soft tissues. The strain energy density of soft tissues is modeled as a GP, which can be regressed to experimental stress-strain data… ▽ More

    Submitted 22 November, 2022; v1 submitted 28 September, 2022; originally announced October 2022.

  13. arXiv:2209.02941  [pdf, other

    cs.CV

    Can GAN-induced Attribute Manipulations Impact Face Recognition?

    Authors: Sudipta Banerjee, Aditi Aggarwal, Arun Ross

    Abstract: Impact due to demographic factors such as age, sex, race, etc., has been studied extensively in automated face recognition systems. However, the impact of \textit{digitally modified} demographic and facial attributes on face recognition is relatively under-explored. In this work, we study the effect of attribute manipulations induced via generative adversarial networks (GANs) on face recognition p… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  14. arXiv:2208.05552  [pdf, other

    cs.HC cs.CV

    Towards Automating Retinoscopy for Refractive Error Diagnosis

    Authors: Aditya Aggarwal, Siddhartha Gairola, Uddeshya Upadhyay, Akshay P Vasishta, Diwakar Rao, Aditya Goyal, Kaushik Murali, Nipun Kwatra, Mohit Jain

    Abstract: Refractive error is the most common eye disorder and is the key cause behind correctable visual impairment, responsible for nearly 80% of the visual impairment in the US. Refractive error can be diagnosed using multiple methods, including subjective refraction, retinoscopy, and autorefractors. Although subjective refraction is the gold standard, it requires cooperation from the patient and hence i… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: This paper is accepted for publication in IMWUT 2022

  15. arXiv:2205.06249  [pdf, ps, other

    cs.CC cs.DS math.CA

    Optimal-Degree Polynomial Approximations for Exponentials and Gaussian Kernel Density Estimation

    Authors: Amol Aggarwal, Josh Alman

    Abstract: For any real numbers $B \ge 1$ and $δ\in (0, 1)$ and function $f: [0, B] \rightarrow \mathbb{R}$, let $d_{B; δ} (f) \in \mathbb{Z}_{> 0}$ denote the minimum degree of a polynomial $p(x)$ satisfying $\sup_{x \in [0, B]} \big| p(x) - f(x) \big| < δ$. In this paper, we provide precise asymptotics for $d_{B; δ} (e^{-x})$ and $d_{B; δ} (e^{x})$ in terms of both $B$ and $δ$, improving both the previousl… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Comments: 27 pages, to appear in the 37th Computational Complexity Conference (CCC 2022)

  16. arXiv:2205.04731  [pdf, other

    cs.AI cs.LG

    Explainable Data Imputation using Constraints

    Authors: Sandeep Hans, Diptikalyan Saha, Aniya Aggarwal

    Abstract: Data values in a dataset can be missing or anomalous due to mishandling or human error. Analysing data with missing values can create bias and affect the inferences. Several analysis methods, such as principle components analysis or singular value decomposition, require complete data. Many approaches impute numeric data and some do not consider dependency of attributes on other attributes, while s… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  17. arXiv:2111.02161  [pdf, other

    cs.LG cs.AI

    Data Synthesis for Testing Black-Box Machine Learning Models

    Authors: Diptikalyan Saha, Aniya Aggarwal, Sandeep Hans

    Abstract: The increasing usage of machine learning models raises the question of the reliability of these models. The current practice of testing with limited data is often insufficient. In this paper, we provide a framework for automated test data synthesis to test black-box ML/DL models. We address an important challenge of generating realistic user-controllable data with model agnostic coverage criteria… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: Accepted as a 4-pages short paper in Research track at CODS-COMAD 2022

  18. arXiv:2108.05935  [pdf, other

    cs.LG

    Data Quality Toolkit: Automatic assessment of data quality and remediation for machine learning datasets

    Authors: Nitin Gupta, Hima Patel, Shazia Afzal, Naveen Panwar, Ruhi Sharma Mittal, Shanmukha Guttula, Abhinav Jain, Lokesh Nagalapatti, Sameep Mehta, Sandeep Hans, Pranay Lohia, Aniya Aggarwal, Diptikalyan Saha

    Abstract: The quality of training data has a huge impact on the efficiency, accuracy and complexity of machine learning tasks. Various tools and techniques are available that assess data quality with respect to general cleaning and profiling checks. However these techniques are not applicable to detect data issues in the context of machine learning tasks, like noisy labels, existence of overlapping classes… ▽ More

    Submitted 5 September, 2021; v1 submitted 12 August, 2021; originally announced August 2021.

  19. arXiv:2107.03022  [pdf, other

    cs.LG

    Reconstructing Test Labels from Noisy Loss Functions

    Authors: Abhinav Aggarwal, Shiva Prasad Kasiviswanathan, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Machine learning classifiers rely on loss functions for performance evaluation, often on a private (hidden) dataset. In a recent line of research, label inference was introduced as the problem of reconstructing the ground truth labels of this private dataset from just the (possibly perturbed) cross-entropy loss function values evaluated at chosen prediction vectors (without any other access to the… ▽ More

    Submitted 30 October, 2021; v1 submitted 7 July, 2021; originally announced July 2021.

    Comments: Accepted at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML)

  20. arXiv:2105.08266  [pdf, other

    cs.LG

    Label Inference Attacks from Log-loss Scores

    Authors: Abhinav Aggarwal, Shiva Prasad Kasiviswanathan, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Log-loss (also known as cross-entropy loss) metric is ubiquitously used across machine learning applications to assess the performance of classification algorithms. In this paper, we investigate the problem of inferring the labels of a dataset from single (or multiple) log-loss score(s), without any other access to the dataset. Surprisingly, we show that for any finite number of label classes, it… ▽ More

    Submitted 11 June, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted at ICML 2021

  21. arXiv:2105.02743  [pdf, other

    quant-ph cs.IT math-ph

    Random density matrices: Analytical results for mean root fidelity and mean square Bures distance

    Authors: Aritra Laha, Agrim Aggarwal, Santosh Kumar

    Abstract: Bures distance holds a special place among various distance measures due to its several distinguished features and finds applications in diverse problems in quantum information theory. It is related to fidelity and, among other things, it serves as a bona fide measure for quantifying the separability of quantum states. In this work, we calculate exact analytical results for the mean root fidelity… ▽ More

    Submitted 18 November, 2022; v1 submitted 6 May, 2021; originally announced May 2021.

    Comments: 13 pages, 10 figures ; Published Version

    MSC Class: 94A15; 62B10; 81P47; 60B20; 15B52

    Journal ref: Phys. Rev. A 104, 022438 (2021)

  22. arXiv:2104.11838  [pdf, other

    cs.CL

    On a Utilitarian Approach to Privacy Preserving Text Generation

    Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Differentially-private mechanisms for text generation typically add carefully calibrated noise to input words and use the nearest neighbor to the noised input as the output word. When the noise is small in magnitude, these mechanisms are susceptible to reconstruction of the original sensitive text. This is because the nearest neighbor to the noised input is likely to be the original input. To miti… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 10 pages, 3 figures

  23. arXiv:2102.09943  [pdf, other

    cs.CL

    Towards Emotion Recognition in Hindi-English Code-Mixed Data: A Transformer Based Approach

    Authors: Anshul Wadhawan, Akshita Aggarwal

    Abstract: In the last few years, emotion detection in social-media text has become a popular problem due to its wide ranging application in better understanding the consumers, in psychology, in aiding human interaction with computers, designing smart systems etc. Because of the availability of huge amounts of data from social-media, which is regularly used for expressing sentiments and opinions, this proble… ▽ More

    Submitted 28 February, 2021; v1 submitted 19 February, 2021; originally announced February 2021.

  24. arXiv:2102.06166  [pdf, other

    cs.LG cs.AI

    Testing Framework for Black-box AI Models

    Authors: Aniya Aggarwal, Samiulla Shaikh, Sandeep Hans, Swastik Haldar, Rema Ananthanarayanan, Diptikalyan Saha

    Abstract: With widespread adoption of AI models for important decision making, ensuring reliability of such models remains an important challenge. In this paper, we present an end-to-end generic framework for testing AI Models which performs automated test generation for different modalities such as text, tabular, and time-series data and across various properties such as accuracy, fairness, and robustness.… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: 4 pages Demonstrations track paper accepted at ICSE 2021

  25. arXiv:2012.05403  [pdf, other

    cs.LG cs.CL cs.CR

    Research Challenges in Designing Differentially Private Text Generation Mechanisms

    Authors: Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier

    Abstract: Accurately learning from user data while ensuring quantifiable privacy guarantees provides an opportunity to build better Machine Learning (ML) models while maintaining user trust. Recent literature has demonstrated the applicability of a generalized form of Differential Privacy to provide guarantees over text queries. Such mechanisms add privacy preserving noise to vectorial representations of te… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: 14 pages, 1 figure

  26. arXiv:2010.11947  [pdf, other

    cs.CL cs.CR cs.LG stat.ML

    A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

    Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Balancing the privacy-utility tradeoff is a crucial requirement of many practical machine learning systems that deal with sensitive customer data. A popular approach for privacy-preserving text analysis is noise injection, in which text data is first mapped into a continuous embedding space, perturbed by sampling a spherical noise from an appropriate distribution, and then projected back to the di… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: 11 pages, 7 figures

  27. "Did you really mean what you said?" : Sarcasm Detection in Hindi-English Code-Mixed Data using Bilingual Word Embeddings

    Authors: Akshita Aggarwal, Anshul Wadhawan, Anshima Chaudhary, Kavita Maurya

    Abstract: With the increased use of social media platforms by people across the world, many new interesting NLP problems have come into existence. One such being the detection of sarcasm in the social media texts. We present a corpus of tweets for training custom word embeddings and a Hinglish dataset labelled for sarcasm detection. We propose a deep learning based approach to address the issue of sarcasm d… ▽ More

    Submitted 15 October, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

  28. arXiv:2009.12718  [pdf, other

    cs.LG cs.CR stat.ML

    Differentially Private Adversarial Robustness Through Randomized Perturbations

    Authors: Nan Xu, Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier

    Abstract: Deep Neural Networks, despite their great success in diverse domains, are provably sensitive to small perturbations on correctly classified examples and lead to erroneous predictions. Recently, it was proposed that this behavior can be combatted by optimizing the worst case loss function over all possible substitutions of training examples. However, this can be prone to weighing unlikely substitut… ▽ More

    Submitted 26 September, 2020; originally announced September 2020.

  29. arXiv:2009.08559  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On Primes, Log-Loss Scores and (No) Privacy

    Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier

    Abstract: Membership Inference Attacks exploit the vulnerabilities of exposing models trained on customer data to queries by an adversary. In a recently proposed implementation of an auditing tool for measuring privacy leakage from sensitive datasets, more refined aggregates like the Log-Loss scores are exposed for simulating inference attacks as well as to assess the total privacy leakage based on the adve… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

  30. arXiv:2009.00156  [pdf, other

    cs.DC cs.RO eess.SP

    LoCUS: A multi-robot loss-tolerant algorithm for surveying volcanic plumes

    Authors: John Erickson, Abhinav Aggarwal, G. Matthew Fricke, Melanie E. Moses

    Abstract: Measurement of volcanic CO2 flux by a drone swarm poses special challenges. Drones must be able to follow gas concentration gradients while tolerating frequent drone loss. We present the LoCUS algorithm as a solution to this problem and prove its robustness. LoCUS relies on swarm coordination and self-healing to solve the task. As a point of contrast we also implement the MoBS algorithm, derived f… ▽ More

    Submitted 31 August, 2020; originally announced September 2020.

    Comments: Accepted to IRC 2020 (8 pages, 7 figures)

  31. arXiv:2007.12934  [pdf, other

    cs.CR cs.LG stat.ML

    SOTERIA: In Search of Efficient Neural Networks for Private Inference

    Authors: Anshul Aggarwal, Trevor E. Carlson, Reza Shokri, Shruti Tople

    Abstract: ML-as-a-service is gaining popularity where a cloud server hosts a trained model and offers prediction (inference) service to users. In this setting, our objective is to protect the confidentiality of both the users' input queries as well as the model parameters at the server, with modest computation and communication overhead. Prior solutions primarily propose fine-tuning cryptographic methods to… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  32. arXiv:2007.02072  [pdf, other

    cs.CV cs.GR cs.MM

    Quo Vadis, Skeleton Action Recognition ?

    Authors: Pranay Gupta, Anirudh Thatipelli, Aditya Aggarwal, Shubh Maheshwari, Neel Trivedi, Sourav Das, Ravi Kiran Sarvadevabhatla

    Abstract: In this paper, we study current and upcoming frontiers across the landscape of skeleton-based human action recognition. To study skeleton-action recognition in the wild, we introduce Skeletics-152, a curated and 3-D pose-annotated subset of RGB videos sourced from Kinetics-700, a large-scale action dataset. We extend our study to include out-of-context actions by introducing Skeleton-Mimetics, a d… ▽ More

    Submitted 7 April, 2021; v1 submitted 4 July, 2020; originally announced July 2020.

    Comments: To appear in International Journal of Computer Vision (IJCV). Project page: https://skeleton.iiit.ac.in/

  33. arXiv:2004.12232  [pdf, other

    cs.CV cs.RO eess.IV

    Reconstruct, Rasterize and Backprop: Dense shape and pose estimation from a single image

    Authors: Aniket Pokale, Aditya Aggarwal, K. Madhava Krishna

    Abstract: This paper presents a new system to obtain dense object reconstructions along with 6-DoF poses from a single image. Geared towards high fidelity reconstruction, several recent approaches leverage implicit surface representations and deep neural networks to estimate a 3D mesh of an object, given a single image. However, all such approaches recover only the shape of an object; the reconstruction is… ▽ More

    Submitted 25 April, 2020; originally announced April 2020.

    Comments: 8 pages, 5 figures, 2 tables

  34. arXiv:2004.05865  [pdf, other

    cs.SI cs.LG

    Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews

    Authors: Viresh Gupta, Aayush Aggarwal, Tanmoy Chakraborty

    Abstract: Online marketplaces often witness opinion spam in the form of reviews. People are often hired to target specific brands for promoting or impeding them by writing highly positive or negative reviews. This often is done collectively in groups. Although some previous studies attempted to identify and analyze such opinion spam groups, little has been explored to spot those groups who target a brand as… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: 6 figures, 5 tables, Accepted in IEEE Transactions on Computational Social Systems

  35. Hiding Data in Images Using Cryptography and Deep Neural Network

    Authors: Kartik Sharma, Ashutosh Aggarwal, Tanay Singhania, Deepak Gupta, Ashish Khanna

    Abstract: Steganography is an art of obscuring data inside another quotidian file of similar or varying types. Hiding data has always been of significant importance to digital forensics. Previously, steganography has been combined with cryptography and neural networks separately. Whereas, this research combines steganography, cryptography with the neural networks all together to hide an image inside another… ▽ More

    Submitted 1 January, 2020; v1 submitted 22 December, 2019; originally announced December 2019.

    Comments: 20 pages, 9 figures, 5 tables

  36. arXiv:1911.11974  [pdf, other

    cs.DC

    On the Minimal Set of Inputs Required for Efficient Neuro-Evolved Foraging

    Authors: John Erickson, Abhinav Aggarwal, Melanie E. Moses

    Abstract: In this paper, we perform an ablation study of \neatfa, a neuro-evolved foraging algorithm that has recently been shown to forage efficiently under different resource distributions. Through selective disabling of input signals, we identify a \emph{sufficiently} minimal set of input features that contribute the most towards determining search trajectories which favor high resource collection rates.… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

    Comments: Presented at BDA 2019 (Colocated with PODC 2019)

  37. arXiv:1911.11973  [pdf, other

    cs.DC

    A Most Irrational Foraging Algorithm

    Authors: Abhinav Aggarwal, William F. Vining, Diksha Gupta, Jared Saia, Melanie E. Moses

    Abstract: We present a foraging algorithm, GoldenFA, in which search direction is chosen based on the Golden Ratio. We show both theoretically and empirically that GoldenFA is more efficient for a single searcher than a comparable algorithm where search direction is chosen uniformly at random. Moreover, we give a variant of our algorithm that parallelizes linearly with the number of searchers.

    Submitted 27 November, 2019; originally announced November 2019.

    Comments: Presented at BDA 2019 (co-located with PODC 2019)

  38. arXiv:1909.09771  [pdf, ps, other

    cs.DC cs.MS math.NA

    Multithreaded Filtering Preconditioner for Diffusion Equation on Structured Grid

    Authors: Abhinav Aggarwal, Shivam Kakkar, Pawan Kumar

    Abstract: A parallel and nested version of a frequency filtering preconditioner is proposed for linear systems corresponding to diffusion equation on a structured grid. The proposed preconditioner is found to be robust with respect to jumps in the diffusion coefficients. The storage requirement for the preconditioner is O(N),where N is number of rows of matrix, hence, a fairly large problem of size more tha… ▽ More

    Submitted 20 September, 2021; v1 submitted 21 September, 2019; originally announced September 2019.

    Comments: 9 pages

  39. Broad Neural Network for Change Detection in Aerial Images

    Authors: Shailesh Shrivastava, Alakh Aggarwal, Pratik Chattopadhyay

    Abstract: A change detection system takes as input two images of a region captured at two different times, and predicts which pixels in the region have undergone change over the time period. Since pixel-based analysis can be erroneous due to noise, illumination difference and other factors, contextual information is usually used to determine the class of a pixel (changed or not). This contextual information… ▽ More

    Submitted 20 July, 2019; v1 submitted 28 February, 2019; originally announced March 2019.

    Comments: $\textbf{Accepted at}$: IEMGraph (International Conference on Emerging Technology in Modelling and Graphics) 2018 $$ $$ $\textbf{Date of Conference}$: 6-7 September, 2018 $$ $$ $\textbf{Location of Conference}$: Kolkatta, India

    Journal ref: Advances in Intelligent Systems and Computing book series (AISC, volume 937), Springer, Singapore, 2019

  40. arXiv:1808.02113  [pdf, other

    cs.LG cs.CL stat.ML

    Paying Attention to Attention: Highlighting Influential Samples in Sequential Analysis

    Authors: Cynthia Freeman, Jonathan Merriman, Abhinav Aggarwal, Ian Beaver, Abdullah Mueen

    Abstract: In (Yang et al. 2016), a hierarchical attention network (HAN) is created for document classification. The attention layer can be used to visualize text influential in classifying the document, thereby explaining the model's prediction. We successfully applied HAN to a sequential analysis task in the form of real-time monitoring of turn taking in conversations. However, we discovered instances wher… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

  41. arXiv:1802.03625  [pdf, other

    cs.SI

    The Follower Count Fallacy: Detecting Twitter Users with Manipulated Follower Count

    Authors: Anupama Aggarwal, Saravana Kumar, Kushagra Bhargava, Ponnurangam Kumaraguru

    Abstract: Online Social Networks (OSN) are increasingly being used as platform for an effective communication, to engage with other users, and to create a social worth via number of likes, followers and shares. Such metrics and crowd-sourced ratings give the OSN user a sense of social reputation which she tries to maintain and boost to be more influential. Users artificially bolster their social reputation… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: Accepted at ACM SAC'18

  42. arXiv:1802.01548  [pdf, other

    cs.NE cs.AI cs.CV cs.DC

    Regularized Evolution for Image Classifier Architecture Search

    Authors: Esteban Real, Alok Aggarwal, Yanping Huang, Quoc V Le

    Abstract: The effort devoted to hand-crafting neural network image classifiers has motivated the use of architecture search to discover them automatically. Although evolutionary algorithms have been repeatedly applied to neural network topologies, the image classifiers thus discovered have remained inferior to human-crafted ones. Here, we evolve an image classifier---AmoebaNet-A---that surpasses hand-design… ▽ More

    Submitted 16 February, 2019; v1 submitted 5 February, 2018; originally announced February 2018.

    Comments: Accepted for publication at AAAI 2019, the Thirty-Third AAAI Conference on Artificial Intelligence

    ACM Class: I.2.6; I.5.1; I.5.2

  43. arXiv:1710.04142  [pdf, other

    cs.CY cs.CL

    Bollywood Movie Corpus for Text, Images and Videos

    Authors: Nishtha Madaan, Sameep Mehta, Mayank Saxena, Aditi Aggarwal, Taneea S Agrawaal, Vrinda Malhotra

    Abstract: In past few years, several data-sets have been released for text and images. We present an approach to create the data-set for use in detecting and removing gender bias from text. We also include a set of challenges we have faced while creating this corpora. In this work, we have worked with movie data from Wikipedia plots and movie trailers from YouTube. Our Bollywood Movie corpus contains 4000 m… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

  44. arXiv:1710.04117  [pdf, other

    cs.SI cs.CY

    Analyzing Gender Stereotyping in Bollywood Movies

    Authors: Nishtha Madaan, Sameep Mehta, Taneea S Agrawaal, Vrinda Malhotra, Aditi Aggarwal, Mayank Saxena

    Abstract: The presence of gender stereotypes in many aspects of society is a well-known phenomenon. In this paper, we focus on studying such stereotypes and bias in Hindi movie industry (Bollywood). We analyze movie plots and posters for all movies released since 1970. The gender bias is detected by semantic modeling of plots at inter-sentence and intra-sentence level. Different features like occupation, in… ▽ More

    Submitted 11 October, 2017; originally announced October 2017.

  45. arXiv:1709.04569  [pdf, other

    cs.CR cs.DC cs.GT

    REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways

    Authors: Abhinav Aggarwal, Mahdi Zamani, Mihai Christodorescu

    Abstract: Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. How can the server block the attack packets through this gateway? In this paper, we introduce REMOTEGATE, a trustworthy mechanism for allowing any part… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: Working manuscript

  46. arXiv:1708.05640  [pdf, ps, other

    cs.LO

    A similarity criterion for sequential programs using truth-preserving partial functions

    Authors: Abhinav Aggarwal

    Abstract: The execution of sequential programs allows them to be represented using mathematical functions formed by the composition of statements following one after the other. Each such statement is in itself a partial function, which allows only inputs satisfying a particular Boolean condition to carry forward the execution and hence, the composition of such functions (as a result of sequential execution… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: Submitted as term paper in 2014

  47. arXiv:1708.04668  [pdf, other

    cs.DC

    Beating the Multiplicative Weights Update Algorithm

    Authors: Abhinav Aggarwal, José Abel Castellanos Joo, Diksha Gupta

    Abstract: Multiplicative weights update algorithms have been used extensively in designing iterative algorithms for many computational tasks. The core idea is to maintain a distribution over a set of experts and update this distribution in an online fashion based on the parameters of the underlying optimization problem. In this report, we study the behavior of a special MWU algorithm used for generating a g… ▽ More

    Submitted 15 August, 2017; originally announced August 2017.

    Comments: Word done as part of UNM CS506 term paper

  48. arXiv:1705.00145  [pdf, other

    cs.DS

    Replica Placement on Bounded Treewidth Graphs

    Authors: Anshul Aggarwal, Venkatesan T. Chakaravarthy, Neelima Gupta, Yogish Sabharwal, Sachin Sharma, Sonika Thakral

    Abstract: We consider the replica placement problem: given a graph with clients and nodes, place replicas on a minimum set of nodes to serve all the clients; each client is associated with a request and maximum distance that it can travel to get served and there is a maximum limit (capacity) on the amount of request a replica can serve. The problem falls under the general framework of capacitated set coveri… ▽ More

    Submitted 10 September, 2017; v1 submitted 29 April, 2017; originally announced May 2017.

    Comments: An abridged version of this paper is to appear in the proceedings of WADS'17

  49. arXiv:1612.05943  [pdf, other

    cs.CR cs.IT

    Distributed Computing with Channel Noise

    Authors: Abhinav Aggarwal, Varsha Dani, Thomas P. Hayes, Jared Saia

    Abstract: A group of $n$ users want to run a distributed protocol $π$ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows $π$, is able to maliciously flip bits on the channels. Can we efficiently simulate $π$ in the presence of such an adversary? We show that this is possible, even when $L$, the number of bits sent in $π$, and $T$, the number… ▽ More

    Submitted 24 July, 2017; v1 submitted 18 December, 2016; originally announced December 2016.

    Comments: 29 pages, 6 figures

  50. arXiv:1612.00766  [pdf, other

    cs.CR

    I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions

    Authors: Anupama Aggarwal, Bimal Viswanath, Saravana Kumar, Ayush Shah, Liang Zhang, Ponnurangam Kumaraguru

    Abstract: Several studies have been conducted on understanding third-party user tracking on the web. However, web trackers can only track users on sites where they are embedded by the publisher, thus obtaining a fragmented view of a user's online footprint. In this work, we investigate a different form of user tracking, where browser extensions are repurposed to capture the complete online activities of a u… ▽ More

    Submitted 3 May, 2018; v1 submitted 2 December, 2016; originally announced December 2016.