Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Chaudhuri, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.12859  [pdf

    cs.CL cs.AI

    Automated Question Generation on Tabular Data for Conversational Data Exploration

    Authors: Ritwik Chaudhuri, Rajmohan C, Kirushikesh DB, Arvind Agarwal

    Abstract: Exploratory data analysis (EDA) is an essential step for analyzing a dataset to derive insights. Several EDA techniques have been explored in the literature. Many of them leverage visualizations through various plots. But it is not easy to interpret them for a non-technical user, and producing appropriate visualizations is also tough when there are a large number of columns. Few other works provid… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  2. arXiv:2403.19724  [pdf

    cs.ET cs.NE physics.optics

    Towards Reverse-Engineering the Brain: Brain-Derived Neuromorphic Computing Approach with Photonic, Electronic, and Ionic Dynamicity in 3D integrated circuits

    Authors: S. J. Ben Yoo, Luis El-Srouji, Suman Datta, Shimeng Yu, Jean Anne Incorvia, Alberto Salleo, Volker Sorger, Juejun Hu, Lionel C Kimerling, Kristofer Bouchard, Joy Geng, Rishidev Chaudhuri, Charan Ranganath, Randall O'Reilly

    Abstract: The human brain has immense learning capabilities at extreme energy efficiencies and scale that no artificial system has been able to match. For decades, reverse engineering the brain has been one of the top priorities of science and technology research. Despite numerous efforts, conventional electronics-based methods have failed to match the scalability, energy efficiency, and self-supervised lea… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: 15 pages, 12 figures

  3. arXiv:2210.01860  [pdf, other

    cs.LG cs.AI stat.ML

    ProtoBandit: Efficient Prototype Selection via Multi-Armed Bandits

    Authors: Arghya Roy Chaudhuri, Pratik Jawanpuria, Bamdev Mishra

    Abstract: In this work, we propose a multi-armed bandit-based framework for identifying a compact set of informative data instances (i.e., the prototypes) from a source dataset $S$ that best represents a given target set $T$. Prototypical examples of a given dataset offer interpretable insights into the underlying data distribution and assist in example-based reasoning, thereby influencing every sphere of h… ▽ More

    Submitted 23 August, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    Comments: Erratum corrected

  4. arXiv:2203.13969  [pdf, other

    cs.PF

    Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs

    Authors: Yudi Huang, Ting He, Nilanjan Ray Chaudhuri, Thomas La Porta

    Abstract: Due to the potentially severe consequences of coordinated cyber-physical attacks (CCPA), the design of defenses has gained significant attention. A popular approach is to eliminate the existence of attacks by either securing existing sensors or deploying secured PMUs. In this work, we improve this approach by lowering the defense target from eliminating attacks to preventing outages and reducing t… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

  5. arXiv:2101.07129  [pdf, other

    cs.PF

    Verifiable Failure Localization in Smart Grid under Cyber-Physical Attacks

    Authors: Yudi Huang, Ting He, Nilanjan Ray Chaudhuri, Thomas La Porta

    Abstract: Cyber-physical attacks impose a significant threat to the smart grid, as the cyber attack makes it difficult to identify the actual damage caused by the physical attack. To defend against such attacks, various inference-based solutions have been proposed to estimate the states of grid elements (e.g., transmission lines) from measurements outside the attacked area, out of which a few have provided… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

  6. arXiv:2011.07334  [pdf, other

    q-bio.NC cs.NE

    Using noise to probe recurrent neural network structure and prune synapses

    Authors: Eli Moore, Rishidev Chaudhuri

    Abstract: Many networks in the brain are sparsely connected, and the brain eliminates synapses during development and learning. How could the brain decide which synapses to prune? In a recurrent network, determining the importance of a synapse between two neurons is a difficult computational problem, depending on the role that both neurons play and on all possible pathways of information flow between them.… ▽ More

    Submitted 16 July, 2021; v1 submitted 14 November, 2020; originally announced November 2020.

    Journal ref: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)

  7. arXiv:2009.02377  [pdf, other

    math.OC cs.CR cs.NI

    Power Grid State Estimation under General Cyber-Physical Attacks

    Authors: Yudi Huang, Ting He, Nilanjan Ray Chaudhuri, Thomas La Porta

    Abstract: Effective defense against cyber-physical attacks in power grid requires the capability of accurate damage assessment within the attacked area. While some solutions have been proposed to recover the phase angles and the link status (i.e., breaker status) within the attacked area, existing solutions made the limiting assumption that the grid stays connected after the attack. To fill this gap, we stu… ▽ More

    Submitted 4 February, 2021; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: Assumptions clarified; proof revised

  8. arXiv:2006.09581  [pdf, other

    cs.LG stat.ML

    Fine-Grained Stochastic Architecture Search

    Authors: Shraman Ray Chaudhuri, Elad Eban, Hanhan Li, Max Moroz, Yair Movshovitz-Attias

    Abstract: State-of-the-art deep networks are often too large to deploy on mobile devices and embedded systems. Mobile neural architecture search (NAS) methods automate the design of small models but state-of-the-art NAS methods are expensive to run. Differentiable neural architecture search (DNAS) methods reduce the search cost but explore a limited subspace of candidate architectures. In this paper, we int… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  9. Detecting Parkinsonian Tremor from IMU Data Collected In-The-Wild using Deep Multiple-Instance Learning

    Authors: Alexandros Papadopoulos, Konstantinos Kyritsis, Lisa Klingelhoefer, Sevasti Bostanjopoulou, K. Ray Chaudhuri, Anastasios Delopoulos

    Abstract: Parkinson's Disease (PD) is a slowly evolving neuro-logical disease that affects about 1% of the population above 60 years old, causing symptoms that are subtle at first, but whose intensity increases as the disease progresses. Automated detection of these symptoms could offer clues as to the early onset of the disease, thus improving the expected clinical outcomes of the patients via appropriatel… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  10. arXiv:1901.08387  [pdf, ps, other

    cs.LG cs.AI

    Regret Minimisation in Multi-Armed Bandits Using Bounded Arm Memory

    Authors: Arghya Roy Chaudhuri, Shivaram Kalyanakrishnan

    Abstract: In this paper, we propose a constant word (RAM model) algorithm for regret minimisation for both finite and infinite Stochastic Multi-Armed Bandit (MAB) instances. Most of the existing regret minimisation algorithms need to remember the statistics of all the arms they encounter. This may become a problem for the cases where the number of available words of memory is limited. Designing an efficient… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  11. arXiv:1901.08386  [pdf, ps, other

    cs.LG stat.ML

    PAC Identification of Many Good Arms in Stochastic Multi-Armed Bandits

    Authors: Arghya Roy Chaudhuri, Shivaram Kalyanakrishnan

    Abstract: We consider the problem of identifying any $k$ out of the best $m$ arms in an $n$-armed stochastic multi-armed bandit. Framed in the PAC setting, this particular problem generalises both the problem of `best subset selection' and that of selecting `one out of the best m' arms [arcsk 2017]. In applications such as crowd-sourcing and drug-designing, identifying a single good solution is often not su… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  12. arXiv:1712.03724  [pdf, other

    cs.CY cs.AI cs.HC

    Cogniculture: Towards a Better Human-Machine Co-evolution

    Authors: Rakesh R Pimplikar, Kushal Mukherjee, Gyana Parija, Harit Vishwakarma, Ramasuri Narayanam, Sarthak Ahuja, Rohith D Vallam, Ritwik Chaudhuri, Joydeep Mondal

    Abstract: Research in Artificial Intelligence is breaking technology barriers every day. New algorithms and high performance computing are making things possible which we could only have imagined earlier. Though the enhancements in AI are making life easier for human beings day by day, there is constant fear that AI based systems will pose a threat to humanity. People in AI community have diverse set of opi… ▽ More

    Submitted 11 December, 2017; originally announced December 2017.

  13. arXiv:1704.02019  [pdf, other

    q-bio.NC cs.NE

    Associative content-addressable networks with exponentially many robust stable states

    Authors: Rishidev Chaudhuri, Ila Fiete

    Abstract: The brain must robustly store a large number of memories, corresponding to the many events encountered over a lifetime. However, the number of memory states in existing neural network models either grows weakly with network size or recall fails catastrophically with vanishingly little noise. We construct an associative content-addressable memory with exponentially many stable states and robust err… ▽ More

    Submitted 2 November, 2017; v1 submitted 6 April, 2017; originally announced April 2017.

    Comments: 42 pages, 8 figures

  14. arXiv:1611.06565  [pdf, other

    cs.CV cs.DC cs.NE

    Deep Tensor Convolution on Multicores

    Authors: David Budden, Alexander Matveev, Shibani Santurkar, Shraman Ray Chaudhuri, Nir Shavit

    Abstract: Deep convolutional neural networks (ConvNets) of 3-dimensional kernels allow joint modeling of spatiotemporal features. These networks have improved performance of video and volumetric image analysis, but have been limited in size due to the low memory ceiling of GPU hardware. Existing CPU implementations overcome this constraint but are impractically slow. Here we extend and optimize the faster W… ▽ More

    Submitted 11 June, 2017; v1 submitted 20 November, 2016; originally announced November 2016.

    Comments: 11 pages, 4 figures, 1 supplementary doc

  15. arXiv:1209.0054  [pdf

    cs.CR

    A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum

    Authors: Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri

    Abstract: This paper proposed a DWT based Steganographic technique. Cover image is decomposed into four sub bands using DWT. Two secret images are embedded within the HL and HH sub bands respectively. During embedding secret images are dispersed within each band using a pseudo random sequence and a Session key. Secret images are extracted using the session key and the size of the images. In this approach th… ▽ More

    Submitted 1 September, 2012; originally announced September 2012.

    Comments: 5 pages, 9 figures. arXiv admin note: substantial text overlap with arXiv:1208.0803

    Journal ref: International Journal of Modern Engineering Research (IJMER),Vol.1, Dec 2011, Issue1, pp-157-161,ISSN: 2249-6645

  16. arXiv:1208.0950  [pdf

    cs.CR cs.MM

    A Session based Multiple Image Hiding Technique using DWT and DCT

    Authors: Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra Chaudhuri

    Abstract: This work proposes Steganographic technique for hiding multiple images in a color image based on DWT and DCT. The cover image is decomposed into three separate color planes namely R, G and B. Individual planes are decomposed into subbands using DWT. DCT is applied in HH component of each plane. Secret images are dispersed among the selected DCT coefficients using a pseudo random sequence and a Ses… ▽ More

    Submitted 4 August, 2012; originally announced August 2012.

    Comments: 4 pages,16 figures, "Published with International Journal of Computer Applications (IJCA)"

    Journal ref: Tanmay Bhattacharya,Nilanjan Dey,Bhadra S R Chaudhuri. Article:A Session Based Multiple Image Hiding Technique using DWT&DCT.International Journal of Computer Applications 38(5):18-21,January 2012.Published by Foundation of Computer Science

  17. arXiv:1202.3048  [pdf

    cs.OH

    Design and Fabrication of Micromachined Resonators

    Authors: Ritesh Ray Chaudhuri, Joydeep Basu, Tarun Kanti Bhattacharyya

    Abstract: Microelectromechanical system (MEMS) based on-chip resonators offer great potential for sensing and high frequency signal processing applications due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption etc. This work is mainly aimed at the design, modeling, simulation, and fabrication of micromachined polysilicon… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Comments: 7 pages, 12 figures

    Journal ref: Proceedings of the 6th International Conference on Smart Materials, Structures and Systems, January 04-07, 2012, Bangalore, India