Zum Hauptinhalt springen

Showing 1–50 of 118 results for author: Das, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.14644  [pdf, other

    cs.CL

    Human-Interpretable Adversarial Prompt Attack on Large Language Models with Situational Context

    Authors: Nilanjana Das, Edward Raff, Manas Gaur

    Abstract: Previous research on testing the vulnerabilities in Large Language Models (LLMs) using adversarial attacks has primarily focused on nonsensical prompt injections, which are easily detected upon manual or automated review (e.g., via byte entropy). However, the exploration of innocuous human-understandable malicious prompts augmented with adversarial injections remains limited. In this research, we… ▽ More

    Submitted 25 July, 2024; v1 submitted 19 July, 2024; originally announced July 2024.

  2. arXiv:2406.10131  [pdf, other

    cs.LG cs.AI

    Linear Contextual Bandits with Hybrid Payoff: Revisited

    Authors: Nirjhar Das, Gaurav Sinha

    Abstract: We study the Linear Contextual Bandit problem in the hybrid reward setting. In this setting every arm's reward model contains arm specific parameters in addition to parameters shared across the reward models of all the arms. We can reduce this setting to two closely related settings (a) Shared - no arm specific parameters, and (b) Disjoint - only arm specific parameters, enabling the application o… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Accepted at ECML PKDD 2024 as a Research Track Paper

  3. arXiv:2406.08606  [pdf, other

    cs.CL cs.AI

    End-to-End Argument Mining as Augmented Natural Language Generation

    Authors: Nilmadhab Das, Vishal Choudhary, V. Vijaya Saradhi, Ashish Anand

    Abstract: Argument Mining (AM) is a crucial aspect of computational argumentation, which deals with the identification and extraction of Argumentative Components (ACs) and their corresponding Argumentative Relations (ARs). Most prior works have solved these problems by dividing them into multiple subtasks. And the available end-to-end setups are mostly based on the dependency parsing approach. This work pro… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  4. arXiv:2405.08317  [pdf, other

    cs.CL cs.SD eess.AS

    SpeechGuard: Exploring the Adversarial Robustness of Multimodal Large Language Models

    Authors: Raghuveer Peri, Sai Muralidhar Jayanthi, Srikanth Ronanki, Anshu Bhatia, Karel Mundnich, Saket Dingliwal, Nilaksh Das, Zejiang Hou, Goeric Huybrechts, Srikanth Vishnubhotla, Daniel Garcia-Romero, Sundararajan Srinivasan, Kyu J Han, Katrin Kirchhoff

    Abstract: Integrated Speech and Large Language Models (SLMs) that can follow speech instructions and generate relevant text responses have gained popularity lately. However, the safety and robustness of these models remains largely unclear. In this work, we investigate the potential vulnerabilities of such instruction-following speech-language models to adversarial attacks and jailbreaking. Specifically, we… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: 9+6 pages, Submitted to ACL 2024

  5. arXiv:2405.08295  [pdf, other

    cs.CL cs.SD eess.AS

    SpeechVerse: A Large-scale Generalizable Audio Language Model

    Authors: Nilaksh Das, Saket Dingliwal, Srikanth Ronanki, Rohit Paturi, Zhaocheng Huang, Prashant Mathur, Jie Yuan, Dhanush Bekal, Xing Niu, Sai Muralidhar Jayanthi, Xilai Li, Karel Mundnich, Monica Sunkara, Sundararajan Srinivasan, Kyu J Han, Katrin Kirchhoff

    Abstract: Large language models (LLMs) have shown incredible proficiency in performing tasks that require semantic understanding of natural language instructions. Recently, many works have further expanded this capability to perceive multimodal audio and text inputs, but their capabilities are often limited to specific fine-tuned tasks such as automatic speech recognition and translation. We therefore devel… ▽ More

    Submitted 31 May, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: Single Column, 13 page

  6. arXiv:2405.05292  [pdf, other

    cs.HC cs.AI cs.RO

    Smart Portable Computer

    Authors: Niladri Das

    Abstract: Amidst the COVID-19 pandemic, with many organizations, schools, colleges, and universities transitioning to virtual platforms, students encountered difficulties in acquiring PCs such as desktops or laptops. The starting prices, around 15,000 INR, often failed to offer adequate system specifications, posing a challenge for consumers. Additionally, those reliant on laptops for work found the convent… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 34 pages

    Report number: Lovely Professional University Report 001

  7. arXiv:2404.17367  [pdf

    cs.RO eess.SY

    An Optimised Brushless DC Motor Control Scheme for Robotics Applications

    Authors: Nilabha Das, Laxman Rao S. Paragond, Balkrushna H. Waghmare

    Abstract: This work aims to develop an integrated control strategy for Brushless Direct Current Motors for a wide range of applications in robotics systems. The controller is suited for both high torque - low speed and high-speed control of the motors. Hardware validation is done by developing a custom BLDC drive system, and the circuit elements are optimised for power efficiency.

    Submitted 26 April, 2024; originally announced April 2024.

    Comments: 6 Pages, 8 figures, 1 table

  8. arXiv:2404.06831  [pdf, other

    cs.LG

    Generalized Linear Bandits with Limited Adaptivity

    Authors: Ayush Sawarni, Nirjhar Das, Siddharth Barman, Gaurav Sinha

    Abstract: We study the generalized linear contextual bandit problem within the constraints of limited adaptivity. In this paper, we present two algorithms, $\texttt{B-GLinCB}$ and $\texttt{RS-GLinCB}$, that address, respectively, two prevalent limited adaptivity settings. Given a budget $M$ on the number of policy updates, in the first setting, the algorithm needs to decide upfront $M$ rounds at which it wi… ▽ More

    Submitted 14 June, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

    Comments: Reorganization; New Experiments

  9. arXiv:2404.04245  [pdf

    cs.CR cs.CV cs.LG

    Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

    Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen

    Abstract: This technical report delves into an in-depth exploration of adversarial attacks specifically targeted at Deep Neural Networks (DNNs) utilized for image classification. The study also investigates defense mechanisms aimed at bolstering the robustness of machine learning models. The research focuses on comprehending the ramifications of two prominent attack methodologies: the Fast Gradient Sign Met… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: This report pertains to the Capstone Project done by Group 1 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 35 pages and it includes 15 figures and 10 tables. This is the preprint which will be submitted to to an IEEE international conference for review

  10. arXiv:2403.10885  [pdf, other

    eess.IV cs.CV

    Could We Generate Cytology Images from Histopathology Images? An Empirical Study

    Authors: Soumyajyoti Dey, Sukanta Chakraborty, Utso Guha Roy, Nibaran Das

    Abstract: Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implemen… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accept at International Conference on Advanced Computing and Applications(ICACA-2024)

  11. arXiv:2403.10884  [pdf, other

    cs.CV

    Fuzzy Rank-based Late Fusion Technique for Cytology image Segmentation

    Authors: Soumyajyoti Dey, Sukanta Chakraborty, Utso Guha Roy, Nibaran Das

    Abstract: Cytology image segmentation is quite challenging due to its complex cellular structure and multiple overlapping regions. On the other hand, for supervised machine learning techniques, we need a large amount of annotated data, which is costly. In recent years, late fusion techniques have given some promising performances in the field of image classification. In this paper, we have explored a fuzzy-… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accept at International Conference on Data, Electronics and Computing (ICDEC-2023)

  12. arXiv:2403.10881  [pdf, other

    cs.CV

    Regularizing CNNs using Confusion Penalty Based Label Smoothing for Histopathology Images

    Authors: Somenath Kuiry, Alaka Das, Mita Nasipuri, Nibaran Das

    Abstract: Deep Learning, particularly Convolutional Neural Networks (CNN), has been successful in computer vision tasks and medical image analysis. However, modern CNNs can be overconfident, making them difficult to deploy in real-world scenarios. Researchers propose regularizing techniques, such as Label Smoothing (LS), which introduces soft labels for training data, making the classifier more regularized.… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accepted at CICBA 2024 : 6th International Conference on Computational Intelligence in Communications, and Business Analytics

  13. arXiv:2403.10880  [pdf, other

    eess.IV cs.CV

    COVID-CT-H-UNet: a novel COVID-19 CT segmentation network based on attention mechanism and Bi-category Hybrid loss

    Authors: Anay Panja, Somenath Kuiry, Alaka Das, Mita Nasipuri, Nibaran Das

    Abstract: Since 2019, the global COVID-19 outbreak has emerged as a crucial focus in healthcare research. Although RT-PCR stands as the primary method for COVID-19 detection, its extended detection time poses a significant challenge. Consequently, supplementing RT-PCR with the pathological study of COVID-19 through CT imaging has become imperative. The current segmentation approach based on TVLoss enhances… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accepted at CICBA 2024 : 6th International Conference on Computational Intelligence in Communications, and Business Analytics

  14. arXiv:2402.10500  [pdf, other

    cs.LG cs.AI cs.CL

    Active Preference Optimization for Sample Efficient RLHF

    Authors: Nirjhar Das, Souradip Chakraborty, Aldo Pacchiano, Sayak Ray Chowdhury

    Abstract: Reinforcement Learning from Human Feedback (RLHF) is pivotal in aligning Large Language Models (LLMs) with human preferences. Although aligned generative models have shown remarkable abilities in various tasks, their reliance on high-quality human preference data creates a costly bottleneck in the practical application of RLHF. One primary reason is that current methods rely on uniformly picking p… ▽ More

    Submitted 5 June, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

    Comments: New experimental results added. Some reorganization

  15. arXiv:2309.12421  [pdf, other

    cs.CR cs.LG cs.SE

    Change Management using Generative Modeling on Digital Twins

    Authors: Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi

    Abstract: A key challenge faced by small and medium-sized business entities is securely managing software updates and changes. Specifically, with rapidly evolving cybersecurity threats, changes/updates/patches to software systems are necessary to stay ahead of emerging threats and are often mandated by regulators or statutory authorities to counter these. However, security patches/updates require stress tes… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  16. arXiv:2308.11395  [pdf, other

    cs.ET

    ULGss: A Strategy to construct a Library of Universal Logic Gates for $N$-variable Boolean Logic beyond NAND and NOR

    Authors: Aadarsh G. Goenka, Shyamali Mitra, Mrinal K. Naskar, Nibaran Das

    Abstract: In literature, NAND and NOR are two logic gates that display functional completeness, hence regarded as Universal gates. So, the present effort is focused on exploring a library of universal gates in binary that are still unexplored in literature along with a broad and systematic approach to classify the logic connectives. The study shows that the number of Universal Gates in any logic system grow… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: 8 pages 10 tables 11 figures

  17. Inverse Reinforcement Learning With Constraint Recovery

    Authors: Nirjhar Das, Arpan Chattopadhyay

    Abstract: In this work, we propose a novel inverse reinforcement learning (IRL) algorithm for constrained Markov decision process (CMDP) problems. In standard IRL problems, the inverse learner or agent seeks to recover the reward function of the MDP, given a set of trajectory demonstrations for the optimal policy. In this work, we seek to infer not only the reward functions of the CMDP, but also the constra… ▽ More

    Submitted 14 May, 2023; originally announced May 2023.

  18. arXiv:2305.03837  [pdf, other

    eess.AS cs.LG cs.SD

    Mask The Bias: Improving Domain-Adaptive Generalization of CTC-based ASR with Internal Language Model Estimation

    Authors: Nilaksh Das, Monica Sunkara, Sravan Bodapati, Jinglun Cai, Devang Kulshreshtha, Jeff Farris, Katrin Kirchhoff

    Abstract: End-to-end ASR models trained on large amount of data tend to be implicitly biased towards language semantics of the training data. Internal language model estimation (ILME) has been proposed to mitigate this bias for autoregressive models such as attention-based encoder-decoder and RNN-T. Typically, ILME is performed by modularizing the acoustic and language components of the model architecture,… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: Accepted to ICASSP 2023

  19. arXiv:2304.11265  [pdf, other

    cs.LG

    Time Series Classification for Detecting Parkinson's Disease from Wrist Motions

    Authors: Cedric Donié, Neha Das, Satoshi Endo, Sandra Hirche

    Abstract: Parkinson's disease (PD) is a neurodegenerative condition characterized by frequently changing motor symptoms, necessitating continuous symptom monitoring for more targeted treatment. Classical time series classification and deep learning techniques have demonstrated limited efficacy in monitoring PD symptoms using wearable accelerometer data due to complex PD movement patterns and the small size… ▽ More

    Submitted 20 May, 2024; v1 submitted 21 April, 2023; originally announced April 2023.

    Comments: The source code is available under https://github.com/cedricdonie/tsc-for-wrist-motion-pd-detection

    ACM Class: I.5; J.2; J.3

  20. arXiv:2304.07949  [pdf, other

    stat.ME cs.LG eess.SY stat.ML

    Metrics for Bayesian Optimal Experiment Design under Model Misspecification

    Authors: Tommie A. Catanach, Niladri Das

    Abstract: The conventional approach to Bayesian decision-theoretic experiment design involves searching over possible experiments to select a design that maximizes the expected value of a specified utility function. The expectation is over the joint distribution of all unknown variables implied by the statistical model that will be used to analyze the collected data. The utility function defines the objecti… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

  21. arXiv:2304.03201   

    quant-ph cs.CR

    Device-Independent Quantum Secure Direct Communication with User Authentication

    Authors: Nayana Das, Goutam Paul

    Abstract: Quantum Secure Direct Communication (QSDC) is an important branch of quantum cryptography, which enables the secure transmission of messages without prior key encryption. However, traditional quantum communication protocols rely on the security and trustworthiness of the devices employed to implement the protocols, which can be susceptible to attacks. Device-independent (DI) quantum protocols, on… ▽ More

    Submitted 14 August, 2024; v1 submitted 6 April, 2023; originally announced April 2023.

    Comments: There is a security loophole in this article, so we are withdrawing this

  22. arXiv:2212.14410  [pdf, other

    cs.IT

    Shared Cache Coded Caching Schemes Using Designs and Circuits of Matrices

    Authors: Niladri Das, B. Sundar Rajan

    Abstract: In this paper, we study shared cache coded caching (SC-CC): a set of caches serves a larger set of users; each user access one cache, and a cache may serve many users. For this problem, under uncoded placement, Parrinello, Ünsal, and Elia showed an optimal SC-CC scheme, in which the subpacketization level depends upon the number of caches. We show an SC-CC scheme where the subpacketization level d… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

    Comments: 36 pages, the paper has been submitted to IEEE Transactions on Information Theory

  23. arXiv:2212.00478  [pdf, ps, other

    eess.SY cs.RO

    Safe Learning-Based Control of Elastic Joint Robots via Control Barrier Functions

    Authors: Armin Lederer, Azra Begzadić, Neha Das, Sandra Hirche

    Abstract: Ensuring safety is of paramount importance in physical human-robot interaction applications. This requires both adherence to safety constraints defined on the system state, as well as guaranteeing compliant behavior of the robot. If the underlying dynamical system is known exactly, the former can be addressed with the help of control barrier functions. The incorporation of elastic actuators in the… ▽ More

    Submitted 14 April, 2023; v1 submitted 1 December, 2022; originally announced December 2022.

  24. arXiv:2211.06581  [pdf, other

    cs.CV

    Variational Augmentation for Enhancing Historical Document Image Binarization

    Authors: Avirup Dey, Nibaran Das, Mita Nasipuri

    Abstract: Historical Document Image Binarization is a well-known segmentation problem in image processing. Despite ubiquity, traditional thresholding algorithms achieved limited success on severely degraded document images. With the advent of deep learning, several segmentation models were proposed that made significant progress in the field but were limited by the unavailability of large training datasets.… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

    Comments: Accepted at ICVGIP 2022

    MSC Class: I.4.6

  25. arXiv:2210.12492  [pdf, other

    cs.HC cs.LG

    NeuroMapper: In-browser Visualizer for Neural Network Training

    Authors: Zhiyan Zhou, Kevin Li, Haekyu Park, Megan Dass, Austin Wright, Nilaksh Das, Duen Horng Chau

    Abstract: We present our ongoing work NeuroMapper, an in-browser visualization tool that helps machine learning (ML) developers interpret the evolution of a model during training, providing a new way to monitor the training process and visually discover reasons for suboptimal training. While most existing deep neural networks (DNNs) interpretation tools are designed for already-trained model, NeuroMapper sc… ▽ More

    Submitted 22 October, 2022; originally announced October 2022.

    Comments: IEEE VIS 2022

  26. arXiv:2206.13577  [pdf, other

    cs.CV cs.AI cs.LG

    A View Independent Classification Framework for Yoga Postures

    Authors: Mustafa Chasmai, Nirjhar Das, Aman Bhardwaj, Rahul Garg

    Abstract: Yoga is a globally acclaimed and widely recommended practice for a healthy living. Maintaining correct posture while performing a Yogasana is of utmost importance. In this work, we employ transfer learning from Human Pose Estimation models for extracting 136 key-points spread all over the body to train a Random Forest classifier which is used for estimation of the Yogasanas. The results are evalua… ▽ More

    Submitted 14 August, 2022; v1 submitted 27 June, 2022; originally announced June 2022.

  27. arXiv:2204.13089  [pdf, other

    stat.ML cs.LG eess.SP stat.AP

    Variational Kalman Filtering with Hinf-Based Correction for Robust Bayesian Learning in High Dimensions

    Authors: Niladri Das, Jed A. Duersch, Thomas A. Catanach

    Abstract: In this paper, we address the problem of convergence of sequential variational inference filter (VIF) through the application of a robust variational objective and Hinf-norm based correction for a linear Gaussian system. As the dimension of state or parameter space grows, performing the full Kalman update with the dense covariance matrix for a large scale system requires increased storage and comp… ▽ More

    Submitted 27 April, 2022; originally announced April 2022.

  28. arXiv:2204.02381  [pdf, other

    eess.AS cs.LG

    Hear No Evil: Towards Adversarial Robustness of Automatic Speech Recognition via Multi-Task Learning

    Authors: Nilaksh Das, Duen Horng Chau

    Abstract: As automatic speech recognition (ASR) systems are now being widely deployed in the wild, the increasing threat of adversarial attacks raises serious questions about the security and reliability of using such systems. On the other hand, multi-task learning (MTL) has shown success in training models that can resist adversarial attacks in the computer vision domain. In this work, we investigate the i… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: Submitted to Insterspeech 2022

  29. arXiv:2204.00734  [pdf, other

    cs.CV cs.LG

    SkeleVision: Towards Adversarial Resiliency of Person Tracking with Multi-Task Learning

    Authors: Nilaksh Das, Sheng-Yun Peng, Duen Horng Chau

    Abstract: Person tracking using computer vision techniques has wide ranging applications such as autonomous driving, home security and sports analytics. However, the growing threat of adversarial attacks raises serious concerns regarding the security and reliability of such techniques. In this work, we study the impact of multi-task learning (MTL) on the adversarial robustness of the widely used SiamRPN tra… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

  30. arXiv:2203.16475  [pdf, other

    cs.LG cs.CV

    Concept Evolution in Deep Learning Training: A Unified Interpretation Framework and Discoveries

    Authors: Haekyu Park, Seongmin Lee, Benjamin Hoover, Austin P. Wright, Omar Shaikh, Rahul Duggal, Nilaksh Das, Kevin Li, Judy Hoffman, Duen Horng Chau

    Abstract: We present ConceptEvo, a unified interpretation framework for deep neural networks (DNNs) that reveals the inception and evolution of learned concepts during training. Our work addresses a critical gap in DNN interpretation research, as existing methods primarily focus on post-training interpretation. ConceptEvo introduces two novel technical contributions: (1) an algorithm that generates a unifie… ▽ More

    Submitted 22 August, 2023; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: Accepted at CIKM'23

  31. arXiv:2203.08977  [pdf, other

    cs.LG cs.AI

    Adaptive n-ary Activation Functions for Probabilistic Boolean Logic

    Authors: Jed A. Duersch, Thomas A. Catanach, Niladri Das

    Abstract: Balancing model complexity against the information contained in observed data is the central challenge to learning. In order for complexity-efficient models to exist and be discoverable in high dimensions, we require a computational framework that relates a credible notion of complexity to simple parameter representations. Further, this framework must allow excess complexity to be gradually remove… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  32. arXiv:2202.05515  [pdf, ps, other

    cs.IT

    Multi-Access Coded Caching Schemes from Maximal Cross Resolvable Designs

    Authors: Niladri Das, B. Sundar Rajan

    Abstract: We study the problem of multi-access coded caching (MACC): a central server has $N$ files, $K$ ($K \leq N$) caches each of which stores $M$ out of the $N$ files, $K$ users each of which demands one out of the $N$ files, and each user accesses $z$ caches. The objective is to jointly design the placement, delivery, and user-to-cache association, to optimize the achievable rate. This problem has been… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: 34 pages, 5 figures and 3 tables

  33. Configuration Space Decomposition for Scalable Proxy Collision Checking in Robot Planning and Control

    Authors: Mrinal Verghese, Nikhil Das, Yuheng Zhi, Michael Yip

    Abstract: Real-time robot motion planning in complex high-dimensional environments remains an open problem. Motion planning algorithms, and their underlying collision checkers, are crucial to any robot control stack. Collision checking takes up a large portion of the computational time in robot motion planning. Existing collision checkers make trade-offs between speed and accuracy and scale poorly to high-d… ▽ More

    Submitted 26 January, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

    Comments: 8 pages, 9 figures, Accepted to IEEE Robotics and Automation Letters

  34. arXiv:2108.12931  [pdf, other

    cs.CV

    NeuroCartography: Scalable Automatic Visual Summarization of Concepts in Deep Neural Networks

    Authors: Haekyu Park, Nilaksh Das, Rahul Duggal, Austin P. Wright, Omar Shaikh, Fred Hohman, Duen Horng Chau

    Abstract: Existing research on making sense of deep neural networks often focuses on neuron-level interpretation, which may not adequately capture the bigger picture of how concepts are collectively encoded by multiple neurons. We present NeuroCartography, an interactive system that scalably summarizes and visualizes concepts learned by neural networks. It automatically discovers and groups neurons that det… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

    Comments: Accepted to IEEE VIS'21

  35. arXiv:2108.09460  [pdf, other

    cs.CV

    Ensemble of CNN classifiers using Sugeno Fuzzy Integral Technique for Cervical Cytology Image Classification

    Authors: Rohit Kundu, Hritam Basak, Akhil Koilada, Soham Chattopadhyay, Sukanta Chakraborty, Nibaran Das

    Abstract: Cervical cancer is the fourth most common category of cancer, affecting more than 500,000 women annually, owing to the slow detection procedure. Early diagnosis can help in treating and even curing cancer, but the tedious, time-consuming testing process makes it impossible to conduct population-wise screening. To aid the pathologists in efficient and reliable detection, in this paper, we propose a… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Comments: 16 pages

  36. arXiv:2108.03470  [pdf, other

    cs.CV

    A distillation based approach for the diagnosis of diseases

    Authors: Hmrishav Bandyopadhyay, Shuvayan Ghosh Dastidar, Bisakh Mondal, Biplab Banerjee, Nibaran Das

    Abstract: Presently, Covid-19 is a serious threat to the world at large. Efforts are being made to reduce disease screening times and in the development of a vaccine to resist this disease, even as thousands succumb to it everyday. We propose a novel method of automated screening of diseases like Covid-19 and pneumonia from Chest X-Ray images with the help of Computer Vision. Unlike computer vision classifi… ▽ More

    Submitted 7 August, 2021; originally announced August 2021.

  37. arXiv:2106.12970  [pdf, other

    cs.IR cs.AI cs.LG

    RikoNet: A Novel Anime Recommendation Engine

    Authors: Badal Soni, Debangan Thakuria, Nilutpal Nath, Navarun Das, Bhaskarananda Boro

    Abstract: Anime is quite well-received today, especially among the younger generations. With many genres of available shows, more and more people are increasingly getting attracted to this niche section of the entertainment industry. As anime has recently garnered mainstream attention, we have insufficient information regarding users' penchant and watching habits. Therefore, it is an uphill task to build a… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 19 pages

    MSC Class: ams.org

  38. Object Detection and Ranging for Autonomous Navigation of Mobile Robots

    Authors: Md Ziaul Haque Zim, Nimai Chandra Das

    Abstract: In the recent decade, electronic technology gets advanced day by day the methodologies too should update. For the purpose of ranging various methods such Radio Detection and Ranging (RADAR), Light Detection and Ranging (LIDAR) and Sonic Navigation and Ranging (SONAR) etc. are used. Later, by adapting the earlier technologies and further modifying the purposes of detection and ranging in navigation… ▽ More

    Submitted 23 June, 2021; originally announced June 2021.

  39. Cervical Cytology Classification Using PCA & GWO Enhanced Deep Features Selection

    Authors: Hritam Basak, Rohit Kundu, Sukanta Chakraborty, Nibaran Das

    Abstract: Cervical cancer is one of the most deadly and common diseases among women worldwide. It is completely curable if diagnosed in an early stage, but the tedious and costly detection procedure makes it unviable to conduct population-wise screening. Thus, to augment the effort of the clinicians, in this paper, we propose a fully automated framework that utilizes Deep Learning and feature selection usin… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

    Comments: 28 pages

  40. arXiv:2104.11620  [pdf, other

    cs.LG cs.CV

    GuideBP: Guiding Backpropagation Through Weaker Pathways of Parallel Logits

    Authors: Bodhisatwa Mandal, Swarnendu Ghosh, Teresa Gonçalves, Paulo Quaresma, Mita Nasipuri, Nibaran Das

    Abstract: Convolutional neural networks often generate multiple logits and use simple techniques like addition or averaging for loss computation. But this allows gradients to be distributed equally among all paths. The proposed approach guides the gradients of backpropagation along weakest concept representations. A weakness scores defines the class specific performance of individual pathways which is then… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

  41. arXiv:2104.06348  [pdf, other

    cs.RO

    Optimal Multi-Manipulator Arm Placement for Maximal Dexterity during Robotics Surgery

    Authors: James Di, Mingwei Xu, Nikhil Das, Michael C. Yip

    Abstract: Robot arm placements are oftentimes a limitation in surgical preoperative procedures, relying on trained staff to evaluate and decide on the optimal positions for the arms. Given new and different patient anatomies, it can be challenging to make an informed choice, leading to more frequently colliding arms or limited manipulator workspaces. In this paper, we develop a method to generate the optima… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

  42. arXiv:2103.16435  [pdf, other

    cs.LG cs.AI cs.HC

    EnergyVis: Interactively Tracking and Exploring Energy Consumption for ML Models

    Authors: Omar Shaikh, Jon Saad-Falcon, Austin P Wright, Nilaksh Das, Scott Freitas, Omar Isaac Asensio, Duen Horng Chau

    Abstract: The advent of larger machine learning (ML) models have improved state-of-the-art (SOTA) performance in various modeling tasks, ranging from computer vision to natural language. As ML models continue increasing in size, so does their respective energy consumption and computational requirements. However, the methods for tracking, reporting, and comparing energy consumption remain limited. We present… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 7 pages, 5 figures; CHI 2021 Extended Abstracts

  43. arXiv:2102.10335  [pdf, ps, other

    cs.CV

    Exploring Knowledge Distillation of a Deep Neural Network for Multi-Script identification

    Authors: Shuvayan Ghosh Dastidar, Kalpita Dutta, Nibaran Das, Mahantapas Kundu, Mita Nasipuri

    Abstract: Multi-lingual script identification is a difficult task consisting of different language with complex backgrounds in scene text images. According to the current research scenario, deep neural networks are employed as teacher models to train a smaller student network by utilizing the teacher model's predictions. This process is known as dark knowledge transfer. It has been quite successful in many… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: 14 pages, 6 figures, 7 tables

  44. arXiv:2102.07413  [pdf, other

    cs.RO cs.LG

    DiffCo: Auto-Differentiable Proxy Collision Detection with Multi-class Labels for Safety-Aware Trajectory Optimization

    Authors: Yuheng Zhi, Nikhil Das, Michael Yip

    Abstract: The objective of trajectory optimization algorithms is to achieve an optimal collision-free path between a start and goal state. In real-world scenarios where environments can be complex and non-homogeneous, a robot needs to be able to gauge whether a state will be in collision with various objects in order to meet some safety metrics. The collision detector should be computationally efficient and… ▽ More

    Submitted 18 February, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

    Comments: This work has been accepted for publication at IEEE Transactions on Robotics

  45. arXiv:2102.03115  [pdf

    cs.CV

    Multispectral Object Detection with Deep Learning

    Authors: Md Osman Gani, Somenath Kuiry, Alaka Das, Mita Nasipuri, Nibaran Das

    Abstract: Object detection in natural scenes can be a challenging task. In many real-life situations, the visible spectrum is not suitable for traditional computer vision tasks. Moving outside the visible spectrum range, such as the thermal spectrum or the near-infrared (NIR) images, is much more beneficial in low visibility conditions, NIR images are very helpful for understanding the object's material qua… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

  46. arXiv:2102.01120  [pdf, other

    cs.CV

    RectiNet-v2: A stacked network architecture for document image dewarping

    Authors: Hmrishav Bandyopadhyay, Tanmoy Dasgupta, Nibaran Das, Mita Nasipuri

    Abstract: With the advent of mobile and hand-held cameras, document images have found their way into almost every domain. Dewarping of these images for the removal of perspective distortions and folds is essential so that they can be understood by document recognition algorithms. For this, we propose an end-to-end CNN architecture that can produce distortion free document images from warped documents it tak… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: 6 Pages

  47. arXiv:2101.10586  [pdf, other

    cs.CV cs.AI

    SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models

    Authors: Haekyu Park, Zijie J. Wang, Nilaksh Das, Anindya S. Paul, Pruthvi Perumalla, Zhiyan Zhou, Duen Horng Chau

    Abstract: Skeleton-based human action recognition technologies are increasingly used in video based applications, such as home robotics, healthcare on aging population, and surveillance. However, such models are vulnerable to adversarial attacks, raising serious concerns for their use in safety-critical applications. To develop an effective defense against attacks, it is essential to understand how such att… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: Accepted at AAAI'21 Demo

  48. arXiv:2101.05560  [pdf, ps, other

    quant-ph cs.CR

    Secure Multi-Party Quantum Conference and Xor Computation

    Authors: Nayana Das, Goutam Paul

    Abstract: Quantum conference is a process of securely exchanging messages between three or more parties, using quantum resources. A Measurement Device Independent Quantum Dialogue (MDI-QD) protocol, which is secure against information leakage, has been proposed (Quantum Information Processing 16.12 (2017): 305) in 2017, is proven to be insecure against intercept-and-resend attack strategy. We first modify t… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Comments: Accepted in Quantum Information and Computation

    Journal ref: Quantum Information and Computation, Vol.21 No.3&4 March 2021

  49. Quantum Secure Direct Communication with Mutual Authentication using a Single Basis

    Authors: Nayana Das, Goutam Paul, Ritajit Majumdar

    Abstract: In this paper, we propose a new theoretical scheme for quantum secure direct communication (QSDC) with user authentication. Different from the previous QSDC protocols, the present protocol uses only one orthogonal basis of single-qubit states to encode the secret message. Moreover, this is a one-time and one-way communication protocol, which uses qubits prepared in a randomly chosen arbitrary basi… ▽ More

    Submitted 14 January, 2021; v1 submitted 10 January, 2021; originally announced January 2021.

    Journal ref: International Journal of Theoretical Physics (2021)

  50. arXiv:2011.03882  [pdf, other

    cs.RO cs.AI

    Multi-Modal Learning of Keypoint Predictive Models for Visual Object Manipulation

    Authors: Sarah Bechtle, Neha Das, Franziska Meier

    Abstract: Humans have impressive generalization capabilities when it comes to manipulating objects and tools in completely novel environments. These capabilities are, at least partially, a result of humans having internal models of their bodies and any grasped object. How to learn such body schemas for robots remains an open problem. In this work, we develop an self-supervised approach that can extend a rob… ▽ More

    Submitted 25 June, 2021; v1 submitted 7 November, 2020; originally announced November 2020.