Zum Hauptinhalt springen

Showing 1–45 of 45 results for author: Dave, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.03832  [pdf

    cs.AI

    Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning

    Authors: Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt, Rushit Dave

    Abstract: This research aims to further understanding in the field of continuous authentication using behavioral biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KN… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  2. arXiv:2403.03828  [pdf

    cs.AI

    From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics

    Authors: Rushit Dave, Marcho Handoko, Ali Rashid, Cole Schoenbauer

    Abstract: In the realm of computer security, the importance of efficient and reliable user authentication methods has become increasingly critical. This paper examines the potential of mouse movement dynamics as a consistent metric for continuous authentication. By analyzing user mouse movement patterns in two contrasting gaming scenarios, "Team Fortress" and Poly Bridge we investigate the distinctive behav… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  3. arXiv:2402.10478  [pdf, other

    cs.CV cs.LG

    CodaMal: Contrastive Domain Adaptation for Malaria Detection in Low-Cost Microscopes

    Authors: Ishan Rajendrakumar Dave, Tristan de Blegiers, Chen Chen, Mubarak Shah

    Abstract: Malaria is a major health issue worldwide, and its diagnosis requires scalable solutions that can work effectively with low-cost microscopes (LCM). Deep learning-based methods have shown success in computer-aided diagnosis from microscopic images. However, these methods need annotated images that show cells affected by malaria parasites and their life stages. Annotating images from LCM significant… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Under Review. Project Page: https://daveishan.github.io/codamal-webpage/

  4. arXiv:2312.13008  [pdf, other

    cs.CV cs.AI cs.LG

    No More Shortcuts: Realizing the Potential of Temporal Self-Supervision

    Authors: Ishan Rajendrakumar Dave, Simon Jenni, Mubarak Shah

    Abstract: Self-supervised approaches for video have shown impressive results in video understanding tasks. However, unlike early works that leverage temporal self-supervision, current state-of-the-art methods primarily rely on tasks from the image domain (e.g., contrastive learning) that do not explicitly promote the learning of temporal features. We identify two factors that limit existing temporal self-su… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: AAAI 2024 (Main Technical Track)

  5. arXiv:2310.10862  [pdf, other

    cs.RO cs.CV

    The Invisible Map: Visual-Inertial SLAM with Fiducial Markers for Smartphone-based Indoor Navigation

    Authors: Paul Ruvolo, Ayush Chakraborty, Rucha Dave, Richard Li, Duncan Mazza, Xierui Shen, Raiyan Siddique, Krishna Suresh

    Abstract: We present a system for creating building-scale, easily navigable 3D maps using mainstream smartphones. In our approach, we formulate the 3D-mapping problem as an instance of Graph SLAM and infer the position of both building landmarks (fiducial markers) and navigable paths through the environment (phone poses). Our results demonstrate the system's ability to create accurate 3D maps. Further, we h… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  6. arXiv:2308.13711  [pdf, other

    cs.CV cs.RO

    EventTransAct: A video transformer-based framework for Event-camera based action recognition

    Authors: Tristan de Blegiers, Ishan Rajendrakumar Dave, Adeel Yousaf, Mubarak Shah

    Abstract: Recognizing and comprehending human actions and gestures is a crucial perception requirement for robots to interact with humans and carry out tasks in diverse domains, including service robotics, healthcare, and manufacturing. Event cameras, with their ability to capture fast-moving objects at a high temporal resolution, offer new opportunities compared to standard action recognition in RGB videos… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: IROS 2023; The first two authors contributed equally

  7. arXiv:2308.11072  [pdf, other

    cs.CV cs.CR

    TeD-SPAD: Temporal Distinctiveness for Self-supervised Privacy-preservation for video Anomaly Detection

    Authors: Joseph Fioresi, Ishan Rajendrakumar Dave, Mubarak Shah

    Abstract: Video anomaly detection (VAD) without human monitoring is a complex computer vision task that can have a positive impact on society if implemented successfully. While recent advances have made significant progress in solving this task, most existing approaches overlook a critical real-world concern: privacy. With the increasing popularity of artificial intelligence technologies, it becomes crucial… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  8. arXiv:2308.05563  [pdf

    cs.AI cs.CY

    Recent Advancements In The Field Of Deepfake Detection

    Authors: Natalie Krueger, Mounika Vanamala, Rushit Dave

    Abstract: A deepfake is a photo or video of a person whose image has been digitally altered or partially replaced with an image of someone else. Deepfakes have the potential to cause a variety of problems and are often used maliciously. A common usage is altering videos of prominent political figures and celebrities. These deepfakes can portray them making offensive, problematic, and/or untrue statements. C… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

  9. arXiv:2305.09482  [pdf

    cs.CR cs.LG

    Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics

    Authors: Brendan Pelto, Mounika Vanamala, Rushit Dave

    Abstract: The aim of this research paper is to look into the use of continuous authentication with mobile touch dynamics, using three different algorithms: Neural Network, Extreme Gradient Boosting, and Support Vector Machine. Mobile devices are constantly increasing in popularity in the world, today smartphone subscriptions have surpassed 6 billion. Mobile touch dynamics refer to the distinct patterns of h… ▽ More

    Submitted 24 April, 2023; originally announced May 2023.

  10. arXiv:2304.14504  [pdf

    cs.CV cs.LG

    Hybrid Deepfake Detection Utilizing MLP and LSTM

    Authors: Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave

    Abstract: The growing reliance of society on social media for authentic information has done nothing but increase over the past years. This has only raised the potential consequences of the spread of misinformation. One of the growing methods in popularity is to deceive users using a deepfake. A deepfake is an invention that has come with the latest technological advancements, which enables nefarious online… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

    Comments: 5 Pages

  11. arXiv:2304.02096  [pdf, other

    astro-ph.CO astro-ph.GA cs.LG

    The CAMELS project: Expanding the galaxy formation model space with new ASTRID and 28-parameter TNG and SIMBA suites

    Authors: Yueying Ni, Shy Genel, Daniel Anglés-Alcázar, Francisco Villaescusa-Navarro, Yongseok Jo, Simeon Bird, Tiziana Di Matteo, Rupert Croft, Nianyi Chen, Natalí S. M. de Santi, Matthew Gebhardt, Helen Shao, Shivam Pandey, Lars Hernquist, Romeel Dave

    Abstract: We present CAMELS-ASTRID, the third suite of hydrodynamical simulations in the Cosmology and Astrophysics with MachinE Learning (CAMELS) project, along with new simulation sets that extend the model parameter space based on the previous frameworks of CAMELS-TNG and CAMELS-SIMBA, to provide broader training sets and testing grounds for machine-learning algorithms designed for cosmological studies.… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  12. arXiv:2304.01908  [pdf

    cs.LG cs.CR

    Leveraging Deep Learning Approaches for Deepfake Detection: A Review

    Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala

    Abstract: Conspicuous progression in the field of machine learning and deep learning have led the jump of highly realistic fake media, these media oftentimes referred as deepfakes. Deepfakes are fabricated media which are generated by sophisticated AI that are at times very difficult to set apart from the real media. So far, this media can be uploaded to the various social media platforms, hence advertising… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  13. arXiv:2303.16268  [pdf, other

    cs.CV cs.LG

    TimeBalance: Temporally-Invariant and Temporally-Distinctive Video Representations for Semi-Supervised Action Recognition

    Authors: Ishan Rajendrakumar Dave, Mamshad Nayeem Rizve, Chen Chen, Mubarak Shah

    Abstract: Semi-Supervised Learning can be more beneficial for the video domain compared to images because of its higher annotation cost and dimensionality. Besides, any video understanding task requires reasoning over both spatial and temporal dimensions. In order to learn both the static and motion related features for the semi-supervised action recognition task, existing methods rely on hard input inducti… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: CVPR-2023

  14. arXiv:2303.14090  [pdf, ps, other

    astro-ph.CO astro-ph.GA cs.LG stat.ML

    Physics-informed neural networks in the recreation of hydrodynamic simulations from dark matter

    Authors: Zhenyu Dai, Ben Moews, Ricardo Vilalta, Romeel Dave

    Abstract: Physics-informed neural networks have emerged as a coherent framework for building predictive models that combine statistical patterns with domain knowledge. The underlying notion is to enrich the optimization loss function with known relationships to constrain the space of possible solutions. Hydrodynamic simulations are a core constituent of modern cosmology, while the required computations are… ▽ More

    Submitted 19 October, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  15. arXiv:2302.10280  [pdf

    cs.CV

    Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM

    Authors: Jacob mallet, Laura Pryor, Rushit Dave, Mounika Vanamala

    Abstract: Social media is currently being used by many individuals online as a major source of information. However, not all information shared online is true, even photos and videos can be doctored. Deepfakes have recently risen with the rise of technological advancement and have allowed nefarious online users to replace one face with a computer generated face of anyone they would like, including important… ▽ More

    Submitted 26 January, 2023; originally announced February 2023.

  16. arXiv:2302.05530  [pdf

    cs.SE cs.CR cs.LG

    Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications

    Authors: Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya

    Abstract: Engineering more secure software has become a critical challenge in the cyber world. It is very important to develop methodologies, techniques, and tools for developing secure software. To develop secure software, software developers need to think like an attacker through mining software repositories. These aim to analyze and understand the data repositories related to software development. The ma… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

  17. arXiv:2210.08423  [pdf, other

    cs.CV cs.RO

    TransVisDrone: Spatio-Temporal Transformer for Vision-based Drone-to-Drone Detection in Aerial Videos

    Authors: Tushar Sangam, Ishan Rajendrakumar Dave, Waqas Sultani, Mubarak Shah

    Abstract: Drone-to-drone detection using visual feed has crucial applications, such as detecting drone collisions, detecting drone attacks, or coordinating flight with other drones. However, existing methods are computationally costly, follow non-end-to-end optimization, and have complex multi-stage pipelines, making them less suitable for real-time deployment on edge devices. In this work, we propose a sim… ▽ More

    Submitted 25 August, 2023; v1 submitted 15 October, 2022; originally announced October 2022.

    Comments: ICRA 2023

  18. arXiv:2207.13648  [pdf

    cs.HC cs.CR

    Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

    Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala

    Abstract: As technology grows and evolves rapidly, it is increasingly clear that mobile devices are more commonly used for sensitive matters than ever before. A need to authenticate users continuously is sought after as a single-factor or multi factor authentication may only initially validate a user, which does not help if an impostor can bypass this initial validation. The field of touch dynamics emerges… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  19. arXiv:2207.13644  [pdf

    cs.CV cs.AI cs.LG

    Using Deep Learning to Detecting Deepfakes

    Authors: Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala

    Abstract: In the recent years, social media has grown to become a major source of information for many online users. This has given rise to the spread of misinformation through deepfakes. Deepfakes are videos or images that replace one persons face with another computer-generated face, often a more recognizable person in society. With the recent advances in technology, a person with little technological exp… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  20. arXiv:2207.00161  [pdf

    cs.CV cs.AI

    Mitigating Presentation Attack using DCGAN and Deep CNN

    Authors: Nyle Siddiqui, Rushit Dave

    Abstract: Biometric based authentication is currently playing an essential role over conventional authentication system; however, the risk of presentation attacks subsequently rising. Our research aims at identifying the areas where presentation attack can be prevented even though adequate biometric image samples of users are limited. Our work focusses on generating photorealistic synthetic images from the… ▽ More

    Submitted 22 June, 2022; originally announced July 2022.

  21. Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication

    Authors: Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala

    Abstract: Static authentication methods, like passwords, grow increasingly weak with advancements in technology and attack strategies. Continuous authentication has been proposed as a solution, in which users who have gained access to an account are still monitored in order to continuously verify that the user is not an imposter who had access to the user credentials. Mouse dynamics is the behavior of a use… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Journal ref: Mach. Learn. Knowl. Extr. 2022

  22. arXiv:2205.08371  [pdf

    cs.CR cs.AI cs.LG

    Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

    Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone

    Abstract: The amount of secure data being stored on mobile devices has grown immensely in recent years. However, the security measures protecting this data have stayed static, with few improvements being done to the vulnerabilities of current authentication methods such as physiological biometrics or passwords. Instead of these methods, behavioral biometrics has recently been researched as a solution to the… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

  23. arXiv:2204.13589  [pdf

    cs.CV eess.SP

    A Close Look into Human Activity Recognition Models using Deep Learning

    Authors: Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala

    Abstract: Human activity recognition using deep learning techniques has become increasing popular because of its high effectivity with recognizing complex tasks, as well as being relatively low in costs compared to more traditional machine learning techniques. This paper surveys some state-of-the-art human activity recognition models that are based on deep learning architecture and has layers containing Con… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

  24. arXiv:2204.09088  [pdf

    cs.CR cs.AI

    Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

    Authors: Sara Kokal, Laura Pryor, Rushit Dave

    Abstract: Mobile devices have been manufactured and enhanced at growing rates in the past decades. While this growth has significantly evolved the capability of these devices, their security has been falling behind. This contrast in development between capability and security of mobile devices is a significant problem with the sensitive information of the public at risk. Continuing the previous work in this… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  25. arXiv:2203.15205  [pdf, other

    cs.CV cs.CR cs.LG

    SPAct: Self-supervised Privacy Preservation for Action Recognition

    Authors: Ishan Rajendrakumar Dave, Chen Chen, Mubarak Shah

    Abstract: Visual private information leakage is an emerging key issue for the fast growing applications of video understanding like activity recognition. Existing approaches for mitigating privacy leakage in action recognition require privacy labels along with the action labels from the video dataset. However, annotating frames of video dataset for privacy labels is not feasible. Recent developments of self… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: CVPR-2022

  26. arXiv:2202.02456  [pdf

    cs.NI cs.LG eess.SP

    Application of Machine Learning-Based Pattern Recognition in IoT Devices: Review

    Authors: Zachary Menter, Wei Tee, Rushit Dave

    Abstract: The Internet of things (IoT) is a rapidly advancing area of technology that has quickly become more widespread in recent years. With greater numbers of everyday objects being connected to the Internet, many different innovations have been presented to make our everyday lives more straightforward. Pattern recognition is extremely prevalent in IoT devices because of the many applications and benefit… ▽ More

    Submitted 9 January, 2022; originally announced February 2022.

  27. arXiv:2201.12705  [pdf

    cs.CV cs.CR

    A Robust Framework for Deep Learning Approaches to Facial Emotion Recognition and Evaluation

    Authors: Nyle Siddiqui, Rushit Dave, Tyler Bauer, Thomas Reither, Dylan Black, Mitchell Hanson

    Abstract: Facial emotion recognition is a vast and complex problem space within the domain of computer vision and thus requires a universally accepted baseline method with which to evaluate proposed models. While test datasets have served this purpose in the academic sphere real world application and testing of such models lacks any real comparison. Therefore we propose a framework in which models developed… ▽ More

    Submitted 29 January, 2022; originally announced January 2022.

  28. arXiv:2201.08565  [pdf

    cs.LG cs.CR

    Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning

    Authors: Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee

    Abstract: Human activity recognition has grown in popularity with its increase of applications within daily lifestyles and medical environments. The goal of having efficient and reliable human activity recognition brings benefits such as accessible use and better allocation of resources; especially in the medical industry. Activity recognition and classification can be obtained using many sophisticated data… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  29. arXiv:2201.08564  [pdf

    cs.CR cs.LG

    Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

    Authors: Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn Sowells, Jacob mallet

    Abstract: In recent years the amount of secure information being stored on mobile devices has grown exponentially. However, current security schemas for mobile devices such as physiological biometrics and passwords are not secure enough to protect this information. Behavioral biometrics have been heavily researched as a possible solution to this security deficiency for mobile devices. This study aims to con… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  30. arXiv:2201.01300  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.IM cs.AI cs.LG

    The CAMELS project: public data release

    Authors: Francisco Villaescusa-Navarro, Shy Genel, Daniel Anglés-Alcázar, Lucia A. Perez, Pablo Villanueva-Domingo, Digvijay Wadekar, Helen Shao, Faizan G. Mohammad, Sultan Hassan, Emily Moser, Erwin T. Lau, Luis Fernando Machado Poletti Valle, Andrina Nicola, Leander Thiele, Yongseok Jo, Oliver H. E. Philcox, Benjamin D. Oppenheimer, Megan Tillman, ChangHoon Hahn, Neerav Kaushal, Alice Pisani, Matthew Gebhardt, Ana Maria Delgado, Joyce Caliendo, Christina Kreisch , et al. (22 additional authors not shown)

    Abstract: The Cosmology and Astrophysics with MachinE Learning Simulations (CAMELS) project was developed to combine cosmology with astrophysics through thousands of cosmological hydrodynamic simulations and machine learning. CAMELS contains 4,233 cosmological simulations, 2,049 N-body and 2,184 state-of-the-art hydrodynamic simulations that sample a vast volume in parameter space. In this paper we present… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

    Comments: 18 pages, 3 figures. More than 350 Tb of data from thousands of simulations publicly available at https://www.camel-simulations.org

  31. The Benefits of Edge Computing in Healthcare, Smart Cities, and IoT

    Authors: Rushit Dave, Naeem Seliya, Nyle Siddiqui

    Abstract: Recent advancements in technology now allow for the generation of massive quantities of data. There is a growing need to transmit this data faster and more securely such that it cannot be accessed by malicious individuals. Edge computing has emerged in previous research as a method capable of improving data transmission times and security before the data ends up in the cloud. Edge computing has an… ▽ More

    Submitted 22 November, 2021; originally announced December 2021.

    Journal ref: Journal of Computer Sciences and Applications. 2021, 9(1), 23-34

  32. arXiv:2111.08683  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.IM cs.LG

    Inferring halo masses with Graph Neural Networks

    Authors: Pablo Villanueva-Domingo, Francisco Villaescusa-Navarro, Daniel Anglés-Alcázar, Shy Genel, Federico Marinacci, David N. Spergel, Lars Hernquist, Mark Vogelsberger, Romeel Dave, Desika Narayanan

    Abstract: Understanding the halo-galaxy connection is fundamental in order to improve our knowledge on the nature and properties of dark matter. In this work we build a model that infers the mass of a halo given the positions, velocities, stellar masses, and radii of the galaxies it hosts. In order to capture information from correlations among galaxy properties and their phase-space, we use Graph Neural Ne… ▽ More

    Submitted 8 February, 2023; v1 submitted 16 November, 2021; originally announced November 2021.

    Comments: 20 pages, 8 figures, code publicly available at https://github.com/PabloVD/HaloGraphNet

    Journal ref: ApJ 935 30 (2022)

  33. arXiv:2110.15732  [pdf

    cs.CL

    Named Entity Recognition in Unstructured Medical Text Documents

    Authors: Cole Pearson, Naeem Seliya, Rushit Dave

    Abstract: Physicians provide expert opinion to legal courts on the medical state of patients, including determining if a patient is likely to have permanent or non-permanent injuries or ailments. An independent medical examination (IME) report summarizes a physicians medical opinion about a patients health status based on the physicians expertise. IME reports contain private and sensitive information (Perso… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  34. arXiv:2110.11080  [pdf

    cs.LG cs.AI eess.SP

    Continuous Authentication Using Mouse Movements, Machine Learning, and Minecraft

    Authors: Nyle Siddiqui, Rushit Dave, Naeem Seliya

    Abstract: Mouse dynamics has grown in popularity as a novel irreproducible behavioral biometric. Datasets which contain general unrestricted mouse movements from users are sparse in the current literature. The Balabit mouse dynamics dataset produced in 2016 was made for a data science competition and despite some of its shortcomings, is considered to be the first publicly available mouse dynamics dataset. C… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  35. arXiv:2110.07832  [pdf

    cs.CR cs.LG

    A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

    Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya

    Abstract: Modern scientific advancements often contribute to the introduction and refinement of never-before-seen technologies. This can be quite the task for humans to maintain and monitor and as a result, our society has become reliant on machine learning to assist in this task. With new technology comes new methods and thus new ways to circumvent existing cyber security measures. This study examines the… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  36. arXiv:2110.07826  [pdf

    cs.CR cs.AI

    Machine Learning Algorithms In User Authentication Schemes

    Authors: Laura Pryor, Dr. Rushit Dave, Dr. Naeem Seliya, Dr. Evelyn R Sowells Boone

    Abstract: In the past two decades, the number of mobile products being created by companies has grown exponentially. However, although these devices are constantly being upgraded with the newest features, the security measures used to protect these devices has stayed relatively the same over the past two decades. The vast difference in growth patterns between devices and their security is opening up the ris… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  37. arXiv:2109.10915  [pdf, other

    cs.LG astro-ph.CO astro-ph.GA astro-ph.IM cs.CV

    The CAMELS Multifield Dataset: Learning the Universe's Fundamental Parameters with Artificial Intelligence

    Authors: Francisco Villaescusa-Navarro, Shy Genel, Daniel Angles-Alcazar, Leander Thiele, Romeel Dave, Desika Narayanan, Andrina Nicola, Yin Li, Pablo Villanueva-Domingo, Benjamin Wandelt, David N. Spergel, Rachel S. Somerville, Jose Manuel Zorrilla Matilla, Faizan G. Mohammad, Sultan Hassan, Helen Shao, Digvijay Wadekar, Michael Eickenberg, Kaze W. K. Wong, Gabriella Contardo, Yongseok Jo, Emily Moser, Erwin T. Lau, Luis Fernando Machado Poletti Valle, Lucia A. Perez , et al. (3 additional authors not shown)

    Abstract: We present the Cosmology and Astrophysics with MachinE Learning Simulations (CAMELS) Multifield Dataset, CMD, a collection of hundreds of thousands of 2D maps and 3D grids containing many different properties of cosmic gas, dark matter, and stars from 2,000 distinct simulated universes at several cosmic times. The 2D maps and 3D grids represent cosmic regions that span $\sim$100 million light year… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: 17 pages, 1 figure. Third paper of a series of four. Hundreds of thousands of labeled 2D maps and 3D grids from thousands of simulated universes publicly available at https://camels-multifield-dataset.readthedocs.io

  38. arXiv:2109.10360  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.IM cs.CV cs.LG

    Robust marginalization of baryonic effects for cosmological inference at the field level

    Authors: Francisco Villaescusa-Navarro, Shy Genel, Daniel Angles-Alcazar, David N. Spergel, Yin Li, Benjamin Wandelt, Leander Thiele, Andrina Nicola, Jose Manuel Zorrilla Matilla, Helen Shao, Sultan Hassan, Desika Narayanan, Romeel Dave, Mark Vogelsberger

    Abstract: We train neural networks to perform likelihood-free inference from $(25\,h^{-1}{\rm Mpc})^2$ 2D maps containing the total mass surface density from thousands of hydrodynamic simulations of the CAMELS project. We show that the networks can extract information beyond one-point functions and power spectra from all resolved scales ($\gtrsim 100\,h^{-1}{\rm kpc}$) while performing a robust marginalizat… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: 7 pages, 4 figures. Second paper of a series of four. The 2D maps, codes, and network weights used in this paper are publicly available at https://camels-multifield-dataset.readthedocs.io

  39. arXiv:2109.09747  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.IM cs.CV cs.LG

    Multifield Cosmology with Artificial Intelligence

    Authors: Francisco Villaescusa-Navarro, Daniel Anglés-Alcázar, Shy Genel, David N. Spergel, Yin Li, Benjamin Wandelt, Andrina Nicola, Leander Thiele, Sultan Hassan, Jose Manuel Zorrilla Matilla, Desika Narayanan, Romeel Dave, Mark Vogelsberger

    Abstract: Astrophysical processes such as feedback from supernovae and active galactic nuclei modify the properties and spatial distribution of dark matter, gas, and galaxies in a poorly understood way. This uncertainty is one of the main theoretical obstacles to extract information from cosmological surveys. We use 2,000 state-of-the-art hydrodynamic simulations from the CAMELS project spanning a wide vari… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

    Comments: 11 pages, 7 figures. First paper of a series of four. All 2D maps, codes, and networks weights publicly available at https://camels-multifield-dataset.readthedocs.io

  40. arXiv:2109.02695  [pdf

    cs.CR

    IoT Security and Authentication schemes Based on Machine Learning: Review

    Authors: Rushit Dave

    Abstract: With the latest developments in technology, extra and extra human beings depend on their private gadgets to keep their touchy information. Concurrently, the surroundings in which these gadgets are linked have grown to grow to be greater dynamic and complex. This opens the dialogue of if the modern day authentication strategies being used in these gadgets are dependable ample to preserve these user… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

  41. arXiv:2109.02692  [pdf

    cs.SD cs.LG eess.AS

    Machine Learning: Challenges, Limitations, and Compatibility for Audio Restoration Processes

    Authors: Owen Casey, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone

    Abstract: In this paper machine learning networks are explored for their use in restoring degraded and compressed speech audio. The project intent is to build a new trained model from voice data to learn features of compression artifacting distortion introduced by data loss from lossy compression and resolution loss with an existing algorithm presented in SEGAN: Speech Enhancement Generative Adversarial Net… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: 6 pages, 2 figures

  42. arXiv:1803.07288   

    cs.CV

    Face Recognition Techniques: A Survey

    Authors: Raunak Dave, Ankit Vyas, Nikita P Desai

    Abstract: Nowadays research has expanded to extracting auxiliary information from various biometric techniques like fingerprints, face, iris, palm and voice . This information contains some major features like gender, age, beard, mustache, scars, height, hair, skin color, glasses, weight, facial marks and tattoos. All this information contributes strongly to identification of human. The major challenges tha… ▽ More

    Submitted 30 January, 2021; v1 submitted 20 March, 2018; originally announced March 2018.

    Comments: Work in progress

  43. arXiv:1503.04194  [pdf, other

    astro-ph.IM cs.DL

    ADS: The Next Generation Search Platform

    Authors: Alberto Accomazzi, Michael J. Kurtz, Edwin A. Henneken, Roman Chyla, James Luker, Carolyn S. Grant, Donna M. Thompson, Alexandra Holachek, Rahul Dave, Stephen S. Murray

    Abstract: Four years after the last LISA meeting, the NASA Astrophysics Data System (ADS) finds itself in the middle of major changes to the infrastructure and contents of its database. In this paper we highlight a number of features of great importance to librarians and discuss the additional functionality that we are currently developing. Starting in 2011, the ADS started to systematically collect, parse… ▽ More

    Submitted 13 March, 2015; originally announced March 2015.

    Comments: Submitted to Library and Information Services in Astronomy VII, Naples, Italy

  44. arXiv:1207.6448  [pdf

    cs.DB cs.IR

    Query Optimization Over Web Services Using A Mixed Approach

    Authors: Debajyoti Mukhopadhyay, Dhaval Chandarana, Rutvi Dave, Sharyu Page, Shikha Gupta

    Abstract: A Web Service Management System (WSMS) can be well-thought-out as a consistent and a secure way of managing the web services. Web Service has become a quintessential part of the web world, managing and sharing the resources of the business it is associated with. In this paper, we focus on the query optimization aspect of handling the "natural language" query, queried to the WSMS. The map-select-co… ▽ More

    Submitted 27 July, 2012; originally announced July 2012.

    Comments: 10 pages, 1 figure

    Journal ref: Advances in Computing & Inf. Technology, AISC 178, pp.381-389, 2012

  45. arXiv:1103.5958  [pdf, other

    astro-ph.IM cs.DL

    Semantic Interlinking of Resources in the Virtual Observatory Era

    Authors: Alberto Accomazzi, Rahul Dave

    Abstract: In the coming era of data-intensive science, it will be increasingly important to be able to seamlessly move between scientific results, the data analyzed in them, and the processes used to produce them. As observations, derived data products, publications, and object metadata are curated by different projects and archived in different locations, establishing the proper linkages between these reso… ▽ More

    Submitted 30 March, 2011; originally announced March 2011.

    Comments: 10 pages, 3 figures, to appear in: ASPC 442 (2011), Proceedings of Astronomical Data Analysis Software and Systems XX