Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Deb, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18880  [pdf, other

    cs.CL

    SSP: Self-Supervised Prompting for Cross-Lingual Transfer to Low-Resource Languages using Large Language Models

    Authors: Vipul Rathore, Aniruddha Deb, Ankish Chandresh, Parag Singla, Mausam

    Abstract: Recently, very large language models (LLMs) have shown exceptional performance on several English NLP tasks with just in-context learning (ICL), but their utility in other languages is still underexplored. We investigate their effectiveness for NLP tasks in low-resource languages (LRLs), especially in the setting of zero-labelled cross-lingual transfer (0-CLT), where no labelled training data for… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2310.01991  [pdf, other

    cs.CL cs.AI cs.LG

    Fill in the Blank: Exploring and Enhancing LLM Capabilities for Backward Reasoning in Math Word Problems

    Authors: Aniruddha Deb, Neeva Oza, Sarthak Singla, Dinesh Khandelwal, Dinesh Garg, Parag Singla

    Abstract: While forward reasoning (i.e., find the answer given the question) has been explored extensively in recent literature, backward reasoning is relatively unexplored. We examine the backward reasoning capabilities of LLMs on Math Word Problems (MWPs): given a mathematical question and its answer, with some details omitted from the question, can LLMs effectively retrieve the missing information? On mo… ▽ More

    Submitted 7 July, 2024; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: 10 pages, 4 figures

    ACM Class: I.2.3

  3. arXiv:2306.02680  [pdf, other

    cs.CL cs.LG cs.SD eess.AS

    BeAts: Bengali Speech Acts Recognition using Multimodal Attention Fusion

    Authors: Ahana Deb, Sayan Nag, Ayan Mahapatra, Soumitri Chattopadhyay, Aritra Marik, Pijush Kanti Gayen, Shankha Sanyal, Archi Banerjee, Samir Karmakar

    Abstract: Spoken languages often utilise intonation, rhythm, intensity, and structure, to communicate intention, which can be interpreted differently depending on the rhythm of speech of their utterance. These speech acts provide the foundation of communication and are unique in expression to the language. Recent advancements in attention-based models, demonstrating their ability to learn powerful represent… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: Accepted at INTERSPEECH 2023

  4. arXiv:2011.05367  [pdf, other

    cs.SI cs.AI cs.CL

    Detecting Social Media Manipulation in Low-Resource Languages

    Authors: Samar Haider, Luca Luceri, Ashok Deb, Adam Badawy, Nanyun Peng, Emilio Ferrara

    Abstract: Social media have been deliberately used for malicious purposes, including political manipulation and disinformation. Most research focuses on high-resource languages. However, malicious actors share content across countries and languages, including low-resource ones. Here, we investigate whether and to what extent malicious actors can be detected in low-resource language settings. We discovered t… ▽ More

    Submitted 19 February, 2023; v1 submitted 10 November, 2020; originally announced November 2020.

    Journal ref: WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023, April 2023, Pages 1358-1364

  5. #Election2020: The First Public Twitter Dataset on the 2020 US Presidential Election

    Authors: Emily Chen, Ashok Deb, Emilio Ferrara

    Abstract: The integrity of democratic political discourse is at the core to guarantee free and fair elections. With social media often dictating the tones and trends of politics-related discussion, it is of paramount important to be able to study online chatter, especially in the run up to important voting events, like in the case of the upcoming November 3, 2020 U.S. Presidential Election. Limited access t… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: Our dataset is available at: https://github.com/echen102/us-pres-elections-2020

  6. arXiv:2008.11754  [pdf

    cs.RO

    Design of a sensor integrated adaptive gripper

    Authors: IA Sainul, Sankha Deb, AK Deb

    Abstract: In this paper, design and development of a sensor integrated adaptive gripper is presented. Adaptive grippers are useful for grasping objects of varied geometric shapes by wrapping fingers around the object. The finger closing sequence in adaptive grippers may lead to ejection of the object from the gripper due to any unbalanced grasping force and such grasp failure is common for lightweight objec… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: 7 pages, 13 figures

  7. arXiv:1908.00221  [pdf

    cs.RO cs.CG

    Automatic pre-grasps generation for unknown 3D objects

    Authors: IA Sainul, Sankha Deb, AK Deb

    Abstract: In this paper, the problem of automating the pre-grasps generation for novel 3d objects has been discussed. The objects represented as cloud of 3D points are split into parts and organized in a tree structure, where parts are approximated by simple box primitives. Applying grasping only on the individual object parts may miss a good grasp which involves a combination of parts. The problem has been… ▽ More

    Submitted 30 September, 2019; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: 6 pages, 10 figures

  8. arXiv:1907.09142  [pdf

    cs.RO cs.CG

    A novel object slicing based grasp planner for 3D object grasping using underactuated robot gripper

    Authors: IA Sainul, Sankha Deb, AK Deb

    Abstract: Robotic grasping of arbitrary objects even in completely known environments still remains a challenging problem. Most previously developed algorithms had focused on fingertip grasp, failing to solve the problem even for fully actuated hands/grippers during adaptive/wrapping type of grasps, where each finger makes contact with object at several points. Kinematic closed form solutions are not possib… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

    Comments: Accepted for publication in IECON-2019 the 45th Annual Conference of the IEEE Industrial Electronics Society

  9. arXiv:1902.02765  [pdf, other

    cs.SI

    Red Bots Do It Better: Comparative Analysis of Social Bot Partisan Behavior

    Authors: Luca Luceri, Ashok Deb, Adam Badawy, Emilio Ferrara

    Abstract: Recent research brought awareness of the issue of bots on social media and the significant risks of mass manipulation of public opinion in the context of political discussion. In this work, we leverage Twitter to study the discourse during the 2018 US midterm elections and analyze social bot activity and interactions with humans. We collected 2.6 million tweets for 42 days around the election day… ▽ More

    Submitted 7 February, 2019; v1 submitted 7 February, 2019; originally announced February 2019.

    Comments: arXiv admin note: text overlap with arXiv:1902.00043

  10. arXiv:1902.00043  [pdf, other

    cs.SI

    Perils and Challenges of Social Media and Election Manipulation Analysis: The 2018 US Midterms

    Authors: Ashok Deb, Luca Luceri, Adam Badawy, Emilio Ferrara

    Abstract: One of the hallmarks of a free and fair society is the ability to conduct a peaceful and seamless transfer of power from one leader to another. Democratically, this is measured in a citizen population's trust in the electoral system of choosing a representative government. In view of the well documented issues of the 2016 US Presidential election, we conducted an in-depth analysis of the 2018 US M… ▽ More

    Submitted 31 January, 2019; originally announced February 2019.

  11. arXiv:1810.08464  [pdf, ps, other

    cs.CR

    DigiLock: User-controlled and Server-aware Digital Locker System

    Authors: Atrayee Deb, Saloni Dalal, Manik Lal Das

    Abstract: The growing popularity of digital systems have paved the way for digital locker that ensures security and safety of the digital documents in store. While facilitating this system to user and availing its services offered by service provider, non-repudiation of service offered and service consumed is an important security requirement in the digital locker system. In this paper, we present a digital… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: 10 pages

  12. arXiv:1809.10158  [pdf, other

    cs.SI

    'Senator, We Sell Ads': Analysis of the 2016 Russian Facebook Ads Campaign

    Authors: Ritam Dutt, Ashok Deb, Emilio Ferrara

    Abstract: One of the key aspects of the United States democracy is free and fair elections that allow for a peaceful transfer of power from one President to the next. The 2016 US presidential election stands out due to suspected foreign influence before, during, and after the election. A significant portion of that suspected influence was carried out via social media. In this paper, we look specifically at… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

    Comments: Accepted: Third International Conference on Intelligent Information Technologies (ICIIT 2018), Chennai, India, December 11-14, 2018

  13. arXiv:1806.03342  [pdf, other

    cs.SI cs.LG stat.ML

    Discovering Signals from Web Sources to Predict Cyber Attacks

    Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman

    Abstract: Cyber attacks are growing in frequency and severity. Over the past year alone we have witnessed massive data breaches that stole personal information of millions of people and wide-scale ransomware attacks that paralyzed critical infrastructure of several countries. Combating the rising cyber threat calls for a multi-pronged strategy, which includes predicting when these attacks will occur. The in… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

  14. Social Bots for Online Public Health Interventions

    Authors: Ashok Deb, Anuja Majmundar, Sungyong Seo, Akira Matsui, Rajat Tandon, Shen Yan, Jon-Patrick Allem, Emilio Ferrara

    Abstract: According to the Center for Disease Control and Prevention, in the United States hundreds of thousands initiate smoking each year, and millions live with smoking-related dis- eases. Many tobacco users discuss their habits and preferences on social media. This work conceptualizes a framework for targeted health interventions to inform tobacco users about the consequences of tobacco use. We designed… ▽ More

    Submitted 21 April, 2018; originally announced April 2018.

    Journal ref: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, Spain, 2018, pp. 186-189

  15. Predicting Cyber Events by Leveraging Hacker Sentiment

    Authors: Ashok Deb, Kristina Lerman, Emilio Ferrara

    Abstract: Recent high-profile cyber attacks exemplify why organizations need better cyber defenses. Cyber threats are hard to accurately predict because attackers usually try to mask their traces. However, they often discuss exploits and techniques on hacking forums. The community behavior of the hackers may provide insights into groups' collective malicious activity. We propose a novel approach to predict… ▽ More

    Submitted 14 April, 2018; originally announced April 2018.

    Journal ref: Information 2018, 9(11), 280