Skip to main content

Showing 1–50 of 207 results for author: Dey, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00416  [pdf, other

    cs.CL

    Too Late to Train, Too Early To Use? A Study on Necessity and Viability of Low-Resource Bengali LLMs

    Authors: Tamzeed Mahfuz, Satak Kumar Dey, Ruwad Naswan, Hasnaen Adil, Khondker Salman Sayeed, Haz Sameen Shahgir

    Abstract: Each new generation of English-oriented Large Language Models (LLMs) exhibits enhanced cross-lingual transfer capabilities and significantly outperforms older LLMs on low-resource languages. This prompts the question: Is there a need for LLMs dedicated to a particular low-resource language? We aim to explore this question for Bengali, a low-to-moderate resource Indo-Aryan language native to the Be… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  2. arXiv:2406.15953  [pdf, other

    cs.HC

    Exploring the Influence of Online Videos on Parents or Caregivers of Children with Developmental Delays

    Authors: Saquib Ahmed, Md Nazmus Sakib, Sanorita Dey

    Abstract: Developmental Delays and Disabilities (DDDs) refer to conditions where children are slower or unable to reach developmental milestones compared to typically developing children. This can cause significant stress for parents, leading to social isolation and loneliness. Online videos, particularly those on YouTube, aim to support these parents and caregivers by offering guidance and assistance. Stud… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

  3. arXiv:2406.04360  [pdf, other

    cs.SE

    Size biased Multinomial Modelling of detection data in Software testing

    Authors: Pallabi Ghosh, Ashis Kr. Chakraborty, Soumen Dey

    Abstract: Estimation of software reliability often poses a considerable challenge, particularly for critical softwares. Several methods of estimation of reliability of software are already available in the literature. But, so far almost nobody used the concept of size of a bug for estimating software reliability. In this article we make used of the bug size or the eventual bug size which helps us to determi… ▽ More

    Submitted 24 May, 2024; originally announced June 2024.

    Comments: Submitted to OPSEARCH

  4. arXiv:2405.04757  [pdf, other

    eess.SY cs.GT

    Communication-efficient and Differentially-private Distributed Nash Equilibrium Seeking with Linear Convergence

    Authors: Xiaomeng Chen, Wei Huo, Kemi Ding, Subhrakanti Dey, Ling Shi

    Abstract: The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature of distributed systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these critical concerns in isolation. This work introduces a unified framework, named CDP-NES, designed to improve communication effici… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  5. arXiv:2405.03106  [pdf, other

    eess.SY cs.GT

    Compression-based Privacy Preservation for Distributed Nash Equilibrium Seeking in Aggregative Games

    Authors: Wei Huo, Xiaomeng Chen, Kemi Ding, Subhrakanti Dey, Ling Shi

    Abstract: This paper explores distributed aggregative games in multi-agent systems. Current methods for finding distributed Nash equilibrium require players to send original messages to their neighbors, leading to communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression to save communication resources and conceal information through r… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  6. arXiv:2405.01114  [pdf, other

    cs.LG cs.RO

    Continual Imitation Learning for Prosthetic Limbs

    Authors: Sharmita Dey, Benjamin Paassen, Sarath Ravindran Nair, Sabri Boughorbel, Arndt F. Schilling

    Abstract: Lower limb amputations and neuromuscular impairments severely restrict mobility, necessitating advancements beyond conventional prosthetics. Motorized bionic limbs offer promise, but their utility depends on mimicking the evolving synergy of human movement in various settings. In this context, we present a novel model for bionic prostheses' application that leverages camera-based motion capture an… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  7. arXiv:2404.16997  [pdf, ps, other

    cs.PL cs.DM

    Probabilistic Interval Analysis of Unreliable Programs

    Authors: Dibyendu Das, Soumyajit Dey

    Abstract: Advancement of chip technology will make future computer chips faster. Power consumption of such chips shall also decrease. But this speed gain shall not come free of cost, there is going to be a trade-off between speed and efficiency, i.e accuracy of the computation. In order to achieve this extra speed we will simply have to let our computers make more mistakes in computations. Consequently, sys… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  8. arXiv:2404.12415  [pdf

    eess.IV cs.CV cs.LG

    Soil Fertility Prediction Using Combined USB-microscope Based Soil Image, Auxiliary Variables, and Portable X-Ray Fluorescence Spectrometry

    Authors: Shubhadip Dasgupta, Satwik Pate, Divya Rathore, L. G. Divyanth, Ayan Das, Anshuman Nayak, Subhadip Dey, Asim Biswas, David C. Weindorf, Bin Li, Sergio Henrique Godinho Silva, Bruno Teixeira Ribeiro, Sanjay Srivastava, Somsubhra Chakraborty

    Abstract: This study explored the application of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis to rapidly assess soil fertility, focusing on critical parameters such as available B, organic carbon (OC), available Mn, available S, and the sulfur availability index (SAI). Analyzing 1,133 soil samples from various agro-climatic zones in Eastern India, the research combined color and t… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 37 pages, 10 figures; manuscript under peer-review for publication in the jounral 'Computers and Electronics in Agriculture'

  9. arXiv:2404.00471  [pdf, other

    physics.med-ph cs.CV cs.LG eess.IV

    Score-Based Diffusion Models for Photoacoustic Tomography Image Reconstruction

    Authors: Sreemanti Dey, Snigdha Saha, Berthy T. Feng, Manxiu Cui, Laure Delisle, Oscar Leong, Lihong V. Wang, Katherine L. Bouman

    Abstract: Photoacoustic tomography (PAT) is a rapidly-evolving medical imaging modality that combines optical absorption contrast with ultrasound imaging depth. One challenge in PAT is image reconstruction with inadequate acoustic signals due to limited sensor coverage or due to the density of the transducer array. Such cases call for solving an ill-posed inverse reconstruction problem. In this work, we use… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

    Comments: 5 pages

    Journal ref: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Korea, Republic of, 2024, pp. 2470-2474

  10. arXiv:2403.10885  [pdf, other

    eess.IV cs.CV

    Could We Generate Cytology Images from Histopathology Images? An Empirical Study

    Authors: Soumyajyoti Dey, Sukanta Chakraborty, Utso Guha Roy, Nibaran Das

    Abstract: Automation in medical imaging is quite challenging due to the unavailability of annotated datasets and the scarcity of domain experts. In recent years, deep learning techniques have solved some complex medical imaging tasks like disease classification, important object localization, segmentation, etc. However, most of the task requires a large amount of annotated data for their successful implemen… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accept at International Conference on Advanced Computing and Applications(ICACA-2024)

  11. arXiv:2403.10884  [pdf, other

    cs.CV

    Fuzzy Rank-based Late Fusion Technique for Cytology image Segmentation

    Authors: Soumyajyoti Dey, Sukanta Chakraborty, Utso Guha Roy, Nibaran Das

    Abstract: Cytology image segmentation is quite challenging due to its complex cellular structure and multiple overlapping regions. On the other hand, for supervised machine learning techniques, we need a large amount of annotated data, which is costly. In recent years, late fusion techniques have given some promising performances in the field of image classification. In this paper, we have explored a fuzzy-… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Accept at International Conference on Data, Electronics and Computing (ICDEC-2023)

  12. arXiv:2403.06569  [pdf, other

    cs.LG cs.RO

    Enhancing Joint Motion Prediction for Individuals with Limb Loss Through Model Reprogramming

    Authors: Sharmita Dey, Sarath R. Nair

    Abstract: Mobility impairment caused by limb loss is a significant challenge faced by millions of individuals worldwide. The development of advanced assistive technologies, such as prosthetic devices, has the potential to greatly improve the quality of life for amputee patients. A critical component in the design of such technologies is the accurate prediction of reference joint motion for the missing limb.… ▽ More

    Submitted 12 March, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Journal ref: ICLR 2024 Workshop: Learning from Time Series for Health

  13. arXiv:2403.04974  [pdf, other

    cs.RO

    Embracing Large Language and Multimodal Models for Prosthetic Technologies

    Authors: Sharmita Dey, Arndt F. Schilling

    Abstract: This article presents a vision for the future of prosthetic devices, leveraging the advancements in large language models (LLMs) and Large Multimodal Models (LMMs) to revolutionize the interaction between humans and assistive technologies. Unlike traditional prostheses, which rely on limited and predefined commands, this approach aims to develop intelligent prostheses that understand and respond t… ▽ More

    Submitted 11 March, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

  14. arXiv:2402.14889  [pdf

    cs.CL cs.AI

    COBIAS: Contextual Reliability in Bias Assessment

    Authors: Priyanshul Govil, Hemang Jain, Vamshi Krishna Bonagiri, Aman Chadha, Ponnurangam Kumaraguru, Manas Gaur, Sanorita Dey

    Abstract: Large Language Models (LLMs) are trained on extensive web corpora, which enable them to understand and generate human-like text. However, this training process also results in inherent biases within the models. These biases arise from web data's diverse and often uncurated nature, containing various stereotypes and prejudices. Previous works on debiasing models rely on benchmark datasets to measur… ▽ More

    Submitted 17 June, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

  15. arXiv:2402.11955  [pdf, other

    cs.CL cs.AI

    Analysis of Multidomain Abstractive Summarization Using Salience Allocation

    Authors: Tohida Rehman, Raghubir Bose, Soumik Dey, Samiran Chattopadhyay

    Abstract: This paper explores the realm of abstractive text summarization through the lens of the SEASON (Salience Allocation as Guidance for Abstractive SummarizatiON) technique, a model designed to enhance summarization by leveraging salience allocation techniques. The study evaluates SEASON's efficacy by comparing it with prominent models like BART, PEGASUS, and ProphetNet, all fine-tuned for various tex… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: 11 pages, 1 figure, 4 tables

  16. arXiv:2401.16424  [pdf, other

    cs.CV q-bio.QM

    Computer Vision for Primate Behavior Analysis in the Wild

    Authors: Richard Vogg, Timo Lüddecke, Jonathan Henrich, Sharmita Dey, Matthias Nuske, Valentin Hassler, Derek Murphy, Julia Fischer, Julia Ostner, Oliver Schülke, Peter M. Kappeler, Claudia Fichtel, Alexander Gail, Stefan Treue, Hansjörg Scherberger, Florentin Wörgötter, Alexander S. Ecker

    Abstract: Advances in computer vision as well as increasingly widespread video-based behavioral monitoring have great potential for transforming how we study animal cognition and behavior. However, there is still a fairly large gap between the exciting prospects and what can actually be achieved in practice today, especially in videos from the wild. With this perspective paper, we want to contribute towards… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  17. arXiv:2312.11283  [pdf, other

    stat.AP cs.CR econ.EM

    The 2010 Census Confidentiality Protections Failed, Here's How and Why

    Authors: John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber

    Abstract: Using only 34 published tables, we reconstruct five variables (census block, sex, age, race, and ethnicity) in the confidential 2010 Census person records. Using the 38-bin age variable tabulated at the census block level, at most 20.1% of reconstructed records can differ from their confidential source on even a single value for these five variables. Using only published data, an attacker can veri… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  18. arXiv:2312.00507  [pdf, other

    cs.PL cs.CR cs.LG

    VEXIR2Vec: An Architecture-Neutral Embedding Framework for Binary Similarity

    Authors: S. VenkataKeerthy, Soumya Banerjee, Sayan Dey, Yashas Andaluri, Raghul PS, Subrahmanyam Kalyanasundaram, Fernando Magno Quintão Pereira, Ramakrishna Upadrasta

    Abstract: Binary similarity involves determining whether two binary programs exhibit similar functionality, often originating from the same source code. In this work, we propose VexIR2Vec, an approach for binary similarity using VEX-IR, an architecture-neutral Intermediate Representation (IR). We extract the embeddings from sequences of basic blocks, termed peepholes, derived by random walks on the control-… ▽ More

    Submitted 9 July, 2024; v1 submitted 1 December, 2023; originally announced December 2023.

  19. arXiv:2311.05870  [pdf

    cs.CV math.OC

    Automated Heterogeneous Low-Bit Quantization of Multi-Model Deep Learning Inference Pipeline

    Authors: Jayeeta Mondal, Swarnava Dey, Arijit Mukherjee

    Abstract: Multiple Deep Neural Networks (DNNs) integrated into single Deep Learning (DL) inference pipelines e.g. Multi-Task Learning (MTL) or Ensemble Learning (EL), etc., albeit very accurate, pose challenges for edge deployment. In these systems, models vary in their quantization tolerance and resource demands, requiring meticulous tuning for accuracy-latency balance. This paper introduces an automated h… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

    Journal ref: LBQNN@ICCV2023

  20. arXiv:2311.00343  [pdf, other

    cs.CV

    Analyzing Head Orientation of Neurotypical and Autistic Individuals in Triadic Conversations

    Authors: Onur N. Tepencelik, Wenchuan Wei, Pamela C. Cosman, Sujit Dey

    Abstract: We propose a system that estimates people's body and head orientations using low-resolution point cloud data from two LiDAR sensors. Our models make accurate estimations in real-world conversation settings where the subject moves naturally with varying head and body poses. The body orientation estimation model uses ellipse fitting while the head orientation estimation model is a pipeline of geomet… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  21. arXiv:2310.16592  [pdf, other

    cs.LG cs.DC eess.SP

    Over-the-air Federated Policy Gradient

    Authors: Huiwen Yang, Lingying Huang, Subhrakanti Dey, Ling Shi

    Abstract: In recent years, over-the-air aggregation has been widely considered in large-scale distributed learning, optimization, and sensing. In this paper, we propose the over-the-air federated policy gradient algorithm, where all agents simultaneously broadcast an analog signal carrying local information to a common wireless channel, and a central controller uses the received aggregated waveform to updat… ▽ More

    Submitted 25 February, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: To appear at IEEE ICC 2024

  22. arXiv:2310.00659  [pdf, other

    cs.CV cs.LG

    Liveness Detection Competition -- Noncontact-based Fingerprint Algorithms and Systems (LivDet-2023 Noncontact Fingerprint)

    Authors: Sandip Purnapatra, Humaira Rezaie, Bhavin Jawade, Yu Liu, Yue Pan, Luke Brosell, Mst Rumana Sumi, Lambert Igene, Alden Dimarco, Srirangaraj Setlur, Soumyabrata Dey, Stephanie Schuckers, Marco Huber, Jan Niklas Kolf, Meiling Fang, Naser Damer, Banafsheh Adami, Raul Chitic, Karsten Seelert, Vishesh Mistry, Rahul Parthe, Umit Kacar

    Abstract: Liveness Detection (LivDet) is an international competition series open to academia and industry with the objec-tive to assess and report state-of-the-art in Presentation Attack Detection (PAD). LivDet-2023 Noncontact Fingerprint is the first edition of the noncontact fingerprint-based PAD competition for algorithms and systems. The competition serves as an important benchmark in noncontact-based… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

  23. arXiv:2310.00602  [pdf, ps, other

    eess.AS cs.CL

    Wavelet Scattering Transform for Improving Generalization in Low-Resourced Spoken Language Identification

    Authors: Spandan Dey, Premjeet Singh, Goutam Saha

    Abstract: Commonly used features in spoken language identification (LID), such as mel-spectrogram or MFCC, lose high-frequency information due to windowing. The loss further increases for longer temporal contexts. To improve generalization of the low-resourced LID systems, we investigate an alternate feature representation, wavelet scattering transform (WST), that compensates for the shortcomings. To our kn… ▽ More

    Submitted 3 October, 2023; v1 submitted 1 October, 2023; originally announced October 2023.

    Comments: Accepted and presented in INTERSPEECH 2023

  24. arXiv:2309.17174  [pdf, other

    cs.LG math.OC

    FedZeN: Towards superlinear zeroth-order federated learning via incremental Hessian estimation

    Authors: Alessio Maritan, Subhrakanti Dey, Luca Schenato

    Abstract: Federated learning is a distributed learning framework that allows a set of clients to collaboratively train a model under the orchestration of a central server, without sharing raw data samples. Although in many practical scenarios the derivatives of the objective function are not available, only few works have considered the federated zeroth-order setting, in which functions can only be accessed… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

  25. arXiv:2309.03294  [pdf, other

    cs.CR

    MALITE: Lightweight Malware Detection and Classification for Constrained Devices

    Authors: Sidharth Anand, Barsha Mitra, Soumyadeep Dey, Abhinav Rao, Rupsa Dhar, Jaideep Vaidya

    Abstract: Today, malware is one of the primary cyberthreats to organizations. Malware has pervaded almost every type of computing device including the ones having limited memory, battery and computation power such as mobile phones, tablets and embedded devices like Internet-of-Things (IoT) devices. Consequently, the privacy and security of the malware infected systems and devices have been heavily jeopardiz… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  26. arXiv:2309.00993   

    cs.LG

    A Boosted Machine Learning Framework for the Improvement of Phase and Crystal Structure Prediction of High Entropy Alloys Using Thermodynamic and Configurational Parameters

    Authors: Debsundar Dey, Suchandan Das, Anik Pal, Santanu Dey, Chandan Kumar Raul, Arghya Chatterjee

    Abstract: The reason behind the remarkable properties of High-Entropy Alloys (HEAs) is rooted in the diverse phases and the crystal structures they contain. In the realm of material informatics, employing machine learning (ML) techniques to classify phases and crystal structures of HEAs has gained considerable significance. In this study, we assembled a new collection of 1345 HEAs with varying compositions… ▽ More

    Submitted 31 December, 2023; v1 submitted 2 September, 2023; originally announced September 2023.

    Comments: We want to modify this paper and extend some parts of it

  27. arXiv:2308.10015  [pdf, other

    cs.CV

    DyFFPAD: Dynamic Fusion of Convolutional and Handcrafted Features for Fingerprint Presentation Attack Detection

    Authors: Anuj Rai, Parsheel Kumar Tiwari, Jyotishna Baishya, Ram Prakash Sharma, Somnath Dey

    Abstract: Automatic fingerprint recognition systems suffer from the threat of presentation attacks due to their wide range of applications in areas including national borders and commercial applications. Presentation attacks can be performed by fabricating the fake fingerprint of a user with or without the intention of the subject. This paper presents a dynamic ensemble of deep learning and handcrafted feat… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2305.09397

  28. arXiv:2308.08941  [pdf, other

    cs.CV

    Automatic Signboard Recognition in Low Quality Night Images

    Authors: Manas Kagde, Priyanka Choudhary, Rishi Joshi, Somnath Dey

    Abstract: An essential requirement for driver assistance systems and autonomous driving technology is implementing a robust system for detecting and recognizing traffic signs. This system enables the vehicle to autonomously analyze the environment and make appropriate decisions regarding its movement, even when operating at higher frame rates. However, traffic sign images captured in inadequate lighting and… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 13 pages, CVIP 2023

  29. arXiv:2307.16710  [pdf, other

    cs.RO

    Learning whom to trust in navigation: dynamically switching between classical and neural planning

    Authors: Sombit Dey, Assem Sadek, Gianluca Monaci, Boris Chidlovskii, Christian Wolf

    Abstract: Navigation of terrestrial robots is typically addressed either with localization and mapping (SLAM) followed by classical planning on the dynamically created maps, or by machine learning (ML), often through end-to-end training with reinforcement learning (RL) or imitation learning (IL). Recently, modular designs have achieved promising results, and hybrid algorithms that combine ML with classical… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 8 pages including references. International Conference on Intelligent Robots and Systems (IROS 2023)

  30. arXiv:2306.09239  [pdf, ps, other

    q-bio.NC cs.LG eess.IV

    Exploiting the Brain's Network Structure for Automatic Identification of ADHD Subjects

    Authors: Soumyabrata Dey, Ravishankar Rao, Mubarak Shah

    Abstract: Attention Deficit Hyperactive Disorder (ADHD) is a common behavioral problem affecting children. In this work, we investigate the automatic classification of ADHD subjects using the resting state Functional Magnetic Resonance Imaging (fMRI) sequences of the brain. We show that the brain can be modeled as a functional network, and certain properties of the networks differ in ADHD subjects from cont… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  31. arXiv:2306.09206  [pdf, other

    cs.CR eess.SY

    Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks

    Authors: Sunandan Adhikary, Ipsita Koley, Arkaprava Sain, Soumyadeep das, Shuvam Saha, Soumyajit Dey

    Abstract: This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message tra… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  32. arXiv:2306.09057  [pdf, other

    cs.CR

    A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities

    Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey

    Abstract: Intelligent attackers can suitably tamper sensor/actuator data at various Smart grid surfaces causing intentional power oscillations, which if left undetected, can lead to voltage disruptions. We develop a novel combination of formal methods and machine learning tools that learns power system dynamics with the objective of generating unsafe yet stealthy false data based attack sequences. We enable… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  33. arXiv:2306.03577  [pdf, other

    cs.CV

    An Open Patch Generator based Fingerprint Presentation Attack Detection using Generative Adversarial Network

    Authors: Anuj Rai, Ashutosh Anshul, Ashwini Jha, Prayag Jain, Ramprakash Sharma, Somnath Dey

    Abstract: The low-cost, user-friendly, and convenient nature of Automatic Fingerprint Recognition Systems (AFRS) makes them suitable for a wide range of applications. This spreading use of AFRS also makes them vulnerable to various security threats. Presentation Attack (PA) or spoofing is one of the threats which is caused by presenting a spoof of a genuine fingerprint to the sensor of AFRS. Fingerprint Pre… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  34. arXiv:2305.17492  [pdf, other

    cs.LG

    Dynamic User Segmentation and Usage Profiling

    Authors: Animesh Mitra, Saswata Sahoo, Soumyabrata Dey

    Abstract: Usage data of a group of users distributed across a number of categories, such as songs, movies, webpages, links, regular household products, mobile apps, games, etc. can be ultra-high dimensional and massive in size. More often this kind of data is categorical and sparse in nature making it even more difficult to interpret any underlying hidden patterns such as clusters of users. However, if this… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

  35. arXiv:2305.10852  [pdf, other

    eess.SY cs.LG cs.MA math.OC

    Q-SHED: Distributed Optimization at the Edge via Hessian Eigenvectors Quantization

    Authors: Nicolò Dal Fabbro, Michele Rossi, Luca Schenato, Subhrakanti Dey

    Abstract: Edge networks call for communication efficient (low overhead) and robust distributed optimization (DO) algorithms. These are, in fact, desirable qualities for DO frameworks, such as federated edge learning techniques, in the presence of data and system heterogeneity, and in scenarios where internode communication is the main bottleneck. Although computationally demanding, Newton-type (NT) methods… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  36. arXiv:2305.09397  [pdf, other

    cs.CV

    EXPRESSNET: An Explainable Residual Slim Network for Fingerprint Presentation Attack Detection

    Authors: Anuj Rai, Somnath Dey

    Abstract: Presentation attack is a challenging issue that persists in the security of automatic fingerprint recognition systems. This paper proposes a novel explainable residual slim network that detects the presentation attack by representing the visual features in the input fingerprint sample. The encoder-decoder of this network along with the channel attention block converts the input sample into its hea… ▽ More

    Submitted 6 June, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:2303.01465

  37. arXiv:2305.07898  [pdf, other

    math.OC cs.LG cs.MA

    Network-GIANT: Fully distributed Newton-type optimization via harmonic Hessian consensus

    Authors: Alessio Maritan, Ganesh Sharma, Luca Schenato, Subhrakanti Dey

    Abstract: This paper considers the problem of distributed multi-agent learning, where the global aim is to minimize a sum of local objective (empirical loss) functions through local optimization and information exchange between neighbouring nodes. We introduce a Newton-type fully distributed optimization algorithm, Network-GIANT, which is based on GIANT, a Federated learning algorithm that relies on a centr… ▽ More

    Submitted 19 July, 2023; v1 submitted 13 May, 2023; originally announced May 2023.

  38. DietCNN: Multiplication-free Inference for Quantized CNNs

    Authors: Swarnava Dey, Pallab Dasgupta, Partha P Chakrabarti

    Abstract: The rising demand for networked embedded systems with machine intelligence has been a catalyst for sustained attempts by the research community to implement Convolutional Neural Networks (CNN) based inferencing on embedded resource-limited devices. Redesigning a CNN by removing costly multiplication operations has already shown promising results in terms of reducing inference energy usage. This pa… ▽ More

    Submitted 17 August, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: Supplementary for S. Dey, P. Dasgupta and P. P. Chakrabarti, "DietCNN: Multiplication-free Inference for Quantized CNNs," 2023 International Joint Conference on Neural Networks (IJCNN), Gold Coast, Australia, 2023, pp. 1-8, doi: 10.1109/IJCNN54540.2023.10191771

  39. PIKS: A Technique to Identify Actionable Trends for Policy-Makers Through Open Healthcare Data

    Authors: A. Ravishankar Rao, Subrata Garai, Soumyabrata Dey, Hang Peng

    Abstract: With calls for increasing transparency, governments are releasing greater amounts of data in multiple domains including finance, education and healthcare. The efficient exploratory analysis of healthcare data constitutes a significant challenge. Key concerns in public health include the quick identification and analysis of trends, and the detection of outliers. This allows policies to be rapidly a… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Journal ref: SN COMPUT. SCI. 2, 477 (2021)

  40. Building predictive models of healthcare costs with open healthcare data

    Authors: A. Ravishankar Rao, Subrata Garai, Soumyabrata Dey, Hang Peng

    Abstract: Due to rapidly rising healthcare costs worldwide, there is significant interest in controlling them. An important aspect concerns price transparency, as preliminary efforts have demonstrated that patients will shop for lower costs, driving efficiency. This requires the data to be made available, and models that can predict healthcare costs for a wide range of patient demographics and conditions. W… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: 2020 IEEE International Conference on Healthcare Informatics (ICHI)

  41. A system for exploring big data: an iterative k-means searchlight for outlier detection on open health data

    Authors: A. Ravishankar Rao, Daniel Clarke, Subrata Garai, Soumyabrata Dey

    Abstract: The interactive exploration of large and evolving datasets is challenging as relationships between underlying variables may not be fully understood. There may be hidden trends and patterns in the data that are worthy of further exploration and analysis. We present a system that methodically explores multiple combinations of variables using a searchlight technique and identifies outliers. An iterat… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

    Comments: 2018 International Joint Conference on Neural Networks (IJCNN)

  42. End-to-End Latency Optimization of Multi-view 3D Reconstruction for Disaster Response

    Authors: Xiaojie Zhang, Mingjun Li, Andrew Hilton, Amitangshu Pal, Soumyabrata Dey, Saptarshi Debroy

    Abstract: In order to plan rapid response during disasters, first responder agencies often adopt `bring your own device' (BYOD) model with inexpensive mobile edge devices (e.g., drones, robots, tablets) for complex video analytics applications, e.g., 3D reconstruction of a disaster scene. Unlike simpler video applications, widely used Multi-view Stereo (MVS) based 3D reconstruction applications (e.g., openM… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)

  43. DNN-based Denial of Quality of Service Attack on Software-defined Hybrid Edge-Cloud Systems

    Authors: Minh Nguyen, Jacob Gately, Swati Kar, Soumyabrata Dey, Saptarshi Debroy

    Abstract: In order to satisfy diverse quality-of-service (QoS) requirements of complex real-time video applications, civilian and tactical use cases are employing software-defined hybrid edge-cloud systems. One of the primary QoS requirements of such applications is ultra-low end-to-end latency for video applications that necessitates rapid frame transfer between end-devices and edge servers using software-… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: WAMICON 2022

  44. arXiv:2303.05459  [pdf, other

    cs.CV

    Presentation Attack Detection with Advanced CNN Models for Noncontact-based Fingerprint Systems

    Authors: Sandip Purnapatra, Conor Miller-Lynch, Stephen Miner, Yu Liu, Keivan Bahmani, Soumyabrata Dey, Stephanie Schuckers

    Abstract: Touch-based fingerprint biometrics is one of the most popular biometric modalities with applications in several fields. Problems associated with touch-based techniques such as the presence of latent fingerprints and hygiene issues due to many people touching the same surface motivated the community to look for non-contact-based solutions. For the last few years, contactless fingerprint systems are… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

  45. Real-Time Hand Gesture Identification in Thermal Images

    Authors: James Ballow, Soumyabrata Dey

    Abstract: Hand gesture-based human-computer interaction is an important problem that is well explored using color camera data. In this work we proposed a hand gesture detection system using thermal images. Our system is capable of handling multiple hand regions in a frame and process it fast for real-time applications. Our system performs a series of steps including background subtraction-based hand mask ge… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Comments: 21st International Conference on Image Analysis and Processing

  46. STEP: Stochastic Traversability Evaluation and Planning for Risk-Aware Off-road Navigation; Results from the DARPA Subterranean Challenge

    Authors: Anushri Dixit, David D. Fan, Kyohei Otsu, Sharmita Dey, Ali-Akbar Agha-Mohammadi, Joel W. Burdick

    Abstract: Although autonomy has gained widespread usage in structured and controlled environments, robotic autonomy in unknown and off-road terrain remains a difficult problem. Extreme, off-road, and unstructured environments such as undeveloped wilderness, caves, rubble, and other post-disaster sites pose unique and challenging problems for autonomous navigation. Based on our participation in the DARPA Sub… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.02828

    Journal ref: Field Robotics, 4, 2024, 182-210

  47. arXiv:2303.01547  [pdf, other

    cs.CV cs.AI

    Simultaneous prediction of hand gestures, handedness, and hand keypoints using thermal images

    Authors: Sichao Li, Sean Banerjee, Natasha Kholgade Banerjee, Soumyabrata Dey

    Abstract: Hand gesture detection is a well-explored area in computer vision with applications in various forms of Human-Computer Interactions. In this work, we propose a technique for simultaneous hand gesture classification, handedness detection, and hand keypoints localization using thermal data captured by an infrared camera. Our method uses a novel deep multi-task learning architecture that includes sha… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: ICDEC 2022

  48. arXiv:2303.01465  [pdf, other

    cs.CV

    MoSFPAD: An end-to-end Ensemble of MobileNet and Support Vector Classifier for Fingerprint Presentation Attack Detection

    Authors: Anuj Rai, Somnath Dey, Pradeep Patidar, Prakhar Rai

    Abstract: Automatic fingerprint recognition systems are the most extensively used systems for person authentication although they are vulnerable to Presentation attacks. Artificial artifacts created with the help of various materials are used to deceive these systems causing a threat to the security of fingerprint-based applications. This paper proposes a novel end-to-end model to detect fingerprint Present… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: 12 pages, 3 figures

  49. arXiv:2302.05110  [pdf, ps, other

    eess.AS cs.CL cs.LG cs.SD

    Cross-Corpora Spoken Language Identification with Domain Diversification and Generalization

    Authors: Spandan Dey, Md Sahidullah, Goutam Saha

    Abstract: This work addresses the cross-corpora generalization issue for the low-resourced spoken language identification (LID) problem. We have conducted the experiments in the context of Indian LID and identified strikingly poor cross-corpora generalization due to corpora-dependent non-lingual biases. Our contribution to this work is twofold. First, we propose domain diversification, which diversifies the… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    Comments: Accepted for publication in Elsevier Computer Speech & Language

  50. arXiv:2301.13308  [pdf, other

    cs.RO eess.SY math.OC

    Can't Touch This: Real-Time, Safe Motion Planning and Control for Manipulators Under Uncertainty

    Authors: Jonathan Michaux, Patrick Holmes, Bohao Zhang, Che Chen, Baiyue Wang, Shrey Sahgal, Tiancheng Zhang, Sidhartha Dey, Shreyas Kousik, Ram Vasudevan

    Abstract: Ensuring safe, real-time motion planning in arbitrary environments requires a robotic manipulator to avoid collisions, obey joint limits, and account for uncertainties in the mass and inertia of objects and the robot itself. This paper proposes Autonomous Robust Manipulation via Optimization with Uncertainty-aware Reachability (ARMOUR), a provably-safe, receding-horizon trajectory planner and trac… ▽ More

    Submitted 1 November, 2023; v1 submitted 30 January, 2023; originally announced January 2023.

    Comments: 20 pages, 6 figures