Zum Hauptinhalt springen

Showing 1–27 of 27 results for author: Jha, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10893  [pdf, other

    eess.IV cs.AI cs.CV q-bio.QM q-bio.TO

    Development and Validation of Fully Automatic Deep Learning-Based Algorithms for Immunohistochemistry Reporting of Invasive Breast Ductal Carcinoma

    Authors: Sumit Kumar Jha, Purnendu Mishra, Shubham Mathur, Gursewak Singh, Rajiv Kumar, Kiran Aatre, Suraj Rengarajan

    Abstract: Immunohistochemistry (IHC) analysis is a well-accepted and widely used method for molecular subtyping, a procedure for prognosis and targeted therapy of breast carcinoma, the most common type of tumor affecting women. There are four molecular biomarkers namely progesterone receptor (PR), estrogen receptor (ER), antigen Ki67, and human epidermal growth factor receptor 2 (HER2) whose assessment is n… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  2. arXiv:2406.05828  [pdf, other

    cs.CV cs.AI eess.IV

    Multi-Stain Multi-Level Convolutional Network for Multi-Tissue Breast Cancer Image Segmentation

    Authors: Akash Modi, Sumit Kumar Jha, Purnendu Mishra, Rajiv Kumar, Kiran Aatre, Gursewak Singh, Shubham Mathur

    Abstract: Digital pathology and microscopy image analysis are widely employed in the segmentation of digitally scanned IHC slides, primarily to identify cancer and pinpoint regions of interest (ROI) indicative of tumor presence. However, current ROI segmentation models are either stain-specific or suffer from the issues of stain and scanner variance due to different staining protocols or modalities across m… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  3. arXiv:2404.07139  [pdf, other

    cs.AI cs.GT

    Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also be exploited to carry out privacy threats such as membership inference attacks (MIA). Existing works have only analyzed MIA in a single "what if" interaction scenario between an adversary and the target ML model; thus, it does not discern the factors impacting the capab… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02659

  4. arXiv:2309.16436  [pdf, other

    cs.AI cs.LO

    Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving

    Authors: Sumit Kumar Jha, Susmit Jha, Patrick Lincoln, Nathaniel D. Bastian, Alvaro Velasquez, Rickard Ewetz, Sandeep Neema

    Abstract: Generative large language models (LLMs) with instruct training such as GPT-4 can follow human-provided instruction prompts and generate human-like responses to these prompts. Apart from natural language responses, they have also been found to be effective at generating formal artifacts such as code, plans, and logical specifications from natural language prompts. Despite their remarkably improved… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 25 pages, 7 figures

  5. arXiv:2309.15386  [pdf, other

    cs.LG cs.AI

    Neural Stochastic Differential Equations for Robust and Explainable Analysis of Electromagnetic Unintended Radiated Emissions

    Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Alvaro Velasquez

    Abstract: We present a comprehensive evaluation of the robustness and explainability of ResNet-like models in the context of Unintended Radiated Emission (URE) classification and suggest a new approach leveraging Neural Stochastic Differential Equations (SDEs) to address identified limitations. We provide an empirical demonstration of the fragility of ResNet-like models to Gaussian noise perturbations, wher… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 11 pages, 3 figures, 4 tables

  6. arXiv:2303.09150  [pdf, other

    cs.CR cs.HC

    MASCARA: Systematically Generating Memorable And Secure Passphrases

    Authors: Avirup Mukherjee, Kousshik Murali, Shivam Kumar Jha, Niloy Ganguly, Rahul Chatterjee, Mainack Mondal

    Abstract: Passwords are the most common mechanism for authenticating users online. However, studies have shown that users find it difficult to create and manage secure passwords. To that end, passphrases are often recommended as a usable alternative to passwords, which would potentially be easy to remember and hard to guess. However, as we show, user-chosen passphrases fall short of being secure, while stat… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Comments: This paper appeared on ACM ASIACCS '23 conference. The pdf includes Github repository with all data and code

  7. arXiv:2207.12231  [pdf, other

    cs.AR

    FAT-PIM: Low-Cost Error Detection for Processing-In-Memory

    Authors: Kazi Abu Zubair, Sumit Kumar Jha, David Mohaisen, Clayton Hughes, Amro Awad

    Abstract: Processing In Memory (PIM) accelerators are promising architecture that can provide massive parallelization and high efficiency in various applications. Such architectures can instantaneously provide ultra-fast operation over extensive data, allowing real-time performance in data-intensive workloads. For instance, Resistive Memory (ReRAM) based PIM architectures are widely known for their inherent… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: This paper is currently under submission. We arXiv our paper to establish credit for inventing this work

  8. A Construction of Type-II ZCCS for the MC-CDMA System with Low PMEPR

    Authors: Rajen Kumar, Sushant Kumar Jha, Prashant Kumar Srivastava, Sudhan Majhi

    Abstract: In this letter, we propose a novel construction of type-II $Z$-complementary code set (ZCCS) having arbitrary sequence length using the Kronecker product between a complete complementary code (CCC) and mutually orthogonal uni-modular sequences. In this construction, Barker sequences are used to reduce row sequence peak-to-mean envelope power ratio (PMEPR) for some specific lengths sequence and col… ▽ More

    Submitted 22 August, 2023; v1 submitted 6 July, 2022; originally announced July 2022.

  9. arXiv:2202.02659   

    cs.GT cs.LG

    A Game-theoretic Understanding of Repeated Explanations in ML Models

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory. In this game, a malicious end-user must strategically decide when to stop querying and attempt to compromise the system, while… ▽ More

    Submitted 22 August, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: The problem statement has been changed. Thus, the whole paper has been updated. As a result, the previous analysis and the experimental results are inaccurate

  10. arXiv:2109.05222  [pdf, ps, other

    cs.IT cs.LG eess.SP stat.ML

    Fundamental limits of over-the-air optimization: Are analog schemes optimal?

    Authors: Shubham K Jha, Prathamesh Mayekar, Himanshu Tyagi

    Abstract: We consider over-the-air convex optimization on a $d-$dimensional space where coded gradients are sent over an additive Gaussian noise channel with variance $σ^2$. The codewords satisfy an average power constraint $P$, resulting in the signal-to-noise ratio (SNR) of $P/σ^2$. We derive bounds for the convergence rates for over-the-air optimization. Our first result is a lower bound for the converge… ▽ More

    Submitted 15 September, 2021; v1 submitted 11 September, 2021; originally announced September 2021.

    Comments: Few typos fixed and one reference added. An abridged version of this paper will appear in the proceedings of IEEE Global Communications Conference (GLOBECOM), Spain, 2021

  11. arXiv:2109.04460  [pdf, other

    q-bio.BM cs.LG

    Protein Folding Neural Networks Are Not Robust

    Authors: Sumit Kumar Jha, Arvind Ramanathan, Rickard Ewetz, Alvaro Velasquez, Susmit Jha

    Abstract: Deep neural networks such as AlphaFold and RoseTTAFold predict remarkably accurate structures of proteins compared to other algorithmic approaches. It is known that biologically small perturbations in the protein sequence do not lead to drastic changes in the protein structure. In this paper, we demonstrate that RoseTTAFold does not exhibit such a robustness despite its high accuracy, and biologic… ▽ More

    Submitted 19 September, 2021; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: 8 pages, 5 figures

  12. arXiv:2108.12768  [pdf, other

    cs.LG cs.CV

    CrossedWires: A Dataset of Syntactically Equivalent but Semantically Disparate Deep Learning Models

    Authors: Max Zvyagin, Thomas Brettin, Arvind Ramanathan, Sumit Kumar Jha

    Abstract: The training of neural networks using different deep learning frameworks may lead to drastically differing accuracy levels despite the use of the same neural network architecture and identical training hyperparameters such as learning rate and choice of optimization algorithms. Currently, our ability to build standardized deep learning models is limited by the availability of a suite of neural net… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

    Comments: 13 pages

  13. arXiv:2108.00640  [pdf, ps, other

    cs.LG eess.SP

    Few-shot calibration of low-cost air pollution (PM2.5) sensors using meta-learning

    Authors: Kalpit Yadav, Vipul Arora, Sonu Kumar Jha, Mohit Kumar, Sachchida Nand Tripathi

    Abstract: Low-cost particulate matter sensors are transforming air quality monitoring because they have lower costs and greater mobility as compared to reference monitors. Calibration of these low-cost sensors requires training data from co-deployed reference monitors. Machine Learning based calibration gives better performance than conventional techniques, but requires a large amount of training data from… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: 3+1 pages, submitted to IEEE sensors conference 2021

  14. arXiv:2009.08097  [pdf, other

    cs.LG cs.AI stat.ML

    An Extension of Fano's Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

    Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami

    Abstract: Deep neural networks have been shown to be vulnerable to membership inference attacks wherein the attacker aims to detect whether specific input data were used to train the model. These attacks can potentially leak private or proprietary data. We present a new extension of Fano's inequality and employ it to theoretically establish that the probability of success for a membership inference attack o… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: 9 pages, 3 figures

    ACM Class: I.2.0

  15. arXiv:2009.05669  [pdf, other

    cs.LG cs.CR stat.ML

    Quantifying Membership Inference Vulnerability via Generalization Gap and Other Model Metrics

    Authors: Jason W. Bentley, Daniel Gibney, Gary Hoppenworth, Sumit Kumar Jha

    Abstract: We demonstrate how a target model's generalization gap leads directly to an effective deterministic black box membership inference attack (MIA). This provides an upper bound on how secure a model can be to MIA based on a simple metric. Moreover, this attack is shown to be optimal in the expected sense given access to only certain likely obtainable metrics regarding the network's training and perfo… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

  16. arXiv:2007.15906  [pdf, other

    cs.NI

    A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases

    Authors: Weitao Xu, Jin Zhang, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu, Prasant Misra

    Abstract: Deployment of Internet of Things (IoT) in smart buildings has received considerable interest from both the academic community and commercial sectors. Unfortunately, widespread adoption of current smart building solutions is inhibited by the high costs associated with installation and maintenance. Moreover, different types of IoT devices from different manufacturers typically form distinct networks… ▽ More

    Submitted 31 July, 2020; originally announced July 2020.

    Comments: 7 pages, 5 figures

  17. arXiv:1911.11378  [pdf, other

    cs.LG cs.CV cs.MM eess.IV stat.ML

    Text2FaceGAN: Face Generation from Fine Grained Textual Descriptions

    Authors: Osaid Rehman Nasir, Shailesh Kumar Jha, Manraj Singh Grover, Yi Yu, Ajit Kumar, Rajiv Ratn Shah

    Abstract: Powerful generative adversarial networks (GAN) have been developed to automatically synthesize realistic images from text. However, most existing tasks are limited to generating simple images such as flowers from captions. In this work, we extend this problem to the less addressed domain of face generation from fine-grained textual descriptions of face, e.g., "A person has curly hair, oval face, a… ▽ More

    Submitted 26 November, 2019; originally announced November 2019.

  18. arXiv:1903.05821  [pdf, other

    cs.LG stat.ML

    Attribution-driven Causal Analysis for Detection of Adversarial Examples

    Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami

    Abstract: Attribution methods have been developed to explain the decision of a machine learning model on a given input. We use the Integrated Gradient method for finding attributions to define the causal neighborhood of an input by incrementally masking high attribution features. We study the robustness of machine learning models on benign and adversarial inputs in this neighborhood. Our study indicates tha… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

    Comments: 11 pages, 6 figures

  19. arXiv:1611.07336  [pdf, other

    cs.DS

    Asymptotic expansions for factorial moments of some distributions in the analysis of algorithms

    Authors: Sumit Kumar Jha

    Abstract: We establish asymptotic expansions for factorial moments of following distributions: number of cycles in a random permutation, number of inversions in a random permutation, and number of comparisons used by the randomized quick sort algorithm.To achieve this we use singularity analysis of certain type of generating functions due to Flajolet and Odlyzko.

    Submitted 22 November, 2016; originally announced November 2016.

  20. arXiv:1611.04784  [pdf, other

    cs.DS

    Rate of convergence of major cost incurred in the in-situ permutation algorithm

    Authors: Sumit Kumar Jha

    Abstract: The in-situ permutation algorithm due to MacLeod replaces $(x_{1},\cdots,x_{n})$ by $(x_{p(1)},\cdots,x_{p(n)})$ where $π=(p(1),\cdots,p(n))$ is a permutation of $\{1,2,\cdots,n\}$ using at most $O(1)$ space. Kirshenhofer, Prodinger and Tichy have shown that the major cost incurred in the algorithm satisfies a recurrence similar to sequence of the number of key comparisons needed by the Quicksort… ▽ More

    Submitted 15 November, 2016; originally announced November 2016.

  21. arXiv:1611.01029  [pdf, other

    cs.CC

    On the Sum of Linear Coefficients of a Boolean Valued Function

    Authors: Sumit Kumar Jha

    Abstract: Let $f:\{-1,1\}^{n}\rightarrow \{-1,1\}$ be a Boolean valued function having total degree $d$. Then a conjecture due to Servedio and Gopalan asserts that $\sum_{i=1}^{n}\widehat{f}(i)\leq \sum_{j=1}^{d}\widehat{\text{Maj}}_{d}(j)$ where $\text{Maj}_{d}$ is the majority function on $d$ bits. Here we give some alternative formalisms of this conjecture involving the discrete derivative operators on… ▽ More

    Submitted 6 November, 2016; v1 submitted 3 November, 2016; originally announced November 2016.

  22. arXiv:1610.05656  [pdf, other

    cs.DS

    Asymptotic expansions for moments of number of comparisons used by the randomized quick sort algorithm

    Authors: Sumit Kumar Jha

    Abstract: We calculate asymptotic expansions for the moments of number of comparisons used by the randomized quick sort algorithm using the singularity analysis of certain generating functions.

    Submitted 18 March, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    MSC Class: 68W40

  23. Revisiting calculation of moments of number of comparisons used by the randomized quick sort algorithm

    Authors: Sumit Kumar Jha

    Abstract: We revisit the method of Kirschenhofer, Prodinger and Tichy to calculate the moments of comparisons used by the quick sort algorithm. We reemphasize that this approach helps in calculating these quantities with less computation. We also point out that as observed by Knuth this method also gives moments for total path length of a binary search tree built over a random set of n keys.

    Submitted 21 October, 2016; v1 submitted 7 September, 2016; originally announced September 2016.

    MSC Class: 68W40

    Journal ref: Discrete Math, Algorithms and Appications. 9(1): 1-6 (2017)

  24. arXiv:1408.0979  [pdf, other

    cs.DC cs.LO

    Distributed Markov Chains

    Authors: Sumit Kumar Jha, Madhavan Mukund, Ratul Saha, P S Thiagarajan

    Abstract: The formal verification of large probabilistic models is important and challenging. Exploiting the concurrency that is often present is one way to address this problem. Here we study a restricted class of asynchronous distributed probabilistic systems in which the synchronizations determine the probability distribution for the next moves of the participating agents. The key restriction we impose i… ▽ More

    Submitted 5 August, 2014; originally announced August 2014.

    ACM Class: D.2.4; F.1.2; F.3.1; F.4.1

  25. arXiv:1204.1576  [pdf

    cs.AI

    Development of knowledge Base Expert System for Natural treatment of Diabetes disease

    Authors: Sanjeev Kumar Jha

    Abstract: The development of expert system for treatment of Diabetes disease by using natural methods is new information technology derived from Artificial Intelligent research using ESTA (Expert System Text Animation) System. The proposed expert system contains knowledge about various methods of natural treatment methods (Massage, Herbal/Proper Nutrition, Acupuncture, Gems) for Diabetes diseases of Human B… ▽ More

    Submitted 6 April, 2012; originally announced April 2012.

    Journal ref: International Journal of Advanced Computer Science and Applications(IJACSA)Volume 3 Issue 3 March 2012 Published

  26. arXiv:0710.3764  [pdf, ps, other

    cs.LO

    Design of a Distributed Reachability Algorithm for Analysis of Linear Hybrid Automata

    Authors: Sumit Kumar Jha

    Abstract: This paper presents the design of a novel distributed algorithm d-IRA for the reachability analysis of linear hybrid automata. Recent work on iterative relaxation abstraction (IRA) is leveraged to distribute the computational problem among multiple computational nodes in a non-redundant manner by performing careful infeasibility analysis of linear programs corresponding to spurious counterexampl… ▽ More

    Submitted 19 October, 2007; originally announced October 2007.

    Comments: 8 pages

  27. arXiv:cs/0611051  [pdf, ps, other

    cs.LO

    Numerical Simulation guided Lazy Abstraction Refinement for Nonlinear Hybrid Automata

    Authors: Sumit Kumar Jha

    Abstract: This draft suggests a new counterexample guided abstraction refinement (CEGAR) framework that uses the combination of numerical simulation for nonlinear differential equations with linear programming for linear hybrid automata (LHA) to perform reachability analysis on nonlinear hybrid automata. A notion of $ε-$ structural robustness is also introduced which allows the algorithm to validate count… ▽ More

    Submitted 13 November, 2006; originally announced November 2006.

    Comments: 11 pages, 2 figures

    ACM Class: B.5.2