Zum Hauptinhalt springen

Showing 1–50 of 97 results for author: Krishnamurthy, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14799  [pdf, other

    cs.RO eess.SY

    Capture Point Control in Thruster-Assisted Bipedal Locomotion

    Authors: Shreyansh Pitroda, Aditya Bondada, Kaushik Venkatesh Krishnamurthy, Adarsh Salagame, Chenghao Wang, Taoran Liu, Bibek Gupta, Eric Sihite, Reza Nemovi, Alireza Ramezani, Morteza Gharib

    Abstract: Despite major advancements in control design that are robust to unplanned disturbances, bipedal robots are still susceptible to falling over and struggle to negotiate rough terrains. By utilizing thrusters in our bipedal robot, we can perform additional posture manipulation and expand the modes of locomotion to enhance the robot's stability and ability to negotiate rough and difficult-to-navigate… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: Submitted and to be presented at IEEE AIM 2024. arXiv admin note: substantial text overlap with arXiv:2103.15952

  2. arXiv:2406.13118  [pdf, other

    cs.RO eess.SY

    Thruster-Assisted Incline Walking

    Authors: Kaushik Venkatesh Krishnamurthy, Chenghao Wang, Shreyansh Pitroda, Adarsh Salagame, Eric Sihite, Reza Nemovi, Alireza Ramezani, Morteza Gharib

    Abstract: In this study, our aim is to evaluate the effectiveness of thruster-assisted steep slope walking for the Husky Carbon, a quadrupedal robot equipped with custom-designed actuators and plural electric ducted fans, through simulation prior to conducting experimental trials. Thruster-assisted steep slope walking draws inspiration from wing-assisted incline running (WAIR) observed in birds, and intrigu… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 7 pages, 7 figures, submitted to CDC 2024 conference. arXiv admin note: text overlap with arXiv:2405.06070

  3. arXiv:2405.07417  [pdf, other

    cs.SI eess.SP

    Identifying Hate Speech Peddlers in Online Platforms. A Bayesian Social Learning Approach for Large Language Model Driven Decision-Makers

    Authors: Adit Jain, Vikram Krishnamurthy

    Abstract: This paper studies the problem of autonomous agents performing Bayesian social learning for sequential detection when the observations of the state belong to a high-dimensional space and are expensive to analyze. Specifically, when the observations are textual, the Bayesian agent can use a large language model (LLM) as a map to get a low-dimensional private observation. The agent performs Bayesian… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  4. arXiv:2405.07415  [pdf, ps, other

    cs.LG eess.SY

    Structured Reinforcement Learning for Incentivized Stochastic Covert Optimization

    Authors: Adit Jain, Vikram Krishnamurthy

    Abstract: This paper studies how a stochastic gradient algorithm (SG) can be controlled to hide the estimate of the local stationary point from an eavesdropper. Such problems are of significant interest in distributed optimization settings like federated learning and inventory management. A learner queries a stochastic oracle and incentivizes the oracle to obtain noisy gradient measurements and perform SG.… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  5. arXiv:2405.06070  [pdf, other

    cs.RO eess.SY

    Narrow-Path, Dynamic Walking Using Integrated Posture Manipulation and Thrust Vectoring

    Authors: Kaushik Venkatesh Krishnamurthy, Chenghao Wang, Shreyansh Pitroda, Adarsh Salagame, Eric Sihite, Reza Nemovi, Alireza Ramezani, Morteza Gharib

    Abstract: This research concentrates on enhancing the navigational capabilities of Northeastern Universitys Husky, a multi-modal quadrupedal robot, that can integrate posture manipulation and thrust vectoring, to traverse through narrow pathways such as walking over pipes and slacklining. The Husky is outfitted with thrusters designed to stabilize its body during dynamic walking over these narrow paths. The… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2312.12586

  6. arXiv:2404.15391  [pdf, ps, other

    cs.GT econ.GN

    Adaptive Mechanism Design using Multi-Agent Revealed Preferences

    Authors: Luke Snow, Vikram Krishnamurthy

    Abstract: This paper constructs an algorithmic framework for adaptively achieving the mechanism design objective, finding a mechanism inducing socially optimal Nash equilibria, without knowledge of the utility functions of the agents. We consider a probing scheme where the designer can iteratively enact mechanisms and observe Nash equilibria responses. We first derive necessary and sufficient conditions, ta… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  7. arXiv:2404.00538  [pdf, ps, other

    cs.CR stat.AP

    Eclipse Attack Detection on a Blockchain Network as a Non-Parametric Change Detection Problem

    Authors: Anurag Gupta, Vikram Krishnamurthy, Brian M. Sadler

    Abstract: This paper introduces a novel non-parametric change detection algorithm to identify eclipse attacks on a blockchain network; the non-parametric algorithm relies only on the empirical mean and variance of the dataset, making it highly adaptable. An eclipse attack occurs when malicious actors isolate blockchain users, disrupting their ability to reach consensus with the broader network, thereby dist… ▽ More

    Submitted 30 May, 2024; v1 submitted 30 March, 2024; originally announced April 2024.

  8. arXiv:2403.03622  [pdf, other

    cs.GR math.AG

    Medial Parametrization of Arbitrary Planar Compact Domains with Dipoles

    Authors: Vinayak Krishnamurthy, Ergun Akleman

    Abstract: We present medial parametrization, a new approach to parameterizing any compact planar domain bounded by simple closed curves. The basic premise behind our proposed approach is to use two close Voronoi sites, which we call dipoles, to construct and reconstruct an approximate piecewise-linear version of the original boundary and medial axis through Voronoi tessellation. The boundaries and medial ax… ▽ More

    Submitted 7 March, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: 17 pages

  9. arXiv:2402.08769  [pdf, other

    cs.LG cs.DC

    FLASH: Federated Learning Across Simultaneous Heterogeneities

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: The key premise of federated learning (FL) is to train ML models across a diverse set of data-owners (clients), without exchanging local data. An overarching challenge to this date is client heterogeneity, which may arise not only from variations in data distribution, but also in data quality, as well as compute/communication latency. An integrated view of these diverse and concurrent sources of h… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  10. arXiv:2401.04130  [pdf, other

    cs.LG cs.AI

    Plug-and-Play Transformer Modules for Test-Time Adaptation

    Authors: Xiangyu Chang, Sk Miraj Ahmed, Srikanth V. Krishnamurthy, Basak Guler, Ananthram Swami, Samet Oymak, Amit K. Roy-Chowdhury

    Abstract: Parameter-efficient tuning (PET) methods such as LoRA, Adapter, and Visual Prompt Tuning (VPT) have found success in enabling adaptation to new domains by tuning small modules within a transformer model. However, the number of domains encountered during test time can be very large, and the data is usually unlabeled. Thus, adaptation to new domains is challenging; it is also impractical to generate… ▽ More

    Submitted 8 February, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

  11. arXiv:2312.12586  [pdf

    cs.RO

    Towards dynamic Narrow path walking on NU's Husky

    Authors: Kaushik Venkatesh Krishnamurthy

    Abstract: This research focuses on enabling Northeastern University's Husky, a multi-modal quadrupedal robot, to navigate narrow paths akin to various animals in nature. The Husky is equipped with thrusters to stabilize its body during dynamic maneuvers, addressing challenges inherent in aerial-legged systems. The approach involves modeling the robot as HROM (Husky Reduced Model) and creating an optimal con… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: 60 pages, 27 figures

  12. arXiv:2310.15361  [pdf, other

    cs.CG cs.GR

    Curved Space-Filling Tiles Using Voronoi Decomposition with Line, and Curve Segments Closed Under Wallpaper Symmetries

    Authors: Haard Panchal, Ergun Akleman, Vinayak Krishnamurthy, Tolga Talha Yildiz, Varda Grover

    Abstract: In this paper, we present a new approach to obtain symmetric tiles with curved edges. Our approach is based on using higher-order Voronoi sites that are closed under wallpaper symmetries. The resulting Voronoi tessellations provide us with symmetric tiles with curved edges. We have developed a web application that provides real-time tile design. Our application can be found at https://voronoi.viz.… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: 11

  13. arXiv:2309.10065  [pdf, other

    q-bio.NC cs.LG eess.IV

    Bayesian longitudinal tensor response regression for modeling neuroplasticity

    Authors: Suprateek Kundu, Alec Reinhardt, Serena Song, Joo Han, M. Lawson Meadows, Bruce Crosson, Venkatagiri Krishnamurthy

    Abstract: A major interest in longitudinal neuroimaging studies involves investigating voxel-level neuroplasticity due to treatment and other factors across visits. However, traditional voxel-wise methods are beset with several pitfalls, which can compromise the accuracy of these approaches. We propose a novel Bayesian tensor response regression approach for longitudinal imaging data, which pools informatio… ▽ More

    Submitted 18 October, 2023; v1 submitted 12 September, 2023; originally announced September 2023.

    Comments: 28 pages, 8 figures, 6 tables

  14. arXiv:2308.08825  [pdf, ps, other

    cs.LG eess.SP

    Controlling Federated Learning for Covertness

    Authors: Adit Jain, Vikram Krishnamurthy

    Abstract: A learner aims to minimize a function $f$ by repeatedly querying a distributed oracle that provides noisy gradient evaluations. At the same time, the learner seeks to hide $\arg\min f$ from a malicious eavesdropper that observes the learner's queries. This paper considers the problem of \textit{covert} or \textit{learner-private} optimization, where the learner has to dynamically choose between le… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

  15. arXiv:2308.06769  [pdf, other

    stat.ML cs.SI eess.SP

    Fréchet Statistics Based Change Point Detection in Multivariate Hawkes Process

    Authors: Rui Luo, Vikram Krishnamurthy

    Abstract: This paper proposes a new approach for change point detection in causal networks of multivariate Hawkes processes using Frechet statistics. Our method splits the point process into overlapping windows, estimates kernel matrices in each window, and reconstructs the signed Laplacians by treating the kernel matrices as the adjacency matrices of the causal network. We demonstrate the effectiveness of… ▽ More

    Submitted 15 August, 2023; v1 submitted 13 August, 2023; originally announced August 2023.

  16. arXiv:2305.05479  [pdf, other

    cs.CR cs.DC eess.SP eess.SY

    Multiple-stopping time Sequential Detection for Energy Efficient Mining in Blockchain-Enabled IoT

    Authors: Anurag Gupta, Vikram Krishnamurthy

    Abstract: What are the optimal times for an Internet of Things (IoT) device to act as a blockchain miner? The aim is to minimize the energy consumed by low-power IoT devices that log their data into a secure (tamper-proof) distributed ledger. We formulate a multiple stopping time Bayesian sequential detection problem to address energy-efficient blockchain mining for IoT devices. The objective is to identify… ▽ More

    Submitted 17 August, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

  17. arXiv:2304.09123  [pdf, other

    cs.LG stat.ML

    Finite-Sample Bounds for Adaptive Inverse Reinforcement Learning using Passive Langevin Dynamics

    Authors: Luke Snow, Vikram Krishnamurthy

    Abstract: This paper provides a finite-sample analysis of a passive stochastic gradient Langevin dynamics algorithm (PSGLD) designed to achieve adaptive inverse reinforcement learning (IRL). By passive, we mean that the noisy gradients available to the PSGLD algorithm (inverse learning process) are evaluated at randomly chosen points by an external stochastic gradient algorithm (forward learner) that aims t… ▽ More

    Submitted 27 September, 2023; v1 submitted 18 April, 2023; originally announced April 2023.

  18. arXiv:2303.16741  [pdf, other

    cs.LG cs.SI

    Who You Play Affects How You Play: Predicting Sports Performance Using Graph Attention Networks With Temporal Convolution

    Authors: Rui Luo, Vikram Krishnamurthy

    Abstract: This study presents a novel deep learning method, called GATv2-GCN, for predicting player performance in sports. To construct a dynamic player interaction graph, we leverage player statistics and their interactions during gameplay. We use a graph attention network to capture the attention that each player pays to each other, allowing for more accurate modeling of the dynamic player interactions. T… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  19. arXiv:2303.10753  [pdf, other

    cs.SI eess.SP

    Fréchet Statistics Based Change Point Detection in Dynamic Social Networks

    Authors: Rui Luo, Vikram Krishnamurthy

    Abstract: This paper proposes a method to detect change points in dynamic social networks using Fréchet statistics. We address two main questions: (1) what metric can quantify the distances between graph Laplacians in a dynamic network and enable efficient computation, and (2) how can the Fréchet statistics be extended to detect multiple change points while maintaining the significance level of the hypothes… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

  20. arXiv:2303.09990  [pdf, other

    cs.SI

    Mutual Information Measure for Glass Ceiling Effect in Preferential Attachment Models

    Authors: Rui Luo, Buddhika Nettasinghe, Vikram Krishnamurthy

    Abstract: We propose a new way to measure inequalities such as the glass ceiling effect in attributed networks. Existing measures typically rely solely on node degree distribution or degree assortativity, but our approach goes beyond these measures by using mutual information (based on Shannon and more generally, Renyi entropy) between the conditional probability distributions of node attributes given node… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

  21. arXiv:2212.02002  [pdf, other

    eess.SP cs.LG

    Adaptive ECCM for Mitigating Smart Jammers

    Authors: Kunal Pattanayak, Shashwat Jain, Vikram Krishnamurthy, Chris Berry

    Abstract: This paper considers adaptive radar electronic counter-counter measures (ECCM) to mitigate ECM by an adversarial jammer. Our ECCM approach models the jammer-radar interaction as a Principal Agent Problem (PAP), a popular economics framework for interaction between two entities with an information imbalance. In our setup, the radar does not know the jammer's utility. Instead, the radar learns the j… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

  22. arXiv:2211.06967  [pdf, ps, other

    eess.SP cs.LG

    Identifying Coordination in a Cognitive Radar Network -- A Multi-Objective Inverse Reinforcement Learning Approach

    Authors: Luke Snow, Vikram Krishnamurthy, Brian M. Sadler

    Abstract: Consider a target being tracked by a cognitive radar network. If the target can intercept some radar network emissions, how can it detect coordination among the radars? By 'coordination' we mean that the radar emissions satisfy Pareto optimality with respect to multi-objective optimization over each radar's utility. This paper provides a novel multi-objective inverse reinforcement learning approac… ▽ More

    Submitted 13 November, 2022; originally announced November 2022.

  23. arXiv:2210.11444  [pdf, other

    eess.SP cs.LG

    How can a Radar Mask its Cognition?

    Authors: Kunal Pattanayak, Vikram Krishnamurthy, Christopher Berry

    Abstract: A cognitive radar is a constrained utility maximizer that adapts its sensing mode in response to a changing environment. If an adversary can estimate the utility function of a cognitive radar, it can determine the radar's sensing strategy and mitigate the radar performance via electronic countermeasures (ECM). This paper discusses how a cognitive radar can {\em hide} its strategy from an adversary… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  24. arXiv:2209.09883  [pdf, other

    cs.CV

    Leveraging Local Patch Differences in Multi-Object Scenes for Generative Adversarial Attacks

    Authors: Abhishek Aich, Shasha Li, Chengyu Song, M. Salman Asif, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury

    Abstract: State-of-the-art generative model-based attacks against image classifiers overwhelmingly focus on single-object (i.e., single dominant object) images. Different from such settings, we tackle a more practical problem of generating adversarial perturbations using multi-object (i.e., multiple dominant objects) images as they are representative of most real-world scenes. Our goal is to design an attac… ▽ More

    Submitted 3 October, 2022; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted at WACV 2023 (Round 1), camera-ready version

  25. arXiv:2209.09502  [pdf, other

    cs.CV

    GAMA: Generative Adversarial Multi-Object Scene Attacks

    Authors: Abhishek Aich, Calvin-Khang Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury

    Abstract: The majority of methods for crafting adversarial attacks have focused on scenes with a single dominant object (e.g., images from ImageNet). On the other hand, natural scenes include multiple dominant objects that are semantically related. Thus, it is crucial to explore designing attack strategies that look beyond learning on single-object scenes or attack single-object victim classifiers. Due to t… ▽ More

    Submitted 15 October, 2022; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted at NeurIPS 2022; First two authors contributed equally; Includes Supplementary Material

  26. arXiv:2207.12254  [pdf, other

    cs.RO eess.SY

    A Letter on Progress Made on Husky Carbon: A Legged-Aerial, Multi-modal Platform

    Authors: Adarsh Salagame, Shoghair Manjikian, Chenghao Wang, Kaushik Venkatesh Krishnamurthy, Shreyansh Pitroda, Bibek Gupta, Tobias Jacob, Benjamin Mottis, Eric Sihite, Milad Ramezani, Alireza Ramezani

    Abstract: Animals, such as birds, widely use multi-modal locomotion by combining legged and aerial mobility with dominant inertial effects. The robotic biomimicry of this multi-modal locomotion feat can yield ultra-flexible systems in terms of their ability to negotiate their task spaces. The main objective of this paper is to discuss the challenges in achieving multi-modal locomotion, and to report our pro… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: arXiv admin note: text overlap with arXiv:2104.05834, arXiv:2205.06392

  27. arXiv:2207.05980  [pdf, other

    cs.SI cs.IR

    Estimating Exposure to Information on Social Networks

    Authors: Buddhika Nettasinghe, Kowe Kadoma, Mor Naaman, Vikram Krishnamurthy

    Abstract: This paper considers the problem of estimating exposure to information in a social network. Given a piece of information (e.g., a URL of a news article on Facebook, a hashtag on Twitter), our aim is to find the fraction of people on the network who have been exposed to it. The exact value of exposure to a piece of information is determined by two features: the structure of the underlying social ne… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  28. arXiv:2205.10802  [pdf, other

    cs.LG eess.SP

    Inverse-Inverse Reinforcement Learning. How to Hide Strategy from an Adversarial Inverse Reinforcement Learner

    Authors: Kunal Pattanayak, Vikram Krishnamurthy, Christopher Berry

    Abstract: Inverse reinforcement learning (IRL) deals with estimating an agent's utility function from its actions. In this paper, we consider how an agent can hide its strategy and mitigate an adversarial IRL attack; we call this inverse IRL (I-IRL). How should the decision maker choose its response to ensure a poor reconstruction of its strategy by an adversary performing IRL to estimate the agent's strate… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

  29. arXiv:2205.09732  [pdf, other

    cs.CL cs.AI

    Enhancing Slot Tagging with Intent Features for Task Oriented Natural Language Understanding using BERT

    Authors: Shruthi Hariharan, Vignesh Kumar Krishnamurthy, Utkarsh, Jayantha Gowda Sarapanahalli

    Abstract: Recent joint intent detection and slot tagging models have seen improved performance when compared to individual models. In many real-world datasets, the slot labels and values have a strong correlation with their intent labels. In such cases, the intent label information may act as a useful feature to the slot tagging model. In this paper, we examine the effect of leveraging intent label features… ▽ More

    Submitted 23 May, 2022; v1 submitted 19 May, 2022; originally announced May 2022.

    Comments: 11 pages, 1 figure

  30. arXiv:2205.01794  [pdf, other

    eess.SP cs.LG

    Meta-Cognition. An Inverse-Inverse Reinforcement Learning Approach for Cognitive Radars

    Authors: Kunal Pattanayak, Vikram Krishnamurthy, Christopher Berry

    Abstract: This paper considers meta-cognitive radars in an adversarial setting. A cognitive radar optimally adapts its waveform (response) in response to maneuvers (probes) of a possibly adversarial moving target. A meta-cognitive radar is aware of the adversarial nature of the target and seeks to mitigate the adversarial target. How should the meta-cognitive radar choose its responses to sufficiently confu… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

  31. arXiv:2203.16666  [pdf, other

    cs.NI stat.AP

    Hawkes Process Modeling of Block Arrivals in Bitcoin Blockchain

    Authors: Rui Luo, Vikram Krishnamurthy, Erik Blasch

    Abstract: The paper constructs a multi-variate Hawkes process model of Bitcoin block arrivals and price jumps. Hawkes processes are selfexciting point processes that can capture the self- and cross-excitation effects of block mining and Bitcoin price volatility. We use publicly available blockchain datasets to estimate the model parameters via maximum likelihood estimation. The results show that Bitcoin pri… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  32. arXiv:2203.15230  [pdf, other

    cs.CV cs.CR cs.LG

    Zero-Query Transfer Attacks on Context-Aware Object Detectors

    Authors: Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

    Abstract: Adversarial attacks perturb images such that a deep neural network produces incorrect classification results. A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check, wherein, if the detected objects are not consistent with an appropriately defined context, then an attack is suspected. Stronger attacks are needed to fool su… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: CVPR 2022 Accepted

  33. arXiv:2203.05643  [pdf, ps, other

    cs.NI eess.SY

    Controlling Transaction Rate in Tangle Ledger: A Principal Agent Problem Approach

    Authors: Anurag Gupta, Vikram Krishnamurthy

    Abstract: Tangle is a distributed ledger technology that stores data as a directed acyclic graph (DAG). Unlike blockchain, Tangle does not require dedicated miners for its operation; this makes Tangle suitable for Internet of Things (IoT) applications. Distributed ledgers have a built-in transaction rate control mechanism to prevent congestion and spamming; this is typically achieved by increasing or decrea… ▽ More

    Submitted 18 April, 2023; v1 submitted 10 March, 2022; originally announced March 2022.

  34. arXiv:2201.07076  [pdf, other

    cs.SI eess.SP

    Mitigating Misinformation Spread on Blockchain Enabled Social Media Networks

    Authors: Rui Luo, Vikram Krishnamurthy, Erik Blasch

    Abstract: The paper develops a blockchain protocol for a social media network (BE-SMN) to mitigate the spread of misinformation. BE-SMN is derived based on the information transmission-time distribution by modeling the misinformation transmission as double-spend attacks on blockchain. The misinformation distribution is then incorporated into the SIR (Susceptible, Infectious, or Recovered) model, which subst… ▽ More

    Submitted 1 May, 2023; v1 submitted 18 January, 2022; originally announced January 2022.

  35. arXiv:2112.03223  [pdf, other

    cs.CV cs.AI cs.LG

    Context-Aware Transfer Attacks for Object Detection

    Authors: Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

    Abstract: Blackbox transfer attacks for image classifiers have been extensively studied in recent years. In contrast, little progress has been made on transfer attacks for object detectors. Object detectors take a holistic view of the image and the detection of one object (or lack thereof) often depends on other objects in the scene. This makes such detectors inherently context-aware and adversarial attacks… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: accepted to AAAI 2022

  36. arXiv:2110.12321  [pdf, other

    cs.CV cs.LG

    ADC: Adversarial attacks against object Detection that evade Context consistency checks

    Authors: Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples, which are slightly perturbed input images which lead DNNs to make wrong predictions. To protect from such examples, various defense strategies have been proposed. A very recent defense strategy for detecting adversarial examples, that has been shown to be robust to current attacks, is to check for intrinsic conte… ▽ More

    Submitted 23 October, 2021; originally announced October 2021.

    Comments: WCAV'22 Acceptted

  37. arXiv:2110.01823  [pdf, other

    cs.CV

    Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations

    Authors: Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: When compared to the image classification models, black-box adversarial attacks against video classification models have been largely understudied. This could be possible because, with video, the temporal dimension poses significant additional challenges in gradient estimation. Query-efficient black-box attacks rely on effectively estimated gradients towards maximizing the probability of misclassi… ▽ More

    Submitted 26 October, 2021; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted at NeurIPS 2021; First two authors contributed equally; Includes Supplementary Material

  38. arXiv:2109.12727  [pdf, other

    cs.SI stat.ML

    Anomalous Edge Detection in Edge Exchangeable Social Network Models

    Authors: Rui Luo, Buddhika Nettasinghe, Vikram Krishnamurthy

    Abstract: This paper studies detecting anomalous edges in directed graphs that model social networks. We exploit edge exchangeability as a criterion for distinguishing anomalous edges from normal edges. Then we present an anomaly detector based on conformal prediction theory; this detector has a guaranteed upper bound for false positive rate. In numerical experiments, we show that the proposed algorithm ach… ▽ More

    Submitted 21 August, 2023; v1 submitted 26 September, 2021; originally announced September 2021.

  39. arXiv:2108.12741  [pdf, other

    cs.SI

    Controlling Segregation in Social Network Dynamics as an Edge Formation Game

    Authors: Rui Luo, Buddhika Nettasinghe, Vikram Krishnamurthy

    Abstract: This paper studies controlling segregation in social networks via exogenous incentives. We construct an edge formation game on a directed graph. A user (node) chooses the probability with which it forms an inter- or intra- community edge based on a utility function that reflects the tradeoff between homophily (preference to connect with individuals that belong to the same group) and the preference… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  40. arXiv:2108.08421  [pdf, other

    cs.CV cs.LG

    Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes

    Authors: Mingjun Yin, Shasha Li, Zikui Cai, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

    Abstract: Vision systems that deploy Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Recent research has shown that checking the intrinsic consistencies in the input data is a promising way to detect adversarial attacks (e.g., by checking the object co-occurrence relationships in complex scenes). However, existing approaches are tied to specific models and do not offer genera… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: ICCV'21 Accepted

  41. arXiv:2106.10363  [pdf, other

    cs.GR

    Construction of Planar and Symmetric Truss Structures with Interlocking Edge Elements

    Authors: Anantha Natarajan, Jiaqi Cui, Ergun Akleman, Vinayak Krishnamurthy

    Abstract: In this paper, we present an algorithmic approach to design and construct planar truss structures based on symmetric lattices using modular elements. The method of assembly is similar to Leonardo grids as they both rely on the property of interlocking. In theory, our modular elements can be assembled by the same type of binary operations. Our modular elements embody the principle of geometric inte… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  42. arXiv:2104.08943  [pdf, other

    cs.CL cs.AI cs.IR

    Reference-based Weak Supervision for Answer Sentence Selection using Web Data

    Authors: Vivek Krishnamurthy, Thuy Vu, Alessandro Moschitti

    Abstract: Answer sentence selection (AS2) modeling requires annotated data, i.e., hand-labeled question-answer pairs. We present a strategy to collect weakly supervised answers for a question based on its reference to improve AS2 modeling. Specifically, we introduce Reference-based Weak Supervision (RWS), a fully automatic large-scale data pipeline that harvests high-quality weakly-supervised answers from a… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

  43. arXiv:2103.15901  [pdf, other

    cs.MA

    Distributed learning in congested environments with partial information

    Authors: Tomer Boyarski, Amir Leshem, Vikram Krishnamurthy

    Abstract: How can non-communicating agents learn to share congested resources efficiently? This is a challenging task when the agents can access the same resource simultaneously (in contrast to multi-agent multi-armed bandit problems) and the resource valuations differ among agents. We present a fully distributed algorithm for learning to share in congested environments and prove that the agents' regret wit… ▽ More

    Submitted 11 May, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

  44. arXiv:2103.12149  [pdf, other

    cs.SI eess.SY physics.soc-ph stat.AP

    A Directed, Bi-Populated Preferential Attachment Model with Applications to Analyzing the Glass Ceiling Effect

    Authors: Buddhika Nettasinghe, Nazanin Alipourfard, Vikram Krishnamurthy, Kristina Lerman

    Abstract: Preferential attachment, homophily and, their consequences such as the glass ceiling effect have been well-studied in the context of undirected networks. However, the lack of an intuitive, theoretically tractable model of a directed, bi-populated~(i.e.,~containing two groups) network with variable levels of preferential attachment, homophily and growth dynamics~(e.g.,~the rate at which new nodes j… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  45. arXiv:2103.10944  [pdf, other

    physics.soc-ph cs.CY cs.DL cs.SI stat.AP

    Emergence of Structural Inequalities in Scientific Citation Networks

    Authors: Buddhika Nettasinghe, Nazanin Alipourfard, Vikram Krishnamurthy, Kristina Lerman

    Abstract: Structural inequalities persist in society, conferring systematic advantages to some people at the expense of others, for example, by giving them substantially more influence and opportunities. Using bibliometric data about authors of scientific publications, we identify two types of structural inequalities in scientific citations. First, female authors, who represent a minority of researchers, re… ▽ More

    Submitted 1 May, 2021; v1 submitted 19 March, 2021; originally announced March 2021.

  46. arXiv:2102.04594  [pdf, other

    cs.LG econ.TH

    Rationally Inattentive Utility Maximization for Interpretable Deep Image Classification

    Authors: Kunal Pattanayak, Vikram Krishnamurthy

    Abstract: Are deep convolutional neural networks (CNNs) for image classification explainable by utility maximization with information acquisition costs? We demonstrate that deep CNNs behave equivalently (in terms of necessary and sufficient conditions) to rationally inattentive utility maximizers, a generative model used extensively in economics for human decision making. Our claim is based by extensive exp… ▽ More

    Submitted 30 July, 2021; v1 submitted 8 February, 2021; originally announced February 2021.

  47. arXiv:2012.13643  [pdf, other

    cs.SI eess.SP

    Echo Chambers and Segregation in Social Networks: Markov Bridge Models and Estimation

    Authors: Rui Luo, Buddhika Nettasinghe, Vikram Krishnamurthy

    Abstract: This paper deals with the modeling and estimation of the sociological phenomena called echo chambers and segregation in social networks. Specifically, we present a novel community-based graph model that represents the emergence of segregated echo chambers as a Markov bridge process. A Markov bridge is a one-dimensional Markov random field that facilitates modeling the formation and disassociation… ▽ More

    Submitted 25 December, 2020; originally announced December 2020.

  48. You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

    Authors: Shitong Zhu, Shasha Li, Zhongjie Wang, Xun Chen, Zhiyun Qian, Srikanth V. Krishnamurthy, Kevin S. Chan, Ananthram Swami

    Abstract: As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets t… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: 12 pages, 12 figures; accepted to ACM CoNEXT 2020

  49. arXiv:2009.12690  [pdf, ps, other

    cs.LG eess.SY stat.ML

    Adaptive Non-reversible Stochastic Gradient Langevin Dynamics

    Authors: Vikram Krishnamurthy, George Yin

    Abstract: It is well known that adding any skew symmetric matrix to the gradient of Langevin dynamics algorithm results in a non-reversible diffusion with improved convergence rate. This paper presents a gradient algorithm to adaptively optimize the choice of the skew symmetric matrix. The resulting algorithm involves a non-reversible diffusion algorithm cross coupled with a stochastic gradient algorithm th… ▽ More

    Submitted 26 September, 2020; originally announced September 2020.

  50. arXiv:2009.04950  [pdf, other

    cs.LG math.OC stat.ML

    A Markov Decision Process Approach to Active Meta Learning

    Authors: Bingjia Wang, Alec Koppel, Vikram Krishnamurthy

    Abstract: In supervised learning, we fit a single statistical model to a given data set, assuming that the data is associated with a singular task, which yields well-tuned models for specific use, but does not adapt well to new contexts. By contrast, in meta-learning, the data is associated with numerous tasks, and we seek a model that may perform well on all tasks simultaneously, in pursuit of greater gene… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.