Zum Hauptinhalt springen

Showing 1–50 of 60 results for author: Maiti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11207  [pdf, other

    cs.CV cs.AI

    Quantum Inverse Contextual Vision Transformers (Q-ICVT): A New Frontier in 3D Object Detection for AVs

    Authors: Sanjay Bhargav Dharavath, Tanmoy Dam, Supriyo Chakraborty, Prithwiraj Roy, Aniruddha Maiti

    Abstract: The field of autonomous vehicles (AVs) predominantly leverages multi-modal integration of LiDAR and camera data to achieve better performance compared to using a single modality. However, the fusion process encounters challenges in detecting distant objects due to the disparity between the high resolution of cameras and the sparse data from LiDAR. Insufficient integration of global perspectives wi… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: The paper has been accepted as a short paper at CIKM '24

  2. arXiv:2407.17672  [pdf, other

    cs.LG cs.AI

    Spiking Neural Networks in Vertical Federated Learning: Performance Trade-offs

    Authors: Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala

    Abstract: Federated machine learning enables model training across multiple clients while maintaining data privacy. Vertical Federated Learning (VFL) specifically deals with instances where the clients have different feature sets of the same samples. As federated learning models aim to improve efficiency and adaptability, innovative neural network architectures like Spiking Neural Networks (SNNs) are being… ▽ More

    Submitted 13 August, 2024; v1 submitted 24 July, 2024; originally announced July 2024.

  3. arXiv:2406.10279  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs

    Authors: Joseph Spracklen, Raveen Wijewickrama, A H M Nazmus Sakib, Anindya Maiti, Murtuza Jadliwala

    Abstract: The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating Large Language Models (LLMs), has created a new type of threat to the software supply chain: package hallucinations. These hallucinations, which arise from fact-conflicting errors when generating code using LLMs, re… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 18 pages, 8 figures, 7 tables

  4. arXiv:2405.18626  [pdf, other

    cs.LG cs.AI

    Causal Contextual Bandits with Adaptive Context

    Authors: Rahul Madhavan, Aurghya Maiti, Gaurav Sinha, Siddharth Barman

    Abstract: We study a variant of causal contextual bandits where the context is chosen based on an initial intervention chosen by the learner. At the beginning of each round, the learner selects an initial action, depending on which a stochastic context is revealed by the environment. Following this, the learner then selects a final action and receives a reward. Given $T$ rounds of interactions with the envi… ▽ More

    Submitted 2 June, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: Reinforcement Learning Conference (RLC) 2024, 10 pages (31 pages including appendix), 8 plots. arXiv admin note: text overlap with arXiv:2111.00886

  5. arXiv:2405.18247  [pdf, other

    cs.CV eess.IV

    Generating Print-Ready Personalized AI Art Products from Minimal User Inputs

    Authors: Noah Pursell, Anindya Maiti

    Abstract: We present a novel framework to advance generative artificial intelligence (AI) applications in the realm of printed art products, specifically addressing large-format products that require high-resolution artworks. The framework consists of a pipeline that addresses two major challenges in the domain: the high complexity of generating effective prompts, and the low native resolution of images pro… ▽ More

    Submitted 28 March, 2024; originally announced May 2024.

  6. arXiv:2405.17538  [pdf, other

    hep-th cond-mat.dis-nn cs.LG

    Bayesian RG Flow in Neural Network Field Theories

    Authors: Jessica N. Howard, Marc S. Klinger, Anindita Maiti, Alexander G. Stapleton

    Abstract: The Neural Network Field Theory correspondence (NNFT) is a mapping from neural network (NN) architectures into the space of statistical field theories (SFTs). The Bayesian renormalization group (BRG) is an information-theoretic coarse graining scheme that generalizes the principles of the Exact Renormalization Group (ERG) to arbitrarily parameterized probability distributions, including those of N… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: 46 pages, 10 figures, 2 tables

  7. arXiv:2405.11751  [pdf, other

    stat.ML cond-mat.dis-nn cs.LG

    Asymptotic theory of in-context learning by linear attention

    Authors: Yue M. Lu, Mary I. Letey, Jacob A. Zavatone-Veth, Anindita Maiti, Cengiz Pehlevan

    Abstract: Transformers have a remarkable ability to learn and execute tasks based on examples provided within the input itself, without explicit prior training. It has been argued that this capability, known as in-context learning (ICL), is a cornerstone of Transformers' success, yet questions about the necessary sample complexity, pretraining task diversity, and context length for successful ICL remain unr… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 20 pages, 5 figures, and supplementary information

  8. arXiv:2405.06008  [pdf, other

    cs.LG cond-mat.dis-nn hep-th stat.ML

    Wilsonian Renormalization of Neural Network Gaussian Processes

    Authors: Jessica N. Howard, Ro Jefferson, Anindita Maiti, Zohar Ringel

    Abstract: Separating relevant and irrelevant information is key to any modeling process or scientific inquiry. Theoretical physics offers a powerful tool for achieving this in the form of the renormalization group (RG). Here we demonstrate a practical approach to performing Wilsonian RG in the context of Gaussian Process (GP) Regression. We systematically integrate out the unlearnable modes of the GP kernel… ▽ More

    Submitted 14 August, 2024; v1 submitted 9 May, 2024; originally announced May 2024.

    Comments: 17 pages, 1 figure; rewrote introduction, added references, section IIIA, section IVA, and appendix C

  9. arXiv:2405.05530  [pdf, other

    cs.CV

    NurtureNet: A Multi-task Video-based Approach for Newborn Anthropometry

    Authors: Yash Khandelwal, Mayur Arvind, Sriram Kumar, Ashish Gupta, Sachin Kumar Danisetty, Piyush Bagad, Anish Madan, Mayank Lunayach, Aditya Annavajjala, Abhishek Maiti, Sansiddh Jain, Aman Dalmia, Namrata Deka, Jerome White, Jigar Doshi, Angjoo Kanazawa, Rahul Panicker, Alpan Raval, Srinivas Rana, Makarand Tapaswi

    Abstract: Malnutrition among newborns is a top public health concern in developing countries. Identification and subsequent growth monitoring are key to successful interventions. However, this is challenging in rural communities where health systems tend to be inaccessible and under-equipped, with poor adherence to protocol. Our goal is to equip health workers and public health systems with a solution for c… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted at CVPM Workshop at CVPR 2024

  10. arXiv:2404.07139  [pdf, other

    cs.AI cs.GT

    Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also be exploited to carry out privacy threats such as membership inference attacks (MIA). Existing works have only analyzed MIA in a single "what if" interaction scenario between an adversary and the target ML model; thus, it does not discern the factors impacting the capab… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02659

  11. arXiv:2404.05985  [pdf

    cs.CR cs.LG

    Boosting Digital Safeguards: Blending Cryptography and Steganography

    Authors: Anamitra Maiti, Subham Laha, Rishav Upadhaya, Soumyajit Biswas, Vikas Chaudhary, Biplab Kar, Nikhil Kumar, Jaydip Sen

    Abstract: In today's digital age, the internet is essential for communication and the sharing of information, creating a critical need for sophisticated data security measures to prevent unauthorized access and exploitation. Cryptography encrypts messages into a cipher text that is incomprehensible to unauthorized readers, thus safeguarding data during its transmission. Steganography, on the other hand, ori… ▽ More

    Submitted 11 April, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

    Comments: This report pertains to the Capstone Project done by Group 3 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 36 pages and it includes 11 figures and 5 tables

  12. arXiv:2402.03388  [pdf, other

    cs.AI cs.IR cs.LG

    Delivery Optimized Discovery in Behavioral User Segmentation under Budget Constraint

    Authors: Harshita Chopra, Atanu R. Sinha, Sunav Choudhary, Ryan A. Rossi, Paavan Kumar Indela, Veda Pranav Parwatala, Srinjayee Paul, Aurghya Maiti

    Abstract: Users' behavioral footprints online enable firms to discover behavior-based user segments (or, segments) and deliver segment specific messages to users. Following the discovery of segments, delivery of messages to users through preferred media channels like Facebook and Google can be challenging, as only a portion of users in a behavior segment find match in a medium, and only a fraction of those… ▽ More

    Submitted 15 March, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

  13. arXiv:2311.02288  [pdf, other

    cs.CR cs.HC cs.SD eess.AS

    OverHear: Headphone based Multi-sensor Keystroke Inference

    Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala

    Abstract: Headphones, traditionally limited to audio playback, have evolved to integrate sensors like high-definition microphones and accelerometers. While these advancements enhance user experience, they also introduce potential eavesdropping vulnerabilities, with keystroke inference being our concern in this work. To validate this threat, we developed OverHear, a keystroke inference framework that leverag… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  14. arXiv:2310.16252  [pdf, other

    cs.LG cs.GT

    Near-Optimal Pure Exploration in Matrix Games: A Generalization of Stochastic Bandits & Dueling Bandits

    Authors: Arnab Maiti, Ross Boczar, Kevin Jamieson, Lillian J. Ratliff

    Abstract: We study the sample complexity of identifying the pure strategy Nash equilibrium (PSNE) in a two-player zero-sum matrix game with noise. Formally, we are given a stochastic model where any learner can sample an entry $(i,j)$ of the input matrix $A\in[-1,1]^{n\times m}$ and observe $A_{i,j}+η$ where $η$ is a zero-mean 1-sub-Gaussian noise. The aim of the learner is to identify the PSNE of $A$, when… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 22 pages, 5 figures

  15. arXiv:2310.16236  [pdf, other

    cs.GT

    Query-Efficient Algorithms to Find the Unique Nash Equilibrium in a Two-Player Zero-Sum Matrix Game

    Authors: Arnab Maiti, Ross Boczar, Kevin Jamieson, Lillian J. Ratliff

    Abstract: We study the query complexity of identifying Nash equilibria in two-player zero-sum matrix games. Grigoriadis and Khachiyan (1995) showed that any deterministic algorithm needs to query $Ω(n^2)$ entries in worst case from an $n\times n$ input matrix in order to compute an $\varepsilon$-approximate Nash equilibrium, where $\varepsilon<\frac{1}{2}$. Moreover, they designed a randomized algorithm tha… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 17 pages

  16. arXiv:2308.01158  [pdf, other

    cs.CR

    Stake Your Claim: Zero-Trust Validator Deployment Leveraging NFTs and Smart Contracts in Proof-of-Stake Networks

    Authors: Scott Seidenberger, Alec Sokol, Anindya Maiti

    Abstract: We present a novel method for a multi-party, zero-trust validator infrastructure deployment arrangement via smart contracts to secure Proof-of-Stake (PoS) blockchains. The proposed arrangement architecture employs a combination of non-fungible tokens (NFTs), a treasury contract, and validator smart contract wallets to facilitate trustless participation in staking mechanisms. The NFT minting proces… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  17. arXiv:2307.03223  [pdf, ps, other

    hep-th cs.LG

    Neural Network Field Theories: Non-Gaussianity, Actions, and Locality

    Authors: Mehmet Demirtas, James Halverson, Anindita Maiti, Matthew D. Schwartz, Keegan Stoner

    Abstract: Both the path integral measure in field theory and ensembles of neural networks describe distributions over functions. When the central limit theorem can be applied in the infinite-width (infinite-$N$) limit, the ensemble of networks corresponds to a free field theory. Although an expansion in $1/N$ corresponds to interactions in the field theory, others, such as in a small breaking of the statist… ▽ More

    Submitted 13 December, 2023; v1 submitted 6 July, 2023; originally announced July 2023.

    Comments: 49 pages, plus references and appendices

  18. arXiv:2306.13233  [pdf, other

    cs.LG cs.GT

    Logarithmic Regret for Matrix Games against an Adversary with Noisy Bandit Feedback

    Authors: Arnab Maiti, Kevin Jamieson, Lillian J. Ratliff

    Abstract: This paper considers a variant of zero-sum matrix games where at each timestep the row player chooses row $i$, the column player chooses column $j$, and the row player receives a noisy reward with mean $A_{i,j}$. The objective of the row player is to accumulate as much reward as possible, even against an adversarial column player. If the row player uses the EXP3 strategy, an algorithm known for ob… ▽ More

    Submitted 24 October, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: 68 pages, 2 figures

  19. arXiv:2306.00856  [pdf

    cs.CV cs.LG

    A deep-learning approach to early identification of suggested sexual harassment from videos

    Authors: Shreya Shetye, Anwita Maiti, Tannistha Maiti, Tarry Singh

    Abstract: Sexual harassment, sexual abuse, and sexual violence are prevalent problems in this day and age. Women's safety is an important issue that needs to be highlighted and addressed. Given this issue, we have studied each of these concerns and the factors that affect it based on images generated from movies. We have classified the three terms (harassment, abuse, and violence) based on the visual attrib… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 7 pages, 4 figures

  20. arXiv:2305.00244  [pdf, other

    cs.CV cs.LG

    A Critical Analysis of the Limitation of Deep Learning based 3D Dental Mesh Segmentation Methods in Segmenting Partial Scans

    Authors: Ananya Jana, Aniruddha Maiti, Dimitris N. Metaxas

    Abstract: Tooth segmentation from intraoral scans is a crucial part of digital dentistry. Many Deep Learning based tooth segmentation algorithms have been developed for this task. In most of the cases, high accuracy has been achieved, although, most of the available tooth segmentation techniques make an implicit restrictive assumption of full jaw model and they report accuracy based on full jaw models. Medi… ▽ More

    Submitted 29 April, 2023; originally announced May 2023.

    Comments: accepted to IEEE EMBC 2023

  21. arXiv:2303.10565  [pdf, other

    cs.GT cs.LG

    Instance-dependent Sample Complexity Bounds for Zero-sum Matrix Games

    Authors: Arnab Maiti, Kevin Jamieson, Lillian J. Ratliff

    Abstract: We study the sample complexity of identifying an approximate equilibrium for two-player zero-sum $n\times 2$ matrix games. That is, in a sequence of repeated game plays, how many rounds must the two players play before reaching an approximate equilibrium (e.g., Nash)? We derive instance-dependent bounds that define an ordering over game matrices that captures the intuition that the dynamics of som… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

    Comments: 53 pages, Accepted at AISTATS 2023

  22. arXiv:2303.06037  [pdf, other

    eess.SP cs.HC

    SkinSense: Efficient Vibration-based Communications Over Human Body Using Motion Sensors

    Authors: Raveen Wijewickrama, Sameer Anis Dohadwalla, Anindya Maiti, Murtuza Jadliwala, Sashank Narain

    Abstract: Recent growth in popularity of mobile and wearable devices has re-ignited the need for reliable and stealthy communication side-channels to enable applications such as secret/PIN sharing, co-location proofs and user authentication. Existing short-range wireless radio technology such as Bluetooth/BLE and NFC, although mature and robust, is prone to eavesdropping, jamming and/or interference, and is… ▽ More

    Submitted 7 February, 2023; originally announced March 2023.

  23. Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users

    Authors: Mohd Sabra, Nisha Vinayaga Sureshkanth, Ari Sharma, Anindya Maiti, Murtuza Jadliwala

    Abstract: Virtual Reality (VR) is an exciting new consumer technology which offers an immersive audio-visual experience to users through which they can navigate and interact with a digitally represented 3D space (i.e., a virtual world) using a headset device. By (visually) transporting users from the real or physical world to exciting and realistic virtual spaces, VR systems can enable true-to-life and more… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

  24. arXiv:2301.05873  [pdf, other

    cs.MA

    Opponent-aware Role-based Learning in Team Competitive Markov Games

    Authors: Paramita Koley, Aurghya Maiti, Niloy Ganguly, Sourangshu Bhattacharya

    Abstract: Team competition in multi-agent Markov games is an increasingly important setting for multi-agent reinforcement learning, due to its general applicability in modeling many real-life situations. Multi-agent actor-critic methods are the most suitable class of techniques for learning optimal policies in the team competition setting, due to their flexibility in learning agent-specific critic functions… ▽ More

    Submitted 14 January, 2023; originally announced January 2023.

    Comments: 9 pages, 6 figures

    ACM Class: I.2.6

  25. arXiv:2301.03140  [pdf, other

    cs.DL

    Scholar Ranking 2023: Ranking of Computer Science Departments Based on Faculty Citations

    Authors: Sai Shi, Aniruddha Maiti, Ashis Kumar Chanda, Slobodan Vucetic

    Abstract: Scholar Ranking 2023 is the second edition of U.S. Computer Science (CS) departments ranking based on faculty citation measures. Using Google Scholar, we gathered data about publication citations for 5,574 tenure-track faculty from 185 U.S. universities. For each faculty, we extracted their t10 index, defined as the number of citations received by their 10th highest cited paper. For each departmen… ▽ More

    Submitted 11 January, 2023; v1 submitted 8 January, 2023; originally announced January 2023.

    Comments: 17 pages, 13 figures

  26. arXiv:2210.05338  [pdf, other

    cs.IR cs.LG

    FusionDeepMF: A Dual Embedding based Deep Fusion Model for Recommendation

    Authors: Supriyo Mandal, Abyayananda Maiti

    Abstract: Traditional Collaborative Filtering (CF) based methods are applied to understand the personal preferences of users/customers for items or products from the rating matrix. Usually, the rating matrix is sparse in nature. So there are some improved variants of the CF method that apply the increasing amount of side information to handle the sparsity problem. Only linear kernel or only non-linear kerne… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  27. arXiv:2205.13930  [pdf, ps, other

    cs.LG cs.GT

    Fairness and Welfare Quantification for Regret in Multi-Armed Bandits

    Authors: Siddharth Barman, Arindam Khan, Arnab Maiti, Ayush Sawarni

    Abstract: We extend the notion of regret with a welfarist perspective. Focussing on the classic multi-armed bandit (MAB) framework, the current work quantifies the performance of bandit algorithms by applying a fundamental welfare function, namely the Nash social welfare (NSW) function. This corresponds to equating algorithm's performance to the geometric mean of its expected rewards and leads us to the stu… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: 32 pages

  28. arXiv:2205.00442  [pdf, ps, other

    cs.GT cs.CC cs.DS

    On Binary Networked Public Goods Game with Altruism

    Authors: Arnab Maiti, Palash Dey

    Abstract: In the classical Binary Networked Public Goods (BNPG) game, a player can either invest in a public project or decide not to invest. Based on the decisions of all the players, each player receives a reward as per his/her utility function. However, classical models of BNPG game do not consider altruism which players often exhibit and can significantly affect equilibrium behavior. Yu et al. (2021) ex… ▽ More

    Submitted 1 January, 2024; v1 submitted 1 May, 2022; originally announced May 2022.

    Comments: 26 pages

    MSC Class: 68Q27

  29. arXiv:2202.05989  [pdf, other

    cs.DS cs.CG

    Tight Approximation Algorithms for Two Dimensional Guillotine Strip Packing

    Authors: Arindam Khan, Aditya Lonkar, Arnab Maiti, Amatya Sharma, Andreas Wiese

    Abstract: In the Strip Packing problem (SP), we are given a vertical half-strip $[0,W]\times[0,\infty)$ and a set of $n$ axis-aligned rectangles of width at most $W$. The goal is to find a non-overlapping packing of all rectangles into the strip such that the height of the packing is minimized. A well-studied and frequently used practical constraint is to allow only those packings that are guillotine separa… ▽ More

    Submitted 6 May, 2022; v1 submitted 12 February, 2022; originally announced February 2022.

    Comments: 32 pages, 9 figures

    ACM Class: F.2.2

  30. arXiv:2202.02659   

    cs.GT cs.LG

    A Game-theoretic Understanding of Repeated Explanations in ML Models

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: This paper formally models the strategic repeated interactions between a system, comprising of a machine learning (ML) model and associated explanation method, and an end-user who is seeking a prediction/label and its explanation for a query/input, by means of game theory. In this game, a malicious end-user must strategically decide when to stop querying and attempt to compromise the system, while… ▽ More

    Submitted 22 August, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: The problem statement has been changed. Thus, the whole paper has been updated. As a result, the previous analysis and the experimental results are inaccurate

  31. arXiv:2201.01450  [pdf, other

    cs.GT cs.LG cs.MA

    Offsetting Unequal Competition through RL-assisted Incentive Schemes

    Authors: Paramita Koley, Aurghya Maiti, Sourangshu Bhattacharya, Niloy Ganguly

    Abstract: This paper investigates the dynamics of competition among organizations with unequal expertise. Multi-agent reinforcement learning has been used to simulate and understand the impact of various incentive schemes designed to offset such inequality. We design Touch-Mark, a game based on well-known multi-agent-particle-environment, where two teams (weak, strong) with unequal but changing skill levels… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

  32. arXiv:2112.10250  [pdf, ps, other

    cs.GT cs.DS

    Parameterized Algorithms for Kidney Exchange

    Authors: Arnab Maiti, Palash Dey

    Abstract: In kidney exchange programs, multiple patient-donor pairs each of whom are otherwise incompatible, exchange their donors to receive compatible kidneys. The Kidney Exchange problem is typically modelled as a directed graph where every vertex is either an altruistic donor or a pair of patient and donor; directed edges are added from a donor to its compatible patients. The computational task is to fi… ▽ More

    Submitted 14 June, 2024; v1 submitted 19 December, 2021; originally announced December 2021.

    Comments: 20 pages, appeared as an extended abstract in AAMAS 2022 and full paper in IJCAI 2022

    MSC Class: 68Q27

  33. arXiv:2111.00886  [pdf, other

    cs.LG cs.AI

    Intervention Efficient Algorithm for Two-Stage Causal MDPs

    Authors: Rahul Madhavan, Aurghya Maiti, Gaurav Sinha, Siddharth Barman

    Abstract: We study Markov Decision Processes (MDP) wherein states correspond to causal graphs that stochastically generate rewards. In this setup, the learner's goal is to identify atomic interventions that lead to high rewards by intervening on variables at each state. Generalizing the recent causal-bandit framework, the current work develops (simple) regret minimization guarantees for two-stage causal MDP… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 29 pages

  34. arXiv:2109.00874  [pdf, ps, other

    cs.GT

    Universal and Tight Online Algorithms for Generalized-Mean Welfare

    Authors: Siddharth Barman, Arindam Khan, Arnab Maiti

    Abstract: We study fair and efficient allocation of divisible goods, in an online manner, among $n$ agents. The goods arrive online in a sequence of $T$ time periods. The agents' values for a good are revealed only after its arrival, and the online algorithm needs to fractionally allocate the good, immediately and irrevocably, among the agents. Towards a unifying treatment of fairness and economic efficienc… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: 32 pages

  35. arXiv:2107.02772  [pdf, other

    cs.LG cs.AI

    A Causal Bandit Approach to Learning Good Atomic Interventions in Presence of Unobserved Confounders

    Authors: Aurghya Maiti, Vineet Nair, Gaurav Sinha

    Abstract: We study the problem of determining the best intervention in a Causal Bayesian Network (CBN) specified only by its causal graph. We model this as a stochastic multi-armed bandit (MAB) problem with side-information, where the interventions correspond to the arms of the bandit instance. First, we propose a simple regret minimization algorithm that takes as input a semi-Markovian causal graph with at… ▽ More

    Submitted 19 May, 2022; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 36 pages; metadata changed

  36. arXiv:2106.00694  [pdf, other

    cs.LG hep-th stat.ML

    Symmetry-via-Duality: Invariant Neural Network Densities from Parameter-Space Correlators

    Authors: Anindita Maiti, Keegan Stoner, James Halverson

    Abstract: Parameter-space and function-space provide two different duality frames in which to study neural networks. We demonstrate that symmetries of network densities may be determined via dual computations of network correlation functions, even when the density is unknown and the network is not equivariant. Symmetry-via-duality relies on invariance properties of the correlation functions, which stem from… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: 20 pages, 3 figures

  37. arXiv:2103.09735  [pdf, other

    cs.DS cs.CG

    On Guillotine Separable Packings for the Two-dimensional Geometric Knapsack Problem

    Authors: Arindam Khan, Arnab Maiti, Amatya Sharma, Andreas Wiese

    Abstract: In two-dimensional geometric knapsack problem, we are given a set of n axis-aligned rectangular items and an axis-aligned square-shaped knapsack. Each item has integral width, integral height and an associated integral profit. The goal is to find a (non-overlapping axis-aligned) packing of a maximum profit subset of rectangles into the knapsack. A well-studied and frequently used constraint in pra… ▽ More

    Submitted 17 March, 2021; originally announced March 2021.

    Comments: 39 pages, 13 figures, To appear in SOCG 2021

    MSC Class: 68W25

  38. arXiv:2012.05142  [pdf, other

    cs.LG cs.DS cs.IT stat.ML

    Streaming Algorithms for Stochastic Multi-armed Bandits

    Authors: Arnab Maiti, Vishakha Patil, Arindam Khan

    Abstract: We study the Stochastic Multi-armed Bandit problem under bounded arm-memory. In this setting, the arms arrive in a stream, and the number of arms that can be stored in the memory at any time, is bounded. The decision-maker can only pull arms that are present in the memory. We address the problem from the perspective of two standard objectives: 1) regret minimization, and 2) best-arm identification… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: 24 pages, 2 figures, 4 algorithms

    MSC Class: 68Q32

  39. arXiv:2012.01880  [pdf, other

    cs.GT cs.CC cs.DS

    On Parameterized Complexity of Binary Networked Public Goods Game

    Authors: Arnab Maiti, Palash Dey

    Abstract: In the Binary Networked Public Goods game, every player needs to decide if she participates in a public project whose utility is shared equally by the community. We study the problem of deciding if there exists a pure strategy Nash equilibrium (PSNE) in such games. The problem is already known to be NP-complete. We provide fine-grained analysis of this problem under the lens of parameterized compl… ▽ More

    Submitted 19 December, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 24 pages, 1 figure, will appear as full paper in AAMAS 2022

    MSC Class: 68Q27

  40. arXiv:2011.14192  [pdf, ps, other

    cs.GT cs.CC cs.CY cs.DS

    On Parameterized Complexity of Liquid Democracy

    Authors: Palash Dey, Arnab Maiti, Amatya Sharma

    Abstract: In liquid democracy, each voter either votes herself or delegates her vote to some other voter. This gives rise to what is called a delegation graph. To decide the voters who eventually votes along with the subset of voters whose votes they give, we need to resolve the cycles in the delegation graph. This gives rise to the Resolve Delegation problem where we need to find an acyclic sub-graph of th… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: Submitted to 7th Annual International Conference on Algorithms and Discrete Applied Mathematics [CALDAM 2021]

    MSC Class: 68Q27; 05C90 ACM Class: B.6; B.7; F.1.3

  41. arXiv:2010.12078  [pdf, other

    cs.CR cs.CV cs.HC

    Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks

    Authors: Mohd Sabra, Anindya Maiti, Murtuza Jadliwala

    Abstract: Due to recent world events, video calls have become the new norm for both personal and professional remote communication. However, if a participant in a video call is not careful, he/she can reveal his/her private information to others in the call. In this paper, we design and evaluate an attack framework to infer one type of such private information from the video stream of a call -- keystrokes,… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

  42. arXiv:2008.08601  [pdf, other

    cs.LG cond-mat.dis-nn hep-th stat.ML

    Neural Networks and Quantum Field Theory

    Authors: James Halverson, Anindita Maiti, Keegan Stoner

    Abstract: We propose a theoretical understanding of neural networks in terms of Wilsonian effective field theory. The correspondence relies on the fact that many asymptotic neural networks are drawn from Gaussian processes, the analog of non-interacting field theories. Moving away from the asymptotic limit yields a non-Gaussian process and corresponds to turning on particle interactions, allowing for the co… ▽ More

    Submitted 15 March, 2021; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: v2: published in Machine Learning: Science and Technology. Additions include study of N-scaling, a correction for examples, and new experimental tests. 53 pages, 7 figures, and appendices

  43. arXiv:2005.03687  [pdf

    cs.LG stat.ML

    COBRA: Contrastive Bi-Modal Representation Algorithm

    Authors: Vishaal Udandarao, Abhishek Maiti, Deepak Srivatsav, Suryatej Reddy Vyalla, Yifang Yin, Rajiv Ratn Shah

    Abstract: There are a wide range of applications that involve multi-modal data, such as cross-modal retrieval, visual question-answering, and image captioning. Such applications are primarily dependent on aligned distributions of the different constituent modalities. Existing approaches generate latent embeddings for each modality in a joint fashion by representing them in a common manifold. However these j… ▽ More

    Submitted 24 May, 2020; v1 submitted 7 May, 2020; originally announced May 2020.

    Comments: 13 Pages, 6 Figures and 10 Tables

  44. arXiv:2001.01387  [pdf, other

    cs.CR

    Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems

    Authors: Nisha Vinayaga-Sureshkanth, Raveen Wijewickrama, Anindya Maiti, Murtuza Jadliwala

    Abstract: Micromobility vehicles are gaining popularity due to their portable nature, and their ability to serve short distance urban commutes better than traditional modes of transportation. Most of these vehicles, offered by various micromobility service providers around the world, are shareable and can be rented (by-the-minute) by riders, thus eliminating the need of owning and maintaining a personal veh… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  45. arXiv:1912.00163  [pdf, other

    cs.LG cs.AI stat.ML

    Dis-entangling Mixture of Interventions on a Causal Bayesian Network Using Aggregate Observations

    Authors: Gaurav Sinha, Ayush Chauhan, Aurghya Maiti, Naman Poddar, Pulkit Goel

    Abstract: We study the problem of separating a mixture of distributions, all of which come from interventions on a known causal bayesian network. Given oracle access to marginals of all distributions resulting from interventions on the network, and estimates of marginals from the mixture distribution, we want to recover the mixing proportions of different mixture components. We show that in the worst case… ▽ More

    Submitted 15 January, 2020; v1 submitted 30 November, 2019; originally announced December 2019.

    Comments: Accepted at the Ninth International Workshop on Statistical Relational AI, AAAI 2020

  46. arXiv:1908.05846  [pdf, other

    cs.CY

    Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing

    Authors: Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama, Greg P. Griffin

    Abstract: The popularity and proliferation of electric scooters (e-scooters) as a micromobility solution in our cities and urban communities has been rapidly rising. Rent-by-the-minute pricing and a healthy competition between micromobility service providers is also benefiting riders with low trip costs. However, an unprepared urban infrastructure, combined with uncertain operation policies and poor regulat… ▽ More

    Submitted 22 July, 2020; v1 submitted 16 August, 2019; originally announced August 2019.

  47. arXiv:1904.13352  [pdf, other

    cs.GT cs.CR

    Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach

    Authors: Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei

    Abstract: Abuse of zero-permission sensors on-board mobile and wearable devices to infer users' personal context and information is a well-known privacy threat that has received significant attention. Efforts towards protection mechanisms that prevent or limit the success of such threats, however, have been ad-hoc so far and have primarily focused on designing threat-specific customized defense mechanisms.… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  48. arXiv:1904.07579  [pdf, other

    cs.DL cs.SI

    Go Wide, Go Deep: Quantifying the Impact of Scientific Papers through Influence Dispersion Trees

    Authors: Dattatreya Mohapatra, Abhishek Maiti, Sumit Bhatia, Tanmoy Chakraborty

    Abstract: Despite a long history of use of citation count as a measure to assess the impact or influence of a scientific paper, the evolution of follow-up work inspired by the paper and their interactions through citation links have rarely been explored to quantify how the paper enriches the depth and breadth of a research field. We propose a novel data structure, called Influence Dispersion Tree (IDT) to m… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: Published at The ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL) 2019

  49. arXiv:1811.04797  [pdf, other

    cs.HC

    A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables

    Authors: Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore

    Abstract: Distracted pedestrians, like distracted drivers, are an increasingly dangerous threat and precursors to pedestrian accidents in urban communities, often resulting in grave injuries and fatalities. Mitigating such hazards to pedestrian safety requires employment of pedestrian safety systems and applications that are effective in detecting them. Designing such frameworks is possible with the availab… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1710.03755

  50. arXiv:1810.12770  [pdf, ps, other

    cs.IR cs.LG stat.ML

    Explicit Feedbacks Meet with Implicit Feedbacks : A Combined Approach for Recommendation System

    Authors: Supriyo Mandal, Abyayananda Maiti

    Abstract: Recommender systems recommend items more accurately by analyzing users' potential interest on different brands' items. In conjunction with users' rating similarity, the presence of users' implicit feedbacks like clicking items, viewing items specifications, watching videos etc. have been proved to be helpful for learning users' embedding, that helps better rating prediction of users. Most existing… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

    Comments: 12 pages. Accepted in Complex Networks, 2018