Skip to main content

Showing 1–50 of 149 results for author: Mittal, S

Searching in archive cs. Search in all archives.
.
  1. eUDEVS: Executable UML with DEVS Theory of Modeling and Simulation

    Authors: José L. Risco-Martín, J. M. Cruz, Saurabh Mittal, Bernard P. Zeigler

    Abstract: Modeling and Simulation (M&S) for system design and prototyping is practiced today both in the industry and academia. M&S are two different areas altogether and have specific objectives. However, most of the times these two separate areas are taken together. The developed code is tightly woven around both the model and the underlying simulator that executes it. This constraints both the model deve… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Journal ref: SIMULATION: Transactions of the SCS, 85(11-12), pp. 750-777, 2009

  2. DEVS/SOA: A Cross-Platform Framework for Net-centric Modeling and Simulation in DEVS Unified Process

    Authors: Saurabh Mittal, José L. Risco-Martín, Bernard P. Zeigler

    Abstract: Discrete EVent Specification (DEVS) environments are known to be implemented over middleware systems such as HLA, RMI, CORBA and others. DEVS exhibits concepts of systems theory and modeling and supports capturing the system behavior from the physical and behavioral perspectives. Further, they are implemented using Object-oriented languages like Java and C++. This research work uses the Java platf… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Journal ref: SIMULATION, 85(7), pp. 419-450, 2009

  3. arXiv:2406.18812  [pdf, other

    cs.RO cs.AI

    A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics

    Authors: Ivan A. Fernandez, Subash Neupane, Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Nisha Pillai, Jingdao Chen, Shahram Rahimi

    Abstract: Industry 4.0 has witnessed the rise of complex robots fueled by the integration of Artificial Intelligence/Machine Learning (AI/ML) and Digital Twin (DT) technologies. While these technologies offer numerous benefits, they also introduce potential privacy and security risks. This paper surveys privacy attacks targeting robots enabled by AI and DT models. Exfiltration and data leakage of ML models… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: 10 pages, 3 figures, 1 table

  4. arXiv:2406.02322  [pdf, other

    cs.LG cs.AI

    A Survey of Transformer Enabled Time Series Synthesis

    Authors: Alexander Sommers, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure, Thomas Arnold

    Abstract: Generative AI has received much attention in the image and language domains, with the transformer neural network continuing to dominate the state of the art. Application of these models to time series generation is less explored, however, and is of great utility to machine learning, privacy preservation, and explainability research. The present survey identifies this gap at the intersection of the… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  5. arXiv:2405.20971  [pdf, other

    cs.LG cs.CV

    Amortizing intractable inference in diffusion models for vision, language, and control

    Authors: Siddarth Venkatraman, Moksh Jain, Luca Scimeca, Minsu Kim, Marcin Sendera, Mohsin Hasan, Luke Rowe, Sarthak Mittal, Pablo Lemos, Emmanuel Bengio, Alexandre Adam, Jarrid Rector-Brooks, Yoshua Bengio, Glen Berseth, Nikolay Malkin

    Abstract: Diffusion models have emerged as effective distribution estimators in vision, language, and reinforcement learning, but their use as priors in downstream tasks poses an intractable posterior inference problem. This paper studies amortized sampling of the posterior over data, $\mathbf{x}\sim p^{\rm post}(\mathbf{x})\propto p(\mathbf{x})r(\mathbf{x})$, in a model that consists of a diffusion generat… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

    Comments: Code: https://github.com/GFNOrg/diffusion-finetuning

  6. arXiv:2405.19162  [pdf, other

    cs.LG cs.AI

    Does learning the right latent variables necessarily improve in-context learning?

    Authors: Sarthak Mittal, Eric Elmoznino, Leo Gagnon, Sangnie Bhardwaj, Dhanya Sridhar, Guillaume Lajoie

    Abstract: Large autoregressive models like Transformers can solve tasks through in-context learning (ICL) without learning new weights, suggesting avenues for efficiently solving new tasks. For many tasks, e.g., linear regression, the data factorizes: examples are independent given a task latent that generates the data, e.g., linear coefficients. While an optimal predictor leverages this factorization by in… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  7. arXiv:2405.16388  [pdf, other

    cs.CL cs.LG

    Multi-Reference Preference Optimization for Large Language Models

    Authors: Hung Le, Quan Tran, Dung Nguyen, Kien Do, Saloni Mittal, Kelechi Ogueji, Svetha Venkatesh

    Abstract: How can Large Language Models (LLMs) be aligned with human intentions and values? A typical solution is to gather human preference on model outputs and finetune the LLMs accordingly while ensuring that updates do not deviate too far from a reference model. Recent approaches, such as direct preference optimization (DPO), have eliminated the need for unstable and sluggish reinforcement learning opti… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

    Comments: 20 pages

  8. arXiv:2405.08120  [pdf, other

    cs.ET cs.AI

    From Questions to Insightful Answers: Building an Informed Chatbot for University Resources

    Authors: Subash Neupane, Elias Hossain, Jason Keith, Himanshu Tripathi, Farbod Ghiasi, Noorbakhsh Amiri Golilarz, Amin Amirlatifi, Sudip Mittal, Shahram Rahimi

    Abstract: This paper presents BARKPLUG V.2, a Large Language Model (LLM)-based chatbot system built using Retrieval Augmented Generation (RAG) pipelines to enhance the user experience and access to information within academic settings.The objective of BARKPLUG V.2 is to provide information to users about various campus resources, including academic departments, programs, campus facilities, and student resou… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  9. TextGram: Towards a better domain-adaptive pretraining

    Authors: Sharayu Hiwarkhedkar, Saloni Mittal, Vidula Magdum, Omkar Dhekane, Raviraj Joshi, Geetanjali Kale, Arnav Ladkat

    Abstract: For green AI, it is crucial to measure and reduce the carbon footprint emitted during the training of large language models. In NLP, performing pre-training on Transformer models requires significant computational resources. This pre-training involves using a large amount of text data to gain prior knowledge for performing downstream tasks. Thus, it is important that we select the correct data in… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: Accepted at SPELLL 2023

  10. L3Cube-MahaNews: News-based Short Text and Long Document Classification Datasets in Marathi

    Authors: Saloni Mittal, Vidula Magdum, Omkar Dhekane, Sharayu Hiwarkhedkar, Raviraj Joshi

    Abstract: The availability of text or topic classification datasets in the low-resource Marathi language is limited, typically consisting of fewer than 4 target labels, with some achieving nearly perfect accuracy. In this work, we introduce L3Cube-MahaNews, a Marathi text classification corpus that focuses on News headlines and articles. This corpus stands out as the largest supervised Marathi Corpus, conta… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: Accepted at SPELLL 2023

  11. arXiv:2404.08601  [pdf, ps, other

    cs.LG

    Generating Synthetic Time Series Data for Cyber-Physical Systems

    Authors: Alexander Sommers, Somayeh Bakhtiari Ramezani, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jaboure

    Abstract: Data augmentation is an important facilitator of deep learning applications in the time series domain. A gap is identified in the literature, demonstrating sparse exploration of the transformer, the dominant sequence model, for data augmentation in time series. A architecture hybridizing several successful priors is put forth and tested using a powerful time domain similarity metric. Results sugge… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  12. AI Ethics: A Bibliometric Analysis, Critical Issues, and Key Gaps

    Authors: Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jiming Wu, Jingdao Chen

    Abstract: Artificial intelligence (AI) ethics has emerged as a burgeoning yet pivotal area of scholarly research. This study conducts a comprehensive bibliometric analysis of the AI ethics literature over the past two decades. The analysis reveals a discernible tripartite progression, characterized by an incubation phase, followed by a subsequent phase focused on imbuing AI with human-like attributes, culmi… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Journal ref: International Journal of Business Analytics (IJBAN), 2024, 11(1), 1-19

  13. arXiv:2403.08607  [pdf, other

    cs.CL cs.AI

    MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models

    Authors: Subash Neupane, Shaswata Mitra, Sudip Mittal, Noorbakhsh Amiri Golilarz, Shahram Rahimi, Amin Amirlatifi

    Abstract: Large Language Models (LLMs) have shown impressive capabilities in generating human-like responses. However, their lack of domain-specific knowledge limits their applicability in healthcare settings, where contextual and comprehensive responses are vital. To address this challenge and enable the generation of patient-centric responses that are contextually relevant and comprehensive, we propose Me… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  14. arXiv:2403.05551  [pdf

    cs.CY

    A Bibliometric View of AI Ethics Development

    Authors: Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jingdao Chen

    Abstract: Artificial Intelligence (AI) Ethics is a nascent yet critical research field. Recent developments in generative AI and foundational models necessitate a renewed look at the problem of AI Ethics. In this study, we perform a bibliometric analysis of AI Ethics literature for the last 20 years based on keyword search. Our study reveals a three-phase development in AI Ethics, namely an incubation phase… ▽ More

    Submitted 8 February, 2024; originally announced March 2024.

  15. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1092 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 14 June, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  16. arXiv:2402.12608  [pdf, other

    cs.AI

    Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications

    Authors: Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi

    Abstract: Patient-Centric Knowledge Graphs (PCKGs) represent an important shift in healthcare that focuses on individualized patient care by mapping the patient's health information in a holistic and multi-dimensional way. PCKGs integrate various types of health data to provide healthcare professionals with a comprehensive understanding of a patient's health, enabling more personalized and effective care. T… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  17. arXiv:2402.06121  [pdf, other

    cs.LG stat.ML

    Iterated Denoising Energy Matching for Sampling from Boltzmann Densities

    Authors: Tara Akhound-Sadegh, Jarrid Rector-Brooks, Avishek Joey Bose, Sarthak Mittal, Pablo Lemos, Cheng-Hao Liu, Marcin Sendera, Siamak Ravanbakhsh, Gauthier Gidel, Yoshua Bengio, Nikolay Malkin, Alexander Tong

    Abstract: Efficiently generating statistically independent samples from an unnormalized probability distribution, such as equilibrium samples of many-body systems, is a foundational problem in science. In this paper, we propose Iterated Denoising Energy Matching (iDEM), an iterative algorithm that uses a novel stochastic score matching objective leveraging solely the energy function and its gradient -- and… ▽ More

    Submitted 26 June, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

    Comments: Published at ICML 2024. Code for iDEM is available at https://github.com/jarridrb/dem

  18. Reconsidering the performance of DEVS modeling and simulation environments using the DEVStone benchmark

    Authors: José L. Risco-Martín, Saurabh Mittal, Juan Carlos Fabero, Marina Zapater, Román Hermida

    Abstract: The Discrete Event System Specification formalism (DEVS), which supports hierarchical and modular model composition, has been widely used to understand, analyze and develop a variety of systems. DEVS has been implemented in various languages and platforms over the years. The DEVStone benchmark was conceived to generate a set of models with varied structure and behavior, and to automate the evaluat… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Journal ref: SIMULATION, 93(6), 2017

  19. arXiv:2402.05098  [pdf, other

    cs.LG stat.ML

    Improved off-policy training of diffusion samplers

    Authors: Marcin Sendera, Minsu Kim, Sarthak Mittal, Pablo Lemos, Luca Scimeca, Jarrid Rector-Brooks, Alexandre Adam, Yoshua Bengio, Nikolay Malkin

    Abstract: We study the problem of training diffusion models to sample from a distribution with a given unnormalized density or energy function. We benchmark several diffusion-structured inference methods, including simulation-based variational approaches and off-policy methods (continuous generative flow networks). Our results shed light on the relative advantages of existing algorithms while bringing into… ▽ More

    Submitted 26 May, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: 24 pages; changed title from v2; code: https://github.com/GFNOrg/gfn-diffusion

  20. arXiv:2402.00890  [pdf, other

    cs.CR cs.NI cs.SE

    Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions

    Authors: Martin Duclos, Ivan A. Fernandez, Kaneesha Moore, Sudip Mittal, Edward Zieglar

    Abstract: This paper proposes the use of Large Language Models (LLMs) for translating Request for Comments (RFC) protocol specifications into a format compatible with the Cryptographic Protocol Shapes Analyzer (CPSA). This novel approach aims to reduce the complexities and efforts involved in protocol analysis, by offering an automated method for translating protocol specifications into structured models su… ▽ More

    Submitted 30 January, 2024; originally announced February 2024.

  21. arXiv:2401.10373  [pdf, other

    eess.IV cs.CV cs.LG

    Harmonized Spatial and Spectral Learning for Robust and Generalized Medical Image Segmentation

    Authors: Vandan Gorade, Sparsh Mittal, Debesh Jha, Rekha Singhal, Ulas Bagci

    Abstract: Deep learning has demonstrated remarkable achievements in medical image segmentation. However, prevailing deep learning models struggle with poor generalization due to (i) intra-class variations, where the same class appears differently in different samples, and (ii) inter-class independence, resulting in difficulties capturing intricate relationships between distinct objects, leading to higher fa… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  22. arXiv:2401.10207  [pdf, other

    cs.CR cs.AI cs.LG

    Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems

    Authors: Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale

    Abstract: This paper addresses trust issues created from the ubiquity of black box algorithms and surrogate explainers in Explainable Intrusion Detection Systems (X-IDS). While Explainable Artificial Intelligence (XAI) aims to enhance transparency, black box surrogate explainers, such as Local Interpretable Model-Agnostic Explanation (LIME) and SHapley Additive exPlanation (SHAP), are difficult to trust. Th… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  23. arXiv:2401.10036  [pdf, other

    cs.CR cs.AI cs.IR cs.LO

    LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

    Authors: Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

    Abstract: Security Operations Center (SoC) analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs. These analysts also depend on internal repositories, which act as private local knowledge database for an organization. Credible cyber intelligence, critical operational details, and relevant organizational information… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  24. arXiv:2401.07871  [pdf, other

    cs.AI cs.HC cs.LG

    Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities

    Authors: Logan Cummins, Alex Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi

    Abstract: Predictive maintenance is a well studied collection of techniques that aims to prolong the life of a mechanical system by using artificial intelligence and machine learning to predict the optimal time to perform maintenance. The methods allow maintainers of systems and hardware to reduce financial and time costs of upkeep. As these methods are adopted for more serious and potentially life-threaten… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  25. arXiv:2401.06154  [pdf, other

    cs.CY cs.SI

    Comparison of home detection algorithms using smartphone GPS data

    Authors: Rajat Verma, Shagun Mittal, Zengxiang Lei, Xiaowei Chen, Satish V. Ukkusuri

    Abstract: Estimation of people's home locations using location-based services data from smartphones is a common task in human mobility assessment. However, commonly used home detection algorithms (HDAs) are often arbitrary and unexamined. In this study, we review existing HDAs and examine five HDAs using eight high-quality mobile phone geolocation datasets. These include four commonly used HDAs as well as a… ▽ More

    Submitted 21 December, 2023; originally announced January 2024.

    Comments: Paper currently under review in the journal "EPJ Data Science" (ISSN: 2193-1127); Manuscript: 24 pages (including 68 references, 7 figures, 3 tables); Supplementary material document not included

  26. arXiv:2401.05680  [pdf, other

    cs.CR cs.AI cs.LG cs.NE

    Use of Graph Neural Networks in Aiding Defensive Cyber Operations

    Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

    Abstract: In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information. Additionally, cyber-attacks differ depending on the objective and evolve rapidly to disguise defensive systems. However, a typical cyber-attack demonstrates a series of stages from attack i… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 35 pages, 9 figures, 8 tables

  27. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  28. arXiv:2312.10534  [pdf, other

    cs.LG cs.CR cs.CV

    Rethinking Robustness of Model Attributions

    Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian

    Abstract: For machine learning models to be reliable and trustworthy, their decisions must be interpretable. As these models find increasing use in safety-critical applications, it is important that not just the model predictions but also their explanations (as feature attributions) be robust to small human-imperceptible input perturbations. Recent works have shown that many attribution methods are fragile… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: Accepted AAAI 2024

  29. arXiv:2312.01128  [pdf, other

    eess.IV cs.CV cs.LG

    SPEEDNet: Salient Pyramidal Enhancement Encoder-Decoder Network for Colonoscopy Images

    Authors: Tushir Sahu, Vidhi Bhatt, Sai Chandra Teja R, Sparsh Mittal, Nagesh Kumar S

    Abstract: Accurate identification and precise delineation of regions of significance, such as tumors or lesions, is a pivotal goal in medical imaging analysis. This paper proposes SPEEDNet, a novel architecture for precisely segmenting lesions within colonoscopy images. SPEEDNet uses a novel block named Dilated-Involutional Pyramidal Convolution Fusion (DIPC). A DIPC block combines the dilated involution la… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

    Comments: 5 pages, 3 figures

  30. arXiv:2311.16700  [pdf, other

    cs.CV cs.AI cs.LG q-bio.TO

    Rethinking Intermediate Layers design in Knowledge Distillation for Kidney and Liver Tumor Segmentation

    Authors: Vandan Gorade, Sparsh Mittal, Debesh Jha, Ulas Bagci

    Abstract: Knowledge distillation (KD) has demonstrated remarkable success across various domains, but its application to medical imaging tasks, such as kidney and liver tumor segmentation, has encountered challenges. Many existing KD methods are not specifically tailored for these tasks. Moreover, prevalent KD methods often lack a careful consideration of `what' and `from where' to distill knowledge from th… ▽ More

    Submitted 27 May, 2024; v1 submitted 28 November, 2023; originally announced November 2023.

    Comments: Accepted at ISBI-2024 for Oral Presentation

  31. arXiv:2311.02579  [pdf, other

    cs.CL cs.LG

    mahaNLP: A Marathi Natural Language Processing Library

    Authors: Vidula Magdum, Omkar Dhekane, Sharayu Hiwarkhedkar, Saloni Mittal, Raviraj Joshi

    Abstract: We present mahaNLP, an open-source natural language processing (NLP) library specifically built for the Marathi language. It aims to enhance the support for the low-resource Indian language Marathi in the field of NLP. It is an easy-to-use, extensible, and modular toolkit for Marathi text analysis built on state-of-the-art MahaBERT-based transformer models. Our work holds significant importance as… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: Accepted at IJCNLP-AACL 2023

  32. arXiv:2311.01247  [pdf, other

    cs.CR

    Emergent (In)Security of Multi-Cloud Environments

    Authors: Morgan Reece, Theodore Lander Jr., Sudip Mittal, Nidhi Rastogi, Josiah Dykstra, Andy Sampson

    Abstract: As organizations increasingly use cloud services to host their IT infrastructure, there is a need to share data among these cloud hosted services and systems. A majority of IT organizations have workloads spread across different cloud service providers, growing their multi-cloud environments. When an organization grows their multi-cloud environment, the threat vectors and vulnerabilities for their… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Journal ref: 39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023)

  33. arXiv:2311.00203  [pdf, other

    cs.AI

    Modeling subjectivity (by Mimicking Annotator Annotation) in toxic comment identification across diverse communities

    Authors: Senjuti Dutta, Sid Mittal, Sherol Chen, Deepak Ramachandran, Ravi Rajakumar, Ian Kivlichan, Sunny Mak, Alena Butryna, Praveen Paritosh

    Abstract: The prevalence and impact of toxic discussions online have made content moderation crucial.Automated systems can play a vital role in identifying toxicity, and reducing the reliance on human moderation.Nevertheless, identifying toxic comments for diverse communities continues to present challenges that are addressed in this paper.The two-part goal of this study is to(1)identify intuitive variances… ▽ More

    Submitted 31 October, 2023; originally announced November 2023.

  34. arXiv:2310.18205  [pdf, other

    cs.CL

    Lost in Translation, Found in Spans: Identifying Claims in Multilingual Social Media

    Authors: Shubham Mittal, Megha Sundriyal, Preslav Nakov

    Abstract: Claim span identification (CSI) is an important step in fact-checking pipelines, aiming to identify text segments that contain a checkworthy claim or assertion in a social media post. Despite its importance to journalists and human fact-checkers, it remains a severely understudied problem, and the scarce research on this topic so far has only focused on English. Here we aim to bridge this gap by c… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 (main)

  35. arXiv:2310.17764  [pdf, other

    cs.CV

    SynergyNet: Bridging the Gap between Discrete and Continuous Representations for Precise Medical Image Segmentation

    Authors: Vandan Gorade, Sparsh Mittal, Debesh Jha, Ulas Bagci

    Abstract: In recent years, continuous latent space (CLS) and discrete latent space (DLS) deep learning models have been proposed for medical image analysis for improved performance. However, these models encounter distinct challenges. CLS models capture intricate details but often lack interpretability in terms of structural representation and robustness due to their emphasis on low-level features. Converse… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted at WACV 2024

  36. arXiv:2310.15848  [pdf, other

    cs.LG cs.CV

    On Responsible Machine Learning Datasets with Fairness, Privacy, and Regulatory Norms

    Authors: Surbhi Mittal, Kartik Thakral, Richa Singh, Mayank Vatsa, Tamar Glaser, Cristian Canton Ferrer, Tal Hassner

    Abstract: Artificial Intelligence (AI) has made its way into various scientific fields, providing astonishing improvements over existing algorithms for a wide variety of tasks. In recent years, there have been severe concerns over the trustworthiness of AI technologies. The scientific community has focused on the development of trustworthy AI algorithms. However, machine and deep learning algorithms, popula… ▽ More

    Submitted 24 November, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: corrected typos

  37. arXiv:2310.10133  [pdf, ps, other

    cs.CR stat.ML

    Empowering SMPC: Bridging the Gap Between Scalability, Memory Efficiency and Privacy in Neural Network Inference

    Authors: Ramya Burra, Anshoo Tandon, Srishti Mittal

    Abstract: This paper aims to develop an efficient open-source Secure Multi-Party Computation (SMPC) repository, that addresses the issue of practical and scalable implementation of SMPC protocol on machines with moderate computational resources, while aiming to reduce the execution time. We implement the ABY2.0 protocol for SMPC, providing developers with effective tools for building applications on the ABY… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  38. arXiv:2310.08565  [pdf, other

    cs.RO cs.AI

    Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

    Authors: Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

    Abstract: Robotics and Artificial Intelligence (AI) have been inextricably intertwined since their inception. Today, AI-Robotics systems have become an integral part of our daily lives, from robotic vacuum cleaners to semi-autonomous cars. These systems are built upon three fundamental architectural elements: perception, navigation and planning, and control. However, while the integration of AI-Robotics sys… ▽ More

    Submitted 25 January, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  39. arXiv:2309.08814  [pdf, other

    cs.RO cs.AI

    URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments

    Authors: Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy Bethel, Jingdao Chen

    Abstract: A major challenge with off-road autonomous navigation is the lack of maps or road markings that can be used to plan a path for autonomous robots. Classical path planning methods mostly assume a perfectly known environment without accounting for the inherent perception and sensing uncertainty from detecting terrain and obstacles in off-road environments. Recent work in computer vision and deep neur… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  40. arXiv:2308.02031  [pdf, other

    cs.CY cs.AI cs.CR cs.LG

    Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy

    Authors: Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi

    Abstract: Neuro-Symbolic Artificial Intelligence (AI) is an emerging and quickly advancing field that combines the subsymbolic strengths of (deep) neural networks and explicit, symbolic knowledge contained in knowledge graphs to enhance explainability and safety in AI systems. This approach addresses a key criticism of current generation systems, namely their inability to generate human-understandable expla… ▽ More

    Submitted 24 July, 2023; originally announced August 2023.

    Comments: 4 pages, 1 figure (To Appear in IEEE Internet Computing)

  41. arXiv:2307.07982  [pdf, other

    cs.LG cs.AR cs.CL cs.CV

    A Survey of Techniques for Optimizing Transformer Inference

    Authors: Krishna Teja Chitty-Venkata, Sparsh Mittal, Murali Emani, Venkatram Vishwanath, Arun K. Somani

    Abstract: Recent years have seen a phenomenal rise in performance and applications of transformer neural networks. The family of transformer networks, including Bidirectional Encoder Representations from Transformer (BERT), Generative Pretrained Transformer (GPT) and Vision Transformer (ViT), have shown their effectiveness across Natural Language Processing (NLP) and Computer Vision (CV) domains. Transforme… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  42. arXiv:2306.13033  [pdf, other

    cs.CR cs.AI

    Impacts and Risk of Generative AI Technology on Cyber Defense

    Authors: Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi

    Abstract: Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of autonomously producing highly realistic content in various domains, such as text, images, audio, and videos. With its potential for positive applications in creative arts, content generation, virtual assistants, and data synthesis, GenAI has garnered significant attention and adoption. However, the increasin… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  43. arXiv:2306.06234  [pdf, other

    cs.CL cs.AI

    Using Foundation Models to Detect Policy Violations with Minimal Supervision

    Authors: Sid Mittal, Vineet Gupta, Frederick Liu, Mukund Sundararajan

    Abstract: Foundation models, i.e. large neural networks pre-trained on large text corpora, have revolutionized NLP. They can be instructed directly (e.g. (arXiv:2005.14165)) - this is called hard prompting - and they can be tuned using very little data (e.g. (arXiv:2104.08691)) - this technique is called soft prompting. We seek to leverage their capabilities to detect policy violations. Our contributions ar… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: 16 pages

  44. arXiv:2306.01862  [pdf, other

    cs.CR

    Systemic Risk and Vulnerability Analysis of Multi-cloud Environments

    Authors: Morgan Reece, Theodore Edward Lander Jr., Matthew Stoffolano, Andy Sampson, Josiah Dykstra, Sudip Mittal, Nidhi Rastogi

    Abstract: With the increasing use of multi-cloud environments, security professionals face challenges in configuration, management, and integration due to uneven security capabilities and features among providers. As a result, a fragmented approach toward security has been observed, leading to new attack vectors and potential vulnerabilities. Other research has focused on single-cloud platforms or specific… ▽ More

    Submitted 7 July, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: 27 pages, 9 figures

  45. arXiv:2305.13967  [pdf, other

    cs.CR cs.AI

    REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response

    Authors: Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal, Benjamin A Blakely

    Abstract: Automated Intelligent Cyberdefense Agents (AICAs) that are part Intrusion Detection Systems (IDS) and part Intrusion Response Systems (IRS) are being designed to protect against sophisticated and automated cyber-attacks. An AICA based on the ideas of Self-Adaptive Autonomic Computing Systems (SA-ACS) can be considered as a managing system that protects a managed system like a personal computer, we… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  46. arXiv:2305.08993  [pdf, other

    cs.CR cs.LG

    Survey of Malware Analysis through Control Flow Graph using Machine Learning

    Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal

    Abstract: Malware is a significant threat to the security of computer systems and networks which requires sophisticated techniques to analyze the behavior and functionality for detection. Traditional signature-based malware detection methods have become ineffective in detecting new and unknown malware due to their rapid evolution. One of the most promising techniques that can overcome the limitations of sig… ▽ More

    Submitted 20 June, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

  47. arXiv:2305.06155  [pdf, other

    cs.CL cs.AI cs.LG

    Leveraging Synthetic Targets for Machine Translation

    Authors: Sarthak Mittal, Oleksii Hrinchuk, Oleksii Kuchaiev

    Abstract: In this work, we provide a recipe for training machine translation models in a limited resource setting by leveraging synthetic target data generated using a large pre-trained model. We show that consistently across different benchmarks in bilingual, multilingual, and speech translation setups, training models on synthetic targets outperforms training on the actual ground-truth data. This performa… ▽ More

    Submitted 7 May, 2023; originally announced May 2023.

  48. arXiv:2303.17387  [pdf, other

    cs.CR cs.AI cs.LG

    Explainable Intrusion Detection Systems Using Competitive Learning Techniques

    Authors: Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale

    Abstract: The current state of the art systems in Artificial Intelligence (AI) enabled intrusion detection use a variety of black box methods. These black box methods are generally trained using Error Based Learning (EBL) techniques with a focus on creating accurate models. These models have high performative costs and are not easily explainable. A white box Competitive Learning (CL) based eXplainable Intru… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

  49. A Unified Cloud-Enabled Discrete Event Parallel and Distributed Simulation Architecture

    Authors: José L. Risco-Martín, Kevin Henares, Saurabh Mittal, Luis F. Almendras, Katzalin Olcoz

    Abstract: Cloud simulation environments today are largely employed to model and simulate complex systems for remote accessibility and variable capacity requirements. In this regard, scalability issues in Modeling and Simulation (M\&S) computational requirements can be tackled through the elasticity of on-demand Cloud deployment. However, implementing a high performance cloud M\&S framework following these e… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Journal ref: Simulation Modelling Practice and Theory, 118, 2022

  50. arXiv:2302.07953  [pdf, other

    cs.CR cs.AI cs.LG cs.RO

    AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce

    Authors: Sudip Mittal, Jingdao Chen

    Abstract: Robotics, automation, and related Artificial Intelligence (AI) systems have become pervasive bringing in concerns related to security, safety, accuracy, and trust. With growing dependency on physical robots that work in close proximity to humans, the security of these systems is becoming increasingly important to prevent cyber-attacks that could lead to privacy invasion, critical operations sabota… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.