Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Mukherjee, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.13666  [pdf, ps, other

    cs.LG

    Generalization Bounds for Dependent Data using Online-to-Batch Conversion

    Authors: Sagnik Chatterjee, Manuj Mukherjee, Alhad Sethi

    Abstract: In this work, we give generalization bounds of statistical learning algorithms trained on samples drawn from a dependent data source, both in expectation and with high probability, using the Online-to-Batch conversion paradigm. We show that the generalization error of statistical learners in the dependent data setting is equivalent to the generalization error of statistical learners in the i.i.d.… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  2. A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks

    Authors: Kushal Chakraborty, Aritra Kumar Dutta, Mohammad Avesh Hussain, Syed Raafay Mohiuddin, Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee

    Abstract: The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. 6TiSCH (IPv6 over the Time Slotted Channel Hopping mode of IEEE 802.15.4e) as an enabling technology facilitates low-power and low-latency communication between IoT devices in industr… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: The paper has been submitted, accepted, and presented at the 2023 IEEE Global Communications Conference: Next-Generation Networking and Internet, with plans for publication. It was delivered during the IEEE Global Communications Conference held on December 6th, 2023, in Kuala Lumpur, Malaysia

  3. arXiv:2401.15355  [pdf, ps, other

    cs.IT

    Improved bounds on the interactive capacity via error pattern analysis

    Authors: Mudit Aggarwal, Manuj Mukherjee

    Abstract: Any interactive protocol between a pair of parties can be reliably simulated in the presence of noise with a multiplicative overhead on the number of rounds (Schulman 1996). The reciprocal of the best (least) overhead is called the interactive capacity of the noisy channel. In this work, we present lower bounds on the interactive capacity of the binary erasure channel. Our lower bound improves t… ▽ More

    Submitted 18 April, 2024; v1 submitted 27 January, 2024; originally announced January 2024.

    Comments: Shorter version accepted at ISIT 2024

  4. arXiv:2307.08680  [pdf, ps, other

    cs.IT

    Optimal storage codes on graphs with fixed locality

    Authors: Sabyasachi Basu, Manuj Mukherjee

    Abstract: Storage codes on graphs are an instance of \emph{codes with locality}, which are used in distributed storage schemes to provide local repairability. Specifically, the nodes of the graph correspond to storage servers, and the neighbourhood of each server constitute the set of servers it can query to repair its stored data in the event of a failure. A storage code on a graph with $n$-vertices is a s… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  5. arXiv:2306.03268  [pdf, other

    cs.CL cs.SE

    "Medium" LMs of Code in the Era of LLMs: Lessons From StackOverflow

    Authors: Manisha Mukherjee, Vincent J. Hellendoorn

    Abstract: Large pre-trained neural language models have brought immense progress to both NLP and software engineering. Models in OpenAI's GPT series now dwarf Google's BERT and Meta's RoBERTa, which previously set new benchmarks on a wide range of NLP applications. These models are trained on massive corpora of heterogeneous data from web crawls, which enables them to learn general language patterns and sem… ▽ More

    Submitted 24 January, 2024; v1 submitted 5 June, 2023; originally announced June 2023.

  6. arXiv:2110.02333  [pdf, other

    cs.LG cs.AI math.ST

    On the Impact of Stable Ranks in Deep Nets

    Authors: Bogdan Georgiev, Lukas Franken, Mayukh Mukherjee, Georgios Arvanitidis

    Abstract: A recent line of work has established intriguing connections between the generalization/compression properties of a deep neural network (DNN) model and the so-called layer weights' stable ranks. Intuitively, the latter are indicators of the effective number of parameters in the net. In this work, we address some natural questions regarding the space of DNNs conditioned on the layers' stable rank,… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: 24 pages, 8 figures, comments welcome!

  7. arXiv:2109.07620  [pdf, other

    cs.IT

    Reconfigurable Intelligent Surface-assisted Edge Computing to Minimize Delay in Task Offloading

    Authors: Mithun Mukherjee, Vikas Kumar, Suman Kumar, Jaime Lloret, Qi Zhang, Mian Guo

    Abstract: The advantage of computational resources in edge computing near the data source has kindled growing interest in delay-sensitive Internet of Things (IoT) applications. However, the benefit of the edge server is limited by the uploading and downloading links between end-users and edge servers when these end-users seek computational resources from edge servers. The scenario becomes more severe when t… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 6 pages, 3 figures, accepted for publication in IEEE GLOBECOM 2021

  8. arXiv:2107.11351  [pdf, other

    cs.CL

    Powering Effective Climate Communication with a Climate Knowledge Base

    Authors: Kameron B. Rodrigues, Shweta Khushu, Mukut Mukherjee, Andrew Banister, Anthony Hevia, Sampath Duddu, Nikita Bhutani

    Abstract: While many accept climate change and its growing impacts, few converse about it well, limiting the adoption speed of societal changes necessary to address it. In order to make effective climate communication easier, we aim to build a system that presents to any individual the climate information predicted to best motivate and inspire them to take action given their unique set of personal values. T… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

  9. arXiv:2106.14356  [pdf, ps, other

    cs.IT cs.NI

    Collaborative Edge Learning in MIMO-NOMA Uplink Transmission Environment

    Authors: Mian Guo, Chun Shan, Mithun Mukherjee, Jaime Lloret, Quansheng Guan

    Abstract: Multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) cellular network is promising for supporting massive connectivity. This paper exploits low-latency machine learning in the MIMO-NOMA uplink transmission environment, where a substantial amount of data must be uploaded from multiple data sources to a one-hop away edge server for machine learning. A delay-aware edge learning f… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

    Comments: 5 pages, 3 figures, accepted for publication in IEEE/CIC ICCC 2021

  10. arXiv:2106.11784  [pdf, other

    cs.NI cs.ET cs.IT

    The Interplay of Reconfigurable Intelligent Surfaces and Mobile Edge Computing in Future Wireless Networks: A Win-Win Strategy to 6G

    Authors: Mithun Mukherjee, Vikas Kumar, Mian Guo, Daniel Benevides da Costa, Ertugrul Basar, Zhiguo Ding

    Abstract: Reconfigurable intelligent surface (RIS)-empowered communication is being considered as an enabling technology for sixth generation (6G) wireless networks. The key idea of RIS-assisted communication is to enhance the capacity, coverage, energy efficiency, physical layer security, and many other aspects of modern wireless networks. At the same time, mobile edge computing (MEC) has already shown its… ▽ More

    Submitted 12 May, 2021; originally announced June 2021.

  11. arXiv:2105.01506  [pdf, other

    cs.IT

    Multiparty Interactive Coding over Networks of Intersecting Broadcast Links

    Authors: Manuj Mukherjee, Ran Gelles

    Abstract: We consider computations over networks with multiple broadcast channels that intersect at a single party. Each broadcast link suffers from random bit-flip noise that affects the receivers independently. We design interactive coding schemes that successfully perform any computation over these noisy networks and strive to reduce their communication overhead with respect to the original (noiseless) c… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

  12. arXiv:2104.12460  [pdf, other

    cs.IT

    Reconfigurable Adaptive Channel Sensing

    Authors: Manuj Mukherjee, Aslan Tchamkerten, Chadi Jabbour

    Abstract: Channel sensing consists of probing the channel from time to time to check whether or not it is active - say, because of an incoming message. When communication is sparse with information being sent once in a long while, channel sensing becomes a significant source of energy consumption. How to reliably detect messages while minimizing the receiver energy consumption? This paper addresses this pro… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

  13. SMOTE-ENC: A novel SMOTE-based method to generate synthetic data for nominal and continuous features

    Authors: Mimi Mukherjee, Matloob Khushi

    Abstract: Real world datasets are heavily skewed where some classes are significantly outnumbered by the other classes. In these situations, machine learning algorithms fail to achieve substantial efficacy while predicting these under-represented instances. To solve this problem, many variations of synthetic minority over-sampling methods (SMOTE) have been proposed to balance the dataset which deals with co… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Journal ref: Appl. Syst. Innov. 2021, 4, 18

  14. arXiv:2102.10531  [pdf, ps, other

    cs.CY

    Exploring the dynamics of protest against National Register of Citizens & Citizenship Amendment Act through online social media: the Indian experience

    Authors: Souvik Roy, Milan Mukherjee, Priyadarsini Sinha, Sukanta Das, Subhasis Bandopadhyay, Abhik Mukherjee

    Abstract: The generic fluidity observed in the nature of political protest movements across the world during the last decade weigh heavily with the presence of social media. As such, there is a possibility to study the contemporary movements with an interdisciplinary approach combining computational analytics with social science perspectives. The present study has put efforts to understand such dynamics in… ▽ More

    Submitted 21 February, 2021; originally announced February 2021.

  15. arXiv:2101.09973  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Approximating Probability Distributions by ReLU Networks

    Authors: Manuj Mukherjee, Aslan Tchamkerten, Mansoor Yousefi

    Abstract: How many neurons are needed to approximate a target probability distribution using a neural network with a given input distribution and approximation error? This paper examines this question for the case when the input distribution is uniform, and the target distribution belongs to the class of histogram distributions. We obtain a new upper bound on the number of required neurons, which is strictl… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: Longer version of a paper accepted for presentation at the ITW 2020

  16. arXiv:2101.06061  [pdf, other

    cs.LG math.MG math.PR math.ST stat.ML

    Heating up decision boundaries: isocapacitory saturation, adversarial scenarios and generalization bounds

    Authors: Bogdan Georgiev, Lukas Franken, Mayukh Mukherjee

    Abstract: In the present work we study classifiers' decision boundaries via Brownian motion processes in ambient data space and associated probabilistic techniques. Intuitively, our ideas correspond to placing a heat source at the decision boundary and observing how effectively the sample points warm up. We are largely motivated by the search for a soft measure that sheds further light on the decision bound… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: Accepted as conference paper at ICLR 2021. 36 pages, 16 figures, comments welcome!

  17. arXiv:1904.11383  [pdf, ps, other

    cs.IT

    Multiterminal Secret Key Agreement with Nearly No Discussion

    Authors: Chung Chan, Manuj Mukherjee, Praneeth Kumar Vippathalla, Qiaoqiao Zhou

    Abstract: We consider the secret key agreement problem under the multiterminal source model proposed by Csiszár and Narayan. A single-letter characterization of the secrecy capacity is desired but remains unknown except in the extreme case with unlimited public discussion and without wiretapper's side information. Taking the problem to the opposite extreme by requiring the public discussion rate to be zero… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  18. arXiv:1901.03899  [pdf, other

    cs.CR

    Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures

    Authors: Leandros Maglaras, Mohamed Amine Ferrag, Abdelouahid Derhab, Mithun Mukherjee, Helge Janicke, Stylianos Rallis

    Abstract: As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as a nation. Moreover, the ability to attribute is a vital element of avoiding impunity in cyberspace. In this article, we present main threats to critical infrastructures along with protective measures that one nation can take, and which are… ▽ More

    Submitted 12 January, 2019; originally announced January 2019.

  19. Blockchain Technologies for the Internet of Things: Research Issues and Challenges

    Authors: Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke

    Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog… ▽ More

    Submitted 24 June, 2018; originally announced June 2018.

    Comments: 14 pages, 5 figures

  20. arXiv:1805.01115  [pdf, ps, other

    cs.IT

    Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources

    Authors: Chung Chan, Manuj Mukherjee, Navin Kashyap, Qiaoqiao Zhou

    Abstract: Hypergraphical sources are a natural class of sources for secret key generation, within which different subsets of terminals sharing secrets are allowed to discuss publicly in order to agree upon a global secret key. While their secrecy capacity, i.e., the maximum rate of a secret key that can be agreed upon by the entire set of terminals, is well-understood, what remains open is the maximum rate… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

  21. arXiv:1804.06136  [pdf, other

    cs.ET

    Synchronization for Diffusion-based Molecular Communication Systems via Faster Molecules

    Authors: Mithun Mukherjee, H. Birkan Yilmaz, Bishanka Brata Bhowmik, Jaime Lloret, Yunrong Lv

    Abstract: In this paper, we address the symbol synchronization issue in molecular communication via diffusion (MCvD). Symbol synchronization among chemical sensors and nanomachines is one of the critical challenges to manage complex tasks in the nanonetworks with molecular communication (MC). As in diffusion-based MC, most of the molecules arrive at the receptor closer to the start of the symbol duration, t… ▽ More

    Submitted 4 March, 2019; v1 submitted 17 April, 2018; originally announced April 2018.

    Comments: Changed title, revised text, IEEE International Conference on Communications (ICC), Shanghai, China, May, 2019

  22. arXiv:1802.04955  [pdf, ps, other

    cs.IT

    Multiterminal Secret Key Agreement at Asymptotically Zero Discussion Rate

    Authors: Chung Chan, Manuj Mukherjee, Navin Kashyap, Qiaoqiao Zhou

    Abstract: In the multiterminal secret key agreement problem, a set of users want to discuss with each other until they share a common secret key independent of their discussion. We want to characterize the maximum secret key rate, called the secrecy capacity, asymptotically when the total discussion rate goes to zero. In the case of only two users, the capacity is equal to the Gács-Körner common information… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

  23. arXiv:1702.07429  [pdf, ps, other

    cs.IT

    On the Optimality of Secret Key Agreement via Omniscience

    Authors: Chung Chan, Manuj Mukherjee, Navin Kashyap, Qiaoqiao Zhou

    Abstract: For the multiterminal secret key agreement problem under a private source model, it is known that the maximum key rate, i.e., the secrecy capacity, can be achieved through communication for omniscience, but the omniscience strategy can be strictly suboptimal in terms of minimizing the public discussion rate. While a single-letter characterization is not known for the minimum discussion rate needed… ▽ More

    Submitted 4 January, 2018; v1 submitted 23 February, 2017; originally announced February 2017.

  24. arXiv:1701.05008  [pdf, ps, other

    cs.IT

    Secret Key Agreement under Discussion Rate Constraints

    Authors: Chung Chan, Manuj Mukherjee, Navin Kashyap, Qiaoqiao Zhou

    Abstract: For the multiterminal secret key agreement problem, new single-letter lower bounds are obtained on the public discussion rate required to achieve any given secret key rate below the secrecy capacity. The results apply to general source model without helpers or wiretapper's side information but can be strengthened for hypergraphical sources. In particular, for the pairwise independent network, the… ▽ More

    Submitted 19 January, 2017; v1 submitted 18 January, 2017; originally announced January 2017.

  25. Bounds on the Communication Rate Needed to Achieve SK Capacity in the Hypergraphical Source Model

    Authors: Manuj Mukherjee, Chung Chan, Navin Kashyap, Qiaoqiao Zhou

    Abstract: In the multiterminal source model of Csisz$\text{á}$r and Narayan, the communication complexity, $R_{\text{SK}}$, for secret key (SK) generation is the minimum rate of communication required to achieve SK capacity. An obvious upper bound to $R_{\text{SK}}$ is given by $R_{\text{CO}}$, which is the minimum rate of communication required for \emph{omniscience}. In this paper we derive a better upper… ▽ More

    Submitted 28 January, 2016; v1 submitted 20 January, 2016; originally announced January 2016.

    Comments: A shorter version has been submitted to IEEE ISIT 2016, Barcelona, Spain

  26. On the Public Communication Needed to Achieve SK Capacity in the Multiterminal Source Model

    Authors: Manuj Mukherjee, Navin Kashyap, Yogesh Sankarasubramaniam

    Abstract: The focus of this paper is on the public communication required for generating a maximal-rate secret key (SK) within the multiterminal source model of Csisz{á}r and Narayan. Building on the prior work of Tyagi for the two-terminal scenario, we derive a lower bound on the communication complexity, $R_{\text{SK}}$, defined to be the minimum rate of public communication needed to generate a maximal-r… ▽ More

    Submitted 10 July, 2015; originally announced July 2015.

    Comments: Submitted to the IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1504.00629

  27. arXiv:1504.00629  [pdf, ps, other

    cs.IT

    The communication complexity of achieving SK capacity in a class of PIN models

    Authors: Manuj Mukherjee, Navin Kashyap

    Abstract: The communication complexity of achieving secret key (SK) capacity in the multiterminal source model of Csisz$á$r and Narayan is the minimum rate of public communication required to generate a maximal-rate SK. It is well known that the minimum rate of communication for omniscience, denoted by $R_{\text{CO}}$, is an upper bound on the communication complexity, denoted by $R_{\text{SK}}$. A source m… ▽ More

    Submitted 3 April, 2015; v1 submitted 2 April, 2015; originally announced April 2015.

  28. Achieving SK Capacity in the Source Model: When Must All Terminals Talk?

    Authors: Manuj Mukherjee, Navin Kashyap, Yogesh Sankarasubramaniam

    Abstract: In this paper, we address the problem of characterizing the instances of the multiterminal source model of Csiszár and Narayan in which communication from all terminals is needed for establishing a secret key of maximum rate. We give an information-theoretic sufficient condition for identifying such instances. We believe that our sufficient condition is in fact an exact characterization, but we ar… ▽ More

    Submitted 20 January, 2014; originally announced January 2014.

    Comments: A 5-page version of this paper was submitted to the 2014 IEEE International Symposium on Information Theory (ISIT 2014)

  29. arXiv:1401.1117  [pdf, ps, other

    cs.IT

    On the Communication Complexity of Secret Key Generation in the Multiterminal Source Model

    Authors: Manuj Mukherjee, Navin Kashyap

    Abstract: Communication complexity refers to the minimum rate of public communication required for generating a maximal-rate secret key (SK) in the multiterminal source model of Csiszar and Narayan. Tyagi recently characterized this communication complexity for a two-terminal system. We extend the ideas in Tyagi's work to derive a lower bound on communication complexity in the general multiterminal setting.… ▽ More

    Submitted 11 January, 2014; v1 submitted 6 January, 2014; originally announced January 2014.

    Comments: A 5-page version of this manuscript will be submitted to the 2014 IEEE International Symposium on Information Theory (ISIT 2014)