Skip to main content

Showing 1–23 of 23 results for author: Patel, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16898  [pdf, other

    cs.LG cs.AI

    How to Parameterize Asymmetric Quantization Ranges for Quantization-Aware Training

    Authors: Jaeseong You, Minseop Park, Kyunggeun Lee, Seokjun An, Chirag Patel, Markus Nage

    Abstract: This paper investigates three different parameterizations of asymmetric uniform quantization for quantization-aware training: (1) scale and offset, (2) minimum and maximum, and (3) beta and gamma. We perform a comprehensive comparative analysis of these parameterizations' influence on quantization-aware training, using both controlled experiments and real-world large language models. Our particula… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  2. arXiv:2401.11002  [pdf, other

    cs.CV cs.AI

    Fast Registration of Photorealistic Avatars for VR Facial Animation

    Authors: Chaitanya Patel, Shaojie Bai, Te-Li Wang, Jason Saragih, Shih-En Wei

    Abstract: Virtual Reality (VR) bares promise of social interactions that can feel more immersive than other media. Key to this is the ability to accurately animate a photorealistic avatar of one's likeness while wearing a VR headset. Although high quality registration of person-specific avatars to headset-mounted camera (HMC) images is possible in an offline setting, the performance of generic realtime mode… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Project page: https://chaitanya100100.github.io/FastRegistration/

  3. arXiv:2309.14670  [pdf, other

    cs.CV cs.LG

    DONNAv2 -- Lightweight Neural Architecture Search for Vision tasks

    Authors: Sweta Priyadarshi, Tianyu Jiang, Hsin-Pai Cheng, Sendil Krishna, Viswanath Ganapathy, Chirag Patel

    Abstract: With the growing demand for vision applications and deployment across edge devices, the development of hardware-friendly architectures that maintain performance during device deployment becomes crucial. Neural architecture search (NAS) techniques explore various approaches to discover efficient architectures for diverse learning tasks in a computationally efficient manner. In this paper, we presen… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: Accepted at ICCV-Workshop on Resource-Efficient Deep Learning, 2023

  4. arXiv:2309.07730  [pdf, other

    cs.CR cs.AI

    AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

    Authors: Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar

    Abstract: Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  5. arXiv:2309.01729  [pdf, other

    cs.LG cs.AI cs.CV

    Softmax Bias Correction for Quantized Generative Models

    Authors: Nilesh Prasad Pandey, Marios Fournarakis, Chirag Patel, Markus Nagel

    Abstract: Post-training quantization (PTQ) is the go-to compression technique for large generative models, such as stable diffusion or large language models. PTQ methods commonly keep the softmax activation in higher precision as it has been shown to be very sensitive to quantization noise. However, this can lead to a significant runtime and power overhead during inference on resource-constraint edge device… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  6. arXiv:2305.06640  [pdf, other

    eess.AS cs.AI cs.IT cs.SD

    Speaker Diaphragm Excursion Prediction: deep attention and online adaptation

    Authors: Yuwei Ren, Matt Zivney, Yin Huang, Eddie Choy, Chirag Patel, Hao Xu

    Abstract: Speaker protection algorithm is to leverage the playback signal properties to prevent over excursion while maintaining maximum loudness, especially for the mobile phone with tiny loudspeakers. This paper proposes efficient DL solutions to accurately model and predict the nonlinear excursion, which is challenging for conventional solutions. Firstly, we build the experiment and pre-processing pipeli… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures, ICASSP 2023

  7. arXiv:2305.03266  [pdf, other

    cs.CR cs.AR

    RARES: Runtime Attack Resilient Embedded System Design Using Verified Proof-of-Execution

    Authors: Avani Dave Nilanjan Banerjee Chintan Patel

    Abstract: Modern society is getting accustomed to the Internet of Things (IoT) and Cyber-Physical Systems (CPS) for a variety of applications that involves security-critical user data and information transfers. In the lower end of the spectrum, these devices are resource-constrained with no attack protection. They become a soft target for malicious code modification attacks that steals and misuses device da… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

  8. arXiv:2304.11489  [pdf, other

    cs.CR cs.AR

    FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: With the increased utilization, the small embedded and IoT devices have become an attractive target for sophisticated attacks that can exploit the devices security critical information and data in malevolent activities. Secure boot and Remote Attestation (RA) techniques verifies the integrity of the devices software state at boot-time and runtime. Correct implementation and formal verification of… ▽ More

    Submitted 22 April, 2023; originally announced April 2023.

  9. arXiv:2303.17951  [pdf, other

    cs.LG

    FP8 versus INT8 for efficient deep learning inference

    Authors: Mart van Baalen, Andrey Kuzmin, Suparna S Nair, Yuwei Ren, Eric Mahurin, Chirag Patel, Sundar Subramanian, Sanghyuk Lee, Markus Nagel, Joseph Soriaga, Tijmen Blankevoort

    Abstract: Recently, the idea of using FP8 as a number format for neural network training has been floating around the deep learning world. Given that most training is currently conducted with entire networks in FP32, or sometimes FP16 with mixed-precision, the step to having some parts of a network run in FP8 with 8-bit weights is an appealing potential speed-up for the generally costly and time-intensive t… ▽ More

    Submitted 15 June, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

  10. arXiv:2302.05397  [pdf, other

    cs.LG

    A Practical Mixed Precision Algorithm for Post-Training Quantization

    Authors: Nilesh Prasad Pandey, Markus Nagel, Mart van Baalen, Yin Huang, Chirag Patel, Tijmen Blankevoort

    Abstract: Neural network quantization is frequently used to optimize model size, latency and power consumption for on-device deployment of neural networks. In many cases, a target bit-width is set for an entire network, meaning every layer get quantized to the same number of bits. However, for many networks some layers are significantly more robust to quantization noise than others, leaving an important axi… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

  11. arXiv:2211.07090  [pdf, other

    cs.IT cs.LG

    Hand gesture recognition using 802.11ad mmWave sensor in the mobile device

    Authors: Yuwei Ren, Jiuyuan Lu, Andrian Beletchi, Yin Huang, Ilia Karmanov, Daniel Fontijne, Chirag Patel, Hao Xu

    Abstract: We explore the feasibility of AI assisted hand-gesture recognition using 802.11ad 60GHz (mmWave) technology in smartphones. Range-Doppler information (RDI) is obtained by using pulse Doppler radar for gesture recognition. We built a prototype system, where radar sensing and WLAN communication waveform can coexist by time-division duplex (TDD), to demonstrate the real-time hand-gesture inference. I… ▽ More

    Submitted 13 November, 2022; originally announced November 2022.

    Comments: 6 pages, 12 figures

    Journal ref: 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)

  12. arXiv:2208.06165  [pdf, other

    cs.CR cs.RO

    Customer Empowered Privacy-Preserving Secure Verification using Decentralized Identifier and Verifiable Credentials For Product Delivery Using Robots

    Authors: Chintan Patel

    Abstract: In the age of respiratory illnesses like COVID 19, we understand the necessity for a robot based delivery system to ensure safe and contact free courier delivery. A blockchain based Dynamic IDentifier gives people total power over their identities while preserving auditability and anonymity. A human mobile phone and a robot are machines created with a chip, making it simple to deploy a physical un… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

  13. arXiv:2208.02592  [pdf, other

    cs.CR cs.CY

    Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework

    Authors: Jaimandeep Singh, Chintan Patel, Naveen Kumar Chaudhary

    Abstract: In recent cyber attacks, credential theft has emerged as one of the primary vectors of gaining entry into the system. Once attacker(s) have a foothold in the system, they use various techniques including token manipulation to elevate the privileges and access protected resources. This makes authentication and token based authorization a critical component for a secure and resilient cyber system. I… ▽ More

    Submitted 29 November, 2022; v1 submitted 4 August, 2022; originally announced August 2022.

  14. arXiv:2207.10353  [pdf, other

    cs.CR

    Secure Lightweight Authentication for Multi User IoT Environment

    Authors: Chintan Patel

    Abstract: The Internet of Things (IoT) is giving a boost to a plethora of new opportunities for the robust and sustainable deployment of cyber physical systems. The cornerstone of any IoT system is the sensing devices. These sensing devices have considerable resource constraints, including insufficient battery capacity, CPU capability, and physical security. Because of such resource constraints, designing l… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

  15. arXiv:2207.02706  [pdf, other

    cs.CR

    LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm

    Authors: Chintan Patel, Nishant Doshi

    Abstract: The widespread expansion of the IoT based services are changing peoples living habits. With the vast data generation and intelligent decision support system, an IoT is supporting many industries to improve their products and services. The major challenge for IoT developers is to design a secure data transmission system and a trustworthy inter device and user device communication system. The data s… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  16. arXiv:2201.08442  [pdf, other

    cs.LG cs.AI cs.AR cs.PF cs.SE

    Neural Network Quantization with AI Model Efficiency Toolkit (AIMET)

    Authors: Sangeetha Siddegowda, Marios Fournarakis, Markus Nagel, Tijmen Blankevoort, Chirag Patel, Abhijit Khobare

    Abstract: While neural networks have advanced the frontiers in many machine learning applications, they often come at a high computational cost. Reducing the power and latency of neural network inference is vital to integrating modern networks into edge devices with strict power and compute requirements. Neural network quantization is one of the most effective ways of achieving these savings, but the additi… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2106.08295

  17. arXiv:2111.10079  [pdf, other

    cs.CV cs.LG

    Evaluating Self and Semi-Supervised Methods for Remote Sensing Segmentation Tasks

    Authors: Chaitanya Patel, Shashank Sharma, Valerie J. Pasquarella, Varun Gulshan

    Abstract: Self- and semi-supervised machine learning techniques leverage unlabeled data for improving downstream task performance. These methods are especially valuable for remote sensing tasks where producing labeled ground truth datasets can be prohibitively expensive but there is easy access to a wealth of unlabeled imagery. We perform a rigorous evaluation of SimCLR, a self-supervised method, and FixMat… ▽ More

    Submitted 19 June, 2022; v1 submitted 19 November, 2021; originally announced November 2021.

  18. arXiv:2101.06300  [pdf, other

    cs.CR

    CARE: Lightweight Attack Resilient Secure Boot Architecturewith Onboard Recovery for RISC-V based SOC

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: Recent technological advancements have proliferated the use of small embedded devices for collecting, processing, and transferring the security-critical information. The Internet of Things (IoT) has enabled remote access and control of these network-connected devices. Consequently, an attacker can exploit security vulnerabilities and compromise these devices. In this context, the secure boot becom… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  19. arXiv:2101.06148  [pdf, other

    cs.CR

    SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: Recent technological advancements have enabled proliferated use of small embedded and IoT devices for collecting, processing, and transferring the security-critical information and user data. This exponential use has acted as a catalyst in the recent growth of sophisticated attacks such as the replay, man-in-the-middle, and malicious code modification to slink, leak, tweak or exploit the security-… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  20. arXiv:2003.04583  [pdf, other

    cs.CV cs.GR

    TailorNet: Predicting Clothing in 3D as a Function of Human Pose, Shape and Garment Style

    Authors: Chaitanya Patel, Zhouyingcheng Liao, Gerard Pons-Moll

    Abstract: In this paper, we present TailorNet, a neural model which predicts clothing deformation in 3D as a function of three factors: pose, shape and style (garment geometry), while retaining wrinkle detail. This goes beyond prior models, which are either specific to one style and shape, or generalize to different shapes producing smooth results, despite being style specific. Our hypothesis is that (even… ▽ More

    Submitted 15 March, 2020; v1 submitted 10 March, 2020; originally announced March 2020.

    Comments: Accepted to CVPR 2020. Chaitanya Patel and Zhouyingcheng Liao contributed equally

  21. arXiv:1911.12491  [pdf, other

    cs.CV cs.LG

    QKD: Quantization-aware Knowledge Distillation

    Authors: Jangho Kim, Yash Bhalgat, Jinwon Lee, Chirag Patel, Nojun Kwak

    Abstract: Quantization and Knowledge distillation (KD) methods are widely used to reduce memory and power consumption of deep neural networks (DNNs), especially for resource-constrained edge devices. Although their combination is quite promising to meet these requirements, it may not work as desired. It is mainly because the regularization effect of KD further diminishes the already reduced representation p… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  22. arXiv:1908.06544  [pdf, other

    cs.CV

    HumanMeshNet: Polygonal Mesh Recovery of Humans

    Authors: Abbhinav Venkat, Chaitanya Patel, Yudhik Agrawal, Avinash Sharma

    Abstract: 3D Human Body Reconstruction from a monocular image is an important problem in computer vision with applications in virtual and augmented reality platforms, animation industry, en-commerce domain, etc. While several of the existing works formulate it as a volumetric or parametric learning with complex and indirect reliance on re-projections of the mesh, we would like to focus on implicitly learnin… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

    Comments: to appear in ICCV-W, 2019. Project: https://github.com/yudhik11/HumanMeshNet

  23. Microprocessor Optimizations for the Internet of Things: A Survey

    Authors: Tosiron Adegbija, Anita Rogacs, Chandrakant Patel, Ann Gordon-Ross

    Abstract: The Internet of Things (IoT) refers to a pervasive presence of interconnected and uniquely identifiable physical devices. These devices' goal is to gather data and drive actions in order to improve productivity, and ultimately reduce or eliminate reliance on human intervention for data acquisition, interpretation, and use. The proliferation of these connected low-power devices will result in a dat… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 March, 2016; originally announced March 2016.

    Comments: Published at IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD); Special Issue on Circuit and System Design for Internet of Things