Zum Hauptinhalt springen

Showing 1–23 of 23 results for author: Sethi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.02407  [pdf, other

    cs.LG

    Terracorder: Sense Long and Prosper

    Authors: Josh Millar, Sarab Sethi, Hamed Haddadi, Anil Madhavapeddy

    Abstract: In-situ sensing devices need to be deployed in remote environments for long periods of time; minimizing their power consumption is vital for maximising both their operational lifetime and coverage. We introduce Terracorder -- a versatile multi-sensor device -- and showcase its exceptionally low power consumption using an on-device reinforcement learning scheduler. We prototype a unique device setu… ▽ More

    Submitted 8 August, 2024; v1 submitted 5 August, 2024; originally announced August 2024.

    Comments: Preprint

  2. arXiv:2407.09473  [pdf, other

    cs.CV

    StyleSplat: 3D Object Style Transfer with Gaussian Splatting

    Authors: Sahil Jain, Avik Kuthiala, Prabhdeep Singh Sethi, Prakanshul Saxena

    Abstract: Recent advancements in radiance fields have opened new avenues for creating high-quality 3D assets and scenes. Style transfer can enhance these 3D assets with diverse artistic styles, transforming creative expression. However, existing techniques are often slow or unable to localize style transfer to specific objects. We introduce StyleSplat, a lightweight method for stylizing 3D objects in scenes… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: for code and results, see http://bernard0047.github.io/stylesplat

  3. arXiv:2404.13530  [pdf, other

    cs.CV cs.CL cs.LG

    Listen Then See: Video Alignment with Speaker Attention

    Authors: Aviral Agrawal, Carlos Mateo Samudio Lezcano, Iqui Balam Heredia-Marin, Prabhdeep Singh Sethi

    Abstract: Video-based Question Answering (Video QA) is a challenging task and becomes even more intricate when addressing Socially Intelligent Question Answering (SIQA). SIQA requires context understanding, temporal reasoning, and the integration of multimodal information, but in addition, it requires processing nuanced human behavior. Furthermore, the complexities involved are exacerbated by the dominance… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  4. arXiv:2402.07262  [pdf, other

    cs.CL cs.HC

    Low-Resource Counterspeech Generation for Indic Languages: The Case of Bengali and Hindi

    Authors: Mithun Das, Saurabh Kumar Pandey, Shivansh Sethi, Punyajoy Saha, Animesh Mukherjee

    Abstract: With the rise of online abuse, the NLP community has begun investigating the use of neural architectures to generate counterspeech that can "counter" the vicious tone of such abusive speech and dilute/ameliorate their rippling effect over the social network. However, most of the efforts so far have been primarily focused on English. To bridge the gap for low-resource languages such as Bengali and… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: Accepted to the Findings of the ACL: EACL 2024

  5. arXiv:2310.12494  [pdf, other

    cs.LG

    SDGym: Low-Code Reinforcement Learning Environments using System Dynamics Models

    Authors: Emmanuel Klu, Sameer Sethi, DJ Passey, Donald Martin Jr

    Abstract: Understanding the long-term impact of algorithmic interventions on society is vital to achieving responsible AI. Traditional evaluation strategies often fall short due to the complex, adaptive and dynamic nature of society. While reinforcement learning (RL) can be a powerful approach for optimizing decisions in dynamic settings, the difficulty of realistic environment design remains a barrier to b… ▽ More

    Submitted 22 August, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: Presented at ISDC 2024, Bergen, Norway

  6. arXiv:2309.04027  [pdf, other

    cs.CL cs.LG

    TIDE: Textual Identity Detection for Evaluating and Augmenting Classification and Language Models

    Authors: Emmanuel Klu, Sameer Sethi

    Abstract: Machine learning models can perpetuate unintended biases from unfair and imbalanced datasets. Evaluating and debiasing these datasets and models is especially hard in text datasets where sensitive attributes such as race, gender, and sexual orientation may not be available. When these models are deployed into society, they can lead to unfair outcomes for historically underrepresented groups. In th… ▽ More

    Submitted 12 January, 2024; v1 submitted 7 September, 2023; originally announced September 2023.

    Comments: Preprint

  7. arXiv:2305.19365  [pdf, other

    cs.CV cs.AI

    Vision Transformers for Mobile Applications: A Short Survey

    Authors: Nahid Alam, Steven Kolawole, Simardeep Sethi, Nishant Bansali, Karina Nguyen

    Abstract: Vision Transformers (ViTs) have demonstrated state-of-the-art performance on many Computer Vision Tasks. Unfortunately, deploying these large-scale ViTs is resource-consuming and impossible for many mobile devices. While most in the community are building for larger and larger ViTs, we ask a completely opposite question: How small can a ViT be within the tradeoffs of accuracy and inference latency… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  8. arXiv:2210.07685  [pdf

    cs.SD eess.AS

    Full-Stack Bioacoustics: Field Kit to AI to Action (Workshop report)

    Authors: Dan Stowell, Caitlin Black, Florencia Noriega, Sarab S. Sethi

    Abstract: Acoustic data (sound recordings) are a vital source of evidence for detecting, counting, and distinguishing wildlife. This domain of "bioacoustics" has grown in the past decade due to the massive advances in signal processing and machine learning, recording devices, and the capacity of data processing and storage. Numerous research papers describe the use of Raspberry Pi or similar devices for aco… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: Workshop report: Lorentz Center, Leiden, the Netherlands, 1-5 August 2022

  9. arXiv:2110.00203  [pdf, other

    cs.LG eess.IV

    Q-Net: A Quantitative Susceptibility Mapping-based Deep Neural Network for Differential Diagnosis of Brain Iron Deposition in Hemochromatosis

    Authors: Soheil Zabihi, Elahe Rahimian, Soumya Sharma, Sean K. Sethi, Sara Gharabaghi, Amir Asif, E. Mark Haacke, Mandar S. Jog, Arash Mohammadi

    Abstract: Brain iron deposition, in particular deep gray matter nuclei, increases with advancing age. Hereditary Hemochromatosis (HH) is the most common inherited disorder of systemic iron excess in Europeans and recent studies claimed high brain iron accumulation in patient with Hemochromatosis. In this study, we focus on Artificial Intelligence (AI)-based differential diagnosis of brain iron deposition in… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

  10. arXiv:2005.05513  [pdf, other

    cs.CL cs.CY cs.SI

    Psychometric Analysis and Coupling of Emotions Between State Bulletins and Twitter in India during COVID-19 Infodemic

    Authors: Baani Leen Kaur Jolly, Palash Aggrawal, Amogh Gulati, Amarjit Singh Sethi, Ponnurangam Kumaraguru, Tavpritesh Sethi

    Abstract: COVID-19 infodemic has been spreading faster than the pandemic itself. The misinformation riding upon the infodemic wave poses a major threat to people's health and governance systems. Since social media is the largest source of information, managing the infodemic not only requires mitigating of misinformation but also an early understanding of psychological patterns resulting from it. During the… ▽ More

    Submitted 13 May, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

  11. arXiv:1905.01042  [pdf, other

    cs.DB physics.data-an

    CompEngine: a self-organizing, living library of time-series data

    Authors: Ben D. Fulcher, Carl H. Lubba, Sarab S. Sethi, Nick S. Jones

    Abstract: Modern biomedical applications often involve time-series data, from high-throughput phenotyping of model organisms, through to individual disease diagnosis and treatment using biomedical data streams. Data and tools for time-series analysis are developed and applied across the sciences and in industry, but meaningful cross-disciplinary interactions are limited by the challenge of identifying fruit… ▽ More

    Submitted 3 May, 2019; originally announced May 2019.

  12. arXiv:1901.10200  [pdf, ps, other

    cs.IR cs.LG stat.ML

    catch22: CAnonical Time-series CHaracteristics

    Authors: Carl H Lubba, Sarab S Sethi, Philip Knaute, Simon R Schultz, Ben D Fulcher, Nick S Jones

    Abstract: Capturing the dynamical properties of time series concisely as interpretable feature vectors can enable efficient clustering and classification for time-series applications across science and industry. Selecting an appropriate feature-based representation of time series for a given application can be achieved through systematic comparison across a comprehensive time-series feature library, such as… ▽ More

    Submitted 30 January, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

  13. arXiv:1811.08919  [pdf, other

    eess.SP cs.LG stat.ML

    Robust Active Learning for Electrocardiographic Signal Classification

    Authors: Xu Chen, Saratendu Sethi

    Abstract: The classification of electrocardiographic (ECG) signals is a challenging problem for healthcare industry. Traditional supervised learning methods require a large number of labeled data which is usually expensive and difficult to obtain for ECG signals. Active learning is well-suited for ECG signal classification as it aims at selecting the best set of labeled data in order to maximize the classif… ▽ More

    Submitted 21 November, 2018; originally announced November 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216 3

    Report number: ML4H/2018/5

  14. arXiv:1803.09163  [pdf, other

    cs.LG cs.CR stat.ML

    Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu

    Abstract: The increasing scale and sophistication of cyberattacks has led to the adoption of machine learning based classification techniques, at the core of cybersecurity systems. These techniques promise scale and accuracy, which traditional rule or signature based methods cannot. However, classifiers operating in adversarial domains are vulnerable to evasion attacks by an adversary, who is capable of lea… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Pacific-Asia Workshop on Intelligence and Security Informatics. Springer, Cham, 2017

  15. arXiv:1803.09162  [pdf, other

    cs.LG cs.CR stat.ML

    A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen

    Abstract: Operating in a dynamic real world environment requires a forward thinking and adversarial aware design for classifiers, beyond fitting the model to the training data. In such scenarios, it is necessary to make classifiers - a) harder to evade, b) easier to detect changes in the data distribution over time, and c) be able to retrain and recover from model degradation. While most works in the securi… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 2018

  16. arXiv:1803.09160  [pdf, other

    cs.LG cs.CR stat.ML

    Handling Adversarial Concept Drift in Streaming Data

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: Classifiers operating in a dynamic, real world environment, are vulnerable to adversarial activity, which causes the data distribution to change over time. These changes are traditionally referred to as concept drift, and several approaches have been developed in literature to deal with the problem of drift handling and detection. However, most concept drift handling techniques, approach it as a d… ▽ More

    Submitted 24 March, 2018; originally announced March 2018.

    Comments: Journal paper

    Journal ref: Expert Systems with Applications 97 (2018): 18-40

  17. arXiv:1704.00023  [pdf, other

    stat.ML cs.AI cs.LG

    On the Reliable Detection of Concept Drift from Streaming Unlabeled Data

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: Classifiers deployed in the real world operate in a dynamic environment, where the data distribution can change over time. These changes, referred to as concept drift, can cause the predictive performance of the classifier to drop over time, thereby making it obsolete. To be of any real use, these classifiers need to detect drifts and be able to adapt to them, over time. Detecting drifts has tradi… ▽ More

    Submitted 31 March, 2017; originally announced April 2017.

  18. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    Authors: Tegjyot Singh Sethi, Mehmed Kantardzic

    Abstract: While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learn… ▽ More

    Submitted 22 March, 2017; originally announced March 2017.

  19. arXiv:1504.03539  [pdf

    cs.DC cs.CR

    Detection of Information leakage in cloud

    Authors: Mansaf Alam, Shuchi Sethi

    Abstract: Recent research shows that colluded malware in different VMs sharing a single physical host may use a resource as a channel to leak critical information. Covert channels employ time or storage characteristics to transmit confidential information to attackers leaving no trail.These channels were not meant for communication and hence control mechanisms do not exist. This means these remain undetecte… ▽ More

    Submitted 6 November, 2015; v1 submitted 14 April, 2015; originally announced April 2015.

  20. arXiv:1503.06600  [pdf

    cs.DC

    Exploring Non-Homogeneity and Dynamicity of High Scale Cloud through Hive and Pig

    Authors: Kashish Ara Shakil, Mansaf Alam, Shuchi Sethi

    Abstract: Cloud computing deals with heterogeneity and dynamicity at all levels and therefore there is a need to manage resources in such an environment and properly allocate them. Resource planning and scheduling requires a proper understanding of arrival patterns and scheduling of resources. Study of workloads can aid in proper understanding of their associated environment. Google has released its latest… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

  21. arXiv:1501.07056  [pdf

    cs.DC

    An Effective Framework for Managing University Data using a Cloud based Environment

    Authors: Kashish Ara Shakil, Shuchi Sethi, Mansaf Alam

    Abstract: Management of data in education sector particularly management of data for big universities with several employees, departments and students is a very challenging task. There are also problems such as lack of proper funds and manpower for management of such data in universities. Education sector can easily and effectively take advantage of cloud computing skills for management of data. It can enha… ▽ More

    Submitted 28 January, 2015; originally announced January 2015.

  22. arXiv:1501.04473  [pdf

    cs.CR cs.DC

    Seeking Black Lining In Cloud

    Authors: Shuchi Sethi, Kashish Ara Shakil, Mansaf Alam

    Abstract: This work is focused on attacks on confidentiality that require time synchronization. This manuscript proposes a detection framework for covert channel perspective in cloud security. This problem is interpreted as a binary classification problem and the algorithm proposed is based on certain features that emerged after data analysis of Google cluster trace that forms base for analyzing attack free… ▽ More

    Submitted 19 January, 2015; originally announced January 2015.

  23. arXiv:1501.01426  [pdf

    cs.DC

    Analysis and Clustering of Workload in Google Cluster Trace based on Resource Usage

    Authors: Mansaf Alam, Kashish Ara Shakil, Shuchi Sethi

    Abstract: Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years.In order to move ahead with research in field of data management and processing of such data, we need benchmark datasets and freely available data which are publicly accessible. Google in May 2011 released a trace of a cluster of 11k machines referr… ▽ More

    Submitted 7 January, 2015; originally announced January 2015.