Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Shrestha, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.08648  [pdf, other

    cs.CV

    CAR-MFL: Cross-Modal Augmentation by Retrieval for Multimodal Federated Learning with Missing Modalities

    Authors: Pranav Poudel, Prashant Shrestha, Sanskar Amgain, Yash Raj Shrestha, Prashnna Gyawali, Binod Bhattarai

    Abstract: Multimodal AI has demonstrated superior performance over unimodal approaches by leveraging diverse data sources for more comprehensive analysis. However, applying this effectiveness in healthcare is challenging due to the limited availability of public datasets. Federated learning presents an exciting solution, allowing the use of extensive databases from hospitals and health centers without centr… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Accepted at MICCAI 2024

  2. arXiv:2402.16734  [pdf, other

    eess.IV cs.CV cs.LG

    Investigating the Robustness of Vision Transformers against Label Noise in Medical Image Classification

    Authors: Bidur Khanal, Prashant Shrestha, Sanskar Amgain, Bishesh Khanal, Binod Bhattarai, Cristian A. Linte

    Abstract: Label noise in medical image classification datasets significantly hampers the training of supervised deep learning methods, undermining their generalizability. The test performance of a model tends to decrease as the label noise rate increases. Over recent years, several methods have been proposed to mitigate the impact of label noise in medical image classification and enhance the robustness of… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  3. arXiv:2402.10035  [pdf, other

    cs.CV cs.DC

    Investigation of Federated Learning Algorithms for Retinal Optical Coherence Tomography Image Classification with Statistical Heterogeneity

    Authors: Sanskar Amgain, Prashant Shrestha, Sophia Bano, Ignacio del Valle Torres, Michael Cunniffe, Victor Hernandez, Phil Beales, Binod Bhattarai

    Abstract: Purpose: We apply federated learning to train an OCT image classifier simulating a realistic scenario with multiple clients and statistical heterogeneous data distribution where data in the clients lack samples of some categories entirely. Methods: We investigate the effectiveness of FedAvg and FedProx to train an OCT image classification model in a decentralized fashion, addressing privacy conc… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  4. arXiv:2312.07435  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Cross-modal Contrastive Learning with Asymmetric Co-attention Network for Video Moment Retrieval

    Authors: Love Panta, Prashant Shrestha, Brabeem Sapkota, Amrita Bhattarai, Suresh Manandhar, Anand Kumar Sah

    Abstract: Video moment retrieval is a challenging task requiring fine-grained interactions between video and text modalities. Recent work in image-text pretraining has demonstrated that most existing pretrained models suffer from information asymmetry due to the difference in length between visual and textual sequences. We question whether the same problem also exists in the video-text domain with an auxili… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  5. arXiv:2312.06224  [pdf, other

    cs.CV cs.CL

    Medical Vision Language Pretraining: A survey

    Authors: Prashant Shrestha, Sanskar Amgain, Bidur Khanal, Cristian A. Linte, Binod Bhattarai

    Abstract: Medical Vision Language Pretraining (VLP) has recently emerged as a promising solution to the scarcity of labeled data in the medical domain. By leveraging paired/unpaired vision and text datasets through self-supervised learning, models can be trained to acquire vast knowledge and learn robust feature representations. Such pretrained models have the potential to enhance multiple downstream medica… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  6. X-Ray to CT Rigid Registration Using Scene Coordinate Regression

    Authors: Pragyan Shrestha, Chun Xie, Hidehiko Shishido, Yuichi Yoshii, Itary Kitahara

    Abstract: Intraoperative fluoroscopy is a frequently used modality in minimally invasive orthopedic surgeries. Aligning the intraoperatively acquired X-ray image with the preoperatively acquired 3D model of a computed tomography (CT) scan reduces the mental burden on surgeons induced by the overlapping anatomical structures in the acquired images. This paper proposes a fully automatic registration method th… ▽ More

    Submitted 25 November, 2023; originally announced November 2023.

    Journal ref: Medical Image Computing and Computer Assisted Intervention MICCAI 2023. Lecture Notes in Computer Science, vol 14229

  7. arXiv:2305.01503  [pdf, other

    cs.IR cs.CL cs.CY

    NewsPanda: Media Monitoring for Timely Conservation Action

    Authors: Sedrick Scott Keh, Zheyuan Ryan Shi, David J. Patterson, Nirmal Bhagabati, Karun Dewan, Areendran Gopala, Pablo Izquierdo, Debojyoti Mallick, Ambika Sharma, Pooja Shrestha, Fei Fang

    Abstract: Non-governmental organizations for environmental conservation have a significant interest in monitoring conservation-related media and getting timely updates about infrastructure construction projects as they may cause massive impact to key conservation areas. Such monitoring, however, is difficult and time-consuming. We introduce NewsPanda, a toolkit which automatically detects and analyzes onlin… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

    Comments: Accepted to IAAI-23: 35th Annual Conference on Innovative Applications of Artificial Intelligence. Winner of IAAI Deployed Application Award. Code at https://github.com/NewsPanda-WWF-CMU/weekly-pipeline

  8. arXiv:2207.08338  [pdf, other

    cs.CV cs.MM eess.IV

    MobileCodec: Neural Inter-frame Video Compression on Mobile Devices

    Authors: Hoang Le, Liang Zhang, Amir Said, Guillaume Sautiere, Yang Yang, Pranav Shrestha, Fei Yin, Reza Pourreza, Auke Wiggers

    Abstract: Realizing the potential of neural video codecs on mobile devices is a big technological challenge due to the computational complexity of deep networks and the power-constrained mobile hardware. We demonstrate practical feasibility by leveraging Qualcomm's technology and innovation, bridging the gap from neural network-based codec simulations running on wall-powered workstations, to real-time opera… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: ACM MMSys 2022

  9. arXiv:2110.10129  [pdf, other

    cs.CR

    Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques

    Authors: Zengrui Liu, Prakash Shrestha, Nitesh Saxena

    Abstract: We present a simple yet potentially devastating and hard-to-detect threat, called Gummy Browsers, whereby the browser fingerprinting information can be collected and spoofed without the victim's awareness, thereby compromising the privacy and security of any application that uses browser fingerprinting. The idea is that attacker A first makes the user U connect to his website (or to a well-known s… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  10. arXiv:2012.02164  [pdf, other

    cs.SI cs.CY cs.LG

    People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation--A Comparison Between COVID and General Narratives on Twitter

    Authors: Mirela Silva, Fabrício Ceschin, Prakash Shrestha, Christopher Brant, Shlok Gilda, Juliana Fernandes, Catia S. Silva, André Grégio, Daniela Oliveira, Luiz Giovanini

    Abstract: Misinformation entails the dissemination of falsehoods that leads to the slow fracturing of society via decreased trust in democratic processes, institutions, and science. The public has grown aware of the role of social media as a superspreader of untrustworthy information, where even pandemics have not been immune. In this paper, we focus on COVID-19 misinformation and examine a subset of 2.1M t… ▽ More

    Submitted 9 September, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 22 pages

  11. arXiv:2004.07993  [pdf, other

    cs.HC

    CrossCheck: Rapid, Reproducible, and Interpretable Model Evaluation

    Authors: Dustin Arendt, Zhuanyi Huang, Prasha Shrestha, Ellyn Ayton, Maria Glenski, Svitlana Volkova

    Abstract: Evaluation beyond aggregate performance metrics, e.g. F1-score, is crucial to both establish an appropriate level of trust in machine learning models and identify future model improvements. In this paper we demonstrate CrossCheck, an interactive visualization tool for rapid crossmodel comparison and reproducible error analysis. We describe the tool and discuss design and implementation details. We… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

  12. arXiv:1811.07143  [pdf, other

    cs.LG q-bio.QM stat.ML

    High Quality Prediction of Protein Q8 Secondary Structure by Diverse Neural Network Architectures

    Authors: Iddo Drori, Isht Dwivedi, Pranav Shrestha, Jeffrey Wan, Yueqi Wang, Yunchu He, Anthony Mazza, Hugh Krogh-Freeman, Dimitri Leggas, Kendal Sandridge, Linyong Nan, Kaveri Thakoor, Chinmay Joshi, Sonam Goenka, Chen Keasar, Itsik Pe'er

    Abstract: We tackle the problem of protein secondary structure prediction using a common task framework. This lead to the introduction of multiple ideas for neural architectures based on state of the art building blocks, used in this task for the first time. We take a principled machine learning approach, which provides genuine, unbiased performance measures, correcting longstanding errors in the applicatio… ▽ More

    Submitted 17 November, 2018; originally announced November 2018.

    Comments: NIPS 2018 Workshop on Machine Learning for Molecules and Materials, 10 pages

  13. arXiv:1506.02354   

    cs.IT cs.CR cs.NI

    Secure Ad-hoc Routing Scheme

    Authors: Anish Prasad Shrestha, Kyung Sup Kwak

    Abstract: This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate rece… ▽ More

    Submitted 19 July, 2018; v1 submitted 8 June, 2015; originally announced June 2015.

    Comments: There are some errors that needs to be fixed

  14. arXiv:1505.05779  [pdf, ps, other

    cs.CR

    Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks

    Authors: O. Huhta, P. Shrestha, S. Udar, M. Juuti, N. Saxena, N. Asokan

    Abstract: Deauthentication is an important component of any authentication system. The widespread use of computing devices in daily life has underscored the need for zero-effort deauthentication schemes. However, the quest for eliminating user effort may lead to hidden security flaws in the authentication schemes. As a case in point, we investigate a prominent zero-effort deauthentication scheme, called ZEB… ▽ More

    Submitted 14 February, 2016; v1 submitted 21 May, 2015; originally announced May 2015.

    ACM Class: K.6.5

  15. arXiv:1311.1565   

    cs.IT

    On Maximal Ratio Diversity with Weighting Errors for Physical Layer Security

    Authors: Anish Prasad Shrestha, Kyung Sup Kwak

    Abstract: In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secre… ▽ More

    Submitted 9 November, 2013; v1 submitted 6 November, 2013; originally announced November 2013.

    Comments: It requires some major corrections in equations and numerical results