Zum Hauptinhalt springen

Showing 1–50 of 66 results for author: Srivastava, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07892  [pdf, other

    cs.CY

    Personhood credentials: Artificial intelligence and the value of privacy-preserving tools to distinguish who is real online

    Authors: Steven Adler, Zoë Hitzig, Shrey Jain, Catherine Brewer, Wayne Chang, Renée DiResta, Eddy Lazzarin, Sean McGregor, Wendy Seltzer, Divya Siddarth, Nouran Soliman, Tobin South, Connor Spelliscy, Manu Sporny, Varya Srivastava, John Bailey, Brian Christian, Andrew Critch, Ronnie Falcon, Heather Flanagan, Kim Hamilton Duffy, Eric Ho, Claire R. Leibowicz, Srikanth Nadhamuni, Alan Z. Rozenshtein , et al. (7 additional authors not shown)

    Abstract: Anonymity is an important principle online. However, malicious actors have long used misleading identities to conduct fraud, spread disinformation, and carry out other deceptive schemes. With the advent of increasingly capable AI, bad actors can amplify the potential scale and effectiveness of their operations, intensifying the challenge of balancing anonymity and trustworthiness online. In this p… ▽ More

    Submitted 26 August, 2024; v1 submitted 14 August, 2024; originally announced August 2024.

    Comments: 63 pages, 7 figures, 5 tables; minor additions to acknowledgments and wording changes for clarity; corrected typo

  2. arXiv:2407.13318  [pdf, other

    cs.CR

    A new approach to delegate signing rights to proxy signers using isogeny-based cryptography

    Authors: Kunal Dey, Somnath Kumar, Vikas Srivastava, Sumit Kumar Debnath

    Abstract: E-governance is a two-way protocol through which one can use government services, share data and request information. It refers to the use of communication and information technologies to provide government services to public in an efficient and fast manner. In addition, any document submitted to the e-Government system must be authenticated by a government officer using a digital signature scheme… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  3. arXiv:2405.20118  [pdf, other

    cs.RO eess.SY

    Assistance-Seeking in Human-Supervised Autonomy: Role of Trust and Secondary Task Engagement (Extended Version)

    Authors: Dong Hae Mangalindan, Vaibhav Srivastava

    Abstract: Using a dual-task paradigm, we explore how robot actions, performance, and the introduction of a secondary task influence human trust and engagement. In our study, a human supervisor simultaneously engages in a target-tracking task while supervising a mobile manipulator performing an object collection task. The robot can either autonomously collect the object or ask for human assistance. The human… ▽ More

    Submitted 11 June, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2405.18886  [pdf, ps, other

    cs.LG cs.AI math.OC stat.ML

    Compressing Large Language Models using Low Rank and Low Precision Decomposition

    Authors: Rajarshi Saha, Naomi Sagan, Varun Srivastava, Andrea J. Goldsmith, Mert Pilanci

    Abstract: The prohibitive sizes of Large Language Models (LLMs) today make it difficult to deploy them on memory-constrained edge devices. This work introduces $\rm CALDERA$ -- a new post-training LLM compression algorithm that harnesses the inherent low-rank structure of a weight matrix $\mathbf{W}$ by approximating it via a low-rank, low-precision decomposition as… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 30 pages, 9 figures, 7 tables

  5. arXiv:2405.07557  [pdf, other

    cs.GT cs.DC

    Towards Rational Consensus in Honest Majority

    Authors: Varul Srivastava, Sujit Gujar

    Abstract: Distributed consensus protocols reach agreement among $n$ players in the presence of $f$ adversaries; different protocols support different values of $f$. Existing works study this problem for different adversary types (captured by threat models). There are three primary threat models: (i) Crash fault tolerance (CFT), (ii) Byzantine fault tolerance (BFT), and (iii) Rational fault tolerance (RFT),… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  6. arXiv:2404.09627  [pdf, other

    cs.GT cs.DC

    Centralization in Proof-of-Stake Blockchains: A Game-Theoretic Analysis of Bootstrapping Protocols

    Authors: Varul Srivastava, Sankarshan Damle, Sujit Gujar

    Abstract: Proof-of-stake (PoS) has emerged as a natural alternative to the resource-intensive Proof-of-Work (PoW) blockchain, as was recently seen with the Ethereum Merge. PoS-based blockchains require an initial stake distribution among the participants. Typically, this initial stake distribution is called bootstrapping. This paper argues that existing bootstrapping protocols are prone to centralization. T… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Appears at the 6th Games, Agents, and Incentives Workshop (GAIW-24). Held as part of the Workshops at the 22st International Conference on Autonomous Agents and Multiagent Systems (AAMAS)

  7. arXiv:2403.18247  [pdf, other

    cs.CR cs.IT

    An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay

    Abstract: Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital sign… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  8. arXiv:2402.04634  [pdf, other

    cs.GT

    No Transaction Fees? No Problem! Achieving Fairness in Transaction Fee Mechanism Design

    Authors: Sankarshan Damle, Varul Srivastava, Sujit Gujar

    Abstract: The recently proposed Transaction Fee Mechanism (TFM) literature studies the strategic interaction between the miner of a block and the transaction creators (or users) in a blockchain. In a TFM, the miner includes transactions that maximize its utility while users submit fees for a slot in the block. The existing TFM literature focuses on satisfying standard incentive properties -- which may limit… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: Extended Abstract (AAMAS '24)

  9. arXiv:2401.08988  [pdf, other

    cs.GT

    DECENT-BRM: Decentralization through Block Reward Mechanisms

    Authors: Varul Srivastava, Sujit Gujar

    Abstract: Proof-of-Work is a consensus algorithm where miners solve cryptographic puzzles to mine blocks and obtain a reward through some Block Reward Mechanism (BRM). PoW blockchain faces the problem of centralization due to the formation of mining pools, where miners mine blocks as a group and distribute rewards. The rationale is to reduce the risk (variance) in reward while obtaining the same expected bl… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  10. arXiv:2312.16322  [pdf, other

    cs.CR

    Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management

    Authors: Vikas Srivastava, Paresh Baidya, Sihem Mesnager, Debasish Roy, Sumit Kumar Debnath

    Abstract: Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secur… ▽ More

    Submitted 25 March, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  11. arXiv:2312.16318  [pdf, other

    quant-ph cs.CR

    Quantum Secure Protocols for Multiparty Computations

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica

    Abstract: Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face the threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and… ▽ More

    Submitted 17 July, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  12. arXiv:2311.06381  [pdf, other

    cs.HC

    Optimal Fidelity Selection for Improved Performance in Human-in-the-Loop Queues for Underwater Search

    Authors: Piyush Gupta, Vaibhav Srivastava

    Abstract: In the context of human-supervised autonomy, we study the problem of optimal fidelity selection for a human operator performing an underwater visual search task. Human performance depends on various cognitive factors such as workload and fatigue. We perform human experiments in which participants perform two tasks simultaneously: a primary task, which is subject to evaluation, and a secondary task… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

  13. arXiv:2311.03486  [pdf, other

    cs.HC

    Fostering Human Learning in Sequential Decision-Making: Understanding the Role of Evaluative Feedback

    Authors: Piyush Gupta, Subir Biswas, Vaibhav Srivastava

    Abstract: Cognitive rehabilitation, STEM (science, technology, engineering, and math) skill acquisition, and coaching games such as chess often require tutoring decision-making strategies. The advancement of AI-driven tutoring systems for facilitating human learning requires an understanding of the impact of evaluative feedback on human decision-making and skill development. To this end, we conduct human ex… ▽ More

    Submitted 4 May, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  14. arXiv:2310.11028  [pdf, other

    cs.LG cs.IT stat.ML

    Matrix Compression via Randomized Low Rank and Low Precision Factorization

    Authors: Rajarshi Saha, Varun Srivastava, Mert Pilanci

    Abstract: Matrices are exceptionally useful in various fields of study as they provide a convenient framework to organize and manipulate data in a structured manner. However, modern matrices can involve billions of elements, making their storage and processing quite demanding in terms of computational resources and memory usage. Although prohibitively large, such matrices are often approximately low rank. W… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

    Comments: Accepted to the 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  15. arXiv:2310.05904  [pdf, other

    cs.RO eess.SY

    On Multi-Fidelity Impedance Tuning for Human-Robot Cooperative Manipulation

    Authors: Ethan Lau, Vaibhav Srivastava, Shaunak D. Bopardikar

    Abstract: We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

    Comments: 7 pages, 3 figures. Submitted to the 2024 ACC on September 29, 2023

  16. arXiv:2304.00634  [pdf, other

    cs.CL cs.LG cs.SI

    MMT: A Multilingual and Multi-Topic Indian Social Media Dataset

    Authors: Dwip Dalal, Vivek Srivastava, Mayank Singh

    Abstract: Social media plays a significant role in cross-cultural communication. A vast amount of this occurs in code-mixed and multilingual form, posing a significant challenge to Natural Language Processing (NLP) tools for processing such information, like language identification, topic modeling, and named-entity recognition. To address this, we introduce a large-scale multilingual, and multi-topic datase… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Journal ref: EACL Workshop C3NLP 2023

  17. arXiv:2302.11766  [pdf, other

    cs.CL cs.LG

    MUTANT: A Multi-sentential Code-mixed Hinglish Dataset

    Authors: Rahul Gupta, Vivek Srivastava, Mayank Singh

    Abstract: The multi-sentential long sequence textual data unfolds several interesting research directions pertaining to natural language processing and generation. Though we observe several high-quality long-sequence datasets for English and other monolingual languages, there is no significant effort in building such resources for code-mixed languages such as Hinglish (code-mixing of Hindi-English). In this… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: Accepted in Findings of EACL

  18. arXiv:2302.06136  [pdf, other

    cs.CR cs.DC cs.GT

    PRAGTHOS:Practical Game Theoretically Secure Proof-of-Work Blockchain

    Authors: Varul Srivastava, Sujit Gujar

    Abstract: Security analysis of blockchain technology is an active domain of research. There has been both cryptographic and game-theoretic security analysis of Proof-of-Work (PoW) blockchains. Prominent work includes the cryptographic security analysis under the Universal Composable framework and Game-theoretic security analysis using Rational Protocol Design. These security analysis models rely on stricter… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

  19. arXiv:2302.04577  [pdf, other

    cs.SD eess.AS

    Incorporating Total Variation Regularization in the design of an intelligent Query by Humming system

    Authors: Shivangi Ranjan, Vishal Srivastava

    Abstract: A Query-By-Humming (QBH) system constitutes a particular case of music information retrieval where the input is a user-hummed melody and the output is the original song which contains that melody. A typical QBH system consists of melody extraction and candidate melody retrieval. For melody extraction, accurate note transcription is the key enabling technology. However, current transcription meth… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

  20. arXiv:2209.07348  [pdf, other

    eess.SY cs.GT math.OC

    Coupled Evolutionary Behavioral and Disease Dynamics under Reinfection Risk

    Authors: Abhisek Satapathi, Narendra Kumar Dhar, Ashish R. Hota, Vaibhav Srivastava

    Abstract: We study the interplay between epidemic dynamics and human decision making for epidemics that involve reinfection risk; in particular, the susceptible-infected-susceptible (SIS) and the susceptible-infected-recovered-infected (SIRI) epidemic models. In the proposed game-theoretic setting, individuals choose whether to adopt protection or not based on the trade-off between the cost of adopting prot… ▽ More

    Submitted 29 May, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: text overlap with arXiv:2203.10276

  21. arXiv:2209.05408  [pdf, ps, other

    cs.LG cs.HC

    Deterministic Sequencing of Exploration and Exploitation for Reinforcement Learning

    Authors: Piyush Gupta, Vaibhav Srivastava

    Abstract: We propose Deterministic Sequencing of Exploration and Exploitation (DSEE) algorithm with interleaving exploration and exploitation epochs for model-based RL problems that aim to simultaneously learn the system model, i.e., a Markov decision process (MDP), and the associated optimal policy. During exploration, DSEE explores the environment and updates the estimates for expected reward and transiti… ▽ More

    Submitted 19 December, 2022; v1 submitted 12 September, 2022; originally announced September 2022.

  22. arXiv:2207.14355  [pdf, other

    cs.LG cs.AI cs.CY

    Multiple Attribute Fairness: Application to Fraud Detection

    Authors: Meghanath Macha Y, Sriram Ravindran, Deepak Pai, Anish Narang, Vijay Srivastava

    Abstract: We propose a fairness measure relaxing the equality conditions in the popular equal odds fairness regime for classification. We design an iterative, model-agnostic, grid-based heuristic that calibrates the outcomes per sensitive attribute value to conform to the measure. The heuristic is designed to handle high arity attribute values and performs a per attribute sanitization of outcomes across dif… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

    Comments: 5 pages, 5 figures, 1 table

  23. arXiv:2207.10819  [pdf, other

    cs.CE physics.data-an

    A Non-intrusive Approach for Physics-constrained Learning with Application to Fuel Cell Modeling

    Authors: Vishal Srivastava, Valentin Sulzer, Peyman Mohtat, Jason B. Siegel, Karthik Duraisamy

    Abstract: A data-driven model augmentation framework, referred to as Weakly-coupled Integrated Inference and Machine Learning (IIML), is presented to improve the predictive accuracy of physical models. In contrast to parameter calibration, this work seeks corrections to the structure of the model by a) inferring augmentation fields that are consistent with the underlying model, and b) transforming these fie… ▽ More

    Submitted 30 June, 2022; originally announced July 2022.

  24. arXiv:2203.10276  [pdf, ps, other

    eess.SY cs.GT

    Epidemic Propagation under Evolutionary Behavioral Dynamics: Stability and Bifurcation Analysis

    Authors: Abhisek Satapathi, Narendra Kumar Dhar, Ashish R. Hota, Vaibhav Srivastava

    Abstract: We consider the class of SIS epidemic models in which a large population of individuals chooses whether to adopt protection or to remain unprotected as the epidemic evolves. For a susceptible individual, adopting protection reduces the probability of becoming infected but it comes with a cost that is weighed with the instantaneous risk of becoming infected. An infected individual adopting protecti… ▽ More

    Submitted 19 March, 2022; originally announced March 2022.

    Comments: Accepted for publication at the American Control Conference, 2022

  25. Towards Modeling Human Motor Learning Dynamics in High-Dimensional Spaces

    Authors: Ankur Kamboj, Rajiv Ranganathan, Xiaobo Tan, Vaibhav Srivastava

    Abstract: Designing effective rehabilitation strategies for upper extremities, particularly hands and fingers, warrants the need for a computational model of human motor learning. The presence of large degrees of freedom (DoFs) available in these systems makes it difficult to balance the trade-off between learning the full dexterity and accomplishing manipulation goals. The motor learning literature argues… ▽ More

    Submitted 26 March, 2022; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: accepted to "American Control Conference 2022"

  26. arXiv:2201.09990  [pdf, other

    cs.HC cs.PF eess.SY

    Structural Properties of Optimal Fidelity Selection Policies for Human-in-the-loop Queues

    Authors: Piyush Gupta, Vaibhav Srivastava

    Abstract: We study optimal fidelity selection for a human operator servicing a queue of homogeneous tasks. The agent can service a task with a normal or high fidelity level, where fidelity refers to the degree of exactness and precision while servicing the task. Therefore, high-fidelity servicing results in higher-quality service but leads to larger service times and increased operator tiredness. We treat t… ▽ More

    Submitted 6 October, 2023; v1 submitted 24 January, 2022; originally announced January 2022.

  27. arXiv:2108.01861  [pdf, other

    cs.CL

    Quality Evaluation of the Low-Resource Synthetically Generated Code-Mixed Hinglish Text

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: In this shared task, we seek the participating teams to investigate the factors influencing the quality of the code-mixed text generation systems. We synthetically generate code-mixed Hinglish sentences using two distinct approaches and employ human annotators to rate the generation quality. We propose two subtasks, quality rating prediction and annotators' disagreement prediction of the synthetic… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: Published in INLG as shared task proposal

  28. arXiv:2107.11534  [pdf, other

    cs.CL

    MIPE: A Metric Independent Pipeline for Effective Code-Mixed NLG Evaluation

    Authors: Ayush Garg, Sammed S Kagi, Vivek Srivastava, Mayank Singh

    Abstract: Code-mixing is a phenomenon of mixing words and phrases from two or more languages in a single utterance of speech and text. Due to the high linguistic diversity, code-mixing presents several challenges in evaluating standard natural language generation (NLG) tasks. Various widely popular metrics perform poorly with the code-mixed NLG tasks. To address this challenge, we present a metric independe… ▽ More

    Submitted 24 July, 2021; originally announced July 2021.

  29. arXiv:2107.03760  [pdf, other

    cs.CL

    HinGE: A Dataset for Generation and Evaluation of Code-Mixed Hinglish Text

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: Text generation is a highly active area of research in the computational linguistic community. The evaluation of the generated text is a challenging task and multiple theories and metrics have been proposed over the years. Unfortunately, text generation and evaluation are relatively understudied due to the scarcity of high-quality resources in code-mixed languages where the words and phrases from… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  30. arXiv:2106.14984  [pdf, other

    cs.RO cs.LG eess.SY math.OC

    Online Estimation and Coverage Control with Heterogeneous Sensing Information

    Authors: Andrew McDonald, Lai Wei, Vaibhav Srivastava

    Abstract: Heterogeneous multi-robot sensing systems are able to characterize physical processes more comprehensively than homogeneous systems. Access to multiple modalities of sensory data allow such systems to fuse information between complementary sources and learn richer representations of a phenomenon of interest. Often, these data are correlated but vary in fidelity, i.e., accuracy (bias) and precision… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Comments: 6 pages, 2 figures, accepted to IEEE CCTA'21

  31. arXiv:2106.10123  [pdf, other

    cs.CL

    Challenges and Limitations with the Metrics Measuring the Complexity of Code-Mixed Text

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: Code-mixing is a frequent communication style among multilingual speakers where they mix words and phrases from two different languages in the same utterance of text or speech. Identifying and filtering code-mixed text is a challenging task due to its co-existence with monolingual and noisy text. Over the years, several code-mixing metrics have been extensively used to identify and validate code-m… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  32. arXiv:2106.07823  [pdf, ps, other

    cs.CL cs.LG

    Challenges and Considerations with Code-Mixed NLP for Multilingual Societies

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: Multilingualism refers to the high degree of proficiency in two or more languages in the written and oral communication modes. It often results in language mixing, a.k.a. code-mixing, when a multilingual speaker switches between multiple languages in a single utterance of a text or speech. This paper discusses the current state of the NLP research, limitations, and foreseeable pitfalls in addressi… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

  33. arXiv:2101.08980  [pdf, other

    cs.LG

    Nonstationary Stochastic Multiarmed Bandits: UCB Policies and Minimax Regret

    Authors: Lai Wei, Vaibhav Srivastava

    Abstract: We study the nonstationary stochastic Multi-Armed Bandit (MAB) problem in which the distribution of rewards associated with each arm are assumed to be time-varying and the total variation in the expected rewards is subject to a variation budget. The regret of a policy is defined by the difference in the expected cumulative rewards obtained using the policy and using an oracle that selects the arm… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  34. arXiv:2101.04306  [pdf, other

    cs.RO eess.SY math.OC stat.ML

    Multi-Robot Gaussian Process Estimation and Coverage: A Deterministic Sequencing Algorithm and Regret Analysis

    Authors: Lai Wei, Andrew McDonald, Vaibhav Srivastava

    Abstract: We study the problem of distributed multi-robot coverage over an unknown, nonuniform sensory field. Modeling the sensory field as a realization of a Gaussian Process and using Bayesian techniques, we devise a policy which aims to balance the tradeoff between learning the sensory function and covering the environment. We propose an adaptive coverage algorithm called Deterministic Sequencing of Lear… ▽ More

    Submitted 31 May, 2021; v1 submitted 12 January, 2021; originally announced January 2021.

    Comments: 7 pages, 2 figures, accepted to IEEE ICRA'21

  35. arXiv:2010.13263  [pdf, other

    cs.SI cs.CY

    PoliWAM: An Exploration of a Large Scale Corpus of Political Discussions on WhatsApp Messenger

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: WhatsApp Messenger is one of the most popular channels for spreading information with a current reach of more than 180 countries and 2 billion people. Its widespread usage has made it one of the most popular media for information propagation among the masses during any socially engaging event. In the recent past, several countries have witnessed its effectiveness and influence in political and soc… ▽ More

    Submitted 19 September, 2021; v1 submitted 25 October, 2020; originally announced October 2020.

    Comments: Accepted at W-NUT, EMNLP

  36. arXiv:2009.10548  [pdf

    cs.CY stat.CO

    Football and externalities: Using mathematical modelling to predict the changing fortunes of Newcastle United

    Authors: Vishist Srivastava, Prashant Yadav, Ajuni Singh

    Abstract: The Public Investment Fund (PIF), is Saudi Arabia's sovereign wealth fund. It is one of the world's largest sovereign wealth funds, with an estimated net capital of… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

    Comments: 13 Pages, 4 figures, code snippets

    MSC Class: 62J05

  37. arXiv:2009.07473  [pdf, other

    cs.CL cs.AI

    Solomon at SemEval-2020 Task 11: Ensemble Architecture for Fine-Tuned Propaganda Detection in News Articles

    Authors: Mayank Raj, Ajay Jaiswal, Rohit R. R, Ankita Gupta, Sudeep Kumar Sahoo, Vertika Srivastava, Yeon Hyang Kim

    Abstract: This paper describes our system (Solomon) details and results of participation in the SemEval 2020 Task 11 "Detection of Propaganda Techniques in News Articles"\cite{DaSanMartinoSemeval20task11}. We participated in Task "Technique Classification" (TC) which is a multi-class classification task. To address the TC task, we used RoBERTa based transformer architecture for fine-tuning on the propaganda… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

  38. arXiv:2008.04383  [pdf, other

    math.OC cs.MA math.DS

    Influence Spread in the Heterogeneous Multiplex Linear Threshold Model

    Authors: Yaofeng Desmond Zhong, Vaibhav Srivastava, Naomi Ehrich Leonard

    Abstract: The linear threshold model (LTM) has been used to study spread on single-layer networks defined by one inter-agent sensing modality and agents homogeneous in protocol. We define and analyze the heterogeneous multiplex LTM to study spread on multi-layer networks with each layer representing a different sensing modality and agents heterogeneous in protocol. Protocols are designed to distinguish sign… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

  39. arXiv:2007.10493  [pdf, other

    stat.ML cs.LG

    Minimax Policy for Heavy-tailed Bandits

    Authors: Lai Wei, Vaibhav Srivastava

    Abstract: We study the stochastic Multi-Armed Bandit (MAB) problem under worst-case regret and heavy-tailed reward distribution. We modify the minimax policy MOSS for the sub-Gaussian reward distribution by using saturated empirical mean to design a new algorithm called Robust MOSS. We show that if the moment of order $1+ε$ for the reward distribution exists, then the refined strategy has a worst-case regre… ▽ More

    Submitted 17 November, 2020; v1 submitted 20 July, 2020; originally announced July 2020.

  40. arXiv:2006.14465  [pdf, other

    cs.CL

    IIT Gandhinagar at SemEval-2020 Task 9: Code-Mixed Sentiment Classification Using Candidate Sentence Generation and Selection

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: Code-mixing is the phenomenon of using multiple languages in the same utterance of a text or speech. It is a frequently used pattern of communication on various platforms such as social media sites, online gaming, product reviews, etc. Sentiment analysis of the monolingual text is a well-studied task. Code-mixing adds to the challenge of analyzing the sentiment of the text due to the non-standard… ▽ More

    Submitted 23 July, 2020; v1 submitted 25 June, 2020; originally announced June 2020.

  41. arXiv:2005.08434  [pdf, other

    cs.RO eess.SY stat.ML

    Expedited Multi-Target Search with Guaranteed Performance via Multi-fidelity Gaussian Processes

    Authors: Lai Wei, Xiaobo Tan, Vaibhav Srivastava

    Abstract: We consider a scenario in which an autonomous vehicle equipped with a downward facing camera operates in a 3D environment and is tasked with searching for an unknown number of stationary targets on the 2D floor of the environment. The key challenge is to minimize the search time while ensuring a high detection accuracy. We model the sensing field using a multi-fidelity Gaussian process that system… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

  42. arXiv:2005.03564  [pdf, other

    cs.CR cs.GT

    QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol

    Authors: Shoeb Siddiqui, Varul Srivastava, Raj Maheshwari, Sujit Gujar

    Abstract: To implement a blockchain, we need a blockchain protocol for all the nodes to follow. To design a blockchain protocol, we need a block publisher selection mechanism and a chain selection rule. In Proof-of-Stake (PoS) based blockchain protocols, block publisher selection mechanism selects the node to publish the next block based on the relative stake held by the node. However, PoS protocols, such a… ▽ More

    Submitted 16 March, 2023; v1 submitted 7 May, 2020; originally announced May 2020.

  43. arXiv:2004.09447  [pdf, other

    cs.CL

    PHINC: A Parallel Hinglish Social Media Code-Mixed Corpus for Machine Translation

    Authors: Vivek Srivastava, Mayank Singh

    Abstract: Code-mixing is the phenomenon of using more than one language in a sentence. It is a very frequently observed pattern of communication on social media platforms. Flexibility to use multiple languages in one text message might help to communicate efficiently with the target audience. But, it adds to the challenge of processing and understanding natural language to a much larger extent. This paper p… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  44. arXiv:2003.06390  [pdf, other

    eess.SY cs.RO

    Robust tracking of an unknown trajectory with a multi-rotor UAV: A high-gain observer approach

    Authors: C. J. Boss, V. Srivastava, H. K. Khalil

    Abstract: We study a trajectory tracking problem for a multi-rotor in the presence of modeling error and external disturbances. The desired trajectory is unknown and generated from a reference system with unknown or partially known dynamics. We assume that only position and orientation measurements for the multi-rotor and position measurements for the reference system can be accessed. We adopt an extended h… ▽ More

    Submitted 27 April, 2020; v1 submitted 13 March, 2020; originally announced March 2020.

  45. arXiv:2003.06341  [pdf, ps, other

    eess.SY cs.SI math.DS math.OC

    SIS Epidemic Model under Mobility on Multi-layer Networks

    Authors: Vishal Abhishek, Vaibhav Srivastava

    Abstract: We study the influence of heterogeneous mobility patterns in a population on the SIS epidemic model. In particular, we consider a patchy environment in which each patch comprises individuals belonging the different classes, e.g., individuals in different socio-economic strata. We model the mobility of individuals of each class across different patches through an associated Continuous Time Markov C… ▽ More

    Submitted 28 March, 2020; v1 submitted 13 March, 2020; originally announced March 2020.

    Comments: Extended version of the paper to appear at ACC 2020 and is an extension to the arXiv paper- On Epidemic Spreading under Mobility on Networks (arXiv:1909.02647v2) to Multi-layer setting

  46. arXiv:2003.01312  [pdf, other

    math.OC cs.LG stat.ML

    Distributed Cooperative Decision Making in Multi-agent Multi-armed Bandits

    Authors: Peter Landgren, Vaibhav Srivastava, Naomi Ehrich Leonard

    Abstract: We study a distributed decision-making problem in which multiple agents face the same multi-armed bandit (MAB), and each agent makes sequential choices among arms to maximize its own individual reward. The agents cooperate by sharing their estimates over a fixed communication graph. We consider an unconstrained reward model in which two or more agents can choose the same arm and collect independen… ▽ More

    Submitted 11 August, 2020; v1 submitted 2 March, 2020; originally announced March 2020.

  47. arXiv:1911.00766  [pdf, other

    cs.NI

    Automating Ethernet VPN Deployment in SDN-based Data Centers

    Authors: Kyoomars Alizadeh Noghani, Cristian Hernandez Benet, Andreas Kassler, Antonio Marotta, Patrick Jestin, Vivek V. Srivastava

    Abstract: Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 6 pages

  48. arXiv:1909.02647  [pdf, ps, other

    eess.SY cs.SI math.DS math.OC

    On Epidemic Spreading under Mobility on Networks

    Authors: Vishal Abhishek, Vaibhav Srivastava

    Abstract: We study a coupled epidemic-mobility model in which, at each time, individuals move in a network of spatially-distributed regions (sub-populations) according to a Continuous Time Markov Chain (CTMC) and subsequently interact with the local sub-population according to an SIS model. We derive a deterministic continuum limit model describing these interactions. We prove the existence of a disease-fre… ▽ More

    Submitted 26 September, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

  49. arXiv:1907.10370  [pdf

    cs.LG cs.CV eess.IV

    Self-attention based BiLSTM-CNN classifier for the prediction of ischemic and non-ischemic cardiomyopathy

    Authors: Kavita Dubey, Anant Agarwal, Astitwa Sarthak Lathe, Ranjeet Kumar, Vishal Srivastava

    Abstract: Heart Failure is a major component of healthcare expenditure and a leading cause of mortality worldwide. Despite higher inter-rater variability, endomyocardial biopsy (EMB) is still regarded as the standard technique, used to identify the cause (e.g. ischemic or non-ischemic cardiomyopathy, coronary artery disease, myocardial infarction etc.) of unexplained heart failure. In this paper, we focus o… ▽ More

    Submitted 29 July, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

  50. arXiv:1903.12248  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Adversarial Approximate Inference for Speech to Electroglottograph Conversion

    Authors: Prathosh A. P., Varun Srivastava, Mayank Mishra

    Abstract: Speech produced by human vocal apparatus conveys substantial non-semantic information including the gender of the speaker, voice quality, affective state, abnormalities in the vocal apparatus etc. Such information is attributed to the properties of the voice source signal, which is usually estimated from the speech signal. However, most of the source estimation techniques depend heavily on the goo… ▽ More

    Submitted 7 September, 2019; v1 submitted 28 March, 2019; originally announced March 2019.

    Comments: Submitted to IEEE/ACM Transactions on Audio, Speech and Language Processing