Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Subramanyam, A V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13873  [pdf, other

    cs.CV cs.LG

    Keypoint Aware Masked Image Modelling

    Authors: Madhava Krishna, A V Subramanyam

    Abstract: SimMIM is a widely used method for pretraining vision transformers using masked image modeling. However, despite its success in fine-tuning performance, it has been shown to perform sub-optimally when used for linear probing. We propose an efficient patch-wise weighting derived from keypoint features which captures the local information and provides better context during SimMIM's reconstruction ph… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2405.07166  [pdf, other

    cs.CV

    Resource Efficient Perception for Vision Systems

    Authors: A V Subramanyam, Niyati Singal, Vinay K Verma

    Abstract: Despite the rapid advancement in the field of image recognition, the processing of high-resolution imagery remains a computational challenge. However, this processing is pivotal for extracting detailed object insights in areas ranging from autonomous vehicle navigation to medical imaging analyses. Our study introduces a framework aimed at mitigating these challenges by leveraging memory efficient… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2401.14111  [pdf, other

    cs.CV

    Image Synthesis with Graph Conditioning: CLIP-Guided Diffusion Models for Scene Graphs

    Authors: Rameshwar Mishra, A V Subramanyam

    Abstract: Advancements in generative models have sparked significant interest in generating images while adhering to specific structural guidelines. Scene graph to image generation is one such task of generating images which are consistent with the given scene graph. However, the complexity of visual scenes poses a challenge in accurately aligning objects based on specified relations within the scene graph.… ▽ More

    Submitted 22 July, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

  4. arXiv:2309.10348  [pdf, other

    cs.LG cs.CR cs.CV

    Language Guided Adversarial Purification

    Authors: Himanshu Singh, A V Subramanyam

    Abstract: Adversarial purification using generative models demonstrates strong adversarial defense performance. These methods are classifier and attack-agnostic, making them versatile but often computationally intensive. Recent strides in diffusion and score networks have improved image generation and, by extension, adversarial purification. Another highly efficient class of adversarial defense methods know… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    MSC Class: 68T45 (Primary); 68T10 (Secondary) ACM Class: I.5.4

  5. arXiv:2305.04497  [pdf, other

    cs.CV cs.MM

    IIITD-20K: Dense captioning for Text-Image ReID

    Authors: A V Subramanyam, Niranjan Sundararajan, Vibhu Dubey, Brejesh Lall

    Abstract: Text-to-Image (T2I) ReID has attracted a lot of attention in the recent past. CUHK-PEDES, RSTPReid and ICFG-PEDES are the three available benchmarks to evaluate T2I ReID methods. RSTPReid and ICFG-PEDES comprise of identities from MSMT17 but due to limited number of unique persons, the diversity is limited. On the other hand, CUHK-PEDES comprises of 13,003 identities but has relatively shorter tex… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  6. arXiv:2304.06430  [pdf, other

    cs.CV cs.AI

    Certified Zeroth-order Black-Box Defense with Robust UNet Denoiser

    Authors: Astha Verma, A V Subramanyam, Siddhesh Bangar, Naman Lal, Rajiv Ratn Shah, Shin'ichi Satoh

    Abstract: Certified defense methods against adversarial perturbations have been recently investigated in the black-box setting with a zeroth-order (ZO) perspective. However, these methods suffer from high model variance with low performance on high-dimensional datasets due to the ineffective design of the denoiser and are limited in their utilization of ZO techniques. To this end, we propose a certified ZO… ▽ More

    Submitted 6 July, 2024; v1 submitted 13 April, 2023; originally announced April 2023.

  7. arXiv:2301.06286  [pdf, other

    cs.CV

    Meta Generative Attack on Person Reidentification

    Authors: A V Subramanyam

    Abstract: Adversarial attacks have been recently investigated in person re-identification. These attacks perform well under cross dataset or cross model setting. However, the challenges present in cross-dataset cross-model scenario does not allow these models to achieve similar accuracy. To this end, we propose our method with the goal of achieving better transferability against different models and across… ▽ More

    Submitted 16 January, 2023; originally announced January 2023.

  8. arXiv:2301.01495  [pdf, other

    cs.LG cs.CR cs.CV

    Beckman Defense

    Authors: A. V. Subramanyam

    Abstract: Optimal transport (OT) based distributional robust optimisation (DRO) has received some traction in the recent past. However, it is at a nascent stage but has a sound potential in robustifying the deep learning models. Interestingly, OT barycenters demonstrate a good robustness against adversarial attacks. Owing to the computationally expensive nature of OT barycenters, they have not been investig… ▽ More

    Submitted 5 January, 2023; v1 submitted 4 January, 2023; originally announced January 2023.

  9. arXiv:2009.06374  [pdf, other

    cs.DC

    OneStopTuner: An End to End Architecture for JVM Tuning of Spark Applications

    Authors: Venktesh V, Pooja B Bindal, Devesh Singhal, A V Subramanyam, Vivek Kumar

    Abstract: Java is the backbone of widely used big data frameworks, such as Apache Spark, due to its productivity, portability from JVM-based execution, and support for a rich set of libraries. However, the performance of these applications can widely vary depending on the runtime flags chosen out of all existing JVM flags. Manually tuning these flags is both cumbersome and error-prone. Automated tuning appr… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: Submitted to IEEE BigData2020

  10. arXiv:1912.05255  [pdf, other

    eess.SP cs.LG

    Novel Deep Learning Framework for Wideband Spectrum Characterization at Sub-Nyquist Rate

    Authors: Shivam Chandhok, Himani Joshi, A V Subramanyam, Sumit J. Darak

    Abstract: Introduction of spectrum-sharing in 5G and subsequent generation networks demand base-station(s) with the capability to characterize the wideband spectrum spanned over licensed, shared and unlicensed non-contiguous frequency bands. Spectrum characterization involves the identification of vacant bands along with center frequency and parameters (energy, modulation, etc.) of occupied bands. Such char… ▽ More

    Submitted 7 May, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

  11. arXiv:1812.04860  [pdf, other

    cs.CV

    Attentional Road Safety Networks

    Authors: Sonu Gupta, Deepak Srivatsav, A. V. Subramanyam, Ponnurangam Kumaraguru

    Abstract: Road safety mapping using satellite images is a cost-effective but a challenging problem for smart city planning. The scarcity of labeled data, misalignment and ambiguity makes it hard for supervised deep networks to learn efficient embeddings in order to classify between safe and dangerous road segments. In this paper, we address the challenges using a region guided attention network. In our mode… ▽ More

    Submitted 26 January, 2019; v1 submitted 12 December, 2018; originally announced December 2018.

    Comments: 8 pages, 5 figures, 7 tables

  12. arXiv:1608.00905  [pdf, other

    cs.MM cs.CV

    PicHunt: Social Media Image Retrieval for Improved Law Enforcement

    Authors: Sonal Goel, Niharika Sachdeva, Ponnurangam Kumaraguru, A V Subramanyam, Divam Gupta

    Abstract: First responders are increasingly using social media to identify and reduce crime for well-being and safety of the society. Images shared on social media hurting religious, political, communal and other sentiments of people, often instigate violence and create law & order situations in society. This results in the need for first responders to inspect the spread of such images and users propagating… ▽ More

    Submitted 15 September, 2016; v1 submitted 2 August, 2016; originally announced August 2016.