Skip to main content

Showing 1–50 of 75 results for author: Yadav, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11051  [pdf, other

    cs.NI eess.SY

    Exploring the 6G Potentials: Immersive, Hyper Reliable, and Low-Latency Communication

    Authors: Afsoon Alidadi Shamsabadi, Animesh Yadav, Yasser Gadallah, Halim Yanikomeroglu

    Abstract: The transition towards the sixth-generation (6G) wireless telecommunications networks introduces significant challenges for researchers and industry stakeholders. The 6G technology aims to enhance existing usage scenarios, particularly supporting innovative applications requiring stringent performance metrics. Among the key performance indicators (KPIs) for 6G, immersive throughput, hyper-reliabil… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  2. arXiv:2406.13608  [pdf, other

    cs.IT cs.CR

    Wiretapped Commitment over Binary Channels

    Authors: Anuj Kumar Yadav, Manideep Mamindlapally, Amitalok J. Budkuley

    Abstract: We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve. We seek to determine the maximum commitment throughput in the presence of an eaves… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 13 Pages, 1 figure

  3. arXiv:2406.06613  [pdf, other

    cs.CL cs.AI

    GameBench: Evaluating Strategic Reasoning Abilities of LLM Agents

    Authors: Anthony Costarelli, Mat Allen, Roman Hauksson, Grace Sodunke, Suhas Hariharan, Carlson Cheng, Wenjie Li, Arjun Yadav

    Abstract: Large language models have demonstrated remarkable few-shot performance on many natural language understanding tasks. Despite several demonstrations of using large language models in complex, strategic scenarios, there lacks a comprehensive framework for evaluating agents' performance across various types of reasoning found in games. To address this gap, we introduce GameBench, a cross-domain benc… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

  4. arXiv:2405.18671  [pdf, other

    cs.LG cs.CR stat.ME

    Watermarking Counterfactual Explanations

    Authors: Hangzhi Guo, Amulya Yadav

    Abstract: The field of Explainable Artificial Intelligence (XAI) focuses on techniques for providing explanations to end-users about the decision-making processes that underlie modern-day machine learning (ML) models. Within the vast universe of XAI techniques, counterfactual (CF) explanations are often preferred by end-users as they help explain the predictions of ML models by providing an easy-to-understa… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  5. arXiv:2405.12929  [pdf, other

    cs.CL

    Code-mixed Sentiment and Hate-speech Prediction

    Authors: Anjali Yadav, Tanya Garg, Matej Klemen, Matej Ulcar, Basant Agarwal, Marko Robnik Sikonja

    Abstract: Code-mixed discourse combines multiple languages in a single text. It is commonly used in informal discourse in countries with several official languages, but also in many other countries in combination with English or neighboring languages. As recently large language models have dominated most natural language processing tasks, we investigated their performance in code-mixed settings for relevant… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  6. arXiv:2405.06676  [pdf, other

    cs.CL cs.AI cs.AR

    EDA Corpus: A Large Language Model Dataset for Enhanced Interaction with OpenROAD

    Authors: Bing-Yue Wu, Utsav Sharma, Sai Rahul Dhanvi Kankipati, Ajay Yadav, Bintu Kappil George, Sai Ritish Guntupalli, Austin Rovinski, Vidya A. Chhabria

    Abstract: Large language models (LLMs) serve as powerful tools for design, providing capabilities for both task automation and design assistance. Recent advancements have shown tremendous potential for facilitating LLM integration into the chip design process; however, many of these works rely on data that are not publicly available and/or not permissively licensed for use in LLM training and distribution.… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: Under review at Workshop on LLM-Aided Design (LAD'24)

  7. arXiv:2404.10989  [pdf, other

    cs.CV cs.LG cs.MM cs.SD eess.AS

    FairSSD: Understanding Bias in Synthetic Speech Detectors

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Davide Salvi, Paolo Bestagini, Edward J. Delp

    Abstract: Methods that can generate synthetic speech which is perceptually indistinguishable from speech recorded by a human speaker, are easily available. Several incidents report misuse of synthetic speech generated from these methods to commit fraud. To counter such misuse, many methods have been proposed to detect synthetic speech. Some of these detectors are more interpretable, can generalize to detect… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024 (WMF)

  8. arXiv:2403.18819  [pdf, other

    cs.CV

    Benchmarking Object Detectors with COCO: A New Path Forward

    Authors: Shweta Singh, Aayan Yadav, Jitesh Jain, Humphrey Shi, Justin Johnson, Karan Desai

    Abstract: The Common Objects in Context (COCO) dataset has been instrumental in benchmarking object detectors over the past decade. Like every dataset, COCO contains subtle errors and imperfections stemming from its annotation procedure. With the advent of high-performing models, we ask whether these errors of COCO are hindering its utility in reliably benchmarking further progress. In search for an answer,… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Technical report. Dataset website: https://cocorem.xyz and code: https://github.com/kdexd/coco-rem

  9. arXiv:2403.18667  [pdf, other

    cs.IR cs.CL

    Improving Content Recommendation: Knowledge Graph-Based Semantic Contrastive Learning for Diversity and Cold-Start Users

    Authors: Yejin Kim, Scott Rome, Kevin Foley, Mayur Nankani, Rimon Melamed, Javier Morales, Abhay Yadav, Maria Peifer, Sardar Hamidian, H. Howie Huang

    Abstract: Addressing the challenges related to data sparsity, cold-start problems, and diversity in recommendation systems is both crucial and demanding. Many current solutions leverage knowledge graphs to tackle these issues by combining both item-based and user-item collaborative signals. A common trend in these approaches focuses on improving ranking performance at the cost of escalating model complexity… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted at LREC-COLING 2024

  10. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  11. arXiv:2402.11997  [pdf, other

    cs.CL cs.AI cs.LG

    Remember This Event That Year? Assessing Temporal Information and Reasoning in Large Language Models

    Authors: Himanshu Beniwal, Dishant Patel, Kowsik Nandagopan D, Hritik Ladia, Ankit Yadav, Mayank Singh

    Abstract: Large Language Models (LLMs) are increasingly ubiquitous, yet their ability to retain and reason about temporal information remains limited, hindering their application in real-world scenarios where understanding the sequential nature of events is crucial. Our study experiments with 12 state-of-the-art models (ranging from 2B to 70B+ parameters) on a novel numerical-temporal dataset, \textbf{TempU… ▽ More

    Submitted 5 July, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  12. Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India

    Authors: Hasmat Malik, Amit Kumar Yadav, Fausto Pedro García Márquez, Jesús María Pinar-Pérez

    Abstract: Wind power generated by wind has non-schedule nature due to stochastic nature of meteorological variable. Hence energy business and control of wind power generation requires prediction of wind speed (WS) from few seconds to different time steps in advance. To deal with prediction shortcomings, various WS prediction methods have been used. Predictive data mining offers variety of methods for WS pre… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Malik, H., Yadav, A. K., Márquez, F. P. G., & Pinar-Pérez, J. M. (2022). Novel application of Relief Algorithm in cascaded artificial neural network to predict wind speed for wind power resource assessment in India. Energy Strategy Reviews, 41, 100864

    Journal ref: Energy Strategy Reviews 2022. Vol 41, 100864

  13. arXiv:2401.06999  [pdf

    cs.CV

    Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An Extensive Review

    Authors: Ankit Yadav, Dinesh Kumar Vishwakarma

    Abstract: With the large chunks of social media data being created daily and the parallel rise of realistic multimedia tampering methods, detecting and localising tampering in images and videos has become essential. This survey focusses on approaches for tampering detection in multimedia data using deep learning models. Specifically, it presents a detailed analysis of benchmark datasets for malicious manipu… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  14. arXiv:2401.06998  [pdf

    cs.CV

    Towards Effective Image Forensics via A Novel Computationally Efficient Framework and A New Image Splice Dataset

    Authors: Ankit Yadav, Dinesh Kumar Vishwakarma

    Abstract: Splice detection models are the need of the hour since splice manipulations can be used to mislead, spread rumors and create disharmony in society. However, there is a severe lack of image splicing datasets, which restricts the capabilities of deep learning models to extract discriminative features without overfitting. This manuscript presents two-fold contributions toward splice detection. Firstl… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  15. arXiv:2401.06995  [pdf

    cs.CV

    A Visually Attentive Splice Localization Network with Multi-Domain Feature Extractor and Multi-Receptive Field Upsampler

    Authors: Ankit Yadav, Dinesh Kumar Vishwakarma

    Abstract: Image splice manipulation presents a severe challenge in today's society. With easy access to image manipulation tools, it is easier than ever to modify images that can mislead individuals, organizations or society. In this work, a novel, "Visually Attentive Splice Localization Network with Multi-Domain Feature Extractor and Multi-Receptive Field Upsampler" has been proposed. It contains a unique… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

  16. arXiv:2401.05308  [pdf, ps, other

    cs.NI cs.CV cs.LG

    Strategic Client Selection to Address Non-IIDness in HAPS-enabled FL Networks

    Authors: Amin Farajzadeh, Animesh Yadav, Halim Yanikomeroglu

    Abstract: The deployment of federated learning (FL) within vertical heterogeneous networks, such as those enabled by high-altitude platform station (HAPS), offers the opportunity to engage a wide array of clients, each endowed with distinct communication and computational capabilities. This diversity not only enhances the training accuracy of FL models but also hastens their convergence. Yet, applying FL in… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

    Comments: Submitted to IEEE for possible publication

  17. arXiv:2401.03855  [pdf, other

    cs.CL cs.AI

    PythonSaga: Redefining the Benchmark to Evaluate Code Generating LLMs

    Authors: Ankit Yadav, Himanshu Beniwal, Mayank Singh

    Abstract: Driven by the surge in code generation using large language models (LLMs), numerous benchmarks have emerged to evaluate these LLMs capabilities. We conducted a large-scale human evaluation of HumanEval and MBPP, two popular benchmarks for Python code generation, analyzing their diversity and difficulty. Our findings unveil a critical bias towards a limited set of programming concepts, neglecting m… ▽ More

    Submitted 4 July, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  18. arXiv:2312.01523  [pdf, other

    cs.CL cs.LG

    SymNoise: Advancing Language Model Fine-tuning with Symmetric Noise

    Authors: Abhay Kumar Yadav, Arjun Singh

    Abstract: In this paper, we introduce a novel fine-tuning technique for language models, which involves incorporating symmetric noise into the embedding process. This method aims to enhance the model's function by more stringently regulating its local curvature, demonstrating superior performance over the current method, NEFTune. When fine-tuning the LLaMA-2-7B model using Alpaca, standard techniques yield… ▽ More

    Submitted 8 December, 2023; v1 submitted 3 December, 2023; originally announced December 2023.

  19. arXiv:2311.16965  [pdf

    cs.CL

    Natural Language Processing Through Transfer Learning: A Case Study on Sentiment Analysis

    Authors: Aman Yadav, Abhishek Vichare

    Abstract: Artificial intelligence and machine learning have significantly bolstered the technological world. This paper explores the potential of transfer learning in natural language processing focusing mainly on sentiment analysis. The models trained on the big data can also be used where data are scarce. The claim is that, compared to training models from scratch, transfer learning, using pre-trained BER… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: 12 pages, 1 table, 4 figures

  20. arXiv:2311.04345  [pdf, other

    cs.CL cs.AI

    A Taxonomy of Rater Disagreements: Surveying Challenges & Opportunities from the Perspective of Annotating Online Toxicity

    Authors: Wenbo Zhang, Hangzhi Guo, Ian D Kivlichan, Vinodkumar Prabhakaran, Davis Yadav, Amulya Yadav

    Abstract: Toxicity is an increasingly common and severe issue in online spaces. Consequently, a rich line of machine learning research over the past decade has focused on computationally detecting and mitigating online toxicity. These efforts crucially rely on human-annotated datasets that identify toxic content of various kinds in social media texts. However, such annotations historically yield low inter-r… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: 21 pages, 2 figures

  21. arXiv:2306.17427  [pdf

    cs.RO

    Modeling and parametric optimization of 3D tendon-sheath actuator system for upper limb soft exosuit

    Authors: Amit Yadav, Nitesh Kumar, Shaurya Surana, Aravind Ramasamy, Abhishek Rudra Pal, Sushma Santapuri, Lalan Kumar, Suriya Prakash Muthukrishnan, Shubhendu Bhasin, Sitikantha Roy

    Abstract: This paper presents an analysis of parametric characterization of a motor driven tendon-sheath actuator system for use in upper limb augmentation for applications such as rehabilitation, therapy, and industrial automation. The double tendon sheath system, which uses two sets of cables (agonist and antagonist side) guided through a sheath, is considered to produce smooth and natural-looking movemen… ▽ More

    Submitted 10 September, 2023; v1 submitted 30 June, 2023; originally announced June 2023.

  22. arXiv:2305.07118  [pdf, other

    cs.IT cs.CR

    Commitment over Gaussian Unfair Noisy Channels

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes, however, their imprecise statistical characterization can severely impair such schemes, especially their security guarantees. Keeping our focus on channel unreliability in this work, we study commitment over unreliable con… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: The paper follows alphabetical author order. AKY, MM, and PJ have equally contributed to this work

  23. arXiv:2305.05745  [pdf, other

    cs.IT math.PR

    Information Spectrum Converse for Minimum Entropy Couplings and Functional Representations

    Authors: Yanina Y. Shkel, Anuj Kumar Yadav

    Abstract: Given two jointly distributed random variables $(X,Y)$, a functional representation of $X$ is a random variable $Z$ independent of $Y$, and a deterministic function $g(\cdot, \cdot)$ such that $X=g(Y,Z)$. The problem of finding a minimum entropy functional representation is known to be equivalent to the problem of finding a minimum entropy coupling where, given a collection of probability distribu… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 2023 IEEE International Symposium on Information Theory (ISIT)

  24. arXiv:2305.05463  [pdf, ps, other

    cs.NI cs.DC cs.LG

    Multi-Tier Hierarchical Federated Learning-assisted NTN for Intelligent IoT Services

    Authors: Amin Farajzadeh, Animesh Yadav, Halim Yanikomeroglu

    Abstract: In the ever-expanding landscape of the IoT, managing the intricate network of interconnected devices presents a fundamental challenge. This leads us to ask: "What if we invite the IoT devices to collaboratively participate in real-time network management and IoT data-handling decisions?" This inquiry forms the foundation of our innovative approach, addressing the burgeoning complexities in IoT thr… ▽ More

    Submitted 11 December, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

    Comments: Submitted to IEEE for possible publication

  25. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  26. arXiv:2304.00913  [pdf, other

    cs.CL cs.AI

    LAHM : Large Annotated Dataset for Multi-Domain and Multilingual Hate Speech Identification

    Authors: Ankit Yadav, Shubham Chandel, Sushant Chatufale, Anil Bandhakavi

    Abstract: Current research on hate speech analysis is typically oriented towards monolingual and single classification tasks. In this paper, we present a new multilingual hate speech analysis dataset for English, Hindi, Arabic, French, German and Spanish languages for multiple domains across hate speech - Abuse, Racism, Sexism, Religious Hate and Extremism. To the best of our knowledge, this paper is the fi… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  27. arXiv:2303.01054  [pdf

    eess.IV cs.CV

    Deep Learning based Segmentation of Optical Coherence Tomographic Images of Human Saphenous Varicose Vein

    Authors: Maryam Viqar, Violeta Madjarova, Amit Kumar Yadav, Desislava Pashkuleva, Alexander S. Machikhin

    Abstract: Deep-learning based segmentation model is proposed for Optical Coherence Tomography images of human varicose vein based on the U-Net model employing atrous convolution with residual blocks, which gives an accuracy of 0.9932.

    Submitted 2 March, 2023; originally announced March 2023.

  28. arXiv:2302.00163  [pdf, ps, other

    cs.NI cs.LG eess.SP math.OC

    FLSTRA: Federated Learning in Stratosphere

    Authors: Amin Farajzadeh, Animesh Yadav, Omid Abbasi, Wael Jaafar, Halim Yanikomeroglu

    Abstract: We propose a federated learning (FL) in stratosphere (FLSTRA) system, where a high altitude platform station (HAPS) facilitates a large number of terrestrial clients to collaboratively learn a global model without sharing the training data. FLSTRA overcomes the challenges faced by FL in terrestrial networks, such as slow convergence and high communication delay due to limited client participation… ▽ More

    Submitted 9 June, 2023; v1 submitted 31 January, 2023; originally announced February 2023.

    Comments: Accepted to IEEE Transactions on Wireless Communications

  29. arXiv:2301.08863  [pdf, other

    cs.NI eess.SP

    HAPS for 6G Networks: Potential Use Cases, Open Challenges, and Possible Solutions

    Authors: Omid Abbasi, Animesh Yadav, Halim Yanikomeroglu, Ngoc Dung Dao, Gamini Senarath, Peiying Zhu

    Abstract: High altitude platform station (HAPS), which is deployed in the stratosphere at an altitude of 20-50 kilometres, has attracted much attention in recent years due to their large footprint, line-of-sight links, and fixed position relative to the Earth. Compared with existing network infrastructure, HAPS has a much larger coverage area than terrestrial base stations and is much closer than satellites… ▽ More

    Submitted 11 April, 2023; v1 submitted 20 January, 2023; originally announced January 2023.

  30. arXiv:2210.08532  [pdf, other

    cs.DB cs.CL cs.IR cs.LG

    AskYourDB: An end-to-end system for querying and visualizing relational databases using natural language

    Authors: Manu Joseph, Harsh Raj, Anubhav Yadav, Aaryamann Sharma

    Abstract: Querying databases for the right information is a time consuming and error-prone task and often requires experienced professionals for the job. Furthermore, the user needs to have some prior knowledge about the database. There have been various efforts to develop an intelligence which can help business users to query databases directly. However, there has been some successes, but very little in te… ▽ More

    Submitted 16 October, 2022; originally announced October 2022.

    Comments: 9 pages

  31. arXiv:2206.07331  [pdf

    cs.MM

    ETMA: Efficient Transformer Based Multilevel Attention framework for Multimodal Fake News Detection

    Authors: Ashima Yadav, Shivani Gaba, Haneef Khan, Ishan Budhiraja, Akansha Singh, Krishan Kant Singh

    Abstract: In this new digital era, social media has created a severe impact on the lives of people. In recent times, fake news content on social media has become one of the major challenging problems for society. The dissemination of fabricated and false news articles includes multimodal data in the form of text and images. The previous methods have mainly focused on unimodal analysis. Moreover, for multimo… ▽ More

    Submitted 13 March, 2023; v1 submitted 15 June, 2022; originally announced June 2022.

    Comments: Accepted for publication in IEEE Transactions on Computational Social Systems

  32. arXiv:2206.07005  [pdf, other

    cs.IT eess.SY

    Beyond-Cell Communications via HAPS-RIS

    Authors: Safwan Alfattani, Animesh Yadav, Halim Yanikomeroglu, Abbas Yongacoglu

    Abstract: The ever-increasing number of users and new services in urban regions can lead terrestrial base stations (BSs) to become overloaded and, consequently, some users to go unserved. Compounding this, users in urban areas can face severe shadowing and blockages, which means that some users do not receive a desired quality of service (QoS). Motivated by the energy and cost benefits of reconfigurable int… ▽ More

    Submitted 3 October, 2022; v1 submitted 29 May, 2022; originally announced June 2022.

    Comments: 9 pages, 5 fugures, to be presented in IEEE Globecom Workshop 2022

  33. RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model

    Authors: Hangzhi Guo, Feiran Jia, Jinghui Chen, Anna Squicciarini, Amulya Yadav

    Abstract: Counterfactual (CF) explanations for machine learning (ML) models are preferred by end-users, as they explain the predictions of ML models by providing a recourse (or contrastive) case to individuals who are adversely impacted by predicted outcomes. Existing CF explanation methods generate recourses under the assumption that the underlying target ML model remains stationary over time. However, due… ▽ More

    Submitted 18 August, 2023; v1 submitted 1 June, 2022; originally announced June 2022.

  34. arXiv:2205.06673  [pdf

    q-fin.ST cs.AI cs.LG

    Univariate and Multivariate LSTM Model for Short-Term Stock Market Prediction

    Authors: Vishal Kuber, Divakar Yadav, Arun Kr Yadav

    Abstract: Designing robust and accurate prediction models has been a viable research area since a long time. While proponents of a well-functioning market predictors believe that it is difficult to accurately predict market prices but many scholars disagree. Robust and accurate prediction systems will not only be helpful to the businesses but also to the individuals in making their financial investments. Th… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: 24 pages, 20 figures, 8 tables

  35. arXiv:2204.12067  [pdf, other

    cs.CV cs.MM

    An Overview of Recent Work in Media Forensics: Methods and Threats

    Authors: Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp

    Abstract: In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents. For each data modality, we discuss synthesis and manipulation techniques that can be used to create and modify digital media. We then review technological advancements for detecting and quantifying such manipulations. Finally, we consider open issues and suggest directions… ▽ More

    Submitted 12 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This is a longer version of a paper accepted to the 2022 IEEE International Conference on Multimedia Information Processing and Retrieval entitled "An Overview of Recent Work in Multimedia Forensics"

  36. arXiv:2204.01849  [pdf

    cs.CL cs.IR cs.LG

    Automatic Text Summarization Methods: A Comprehensive Review

    Authors: Divakar Yadav, Jalpa Desai, Arun Kumar Yadav

    Abstract: One of the most pressing issues that have arisen due to the rapid growth of the Internet is known as information overloading. Simplifying the relevant information in the form of a summary will assist many people because the material on any topic is plentiful on the Internet. Manually summarising massive amounts of text is quite challenging for humans. So, it has increased the need for more complex… ▽ More

    Submitted 3 March, 2022; originally announced April 2022.

    Comments: 20 pages, 7 figures and 4 tables

  37. arXiv:2203.10930  [pdf

    cs.CV cs.CR

    An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

    Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya

    Abstract: According to recent studies, the vulnerability of state-of-the-art Neural Networks to adversarial input samples has increased drastically. A neural network is an intermediate path or technique by which a computer learns to perform tasks using Machine learning algorithms. Machine Learning and Artificial Intelligence model has become a fundamental aspect of life, such as self-driving cars [1], smart… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

  38. arXiv:2111.08477  [pdf, other

    cs.IT cs.CR

    On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is an important cryptographic primitive. It is well known that noisy channels are a promising resource to realize commitment in an information-theoretically secure manner. However, oftentimes, channel behaviour may be poorly characterized thereby limiting the commitment throughput and/or degrading the security guarantees; particularly problematic is when a dishonest party, unbeknown to… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 16 pages, 3 figures

  39. arXiv:2109.08916  [pdf

    eess.IV cs.CV cs.LG

    Underwater Image Enhancement Using Convolutional Neural Network

    Authors: Anushka Yadav, Mayank Upadhyay, Ghanapriya Singh

    Abstract: This work proposes a method for underwater image enhancement using the principle of histogram equalization. Since underwater images have a global strong dominant colour, their colourfulness and contrast are often degraded. Before applying the histogram equalisation technique on the image, the image is converted from coloured image to a gray scale image for further operations. Histogram equalizatio… ▽ More

    Submitted 18 September, 2021; originally announced September 2021.

  40. arXiv:2109.07557  [pdf, other

    cs.LG

    CounterNet: End-to-End Training of Prediction Aware Counterfactual Explanations

    Authors: Hangzhi Guo, Thanh Hong Nguyen, Amulya Yadav

    Abstract: This work presents CounterNet, a novel end-to-end learning framework which integrates Machine Learning (ML) model training and the generation of corresponding counterfactual (CF) explanations into a single end-to-end pipeline. Counterfactual explanations offer a contrastive case, i.e., they attempt to find the smallest modification to the feature values of an instance that changes the prediction o… ▽ More

    Submitted 22 June, 2023; v1 submitted 15 September, 2021; originally announced September 2021.

    Journal ref: Proceedings of the 29th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'23), 2023

  41. arXiv:2105.12399  [pdf, other

    cs.CL

    SentEmojiBot: Empathising Conversations Generation with Emojis

    Authors: Akhilesh Ravi, Amit Yadav, Jainish Chauhan, Jatin Dholakia, Naman Jain, Mayank Singh

    Abstract: The increasing use of dialogue agents makes it extremely desirable for them to understand and acknowledge the implied emotions to respond like humans with empathy. Chatbots using traditional techniques analyze emotions based on the context and meaning of the text and lack the understanding of emotions expressed through face. Emojis representing facial expressions present a promising way to express… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

  42. AdCOFE: Advanced Contextual Feature Extraction in Conversations for emotion classification

    Authors: Vaibhav Bhat, Anita Yadav, Sonal Yadav, Dhivya Chandrasekaran, Vijay Mago

    Abstract: Emotion recognition in conversations is an important step in various virtual chat bots which require opinion-based feedback, like in social media threads, online support and many more applications. Current Emotion recognition in conversations models face issues like (a) loss of contextual information in between two dialogues of a conversation, (b) failure to give appropriate importance to signific… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: 12 pages, to be published in PeerJ Computer Science Journal

    Journal ref: PeerJ Computer Science, 2021

  43. arXiv:2012.13318  [pdf

    cs.CV

    Person Re-Identification using Deep Learning Networks: A Systematic Review

    Authors: Ankit Yadav, Dinesh Kumar Vishwakarma

    Abstract: Person re-identification has received a lot of attention from the research community in recent times. Due to its vital role in security based applications, person re-identification lies at the heart of research relevant to tracking robberies, preventing terrorist attacks and other security critical events. While the last decade has seen tremendous growth in re-id approaches, very little review lit… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

    Comments: 34 pages, 15 figures

  44. A Deep Multi-Level Attentive network for Multimodal Sentiment Analysis

    Authors: Ashima Yadav, Dinesh Kumar Vishwakarma

    Abstract: Multimodal sentiment analysis has attracted increasing attention with broad application prospects. The existing methods focuses on single modality, which fails to capture the social media content for multiple modalities. Moreover, in multi-modal learning, most of the works have focused on simply combining the two modalities, without exploring the complicated correlations between them. This resulte… ▽ More

    Submitted 15 December, 2020; originally announced December 2020.

    Comments: 11 pages, 7 figures

    Journal ref: ACM Transactions on Multimedia Computing, Communications, and Applications, 2022

  45. arXiv:2011.14073  [pdf, other

    cs.IT

    On Performance Comparison of Multi-Antenna HD-NOMA, SCMA and PD-NOMA Schemes

    Authors: Animesh Yadav, Chen Quan, Pramod K. Varshney, H. Vincent Poor

    Abstract: In this paper, we study the uplink channel throughput performance of a proposed novel multiple-antenna hybrid-domain non-orthogonal multiple access (MA-HD-NOMA) scheme. This scheme combines the conventional sparse code multiple access (SCMA) and power-domain NOMA (PD-NOMA) schemes in order to increase the number of users served as compared to conventional NOMA schemes and uses multiple antennas at… ▽ More

    Submitted 28 November, 2020; originally announced November 2020.

    Comments: Accepted to be Published in: IEEE Wireless Communications Letters

  46. arXiv:2011.10358  [pdf

    cs.CL cs.IR

    A Deep Language-independent Network to analyze the impact of COVID-19 on the World via Sentiment Analysis

    Authors: Ashima Yadav, Dinesh Kumar Vishwakarma

    Abstract: Towards the end of 2019, Wuhan experienced an outbreak of novel coronavirus, which soon spread all over the world, resulting in a deadly pandemic that infected millions of people around the globe. The government and public health agencies followed many strategies to counter the fatal virus. However, the virus severely affected the social and economic lives of the people. In this paper, we extract… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

  47. arXiv:2009.09559  [pdf, other

    cs.SI

    Clinical trial of an AI-augmented intervention for HIV prevention in youth experiencing homelessness

    Authors: Bryan Wilder, Laura Onasch-Vera, Graham Diguiseppi, Robin Petering, Chyna Hill, Amulya Yadav, Eric Rice, Milind Tambe

    Abstract: Youth experiencing homelessness (YEH) are subject to substantially greater risk of HIV infection, compounded both by their lack of access to stable housing and the disproportionate representation of youth of marginalized racial, ethnic, and gender identity groups among YEH. A key goal for health equity is to improve adoption of protective behaviors in this population. One promising strategy for in… ▽ More

    Submitted 6 November, 2020; v1 submitted 20 September, 2020; originally announced September 2020.

    Report number: Accepted at AAAI 2021

  48. arXiv:2007.07747  [pdf, other

    cs.SI cs.CY

    Preliminary Results from a Peer-Led, Social Network Intervention, Augmented by Artificial Intelligence to Prevent HIV among Youth Experiencing Homelessness

    Authors: Eric Rice, Laura Onasch-Vera, Graham T. DiGuiseppi, Bryan Wilder, Robin Petering, Chyna Hill, Amulya Yadav, Milind Tambe

    Abstract: Each year, there are nearly 4 million youth experiencing homelessness (YEH) in the United States with HIV prevalence ranging from 3 to 11.5%. Peer change agent (PCA) models for HIV prevention have been used successfully in many populations, but there have been notable failures. In recent years, network interventionists have suggested that these failures could be attributed to PCA selection procedu… ▽ More

    Submitted 10 July, 2020; originally announced July 2020.

  49. arXiv:2007.01580  [pdf, ps, other

    cs.LG stat.ML

    On the Similarity between the Laplace and Neural Tangent Kernels

    Authors: Amnon Geifman, Abhay Yadav, Yoni Kasten, Meirav Galun, David Jacobs, Ronen Basri

    Abstract: Recent theoretical work has shown that massively overparameterized neural networks are equivalent to kernel regressors that use Neural Tangent Kernels(NTK). Experiments show that these kernel methods perform similarly to real neural networks. Here we show that NTK for fully connected networks is closely related to the standard Laplace kernel. We show theoretically that for normalized data on the h… ▽ More

    Submitted 14 November, 2020; v1 submitted 3 July, 2020; originally announced July 2020.

  50. arXiv:2006.06865  [pdf, other

    math.OC cs.SI

    Exploring Algorithmic Fairness in Robust Graph Covering Problems

    Authors: Aida Rahmattalabi, Phebe Vayanos, Anthony Fulginiti, Eric Rice, Bryan Wilder, Amulya Yadav, Milind Tambe

    Abstract: Fueled by algorithmic advances, AI algorithms are increasingly being deployed in settings subject to unanticipated challenges with complex social effects. Motivated by real-world deployment of AI driven, social-network based suicide prevention and landslide risk management interventions, this paper focuses on robust graph covering problems subject to group fairness constraints. We show that, in th… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

    Comments: Accepted at 2019 Conference on Neural Information Processing Systems

    Journal ref: year=2019, pages=15750 to 15761