Skip to main content

Showing 1–50 of 179 results for author: Singh, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07478  [pdf, other

    cs.NI

    Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh, Kumari Akansha, Baljinder Singh Heera, Pallavi Athe

    Abstract: Optical networks play a crucial role in todays digital topography, enabling the high-speed and reliable transmission of vast amounts of data over optical fibre for long distances. This paper provides an overview of optical networks, especially emphasising on their evolution with time.

    Submitted 14 August, 2024; originally announced August 2024.

  2. arXiv:2408.01085  [pdf, other

    cs.CV

    Effect of Fog Particle Size Distribution on 3D Object Detection Under Adverse Weather Conditions

    Authors: Ajinkya Shinde, Gaurav Sharma, Manisha Pattanaik, Sri Niwas Singh

    Abstract: LiDAR-based sensors employing optical spectrum signals play a vital role in providing significant information about the target objects in autonomous driving vehicle systems. However, the presence of fog in the atmosphere severely degrades the overall system's performance. This manuscript analyzes the role of fog particle size distributions in 3D object detection under adverse weather conditions. W… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

  3. arXiv:2407.14933  [pdf, other

    cs.CL cs.AI cs.LG

    Consent in Crisis: The Rapid Decline of the AI Data Commons

    Authors: Shayne Longpre, Robert Mahari, Ariel Lee, Campbell Lund, Hamidah Oderinwale, William Brannon, Nayan Saxena, Naana Obeng-Marnu, Tobin South, Cole Hunter, Kevin Klyman, Christopher Klamm, Hailey Schoelkopf, Nikhil Singh, Manuel Cherep, Ahmad Anis, An Dinh, Caroline Chitongo, Da Yin, Damien Sileo, Deividas Mataciunas, Diganta Misra, Emad Alghamdi, Enrico Shippole, Jianguo Zhang , et al. (24 additional authors not shown)

    Abstract: General-purpose artificial intelligence (AI) systems are built on massive swathes of public web data, assembled into corpora such as C4, RefinedWeb, and Dolma. To our knowledge, we conduct the first, large-scale, longitudinal audit of the consent protocols for the web domains underlying AI training corpora. Our audit of 14,000 web domains provides an expansive view of crawlable web data and how co… ▽ More

    Submitted 24 July, 2024; v1 submitted 20 July, 2024; originally announced July 2024.

    Comments: 41 pages (13 main), 5 figures, 9 tables

  4. arXiv:2407.12875  [pdf, other

    cs.CV cs.AI

    ChatBCG: Can AI Read Your Slide Deck?

    Authors: Nikita Singh, Rob Balian, Lukas Martinelli

    Abstract: Multimodal models like GPT4o and Gemini Flash are exceptional at inference and summarization tasks, which approach human-level in performance. However, we find that these models underperform compared to humans when asked to do very specific 'reading and estimation' tasks, particularly in the context of visual charts in business decks. This paper evaluates the accuracy of GPT 4o and Gemini Flash-1.… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: for full list of figures visit https://www.repromptai.com/chat_bcg

  5. arXiv:2407.09721  [pdf, other

    cs.HC

    Purrfect Pitch: Exploring Musical Interval Learning through Multisensory Interfaces

    Authors: Sam Chin, Cathy Mengying Fang, Nikhil Singh, Ibrahim Ibrahim, Joe Paradiso, Pattie Maes

    Abstract: We introduce Purrfect Pitch, a system consisting of a wearable haptic device and a custom-designed learning interface for musical ear training. We focus on the ability to identify musical intervals (sequences of two musical notes), which is a perceptually ambiguous task that usually requires strenuous rote training. With our system, the user would hear a sequence of two tones while simultaneously… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  6. arXiv:2407.08989  [pdf, other

    cs.CL cs.AI

    Robustness of LLMs to Perturbations in Text

    Authors: Ayush Singh, Navpreet Singh, Shubham Vatsal

    Abstract: Having a clean dataset has been the foundational assumption of most natural language processing (NLP) systems. However, properly written text is rarely found in real-world scenarios and hence, oftentimes invalidates the aforementioned foundational assumption. Recently, Large language models (LLMs) have shown impressive performance, but can they handle the inevitable noise in real-world data? This… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: 8 pages, 1 figure, 6 tables, updated with results also from GPT-4, LLaMa-3

    ACM Class: I.7; I.2.7; I.2.4

  7. arXiv:2407.07818  [pdf, other

    cs.LG

    The Misclassification Likelihood Matrix: Some Classes Are More Likely To Be Misclassified Than Others

    Authors: Daniel Sikar, Artur Garcez, Robin Bloomfield, Tillman Weyde, Kaleem Peeroo, Naman Singh, Maeve Hutchinson, Dany Laksono, Mirela Reljan-Delaney

    Abstract: This study introduces the Misclassification Likelihood Matrix (MLM) as a novel tool for quantifying the reliability of neural network predictions under distribution shifts. The MLM is obtained by leveraging softmax outputs and clustering techniques to measure the distances between the predictions of a trained neural network and class centroids. By analyzing these distances, the MLM provides a comp… ▽ More

    Submitted 13 August, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 9 pages, 7 figures, 1 table

  8. arXiv:2407.06910  [pdf, other

    cs.IR cs.AI cs.LG

    Fine-grained large-scale content recommendations for MSX sellers

    Authors: Manpreet Singh, Ravdeep Pasricha, Ravi Prasad Kondapalli, Kiran R, Nitish Singh, Akshita Agarwalla, Manoj R, Manish Prabhakar, Laurent Boué

    Abstract: One of the most critical tasks of Microsoft sellers is to meticulously track and nurture potential business opportunities through proactive engagement and tailored solutions. Recommender systems play a central role to help sellers achieve their goals. In this paper, we present a content recommendation model which surfaces various types of content (technical documentation, comparison with competito… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Journal ref: Microsoft Journal of Applied Research, Volume 21, 2024

  9. arXiv:2406.18899  [pdf, other

    cs.RO cs.AI

    Autonomous Control of a Novel Closed Chain Five Bar Active Suspension via Deep Reinforcement Learning

    Authors: Nishesh Singh, Sidharth Ramesh, Abhishek Shankar, Jyotishka Duttagupta, Leander Stephen D'Souza, Sanjay Singh

    Abstract: Planetary exploration requires traversal in environments with rugged terrains. In addition, Mars rovers and other planetary exploration robots often carry sensitive scientific experiments and components onboard, which must be protected from mechanical harm. This paper deals with an active suspension system focused on chassis stabilisation and an efficient traversal method while encountering unavoi… ▽ More

    Submitted 4 July, 2024; v1 submitted 27 June, 2024; originally announced June 2024.

    Comments: 15 pages, 11 figures

    ACM Class: I.2.9

  10. arXiv:2406.15199  [pdf, other

    cs.IT cs.NI

    On the Computing and Communication Tradeoff in Reasoning-Based Multi-User Semantic Communications

    Authors: Nitisha Singh, Christo Kurisummoottil Thomas, Walid Saad, Emilio Calvanese Strinati

    Abstract: Semantic communication (SC) is recognized as a promising approach for enabling reliable communication with minimal data transfer while maintaining seamless connectivity for a group of wireless users. Unlocking the advantages of SC for multi-user cases requires revisiting how communication and computing resources are allocated. This reassessment should consider the reasoning abilities of end-users,… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: 7 pages, 5 figures, in submission to IEEE GLOBECOM

  11. arXiv:2406.05923  [pdf, other

    cs.SD cs.LG eess.AS

    Contrastive Learning from Synthetic Audio Doppelgangers

    Authors: Manuel Cherep, Nikhil Singh

    Abstract: Learning robust audio representations currently demands extensive datasets of real-world sound recordings. By applying artificial transformations to these recordings, models can learn to recognize similarities despite subtle variations through techniques like contrastive learning. However, these transformations are only approximations of the true diversity found in real-world sounds, which are gen… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: 17 pages, 6 figures

  12. arXiv:2406.04145  [pdf, other

    cs.CL cs.AI

    Every Answer Matters: Evaluating Commonsense with Probabilistic Measures

    Authors: Qi Cheng, Michael Boratko, Pranay Kumar Yelugam, Tim O'Gorman, Nalini Singh, Andrew McCallum, Xiang Lorraine Li

    Abstract: Large language models have demonstrated impressive performance on commonsense tasks; however, these tasks are often posed as multiple-choice questions, allowing models to exploit systematic biases. Commonsense is also inherently probabilistic with multiple correct answers. The purpose of "boiling water" could be making tea and cooking, but it also could be killing germs. Existing tasks do not capt… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: ACL 2024 Camera Ready

  13. arXiv:2406.00294  [pdf, other

    cs.SD cs.LG eess.AS

    Creative Text-to-Audio Generation via Synthesizer Programming

    Authors: Manuel Cherep, Nikhil Singh, Jessica Shand

    Abstract: Neural audio synthesis methods now allow specifying ideas in natural language. However, these methods produce results that cannot be easily tweaked, as they are based on large latent spaces and up to billions of uninterpretable parameters. We propose a text-to-audio generation method that leverages a virtual modular sound synthesizer with only 78 parameters. Synthesizers have long been used by ski… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

    Comments: Accepted to ICML 2024

  14. arXiv:2405.09781  [pdf, other

    cs.LG cs.AI

    An Independent Implementation of Quantum Machine Learning Algorithms in Qiskit for Genomic Data

    Authors: Navneet Singh, Shiva Raj Pokhrel

    Abstract: In this paper, we explore the power of Quantum Machine Learning as we extend, implement and evaluate algorithms like Quantum Support Vector Classifier (QSVC), Pegasos-QSVC, Variational Quantum Circuits (VQC), and Quantum Neural Networks (QNN) in Qiskit with diverse feature mapping techniques for genomic sequence classification.

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 2 pager extended abstract

    Journal ref: SIGCOMM 2024, Sydney Australia

  15. arXiv:2404.19345  [pdf, other

    cond-mat.mes-hall cs.ET

    Connecting physics to systems with modular spin-circuits

    Authors: Kemal Selcuk, Saleh Bunaiyan, Nihal Sanjay Singh, Shehrin Sayed, Samiran Ganguly, Giovanni Finocchio, Supriyo Datta, Kerem Y. Camsari

    Abstract: An emerging paradigm in modern electronics is that of CMOS + $\sf X$ requiring the integration of standard CMOS technology with novel materials and technologies denoted by $\sf X$. In this context, a crucial challenge is to develop accurate circuit models for $\sf X$ that are compatible with standard models for CMOS-based circuits and systems. In this perspective we present physics-based, experime… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  16. arXiv:2404.18713  [pdf, other

    cs.RO cs.AI eess.SY

    Adaptive Reinforcement Learning for Robot Control

    Authors: Yu Tang Liu, Nilaksh Singh, Aamir Ahmad

    Abstract: Deep reinforcement learning (DRL) has shown remarkable success in simulation domains, yet its application in designing robot controllers remains limited, due to its single-task orientation and insufficient adaptability to environmental changes. To overcome these limitations, we present a novel adaptive agent that leverages transfer learning techniques to dynamically adapt policy in response to dif… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  17. arXiv:2404.01704  [pdf, other

    cs.NI

    Application of S-band for Protection in Multi-band Flexible-Grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the ex… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: First Draft

  18. arXiv:2403.09806  [pdf, other

    cs.AI

    xLP: Explainable Link Prediction for Master Data Management

    Authors: Balaji Ganesan, Matheen Ahmed Pasha, Srinivasa Parkala, Neeraj R Singh, Gayatri Mishra, Sumit Bhatia, Hima Patel, Somashekar Naganna, Sameep Mehta

    Abstract: Explaining neural model predictions to users requires creativity. Especially in enterprise applications, where there are costs associated with users' time, and their trust in the model predictions is critical for adoption. For link prediction in master data management, we have built a number of explainability solutions drawing from research in interpretability, fact verification, path ranking, neu… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: 8 pages, 4 figures, NeurIPS 2020 Competition and Demonstration Track. arXiv admin note: text overlap with arXiv:2012.05516

  19. arXiv:2402.19371  [pdf

    cs.CL cs.AI cs.IR

    OpenMedLM: Prompt engineering can out-perform fine-tuning in medical question-answering with open-source large language models

    Authors: Jenish Maharjan, Anurag Garikipati, Navan Preet Singh, Leo Cyrus, Mayank Sharma, Madalina Ciobanu, Gina Barnes, Rahul Thapa, Qingqing Mao, Ritankar Das

    Abstract: LLMs have become increasingly capable at accomplishing a range of specialized-tasks and can be utilized to expand equitable access to medical knowledge. Most medical LLMs have involved extensive fine-tuning, leveraging specialized medical data and significant, thus costly, amounts of computational power. Many of the top performing LLMs are proprietary and their access is limited to very few resear… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  20. arXiv:2402.12336  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    Robust CLIP: Unsupervised Adversarial Fine-Tuning of Vision Embeddings for Robust Large Vision-Language Models

    Authors: Christian Schlarmann, Naman Deep Singh, Francesco Croce, Matthias Hein

    Abstract: Multi-modal foundation models like OpenFlamingo, LLaVA, and GPT-4 are increasingly used for various real-world tasks. Prior work has shown that these models are highly vulnerable to adversarial attacks on the vision modality. These attacks can be leveraged to spread fake information or defraud users, and thus pose a significant risk, which makes the robustness of large multi-modal foundation model… ▽ More

    Submitted 5 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: ICML 2024 Oral

  21. arXiv:2402.05963  [pdf, other

    cs.LG cs.AI cs.RO eess.SY

    Frugal Actor-Critic: Sample Efficient Off-Policy Deep Reinforcement Learning Using Unique Experiences

    Authors: Nikhil Kumar Singh, Indranil Saha

    Abstract: Efficient utilization of the replay buffer plays a significant role in the off-policy actor-critic reinforcement learning (RL) algorithms used for model-free control policy synthesis for complex dynamical systems. We propose a method for achieving sample efficiency, which focuses on selecting unique samples and adding them to the replay buffer during the exploration with the goal of reducing the b… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  22. arXiv:2402.03704  [pdf, other

    cs.CR

    WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

    Authors: Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran

    Abstract: Timing vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing techniques, traditionally used for detecting software vulnerabilities, have shown promising results for uncovering vulnerabilities in large-scale hardware designs, such as processors. Researchers have adapted black-b… ▽ More

    Submitted 14 March, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted to USENIX Sec'24

  23. arXiv:2402.00356  [pdf, other

    cs.CR

    IoT in the Cloud: Exploring Security Challenges and Mitigations for a Connected World

    Authors: Nivedita Singh, Rajkumar Buyya, Hyoungshich Kim

    Abstract: The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks. Moreover, IoT services often handle sensitive user data, which could be… ▽ More

    Submitted 26 August, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

  24. arXiv:2401.16838  [pdf, other

    cs.LO

    A Complete Fragment of LTL(EB)

    Authors: Flavio Ferrarotti, Peter Rivière, Klaus-Dieter Schewe, Neeraj Kumar Singh, Yamine Aït Ameur

    Abstract: The verification of liveness conditions is an important aspect of state-based rigorous methods. This article investigates this problem in a fragment $\square$LTL of the logic LTL(EB), the integration of the UNTIL-fragment of Pnueli's linear time temporal logic (LTL) and the logic of Event-B, in which the most commonly used liveness conditions can be expressed. For this fragment a sound set of deri… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: 22 pages

    MSC Class: 68Q60; 68N30

  25. arXiv:2401.05826  [pdf, other

    cs.CY

    Crumbled Cookie Exploring E-commerce Websites Cookie Policies with Data Protection Regulations

    Authors: Nivedita Singh, Yejin Do, Yongsang Yu. Imane Fouad, Jungrae Kim, Hyoungshick Kim

    Abstract: Despite stringent data protection regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific regulations, many websites continue to use cookies to track user activities. Recent studies have revealed several data protection violations, resulting in significant penalties, especially for multinational corporations. Motivat… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

  26. arXiv:2401.04732  [pdf, other

    cs.IR cs.AI cs.LG

    A case study of Generative AI in MSX Sales Copilot: Improving seller productivity with a real-time question-answering system for content recommendation

    Authors: Manpreet Singh, Ravdeep Pasricha, Nitish Singh, Ravi Prasad Kondapalli, Manoj R, Kiran R, Laurent Boué

    Abstract: In this paper, we design a real-time question-answering system specifically targeted for helping sellers get relevant material/documentation they can share live with their customers or refer to during a call. Taking the Seismic content repository as a relatively large scale example of a diverse dataset of sales material, we demonstrate how LLM embeddings of sellers' queries can be matched with the… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Journal ref: Microsoft Journal of Applied Research, Volume 20, 2024

  27. arXiv:2312.13193  [pdf

    cs.CL cs.AI

    HCDIR: End-to-end Hate Context Detection, and Intensity Reduction model for online comments

    Authors: Neeraj Kumar Singh, Koyel Ghosh, Joy Mahapatra, Utpal Garain, Apurbalal Senapati

    Abstract: Warning: This paper contains examples of the language that some people may find offensive. Detecting and reducing hateful, abusive, offensive comments is a critical and challenging task on social media. Moreover, few studies aim to mitigate the intensity of hate speech. While studies have shown that context-level semantics are crucial for detecting hateful comments, most of this research focuses… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  28. arXiv:2311.11565  [pdf, other

    cs.NI

    Protected Working Groups-based Resilient Resource Provisioning in MCF-enabled SDM-EONs

    Authors: Anjali Sharma, Varsha Lohani, Yatindra Nath Singh

    Abstract: Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  29. arXiv:2311.11214  [pdf

    cs.CV

    Infrared image identification method of substation equipment fault under weak supervision

    Authors: Anjali Sharma, Priya Banerjee, Nikhil Singh

    Abstract: This study presents a weakly supervised method for identifying faults in infrared images of substation equipment. It utilizes the Faster RCNN model for equipment identification, enhancing detection accuracy through modifications to the model's network structure and parameters. The method is exemplified through the analysis of infrared images captured by inspection robots at substations. Performanc… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  30. arXiv:2311.08314  [pdf, other

    cs.CV

    Convolutional Neural Networks Exploiting Attributes of Biological Neurons

    Authors: Neeraj Kumar Singh, Nikhil R. Pal

    Abstract: In this era of artificial intelligence, deep neural networks like Convolutional Neural Networks (CNNs) have emerged as front-runners, often surpassing human capabilities. These deep networks are often perceived as the panacea for all challenges. Unfortunately, a common downside of these networks is their ''black-box'' character, which does not necessarily mirror the operation of biological neural… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: 20 pages, 6 figures

  31. arXiv:2310.09020   

    cs.NI cs.GT

    Credit Blockchain for Faster Transactions in P2P Energy Trading

    Authors: Amit kumar Vishwakarma, Yatindra Nath Singh

    Abstract: P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further,… ▽ More

    Submitted 21 November, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: I am submitting the paper to another journal

    MSC Class: NA ACM Class: F.2.2

  32. arXiv:2308.10714  [pdf, other

    cs.DC

    CXL Memory as Persistent Memory for Disaggregated HPC: A Practical Approach

    Authors: Yehonatan Fridman, Suprasad Mutalik Desai, Navneet Singh, Thomas Willhalm, Gal Oren

    Abstract: In the landscape of High-Performance Computing (HPC), the quest for efficient and scalable memory solutions remains paramount. The advent of Compute Express Link (CXL) introduces a promising avenue with its potential to function as a Persistent Memory (PMem) solution in the context of disaggregated HPC systems. This paper presents a comprehensive exploration of CXL memory's viability as a candidat… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 12 pages, 9 figures

  33. arXiv:2306.12941  [pdf, other

    cs.CV cs.LG

    Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Models

    Authors: Francesco Croce, Naman D Singh, Matthias Hein

    Abstract: Adversarial robustness has been studied extensively in image classification, especially for the $\ell_\infty$-threat model, but significantly less so for related tasks such as object detection and semantic segmentation, where attacks turn out to be a much harder optimization problem than for image classification. We propose several problem-specific novel attacks minimizing different metrics in acc… ▽ More

    Submitted 16 July, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: ECCV 2024

  34. arXiv:2306.10898  [pdf, other

    cs.CV

    B-cos Alignment for Inherently Interpretable CNNs and Vision Transformers

    Authors: Moritz Böhle, Navdeeppal Singh, Mario Fritz, Bernt Schiele

    Abstract: We present a new direction for increasing the interpretability of deep neural networks (DNNs) by promoting weight-input alignment during training. For this, we propose to replace the linear transformations in DNNs by our novel B-cos transformation. As we show, a sequence (network) of such transformations induces a single linear transformation that faithfully summarises the full model computations.… ▽ More

    Submitted 15 January, 2024; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: Extension of B-cos Networks: Alignment is All We Need for Interpretability (Böhle et al., CVPR 2022). Accepted for publication in IEEE Transactions on Pattern Analysis and Machine Intelligence. arXiv admin note: substantial text overlap with arXiv:2205.10268

  35. arXiv:2306.08997   

    cs.CL cs.AI cs.LG

    Exploring the MIT Mathematics and EECS Curriculum Using Large Language Models

    Authors: Sarah J. Zhang, Samuel Florin, Ariel N. Lee, Eamon Niknafs, Andrei Marginean, Annie Wang, Keith Tyser, Zad Chin, Yann Hicke, Nikhil Singh, Madeleine Udell, Yoon Kim, Tonio Buonassisi, Armando Solar-Lezama, Iddo Drori

    Abstract: We curate a comprehensive dataset of 4,550 questions and solutions from problem sets, midterm exams, and final exams across all MIT Mathematics and Electrical Engineering and Computer Science (EECS) courses required for obtaining a degree. We evaluate the ability of large language models to fulfill the graduation requirements for any MIT major in Mathematics and EECS. Our results demonstrate that… ▽ More

    Submitted 24 June, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: Did not receive permission to release the data or model fine-tuned on the data

  36. arXiv:2305.17531  [pdf, other

    physics.chem-ph cs.AI cs.LG math.NA

    Probing reaction channels via reinforcement learning

    Authors: Senwei Liang, Aditya N. Singh, Yuanran Zhu, David T. Limmer, Chao Yang

    Abstract: We propose a reinforcement learning based method to identify important configurations that connect reactant and product states along chemical reaction paths. By shooting multiple trajectories from these configurations, we can generate an ensemble of configurations that concentrate on the transition path ensemble. This configuration ensemble can be effectively employed in a neural network-based par… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

  37. arXiv:2305.16440  [pdf, ps, other

    cs.LG stat.ML

    Representation Transfer Learning via Multiple Pre-trained models for Linear Regression

    Authors: Navjot Singh, Suhas Diggavi

    Abstract: In this paper, we consider the problem of learning a linear regression model on a data domain of interest (target) given few samples. To aid learning, we are provided with a set of pre-trained regression models that are trained on potentially different data domains (sources). Assuming a representation structure for the data generating linear models at the sources and the target domains, we propose… ▽ More

    Submitted 24 June, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: 20 pages

  38. A Survey of Security Concerns and Countermeasures in Modern Micro-architectures with Transient Execution

    Authors: Nikhilesh Singh, Vinod Ganesan, Chester Rebeiro

    Abstract: In the last two decades, the evolving cyber-threat landscape has brought to center stage the contentious tradeoffs between the security and performance of modern microprocessors. The guarantees provided by the hardware to ensure no violation of process boundaries have been shown to be breached in several real-world scenarios. While modern CPU features such as superscalar, out-of-order, simultaneou… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  39. arXiv:2304.05949  [pdf, other

    cond-mat.mes-hall cs.AI cs.ET cs.LG

    CMOS + stochastic nanomagnets: heterogeneous computers for probabilistic inference and learning

    Authors: Nihal Sanjay Singh, Keito Kobayashi, Qixuan Cao, Kemal Selcuk, Tianrui Hu, Shaila Niazi, Navid Anjum Aadit, Shun Kanai, Hideo Ohno, Shunsuke Fukami, Kerem Y. Camsari

    Abstract: Extending Moore's law by augmenting complementary-metal-oxide semiconductor (CMOS) transistors with emerging nanotechnologies (X) has become increasingly important. One important class of problems involve sampling-based Monte Carlo algorithms used in probabilistic machine learning, optimization, and quantum simulation. Here, we combine stochastic magnetic tunnel junction (sMTJ)-based probabilistic… ▽ More

    Submitted 23 February, 2024; v1 submitted 12 April, 2023; originally announced April 2023.

    Journal ref: Nature Communications volume 15, Article number: 2685 (2024)

  40. arXiv:2304.05600  [pdf, other

    cs.SD cs.CV cs.LG cs.MM eess.AS

    Looking Similar, Sounding Different: Leveraging Counterfactual Cross-Modal Pairs for Audiovisual Representation Learning

    Authors: Nikhil Singh, Chih-Wei Wu, Iroro Orife, Mahdi Kalayeh

    Abstract: Audiovisual representation learning typically relies on the correspondence between sight and sound. However, there are often multiple audio tracks that can correspond with a visual scene. Consider, for example, different conversations on the same crowded street. The effect of such counterfactual pairs on audiovisual representation learning has not been previously explored. To investigate this, we… ▽ More

    Submitted 8 June, 2024; v1 submitted 12 April, 2023; originally announced April 2023.

    Comments: Accepted to CVPR 2024

  41. arXiv:2303.13965  [pdf, other

    cs.NI

    Generalized Distance Metric for Various DHT Routing Algorithms in Peer-to-Peer Networks

    Authors: Rashmi Kushwaha, Shreyas Kulkarni, Yatindra Nath Singh

    Abstract: We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance r… ▽ More

    Submitted 28 February, 2024; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: 8 pages, 4 figures, 14 Tables

  42. arXiv:2303.01870  [pdf, other

    cs.CV cs.CR cs.LG

    Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threat Models

    Authors: Naman D Singh, Francesco Croce, Matthias Hein

    Abstract: While adversarial training has been extensively studied for ResNet architectures and low resolution datasets like CIFAR, much less is known for ImageNet. Given the recent debate about whether transformers are more robust than convnets, we revisit adversarial training on ImageNet comparing ViTs and ConvNeXts. Extensive experiments show that minor changes in architecture, most notably replacing Patc… ▽ More

    Submitted 28 October, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted at NeurIPS 2023

  43. arXiv:2301.10365  [pdf, other

    eess.IV cs.CV cs.LG

    Data Consistent Deep Rigid MRI Motion Correction

    Authors: Nalini M. Singh, Neel Dey, Malte Hoffmann, Bruce Fischl, Elfar Adalsteinsson, Robert Frost, Adrian V. Dalca, Polina Golland

    Abstract: Motion artifacts are a pervasive problem in MRI, leading to misdiagnosis or mischaracterization in population-level imaging studies. Current retrospective rigid intra-slice motion correction techniques jointly optimize estimates of the image and the motion parameters. In this paper, we use a deep network to reduce the joint image-motion parameter search to a search over rigid motion parameters alo… ▽ More

    Submitted 16 November, 2023; v1 submitted 24 January, 2023; originally announced January 2023.

    Comments: Presented at MIDL 2023. 14 pages, 6 figures. Keywords: motion correction, magnetic resonance imaging, deep learning

  44. arXiv:2301.10035  [pdf

    cs.HC

    Putting ChatGPT's Medical Advice to the (Turing) Test

    Authors: Oded Nov, Nina Singh, Devin Mann

    Abstract: Objective: Assess the feasibility of using ChatGPT or a similar AI-based chatbot for patient-provider communication. Participants: A US representative sample of 430 study participants aged 18 and above. 53.2% of respondents analyzed were women; their average age was 47.1. Exposure: Ten representative non-administrative patient-provider interactions were extracted from the EHR. Patients' questions… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

  45. arXiv:2301.03013  [pdf

    cs.AI

    Semantic rule Web-based Diagnosis and Treatment of Vector-Borne Diseases using SWRL rules

    Authors: Ritesh Chandra, Sadhana Tiwari, Sonali Agarwal, Navjot Singh

    Abstract: Vector-borne diseases (VBDs) are a kind of infection caused through the transmission of vectors generated by the bites of infected parasites, bacteria, and viruses, such as ticks, mosquitoes, triatomine bugs, blackflies, and sandflies. If these diseases are not properly treated within a reasonable time frame, the mortality rate may rise. In this work, we propose a set of ontologies that will help… ▽ More

    Submitted 31 January, 2023; v1 submitted 8 January, 2023; originally announced January 2023.

  46. arXiv:2212.01022  [pdf, ps, other

    cs.AI

    STL-Based Synthesis of Feedback Controllers Using Reinforcement Learning

    Authors: Nikhil Kumar Singh, Indranil Saha

    Abstract: Deep Reinforcement Learning (DRL) has the potential to be used for synthesizing feedback controllers (agents) for various complex systems with unknown dynamics. These systems are expected to satisfy diverse safety and liveness properties best captured using temporal logic. In RL, the reward function plays a crucial role in specifying the desired behaviour of these agents. However, the problem of d… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: Full version of the paper to be published in AAAI 2023

  47. arXiv:2211.07980  [pdf, other

    cs.CL

    A Benchmark and Dataset for Post-OCR text correction in Sanskrit

    Authors: Ayush Maheshwari, Nikhil Singh, Amrith Krishna, Ganesh Ramakrishnan

    Abstract: Sanskrit is a classical language with about 30 million extant manuscripts fit for digitisation, available in written, printed or scannedimage forms. However, it is still considered to be a low-resource language when it comes to available digital resources. In this work, we release a post-OCR text correction dataset containing around 218,000 sentences, with 1.5 million words, from 30 different book… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: Findings of EMNLP, 2022. Code and Data: https://github.com/ayushbits/pe-ocr-sanskrit

  48. arXiv:2211.06153  [pdf, other

    cs.CR

    SUNDEW: An Ensemble of Predictors for Case-Sensitive Detection of Malware

    Authors: Sareena Karapoola, Nikhilesh Singh, Chester Rebeiro, Kamakoti V

    Abstract: Malware programs are diverse, with varying objectives, functionalities, and threat levels ranging from mere pop-ups to financial losses. Consequently, their run-time footprints across the system differ, impacting the optimal data source (Network, Operating system (OS), Hardware) and features that are instrumental to malware detection. Further, the variations in threat levels of malware classes aff… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  49. arXiv:2209.11524  [pdf, other

    cs.RO math.OC

    Control Barrier Functions in UGVs for Kinematic Obstacle Avoidance: A Collision Cone Approach

    Authors: Phani Thontepu, Bhavya Giri Goswami, Manan Tayal, Neelaksh Singh, Shyamsundar P I, Shyam Sundar M G, Suresh Sundaram, Vaibhav Katewa, Shishir Kolathaya

    Abstract: In this paper, we propose a new class of Control Barrier Functions (CBFs) for Unmanned Ground Vehicles (UGVs) that help avoid collisions with kinematic (non-zero velocity) obstacles. While the current forms of CBFs have been successful in guaranteeing safety/collision avoidance with static obstacles, extensions for the dynamic case have seen limited success. Moreover, with the UGV models like the… ▽ More

    Submitted 16 October, 2023; v1 submitted 23 September, 2022; originally announced September 2022.

    Comments: 6 pages, 4 figures, For supplement video follow https://youtu.be/Dme7Wm9y6es. *The first and second authors have contributed equally

    ACM Class: I.2.9; G.1.6; J.2

  50. arXiv:2209.11282  [pdf

    eess.IV cs.CV cs.LG

    Automated detection of Alzheimer disease using MRI images and deep neural networks- A review

    Authors: Narotam Singh, Patteshwari. D, Neha Soni, Amita Kapoor

    Abstract: Early detection of Alzheimer disease is crucial for deploying interventions and slowing the disease progression. A lot of machine learning and deep learning algorithms have been explored in the past decade with the aim of building an automated detection for Alzheimer. Advancements in data augmentation techniques and advanced deep learning architectures have opened up new frontiers in this field, a… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

    Comments: 22 Pages, 5 Figures, 7 Tables