Skip to main content

Showing 1–20 of 20 results for author: Vishwakarma, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14712  [pdf, ps, other

    quant-ph cs.AI

    Qiskit HumanEval: An Evaluation Benchmark For Quantum Code Generative Models

    Authors: Sanjay Vishwakarma, Francis Harkins, Siddharth Golecha, Vishal Sharathchandra Bajpe, Nicolas Dupuis, Luca Buratti, David Kremer, Ismael Faro, Ruchir Puri, Juan Cruz-Benito

    Abstract: Quantum programs are typically developed using quantum Software Development Kits (SDKs). The rapid advancement of quantum computing necessitates new tools to streamline this development process, and one such tool could be Generative Artificial intelligence (GenAI). In this study, we introduce and use the Qiskit HumanEval dataset, a hand-curated collection of tasks designed to benchmark the ability… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2406.11851  [pdf

    cs.CY cs.HC

    GUARD-D-LLM: An LLM-Based Risk Assessment Engine for the Downstream uses of LLMs

    Authors: sundaraparipurnan Narayanan, Sandeep Vishwakarma

    Abstract: Amidst escalating concerns about the detriments inflicted by AI systems, risk management assumes paramount importance, notably for high-risk applications as demanded by the European Union AI Act. Guidelines provided by ISO and NIST aim to govern AI risk management; however, practical implementations remain scarce in scholarly works. Addressing this void, our research explores risks emanating from… ▽ More

    Submitted 2 April, 2024; originally announced June 2024.

  3. arXiv:2405.19495  [pdf, ps, other

    quant-ph cs.AI

    Qiskit Code Assistant: Training LLMs for generating Quantum Computing Code

    Authors: Nicolas Dupuis, Luca Buratti, Sanjay Vishwakarma, Aitana Viudes Forrat, David Kremer, Ismael Faro, Ruchir Puri, Juan Cruz-Benito

    Abstract: Code Large Language Models (Code LLMs) have emerged as powerful tools, revolutionizing the software development landscape by automating the coding process and reducing time and effort required to build applications. This paper focuses on training Code LLMs to specialize in the field of quantum computing. We begin by discussing the unique needs of quantum computing programming, which differ signifi… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  4. arXiv:2404.10483  [pdf, other

    cs.LG

    Would You Trust an AI Doctor? Building Reliable Medical Predictions with Kernel Dropout Uncertainty

    Authors: Ubaid Azam, Imran Razzak, Shelly Vishwakarma, Hakim Hacid, Dell Zhang, Shoaib Jameel

    Abstract: The growing capabilities of AI raise questions about their trustworthiness in healthcare, particularly due to opaque decision-making and limited data availability. This paper proposes a novel approach to address these challenges, introducing a Bayesian Monte Carlo Dropout model with kernel modelling. Our model is designed to enhance reliability on small medical datasets, a crucial barrier to the w… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  5. arXiv:2404.10481  [pdf, other

    cs.LG

    BayesJudge: Bayesian Kernel Language Modelling with Confidence Uncertainty in Legal Judgment Prediction

    Authors: Ubaid Azam, Imran Razzak, Shelly Vishwakarma, Hakim Hacid, Dell Zhang, Shoaib Jameel

    Abstract: Predicting legal judgments with reliable confidence is paramount for responsible legal AI applications. While transformer-based deep neural networks (DNNs) like BERT have demonstrated promise in legal tasks, accurately assessing their prediction confidence remains crucial. We present a novel Bayesian approach called BayesJudge that harnesses the synergy between deep learning and deep Gaussian Proc… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  6. arXiv:2307.01155  [pdf, other

    cs.CR q-fin.CP quant-ph

    From Portfolio Optimization to Quantum Blockchain and Security: A Systematic Review of Quantum Computing in Finance

    Authors: Abha Naik, Esra Yeniaras, Gerhard Hellstern, Grishma Prasad, Sanjay Kumar Lalta Prasad Vishwakarma

    Abstract: In this paper, we provide an overview of the recent work in the quantum finance realm from various perspectives. The applications in consideration are Portfolio Optimization, Fraud Detection, and Monte Carlo methods for derivative pricing and risk calculation. Furthermore, we give a comprehensive overview of the applications of quantum computing in the field of blockchain technology which is a mai… ▽ More

    Submitted 12 June, 2023; originally announced July 2023.

    Comments: 64 pages. arXiv admin note: text overlap with arXiv:2211.13191 by other authors

  7. arXiv:2306.02264  [pdf, other

    cs.ET quant-ph

    Quantum Circuit Optimization of Arithmetic circuits using ZX Calculus

    Authors: Aravind Joshi, Akshara Kairali, Renju Raju, Adithya Athreya, Reena Monica P, Sanjay Vishwakarma, Srinjoy Ganguly

    Abstract: Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum co… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

  8. arXiv:2304.14537  [pdf, other

    cs.LG cs.AI

    Optimal partition of feature using Bayesian classifier

    Authors: Sanjay Vishwakarma, Srinjoy Ganguly

    Abstract: The Naive Bayesian classifier is a popular classification method employing the Bayesian paradigm. The concept of having conditional dependence among input variables sounds good in theory but can lead to a majority vote style behaviour. Achieving conditional independence is often difficult, and they introduce decision biases in the estimates. In Naive Bayes, certain features are called independent… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: 7 pages, 13 figures

  9. arXiv:2302.09295  [pdf, other

    cs.CY cs.LG

    Mimetic Muscle Rehabilitation Analysis Using Clustering of Low Dimensional 3D Kinect Data

    Authors: Sumit Kumar Vishwakarma, Sanjeev Kumar, Shrey Aggarwal, Jan Mareš

    Abstract: Facial nerve paresis is a severe complication that arises post-head and neck surgery; This results in articulation problems, facial asymmetry, and severe problems in non-verbal communication. To overcome the side effects of post-surgery facial paralysis, rehabilitation requires which last for several weeks. This paper discusses an unsupervised approach to rehabilitating patients who have temporary… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

  10. arXiv:2207.05025  [pdf, other

    cs.CV cs.AI cs.DB cs.GR cs.LG

    PSP-HDRI$+$: A Synthetic Dataset Generator for Pre-Training of Human-Centric Computer Vision Models

    Authors: Salehe Erfanian Ebadi, Saurav Dhakad, Sanjay Vishwakarma, Chunpu Wang, You-Cyuan Jhang, Maciek Chociej, Adam Crespi, Alex Thaman, Sujoy Ganguly

    Abstract: We introduce a new synthetic data generator PSP-HDRI$+$ that proves to be a superior pre-training alternative to ImageNet and other large-scale synthetic data counterparts. We demonstrate that pre-training with our synthetic data will yield a more general model that performs better than alternatives even when tested on out-of-distribution (OOD) sets. Furthermore, using ablation studies guided by p… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: PSP-HDRI$+$ template Unity environment, benchmark binaries, and source code will be made available at: https://github.com/Unity-Technologies/PeopleSansPeople

  11. arXiv:2201.04212  [pdf, other

    cs.CV eess.SP

    MDPose: Human Skeletal Motion Reconstruction Using WiFi Micro-Doppler Signatures

    Authors: Chong Tang, Wenda Li, Shelly Vishwakarma, Fangzhan Shi, Simon Julier, Kevin Chetty

    Abstract: Motion tracking systems based on optical sensors typically often suffer from issues, such as poor lighting conditions, occlusion, limited coverage, and may raise privacy concerns. More recently, radio frequency (RF)-based approaches using commercial WiFi devices have emerged which offer low-cost ubiquitous sensing whilst preserving privacy. However, the output of an RF sensing system, such as Rang… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

  12. FMNet: Latent Feature-wise Mapping Network for Cleaning up Noisy Micro-Doppler Spectrogram

    Authors: Chong Tang, Wenda Li, Shelly Vishwakarma, Fangzhan Shi, Simon Julier, Kevin Chetty

    Abstract: Micro-Doppler signatures contain considerable information about target dynamics. However, the radar sensing systems are easily affected by noisy surroundings, resulting in uninterpretable motion patterns on the micro-Doppler spectrogram. Meanwhile, radar returns often suffer from multipath, clutter and interference. These issues lead to difficulty in, for example motion feature extraction, activit… ▽ More

    Submitted 9 July, 2021; originally announced July 2021.

  13. arXiv:2009.07740  [pdf, other

    cs.CL cs.LG cs.PL cs.SE

    Automated Source Code Generation and Auto-completion Using Deep Learning: Comparing and Discussing Current Language-Model-Related Approaches

    Authors: Juan Cruz-Benito, Sanjay Vishwakarma, Francisco Martin-Fernandez, Ismael Faro

    Abstract: In recent years, the use of deep learning in language models gained much attention. Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machin… ▽ More

    Submitted 12 January, 2021; v1 submitted 16 September, 2020; originally announced September 2020.

    ACM Class: I.2.7; D.3.0

  14. arXiv:1602.00225  [pdf, ps, other

    cs.IT

    Transmitter Optimization in Slow Fading MISO Wiretap Channel

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider the transmitter optimization problem in slow fading multiple-input-single-output (MISO) wiretap channel. The source transmits a secret message intended for $K$ users in the presence of $J$ non-colluding eavesdroppers, and operates under a total power constraint. The channels between the source and all users and eavesdroppers are assumed to be slow fading, and only statis… ▽ More

    Submitted 31 January, 2016; originally announced February 2016.

  15. arXiv:1505.00573  [pdf, ps, other

    cs.IT

    MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finite-alphabet input in the presence of an user and $J$ non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code… ▽ More

    Submitted 4 May, 2015; originally announced May 2015.

  16. arXiv:1503.07455  [pdf, ps, other

    cs.IT

    Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider the achievable sum secrecy rate in MISO (multiple-input-single-output) {\em full-duplex} wiretap channel in the presence of a passive eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication have multiple transmit antennas, and that the users and the eavesdropper have single receive antenna each. The… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1311.3918

  17. arXiv:1401.8206  [pdf, ps, other

    cs.IT

    Decode-and-Forward Relay Beamforming with Secret and Non-Secret Messages

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we study beamforming in decode-and-forward (DF) relaying using multiple relays, where the source node sends a secret message as well as a non-secret message to the destination node in the presence of multiple non-colluding eavesdroppers. The non-secret message is transmitted at a fixed rate $R_{0}$ and requires no protection from the eavesdroppers, whereas the secret message needs t… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.

  18. arXiv:1401.6499  [pdf, ps, other

    cs.IT

    Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider transmitter optimization in multiple-input single-output (MISO) broadcast channel with common and secret messages. The secret message is intended for $K$ users and it is transmitted with perfect secrecy with respect to $J$ eavesdroppers which are also assumed to be legitimate users in the network. The common message is transmitted at a fixed rate $R_{0}$ and it is intend… ▽ More

    Submitted 25 January, 2014; originally announced January 2014.

  19. arXiv:1401.3617  [pdf, ps, other

    cs.IT

    Power Allocation in MIMO Wiretap Channel with Statistical CSI and Finite-Alphabet Input

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider the problem of power allocation in MIMO wiretap channel for secrecy in the presence of multiple eavesdroppers. Perfect knowledge of the destination channel state information (CSI) and only the statistical knowledge of the eavesdroppers CSI are assumed. We first consider the MIMO wiretap channel with Gaussian input. Using Jensen's inequality, we transform the secrecy rate… ▽ More

    Submitted 15 January, 2014; originally announced January 2014.

  20. arXiv:1311.3918  [pdf, ps, other

    cs.IT

    Sum Secrecy Rate in Full-Duplex Wiretap Channel with Imperfect CSI

    Authors: Sanjay Vishwakarma, A. Chockalingam

    Abstract: In this paper, we consider the achievable sum secrecy rate in full-duplex wiretap channel in the presence of an eavesdropper and imperfect channel state information (CSI). We assume that the users participating in full-duplex communication and the eavesdropper have single antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrecy r… ▽ More

    Submitted 16 January, 2014; v1 submitted 15 November, 2013; originally announced November 2013.