Skip to main content

Showing 1–45 of 45 results for author: Kumar, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.01444  [pdf, other

    cs.CY cs.AI

    No Size Fits All: The Perils and Pitfalls of Leveraging LLMs Vary with Company Size

    Authors: Ashok Urlana, Charaka Vinayak Kumar, Bala Mallikarjunarao Garlapati, Ajeet Kumar Singh, Rahul Mishra

    Abstract: Large language models (LLMs) are playing a pivotal role in deploying strategic use cases across a range of organizations, from large pan-continental companies to emerging startups. The issues and challenges involved in the successful utilization of LLMs can vary significantly depending on the size of the organization. It is important to study and discuss these pertinent issues of LLM adaptation wi… ▽ More

    Submitted 21 July, 2024; originally announced August 2024.

    Comments: 17 pages, 3 figures

  2. arXiv:2408.00118  [pdf, other

    cs.CL cs.AI

    Gemma 2: Improving Open Language Models at a Practical Size

    Authors: Gemma Team, Morgane Riviere, Shreya Pathak, Pier Giuseppe Sessa, Cassidy Hardin, Surya Bhupatiraju, Léonard Hussenot, Thomas Mesnard, Bobak Shahriari, Alexandre Ramé, Johan Ferret, Peter Liu, Pouya Tafti, Abe Friesen, Michelle Casbon, Sabela Ramos, Ravin Kumar, Charline Le Lan, Sammy Jerome, Anton Tsitsulin, Nino Vieillard, Piotr Stanczyk, Sertan Girgin, Nikola Momchev, Matt Hoffman , et al. (172 additional authors not shown)

    Abstract: In this work, we introduce Gemma 2, a new addition to the Gemma family of lightweight, state-of-the-art open models, ranging in scale from 2 billion to 27 billion parameters. In this new version, we apply several known technical modifications to the Transformer architecture, such as interleaving local-global attentions (Beltagy et al., 2020a) and group-query attention (Ainslie et al., 2023). We al… ▽ More

    Submitted 2 August, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  3. arXiv:2407.08655  [pdf, other

    eess.IV cs.AI cs.LG physics.med-ph

    SPOCKMIP: Segmentation of Vessels in MRAs with Enhanced Continuity using Maximum Intensity Projection as Loss

    Authors: Chethan Radhakrishna, Karthikesh Varma Chintalapati, Sri Chandana Hudukula Ram Kumar, Raviteja Sutrave, Hendrik Mattern, Oliver Speck, Andreas Nürnberger, Soumick Chatterjee

    Abstract: Identification of vessel structures of different sizes in biomedical images is crucial in the diagnosis of many neurodegenerative diseases. However, the sparsity of good-quality annotations of such images makes the task of vessel segmentation challenging. Deep learning offers an efficient way to segment vessels of different sizes by learning their high-level feature representations and the spatial… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  4. arXiv:2404.07533  [pdf, other

    cs.LG cs.AI cs.ET

    IITP-VDLand: A Comprehensive Dataset on Decentraland Parcels

    Authors: Ankit K. Bhagat, Dipika Jha, Raju Halder, Rajendra N. Paramanik, Chandra M. Kumar

    Abstract: This paper presents IITP-VDLand, a comprehensive dataset of Decentraland parcels sourced from diverse platforms. Unlike existing datasets which have limited attributes and records, IITP-VDLand offers a rich array of attributes, encompassing parcel characteristics, trading history, past activities, transactions, and social media interactions. Alongside, we introduce a key attribute in the dataset,… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  5. arXiv:2403.16592  [pdf, other

    cs.CL

    TrustAI at SemEval-2024 Task 8: A Comprehensive Analysis of Multi-domain Machine Generated Text Detection Techniques

    Authors: Ashok Urlana, Aditya Saibewar, Bala Mallikarjunarao Garlapati, Charaka Vinayak Kumar, Ajeet Kumar Singh, Srinivasa Rao Chalamala

    Abstract: The Large Language Models (LLMs) exhibit remarkable ability to generate fluent content across a wide spectrum of user queries. However, this capability has raised concerns regarding misinformation and personal information leakage. In this paper, we present our methods for the SemEval2024 Task8, aiming to detect machine-generated text across various domains in both mono-lingual and multi-lingual co… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 8 pages, 1 Figure

    ACM Class: I.2.7

  6. arXiv:2403.07231  [pdf, other

    cs.CV

    Learn and Search: An Elegant Technique for Object Lookup using Contrastive Learning

    Authors: Chandan Kumar, Jansel Herrera-Gerena, John Just, Matthew Darr, Ali Jannesari

    Abstract: The rapid proliferation of digital content and the ever-growing need for precise object recognition and segmentation have driven the advancement of cutting-edge techniques in the field of object classification and segmentation. This paper introduces "Learn and Search", a novel approach for object lookup that leverages the power of contrastive learning to enhance the efficiency and effectiveness of… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 9 pages, 4 figures

  7. arXiv:2403.05530  [pdf, other

    cs.CL cs.AI

    Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

    Authors: Gemini Team, Petko Georgiev, Ving Ian Lei, Ryan Burnell, Libin Bai, Anmol Gulati, Garrett Tanzer, Damien Vincent, Zhufeng Pan, Shibo Wang, Soroosh Mariooryad, Yifan Ding, Xinyang Geng, Fred Alcober, Roy Frostig, Mark Omernick, Lexi Walker, Cosmin Paduraru, Christina Sorokin, Andrea Tacchetti, Colin Gaffney, Samira Daruki, Olcan Sercinoglu, Zach Gleicher, Juliette Love , et al. (1110 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 1.5 family of models, representing the next generation of highly compute-efficient multimodal models capable of recalling and reasoning over fine-grained information from millions of tokens of context, including multiple long documents and hours of video and audio. The family includes two new models: (1) an updated Gemini 1.5 Pro, which exceeds the February… ▽ More

    Submitted 8 August, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  8. arXiv:2402.14558  [pdf, other

    cs.CL

    LLMs with Industrial Lens: Deciphering the Challenges and Prospects -- A Survey

    Authors: Ashok Urlana, Charaka Vinayak Kumar, Ajeet Kumar Singh, Bala Mallikarjunarao Garlapati, Srinivasa Rao Chalamala, Rahul Mishra

    Abstract: Large language models (LLMs) have become the secret ingredient driving numerous industrial applications, showcasing their remarkable versatility across a diverse spectrum of tasks. From natural language processing and sentiment analysis to content generation and personalized recommendations, their unparalleled adaptability has facilitated widespread adoption across industries. This transformative… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

    Comments: 25 pages, 7 figures

  9. arXiv:2402.13465  [pdf, other

    cs.CV

    Unsupervised learning based object detection using Contrastive Learning

    Authors: Chandan Kumar, Jansel Herrera-Gerena, John Just, Matthew Darr, Ali Jannesari

    Abstract: Training image-based object detectors presents formidable challenges, as it entails not only the complexities of object detection but also the added intricacies of precisely localizing objects within potentially diverse and noisy environments. However, the collection of imagery itself can often be straightforward; for instance, cameras mounted in vehicles can effortlessly capture vast amounts of d… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: 10 pages, 5 figures

  10. arXiv:2401.00698  [pdf

    cs.CL cs.AI cs.LG

    Large Language Models aren't all that you need

    Authors: Kiran Voderhobli Holla, Chaithanya Kumar, Aryan Singh

    Abstract: This paper describes the architecture and systems built towards solving the SemEval 2023 Task 2: MultiCoNER II (Multilingual Complex Named Entity Recognition) [1]. We evaluate two approaches (a) a traditional Conditional Random Fields model and (b) a Large Language Model (LLM) fine-tuned with a customized head and compare the two approaches. The novel ideas explored are: 1) Decaying auxiliary loss… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

  11. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  12. arXiv:2312.09842  [pdf, ps, other

    cs.SD eess.AS

    On the compression of shallow non-causal ASR models using knowledge distillation and tied-and-reduced decoder for low-latency on-device speech recognition

    Authors: Nagaraj Adiga, Jinhwan Park, Chintigari Shiva Kumar, Shatrughan Singh, Kyungmin Lee, Chanwoo Kim, Dhananjaya Gowda

    Abstract: Recently, the cascaded two-pass architecture has emerged as a strong contender for on-device automatic speech recognition (ASR). A cascade of causal and shallow non-causal encoders coupled with a shared decoder enables operation in both streaming and look-ahead modes. In this paper, we propose shallow cascaded model by combining various model compression techniques such as knowledge distillation,… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  13. arXiv:2311.14499  [pdf, ps, other

    cs.CR

    Comment on "Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud"

    Authors: Chebrolu Deepak Kumar, Lilly Kumari Biswas, Srijanee Mookherji, Gowri Raghavendra Narayan Kurmala, Vanga Odelu

    Abstract: In 2022, Neela and Kavitha proposed an improved RSA encryption algorithm (IREA) for cloud environment. In this paper, we review and comment on the correctness of the IREA technique. We prove that the private key generation in the proposed IREA is mathematical incorrect. That is, decryption of the cipher generated by the public key is not possible with the private key. Further, we discuss the possi… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  14. arXiv:2203.12818  [pdf, ps, other

    cs.CV cs.AI

    Random Forest Regression for continuous affect using Facial Action Units

    Authors: Saurabh Hinduja, Shaun Canavan, Liza Jivnani, Sk Rahatul Jannat, V Sri Chakra Kumar

    Abstract: In this paper we describe our approach to the arousal and valence track of the 3rd Workshop and Competition on Affective Behavior Analysis in-the-wild (ABAW). We extracted facial features using OpenFace and used them to train a multiple output random forest regressor. Our approach performed comparable to the baseline approach.

    Submitted 29 March, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

  15. arXiv:2202.13541  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Pattern Based Multivariable Regression using Deep Learning (PBMR-DP)

    Authors: Jiztom Kavalakkatt Francis, Chandan Kumar, Jansel Herrera-Gerena, Kundan Kumar, Matthew J Darr

    Abstract: We propose a deep learning methodology for multivariate regression that is based on pattern recognition that triggers fast learning over sensor data. We used a conversion of sensors-to-image which enables us to take advantage of Computer Vision architectures and training processes. In addition to this data preparation methodology, we explore the use of state-of-the-art architectures to generate re… ▽ More

    Submitted 9 March, 2022; v1 submitted 27 February, 2022; originally announced February 2022.

    Comments: 7 pages, 5 figures, 3 tables

  16. arXiv:2110.11795  [pdf, other

    eess.IV cs.CV

    HDRVideo-GAN: Deep Generative HDR Video Reconstruction

    Authors: Mrinal Anand, Nidhin Harilal, Chandan Kumar, Shanmuganathan Raman

    Abstract: High dynamic range (HDR) videos provide a more visually realistic experience than the standard low dynamic range (LDR) videos. Despite having significant progress in HDR imaging, it is still a challenging task to capture high-quality HDR video with a conventional off-the-shelf camera. Existing approaches rely entirely on using dense optical flow between the neighboring LDR sequences to reconstruct… ▽ More

    Submitted 3 November, 2021; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: In Proceedings of 12th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP-21)

  17. arXiv:2107.07284  [pdf, ps, other

    cs.IR

    Auto-detecting groups based on textual similarity for group recommendations

    Authors: Chintoo Kumar, C. Ravindranath Chowdary

    Abstract: In general, recommender systems are designed to provide personalized items to a user. But in few cases, items are recommended for a group, and the challenge is to aggregate the individual user preferences to infer the recommendation to a group. It is also important to consider the similarity of characteristics among the members of a group to generate a better recommendation. Members of an automati… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  18. arXiv:2103.07969  [pdf, other

    cs.CV cs.AI cs.LG

    Monte Carlo Scene Search for 3D Scene Understanding

    Authors: Shreyas Hampali, Sinisa Stekovic, Sayan Deb Sarkar, Chetan Srinivasa Kumar, Friedrich Fraundorfer, Vincent Lepetit

    Abstract: We explore how a general AI algorithm can be used for 3D scene understanding to reduce the need for training data. More exactly, we propose a modification of the Monte Carlo Tree Search (MCTS) algorithm to retrieve objects and room layouts from noisy RGB-D scans. While MCTS was developed as a game-playing algorithm, we show it can also be used for complex perception problems. Our adapted MCTS algo… ▽ More

    Submitted 5 May, 2021; v1 submitted 14 March, 2021; originally announced March 2021.

    Comments: To be presented at CVPR 2021

  19. arXiv:2101.06770  [pdf, other

    cs.CV

    Improving Apparel Detection with Category Grouping and Multi-grained Branches

    Authors: Qing Tian, Sampath Chanda, K C Amit Kumar, Douglas Gray

    Abstract: Training an accurate object detector is expensive and time-consuming. One main reason lies in the laborious labeling process, i.e., annotating category and bounding box information for all instances in every image. In this paper, we examine ways to improve performance of deep object detectors without extra labeling. We first explore to group existing categories of high visual and semantic similari… ▽ More

    Submitted 17 January, 2021; originally announced January 2021.

  20. arXiv:2012.07885  [pdf, other

    cs.LG cs.AI

    Bayesian Optimization -- Multi-Armed Bandit Problem

    Authors: Abhilash Nandy, Chandan Kumar, Deepak Mewada, Soumya Sharma

    Abstract: In this report, we survey Bayesian Optimization methods focussed on the Multi-Armed Bandit Problem. We take the help of the paper "Portfolio Allocation for Bayesian Optimization". We report a small literature survey on the acquisition functions and the types of portfolio strategies used in papers discussing Bayesian Optimization. We also replicate the experiments and report our findings and compar… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

    Comments: 10 pages

  21. arXiv:2012.04402  [pdf, other

    math.OC cs.DC

    A Primal-Dual Framework for Decentralized Stochastic Optimization

    Authors: Ketan Rajawat, Chirag Kumar

    Abstract: We consider the decentralized convex optimization problem, where multiple agents must cooperatively minimize a cumulative objective function, with each local function expressible as an empirical average of data-dependent losses. State-of-the-art approaches for decentralized optimization rely on gradient tracking, where consensus is enforced via a doubly stochastic mixing matrix. Construction of su… ▽ More

    Submitted 13 December, 2020; v1 submitted 8 December, 2020; originally announced December 2020.

    Comments: 31 pages, 6 Figures

  22. arXiv:2003.11939  [pdf, ps, other

    stat.ML cs.LG

    Advances in Bayesian Probabilistic Modeling for Industrial Applications

    Authors: Sayan Ghosh, Piyush Pandita, Steven Atkinson, Waad Subber, Yiming Zhang, Natarajan Chennimalai Kumar, Suryarghya Chakrabarti, Liping Wang

    Abstract: Industrial applications frequently pose a notorious challenge for state-of-the-art methods in the contexts of optimization, designing experiments and modeling unknown physical response. This problem is aggravated by limited availability of clean data, uncertainty in available physics-based models and additional logistic and computational expense associated with experiments. In such a scenario, Bay… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  23. arXiv:2002.00336  [pdf, other

    cs.CV cs.LG cs.RO eess.IV

    3D Object Detection on Point Clouds using Local Ground-aware and Adaptive Representation of scenes' surface

    Authors: Arun CS Kumar, Disha Ahuja, Ashwath Aithal

    Abstract: A novel, adaptive ground-aware, and cost-effective 3D Object Detection pipeline is proposed. The ground surface representation introduced in this paper, in comparison to its uni-planar counterparts (methods that model the surface of a whole 3D scene using single plane), is far more accurate while being ~10x faster. The novelty of the ground representation lies both in the way in which the ground s… ▽ More

    Submitted 26 June, 2020; v1 submitted 2 February, 2020; originally announced February 2020.

  24. arXiv:2001.03717  [pdf, ps, other

    cs.DC

    Verifiable and Auditable Digital Interchange Framework

    Authors: Prabal Banerjee, Dushyant Behl, Palanivel Kodeswaran, Chaitanya Kumar, Sushmita Ruj, Sayandeep Sen

    Abstract: We address the problem of fairness and transparency in online marketplaces selling digital content, where all parties are not actively participating in the trade. We present the design, implementation and evaluation of VADER, a highly scalable solution for multi-party fair digital exchange that combines the trusted execution of blockchains with intelligent protocol design and incentivization schem… ▽ More

    Submitted 27 January, 2020; v1 submitted 11 January, 2020; originally announced January 2020.

    Comments: 18 pages, 10 figures

  25. Self learning robot using real-time neural networks

    Authors: Chirag Gupta, Chikita Nangia, Chetan Kumar

    Abstract: With the advancements in high volume, low precision computational technology and applied research on cognitive artificially intelligent heuristic systems, machine learning solutions through neural networks with real-time learning has seen an immense interest in the research community as well the industry. This paper involves research, development and experimental analysis of a neural network imple… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: 8 pages, 14 figures

    ACM Class: I.2.9; I.2.6

    Journal ref: International Journal of Research in Engineering and Technology. Vol 07 Issue 10 (2018)

  26. arXiv:1909.10488  [pdf, other

    cs.RO

    Learning a Control Policy for Fall Prevention on an Assistive Walking Device

    Authors: Visak C V Kumar, Sehoon Ha, Gergory Sawicki, C. Karen Liu

    Abstract: Fall prevention is one of the most important components in senior care. We present a technique to augment an assistive walking device with the ability to prevent falls. Given an existing walking device, our method develops a fall predictor and a recovery policy by utilizing the onboard sensors and actuators. The key component of our method is a robust human walking policy that models realistic hum… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

  27. arXiv:1907.05102  [pdf, other

    cs.NI

    Block Prefix Mechanism for Flow Mobility in PMIPv6 Based Networks

    Authors: K. Vasu, S. Mahapatra, C. S. Kumar

    Abstract: The next generation Internet is deemed to be heterogeneous in nature and mobile devices connected to the Internet are expected to be equipped with different wireless network interfaces. As seamless mobility is important in such networks, handover between different network types, called vertical handover, is an important issue in such networks. While proposing standards like Mobile IPv6 (MIPv6) and… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  28. arXiv:1906.00786  [pdf, other

    cs.CV

    Efficient Object Detection Model for Real-Time UAV Applications

    Authors: Subrahmanyam Vaddi, Chandan Kumar, Ali Jannesari

    Abstract: Unmanned Aerial Vehicles (UAVs) especially drones, equipped with vision techniques have become very popular in recent years, with their extensive use in wide range of applications. Many of these applications require use of computer vision techniques, particularly object detection from the information captured by on-board camera. In this paper, we propose an end to end object detection model runnin… ▽ More

    Submitted 30 May, 2019; originally announced June 2019.

    Comments: 10 pages, 4 figures, Under Review. arXiv admin note: substantial text overlap with arXiv:1808.07256 by other authors without attribution; substantial text overlap with arXiv:1807.06789, arXiv:1612.03144, arXiv:1809.03193 by other authors

  29. arXiv:1903.01390  [pdf, other

    cs.RO cs.LG

    Sim-to-Real Transfer for Biped Locomotion

    Authors: Wenhao Yu, Visak CV Kumar, Greg Turk, C. Karen Liu

    Abstract: We present a new approach for transfer of dynamic robot control policies such as biped locomotion from simulation to real hardware. Key to our approach is to perform system identification of the model parameters μ of the hardware (e.g. friction, center-of-mass) in two distinct stages, before policy learning (pre-sysID) and after policy learning (post-sysID). Pre-sysID begins by collecting trajecto… ▽ More

    Submitted 25 August, 2019; v1 submitted 4 March, 2019; originally announced March 2019.

    Comments: International Conference on Intelligent Robots and Systems (IROS), 2019

  30. arXiv:1811.09889  [pdf, other

    cs.CV

    Matching Disparate Image Pairs Using Shape-Aware ConvNets

    Authors: Shefali Srivastava, Abhimanyu Chopra, Arun CS Kumar, Suchendra M. Bhandarkar, Deepak Sharma

    Abstract: An end-to-end trainable ConvNet architecture, that learns to harness the power of shape representation for matching disparate image pairs, is proposed. Disparate image pairs are deemed those that exhibit strong affine variations in scale, viewpoint and projection parameters accompanied by the presence of partial or complete occlusion of objects and extreme variations in ambient illumination. Under… ▽ More

    Submitted 24 November, 2018; originally announced November 2018.

    Comments: First two authors contributed equally, to Appear in the IEEE Winter Conference on Applications of Computer Vision (WACV) 2019

  31. arXiv:1809.04642  [pdf, other

    cs.CV

    Deep Spectral Correspondence for Matching Disparate Image Pairs

    Authors: Arun CS Kumar, Shefali Srivastava, Anirban Mukhopadhyay, Suchendra M. Bhandarkar

    Abstract: A novel, non-learning-based, saliency-aware, shape-cognizant correspondence determination technique is proposed for matching image pairs that are significantly disparate in nature. Images in the real world often exhibit high degrees of variation in scale, orientation, viewpoint, illumination and affine projection parameters, and are often accompanied by the presence of textureless regions and comp… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

    Comments: 43 pages, under submission to Computer Vision and Image Understanding Journal

  32. Lightweight Cryptography for Distributed PKI Based MANETS

    Authors: N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah

    Abstract: Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this pa… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.2, March 2018

  33. arXiv:1709.07932  [pdf, other

    cs.RO

    Expanding Motor Skills through Relay Neural Networks

    Authors: Visak C. V. Kumar, Sehoon Ha, C. Karen Liu

    Abstract: While the recent advances in deep reinforcement learning have achieved impressive results in learning motor skills, many of the trained policies are only capable within a limited set of initial states. We propose a technique to break down a complex robotic task to simpler subtasks and train them sequentially such that the robot can expand its existing skill set gradually. Our key idea is to build… ▽ More

    Submitted 15 November, 2018; v1 submitted 22 September, 2017; originally announced September 2017.

  34. Node Authentication Using BLS Signature in Distributed PKI Based MANETS

    Authors: N Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah, Y. V. Subba Rao

    Abstract: Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity-based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adapt it to MANET, the job of the CA must be di… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA) Vol.9, No.4, July 2017

  35. arXiv:1707.08539  [pdf

    cs.NI

    Measurement and Analysis of UDP Traffic over Wi-Fi and GPRS

    Authors: Sumit Maheshwari, K. Vasu, Sudipta Mahapatra, C. S. Kumar

    Abstract: With the increasing usage of mobile devices to ubiquitously access heterogeneous applications in wireless Internet, the measurement and analysis of Internet traffic has become a key research area. In this paper, we present the results of our measurements for VBR traffic over UDP in 802.11g and GPRS networks. We focus on Inter-Packet Arrival Time (IPRT) and Inter-Packet Transmission Delay (IPTD) an… ▽ More

    Submitted 26 July, 2017; originally announced July 2017.

    Comments: 5 Pages, ICCCD conference, IIT Kharagpur

  36. Analyzing the Impact of Cognitive Load in Evaluating Gaze-based Typing

    Authors: Korok Sengupta, Jun Sun, Raphael Menges, Chandan Kumar, Steffen Staab

    Abstract: Gaze-based virtual keyboards provide an effective interface for text entry by eye movements. The efficiency and usability of these keyboards have traditionally been evaluated with conventional text entry performance measures such as words per minute, keystrokes per character, backspace usage, etc. However, in comparison to the traditional text entry approaches, gaze-based typing involves natural e… ▽ More

    Submitted 10 June, 2017; v1 submitted 8 June, 2017; originally announced June 2017.

    Comments: 6 pages, 4 figures, IEEE CBMS 2017

  37. arXiv:1704.05712  [pdf, other

    stat.ML cs.AI cs.CV cs.LG cs.NE

    Universal Adversarial Perturbations Against Semantic Image Segmentation

    Authors: Jan Hendrik Metzen, Mummadi Chaithanya Kumar, Thomas Brox, Volker Fischer

    Abstract: While deep learning is remarkably successful on perceptual tasks, it was also shown to be vulnerable to adversarial perturbations of the input. These perturbations denote noise added to the input that was generated specifically to fool the system while being quasi-imperceptible for humans. More severely, there even exist universal perturbations that are input-agnostic but fool the network on the m… ▽ More

    Submitted 31 July, 2017; v1 submitted 19 April, 2017; originally announced April 2017.

    Comments: Final version for ICCV including supplementary material

  38. arXiv:1703.02905  [pdf, other

    cs.RO cs.AI cs.LG

    Learning a Unified Control Policy for Safe Falling

    Authors: Visak CV Kumar, Sehoon Ha, C Karen Liu

    Abstract: Being able to fall safely is a necessary motor skill for humanoids performing highly dynamic tasks, such as running and jumping. We propose a new method to learn a policy that minimizes the maximal impulse during the fall. The optimization solves for both a discrete contact planning problem and a continuous optimal control problem. Once trained, the policy can compute the optimal next contacting b… ▽ More

    Submitted 20 April, 2017; v1 submitted 8 March, 2017; originally announced March 2017.

  39. arXiv:1703.01101  [pdf, other

    stat.ML cs.CR cs.CV cs.LG cs.NE

    Adversarial Examples for Semantic Image Segmentation

    Authors: Volker Fischer, Mummadi Chaithanya Kumar, Jan Hendrik Metzen, Thomas Brox

    Abstract: Machine learning methods in general and Deep Neural Networks in particular have shown to be vulnerable to adversarial perturbations. So far this phenomenon has mainly been studied in the context of whole-image classification. In this contribution, we analyse how adversarial perturbations can affect the task of semantic segmentation. We show how existing adversarial attackers can be transferred to… ▽ More

    Submitted 3 March, 2017; originally announced March 2017.

    Comments: ICLR 2017 workshop submission

  40. arXiv:1606.01393  [pdf, other

    cs.CV

    Automated Image Captioning for Rapid Prototyping and Resource Constrained Environments

    Authors: Karan Sharma, Arun CS Kumar, Suchendra Bhandarkar

    Abstract: Significant performance gains in deep learning coupled with the exponential growth of image and video data on the Internet have resulted in the recent emergence of automated image captioning systems. Ensuring scalability of automated image captioning systems with respect to the ever increasing volume of image and video data is a significant challenge. This paper provides a valuable insight in that… ▽ More

    Submitted 4 June, 2016; originally announced June 2016.

  41. arXiv:1407.3660  [pdf

    cs.CR

    Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

    Authors: Charan Kumar, Dinesh Kumar, Arun Kumar Reddy

    Abstract: As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decry pt data based on user attributes. A promising… ▽ More

    Submitted 4 July, 2014; originally announced July 2014.

  42. arXiv:1401.7733  [pdf

    cs.DB

    Security Implications of Distributed Database Management System Models

    Authors: C. Sunil Kumar, J. Seetha, S. R. Vinotha

    Abstract: Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance. While determining which distributed database replica will be more secure for a particular fun… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

  43. arXiv:1401.2393  [pdf

    cs.DS

    Approximation Algorithm Project

    Authors: Chiranjeev Kumar

    Abstract: This application for learning APPROXIMATION ALGORITHM has been designed in Java which will make user comfortable in learning the very complex subject "NP-Completeness" and the solution to NP-Complete problem using approximation algorithm.

    Submitted 10 January, 2014; originally announced January 2014.

    Comments: Tiny project. arXiv admin note: text overlap with arXiv:1203.3097 by other authors

  44. arXiv:1102.5688  [pdf

    cs.CV

    A novel super resolution reconstruction of low reoslution images progressively using dct and zonal filter based denoising

    Authors: Liyakathunisa, C. N . Ravi Kumar

    Abstract: Due to the factors like processing power limitations and channel capabilities images are often down sampled and transmitted at low bit rates resulting in a low resolution compressed image. High resolution images can be reconstructed from several blurred, noisy and down sampled low resolution images using a computational process know as super resolution reconstruction. Super-resolution is the proce… ▽ More

    Submitted 28 February, 2011; originally announced February 2011.

    Comments: 20 pages, 11 figures

  45. arXiv:1002.1953  [pdf

    cs.AR cs.PF

    Ahb Compatible DDR Sdram Controller Ip Core for Arm Based Soc

    Authors: Dr. R. Shashikumar, C. N. Vijay Kumar, M. Nagendrakumar, C. S. Hemanthkumar

    Abstract: DDR SDRAM is similar in function to the regular SDRAM but doubles the bandwidth of the memory by transferring data on both edges of the clock cycles. DDR SDRAM most commonly used in various embedded application like networking, image or video processing, Laptops ete. Now a days many applications needs more and more cheap and fast memory. Especially in the field of signal processing, requires sig… ▽ More

    Submitted 9 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 77-85, January 2010, USA