Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–13 of 13 results for author: Bhaskar, R

.
  1. arXiv:2407.13914  [pdf, ps, other

    quant-ph hep-ph nucl-th

    Qutrit and Qubit Circuits for Three-Flavor Collective Neutrino Oscillations

    Authors: Francesco Turro, Ivan A. Chernyshev, Ramya Bhaskar, Marc Illa

    Abstract: We explore the utility of qutrits and qubits for simulating the flavor dynamics of dense neutrino systems. The evolution of such systems impacts some important astrophysical processes, such as core-collapse supernovae and the nucleosynthesis of heavy nuclei. Many-body simulations require classical resources beyond current computing capabilities for physically relevant system sizes. Quantum compute… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: 19 pages, 4 tables, 15 figures

    Report number: IQuS@UW-21-082

  2. arXiv:2402.03214  [pdf, other

    cs.CV cs.AI cs.LG

    Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?

    Authors: Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao

    Abstract: The advent of generative AI images has completely disrupted the art world. Distinguishing AI generated images from human art is a challenging problem whose impact is growing over time. A failure to address this problem allows bad actors to defraud individuals paying a premium for human art and companies whose stated policies forbid AI imagery. It is also critical for content owners to establish co… ▽ More

    Submitted 2 July, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  3. arXiv:2312.16212  [pdf, other

    nucl-th hep-ph

    Time Scales in Many-Body Fast Neutrino Flavor Conversion

    Authors: Ramya Bhaskar, Alessandro Roggero, Martin J. Savage

    Abstract: Time scales associated with many-body fast neutrino flavor conversions in core-collapse supernova are explored in the context of an effective two-flavor model with axial symmetry. We present a preliminary study of time scales obtained from a linear stability analysis and from the distributions of Loschmidt echo crossing times (intimately connected to dynamical phase transitions in non-equilibrium… ▽ More

    Submitted 4 March, 2024; v1 submitted 23 December, 2023; originally announced December 2023.

    Comments: 13 pages, 5 figures; Updated references, and acknowledgments section

    Report number: IQuS@UW-21-069

  4. arXiv:2310.16191  [pdf, other

    cs.CR

    Can Virtual Reality Protect Users from Keystroke Inference Attacks?

    Authors: Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng

    Abstract: Virtual Reality (VR) has gained popularity by providing immersive and interactive experiences without geographical limitations. It also provides a sense of personal privacy through physical separation. In this paper, we show that despite assumptions of enhanced privacy, VR is unable to shield its users from side-channel attacks that steal private information. Ironically, this vulnerability arises… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: Accepted by USENIX 2024

  5. arXiv:2302.03222  [pdf, other

    cs.CL

    Bringing the State-of-the-Art to Customers: A Neural Agent Assistant Framework for Customer Service Support

    Authors: Stephen Obadinma, Faiza Khan Khattak, Shirley Wang, Tania Sidhom, Elaine Lau, Sean Robertson, Jingcheng Niu, Winnie Au, Alif Munim, Karthik Raja K. Bhaskar, Bencheng Wei, Iris Ren, Waqar Muhammad, Erin Li, Bukola Ishola, Michael Wang, Griffin Tanner, Yu-Jia Shiah, Sean X. Zhang, Kwesi P. Apponsah, Kanishk Patel, Jaswinder Narain, Deval Pandya, Xiaodan Zhu, Frank Rudzicz , et al. (1 additional authors not shown)

    Abstract: Building Agent Assistants that can help improve customer service support requires inputs from industry users and their customers, as well as knowledge about state-of-the-art Natural Language Processing (NLP) technology. We combine expertise from academia and industry to bridge the gap and build task/domain-specific Neural Agent Assistants (NAA) with three high-level components for: (1) Intent Iden… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: Camera Ready Version of Paper Published in EMNLP 2022 Industry Track

  6. Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure

    Authors: Dinusha Vatsalan, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: Privacy-preserving estimation of counts of items in streaming data finds applications in several real-world scenarios including word auto-correction and traffic management applications. Recent works of RAPPOR and Apple's count-mean sketch (CMS) algorithm propose privacy preserving mechanisms for count estimation in large volumes of data using probabilistic data structures like counting Bloom filte… ▽ More

    Submitted 30 November, 2022; v1 submitted 10 August, 2022; originally announced August 2022.

    Comments: Version 2 14 pages, Accepted in IEEE Transactions on Data and Knowledge Engineering, 2022

  7. arXiv:2103.07101  [pdf, other

    cs.LG cs.CR

    On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: With an increase in low-cost machine learning APIs, advanced machine learning models may be trained on private datasets and monetized by providing them as a service. However, privacy researchers have demonstrated that these models may leak information about records in the training dataset via membership inference attacks. In this paper, we take a closer look at another inference attack reported in… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 20 pages, accepted at IEEE EuroS&P 2021

  8. arXiv:2009.08950  [pdf, other

    cs.IR cs.LG stat.ML

    Implicit Feedback Deep Collaborative Filtering Product Recommendation System

    Authors: Karthik Raja Kalaiselvi Bhaskar, Deepa Kundur, Yuri Lawryshyn

    Abstract: In this paper, several Collaborative Filtering (CF) approaches with latent variable methods were studied using user-item interactions to capture important hidden variations of the sparse customer purchasing behaviours. The latent factors are used to generalize the purchasing pattern of the customers and to provide product recommendations. CF with Neural Collaborative Filtering(NCF) was shown to pr… ▽ More

    Submitted 11 December, 2020; v1 submitted 8 September, 2020; originally announced September 2020.

    Comments: Under Review

  9. arXiv:1908.10558  [pdf, other

    cs.CR cs.LG

    On Inferring Training Data Attributes in Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: A number of recent works have demonstrated that API access to machine learning models leaks information about the dataset records used to train the models. Further, the work of \cite{somesh-overfit} shows that such membership inference attacks (MIAs) may be sufficient to construct a stronger breed of attribute inference attacks (AIAs), which given a partial view of a record can guess the missing a… ▽ More

    Submitted 12 October, 2019; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: Accepted by PPML'19, a CCS workshop. Submission of 4-pages bar references, and appendix V2: Update in dataset splitting, and comments on related works

  10. arXiv:1707.01456  [pdf, other

    astro-ph.GA astro-ph.IM physics.chem-ph

    On the Energetics of the HCO$^+$ + C $\to$ CH$^+$ + CO Reaction and Some Astrochemical Implications

    Authors: Daniel W. Savin, Roshan G. Bhaskar, Shreyas Vissapragada, Xavier Urbain

    Abstract: We explore the energetics of the titular reaction, which current astrochemical databases consider open at typical dense molecular (i.e., dark) cloud conditions. As is common for reactions involving the transfer of light particles, we assume that there are no intersystem crossings of the potential energy surfaces involved. In the absence of any such crossings, we find that this reaction is endoergi… ▽ More

    Submitted 5 July, 2017; originally announced July 2017.

    Comments: Accepted for publication in ApJ; 14 pages, 2 figures, and 1 table

  11. Identification of High-Momentum Top Quarks, Higgs Bosons, and W and Z Bosons Using Boosted Event Shapes

    Authors: J. S. Conway, R. Bhaskar, R. D. Erbacher, J. Pilot

    Abstract: At the Large Hadron Collider, numerous physics processes expected within the standard model and theories beyond it give rise to very high momentum particles decaying to multihadronic final states. Development of algorithms for efficient identification of such "boosted" particles while rejecting the background from multihadron jets from light quarks and gluons can greatly aid in the sensitivity of… ▽ More

    Submitted 10 October, 2016; v1 submitted 22 June, 2016; originally announced June 2016.

    Journal ref: Phys. Rev. D 94, 094027 (2016)

  12. arXiv:1601.07857  [pdf, other

    astro-ph.CO astro-ph.GA

    Overconfidence in Photometric Redshift Estimation

    Authors: David Wittman, Ramya Bhaskar, Ryan Tobin

    Abstract: We describe a new test of photometric redshift performance given a spectroscopic redshift sample. This test complements the traditional comparison of redshift {\it differences} by testing whether the probability density functions $p(z)$ have the correct {\it width}. We test two photometric redshift codes, BPZ and EAZY, on each of two data sets and find that BPZ is consistently overconfident (the… ▽ More

    Submitted 28 January, 2016; originally announced January 2016.

    Comments: accepted to MNRAS

  13. arXiv:cs/0611027  [pdf, ps, other

    cs.CR

    Efficient and Dynamic Group Key Agreement in Ad hoc Networks

    Authors: Raghav Bhaskar, Paul Mühlethaler, Daniel Augot, Cdric Adjih, Saadi Boudjit, Anis Laouiti

    Abstract: Confidentiality, integrity and authentication are more relevant issues in Ad hoc networks than in wired fixed networks. One way to address these issues is the use of symmetric key cryptography, relying on a secret key shared by all members of the network. But establishing and maintaining such a key (also called the session key) is a non-trivial problem. We show that Group Key Agreement (GKA) pro… ▽ More

    Submitted 6 November, 2006; originally announced November 2006.