Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–29 of 29 results for author: Dutta, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12764  [pdf, other

    stat.ML cs.LG

    Quasi-Bayes meets Vines

    Authors: David Huk, Yuanhe Zhang, Mark Steel, Ritabrata Dutta

    Abstract: Recently proposed quasi-Bayesian (QB) methods initiated a new era in Bayesian computation by directly constructing the Bayesian predictive distribution through recursion, removing the need for expensive computations involved in sampling the Bayesian posterior distribution. This has proved to be data-efficient for univariate predictions, but extensions to multiple dimensions rely on a conditional d… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 36 pages, 2 figures

    MSC Class: 62G07

  2. arXiv:2404.04513  [pdf, other

    cs.CL cs.AI cs.LG

    IITK at SemEval-2024 Task 1: Contrastive Learning and Autoencoders for Semantic Textual Relatedness in Multilingual Texts

    Authors: Udvas Basak, Rajarshi Dutta, Shivam Pandey, Ashutosh Modi

    Abstract: This paper describes our system developed for the SemEval-2024 Task 1: Semantic Textual Relatedness. The challenge is focused on automatically detecting the degree of relatedness between pairs of sentences for 14 languages including both high and low-resource Asian and African languages. Our team participated in two subtasks consisting of Track A: supervised and Track B: unsupervised. This paper f… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Accepted at SemEval 2024, NAACL 2024; 6 pages

  3. arXiv:2404.00954  [pdf, other

    eess.SP cs.NI

    Digital Twins for Supporting AI Research with Autonomous Vehicle Networks

    Authors: Anıl Gürses, Gautham Reddy, Saad Masrur, Özgür Özdemir, İsmail Güvenç, Mihail L. Sichitiu, Alphan Şahin, Ahmed Alkhateeb, Rudra Dutta

    Abstract: Digital twins (DTs), which are virtual environments that simulate, predict, and optimize the performance of their physical counterparts, are envisioned to be essential technologies for advancing next-generation wireless networks. While DTs have been studied extensively for wireless networks, their use in conjunction with autonomous vehicles with programmable mobility remains relatively under-explo… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 7 pages, 6 figures, Submitted to IEEE Communications Magazine

  4. arXiv:2402.11604  [pdf, other

    cs.LG

    Self-evolving Autoencoder Embedded Q-Network

    Authors: J. Senthilnath, Bangjian Zhou, Zhen Wei Ng, Deeksha Aggarwal, Rajdeep Dutta, Ji Wei Yoon, Aye Phyu Phyu Aung, Keyu Wu, Min Wu, Xiaoli Li

    Abstract: In the realm of sequential decision-making tasks, the exploration capability of a reinforcement learning (RL) agent is paramount for achieving high rewards through interactions with the environment. To enhance this crucial ability, we propose SAQN, a novel approach wherein a self-evolving autoencoder (SA) is embedded with a Q-Network (QN). In SAQN, the self-evolving autoencoder architecture adapts… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 11 pages, 9 figures, 3 tables

  5. arXiv:2402.01728  [pdf, other

    cs.CL cs.AI cs.AR

    Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge

    Authors: Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo

    Abstract: In the rapidly evolving semiconductor industry, where research, design, verification, and manufacturing are intricately linked, the potential of Large Language Models to revolutionize hardware design and security verification is immense. The primary challenge, however, lies in the complexity of hardware specific issues that are not adequately addressed by the natural language or software code know… ▽ More

    Submitted 27 January, 2024; originally announced February 2024.

    Comments: 6 pages, 6 figures

    Journal ref: 29th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC); 2024 January; Incheon Songdo Convensia, South Korea

  6. LLM4SecHW: Leveraging Domain Specific Large Language Model for Hardware Debugging

    Authors: Weimin Fu, Kaichen Yang, Raj Gautam Dutta, Xiaolong Guo, Gang Qu

    Abstract: This paper presents LLM4SecHW, a novel framework for hardware debugging that leverages domain specific Large Language Model (LLM). Despite the success of LLMs in automating various software development tasks, their application in the hardware security domain has been limited due to the constraints of commercial LLMs and the scarcity of domain specific data. To address these challenges, we propose… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

    Comments: 6 pages. 1 figure

    Journal ref: 2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Tianjin, China, 2023, pp. 1-6

  7. arXiv:2306.11698  [pdf, other

    cs.CL cs.AI cs.CR

    DecodingTrust: A Comprehensive Assessment of Trustworthiness in GPT Models

    Authors: Boxin Wang, Weixin Chen, Hengzhi Pei, Chulin Xie, Mintong Kang, Chenhui Zhang, Chejian Xu, Zidi Xiong, Ritik Dutta, Rylan Schaeffer, Sang T. Truong, Simran Arora, Mantas Mazeika, Dan Hendrycks, Zinan Lin, Yu Cheng, Sanmi Koyejo, Dawn Song, Bo Li

    Abstract: Generative Pre-trained Transformer (GPT) models have exhibited exciting progress in their capabilities, capturing the interest of practitioners and the public alike. Yet, while the literature on the trustworthiness of GPT models remains limited, practitioners have proposed employing capable GPT models for sensitive applications such as healthcare and finance -- where mistakes can be costly. To thi… ▽ More

    Submitted 26 February, 2024; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: NeurIPS 2023 Outstanding Paper (Datasets and Benchmarks Track)

  8. arXiv:2306.03105  [pdf, other

    nlin.PS cs.LG nlin.SI

    Data driven localized wave solution of the Fokas-Lenells equation using modified PINN

    Authors: Gautam Kumar Saharia, Sagardeep Talukdar, Riki Dutta, Sudipta Nandy

    Abstract: We investigate data driven localized wave solutions of the Fokas-Lenells equation by using physics informed neural network(PINN). We improve basic PINN by incorporating control parameters into the residual loss function. We also add conserve quantity as another loss term to modify the PINN. Using modified PINN we obtain the data driven bright soliton and dark soliton solutions of Fokas-Lenells equ… ▽ More

    Submitted 3 June, 2023; originally announced June 2023.

    Comments: 14 pages

  9. arXiv:2305.07367  [pdf, ps, other

    cs.LG cs.AI

    S-REINFORCE: A Neuro-Symbolic Policy Gradient Approach for Interpretable Reinforcement Learning

    Authors: Rajdeep Dutta, Qincheng Wang, Ankur Singh, Dhruv Kumarjiguda, Li Xiaoli, Senthilnath Jayavelu

    Abstract: This paper presents a novel RL algorithm, S-REINFORCE, which is designed to generate interpretable policies for dynamic decision-making tasks. The proposed algorithm leverages two types of function approximators, namely Neural Network (NN) and Symbolic Regressor (SR), to produce numerical and symbolic policies, respectively. The NN component learns to generate a numerical probability distribution… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: 10 pages, 7 figures

  10. arXiv:2305.00429  [pdf, other

    cs.NI eess.SP

    A Dynamic Obstacle Tracking Strategy for Proactive Handoffs in Millimeter-wave Networks

    Authors: Rathindra Nath Dutta, Subhojit Sarkar, Sasthi C. Ghosh

    Abstract: Stringent line-of-sight demands necessitated by the fast attenuating nature of millimeter waves (mmWaves) through obstacles pose one of the central problems of next generation wireless networks. These mmWave links are easily disrupted due to obstacles, including vehicles and pedestrians, which cause degradation in link quality and even link failure. Dynamic obstacles are usually tracked by dedicat… ▽ More

    Submitted 12 July, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

  11. arXiv:2302.00042  [pdf, other

    cs.SE

    Diversity Awareness in Software Engineering Participant Research

    Authors: Riya Dutta, Diego Elias Costa, Emad Shihab, Tanja Tajmel

    Abstract: Diversity and inclusion are necessary prerequisites for shaping technological innovation that benefits society as a whole. A common indicator of diversity consideration is the representation of different social groups among software engineering (SE) researchers, developers, and students. However, this does not necessarily entail that diversity is considered in the SE research itself. In our stud… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

  12. arXiv:2301.11365  [pdf, other

    cs.NI eess.SY

    Open RAN Testbeds with Controlled Air Mobility

    Authors: Magreth Mushi, Yuchen Liu, Shreyas Sreenivasa, Ozgur Ozdemir, Ismail Guvenc, Mihail Sichitiu, Rudra Dutta, Russ Gyurek

    Abstract: With its promise of increasing softwarization, improving disaggregability, and creating an open-source based ecosystem in the area of Radio Access Networks, the idea of Open RAN has generated rising interest in the community. Even as the community races to provide and verify complete Open RAN systems, the importance of verification of systems based on Open RAN under real-world conditions has becom… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

  13. arXiv:2205.15784  [pdf, other

    stat.CO cs.LG stat.ME stat.ML

    Likelihood-Free Inference with Generative Neural Networks via Scoring Rule Minimization

    Authors: Lorenzo Pacchiardi, Ritabrata Dutta

    Abstract: Bayesian Likelihood-Free Inference methods yield posterior approximations for simulator models with intractable likelihood. Recently, many works trained neural networks to approximate either the intractable likelihood or the posterior directly. Most proposals use normalizing flows, namely neural networks parametrizing invertible maps used to transform samples from an underlying base measure; the p… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  14. RSTGen: Imbuing Fine-Grained Interpretable Control into Long-FormText Generators

    Authors: Rilwan A. Adewoyin, Ritabrata Dutta, Yulan He

    Abstract: In this paper, we study the task of improving the cohesion and coherence of long-form text generated by language models. To this end, we propose RSTGen, a framework that utilises Rhetorical Structure Theory (RST), a classical language theory, to control the discourse structure, semantics and topics of generated text. Firstly, we demonstrate our model's ability to control structural discourse and s… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: NAACL 2022

  15. A Reinforcement Approach for Detecting P2P Botnet Communities in Dynamic Communication Graphs

    Authors: Harshvardhan P. Joshi, Rudra Dutta

    Abstract: Peer-to-peer (P2P) botnets use decentralized command and control networks that make them resilient to disruptions. The P2P botnet overlay networks manifest structures in mutual-contact graphs, also called communication graphs, formed using network traffic information. It has been shown that these structures can be detected using community detection techniques from graph theory. These previous work… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

  16. arXiv:2112.08217  [pdf, other

    stat.ML cs.LG

    Probabilistic Forecasting with Generative Networks via Scoring Rule Minimization

    Authors: Lorenzo Pacchiardi, Rilwan Adewoyin, Peter Dueben, Ritabrata Dutta

    Abstract: Probabilistic forecasting relies on past observations to provide a probability distribution for a future outcome, which is often evaluated against the realization using a scoring rule. Here, we perform probabilistic forecasting with generative neural networks, which parametrize distributions on high-dimensional spaces by transforming draws from a latent variable. Generative networks are typically… ▽ More

    Submitted 13 February, 2024; v1 submitted 15 December, 2021; originally announced December 2021.

    Journal ref: Journal of Machine Learning Research, 25(45), 2024

  17. arXiv:2008.09090  [pdf, other

    cs.CE cs.LG

    TRU-NET: A Deep Learning Approach to High Resolution Prediction of Rainfall

    Authors: Rilwan Adewoyin, Peter Dueben, Peter Watson, Yulan He, Ritabrata Dutta

    Abstract: Climate models (CM) are used to evaluate the impact of climate change on the risk of floods and strong precipitation events. However, these numerical simulators have difficulties representing precipitation events accurately, mainly due to limited spatial resolution when simulating multi-scale dynamics in the atmosphere. To improve the prediction of high resolution precipitation we apply a Deep Lea… ▽ More

    Submitted 12 February, 2021; v1 submitted 20 August, 2020; originally announced August 2020.

  18. arXiv:2008.06926  [pdf, other

    eess.SY cs.CR

    A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

    Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou

    Abstract: Over the last decade, the number of cyberattacks targeting power systems and causing physical and economic damages has increased rapidly. Among them, False Data Injection Attacks (FDIAs) is a class of cyberattacks against power grid monitoring systems. Adversaries can successfully perform FDIAs in order to manipulate the power system State Estimation (SE) by compromising sensors or modifying syste… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

  19. arXiv:2007.10159  [pdf, other

    cs.SI cs.CY

    Analysing Meso and Macro conversation structures in an online suicide support forum

    Authors: Sagar Joglekar, Sumithra Velupillai, Rina Dutta, Nishanth Sastry

    Abstract: Platforms like Reddit and Twitter offer internet users an opportunity to talk about diverse issues, including those pertaining to physical and mental health. Some of these forums also function as a safe space for severely distressed mental health patients to get social support from peers. The online community platform Reddit's SuicideWatch is one example of an online forum dedicated specifically t… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

  20. arXiv:1911.06411  [pdf, other

    cs.LG cs.CY stat.ML

    Synthetic Event Time Series Health Data Generation

    Authors: Saloni Dash, Ritik Dutta, Isabelle Guyon, Adrien Pavao, Andrew Yale, Kristin P. Bennett

    Abstract: Synthetic medical data which preserves privacy while maintaining utility can be used as an alternative to real medical data, which has privacy costs and resource constraints associated with it. At present, most models focus on generating cross-sectional health data which is not necessarily representative of real data. In reality, medical data is longitudinal in nature, with a single patient having… ▽ More

    Submitted 27 November, 2019; v1 submitted 14 November, 2019; originally announced November 2019.

    Comments: Machine Learning for Health (ML4H) at NeurIPS 2019 - Extended Abstract

  21. arXiv:1902.11133   

    cs.CV cs.LG

    Bengali Handwritten Character Classification using Transfer Learning on Deep Convolutional Neural Network

    Authors: Swagato Chatterjee, Rwik Kumar Dutta, Debayan Ganguly, Kingshuk Chatterjee, Sudipta Roy

    Abstract: In this paper, we propose a solution which uses state-of-the-art techniques in Deep Learning to tackle the problem of Bengali Handwritten Character Recognition ( HCR ). Our method uses lesser iterations to train than most other comparable methods. We employ Transfer Learning on ResNet 50, a state-of-the-art deep Convolutional Neural Network Model, pretrained on ImageNet dataset. We also use other… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

  22. arXiv:1711.10751  [pdf, ps, other

    cs.CR

    UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy

    Authors: Vandana Guleria, Ratna Dutta

    Abstract: Privacy is a major concern in designing any cryptographic primitive when frequent transactions are done electronically. During electronic transactions, people reveal their personal data into several servers and believe that this information does not leak too much about them. The adaptive oblivious transfer with hidden access policy (AOT-HAP) takes measure against such privacy issues. The existing… ▽ More

    Submitted 29 November, 2017; originally announced November 2017.

  23. arXiv:1704.08950  [pdf

    cs.AI

    Intelligent Personal Assistant with Knowledge Navigation

    Authors: Amit Kumar, Rahul Dutta, Harbhajan Rai

    Abstract: An Intelligent Personal Agent (IPA) is an agent that has the purpose of helping the user to gain information through reliable resources with the help of knowledge navigation techniques and saving time to search the best content. The agent is also responsible for responding to the chat-based queries with the help of Conversation Corpus. We will be testing different methods for optimal query generat… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

    Comments: Converted O(N3) solution to viable O(N) solution

  24. arXiv:1603.01739  [pdf

    cs.CV eess.IV physics.med-ph

    Grading of Mammalian Cumulus Oocyte Complexes using Machine Learning for in Vitro Embryo Culture

    Authors: Viswanath P Sudarshan, Tobias Weiser, Phalgun Chintala, Subhamoy Mandal, Rahul Dutta

    Abstract: Visual observation of Cumulus Oocyte Complexes provides only limited information about its functional competence, whereas the molecular evaluations methods are cumbersome or costly. Image analysis of mammalian oocytes can provide attractive alternative to address this challenge. However, it is complex, given the huge number of oocytes under inspection and the subjective nature of the features insp… ▽ More

    Submitted 5 March, 2016; originally announced March 2016.

    Comments: IEEE BHI 2016

  25. Modelling-based experiment retrieval: A case study with gene expression clustering

    Authors: Paul Blomstedt, Ritabrata Dutta, Sohan Seth, Alvis Brazma, Samuel Kaski

    Abstract: Motivation: Public and private repositories of experimental data are growing to sizes that require dedicated methods for finding relevant data. To improve on the state of the art of keyword searches from annotations, methods for content-based retrieval have been proposed. In the context of gene expression experiments, most methods retrieve gene expression profiles, requiring each experiment to be… ▽ More

    Submitted 4 January, 2016; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: Updated figures. The final version of this article will appear in Bioinformatics (https://bioinformatics.oxfordjournals.org/)

  26. arXiv:1409.3993  [pdf

    cs.HC

    Clear, Concise and Effective UI: Opinion and Suggestions

    Authors: Rishabh Jain, Rupanta Rwiteej Dutta, Rajat Tandon

    Abstract: The most important aspect of any Software is the operability for the intended audience. This factor of operability is encompassed in the user interface, which serves as the only window to the features of the system. It is thus essential that the User Interface provided is robust, concise and lucid. Presently there are no properly defined rules or guidelines for user interface design enabling a per… ▽ More

    Submitted 13 September, 2014; originally announced September 2014.

    MSC Class: 00-01

  27. arXiv:1310.2125  [pdf, other

    stat.ML cs.IR stat.AP

    Retrieval of Experiments with Sequential Dirichlet Process Mixtures in Model Space

    Authors: Ritabrata Dutta, Sohan Seth, Samuel Kaski

    Abstract: We address the problem of retrieving relevant experiments given a query experiment, motivated by the public databases of datasets in molecular biology and other experimental sciences, and the need of scientists to relate to earlier work on the level of actual measurement data. Since experiments are inherently noisy and databases ever accumulating, we argue that a retrieval engine should possess tw… ▽ More

    Submitted 6 March, 2014; v1 submitted 8 October, 2013; originally announced October 2013.

  28. arXiv:1206.6285  [pdf

    cs.NI

    Collusion resistant self-healing key distribution in mobile wireless networks

    Authors: Ratna Dutta, Sugata Sanyal

    Abstract: A fundamental concern of any secure group communication system is key management and wireless environments create new challenges. One core requirement in these emerging networks is self-healing. In systems where users can be offline and miss updates, self-healing allows a user to recover lost session keys and get back into the secure communication without putting extra burden on the group manager.… ▽ More

    Submitted 26 June, 2012; originally announced June 2012.

    Comments: 16 pages, 4 figures, 2 tables

  29. arXiv:1109.4257  [pdf

    cs.IR

    Offering A Product Recommendation System in E-commerce

    Authors: Ruma Dutta, Debajyoti Mukhopadhyay

    Abstract: This paper proposes a number of explicit and implicit ratings in product recommendation system for Business-to-customer e-commerce purposes. The system recommends the products to a new user. It depends on the purchase pattern of previous users whose purchase pattern is close to that of a user who asks for a recommendation. The system is based on weighted cosine similarity measure to find out the c… ▽ More

    Submitted 20 September, 2011; originally announced September 2011.

    Comments: 9 pages, 2 figures