Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 82 results for author: Jana, s

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19134  [pdf, other

    cs.DM cs.DS math.CO

    Cuts in Graphs with Matroid Constraints

    Authors: Aritra Banik, Fedor V. Fomin, Petr A. Golovach, Tanmay Inamdar, Satyabrata Jana, Saket Saurabh

    Abstract: {\sc Vertex $(s, t)$-Cut} and {\sc Vertex Multiway Cut} are two fundamental graph separation problems in algorithmic graph theory. We study matroidal generalizations of these problems, where in addition to the usual input, we are given a representation $R \in \mathbb{F}^{r \times n}$ of a linear matroid $\mathcal{M} = (V(G), \mathcal{I})$ of rank $r$ in the input, and the goal is to determine whet… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2406.04517  [pdf, other

    cs.CR

    FOX: Coverage-guided Fuzzing as Online Stochastic Control

    Authors: Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana

    Abstract: Fuzzing is an effective technique for discovering software vulnerabilities by generating random test inputs and executing them against the target program. However, fuzzing large and complex programs remains challenging due to difficulties in uncovering deeply hidden vulnerabilities. This paper addresses the limitations of existing coverage-guided fuzzers, focusing on the scheduler and mutator comp… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: To Appear in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24)

  3. arXiv:2405.21063  [pdf, other

    cs.LG cs.AI

    Neural Network Verification with Branch-and-Bound for General Nonlinearities

    Authors: Zhouxing Shi, Qirui Jin, Zico Kolter, Suman Jana, Cho-Jui Hsieh, Huan Zhang

    Abstract: Branch-and-bound (BaB) is among the most effective methods for neural network (NN) verification. However, existing works on BaB have mostly focused on NNs with piecewise linear activations, especially ReLU networks. In this paper, we develop a general framework, named GenBaB, to conduct BaB for general nonlinearities in general computational graphs based on linear bound propagation. To decide whic… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

    Comments: Preprint

  4. arXiv:2402.16085  [pdf, other

    cs.DS

    Online Drone Scheduling for Last-mile Delivery

    Authors: Saswata Jana, Giuseppe F. Italiano, Manas Jyoti Kashyop, Athanasios L. Konstantinidis, Evangelos Kosinas, Partha Sarathi Mandal

    Abstract: Delivering a parcel from the distribution hub to the customer's doorstep is called the \textit{last-mile delivery} step in delivery logistics. In this paper, we study a hybrid {\it truck-drones} model for the last-mile delivery step, in which a truck moves on a predefined path carrying parcels and drones deliver the parcels. We define the \textsc{online drone scheduling} problem, where the truck m… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

  5. arXiv:2402.07118  [pdf, other

    cs.HC cs.AI cs.LG eess.IV eess.SP

    Next-Generation Teleophthalmology: AI-enabled Quality Assessment Aiding Remote Smartphone-based Consultation

    Authors: Dhruv Srikanth, Jayang Gurung, N Satya Deepika, Vineet Joshi, Pravin Vaddavalli, Soumya Jana

    Abstract: Blindness and other eye diseases are a global health concern, particularly in low- and middle-income countries like India. In this regard, during the COVID-19 pandemic, teleophthalmology became a lifeline, and the Grabi attachment for smartphone-based eye imaging gained in use. However, quality of user-captured image often remained inadequate, requiring clinician vetting and delays. In this backdr… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 4 pages, Submitted to IEEE EMBC 2024

  6. arXiv:2401.05561  [pdf, other

    cs.CL

    TrustLLM: Trustworthiness in Large Language Models

    Authors: Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang , et al. (45 additional authors not shown)

    Abstract: Large language models (LLMs), exemplified by ChatGPT, have gained considerable attention for their excellent natural language processing capabilities. Nonetheless, these LLMs present many challenges, particularly in the realm of trustworthiness. Therefore, ensuring the trustworthiness of LLMs emerges as an important topic. This paper introduces TrustLLM, a comprehensive study of trustworthiness in… ▽ More

    Submitted 17 March, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: This work is still under work and we welcome your contribution

  7. arXiv:2401.03415  [pdf, other

    cs.DM math.CO

    A Polynomial Kernel for Proper Helly Circular-arc Vertex Deletion

    Authors: Akanksha Agrawal, Satyabrata Jana, Abhishek Sahu

    Abstract: A proper Helly circular-arc graph is an intersection graph of a set of arcs on a circle such that none of the arcs properly contains any other arc and every set of pairwise intersecting arcs has a common intersection. The Proper Helly Circular-arc Vertex Deletion problem takes as input a graph $G$ and an integer $k$, and the goal is to check if we can remove at most $k$ vertices from the graph to… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: 25 pages, 3 figures, In LATIN 2024

  8. arXiv:2311.04536  [pdf, other

    cs.DC

    Uniform Partitioning of a Bounded Region using Opaque ASYNC Luminous Mobile Robots

    Authors: Subhajit Pramanick, Saswata Jana, Adri Bhattacharya, Partha Sarathi Mandal

    Abstract: We are given $N$ autonomous mobile robots inside a bounded region. The robots are opaque which means that three collinear robots are unable to see each other as one of the robots acts as an obstruction for the other two. They operate in classical \emph{Look-Compute-Move} (LCM) activation cycles. Moreover, the robots are oblivious except for a persistent light (which is why they are called \emph{Lu… ▽ More

    Submitted 1 May, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: This paper recently got accepted in ICDCN 2024

  9. arXiv:2310.14053  [pdf, other

    cs.LG cs.CL cs.SE

    Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain

    Authors: Marcus J. Min, Yangruibo Ding, Luca Buratti, Saurabh Pujar, Gail Kaiser, Suman Jana, Baishakhi Ray

    Abstract: Code Large Language Models (Code LLMs) are being increasingly employed in real-life applications, so evaluating them is critical. While the conventional accuracy evaluates the performance of Code LLMs on a set of individual tasks, their self-consistency across different tasks is overlooked. Intuitively, a trustworthy model should be self-consistent when generating natural language specifications f… ▽ More

    Submitted 26 February, 2024; v1 submitted 21 October, 2023; originally announced October 2023.

    Comments: ICLR 2024

    MSC Class: 68 ACM Class: I.2; D.2

  10. arXiv:2310.13076  [pdf, other

    cs.CV cs.CR

    PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses

    Authors: Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal

    Abstract: State-of-the-art defenses against adversarial patch attacks can now achieve strong certifiable robustness with a marginal drop in model utility. However, this impressive performance typically comes at the cost of 10-100x more inference-time computation compared to undefended models -- the research community has witnessed an intense three-way trade-off between certifiable robustness, model utility,… ▽ More

    Submitted 2 April, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: USENIX Security 2024. (extended) technical report

  11. arXiv:2308.03312  [pdf, other

    cs.LG cs.CR cs.PL

    Exploiting Code Symmetries for Learning Program Semantics

    Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana

    Abstract: This paper tackles the challenge of teaching code semantics to Large Language Models (LLMs) for program analysis by incorporating code symmetries into the model architecture. We introduce a group-theoretic framework that defines code symmetries as semantics-preserving transformations, where forming a code symmetry group enables precise and efficient reasoning of code semantics. Our solution, SymC,… ▽ More

    Submitted 6 June, 2024; v1 submitted 7 August, 2023; originally announced August 2023.

  12. arXiv:2306.09977  [pdf, other

    math.ST cs.LG

    Adversarially robust clustering with optimality guarantees

    Authors: Soham Jana, Kun Yang, Sanjeev Kulkarni

    Abstract: We consider the problem of clustering data points coming from sub-Gaussian mixtures. Existing methods that provably achieve the optimal mislabeling error, such as the Lloyd algorithm, are usually vulnerable to outliers. In contrast, clustering methods seemingly robust to adversarial perturbations are not known to satisfy the optimal statistical guarantees. We propose a simple algorithm that obtain… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: 36 pages, 5 figures

  13. arXiv:2304.03233  [pdf, other

    cs.DS cs.DM

    Parameterized algorithms for Eccentricity Shortest Path Problem

    Authors: Sriram Bhyravarapu, Satyabrata Jana, Lawqueen Kanesh, Saket Saurabh, Shaily Verma

    Abstract: Given an undirected graph $G=(V,E)$ and an integer $\ell$, the Eccentricity Shortest Path (ESP) asks to find a shortest path $P$ such that for every vertex $v\in V(G)$, there is a vertex $w\in P$ such that $d_G(v,w)\leq \ell$, where $d_G(v,w)$ represents the distance between $v$ and $w$ in $G$. Dragan and Leitert [Theor. Comput. Sci. 2017] showed that the optimization version of this problem, whic… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: A preliminary version of this paper was accepted in IWOCA 2023

  14. arXiv:2303.16245  [pdf, other

    cs.DC cs.LG cs.PF

    ytopt: Autotuning Scientific Applications for Energy Efficiency at Large Scales

    Authors: Xingfu Wu, Prasanna Balaprakash, Michael Kruse, Jaehoon Koo, Brice Videau, Paul Hovland, Valerie Taylor, Brad Geltz, Siddhartha Jana, Mary Hall

    Abstract: As we enter the exascale computing era, efficiently utilizing power and optimizing the performance of scientific applications under power and energy constraints has become critical and challenging. We propose a low-overhead autotuning framework to autotune performance and energy for various hybrid MPI/OpenMP scientific applications at large scales and to explore the tradeoffs between application r… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Journal ref: to be pushilshed in CUG2023

  15. arXiv:2211.06636  [pdf, other

    cs.DS

    Approximation Algorithms for Drone Delivery Scheduling Problem

    Authors: Saswata Jana, Partha Sarathi Mandal

    Abstract: The coordination among drones and ground vehicles for last-mile delivery has gained significant interest in recent years. In this paper, we study \textit{multiple drone delivery scheduling problem(MDSP) \cite{Betti_ICDCN22} for last-mile delivery, where we have a set of drones with an identical battery budget and a set of delivery locations, along with reward or profit for delivery, cost and deliv… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

  16. arXiv:2210.02853  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    NeuDep: Neural Binary Memory Dependence Analysis

    Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray

    Abstract: Determining whether multiple instructions can access the same memory location is a critical task in binary analysis. It is challenging as statically computing precise alias information is undecidable in theory. The problem aggravates at the binary level due to the presence of compiler optimizations and the absence of symbols and types. Existing approaches either produce significant spurious depend… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: ESEC/FSE 2022

  17. $MC^2$: Rigorous and Efficient Directed Greybox Fuzzing

    Authors: Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana

    Abstract: Directed greybox fuzzing is a popular technique for targeted software testing that seeks to find inputs that reach a set of target sites in a program. Most existing directed greybox fuzzers do not provide any theoretical analysis of their performance or optimality. In this paper, we introduce a complexity-theoretic framework to pose directed greybox fuzzing as a oracle-guided search problem wher… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: To Appear in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)

  18. arXiv:2208.14304  [pdf, ps, other

    cs.DS

    Approximation Algorithms for Drone Delivery Packing Problem

    Authors: Saswata Jana, Partha Sarathi Mandal

    Abstract: Recent advancements in unmanned aerial vehicles, also known as drones, have motivated logistics to use drones for multiple operations. Collaboration between drones and trucks in a last-mile delivery system has numerous benefits and reduces a number of challenges. In this paper, we introduce \textit{drone-delivery packing problem} (DDP), where we have a set of deliveries and respective customers wi… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  19. arXiv:2208.05740  [pdf, other

    cs.LG cs.CR cs.CV math.OC stat.ML

    General Cutting Planes for Bound-Propagation-Based Neural Network Verification

    Authors: Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter

    Abstract: Bound propagation methods, when combined with branch and bound, are among the most effective methods to formally verify properties of deep neural networks such as correctness, robustness, and safety. However, existing works cannot handle the general form of cutting plane constraints widely accepted in traditional solvers, which are crucial for strengthening verifiers with tightened convex relaxati… ▽ More

    Submitted 4 December, 2022; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: Accepted by NeurIPS 2022. GCP-CROWN is part of the alpha-beta-CROWN verifier, the VNN-COMP 2022 winner

  20. arXiv:2203.12064  [pdf, other

    cs.CR cs.SI

    Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis

    Authors: Dongdong She, Abhishek Shah, Suman Jana

    Abstract: Seed scheduling, the order in which seeds are selected, can greatly affect the performance of a fuzzer. Existing approaches schedule seeds based on their historical mutation data, but ignore the structure of the underlying Control Flow Graph (CFG). Examining the CFG can help seed scheduling by revealing the potential edge coverage gain from mutating a seed. An ideal strategy will schedule seeds ba… ▽ More

    Submitted 24 March, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: To appear in the 43rd IEEE Symposium on Security and Privacy, May 23--26, 2022, San Francisco, CA, USA

  21. arXiv:2203.08221  [pdf, other

    eess.SY cs.AI

    Development of Decision Support System for Effective COVID-19 Management

    Authors: shuvrangshu Jana, Rudrashis Majumder, Aashay Bhise, Nobin Paul, Stuti Garg, Debasish Ghose

    Abstract: This paper discusses a Decision Support System (DSS) for cases prediction, allocation of resources, and lockdown management for managing COVID-19 at different levels of a government authority. Algorithms incorporated in the DSS are based on a data-driven modeling approach and independent of physical parameters of the region, and hence the proposed DSS is applicable to any area. Based on predicted… ▽ More

    Submitted 12 March, 2022; originally announced March 2022.

    Comments: 5th world Congress on Disaster Management, IIT Delhi, New Delhi, India

  22. arXiv:2110.15960  [pdf, other

    math.ST cs.LG stat.ML

    Support Recovery with Stochastic Gates: Theory and Application for Linear Models

    Authors: Soham Jana, Henry Li, Yutaro Yamada, Ofir Lindenbaum

    Abstract: Consider the problem of simultaneous estimation and support recovery of the coefficient vector in a linear data model with additive Gaussian noise. We study the problem of estimating the model coefficients based on a recently proposed non-convex regularizer, namely the stochastic gates (STG) [Yamada et al. 2020]. We suggest a new projection-based algorithm for solving the STG regularized minimizat… ▽ More

    Submitted 12 November, 2022; v1 submitted 29 October, 2021; originally announced October 2021.

    Comments: 15 pages, 7 figures, extended the theoretical studies and numerical analyses to other probabilistic models (subgaussian, moment constraints etc.)

  23. arXiv:2109.00481  [pdf, other

    cs.RO eess.SY

    Autonomous Cooperative Multi-Vehicle System for Interception of Aerial and Stationary Targets in Unknown Environments

    Authors: Lima Agnel Tony, Shuvrangshu Jana, Varun V. P., Aashay Anil Bhise, Aruul Mozhi Varman S., Vidyadhara B. V., Mohitvishnu S. Gadde, Raghu Krishnapuram, Debasish Ghose

    Abstract: This paper presents the design, development, and testing of hardware-software systems by the IISc-TCS team for Challenge 1 of the Mohammed Bin Zayed International Robotics Challenge 2020. The goal of Challenge 1 was to grab a ball suspended from a moving and maneuvering UAV and pop balloons anchored to the ground, using suitable manipulators. The important tasks carried out to address this challen… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at Springer Field Robotics journal

  24. arXiv:2106.10147  [pdf, other

    cs.CR cs.LG

    Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks

    Authors: Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son

    Abstract: Trigger set-based watermarking schemes have gained emerging attention as they provide a means to prove ownership for deep neural network model owners. In this paper, we argue that state-of-the-art trigger set-based watermarking algorithms do not achieve their designed goal of proving ownership. We posit that this impaired capability stems from two common experimental flaws that the existing resear… ▽ More

    Submitted 19 January, 2023; v1 submitted 18 June, 2021; originally announced June 2021.

    Comments: 15 pages, accepted at IEEE TDSC

  25. Learning Security Classifiers with Verified Global Robustness Properties

    Authors: Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner

    Abstract: Many recent works have proposed methods to train classifiers with local robustness properties, which can provably eliminate classes of evasion attacks for most inputs, but not all inputs. Since data distribution shift is very common in security applications, e.g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploy… ▽ More

    Submitted 1 December, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: ACM Conference on Computer and Communications Security (CCS) 2021 Best Paper Award Runner-Up

  26. arXiv:2104.08519  [pdf, ps, other

    cs.CV cs.LG

    Efficient Screening of Diseased Eyes based on Fundus Autofluorescence Images using Support Vector Machine

    Authors: Shanmukh Reddy Manne, Kiran Kumar Vupparaboina, Gowtham Chowdary Gudapati, Ram Anudeep Peddoju, Chandra Prakash Konkimalla, Abhilash Goud, Sarforaz Bin Bashar, Jay Chhablani, Soumya Jana

    Abstract: A variety of vision ailments are associated with geographic atrophy (GA) in the foveal region of the eye. In current clinical practice, the ophthalmologist manually detects potential presence of such GA based on fundus autofluorescence (FAF) images, and hence diagnoses the disease, when relevant. However, in view of the general scarcity of ophthalmologists relative to the large number of subjects… ▽ More

    Submitted 17 April, 2021; originally announced April 2021.

  27. arXiv:2103.06624  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Robustness Verification

    Authors: Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter

    Abstract: Bound propagation based incomplete neural network verifiers such as CROWN are very efficient and can significantly accelerate branch-and-bound (BaB) based complete verification of neural networks. However, bound propagation cannot fully handle the neuron split constraints introduced by BaB commonly handled by expensive linear programming (LP) solvers, leading to loose bounds and hurting verificati… ▽ More

    Submitted 31 October, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: Shiqi Wang, Huan Zhang and Kaidi Xu contributed equally. Accepted by NeurIPS 2021

  28. arXiv:2102.11662  [pdf, other

    cs.RO

    Design and Integration of a Drone based Passive Manipulator for Capturing Flying Targets

    Authors: B. V. Vidyadhara, Lima Agnel Tony, Mohitvishnu S. Gadde, Shuvrangshu Jana, V. P. Varun, Aashay Anil Bhise, Suresh Sundaram, Debasish Ghose

    Abstract: In this paper, we present a novel passive single Degree-of-Freedom (DoF) manipulator design and its integration on an autonomous drone to capture a moving target. The end-effector is designed to be passive, to disengage the moving target from a flying UAV and capture it efficiently in the presence of disturbances, with minimal energy usage. It is also designed to handle target sway and the effect… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: Submitted to Robotica, Cambridge University Press

  29. arXiv:2102.08306  [pdf, other

    cs.RO

    Design Iterations for Passive Aerial Manipulator

    Authors: Vidyadhara B V, Lima Agnel Tony, Mohitvishnu S. Gadde, Shuvrangshu Jana, Varun V. P., Aashay Anil Bhise, Suresh Sundaram, Debasish Ghose

    Abstract: Grabbing a manoeuvring target using drones is a challenging problem. This paper presents the design, development, and prototyping of a novel aerial manipulator for target interception. It is a single Degree of Freedom (DoF) manipulator with passive basket-type end-effector. The proposed design is energy efficient, light weight and suitable for aerial grabbing applications. The detailed design of t… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

    Comments: Supplementary material

  30. arXiv:2012.08680  [pdf, other

    cs.CR cs.LG cs.SE

    Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity

    Authors: Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray

    Abstract: Detecting semantically similar functions -- a crucial analysis capability with broad real-world security usages including vulnerability detection, malware lineage, and forensics -- requires understanding function behaviors and intentions. This task is challenging as semantically similar functions can be implemented differently, run on different architectures, and compiled with diverse compiler opt… ▽ More

    Submitted 26 April, 2021; v1 submitted 15 December, 2020; originally announced December 2020.

  31. arXiv:2011.13824  [pdf, other

    cs.AI cs.LG

    Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers

    Authors: Kaidi Xu, Huan Zhang, Shiqi Wang, Yihan Wang, Suman Jana, Xue Lin, Cho-Jui Hsieh

    Abstract: Formal verification of neural networks (NNs) is a challenging and important problem. Existing efficient complete solvers typically require the branch-and-bound (BaB) process, which splits the problem domain into sub-domains and solves each sub-domain using faster but weaker incomplete verifiers, such as Linear Programming (LP) on linearly relaxed sub-domains. In this paper, we propose to use the b… ▽ More

    Submitted 16 March, 2021; v1 submitted 27 November, 2020; originally announced November 2020.

    Comments: Accepted by ICLR 2021

  32. arXiv:2011.05924  [pdf, other

    eess.SY cs.RO

    Improvement of plant performance using Closed loop Reference Model Simple Adaptive Control for Micro Air Vehicle

    Authors: Shuvrangshu Jana, M. Seetharama Bhat

    Abstract: In this paper, we present a novel idea to improve the transient performance of the existing Simple Adaptive Control architecture, without requiring high adaptation gains. Improvement in performance is achieved by incorporating the closed loop reference model based on the output feedback to the Simple Adaptive Control architecture. In this proposed scheme, the reference model dynamics is driven by… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 11 pages, 16 figures, Euro GNC 2017-4th CEAS Specialist Conference on Guidance Navigation and Control

  33. arXiv:2010.02512  [pdf, other

    cs.RO eess.SY

    Target State Estimation and Prediction for High Speed Interception

    Authors: Aashay Bhise, Shuvrangshu Jana, Lima Agnel Tony, Debasish Ghose

    Abstract: Accurate estimation and prediction of trajectory is essential for interception of any high speed target. In this paper, an extended Kalman filter is used to estimate the current location of target from its visual information and then predict its future position by using the observation sequence. Target motion model is developed considering the approximate known pattern of the target trajectory. In… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2009.00067

    Journal ref: MBZIRC Symposium 2020, ADNEC, Abu Dhabi

  34. arXiv:2010.01588  [pdf, other

    cs.RO cs.CV eess.SY

    Collaborative Tracking and Capture of Aerial Object using UAVs

    Authors: Lima Agnel Tony, Shuvrangshu Jana, Varun V P, Vidyadhara B V, Mohitvishnu S Gadde, Abhishek Kashyap, Rahul Ravichandran, Debasish Ghose

    Abstract: This work details the problem of aerial target capture using multiple UAVs. This problem is motivated from the challenge 1 of Mohammed Bin Zayed International Robotic Challenge 2020. The UAVs utilise visual feedback to autonomously detect target, approach it and capture without disturbing the vehicle which carries the target. Multi-UAV collaboration improves the efficiency of the system and increa… ▽ More

    Submitted 4 October, 2020; originally announced October 2020.

    Journal ref: MBZIRC Symposium 2020, ADNEC, Abu Dhabi

  35. arXiv:2010.00770  [pdf, other

    cs.CR cs.LG

    XDA: Accurate, Robust Disassembly with Transfer Learning

    Authors: Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana

    Abstract: Accurate and robust disassembly of stripped binaries is challenging. The root of the difficulty is that high-level structures, such as instruction and function boundaries, are absent in stripped binaries and must be recovered based on incomplete information. Current disassembly approaches rely on heuristics or simple pattern matching to approximate the recovery, but these methods are often inaccur… ▽ More

    Submitted 18 November, 2020; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: 2021 Network and Distributed System Security Symposium (NDSS 2021)

  36. arXiv:2009.13066  [pdf, other

    cs.RO

    Vision based Target Interception using Aerial Manipulation

    Authors: Lima Agnel Tony, Shuvrangshu Jana, Aashay Bhise, Varun V P, Aruul Mozhi Varman S, Vidyadhara B V, Mohitvishnu S Gadde, Debasish Ghose, Raghu Krishnapuram

    Abstract: Selective interception of objects in unknown environment autonomously by UAVs is an interesting problem. In this work, vision based interception is carried out. This problem is a part of challenge 1 of Mohammed Bin Zayed International Robotic Challenge, 2020, where, balloons are kept at five random locations for the UAVs to autonomously explore, detect, approach and intercept. The problem requires… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Journal ref: 2020 MBZIRC Symposium, Abu Dhabi

  37. arXiv:2009.03584  [pdf, other

    cs.RO eess.SY

    Multi-Agent Collaboration for Building Construction

    Authors: Kumar Ankit, Lima Agnel Tony, Shuvrangshu Jana, Debasish Ghose

    Abstract: This paper details the algorithms involved and task planner for vehicle collaboration in building a structure. This is the problem defined in challenge 2 of Mohammed Bin Zayed International Robotic Challenge 2020 (MBZIRC). The work addresses various aspects of the challenge for Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicle (UGV). The challenge involves repeated pick and place operati… ▽ More

    Submitted 25 September, 2020; v1 submitted 8 September, 2020; originally announced September 2020.

  38. arXiv:2009.00067  [pdf, other

    cs.RO eess.SP

    Accurate Prediction and Estimation of 3D-Repetitive-Trajectories using Kalman Filter, Machine Learning and Curve-Fitting Method

    Authors: Aakriti Agrawal, Aashay Bhise, Rohitkumar Arasanipalai, Lima Agnel Tony, Shuvrangshu Jana, Debasish Ghose

    Abstract: Accurate estimation and prediction of trajectory is essential for the capture of any high speed target. In this paper, an extended Kalman filter (EKF) is used to track the target in the first loop of the trajectory to collect data points and then a combination of machine learning with least-square curve-fitting is used to accurately estimate future positions for the subsequent loops. The EKF estim… ▽ More

    Submitted 31 August, 2020; originally announced September 2020.

    Comments: 11 pages

  39. arXiv:2008.06571  [pdf, other

    cs.PF cs.AR cs.DC

    Toward an End-to-End Auto-tuning Framework in HPC PowerStack

    Authors: Xingfu Wu, Aniruddha Marathe, Siddhartha Jana, Ondrej Vysocky, Jophin John, Andrea Bartolini, Lubomir Riha, Michael Gerndt, Valerie Taylor, Sridutt Bhalachandra

    Abstract: Efficiently utilizing procured power and optimizing performance of scientific applications under power and energy constraints are challenging. The HPC PowerStack defines a software stack to manage power and energy of high-performance computing systems and standardizes the interfaces between different components of the stack. This survey paper presents the findings of a working group focused on the… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Comments: to be published in Energy Efficient HPC State of Practice 2020

  40. arXiv:2007.06029  [pdf, other

    cs.LG stat.ML

    Ensuring Fairness Beyond the Training Data

    Authors: Debmalya Mandal, Samuel Deng, Suman Jana, Jeannette M. Wing, Daniel Hsu

    Abstract: We initiate the study of fair classifiers that are robust to perturbations in the training distribution. Despite recent progress, the literature on fairness has largely ignored the design of fair and robust classifiers. In this work, we develop classifiers that are fair not only with respect to the training distribution, but also for a class of distributions that are weighted perturbations of the… ▽ More

    Submitted 4 November, 2020; v1 submitted 12 July, 2020; originally announced July 2020.

    Comments: 18 pages, 3 figures, To appear at NeurIPS-2020

  41. arXiv:2006.03089  [pdf, other

    cs.LG stat.ML

    Towards Understanding Fast Adversarial Training

    Authors: Bai Li, Shiqi Wang, Suman Jana, Lawrence Carin

    Abstract: Current neural-network-based classifiers are susceptible to adversarial examples. The most empirically successful approach to defending against such adversarial examples is adversarial training, which incorporates a strong self-attack during training to enhance its robustness. This approach, however, is computationally expensive and hence is hard to scale up. A recent work, called fast adversarial… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

  42. MTFuzz: Fuzzing with a Multi-Task Neural Network

    Authors: Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray

    Abstract: Fuzzing is a widely used technique for detecting software bugs and vulnerabilities. Most popular fuzzers generate new inputs using an evolutionary search to maximize code coverage. Essentially, these fuzzers start with a set of seed inputs, mutate them to generate new inputs, and identify the promising inputs using an evolutionary fitness function for further mutation. Despite their success, evolu… ▽ More

    Submitted 11 September, 2020; v1 submitted 25 May, 2020; originally announced May 2020.

    Comments: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2020

  43. arXiv:2005.10561  [pdf, ps, other

    math.ST cs.IT stat.ML

    Extrapolating the profile of a finite population

    Authors: Soham Jana, Yury Polyanskiy, Yihong Wu

    Abstract: We study a prototypical problem in empirical Bayes. Namely, consider a population consisting of $k$ individuals each belonging to one of $k$ types (some types can be empty). Without any structural restrictions, it is impossible to learn the composition of the full population having observed only a small (random) subsample of size $m = o(k)$. Nevertheless, we show that in the sublinear regime of… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

  44. arXiv:2003.07959  [pdf, other

    cs.SE cs.LG cs.PL

    Learning Nonlinear Loop Invariants with Gated Continuous Logic Networks (Extended Version)

    Authors: Jianan Yao, Gabriel Ryan, Justin Wong, Suman Jana, Ronghui Gu

    Abstract: Verifying real-world programs often requires inferring loop invariants with nonlinear constraints. This is especially true in programs that perform many numerical operations, such as control systems for avionics or industrial plants. Recently, data-driven methods for loop invariant inference have shown promise, especially on linear invariants. However, applying data-driven inference to nonlinear l… ▽ More

    Submitted 25 June, 2020; v1 submitted 17 March, 2020; originally announced March 2020.

    Journal ref: In Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 106-120. 2020

  45. arXiv:2003.05733  [pdf, other

    cs.LG stat.ML

    Towards Practical Lottery Ticket Hypothesis for Adversarial Training

    Authors: Bai Li, Shiqi Wang, Yunhan Jia, Yantao Lu, Zhenyu Zhong, Lawrence Carin, Suman Jana

    Abstract: Recent research has proposed the lottery ticket hypothesis, suggesting that for a deep neural network, there exist trainable sub-networks performing equally or better than the original model with commensurate training steps. While this discovery is insightful, finding proper sub-networks requires iterative training and pruning. The high cost incurred limits the applications of the lottery ticket h… ▽ More

    Submitted 5 March, 2020; originally announced March 2020.

  46. arXiv:2002.10509  [pdf, other

    cs.CV cs.LG stat.ML

    HYDRA: Pruning Adversarially Robust Neural Networks

    Authors: Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana

    Abstract: In safety-critical but computationally resource-constrained applications, deep learning faces two key challenges: lack of robustness against adversarial attacks and large neural network size (often millions of parameters). While the research community has extensively explored the use of robust training and network pruning independently to address one of these challenges, only a few recent works ha… ▽ More

    Submitted 10 November, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020

  47. arXiv:2001.00090  [pdf, other

    cs.CY cs.DC eess.SY

    Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap

    Authors: Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, Ashutosh Sabharwal, Shreyas Sundaram, James Weimer, Jennifer Weller

    Abstract: Cyberphysical systems (CPS) are ubiquitous in our personal and professional lives, and they promise to dramatically improve micro-communities (e.g., urban farms, hospitals), macro-communities (e.g., cities and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes). The question that we address in this article pertains to designin… ▽ More

    Submitted 19 December, 2019; originally announced January 2020.

    Comments: 36 pages, 2 figures, NSF-supported workshop on Grand Challenges in Resilience, held at Purdue, March 20-21, 2019

    MSC Class: C.5.3; D.4.5; H.4.0 ACM Class: C.5.3; D.4.5; H.4.0

  48. arXiv:1912.11598  [pdf, other

    cs.CR cs.CY cs.NI

    Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures

    Authors: Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Hank Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari

    Abstract: A set of about 80 researchers, practitioners, and federal agency program managers participated in the NSF-sponsored Grand Challenges in Resilience Workshop held on Purdue campus on March 19-21, 2019. The workshop was divided into three themes: resilience in cyber, cyber-physical, and socio-technical systems. About 30 attendees in all participated in the discussions of cyber resilience. This articl… ▽ More

    Submitted 9 May, 2020; v1 submitted 25 December, 2019; originally announced December 2019.

    ACM Class: C.4; D.4.5

    Journal ref: IEEE Open Journal of the Computer Society, 2020

  49. arXiv:1912.01149  [pdf, other

    cs.CR cs.LG

    Cost-Aware Robust Tree Ensembles for Security Applications

    Authors: Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana

    Abstract: There are various costs for attackers to manipulate the features of security classifiers. The costs are asymmetric across features and to the directions of changes, which cannot be precisely captured by existing cost models based on $L_p$-norm robustness. In this paper, we utilize such domain knowledge to increase the attack cost of evading classifiers, specifically, tree ensemble models that are… ▽ More

    Submitted 22 February, 2021; v1 submitted 2 December, 2019; originally announced December 2019.

    Comments: USENIX Security 2021

  50. arXiv:1909.11542  [pdf, other

    cs.LG cs.SE stat.ML

    CLN2INV: Learning Loop Invariants with Continuous Logic Networks

    Authors: Gabriel Ryan, Justin Wong, Jianan Yao, Ronghui Gu, Suman Jana

    Abstract: Program verification offers a framework for ensuring program correctness and therefore systematically eliminating different classes of bugs. Inferring loop invariants is one of the main challenges behind automated verification of real-world programs which often contain many loops. In this paper, we present Continuous Logic Network (CLN), a novel neural architecture for automatically learning loop… ▽ More

    Submitted 17 October, 2019; v1 submitted 25 September, 2019; originally announced September 2019.