Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–43 of 43 results for author: Pathak, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14987  [pdf, other

    quant-ph cs.CR

    Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation

    Authors: Arindam Dutta, Anirban Pathak

    Abstract: Unconditional security in quantum key distribution (QKD) relies on authenticating the identities of users involved in key distribution. While classical identity authentication schemes were initially utilized in QKD implementations, concerns regarding their vulnerability have prompted the exploration of quantum identity authentication (QIA) protocols. In this study, we introduce a new protocol for… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: A new scheme for quantum identity authentication is proposed

  2. arXiv:2405.11697  [pdf, other

    cs.CY

    AMMeBa: A Large-Scale Survey and Dataset of Media-Based Misinformation In-The-Wild

    Authors: Nicholas Dufour, Arkanath Pathak, Pouya Samangouei, Nikki Hariri, Shashi Deshetti, Andrew Dudfield, Christopher Guess, Pablo Hernández Escayola, Bobby Tran, Mevan Babakar, Christoph Bregler

    Abstract: The prevalence and harms of online misinformation is a perennial concern for internet platforms, institutions and society at large. Over time, information shared online has become more media-heavy and misinformation has readily adapted to these new modalities. The rise of generative AI-based tools, which provide widely-accessible methods for synthesizing realistic audio, images, video and human-li… ▽ More

    Submitted 21 May, 2024; v1 submitted 19 May, 2024; originally announced May 2024.

    Comments: Grammar, spelling corrections. Minor rewording and clarification of one sentence. 24 pages, 31 figures

  3. arXiv:2404.18142  [pdf, other

    quant-ph cs.DS

    Revisiting Majumdar-Ghosh spin chain model and Max-cut problem using variational quantum algorithms

    Authors: Britant, Anirban Pathak

    Abstract: In this work, energy levels of the Majumdar-Ghosh model (MGM) are analyzed up to 15 spins chain in the noisy intermediate-scale quantum framework using noisy simulations. This is a useful model whose exact solution is known for a particular choice of interaction coefficients. We have solved this model for interaction coefficients other than that required for the exactly solvable conditions as this… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: Merits and demerits of using different variational quantum algorithms have been studied for Majumdar-Ghosh model and Max-cut problem

  4. arXiv:2402.04146  [pdf, other

    stat.ML cs.LG

    Interpretable Multi-Source Data Fusion Through Latent Variable Gaussian Process

    Authors: Sandipp Krishnan Ravi, Yigitcan Comlek, Wei Chen, Arjun Pathak, Vipul Gupta, Rajnikant Umretiya, Andrew Hoffman, Ghanshyam Pilania, Piyush Pandita, Sayan Ghosh, Nathaniel Mckeever, Liping Wang

    Abstract: With the advent of artificial intelligence (AI) and machine learning (ML), various domains of science and engineering communites has leveraged data-driven surrogates to model complex systems from numerous sources of information (data). The proliferation has led to significant reduction in cost and time involved in development of superior systems designed to perform specific functionalities. A high… ▽ More

    Submitted 16 February, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: 27 Pages,9 Figures, 3 Supplementary Figures, 2 Supplementary Tables

  5. arXiv:2312.00164  [pdf, other

    cs.CY cs.AI

    Towards Accurate Differential Diagnosis with Large Language Models

    Authors: Daniel McDuff, Mike Schaekermann, Tao Tu, Anil Palepu, Amy Wang, Jake Garrison, Karan Singhal, Yash Sharma, Shekoofeh Azizi, Kavita Kulkarni, Le Hou, Yong Cheng, Yun Liu, S Sara Mahdavi, Sushant Prakash, Anupam Pathak, Christopher Semturs, Shwetak Patel, Dale R Webster, Ewa Dominowska, Juraj Gottweis, Joelle Barral, Katherine Chou, Greg S Corrado, Yossi Matias , et al. (3 additional authors not shown)

    Abstract: An accurate differential diagnosis (DDx) is a cornerstone of medical care, often reached through an iterative process of interpretation that combines clinical history, physical examination, investigations and procedures. Interactive interfaces powered by Large Language Models (LLMs) present new opportunities to both assist and automate aspects of this process. In this study, we introduce an LLM op… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  6. arXiv:2310.04988  [pdf, other

    cs.AI

    The Troubling Emergence of Hallucination in Large Language Models -- An Extensive Definition, Quantification, and Prescriptive Remediations

    Authors: Vipula Rawte, Swagata Chakraborty, Agnibh Pathak, Anubhav Sarkar, S. M Towhidul Islam Tonmoy, Aman Chadha, Amit P. Sheth, Amitava Das

    Abstract: The recent advancements in Large Language Models (LLMs) have garnered widespread acclaim for their remarkable emerging capabilities. However, the issue of hallucination has parallelly emerged as a by-product, posing significant concerns. While some recent endeavors have been made to identify and mitigate different types of hallucination, there has been a limited emphasis on the nuanced categorizat… ▽ More

    Submitted 22 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  7. arXiv:2305.17523  [pdf

    cs.LG q-fin.PM

    A Comparative Analysis of Portfolio Optimization Using Mean-Variance, Hierarchical Risk Parity, and Reinforcement Learning Approaches on the Indian Stock Market

    Authors: Jaydip Sen, Aditya Jaiswal, Anshuman Pathak, Atish Kumar Majee, Kushagra Kumar, Manas Kumar Sarkar, Soubhik Maji

    Abstract: This paper presents a comparative analysis of the performances of three portfolio optimization approaches. Three approaches of portfolio optimization that are considered in this work are the mean-variance portfolio (MVP), hierarchical risk parity (HRP) portfolio, and reinforcement learning-based portfolio. The portfolios are trained and tested over several stock data and their performances are com… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

    Comments: The report is 52 pages long. It is based on the capstone project done in the post graduate course of data science in Praxis Business School, Kolkata, India, of the Autumn Batch, 2022

  8. arXiv:2304.00115  [pdf

    cs.CL

    Extracting Thyroid Nodules Characteristics from Ultrasound Reports Using Transformer-based Natural Language Processing Methods

    Authors: Aman Pathak, Zehao Yu, Daniel Paredes, Elio Paul Monsour, Andrea Ortiz Rocha, Juan P. Brito, Naykky Singh Ospina, Yonghui Wu

    Abstract: The ultrasound characteristics of thyroid nodules guide the evaluation of thyroid cancer in patients with thyroid nodules. However, the characteristics of thyroid nodules are often documented in clinical narratives such as ultrasound reports. Previous studies have examined natural language processing (NLP) methods in extracting a limited number of characteristics (<9) using rule-based NLP systems.… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

  9. arXiv:2303.15533  [pdf, other

    cs.LG cs.CV

    Sequential training of GANs against GAN-classifiers reveals correlated "knowledge gaps" present among independently trained GAN instances

    Authors: Arkanath Pathak, Nicholas Dufour

    Abstract: Modern Generative Adversarial Networks (GANs) generate realistic images remarkably well. Previous work has demonstrated the feasibility of "GAN-classifiers" that are distinct from the co-trained discriminator, and operate on images generated from a frozen GAN. That such classifiers work at all affirms the existence of "knowledge gaps" (out-of-distribution artifacts across samples) present in GAN t… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  10. arXiv:2212.13089  [pdf, other

    quant-ph cs.CR

    New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate

    Authors: Arindam Dutta, Anirban Pathak

    Abstract: Here we present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source. Thus, the proposed protocols can be implemented using realistic single photon sources which are commercially available. The schemes are shown to be secure against multiple attacks (e.g., intercept resend attack and a class of collective attacks). Bounds o… ▽ More

    Submitted 26 September, 2023; v1 submitted 26 December, 2022; originally announced December 2022.

    Comments: Two practical protocols for quantum key distribution (QKD) are proposed and rigorously analyzed for bounds on the key rates

  11. arXiv:2212.12861  [pdf, other

    quant-ph cs.GR

    An efficient quantum-classical hybrid algorithm for distorted alphanumeric character identification

    Authors: Ankur Pal, Abhishek Shukla, Anirban Pathak

    Abstract: An algorithm for image processing is proposed. The proposed algorithm, which can be viewed as a quantum-classical hybrid algorithm, can transform a low-resolution bitonal image of a character from the set of alphanumeric characters (A-Z, 0-9) into a high-resolution image. The quantum part of the proposed algorithm fruitfully utilizes a variant of Grover's search algorithm, known as the fixed point… ▽ More

    Submitted 25 December, 2022; originally announced December 2022.

    Comments: A quantum-assisted algorithm for optical character recognition (OCR) is proposed using fixed point Grover's algorithm

  12. arXiv:2211.02378  [pdf, other

    cs.AR

    A survey on scheduling and mapping techniques in 3D Network-on-chip

    Authors: Simran Preet Kaur, Manojit Ghose, Ananya Pathak, Rutuja Patole

    Abstract: Network-on-Chips (NoCs) have been widely employed in the design of multiprocessor system-on-chips (MPSoCs) as a scalable communication solution. NoCs enable communications between on-chip Intellectual Property (IP) cores and allow those cores to achieve higher performance by outsourcing their communication tasks. Mapping and Scheduling methodologies are key elements in assigning application tasks,… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  13. arXiv:2206.03182  [pdf, other

    quant-ph cs.CR

    Anonymous voting scheme using quantum assisted blockchain

    Authors: Sandeep Mishra, Kishore Thapliyal, S Krish Rewanth, Abhishek Parakh, Anirban Pathak

    Abstract: Voting forms the most important tool for arriving at a decision in any institution. The changing needs of the civilization currently demands a practical yet secure electronic voting system, but any flaw related to the applied voting technology can lead to tampering of the results with the malicious outcomes. Currently, blockchain technology due to its transparent structure forms an emerging area o… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: We propose an anonymous voting scheme based on quantum assisted blockchain by enhancing the advantages offered by blockchain with the quantum resources such as quantum random number generators and quantum key distribution

  14. arXiv:2203.12496  [pdf, other

    quant-ph cs.CR

    Quantum and Semi-Quantum Lottery: Strategies and Advantages

    Authors: Sandeep Mishra, Anirban Pathak

    Abstract: Lottery is a game in which multiple players take chances in the hope of getting some rewards in cash or kind. In addition, from the time of the early civilizations, lottery has also been considered as an apposite method to allocate scarce resources. Technically, any scheme for lottery needs to be fair and secure, but none of the classical schemes for lottery are unconditionally secure and fair. As… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: Lottery can be fair and unconditionally secure if implemented using quantum resources in appropriate manner

  15. JARVix at SemEval-2022 Task 2: It Takes One to Know One? Idiomaticity Detection using Zero and One-Shot Learning

    Authors: Yash Jakhotiya, Vaibhav Kumar, Ashwin Pathak, Raj Shah

    Abstract: Large Language Models have been successful in a wide variety of Natural Language Processing tasks by capturing the compositionality of the text representations. In spite of their great success, these vector representations fail to capture meaning of idiomatic multi-word expressions (MWEs). In this paper, we focus on the detection of idiomatic expressions by using binary classification. We use a da… ▽ More

    Submitted 23 June, 2022; v1 submitted 4 February, 2022; originally announced February 2022.

    Comments: Accepted at the 16th International Workshop on Semantic Evaluation (SemEval-2022), NAACL. Best Project Award for Georgia Tech CS 7650. Code available at https://github.com/ashwinpathak20/Idiomaticity_Detection_Using_Few_Shot_Learning

  16. arXiv:2112.04234  [pdf, other

    quant-ph cs.CR

    A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

    Authors: Arindam Dutta, Anirban Pathak

    Abstract: Secure communication has achieved a new dimension with the advent of the schemes of quantum key distribution (QKD) as in contrast to classical cryptography, quantum cryptography can provide unconditional security. However, a successful implementation of a scheme of QKD requires identity authentication as a prerequisite. A security loophole in the identity authentication scheme may lead to the vuln… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 3 New protocols of quantum identity authentication are proposed and the existing protocols are reviewed and classified

  17. arXiv:2111.09028  [pdf, other

    quant-ph cs.CR

    United Nation Security Council in Quantum World: Experimental Realization of Quantum Anonymous Veto Protocols using IBM Quantum Computer

    Authors: Satish Kumar, Anirban Pathak

    Abstract: United Nation (UN) security council has fifteen members, out of which five permanent members of the council can use their veto power against any unfavorable decision taken by the council. In certain situation, a member using right to veto may prefer to remain anonymous. This need leads to the requirement of the protocols for anonymous veto which can be viewed as a special type of voting. Recently,… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    Comments: Two schemes of quantum anonymous veto which may be of great use to United Nation and other similar organizations, are implemented using IBM quantum computer

  18. arXiv:2111.01706  [pdf, other

    cs.CL cs.AI cs.IR

    Assessing Effectiveness of Using Internal Signals for Check-Worthy Claim Identification in Unlabeled Data for Automated Fact-Checking

    Authors: Archita Pathak, Rohini K. Srihari

    Abstract: While recent work on automated fact-checking has focused mainly on verifying and explaining claims, for which the list of claims is readily available, identifying check-worthy claim sentences from a text remains challenging. Current claim identification models rely on manual annotations for each sentence in the text, which is an expensive task and challenging to conduct on a frequent basis across… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: 7 pages, 2 figures

  19. Decentralised Trustworthy Collaborative Intrusion Detection System for IoT

    Authors: Guntur Dharma Putra, Volkan Dedeoglu, Abhinav Pathak, Salil S. Kanhere, Raja Jurdak

    Abstract: Intrusion Detection Systems (IDS) have been the industry standard for securing IoT networks against known attacks. To increase the capability of an IDS, researchers proposed the concept of blockchain-based Collaborative-IDS (CIDS), wherein blockchain acts as a decentralised platform allowing collaboration between CIDS nodes to share intrusion related information, such as intrusion alarms and detec… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 8 pages, 7 figures, accepted to IEEE Blockchain 2021

  20. Hide and seek with quantum resources: New and modified protocols for quantum steganography

    Authors: Rohan Joshi, Akhil Gupta, Kishore Thapliyal, R Srikanth, Anirban Pathak

    Abstract: Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that the eavesdropper is unaware of its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, it has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of th… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: It's shown that discrete modulation continuous variable QKD is useful in designing protocols of steganography free from weaknesses of an existing protocol

    Journal ref: Quant. Infor. Proc. 21 (2022) 164

  21. Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages

    Authors: Pramod Asagodu, Kishore Thapliyal, Anirban Pathak

    Abstract: A family of existing protocols for quantum sealed-bid auction is critically analyzed, and it is shown that they are vulnerable under several attacks (e.g., the participant's and non-participant's attacks as well as the collusion attack of participants) and some of the claims made in these works are not correct. We obtained the bounds on the success probability of an eavesdropper in accessing the s… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

    Comments: First semi-quantum protocol for secure sealed-bid auction is proposed

    Journal ref: Quant. Infor. Proc. 21 (2022) 185

  22. A Method to Analyze Multiple Social Identities in Twitter Bios

    Authors: Arjunil Pathak, Navid Madani, Kenneth Joseph

    Abstract: Twitter users signal social identity in their profile descriptions, or bios, in a number of important but complex ways that are not well-captured by existing characterizations of how identity is expressed in language. Better ways of defining and measuring these expressions may therefore be useful both in understanding how social identity is expressed in text, and how the self is presented on Twitt… ▽ More

    Submitted 24 August, 2021; v1 submitted 29 July, 2021; originally announced July 2021.

    Comments: Accepted CSCW'21

  23. arXiv:2102.02335  [pdf, other

    cs.CL cs.AI cs.IR

    Self-Supervised Claim Identification for Automated Fact Checking

    Authors: Archita Pathak, Mohammad Abuzar Shaikh, Rohini Srihari

    Abstract: We propose a novel, attention-based self-supervised approach to identify "claim-worthy" sentences in a fake news article, an important first step in automated fact-checking. We leverage "aboutness" of headline and content using attention mechanism for this task. The identified claims can be used for downstream task of claim verification for which we are releasing a benchmark dataset of manually se… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: 15 pages, 4 figures, Accepted at ICON 2020

  24. arXiv:2012.15023  [pdf

    cs.CL

    Language Identification of Devanagari Poems

    Authors: Priyankit Acharya, Aditya Ku. Pathak, Rakesh Ch. Balabantaray, Anil Ku. Singh

    Abstract: Language Identification is a very important part of several text processing pipelines. Extensive research has been done in this field. This paper proposes a procedure for automatic language identification of poems for poem analysis task, consisting of 10 Devanagari based languages of India i.e. Angika, Awadhi, Braj, Bhojpuri, Chhattisgarhi, Garhwali, Haryanvi, Hindi, Magahi, and Maithili. We colla… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

  25. arXiv:2010.00038  [pdf, ps, other

    cs.CL cs.IR

    AbuseAnalyzer: Abuse Detection, Severity and Target Prediction for Gab Posts

    Authors: Mohit Chandra, Ashwin Pathak, Eesha Dutta, Paryul Jain, Manish Gupta, Manish Shrivastava, Ponnurangam Kumaraguru

    Abstract: While extensive popularity of online social media platforms has made information dissemination faster, it has also resulted in widespread online abuse of different types like hate speech, offensive language, sexist and racist opinions, etc. Detection and curtailment of such abusive content is critical for avoiding its psychological impact on victim communities, and thereby preventing hate crimes.… ▽ More

    Submitted 8 October, 2020; v1 submitted 30 September, 2020; originally announced October 2020.

    Comments: Extended version for our paper accepted at COLING 2020

  26. arXiv:2005.04570  [pdf

    cs.AI cs.RO eess.SY

    Belief Rule Based Expert System to Identify the Crime Zones

    Authors: Abhijit Pathak, Abrar Hossain Tasin

    Abstract: This paper focuses on Crime zone Identification. Then, it clarifies how we conducted the Belief Rule Base algorithm to produce interesting frequent patterns for crime hotspots. The paper also shows how we used an expert system to forecast potential types of crime. In order to further analyze the crime datasets, the paper introduces an analysis study by combining our findings of the Chittagong crim… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

    Comments: 6 pages, 7 figures

  27. Noisy three-player dilemma game: Robustness of the quantum advantage

    Authors: Pranav Kairon, Kishore Thapliyal, R. Srikanth, Anirban Pathak

    Abstract: Games involving quantum strategies often yield higher payoff. Here, we study a practical realization of the three-player dilemma game using the superconductivity-based quantum processors provided by IBM Q Experience. We analyze the persistence of the quantum advantage under corruption of the input states and how this depends on parameters of the payoff table. Specifically, experimental fidelity an… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: Persistence of the quantum advantage under corruption of the input states is analyzed for a 3-player dilemma game implemented using superconductivity-based quantum processors

    Journal ref: Quant. Infor. Process 19 (2020) 327

  28. arXiv:2002.05184  [pdf, other

    quant-ph cs.CR physics.optics

    Optical designs for realization of a set of schemes for quantum cryptography

    Authors: Mitali Sisodia, Kishore Thapliyal, Anirban Pathak

    Abstract: Several quantum cryptographic schemes have been proposed and realized experimentally in the past. However, even with an advancement in quantum technology and escalated interest in the designing of direct secure quantum communication schemes there are not many experimental implementations of these cryptographic schemes. In this paper, we have provided a set of optical circuits for such quantum cryp… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: Explicit optical designs for the implementation of secure direct quantum communication are provided

    Journal ref: Optical and Quantum Electronics 53 (2021) 206

  29. arXiv:1911.01655  [pdf, other

    cs.CV

    High Fidelity Video Prediction with Large Stochastic Recurrent Neural Networks

    Authors: Ruben Villegas, Arkanath Pathak, Harini Kannan, Dumitru Erhan, Quoc V. Le, Honglak Lee

    Abstract: Predicting future video frames is extremely challenging, as there are many factors of variation that make up the dynamics of how frames change through time. Previously proposed solutions require complex inductive biases inside network architectures with highly specialized computation, including segmentation masks, optical flow, and foreground and background separation. In this work, we question if… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

    Comments: In Advances in Neural Information Processing Systems (NeurIPS), 2019

  30. Continuous variable direct secure quantum communication using Gaussian states

    Authors: Srikara S, Kishore Thapliyal, Anirban Pathak

    Abstract: Continuous variable one-way and controlled-two-way secure direct quantum communication schemes have been designed using Gaussian states. Specifically, a scheme for continuous variable quantum secure direct communication and another scheme for continuous variable controlled quantum dialogue are proposed using single-mode squeezed coherent states. The security of the proposed schemes against a set o… ▽ More

    Submitted 9 June, 2020; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: Continuous Variable protocols are designed for one-way and controlled-two-way secure direct quantum communication using single-mode squeezed coherent states

    Journal ref: Quantum Information Processing (2020) 19:132

  31. An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things

    Authors: Utsav Banerjee, Abhishek Pathak, Anantha P. Chandrakasan

    Abstract: This paper presents a configurable lattice cryptography processor which enables quantum-resistant security protocols for IoT. Efficient sampling architectures, coupled with a low-power SHA-3 core, provide two orders of magnitude energy savings over software. A single-port RAM-based NTT architecture is proposed, which provides ~124k-gate area savings. This is the first ASIC implementation which dem… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: Published in 2019 IEEE International Solid-State Circuits Conference (ISSCC)

  32. arXiv:1901.08625  [pdf

    cs.CL

    Automatic Parallel Corpus Creation for Hindi-English News Translation Task

    Authors: Aditya Kumar Pathak, Priyankit Acharya, Dilpreet Kaur, Rakesh Chandra Balabantaray

    Abstract: The parallel corpus for multilingual NLP tasks, deep learning applications like Statistical Machine Translation Systems is very important. The parallel corpus of Hindi-English language pair available for news translation task till date is of very limited size as per the requirement of the systems are concerned. In this work we have developed an automatic parallel corpus generation system prototype… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  33. Optimization of Circuits for IBM's five-qubit Quantum Computers

    Authors: Gerhard W. Dueck, Anirban Pathak, Md Mazder Rahman, Abhishek Shukla, Anindita Banerjee

    Abstract: IBM has made several quantum computers available to researchers around the world via cloud services. Two architectures with five qubits, one with 16, and one with 20 qubits are available to run experiments. The IBM architectures implement gates from the Clifford+T gate library. However, each architecture only implements a subset of the possible CNOT gates. In this paper, we show how Clifford+T cir… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

    Journal ref: 21st Euromicro Conference on Digital System Design, Prague, Czech Republic, August 2018, pp. 680-684

  34. Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce

    Authors: Kishore Thapliyal, Anirban Pathak

    Abstract: A set of quantum protocols for online shopping is proposed and analyzed to establish that it is possible to perform secure online shopping using different types of quantum resources. Specifically, a single photon based, a Bell state based and two 3-qubit entangled state based quantum online shopping schemes are proposed. The Bell state based scheme, being a completely orthogonal state based protoc… ▽ More

    Submitted 21 July, 2018; originally announced July 2018.

    Comments: It's shown that quantum e-commerce is not a difficult task, and it can be done in various ways

    Journal ref: Quant. Infor. Process. 18 (2019) 191

  35. arXiv:1804.03910  [pdf, other

    cs.CR

    How vulnerable are the Indian banks: A cryptographers' view

    Authors: Anirban Pathak, Rishi Dutt Sharma, Dhananjoy Dey

    Abstract: With the advent of e-commerce and online banking it has become extremely important that the websites of the financial institutes (especially, banks) implement up-to-date measures of cyber security (in accordance with the recommendations of the regulatory authority) and thus circumvent the possibilities of financial frauds that may occur due to vulnerabilities of the website. Here, we systematicall… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: Security of online banking services provided by Indian bank has been analyzed from the perspective of cryptography

  36. arXiv:1708.07303  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    Learning 6-DOF Grasping Interaction via Deep Geometry-aware 3D Representations

    Authors: Xinchen Yan, Jasmine Hsu, Mohi Khansari, Yunfei Bai, Arkanath Pathak, Abhinav Gupta, James Davidson, Honglak Lee

    Abstract: This paper focuses on the problem of learning 6-DOF grasping with a parallel jaw gripper in simulation. We propose the notion of a geometry-aware representation in grasping based on the assumption that knowledge of 3D geometry is at the heart of interaction. Our key idea is constraining and regularizing grasping interaction learning through 3D geometry prediction. Specifically, we formulate the le… ▽ More

    Submitted 14 June, 2018; v1 submitted 24 August, 2017; originally announced August 2017.

    Comments: Published at ICRA 2018

  37. arXiv:1702.08715  [pdf, ps, other

    quant-ph cs.ET

    Building a Completely Reversible Computer

    Authors: Martin Lukac, Gerhard W. Dueck, Michitaka Kameyama, Anirban Pathak

    Abstract: A critical analysis of the feasibility of reversible computing is performed. The key question is: Is it possible to build a completely reversible computer? A closer look into the internal aspects of the reversible computing as well as the external constraints such as the second law of thermodynamics has demonstrated that several difficulties would have to be solved before reversible computer is be… ▽ More

    Submitted 28 February, 2017; originally announced February 2017.

    Comments: 15 pages, 8 figures, 2 tables

  38. Quantum sealed-bid auction using a modified scheme for multiparty circular quantum key agreement

    Authors: Rishi Dutt Sharma, Kishore Thapliyal, Anirban Pathak

    Abstract: A feasible, secure and collusion-attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multi-party circular quantum key agreement. In the proposed protocol, the set of all ($n$) bidders is grouped in to $l$ subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts… ▽ More

    Submitted 28 December, 2016; originally announced December 2016.

    Comments: 10 pages, 2 figures

    Journal ref: Quantum Inf. Process. 16, 169 (2017)

  39. arXiv:1612.05420  [pdf, other

    cs.CL

    A Two-Phase Approach Towards Identifying Argument Structure in Natural Language

    Authors: Arkanath Pathak, Pawan Goyal, Plaban Bhowmick

    Abstract: We propose a new approach for extracting argument structure from natural language texts that contain an underlying argument. Our approach comprises of two phases: Score Assignment and Structure Prediction. The Score Assignment phase trains models to classify relations between argument units (Support, Attack or Neutral). To that end, different training strategies have been explored. We identify dif… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

    Comments: Presented at NLPTEA 2016, held in conjunction with COLING 2016

  40. arXiv:1602.03379  [pdf, ps, other

    q-bio.QM cs.CV q-bio.NC

    Comparison of feature extraction and dimensionality reduction methods for single channel extracellular spike sorting

    Authors: Anupam Mitra, Anagh Pathak, Kaushik Majumdar

    Abstract: Spikes in the membrane electrical potentials of neurons play a major role in the functioning of nervous systems of animals. Obtaining the spikes from different neurons has been a challenging problem for decades. Several schemes have been proposed for spike sorting to isolate the spikes of individual neurons from electrical recordings in extracellular media. However, there is much scope for improve… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: 12 pages, 2 figures

  41. arXiv:1102.4021  [pdf, other

    cs.LG cs.CR

    Privacy Preserving Spam Filtering

    Authors: Manas A. Pathak, Mehrbod Sharifi, Bhiksha Raj

    Abstract: Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserving spam filtering system, where the server is able to train and evaluate a logistic regression based spam classi… ▽ More

    Submitted 18 September, 2011; v1 submitted 19 February, 2011; originally announced February 2011.

    Comments: 9 pages

  42. arXiv:1005.0063  [pdf, ps, other

    stat.ML cs.CR cs.LG

    Large Margin Multiclass Gaussian Classification with Differential Privacy

    Authors: Manas A. Pathak, Bhiksha Raj

    Abstract: As increasing amounts of sensitive personal information is aggregated into data repositories, it has become important to develop mechanisms for processing the data without revealing information about individual data instances. The differential privacy model provides a framework for the development and theoretical analysis of such mechanisms. In this paper, we propose an algorithm for learning a di… ▽ More

    Submitted 28 July, 2010; v1 submitted 1 May, 2010; originally announced May 2010.

    Comments: 14 pages

    Journal ref: Proceedings of the ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning, 2010

  43. arXiv:1002.3671  [pdf, other

    cs.CR cs.DB

    Privacy-Preserving Protocols for Eigenvector Computation

    Authors: Manas A. Pathak, Bhiksha Raj

    Abstract: In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with ran… ▽ More

    Submitted 28 July, 2010; v1 submitted 19 February, 2010; originally announced February 2010.

    Comments: 14 pages

    Journal ref: Proceedings of ECML/PKDD Workshop on Privacy and Security issues in Data Mining and Machine Learning, 2010