Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–32 of 32 results for author: Sengupta, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16739  [pdf, other

    cs.LG cs.AI eess.SY

    Oracle-Efficient Reinforcement Learning for Max Value Ensembles

    Authors: Marcel Hussing, Michael Kearns, Aaron Roth, Sikata Bela Sengupta, Jessica Sorrell

    Abstract: Reinforcement learning (RL) in large or infinite state spaces is notoriously challenging, both theoretically (where worst-case sample and computational complexities must scale with state space cardinality) and experimentally (where function approximation and policy gradient techniques often scale poorly and suffer from instability and high variance). One line of research attempting to address thes… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  2. arXiv:2307.01403  [pdf, other

    cs.AI cs.LG

    Learning Multi-Agent Communication with Contrastive Learning

    Authors: Yat Long Lo, Biswa Sengupta, Jakob Foerster, Michael Noukhovitch

    Abstract: Communication is a powerful tool for coordination in multi-agent RL. But inducing an effective, common language is a difficult challenge, particularly in the decentralized setting. In this work, we introduce an alternative perspective where communicative messages sent between agents are considered as different incomplete views of the environment state. By examining the relationship between message… ▽ More

    Submitted 1 February, 2024; v1 submitted 3 July, 2023; originally announced July 2023.

    Comments: The 12th International Conference on Learning Representations (ICLR)

  3. arXiv:2203.07832  [pdf, other

    cs.LG cs.AI cs.MA

    Learning to Infer Belief Embedded Communication

    Authors: Guo Ye, Han Liu, Biswa Sengupta

    Abstract: In multi-agent collaboration problems with communication, an agent's ability to encode their intention and interpret other agents' strategies is critical for planning their future actions. This paper introduces a novel algorithm called Intention Embedded Communication (IEC) to mimic an agent's language learning ability. IEC contains a perception module for decoding other agents' intentions in resp… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

  4. arXiv:2203.07413  [pdf, other

    cs.LG cs.AI

    Switch Trajectory Transformer with Distributional Value Approximation for Multi-Task Reinforcement Learning

    Authors: Qinjie Lin, Han Liu, Biswa Sengupta

    Abstract: We propose SwitchTT, a multi-task extension to Trajectory Transformer but enhanced with two striking features: (i) exploiting a sparsely activated model to reduce computation cost in multi-task offline model learning and (ii) adopting a distributional trajectory value estimator that improves policy performance, especially in sparse reward settings. These two enhancements make SwitchTT suitable for… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  5. arXiv:2203.07092  [pdf, other

    cs.LG cs.MA stat.ML

    The Multi-Agent Pickup and Delivery Problem: MAPF, MARL and Its Warehouse Applications

    Authors: Tim Tsz-Kit Lau, Biswa Sengupta

    Abstract: We study two state-of-the-art solutions to the multi-agent pickup and delivery (MAPD) problem based on different principles -- multi-agent path-finding (MAPF) and multi-agent reinforcement learning (MARL). Specifically, a recent MAPF algorithm called conflict-based search (CBS) and a current MARL algorithm called shared experience actor-critic (SEAC) are studied. While the performance of these alg… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  6. arXiv:2203.03480  [pdf, other

    cs.LG cs.MA

    Reinforcement Learning for Location-Aware Scheduling

    Authors: Stelios Stavroulakis, Biswa Sengupta

    Abstract: Recent techniques in dynamical scheduling and resource management have found applications in warehouse environments due to their ability to organize and prioritize tasks in a higher temporal resolution. The rise of deep reinforcement learning, as a learning paradigm, has enabled decentralized agent populations to discover complex coordination strategies. However, training multiple agents simultane… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

  7. arXiv:2203.03344  [pdf, other

    cs.AI

    Learning to Ground Decentralized Multi-Agent Communication with Contrastive Learning

    Authors: Yat Long Lo, Biswa Sengupta

    Abstract: For communication to happen successfully, a common language is required between agents to understand information communicated by one another. Inducing the emergence of a common language has been a difficult challenge to multi-agent learning systems. In this work, we introduce an alternative perspective to the communicative messages sent between agents, considering them as different incomplete view… ▽ More

    Submitted 7 March, 2022; originally announced March 2022.

    Journal ref: EmeCom at ICLR 2022

  8. arXiv:2203.03021  [pdf, other

    cs.LG cs.MA stat.ML

    Hierarchically Structured Scheduling and Execution of Tasks in a Multi-Agent Environment

    Authors: Diogo S. Carvalho, Biswa Sengupta

    Abstract: In a warehouse environment, tasks appear dynamically. Consequently, a task management system that matches them with the workforce too early (e.g., weeks in advance) is necessarily sub-optimal. Also, the rapidly increasing size of the action space of such a system consists of a significant problem for traditional schedulers. Reinforcement learning, however, is suited to deal with issues requiring m… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

  9. arXiv:2106.09385   

    cs.LG cs.CV

    On Deep Neural Network Calibration by Regularization and its Impact on Refinement

    Authors: Aditya Singh, Alessandro Bay, Biswa Sengupta, Andrea Mirabile

    Abstract: Deep neural networks have been shown to be highly miscalibrated. often they tend to be overconfident in their predictions. It poses a significant challenge for safety-critical systems to utilise deep neural networks (DNNs), reliably. Many recently proposed approaches to mitigate this have demonstrated substantial progress in improving DNN calibration. However, they hardly touch upon refinement, wh… ▽ More

    Submitted 4 May, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: There is an error with the assumption of proof required for equation 8 in section 2.1 which invalidates the results

  10. arXiv:1902.09183  [pdf, other

    cs.CL

    Joint Multi-Domain Learning for Automatic Short Answer Grading

    Authors: Swarnadeep Saha, Tejas I. Dhamecha, Smit Marvaniya, Peter Foltz, Renuka Sindhgatta, Bikram Sengupta

    Abstract: One of the fundamental challenges towards building any intelligent tutoring system is its ability to automatically grade short student answers. A typical automatic short answer grading system (ASAG) grades student answers across multiple domains (or subjects). Grading student answers requires building a supervised machine learning model that evaluates the similarity of the student answer with the… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: 11 pages

  11. arXiv:1806.01351  [pdf, other

    cs.CL cs.CY cs.IR

    Document Chunking and Learning Objective Generation for Instruction Design

    Authors: Khoi-Nguyen Tran, Jey Han Lau, Danish Contractor, Utkarsh Gupta, Bikram Sengupta, Christopher J. Butler, Mukesh Mohania

    Abstract: Instructional Systems Design is the practice of creating of instructional experiences that make the acquisition of knowledge and skill more efficient, effective, and appealing. Specifically in designing courses, an hour of training material can require between 30 to 500 hours of effort in sourcing and organizing reference data for use in just the preparation of course material. In this paper, we p… ▽ More

    Submitted 5 August, 2018; v1 submitted 1 June, 2018; originally announced June 2018.

    Comments: Proceedings of the 11th International Conference on Education Data Mining (EDM 2018)

  12. arXiv:1805.02970  [pdf, other

    cs.CR

    An Efficient Secure Distributed Cloud Storage for Append-only Data

    Authors: Binanda Sengupta, Nishant Nikam, Sushmita Ruj, Srinivasan Narayanamurthy, Siddhartha Nandi

    Abstract: Cloud computing enables users (clients) to outsource large volume of their data to cloud servers. Secure distributed cloud storage schemes ensure that multiple servers store these data in a reliable and untampered fashion. We propose an idea to construct such a scheme for static data by encoding data blocks (using error-correcting codes) and then attaching authentication information (tags) to thes… ▽ More

    Submitted 3 June, 2018; v1 submitted 8 May, 2018; originally announced May 2018.

    Comments: A preliminary version of this paper has been accepted in IEEE CLOUD 2018

  13. arXiv:1804.11313  [pdf, other

    cs.NE math.DS stat.ML

    How Robust are Deep Neural Networks?

    Authors: Biswa Sengupta, Karl J. Friston

    Abstract: Convolutional and Recurrent, deep neural networks have been successful in machine learning systems for computer vision, reinforcement learning, and other allied fields. However, the robustness of such neural networks is seldom apprised, especially after high classification accuracy has been attained. In this paper, we evaluate the robustness of three recurrent neural networks to tiny perturbations… ▽ More

    Submitted 30 April, 2018; originally announced April 2018.

  14. arXiv:1712.04417  [pdf, ps, other

    cs.CR

    Keyword-Based Delegable Proofs of Storage

    Authors: Binanda Sengupta, Sushmita Ruj

    Abstract: Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. However, a large fraction of the data files the client outsources to the server is often archival in nature that the client uses for backup purposes and accesses less frequently. An untrusted server can thus… ▽ More

    Submitted 25 September, 2018; v1 submitted 12 December, 2017; originally announced December 2017.

    Comments: A preliminary version of this work has been published in International Conference on Information Security Practice and Experience (ISPEC 2018)

  15. Cloud Data Auditing Using Proofs of Retrievability

    Authors: Binanda Sengupta, Sushmita Ruj

    Abstract: Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious. Data auditing is performed on the outsourced data to resolve this issue. Moreover, the client may want all her data to be stored untampered. In this chapter, we describe… ▽ More

    Submitted 16 November, 2017; originally announced November 2017.

    Comments: A version has been published as a book chapter in Guide to Security Assurance for Cloud Computing (Springer International Publishing Switzerland 2015)

  16. arXiv:1711.05175  [pdf, other

    cs.CV

    Adversarial Information Factorization

    Authors: Antonia Creswell, Yumnah Mohamied, Biswa Sengupta, Anil A Bharath

    Abstract: We propose a novel generative model architecture designed to learn representations for images that factor out a single attribute from the rest of the representation. A single object may have many attributes which when altered do not change the identity of the object itself. Consider the human face; the identity of a particular person is independent of whether or not they happen to be wearing glass… ▽ More

    Submitted 28 September, 2018; v1 submitted 14 November, 2017; originally announced November 2017.

  17. arXiv:1711.02879  [pdf, other

    cs.LG cs.CR

    LatentPoison - Adversarial Attacks On The Latent Space

    Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta

    Abstract: Robustness and security of machine learning (ML) systems are intertwined, wherein a non-robust ML system (classifiers, regressors, etc.) can be subject to attacks using a wide variety of exploits. With the advent of scalable deep learning methodologies, a lot of emphasis has been put on the robustness of supervised, unsupervised and reinforcement learning algorithms. Here, we study the robustness… ▽ More

    Submitted 8 November, 2017; originally announced November 2017.

    Comments: Submitted to ICLR 2018

  18. arXiv:1710.09363  [pdf, other

    stat.ML cs.LG

    GeoSeq2Seq: Information Geometric Sequence-to-Sequence Networks

    Authors: Alessandro Bay, Biswa Sengupta

    Abstract: The Fisher information metric is an important foundation of information geometry, wherein it allows us to approximate the local geometry of a probability distribution. Recurrent neural networks such as the Sequence-to-Sequence (Seq2Seq) networks that have lately been used to yield state-of-the-art performance on speech translation or image captioning have so far ignored the geometry of the latent… ▽ More

    Submitted 5 January, 2018; v1 submitted 25 October, 2017; originally announced October 2017.

  19. Generative Adversarial Networks: An Overview

    Authors: Antonia Creswell, Tom White, Vincent Dumoulin, Kai Arulkumaran, Biswa Sengupta, Anil A Bharath

    Abstract: Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transf… ▽ More

    Submitted 19 October, 2017; originally announced October 2017.

    Comments: Accepted in the IEEE Signal Processing Magazine Special Issue on Deep Learning for Visual Understanding

  20. arXiv:1710.04211  [pdf, other

    cs.LG cs.DM cs.NE stat.ML

    StackSeq2Seq: Dual Encoder Seq2Seq Recurrent Networks

    Authors: Alessandro Bay, Biswa Sengupta

    Abstract: A widely studied non-deterministic polynomial time (NP) hard problem lies in finding a route between the two nodes of a graph. Often meta-heuristics algorithms such as $A^{*}$ are employed on graphs with a large number of nodes. Here, we propose a deep recurrent neural network architecture based on the Sequence-2-Sequence (Seq2Seq) model, widely used, for instance in text translation. Particularly… ▽ More

    Submitted 16 January, 2018; v1 submitted 11 October, 2017; originally announced October 2017.

  21. arXiv:1709.02194  [pdf, other

    stat.ML cs.DM cs.LG

    Approximating meta-heuristics with homotopic recurrent neural networks

    Authors: Alessandro Bay, Biswa Sengupta

    Abstract: Much combinatorial optimisation problems constitute a non-polynomial (NP) hard optimisation problem, i.e., they can not be solved in polynomial time. One such problem is finding the shortest route between two nodes on a graph. Meta-heuristic algorithms such as $A^{*}$ along with mixed-integer programming (MIP) methods are often employed for these problems. Our work demonstrates that it is possible… ▽ More

    Submitted 7 September, 2017; originally announced September 2017.

  22. arXiv:1708.06250  [pdf, other

    cs.CV cs.NE stat.CO stat.ML

    Pillar Networks++: Distributed non-parametric deep and wide networks

    Authors: Biswa Sengupta, Yu Qian

    Abstract: In recent work, it was shown that combining multi-kernel based support vector machines (SVMs) can lead to near state-of-the-art performance on an action recognition dataset (HMDB-51 dataset). This was 0.4\% lower than frameworks that used hand-crafted features in addition to the deep convolutional feature extractors. In the present work, we show that combining distributed Gaussian Processes with m… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1707.06923

  23. arXiv:1707.06923  [pdf, other

    cs.CV stat.ML

    Multi-kernel learning of deep convolutional features for action recognition

    Authors: Biswa Sengupta, Yu Qian

    Abstract: Image understanding using deep convolutional network has reached human-level performance, yet a closely related problem of video understanding especially, action recognition has not reached the requisite level of maturity. We combine multi-kernels based support-vector-machines (SVM) with a multi-stream deep convolutional neural network to achieve close to state-of-the-art performance on a 51-class… ▽ More

    Submitted 12 November, 2017; v1 submitted 21 July, 2017; originally announced July 2017.

    Comments: ICCV 2017 Workshop on Video and Language Understanding: MovieQA and the Large Scale Movie Description Challenge

  24. arXiv:1705.09451  [pdf, other

    cs.CV

    Algorithmic clothing: hybrid recommendation, from street-style-to-shop

    Authors: Y Qian, P Giaccone, M Sasdelli, E Vasquez, B Sengupta

    Abstract: In this paper we detail Cortexica's (https://www.cortexica.com) recommendation framework -- particularly, we describe how a hybrid visual recommender system can be created by combining conditional random fields for segmentation and deep neural networks for object localisation and feature representation. The recommendation system that is built after localisation, segmentation and classification has… ▽ More

    Submitted 12 November, 2017; v1 submitted 26 May, 2017; originally announced May 2017.

    Comments: KDD 2017 Workshop on ML meets Fashion

  25. arXiv:1705.07278  [pdf, other

    stat.ML cs.NE stat.ME

    Bayesian Belief Updating of Spatiotemporal Seizure Dynamics

    Authors: Gerald K Cooray, Richard Rosch, Torsten Baldeweg, Louis Lemieux, Karl Friston, Biswa Sengupta

    Abstract: Epileptic seizure activity shows complicated dynamics in both space and time. To understand the evolution and propagation of seizures spatially extended sets of data need to be analysed. We have previously described an efficient filtering scheme using variational Laplace that can be used in the Dynamic Causal Modelling (DCM) framework [Friston, 2003] to estimate the temporal dynamics of seizures r… ▽ More

    Submitted 12 November, 2017; v1 submitted 20 May, 2017; originally announced May 2017.

    Comments: ICML 2017 Time Series Workshop

  26. Approximate Bayesian inference as a gauge theory

    Authors: Biswa Sengupta, Karl Friston

    Abstract: In a published paper [Sengupta, 2016], we have proposed that the brain (and other self-organized biological and artificial systems) can be characterized via the mathematical apparatus of a gauge theory. The picture that emerges from this approach suggests that any biological system (from a neuron to an organism) can be cast as resolving uncertainty about its external milieu, either by changing its… ▽ More

    Submitted 12 November, 2017; v1 submitted 17 May, 2017; originally announced May 2017.

    Comments: Extended version published in PLoS Biology, ICML 2017 Computational Biology Workshop (spotlight presentation)

  27. arXiv:1704.04937  [pdf, ps, other

    cs.CR cs.DS

    Certificate Transparency with Enhancements and Short Proofs

    Authors: Abhishek Singh, Binanda Sengupta, Sushmita Ruj

    Abstract: Browsers can detect malicious websites that are provisioned with forged or fake TLS/SSL certificates. However, they are not so good at detecting malicious websites if they are provisioned with mistakenly issued certificates or certificates that have been issued by a compromised certificate authority. Google proposed certificate transparency which is an open framework to monitor and audit certifica… ▽ More

    Submitted 19 July, 2017; v1 submitted 17 April, 2017; originally announced April 2017.

    Comments: A preliminary version of the paper was published in ACISP 2017

  28. arXiv:1703.06324  [pdf, other

    cs.IR cs.LG stat.ML

    Deep Tensor Encoding

    Authors: B Sengupta, E Vasquez, Y Qian

    Abstract: Learning an encoding of feature vectors in terms of an over-complete dictionary or a information geometric (Fisher vectors) construct is wide-spread in statistical signal processing and computer vision. In content based information retrieval using deep-learning classifiers, such encodings are learnt on the flattened last layer, without adherence to the multi-linear structure of the underlying feat… ▽ More

    Submitted 12 November, 2017; v1 submitted 18 March, 2017; originally announced March 2017.

    Comments: KDD Workshop on ML meets Fashion 2017

  29. arXiv:1703.02898  [pdf, other

    cs.CV cs.DC cs.IR cs.NE

    Large-scale image analysis using docker sandboxing

    Authors: B Sengupta, E Vazquez, M Sasdelli, Y Qian, M Peniak, L Netherton, G Delfino

    Abstract: With the advent of specialized hardware such as Graphics Processing Units (GPUs), large scale image localization, classification and retrieval have seen increased prevalence. Designing scalable software architecture that co-evolves with such specialized hardware is a challenge in the commercial setting. In this paper, we describe one such architecture (\textit{Cortexica}) that leverages scalabilit… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

  30. arXiv:1702.06383  [pdf, other

    cs.IR cs.CV

    Differential Geometric Retrieval of Deep Features

    Authors: Y Qian, E Vazquez, B Sengupta

    Abstract: Comparing images to recommend items from an image-inventory is a subject of continued interest. Added with the scalability of deep-learning architectures the once `manual' job of hand-crafting features have been largely alleviated, and images can be compared according to features generated from a deep convolutional neural network. In this paper, we compare distance metrics (and divergences) to ran… ▽ More

    Submitted 12 November, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 5th ICDM Workshop on High Dimensional Data Mining (HDM 2017)

  31. Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques

    Authors: Binanda Sengupta, Akanksha Dixit, Sushmita Ruj

    Abstract: In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data. In this work, we explore the possibility of constructing a secure cloud storage for dynamic dat… ▽ More

    Submitted 7 June, 2020; v1 submitted 23 December, 2016; originally announced December 2016.

    Comments: A version of the paper has been published in IEEE Transactions on Cloud Computing

  32. arXiv:1611.03982  [pdf, ps, other

    cs.CR

    Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage

    Authors: Binanda Sengupta, Sushmita Ruj

    Abstract: Cloud service providers offer various facilities to their clients. The clients with limited resources opt for some of these facilities. They can outsource their bulk data to the cloud server. The cloud server maintains these data in lieu of monetary benefits. However, a malicious cloud server might delete some of these data to save some space and offer this extra amount of storage to another clien… ▽ More

    Submitted 16 August, 2018; v1 submitted 12 November, 2016; originally announced November 2016.

    Comments: A version of the paper with the same title has been published in IEEE Transactions on Cloud Computing (DOI: 10.1109/TCC.2017.2767584)