Skip to main content

Showing 1–4 of 4 results for author: Arumugam, S K

.
  1. arXiv:2504.07562  [pdf, other

    cs.SE cs.AI

    ReXCL: A Tool for Requirement Document Extraction and Classification

    Authors: Paheli Bhattacharya, Manojit Chakraborty, Santhosh Kumar Arumugam, Rishabh Gupta

    Abstract: This paper presents the ReXCL tool, which automates the extraction and classification processes in requirement engineering, enhancing the software development lifecycle. The tool features two main modules: Extraction, which processes raw requirement documents into a predefined schema using heuristics and predictive modeling, and Classification, which assigns class labels to requirements using adap… ▽ More

    Submitted 10 April, 2025; originally announced April 2025.

  2. arXiv:2409.07777  [pdf, ps, other

    cs.IT

    Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime

    Authors: Shi-Yuan Wang, Keerthi S. K. Arumugam, Matthieu R. Bloch

    Abstract: We develop tight bounds for the covert capacity of slotted asynchronous binary-input Discrete Memoryless Channels (DMCs) and Additive White Gaussian Noise (AWGN) channels, in which a codeword is transmitted in one of several slots with known boundaries, where the number of slots is sub-exponential in the codeword length. Our upper and lower bounds are within a multiplicative factor of $\sqrt{2}$ i… ▽ More

    Submitted 12 September, 2024; originally announced September 2024.

    Comments: 24 pages, 2 figures, submitted to TIT

  3. arXiv:1808.09556  [pdf, other

    cs.IT

    Embedding Covert Information in Broadcast Communications

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We analyze a two-receiver binary-input discrete memoryless broadcast channel, in which the transmitter communicates a common message simultaneously to both receivers and a covert message to only one of them. The unintended recipient of the covert message is treated as an adversary who attempts to detect the covert transmission. This model captures the problem of embedding covert messages in an inn… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  4. arXiv:1803.06007  [pdf, other

    cs.IT

    Covert Communication over a K-User Multiple Access Channel

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We consider a scenario in which $K$ transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless MAC while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver… ▽ More

    Submitted 7 June, 2019; v1 submitted 15 March, 2018; originally announced March 2018.