-
ReXCL: A Tool for Requirement Document Extraction and Classification
Authors:
Paheli Bhattacharya,
Manojit Chakraborty,
Santhosh Kumar Arumugam,
Rishabh Gupta
Abstract:
This paper presents the ReXCL tool, which automates the extraction and classification processes in requirement engineering, enhancing the software development lifecycle. The tool features two main modules: Extraction, which processes raw requirement documents into a predefined schema using heuristics and predictive modeling, and Classification, which assigns class labels to requirements using adap…
▽ More
This paper presents the ReXCL tool, which automates the extraction and classification processes in requirement engineering, enhancing the software development lifecycle. The tool features two main modules: Extraction, which processes raw requirement documents into a predefined schema using heuristics and predictive modeling, and Classification, which assigns class labels to requirements using adaptive fine-tuning of encoder-based models. The final output can be exported to external requirement engineering tools. Performance evaluations indicate that ReXCL significantly improves efficiency and accuracy in managing requirements, marking a novel approach to automating the schematization of semi-structured requirement documents.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Bounds on Covert Capacity in the Sub-Exponential Slotted Asynchronous Regime
Authors:
Shi-Yuan Wang,
Keerthi S. K. Arumugam,
Matthieu R. Bloch
Abstract:
We develop tight bounds for the covert capacity of slotted asynchronous binary-input Discrete Memoryless Channels (DMCs) and Additive White Gaussian Noise (AWGN) channels, in which a codeword is transmitted in one of several slots with known boundaries, where the number of slots is sub-exponential in the codeword length. Our upper and lower bounds are within a multiplicative factor of $\sqrt{2}$ i…
▽ More
We develop tight bounds for the covert capacity of slotted asynchronous binary-input Discrete Memoryless Channels (DMCs) and Additive White Gaussian Noise (AWGN) channels, in which a codeword is transmitted in one of several slots with known boundaries, where the number of slots is sub-exponential in the codeword length. Our upper and lower bounds are within a multiplicative factor of $\sqrt{2}$ independent of the channel. This result partially fills a characterization gap between the covert capacity without asynchronism and the covert capacity with exponential asynchronism. Our key technical contributions consist of i) a tight upper bound for the relative entropy characterizing the effect of asynchronism on the covertness constraint in our achievability proof; ii) a careful converse analysis to characterize the maximum allowable weight or power of codewords to meet the covertness constraint. Our results suggest that, unlike the case without asynchronism, the choice of covertness metric does not change the covert capacity in the presence of asynchronism.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
Embedding Covert Information in Broadcast Communications
Authors:
Keerthi Suria Kumar Arumugam,
Matthieu R. Bloch
Abstract:
We analyze a two-receiver binary-input discrete memoryless broadcast channel, in which the transmitter communicates a common message simultaneously to both receivers and a covert message to only one of them. The unintended recipient of the covert message is treated as an adversary who attempts to detect the covert transmission. This model captures the problem of embedding covert messages in an inn…
▽ More
We analyze a two-receiver binary-input discrete memoryless broadcast channel, in which the transmitter communicates a common message simultaneously to both receivers and a covert message to only one of them. The unintended recipient of the covert message is treated as an adversary who attempts to detect the covert transmission. This model captures the problem of embedding covert messages in an innocent codebook and generalizes previous covert communication models in which the innocent behavior corresponds to the absence of communication between legitimate users. We identify the exact asymptotic behavior of the number of covert bits that can be transmitted when the rate of the innocent codebook is close to the capacity of the channel to the adversary. Our results also identify the dependence of the number of covert bits on the channel parameters and the characteristics of the innocent codebook.
△ Less
Submitted 28 August, 2018;
originally announced August 2018.
-
Covert Communication over a K-User Multiple Access Channel
Authors:
Keerthi Suria Kumar Arumugam,
Matthieu R. Bloch
Abstract:
We consider a scenario in which $K$ transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless MAC while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver…
▽ More
We consider a scenario in which $K$ transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless MAC while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver. We show that each of the $K$ transmitters can transmit on the order of $\sqrt{n}$ reliable and covert bits per $n$ channel uses, exceeding which, the warden will be able to detect the communication. We identify the optimal pre-constants of the scaling, which leads to a complete characterization of the covert capacity region of the $K$-user binary-input MAC. We show that, asymptotically, all sum-rate constraints are inactive unlike the traditional MAC capacity region. We also characterize the channel conditions that have to be satisfied for the transmitters to operate without a secret key.
△ Less
Submitted 7 June, 2019; v1 submitted 15 March, 2018;
originally announced March 2018.