Skip to main content

Showing 1–8 of 8 results for author: Atrey, A

.
  1. arXiv:2504.20213  [pdf, other

    cs.LG cs.AI

    Can Large Language Models Learn Formal Logic? A Data-Driven Training and Evaluation Framework

    Authors: Yuan Xia, Akanksha Atrey, Fadoua Khmaissia, Kedar S. Namjoshi

    Abstract: This paper investigates the logical reasoning capabilities of large language models (LLMs). For a precisely defined yet tractable formulation, we choose the conceptually simple but technically complex task of constructing proofs in Boolean logic. A trained LLM receives as input a set of assumptions and a goal, and produces as output a proof that formally derives the goal from the assumptions. Inco… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

  2. arXiv:2312.15041  [pdf, other

    cs.HC cs.SI

    W4-Groups: Modeling the Who, What, When and Where of Group Behavior via Mobility Sensing

    Authors: Akanksha Atrey, Camellia Zakaria, Rajesh Balan, Prashant Shenoy

    Abstract: Human social interactions occur in group settings of varying sizes and locations, depending on the type of social activity. The ability to distinguish group formations based on their purposes transforms how group detection mechanisms function. Not only should such tools support the effective detection of serendipitous encounters, but they can derive categories of relation types among users. Determ… ▽ More

    Submitted 8 January, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

  3. arXiv:2312.15036  [pdf, other

    cs.LG cs.CR cs.DC

    SODA: Protecting Proprietary Information in On-Device Machine Learning Models

    Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy

    Abstract: The growth of low-end hardware has led to a proliferation of machine learning-based services in edge applications. These applications gather contextual information about users and provide some services, such as personalized offers, through a machine learning (ML) model. A growing practice has been to deploy such ML models on the user's device to reduce latency, maintain user privacy, and minimize… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    Journal ref: ACM/IEEE Symposium on Edge Computing 2023

  4. arXiv:2101.05855  [pdf, other

    cs.DC cs.LG

    Preserving Privacy in Personalized Models for Distributed Mobile Services

    Authors: Akanksha Atrey, Prashant Shenoy, David Jensen

    Abstract: The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content or make context-specific recommendations.… ▽ More

    Submitted 21 April, 2021; v1 submitted 14 January, 2021; originally announced January 2021.

    Comments: Published at ICDCS 2021

  5. arXiv:2005.07338  [pdf, other

    cs.DC cs.CR cs.NI

    New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges

    Authors: Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu

    Abstract: The field of IoT has blossomed and is positively influencing many application domains. In this paper, we bring out the unique challenges this field poses to research in computer systems and networking. The unique challenges arise from the unique characteristics of IoT systems such as the diversity of application domains where they are used and the increasingly demanding protocols they are being ca… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Invited paper to the IEEE IoT Journal

    ACM Class: B.8.1; C.2.1; D.4.5; K.6.5

  6. arXiv:1912.05743  [pdf, other

    cs.LG cs.AI

    Exploratory Not Explanatory: Counterfactual Analysis of Saliency Maps for Deep Reinforcement Learning

    Authors: Akanksha Atrey, Kaleigh Clary, David Jensen

    Abstract: Saliency maps are frequently used to support explanations of the behavior of deep reinforcement learning (RL) agents. However, a review of how saliency maps are used in practice indicates that the derived explanations are often unfalsifiable and can be highly subjective. We introduce an empirical approach grounded in counterfactual reasoning to test the hypotheses generated from saliency maps and… ▽ More

    Submitted 20 February, 2020; v1 submitted 9 December, 2019; originally announced December 2019.

    Comments: Published at ICLR 2020

  7. arXiv:1812.02868  [pdf, other

    cs.LG cs.AI stat.ML

    Measuring and Characterizing Generalization in Deep Reinforcement Learning

    Authors: Sam Witty, Jun Ki Lee, Emma Tosch, Akanksha Atrey, Michael Littman, David Jensen

    Abstract: Deep reinforcement-learning methods have achieved remarkable performance on challenging control tasks. Observations of the resulting behavior give the impression that the agent has constructed a generalized representation that supports insightful action decisions. We re-examine what is meant by generalization in RL, and propose several definitions based on an agent's performance in on-policy, off-… ▽ More

    Submitted 11 December, 2018; v1 submitted 6 December, 2018; originally announced December 2018.

  8. An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks

    Authors: N. Ch. Sriman Narayana Iyengar, Syed Mohammad Ansar Sachin kumar, Piyush Nagar, Siddharth Sharma, Akshay Atrey

    Abstract: Efficiency and simplicity of random algorithms have made them a lucrative alternative for solving complex problems in the domain of communication networks. This paper presents a random algorithm for handling the routing problem in Mobile Ad hoc Networks [MANETS].The performance of most existing routing protocols for MANETS degrades in terms of packet delay and congestion caused as the number of mo… ▽ More

    Submitted 11 May, 2010; originally announced May 2010.

    Comments: 9 Pages, IJCNC

    Journal ref: International Journal of Computer Networks & Communications 2.3 (2010) 28-36