Skip to main content

Showing 1–19 of 19 results for author: Calyam, P

.
  1. arXiv:2503.13419  [pdf

    cs.CR cs.AI cs.ET cs.HC

    Securing Virtual Reality Experiences: Unveiling and Tackling Cybersickness Attacks with Explainable AI

    Authors: Ripan Kumar Kundu, Matthew Denton, Genova Mongalo, Prasad Calyam, Khaza Anuarul Hoque

    Abstract: The synergy between virtual reality (VR) and artificial intelligence (AI), specifically deep learning (DL)-based cybersickness detection models, has ushered in unprecedented advancements in immersive experiences by automatically detecting cybersickness severity and adaptively various mitigation techniques, offering a smooth and comfortable VR experience. While this DL-enabled cybersickness detecti… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

    Comments: This work has been submitted to the IEEE for possible publication

  2. arXiv:2409.03057  [pdf, other

    cs.NI

    VECA: Reliable and Confidential Resource Clustering for Volunteer Edge-Cloud Computing

    Authors: Hemanth Sai Yeddulapalli, Mauro Lemus Alarcon, Upasana Roy, Roshan Lal Neupane, Durbek Gafurov, Motahare Mounesan, Saptarshi Debroy, Prasad Calyam

    Abstract: Volunteer Edge-Cloud (VEC) computing has a significant potential to support scientific workflows in user communities contributing volunteer edge nodes. However, managing heterogeneous and intermittent resources to support machine/deep learning (ML/DL) based workflows poses challenges in resource governance for reliability, and confidentiality for model/data privacy protection. There is a need for… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

    Comments: Accepted - IC2E 2024 Conference

  3. arXiv:2408.14317  [pdf, other

    cs.CL cs.AI

    Claim Verification in the Age of Large Language Models: A Survey

    Authors: Alphaeus Dmonte, Roland Oruche, Marcos Zampieri, Prasad Calyam, Isabelle Augenstein

    Abstract: The large and ever-increasing amount of data available on the Internet coupled with the laborious task of manual claim and fact verification has sparked the interest in the development of automated claim verification systems. Several deep learning and transformer-based models have been proposed for this task over the years. With the introduction of Large Language Models (LLMs) and their superior p… ▽ More

    Submitted 11 February, 2025; v1 submitted 26 August, 2024; originally announced August 2024.

  4. arXiv:2407.01428  [pdf, other

    cs.DC cs.AI

    Reinforcement Learning-driven Data-intensive Workflow Scheduling for Volunteer Edge-Cloud

    Authors: Motahare Mounesan, Mauro Lemus, Hemanth Yeddulapalli, Prasad Calyam, Saptarshi Debroy

    Abstract: In recent times, Volunteer Edge-Cloud (VEC) has gained traction as a cost-effective, community computing paradigm to support data-intensive scientific workflows. However, due to the highly distributed and heterogeneous nature of VEC resources, centralized workflow task scheduling remains a challenge. In this paper, we propose a Reinforcement Learning (RL)-driven data-intensive scientific workflow… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  5. arXiv:2402.19336  [pdf, other

    physics.app-ph cond-mat.mtrl-sci

    Measurements of CNT Forest Self-Assembly from In-situ ESEM Synthesis

    Authors: Ramakrishna Surya, Gordon L. Koerner, Taher Hajilounezhad, Kaveh Safavigerdin, Prasad Calyam, Filiz Bunyak, Kannappan Palaniappan, Matthew R. Maschmann

    Abstract: Understanding the dynamic self-assembly mechanisms of carbon nanotube (CNT) forests is necessary to advance their technological promise. Here, in-situ environmental scanning electron microscope (ESEM) chemical vapor deposition (CVD) synthesis observes the real-time nucleation, assembly, delamination, and self-termination of dense ($>$ 10$^9$ CNT/cm$^2$), tall ($>$ 100 $μ$m) CNT forests in real tim… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  6. arXiv:2402.13169  [pdf, other

    cs.CR

    Formal Verification for Blockchain-based Insurance Claims Processing

    Authors: Roshan Lal Neupane, Ernest Bonnah, Bishnu Bhusal, Kiran Neupane, Khaza Anuarul Hoque, Prasad Calyam

    Abstract: Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Use of Blockchain technology-based platform can significantly improve scalability and response time for processing of claims which are otherwise manually-intensive and time-consuming. However, the chaincodes involved within the processes that issue claims, approve or d… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  7. arXiv:2302.01985  [pdf

    cs.LG cs.AI cs.HC

    VR-LENS: Super Learning-based Cybersickness Detection and Explainable AI-Guided Deployment in Virtual Reality

    Authors: Ripan Kumar Kundu, Osama Yahia Elsaid, Prasad Calyam, Khaza Anuarul Hoque

    Abstract: A plethora of recent research has proposed several automated methods based on machine learning (ML) and deep learning (DL) to detect cybersickness in Virtual reality (VR). However, these detection methods are perceived as computationally intensive and black-box methods. Thus, those techniques are neither trustworthy nor practical for deploying on standalone VR head-mounted displays (HMDs). This wo… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted for publication in IUI 2023

  8. arXiv:2209.05257  [pdf

    cs.HC cs.LG

    TruVR: Trustworthy Cybersickness Detection using Explainable Machine Learning

    Authors: Ripan Kumar Kundu, Rifatul Islam, Prasad Calyam, Khaza Anuarul Hoque

    Abstract: Cybersickness can be characterized by nausea, vertigo, headache, eye strain, and other discomforts when using virtual reality (VR) systems. The previously reported machine learning (ML) and deep learning (DL) algorithms for detecting (classification) and predicting (regression) VR cybersickness use black-box models; thus, they lack explainability. Moreover, VR sensors generate a massive amount of… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: Accepted copy, to be published in ISAMR 2022

  9. arXiv:2108.12315  [pdf

    cs.HC cs.CR cs.DC

    Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments

    Authors: Samaikya Valluripally, Vaibhav Akashe, Michael Fisher, David Falana, Khaza Anuarul Hoque, Prasad Calyam

    Abstract: Social virtual reality learning environments (VRLEs) provide immersive experience to users with increased accessibility to remote learning. Lack of maintaining high-performance and secured data delivery in critical VRLE application domains (e.g., military training, manufacturing) can disrupt application functionality and induce cybersickness. In this paper, we present a novel rule-based 3QS-adapta… ▽ More

    Submitted 27 August, 2021; originally announced August 2021.

    Comments: Accepted for publication in the 8th International Conference on Future Internet of Things and Cloud (FiCloud2021)

  10. Attack Trees for Security and Privacy in Social Virtual Reality Learning Environments

    Authors: Samaikya Valluripally, Aniket Gulhane, Reshmi Mitra, Khaza Anuarul Hoque, Prasad Calyam

    Abstract: Social Virtual Reality Learning Environment (VRLE) is a novel edge computing platform for collaboration amongst distributed users. Given that VRLEs are used for critical applications (e.g., special education, public safety training), it is important to ensure security and privacy issues. In this paper, we present a novel framework to obtain quantitative assessments of threats and vulnerabilities f… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

    Comments: Accepted for publication in in the IEEE Consumer Communications & Networking Conference (CCNC 2020)

  11. arXiv:1910.01716  [pdf, other

    cs.LG cs.PF eess.SP stat.ML

    False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics

    Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque

    Abstract: Industry 4.0 is the latest industrial revolution primarily merging automation with advanced manufacturing to reduce direct human effort and resources. Predictive maintenance (PdM) is an industry 4.0 solution, which facilitates predicting faults in a component or a system powered by state-of-the-art machine learning (ML) algorithms and the Internet-of-Things (IoT) sensors. However, IoT sensors and… ▽ More

    Submitted 12 December, 2019; v1 submitted 3 October, 2019; originally announced October 2019.

    Comments: extended version of the manuscript entitled "Impact of False Data Injection Attacks on Deep Learning enabled Predictive Analytics" accepted for publication in the IEEE NOMS 2020 conference

  12. Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Authors: Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, Khaza Anuarul Hoque

    Abstract: Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safe… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Comments: Tp appear in the CCNC 2019 Conference

  13. arXiv:1808.03031  [pdf, other

    cs.PF cs.NI

    A Constrained Shortest Path Scheme for Virtual Network Service Management

    Authors: Dmitrii Chemodanov, Flavio Esposito, Prasad Calyam, Andrei Sukhov

    Abstract: Virtual network services that span multiple data centers are important to support emerging data-intensive applications in fields such as bioinformatics and retail analytics. Successful virtual network service composition and maintenance requires flexible and scalable 'constrained shortest path management' both in the management plane for virtual network embedding (VNE) or network function virtuali… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

    Comments: Extended Technical Report for the IEEE Transactions on Network and Service Management submission

    Journal ref: D. Chemodanov, F. Esposito, P. Calyam, A. Sukhov, "A Constrained Shortest Path Scheme for Virtual Network Service Management", IEEE Transactions on Network and Service Management, 2018

  14. arXiv:1806.06191  [pdf, other

    cs.NI

    Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives

    Authors: Jianyu Wang, Jianli Pan, Flavio Esposito, Prasad Calyam, Zhicheng Yang, Prasant Mohapatra

    Abstract: Mobile devices supporting the "Internet of Things" (IoT), often have limited capabilities in computation, battery energy, and storage space, especially to support resource-intensive applications involving virtual reality (VR), augmented reality (AR), multimedia delivery and artificial intelligence (AI), which could require broad bandwidth, low response latency and large computational power. Edge c… ▽ More

    Submitted 16 June, 2018; originally announced June 2018.

    Comments: 23 pages, 9 figures, and 2 tables

  15. arXiv:1803.09886  [pdf

    cs.NI

    The Future of CISE Distributed Research Infrastructure

    Authors: Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, Prasad Calyam, Jeff Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abrahim Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus Van der Merwe , et al. (3 additional authors not shown)

    Abstract: Shared research infrastructure that is globally distributed and widely accessible has been a hallmark of the networking community. This paper presents an initial snapshot of a vision for a possible future of mid-scale distributed research infrastructure aimed at enabling new types of research and discoveries. The paper is written from the perspective of "lessons learned" in constructing and operat… ▽ More

    Submitted 27 March, 2018; originally announced March 2018.

    Comments: 12 pages, 1 figure; Community white paper

  16. arXiv:1707.09422  [pdf, other

    cs.NI cs.AI

    Hyperprofile-based Computation Offloading for Mobile Edge Networks

    Authors: Andrew Crutcher, Caleb Koch, Kyle Coleman, Jon Patman, Flavio Esposito, Prasad Calyam

    Abstract: In recent studies, researchers have developed various computation offloading frameworks for bringing cloud services closer to the user via edge networks. Specifically, an edge device needs to offload computationally intensive tasks because of energy and processing constraints. These constraints present the challenge of identifying which edge nodes should receive tasks to reduce overall resource co… ▽ More

    Submitted 28 July, 2017; originally announced July 2017.

    Comments: 5 pages, NSF REU Site publication

  17. arXiv:1707.05859  [pdf, other

    cs.HC cs.MM

    Towards a Social Virtual Reality Learning Environment in High Fidelity

    Authors: Chiara Zizza, Adam Starr, Devin Hudson, Sai Shreya Nuguri, Prasad Calyam, Zhihai He

    Abstract: Virtual Learning Environments (VLEs) are spaces designed to educate students remotely via online platforms. Although traditional VLEs such as iSocial have shown promise in educating students, they offer limited immersion that diminishes learning effectiveness. This paper outlines a virtual reality learning environment (VRLE) over a high-speed network, which promotes educational effectiveness and e… ▽ More

    Submitted 21 July, 2017; v1 submitted 18 July, 2017; originally announced July 2017.

    Comments: 4 pages, work-in-progress paper

  18. A General Constrained Shortest Path Approach for Virtual Path Embedding

    Authors: Dmitrii Chemodanov, Prasad Calyam, Flavio Esposito, Andrei Sukhov

    Abstract: Network virtualization has become a fundamental technology to deliver services for emerging data-intensive applications in fields such as bioinformatics and retail analytics hosted at multi-data center scales. To create and maintain a successful virtual network service, the problem of generating a constrained path manifests both in the management plane with a physical path creation (chains of virt… ▽ More

    Submitted 27 April, 2016; originally announced April 2016.

    Comments: Technical Report prepared for Camera-Ready paper to appear at IEEE Conference on Local and Metropolitan Area Networks, 2016

  19. Influence of distortions of key frames on video transfer in wireless networks

    Authors: E. S. Sagatov, A. M. Sukhov, P. Calyam

    Abstract: In this paper it is shown that for substantial increase of video quality in wireless network it is necessary to execute two obligatory points on modernization of the communication scheme. The player on the received part should throw back automatically duplicated RTP packets, server of streaming video should duplicate the packets containing the information of key frames. Coefficients of the mathema… ▽ More

    Submitted 1 May, 2010; originally announced May 2010.

    Comments: 6 pages, 4 figures, 2 Tables

    ACM Class: H.4.3; C.2.1; C.2.5