-
Connectivity for quantum graphs via quantum adjacency operators
Authors:
Kristin Courtney,
Priyanga Ganesan,
Mateusz Wasilewski
Abstract:
Connectivity is a fundamental property of quantum graphs, previously studied in the operator system model for matrix quantum graphs and via graph homomorphisms in the quantum adjacency matrix model. In this paper, we develop an algebraic characterization of connectivity for general quantum graphs within the quantum adjacency matrix framework. Our approach extends earlier results to the non-tracial…
▽ More
Connectivity is a fundamental property of quantum graphs, previously studied in the operator system model for matrix quantum graphs and via graph homomorphisms in the quantum adjacency matrix model. In this paper, we develop an algebraic characterization of connectivity for general quantum graphs within the quantum adjacency matrix framework. Our approach extends earlier results to the non-tracial setting and beyond regular quantum graphs. We utilize a quantum Perron-Frobenius theorem that provides a spectral characterization of connectivity, and we further characterize connectivity in terms of the irreducibility of the quantum adjacency matrix and the nullity of the associated graph Laplacian. These results are obtained using the KMS inner product, which unifies and generalizes existing formulations.
△ Less
Submitted 28 May, 2025;
originally announced May 2025.
-
UNJOIN: Enhancing Multi-Table Text-to-SQL Generation via Schema Simplification
Authors:
Poojah Ganesan,
Rajat Aayush Jha,
Dan Roth,
Vivek Gupta
Abstract:
Recent advances in large language models (LLMs) have greatly improved Text-to-SQL performance for single-table queries. But, it remains challenging in multi-table databases due to complex schema and relational operations. Existing methods often struggle with retrieving the right tables and columns, generating accurate JOINs and UNIONs, and generalizing across diverse schemas. To address these issu…
▽ More
Recent advances in large language models (LLMs) have greatly improved Text-to-SQL performance for single-table queries. But, it remains challenging in multi-table databases due to complex schema and relational operations. Existing methods often struggle with retrieving the right tables and columns, generating accurate JOINs and UNIONs, and generalizing across diverse schemas. To address these issues, we introduce UNJOIN, a two-stage framework that decouples the retrieval of schema elements from SQL logic generation. In the first stage, we merge the column names of all tables in the database into a single-table representation by prefixing each column with its table name. This allows the model to focus purely on accurate retrieval without being distracted by the need to write complex SQL logic. In the second stage, the SQL query is generated on this simplified schema and mapped back to the original schema by reconstructing JOINs, UNIONs, and relational logic. Evaluations on SPIDER and BIRD datasets show that UNJOIN matches or exceeds the state-of-the-art baselines. UNJOIN uses only schema information, which does not require data access or fine-tuning, making it scalable and adaptable across databases.
△ Less
Submitted 23 May, 2025;
originally announced May 2025.
-
The Operator Algebras Mentor Network: Impact of Community-Based Mentoring
Authors:
Anna Duwenig,
Kari Eifler,
Priyanga Ganesan,
Lara Ismert,
Viviana Meschitti,
Sarah Plosker,
Karen Strung
Abstract:
This paper aims to determine if membership within the Operator Algebras Mentor Network (OAMN) is beneficial to its members. The OAMN is an international mentoring initiative that offers support in small groups to women and minority genders in the particularly male-dominated field of operator algebras (OA) in mathematics. Expected advantages of membership include raising awareness of the lack of ge…
▽ More
This paper aims to determine if membership within the Operator Algebras Mentor Network (OAMN) is beneficial to its members. The OAMN is an international mentoring initiative that offers support in small groups to women and minority genders in the particularly male-dominated field of operator algebras (OA) in mathematics. Expected advantages of membership include raising awareness of the lack of gender diversity in this field, providing advice to mentees by mentors (e.g., pertaining to career or work/life balance), broadening one's network in OA, etc. A questionnaire was sent to OAMN members and a control group of non-members at similar institutions and similar positions to collect their experience with the mentoring initiative and perception of gender dynamics within the OA discipline, together with basic demographics. The initial analysis of the data collected shows that mentoring junior women and other minority genders in the area has a positive effect on mentees' networking ability, self-promotion, and raising awareness of gender issues within OA as a whole.
△ Less
Submitted 30 January, 2025;
originally announced January 2025.
-
Multi-modal biometric authentication: Leveraging shared layer architectures for enhanced security
Authors:
Vatchala S,
Yogesh C,
Yeshwanth Govindarajan,
Krithik Raja M,
Vishal Pramav Amirtha Ganesan,
Aashish Vinod A,
Dharun Ramesh
Abstract:
In this study, we introduce a novel multi-modal biometric authentication system that integrates facial, vocal, and signature data to enhance security measures. Utilizing a combination of Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), our model architecture uniquely incorporates dual shared layers alongside modality-specific enhancements for comprehensive feature extract…
▽ More
In this study, we introduce a novel multi-modal biometric authentication system that integrates facial, vocal, and signature data to enhance security measures. Utilizing a combination of Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), our model architecture uniquely incorporates dual shared layers alongside modality-specific enhancements for comprehensive feature extraction. The system undergoes rigorous training with a joint loss function, optimizing for accuracy across diverse biometric inputs. Feature-level fusion via Principal Component Analysis (PCA) and classification through Gradient Boosting Machines (GBM) further refine the authentication process. Our approach demonstrates significant improvements in authentication accuracy and robustness, paving the way for advanced secure identity verification solutions.
△ Less
Submitted 4 November, 2024;
originally announced November 2024.
-
Spectral bounds for the quantum chromatic number of quantum graphs
Authors:
Priyanga Ganesan
Abstract:
Quantum graphs are an operator space generalization of classical graphs that have emerged in different branches of mathematics including operator theory, non-commutative topology and quantum information theory. In this paper, we obtain lower bounds for the classical and quantum chromatic number of a quantum graph using eigenvalues of the quantum adjacency matrix. In particular, we prove a quantum…
▽ More
Quantum graphs are an operator space generalization of classical graphs that have emerged in different branches of mathematics including operator theory, non-commutative topology and quantum information theory. In this paper, we obtain lower bounds for the classical and quantum chromatic number of a quantum graph using eigenvalues of the quantum adjacency matrix. In particular, we prove a quantum generalization of Hoffman's bound and introduce quantum analogues for the edge number, Laplacian and signless Laplacian. We generalize all the spectral bounds given by Elphick and Wocjan (2019) to the quantum graph setting and demonstrate the tightness of these bounds in the case of complete quantum graphs. Our results are achieved using techniques from linear algebra and a combinatorial definition of quantum graph coloring, which is obtained from the winning strategies of a quantum-to-classical nonlocal graph coloring game, given by M. Brannan, P. Ganesan and S. Harris (2020).
△ Less
Submitted 3 December, 2021;
originally announced December 2021.
-
Does deep learning model calibration improve performance in class-imbalanced medical image classification?
Authors:
Sivaramakrishnan Rajaraman,
Prasanth Ganesan,
Sameer Antani
Abstract:
In medical image classification tasks, it is common to find that the number of normal samples far exceeds the number of abnormal samples. In such class-imbalanced situations, reliable training of deep neural networks continues to be a major challenge. Under these circumstances, the predicted class probabilities may be biased toward the majority class. Calibration has been suggested to alleviate so…
▽ More
In medical image classification tasks, it is common to find that the number of normal samples far exceeds the number of abnormal samples. In such class-imbalanced situations, reliable training of deep neural networks continues to be a major challenge. Under these circumstances, the predicted class probabilities may be biased toward the majority class. Calibration has been suggested to alleviate some of these effects. However, there is insufficient analysis explaining when and whether calibrating a model would be beneficial in improving performance. In this study, we perform a systematic analysis of the effect of model calibration on its performance on two medical image modalities, namely, chest X-rays and fundus images, using various deep learning classifier backbones. For this, we study the following variations: (i) the degree of imbalances in the dataset used for training; (ii) calibration methods; and (iii) two classification thresholds, namely, default decision threshold of 0.5, and optimal threshold from precision-recall curves. Our results indicate that at the default operating threshold of 0.5, the performance achieved through calibration is significantly superior (p < 0.05) to using uncalibrated probabilities. However, at the PR-guided threshold, these gains are not significantly different (p > 0.05). This finding holds for both image modalities and at varying degrees of imbalance.
△ Less
Submitted 11 October, 2021; v1 submitted 29 September, 2021;
originally announced October 2021.
-
Assessing Validity of Static Analysis Warnings using Ensemble Learning
Authors:
Anshul Tanwar,
Hariharan Manikandan,
Krishna Sundaresan,
Prasanna Ganesan,
Sathish Kumar Chandrasekaran,
Sriram Ravi
Abstract:
Static Analysis (SA) tools are used to identify potential weaknesses in code and fix them in advance, while the code is being developed. In legacy codebases with high complexity, these rules-based static analysis tools generally report a lot of false warnings along with the actual ones. Though the SA tools uncover many hidden bugs, they are lost in the volume of fake warnings reported. The develop…
▽ More
Static Analysis (SA) tools are used to identify potential weaknesses in code and fix them in advance, while the code is being developed. In legacy codebases with high complexity, these rules-based static analysis tools generally report a lot of false warnings along with the actual ones. Though the SA tools uncover many hidden bugs, they are lost in the volume of fake warnings reported. The developers expend large hours of time and effort in identifying the true warnings. Other than impacting the developer productivity, true bugs are also missed out due to this challenge. To address this problem, we propose a Machine Learning (ML)-based learning process that uses source codes, historic commit data, and classifier-ensembles to prioritize the True warnings from the given list of warnings. This tool is integrated into the development workflow to filter out the false warnings and prioritize actual bugs. We evaluated our approach on the networking C codes, from a large data pool of static analysis warnings reported by the tools. Time-to-time these warnings are addressed by the developers, labelling them as authentic bugs or fake alerts. The ML model is trained with full supervision over the code features. Our results confirm that applying deep learning over the traditional static analysis reports is an assuring approach for drastically reducing the false positive rates.
△ Less
Submitted 21 April, 2021;
originally announced April 2021.
-
Multi-context Attention Fusion Neural Network for Software Vulnerability Identification
Authors:
Anshul Tanwar,
Hariharan Manikandan,
Krishna Sundaresan,
Prasanna Ganesan,
Sathish Kumar Chandrasekaran,
Sriram Ravi
Abstract:
Security issues in shipped code can lead to unforeseen device malfunction, system crashes or malicious exploitation by crackers, post-deployment. These vulnerabilities incur a cost of repair and foremost risk the credibility of the company. It is rewarding when these issues are detected and fixed well ahead of time, before release. Common Weakness Estimation (CWE) is a nomenclature describing gene…
▽ More
Security issues in shipped code can lead to unforeseen device malfunction, system crashes or malicious exploitation by crackers, post-deployment. These vulnerabilities incur a cost of repair and foremost risk the credibility of the company. It is rewarding when these issues are detected and fixed well ahead of time, before release. Common Weakness Estimation (CWE) is a nomenclature describing general vulnerability patterns observed in C code. In this work, we propose a deep learning model that learns to detect some of the common categories of security vulnerabilities in source code efficiently. The AI architecture is an Attention Fusion model, that combines the effectiveness of recurrent, convolutional and self-attention networks towards decoding the vulnerability hotspots in code. Utilizing the code AST structure, our model builds an accurate understanding of code semantics with a lot less learnable parameters. Besides a novel way of efficiently detecting code vulnerability, an additional novelty in this model is to exactly point to the code sections, which were deemed vulnerable by the model. Thus helping a developer to quickly focus on the vulnerable code sections; and this becomes the "explainable" part of the vulnerability detection. The proposed AI achieves 98.40% F1-score on specific CWEs from the benchmarked NIST SARD dataset and compares well with state of the art.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
The quantum-to-classical graph homomorphism game
Authors:
Michael Brannan,
Priyanga Ganesan,
Samuel J. Harris
Abstract:
Motivated by non-local games and quantum coloring problems, we introduce a graph homomorphism game between quantum graphs and classical graphs. This game is naturally cast as a "quantum-classical game"--that is, a non-local game of two players involving quantum questions and classical answers. This game generalizes the graph homomorphism game between classical graphs. We show that winning strategi…
▽ More
Motivated by non-local games and quantum coloring problems, we introduce a graph homomorphism game between quantum graphs and classical graphs. This game is naturally cast as a "quantum-classical game"--that is, a non-local game of two players involving quantum questions and classical answers. This game generalizes the graph homomorphism game between classical graphs. We show that winning strategies in the various quantum models for the game is an analogue of the notion of non-commutative graph homomorphisms due to D. Stahlke [44]. Moreover, we present a game algebra in this context that generalizes the game algebra for graph homomorphisms given by J.W. Helton, K. Meyer, V.I. Paulsen and M. Satriano [22]. We also demonstrate explicit quantum colorings of all quantum complete graphs, yielding the surprising fact that the algebra of the $4$-coloring game for a quantum graph is always non-trivial, extending a result of [22].
△ Less
Submitted 23 September, 2021; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Predicting Vulnerability In Large Codebases With Deep Code Representation
Authors:
Anshul Tanwar,
Krishna Sundaresan,
Parmesh Ashwath,
Prasanna Ganesan,
Sathish Kumar Chandrasekaran,
Sriram Ravi
Abstract:
Currently, while software engineers write code for various modules, quite often, various types of errors - coding, logic, semantic, and others (most of which are not caught by compilation and other tools) get introduced. Some of these bugs might be found in the later stage of testing, and many times it is reported by customers on production code. Companies have to spend many resources, both money…
▽ More
Currently, while software engineers write code for various modules, quite often, various types of errors - coding, logic, semantic, and others (most of which are not caught by compilation and other tools) get introduced. Some of these bugs might be found in the later stage of testing, and many times it is reported by customers on production code. Companies have to spend many resources, both money and time in finding and fixing the bugs which would have been avoided if coding was done right. Also, concealed flaws in software can lead to security vulnerabilities that potentially allow attackers to compromise systems and applications. Interestingly, same or similar issues/bugs, which were fixed in the past (although in different modules), tend to get introduced in production code again.
We developed a novel AI-based system which uses the deep representation of Abstract Syntax Tree (AST) created from the source code and also the active feedback loop to identify and alert the potential bugs that could be caused at the time of development itself i.e. as the developer is writing new code (logic and/or function). This tool integrated with IDE as a plugin would work in the background, point out existing similar functions/code-segments and any associated bugs in those functions. The tool would enable the developer to incorporate suggestions right at the time of development, rather than waiting for UT/QA/customer to raise a defect.
We assessed our tool on both open-source code and also on Cisco codebase for C and C++ programing language. Our results confirm that deep representation of source code and the active feedback loop is an assuring approach for predicting security and other vulnerabilities present in the code.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Quantum Majorization on Semifinite von Neumann Algebras
Authors:
Priyanga Ganesan,
Li Gao,
Satish K. Pandey,
Sarah Plosker
Abstract:
We extend Gour et al's characterization of quantum majorization via conditional min-entropy to the context of semifinite von Neumann algebras. Our method relies on a connection between conditional min-entropy and operator space projective tensor norm for injective von Neumann algebras. This approach also connects the tracial Hahn-Banach theorem of Helton, Klep and McCullough to noncommutative vect…
▽ More
We extend Gour et al's characterization of quantum majorization via conditional min-entropy to the context of semifinite von Neumann algebras. Our method relies on a connection between conditional min-entropy and operator space projective tensor norm for injective von Neumann algebras. This approach also connects the tracial Hahn-Banach theorem of Helton, Klep and McCullough to noncommutative vector-valued $L_1$-space.
△ Less
Submitted 22 September, 2019;
originally announced September 2019.