Skip to main content

Showing 1–14 of 14 results for author: Mohan, C K

.
  1. arXiv:2506.07159  [pdf, other

    cs.DC cs.LG

    pFedSOP : Accelerating Training Of Personalized Federated Learning Using Second-Order Optimization

    Authors: Mrinmay Sen, Chalavadi Krishna Mohan

    Abstract: Personalized Federated Learning (PFL) enables clients to collaboratively train personalized models tailored to their individual objectives, addressing the challenge of model generalization in traditional Federated Learning (FL) due to high data heterogeneity. However, existing PFL methods often require increased communication rounds to achieve the desired performance, primarily due to slow trainin… ▽ More

    Submitted 8 June, 2025; originally announced June 2025.

    MSC Class: 68Q25; 68T05; 90C06; 90C25; 90C30 ACM Class: I.2.6; G.1.6; C.2.4

  2. arXiv:2506.02887  [pdf, ps, other

    cs.LG cs.DC

    Overcoming Challenges of Partial Client Participation in Federated Learning : A Comprehensive Review

    Authors: Mrinmay Sen, Shruti Aparna, Rohit Agarwal, Chalavadi Krishna Mohan

    Abstract: Federated Learning (FL) is a learning mechanism that falls under the distributed training umbrella, which collaboratively trains a shared global model without disclosing the raw data from different clients. This paper presents an extensive survey on the impact of partial client participation in federated learning. While much of the existing research focuses on addressing issues such as generalizat… ▽ More

    Submitted 6 June, 2025; v1 submitted 3 June, 2025; originally announced June 2025.

    Comments: 15 pages, 6 tables, comprehensive survey of federated learning with partial client participation

  3. arXiv:2505.23588  [pdf, ps, other

    cs.LG cs.DC

    Accelerated Training of Federated Learning via Second-Order Methods

    Authors: Mrinmay Sen, Sidhant R Nair, C Krishna Mohan

    Abstract: This paper explores second-order optimization methods in Federated Learning (FL), addressing the critical challenges of slow convergence and the excessive communication rounds required to achieve optimal performance from the global model. While existing surveys in FL primarily focus on challenges related to statistical and device label heterogeneity, as well as privacy and security concerns in fir… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: 17 pages, 1 figure, 4 tables, submitted to IEEE Transactions on Pattern Analysis and Machine Intelligence (T-PAMI)

    MSC Class: 68Q25; 68T05; 90C06; 90C25; 90C30 ACM Class: I.2.6; G.1.6; C.2.4; C.4

  4. arXiv:2406.07332  [pdf, other

    cs.CV

    Minimizing Energy Costs in Deep Learning Model Training: The Gaussian Sampling Approach

    Authors: Challapalli Phanindra Revanth, Sumohana S. Channappayya, C Krishna Mohan

    Abstract: Computing the loss gradient via backpropagation consumes considerable energy during deep learning (DL) model training. In this paper, we propose a novel approach to efficiently compute DL models' gradients to mitigate the substantial energy overhead associated with backpropagation. Exploiting the over-parameterized nature of DL models and the smoothness of their loss landscapes, we propose a metho… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  5. arXiv:2404.04139  [pdf

    cs.CR cs.AI

    Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning

    Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry

    Abstract: Federated Learning (FL) is a collaborative learning paradigm enabling participants to collectively train a shared machine learning model while preserving the privacy of their sensitive data. Nevertheless, the inherent decentralized and data-opaque characteristics of FL render its susceptibility to data poisoning attacks. These attacks introduce malformed or malicious inputs during local model trai… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: 14 pages, 11 figures, 5 tables, Accepted in ACM CODASPY 2024

  6. arXiv:2311.08503  [pdf, other

    cs.CV cs.LG

    MADG: Margin-based Adversarial Learning for Domain Generalization

    Authors: Aveen Dayal, Vimal K. B., Linga Reddy Cenkeramaddi, C. Krishna Mohan, Abhinav Kumar, Vineeth N Balasubramanian

    Abstract: Domain Generalization (DG) techniques have emerged as a popular approach to address the challenges of domain shift in Deep Learning (DL), with the goal of generalizing well to the target domain unseen during the training. In recent years, numerous methods have been proposed to address the DG setting, among which one popular approach is the adversarial learning-based methodology. The main idea behi… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  7. arXiv:2309.11766  [pdf, other

    cs.CR cs.CV cs.LG eess.SP

    Dictionary Attack on IMU-based Gait Authentication

    Authors: Rajesh Kumar, Can Isik, Chilukuri K. Mohan

    Abstract: We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones. The attack idea is inspired by and named after the concept of a dictionary attack on knowledge (PIN or password) based authentication systems. In particular, this work investigates whether it is possible to build a dictionary of IMUGait patt… ▽ More

    Submitted 31 December, 2023; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: 12 pages, 9 figures, accepted at AISec23 colocated with ACM CCS, November 30, 2023, Copenhagen, Denmark

    ACM Class: K.6.5

  8. ACLNet: An Attention and Clustering-based Cloud Segmentation Network

    Authors: Dhruv Makwana, Subhrajit Nag, Onkar Susladkar, Gayatri Deshmukh, Sai Chandra Teja R, Sparsh Mittal, C Krishna Mohan

    Abstract: We propose a novel deep learning model named ACLNet, for cloud segmentation from ground images. ACLNet uses both deep neural network and machine learning (ML) algorithm to extract complementary features. Specifically, it uses EfficientNet-B0 as the backbone, "`a trous spatial pyramid pooling" (ASPP) to learn at multiple receptive fields, and "global attention module" (GAM) to extract finegrained d… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

    Comments: 11 pages, 3 figures, 5 tables, Published in remote sensing letters

    Journal ref: volume 13, pages 865-875, year 2022

  9. WaferSegClassNet -- A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects

    Authors: Subhrajit Nag, Dhruv Makwana, Sai Chandra Teja R, Sparsh Mittal, C Krishna Mohan

    Abstract: As the integration density and design intricacy of semiconductor wafers increase, the magnitude and complexity of defects in them are also on the rise. Since the manual inspection of wafer defects is costly, an automated artificial intelligence (AI) based computer-vision approach is highly desired. The previous works on defect analysis have several limitations, such as low accuracy and the need fo… ▽ More

    Submitted 3 July, 2022; originally announced July 2022.

    Comments: 11 pages, 2 figures, 7 tables, Published in Computers in Industry

    Journal ref: Volume 142, 2022, 103720, ISSN 0166-3615,

  10. arXiv:2108.03614  [pdf, other

    cs.CV

    Monte Carlo DropBlock for Modelling Uncertainty in Object Detection

    Authors: Kumari Deepshikha, Sai Harsha Yelleni, P. K. Srijith, C Krishna Mohan

    Abstract: With the advancements made in deep learning, computer vision problems like object detection and segmentation have seen a great improvement in performance. However, in many real-world applications such as autonomous driving vehicles, the risk associated with incorrect predictions of objects is very high. Standard deep learning models for object detection such as YOLO models are often overconfident… ▽ More

    Submitted 8 August, 2021; originally announced August 2021.

  11. arXiv:2101.06092  [pdf, other

    cs.CV cs.AI

    Black-box Adversarial Attacks in Autonomous Vehicle Technology

    Authors: K Naveen Kumar, C Vishnu, Reshmi Mitra, C Krishna Mohan

    Abstract: Despite the high quality performance of the deep neural network in real-world applications, they are susceptible to minor perturbations of adversarial attacks. This is mostly undetectable to human vision. The impact of such attacks has become extremely detrimental in autonomous vehicles with real-time "safety" concerns. The black-box adversarial attacks cause drastic misclassification in critical… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 7 pages, 10 figures, published in 49th Annual IEEE AIPR 2020: Trusted Computing, Privacy, and Securing Multimedia Washington, D.C. October 13-15, 2020

  12. arXiv:2008.00827  [pdf, other

    cs.CV cs.AI eess.SP

    Defining Traffic States using Spatio-temporal Traffic Graphs

    Authors: Debaditya Roy, K. Naveen Kumar, C. Krishna Mohan

    Abstract: Intersections are one of the main sources of congestion and hence, it is important to understand traffic behavior at intersections. Particularly, in developing countries with high vehicle density, mixed traffic type, and lane-less driving behavior, it is difficult to distinguish between congested and normal traffic behavior. In this work, we propose a way to understand the traffic state of smaller… ▽ More

    Submitted 27 July, 2020; originally announced August 2020.

    Comments: Accepted in 23rd IEEE International Conference on Intelligent Transportation Systems September 20 to 23, 2020. 6 pages, 6 figures

  13. ULSAM: Ultra-Lightweight Subspace Attention Module for Compact Convolutional Neural Networks

    Authors: Rajat Saini, Nandan Kumar Jha, Bedanta Das, Sparsh Mittal, C. Krishna Mohan

    Abstract: The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for c… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 IEEE Winter Conference on Applications of Computer Vision (WACV)

    ACM Class: I.5.1; I.5.2; I.5.4

    Journal ref: WACV (2020) 1627-1636

  14. arXiv:1911.00643  [pdf, other

    cs.CL cs.SI

    Credibility-based Fake News Detection

    Authors: Niraj Sitaula, Chilukuri K. Mohan, Jennifer Grygiel, Xinyi Zhou, Reza Zafarani

    Abstract: Fake news can significantly misinform people who often rely on online sources and social media for their information. Current research on fake news detection has mostly focused on analyzing fake news content and how it propagates on a network of users. In this paper, we emphasize the detection of fake news by assessing its credibility. By analyzing public fake news data, we show that information o… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.