Skip to main content

Showing 1–8 of 8 results for author: Neupane, A

.
  1. arXiv:2409.12318  [pdf, other

    cs.CV

    A large-scale study of performance and equity of commercial remote identity verification technologies across demographics

    Authors: Kaniz Fatima, Michael Schuckers, Gerardo Cruz-Ortiz, Daqing Hou, Sandip Purnapatra, Tiffany Andrews, Ambuj Neupane, Brandeis Marshall, Stephanie Schuckers

    Abstract: As more types of transactions move online, there is an increasing need to verify someone's identity remotely. Remote identity verification (RIdV) technologies have emerged to fill this need. RIdV solutions typically use a smart device to validate an identity document like a driver's license by comparing a face selfie to the face photo on the document. Recent research has been focused on ensuring t… ▽ More

    Submitted 18 September, 2024; originally announced September 2024.

    MSC Class: ACM-class:I5

  2. arXiv:2307.06399  [pdf, other

    cs.AI

    Designing Behavior Trees from Goal-Oriented LTLf Formulas

    Authors: Aadesh Neupane, Eric G Mercer, Michael A. Goodrich

    Abstract: Temporal logic can be used to formally specify autonomous agent goals, but synthesizing planners that guarantee goal satisfaction can be computationally prohibitive. This paper shows how to turn goals specified using a subset of finite trace Linear Temporal Logic (LTL) into a behavior tree (BT) that guarantees that successful traces satisfy the LTL goal. Useful LTL formulas for achievement goals c… ▽ More

    Submitted 19 December, 2023; v1 submitted 12 July, 2023; originally announced July 2023.

    Comments: Accepted as "Most Visionary Paper" in Autonomous Robots and Multirobot Systems (ARMS) 2023 workshop affiliated with the 22nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2023)

  3. arXiv:2212.13312  [pdf, other

    cs.CR

    Users really do respond to smishing

    Authors: Muhammad Lutfor Rahman, Daniel Timko, Hamid Wali, Ajaya Neupane

    Abstract: Text phish messages, referred to as Smishing is a type of social engineering attack where fake text messages are created, and used to lure users into responding to those messages. These messages aim to obtain user credentials, install malware on the phones, or launch smishing attacks. They ask users to reply to their message, click on a URL that redirects them to a phishing website, or call the pr… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: CODASPY'23

  4. arXiv:2203.15776  [pdf, other

    cs.NE cs.MA

    Efficiently Evolving Swarm Behaviors Using Grammatical Evolution With PPA-style Behavior Trees

    Authors: Aadesh Neupane, Michael A. Goodrich

    Abstract: Evolving swarm behaviors with artificial agents is computationally expensive and challenging. Because reward structures are often sparse in swarm problems, only a few simulations among hundreds evolve successful swarm behaviors. Additionally, swarm evolutionary algorithms typically rely on ad hoc fitness structures, and novel fitness functions need to be designed for each swarm task. This paper ev… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: To be published in ICLR Cells2Societies Workshop 2022

  5. Using PPP Information to Implement a Global Real-Time Virtual Network DGNSS Approach

    Authors: Wang Hu, Ashim Neupane, Jay A. Farrell

    Abstract: Differential GNSS (DGNSS) has been demonstrated to provide reliable, high-quality range correction information enabling real-time navigation with centimeter to sub-meter accuracy, which is required for applications such as connected and autonomous vehicles. However, DGNSS requires a local reference station near each user. For a continental or global scale implementation, this information dissemina… ▽ More

    Submitted 28 June, 2022; v1 submitted 22 September, 2021; originally announced October 2021.

    Comments: 14 pages, 8 tables, 4 figures, Code and data are available at https://github.com/Azurehappen/Virtual-Network-DGNSS-Project

    Journal ref: in IEEE Transactions on Vehicular Technology, vol. 71, no. 10, pp. 10337-10349, Oct. 2022

  6. arXiv:2009.04587  [pdf, other

    cs.CR cs.LG

    A brief history on Homomorphic learning: A privacy-focused approach to machine learning

    Authors: Aadesh Neupane

    Abstract: Cryptography and data science research grew exponential with the internet boom. Legacy encryption techniques force users to make a trade-off between usability, convenience, and security. Encryption makes valuable data inaccessible, as it needs to be decrypted each time to perform any operation. Billions of dollars could be saved, and millions of people could benefit from cryptography methods that… ▽ More

    Submitted 10 September, 2020; v1 submitted 9 September, 2020; originally announced September 2020.

    Comments: A CS611 class project paper to trace the history of privacy focused machine learning

  7. arXiv:1809.09563  [pdf, other

    cs.NE

    Slogatron: Advanced Wealthiness Generator

    Authors: Bryant Chandler, Aadesh Neupane

    Abstract: Creating catchy slogans is a demanding and clearly creative job for ad agencies. The process of slogan creation by humans involves finding key concepts of the company and its products, and developing a memorable short phrase to describe the key concept. We attempt to follow the same sequence, but with an evolutionary algorithm. A user inputs a paragraph describing describing the company or product… ▽ More

    Submitted 9 August, 2018; originally announced September 2018.

    Comments: Project done for CS673 (Computational Creativity)

  8. arXiv:1807.00458  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Adversarial Perturbations Against Real-Time Video Classification Systems

    Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami

    Abstract: Recent research has demonstrated the brittleness of machine learning systems to adversarial perturbations. However, the studies have been mostly limited to perturbations on images and more generally, classification that does not deal with temporally varying inputs. In this paper we ask "Are adversarial perturbations possible in real-time video classification systems and if so, what properties must… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2019 24-27 February 2019, San Diego, CA, USA