Skip to main content

Showing 1–7 of 7 results for author: Patnaik, N

.
  1. arXiv:2503.10665  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Small Vision-Language Models: A Survey on Compact Architectures and Techniques

    Authors: Nitesh Patnaik, Navdeep Nayak, Himani Bansal Agrawal, Moinak Chinmoy Khamaru, Gourav Bal, Saishree Smaranika Panda, Rishi Raj, Vishal Meena, Kartheek Vadlamani

    Abstract: The emergence of small vision-language models (sVLMs) marks a critical advancement in multimodal AI, enabling efficient processing of visual and textual data in resource-constrained environments. This survey offers a comprehensive exploration of sVLM development, presenting a taxonomy of architectures - transformer-based, mamba-based, and hybrid - that highlight innovations in compact design and c… ▽ More

    Submitted 9 March, 2025; originally announced March 2025.

  2. arXiv:2407.05710  [pdf, ps, other

    cs.SE

    Saltzer & Schroeder for 2030: Security engineering principles in a world of AI

    Authors: Nikhil Patnaik, Joseph Hallett, Awais Rashid

    Abstract: Writing secure code is challenging and so it is expected that, following the release of code-generative AI tools, such as ChatGPT and GitHub Copilot, developers will use these tools to perform security tasks and use security APIs. However, is the code generated by ChatGPT secure? How would the everyday software or security engineer be able to tell? As we approach the next decade we expect a grea… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Journal ref: FSE - 2030 Software Engineering

  3. Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 14 October, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

    Comments: Extended version of the paper that appeared at ACM CCS 2024. 21 pages, 2 figures, 3 tables

  4. arXiv:2309.13436  [pdf, other

    math.OC

    Risk-aware stochastic control of a sailboat

    Authors: MingYi Wang, Natasha Patnaik, Anne Somalwar, Jingyi Wu, Alexander Vladimirsky

    Abstract: Sailboat path-planning is a natural hybrid control problem (due to continuous steering and occasional "tack-switching" maneuvers), with the actual path-to-target greatly affected by stochastically evolving wind conditions. Previous studies have focused on finding risk-neutral policies that minimize the expected time of arrival. In contrast, we present a robust control approach, which maximizes the… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: 6 pages; 4 figures

    MSC Class: 93E20 (Primary); 93C30; 49L20; 65K15; 91B05 (Secondary)

  5. arXiv:2308.00004  [pdf, other

    cs.CR

    Towards Equitable Privacy

    Authors: Kopo M. Ramokapane, Lizzie Coles-Kemp, Nikhil Patnaik, Rui Huan, Nirav Ajmeri, Genevieve Liveley, Awais Rashid

    Abstract: Ensuring equitable privacy experiences remains a challenge, especially for marginalised and vulnerable populations (MVPs) who often hesitate to participate or use digital services due to concerns about the privacy of their sensitive information. In response, security research has emphasised the importance of inclusive security and privacy practices to facilitate meaningful engagement of MVPs onlin… ▽ More

    Submitted 28 July, 2023; originally announced August 2023.

    Comments: 4 Pages, SOUPS Workshop on Inclusive Privacy and Security (WIPS)

    ACM Class: K.4; H.4

  6. arXiv:2105.02031  [pdf, other

    cs.CR cs.SE

    Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations

    Authors: Nikhil Patnaik, Andrew C. Dwyer, Joseph Hallett, Awais Rashid

    Abstract: Producing secure software is challenging. The poor usability of security APIs makes this even harder. Many recommendations have been proposed to support developers by improving the usability of cryptography libraries and APIs; rooted in wider best practice guidance in software engineering and API design. In this SLR, we systematize knowledge regarding these recommendations. We identify and analy… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

    Comments: 24 pages, 12 figures

  7. arXiv:2102.09790  [pdf, ps, other

    cs.CR

    "Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?

    Authors: Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid

    Abstract: Does the act of writing a specification (how the code should behave) for a piece of security sensitive code lead to developers producing more secure code? We asked 138 developers to write a snippet of code to store a password: Half of them were asked to write down a specification of how the code should behave before writing the program, the other half were asked to write the code but without being… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.