-
Contrastive Learning of Features between Images and LiDAR
Authors:
Peng Jiang,
Srikanth Saripalli
Abstract:
Image and Point Clouds provide different information for robots. Finding the correspondences between data from different sensors is crucial for various tasks such as localization, mapping, and navigation. Learning-based descriptors have been developed for single sensors; there is little work on cross-modal features. This work treats learning cross-modal features as a dense contrastive learning pro…
▽ More
Image and Point Clouds provide different information for robots. Finding the correspondences between data from different sensors is crucial for various tasks such as localization, mapping, and navigation. Learning-based descriptors have been developed for single sensors; there is little work on cross-modal features. This work treats learning cross-modal features as a dense contrastive learning problem. We propose a Tuple-Circle loss function for cross-modality feature learning. Furthermore, to learn good features and not lose generality, we developed a variant of widely used PointNet++ architecture for point cloud and U-Net CNN architecture for images. Moreover, we conduct experiments on a real-world dataset to show the effectiveness of our loss function and network structure. We show that our models indeed learn information from both images as well as LiDAR by visualizing the features.
△ Less
Submitted 24 June, 2022;
originally announced June 2022.
-
Congruence modules and the Wiles-Lenstra-Diamond numerical criterion in higher codimensions
Authors:
Srikanth B. Iyengar,
Chandrashekhar B. Khare,
Jeffrey Manning
Abstract:
We define a congruence module $Ψ_A(M)$ associated to a surjective $\mathcal O$-algebra morphism $λ\colon A \to \mathcal{O}$, with $\mathcal{O}$ a discrete valuation ring, $A$ a complete noetherian local $\mathcal{O}$-algebra regular at $\mathfrak{p}$, the kernel of $λ$, and $M$ a finitely generated $A$-module. We establish a numerical criterion for $M$ to have a free direct summand over $A$ of pos…
▽ More
We define a congruence module $Ψ_A(M)$ associated to a surjective $\mathcal O$-algebra morphism $λ\colon A \to \mathcal{O}$, with $\mathcal{O}$ a discrete valuation ring, $A$ a complete noetherian local $\mathcal{O}$-algebra regular at $\mathfrak{p}$, the kernel of $λ$, and $M$ a finitely generated $A$-module. We establish a numerical criterion for $M$ to have a free direct summand over $A$ of positive rank. It is in terms of the lengths of $Ψ_A(M)$ and the torsion part of $\mathfrak{p}/\mathfrak{p}^2$. It generalizes results of Wiles, Lenstra, and Diamond, that deal with the case when the codimension of $\mathfrak{p}$ is zero.
Number theoretic applications include integral (non-minimal) $R=\mathbb T$ theorems in situations of positive defect conditional on certain standard conjectures. Here $R$ is a deformation ring parametrizing certain Galois representations and $\mathbb T$ is a Hecke algebra. An example is a modularity lifting for 2-dimensional $\ell$-adic Galois representations over an imaginary quadratic field. The proofs combine our commutative algebra results with a generalization due to Calegari and Geraghty of the patching method of Wiles and Taylor--Wiles and level raising arguments that go back to Ribet. The results provide new evidence in favor of the intriguing, and as yet fledgling, torsion analog of the classical Langlands correspondence.
We also prove unconditional integral $R=\mathbb T$ results for Hecke algebras $\mathbb T$ acting on weight one cohomology of Shimura curves over $\mathbb Q$. This leads to a torsion Jacquet--Langlands correspondence comparing integral Hecke algebras acting on weight one cohomology of Shimura curves and modular curves. In this case the cohomology has abundant torsion and so our correspondence cannot be deduced by means of the classical Jacquet--Langlands correspondence.
△ Less
Submitted 29 September, 2024; v1 submitted 16 June, 2022;
originally announced June 2022.
-
AmbiSep: Ambisonic-to-Ambisonic Reverberant Speech Separation Using Transformer Networks
Authors:
Adrian Herzog,
Srikanth Raj Chetupalli,
Emanuël A. P. Habets
Abstract:
Consider a multichannel Ambisonic recording containing a mixture of several reverberant speech signals. Retreiving the reverberant Ambisonic signals corresponding to the individual speech sources blindly from the mixture is a challenging task as it requires to estimate multiple signal channels for each source. In this work, we propose AmbiSep, a deep neural network-based plane-wave domain masking…
▽ More
Consider a multichannel Ambisonic recording containing a mixture of several reverberant speech signals. Retreiving the reverberant Ambisonic signals corresponding to the individual speech sources blindly from the mixture is a challenging task as it requires to estimate multiple signal channels for each source. In this work, we propose AmbiSep, a deep neural network-based plane-wave domain masking approach to solve this task. The masking network uses learned feature representations and transformers in a triple-path processing configuration. We train and evaluate the proposed network architecture on a spatialized WSJ0-2mix dataset, and show that the method achieves a multichannel scale-invariant signal-to-distortion ratio improvement of 17.7 dB on the blind test set, while preserving the spatial characteristics of the separated sounds.
△ Less
Submitted 13 June, 2022;
originally announced June 2022.
-
Coswara: A website application enabling COVID-19 screening by analysing respiratory sound samples and health symptoms
Authors:
Debarpan Bhattacharya,
Debottam Dutta,
Neeraj Kumar Sharma,
Srikanth Raj Chetupalli,
Pravin Mote,
Sriram Ganapathy,
Chandrakiran C,
Sahiti Nori,
Suhail K K,
Sadhana Gonuguntla,
Murali Alagesan
Abstract:
The COVID-19 pandemic has accelerated research on design of alternative, quick and effective COVID-19 diagnosis approaches. In this paper, we describe the Coswara tool, a website application designed to enable COVID-19 detection by analysing respiratory sound samples and health symptoms. A user using this service can log into a website using any device connected to the internet, provide there curr…
▽ More
The COVID-19 pandemic has accelerated research on design of alternative, quick and effective COVID-19 diagnosis approaches. In this paper, we describe the Coswara tool, a website application designed to enable COVID-19 detection by analysing respiratory sound samples and health symptoms. A user using this service can log into a website using any device connected to the internet, provide there current health symptom information and record few sound sampled corresponding to breathing, cough, and speech. Within a minute of analysis of this information on a cloud server the website tool will output a COVID-19 probability score to the user. As the COVID-19 pandemic continues to demand massive and scalable population level testing, we hypothesize that the proposed tool provides a potential solution towards this.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
Liquid-liquid phase transition in deeply supercooled Stillinger-Weber silicon
Authors:
Yagyik Goswami,
Srikanth Sastry
Abstract:
The existence of a phase transition between two distinct liquid phases in single-component network-forming liquids (e.g., water, silica, silicon) has elicited considerable scientific interest. The challenge, both for experiments and simulations, is that the liquid-liquid phase transition occurs under deeply supercooled conditions, where crystallization occurs very rapidly. Thus, early evidence fro…
▽ More
The existence of a phase transition between two distinct liquid phases in single-component network-forming liquids (e.g., water, silica, silicon) has elicited considerable scientific interest. The challenge, both for experiments and simulations, is that the liquid-liquid phase transition occurs under deeply supercooled conditions, where crystallization occurs very rapidly. Thus, early evidence from numerical equation of state studies was challenged, with the argument that slow spontaneous crystallization had been misinterpreted as evidence of a second liquid state. Rigorous free energy calculations have subsequently confirmed the existence of a liquid-liquid phase transition in some models of water, and exciting new experimental evidence has since supported these computational results. Similar results have so far not been found for silicon. Here, we present results from free energy calculations performed for silicon modelled with the classical, empirical Stillinger-Weber potential. Through a careful study employing state-of-the-art constrained simulation protocols and numerous checks for thermodynamic consistency, we find that there are two distinct metastable liquid states and a phase transition. Our results resolve a long-standing debate concerning the existence of a liquid-liquid transition in supercooled liquid silicon and address key questions regarding the nature of the phase transition and the associated critical point.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Partial-input baselines show that NLI models can ignore context, but they don't
Authors:
Neha Srikanth,
Rachel Rudinger
Abstract:
When strong partial-input baselines reveal artifacts in crowdsourced NLI datasets, the performance of full-input models trained on such datasets is often dismissed as reliance on spurious correlations. We investigate whether state-of-the-art NLI models are capable of overriding default inferences made by a partial-input baseline. We introduce an evaluation set of 600 examples consisting of perturb…
▽ More
When strong partial-input baselines reveal artifacts in crowdsourced NLI datasets, the performance of full-input models trained on such datasets is often dismissed as reliance on spurious correlations. We investigate whether state-of-the-art NLI models are capable of overriding default inferences made by a partial-input baseline. We introduce an evaluation set of 600 examples consisting of perturbed premises to examine a RoBERTa model's sensitivity to edited contexts. Our results indicate that NLI models are still capable of learning to condition on context--a necessary component of inferential reasoning--despite being trained on artifact-ridden datasets.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Vanishing Spaces of Random Sets and Applications to Reed-Muller Codes
Authors:
Siddharth Bhandari,
Prahladh Harsha,
Ramprasad Saptharishi,
Srikanth Srinivasan
Abstract:
We study the following natural question on random sets of points in $\mathbb{F}_2^m$: Given a random set of $k$ points $Z=\{z_1, z_2, \dots, z_k\} \subseteq \mathbb{F}_2^m$, what is the dimension of the space of degree at most $r$ multilinear polynomials that vanish on all points in $Z$?
We show that, for $r \leq γm$ (where $γ> 0$ is a small, absolute constant) and…
▽ More
We study the following natural question on random sets of points in $\mathbb{F}_2^m$: Given a random set of $k$ points $Z=\{z_1, z_2, \dots, z_k\} \subseteq \mathbb{F}_2^m$, what is the dimension of the space of degree at most $r$ multilinear polynomials that vanish on all points in $Z$?
We show that, for $r \leq γm$ (where $γ> 0$ is a small, absolute constant) and $k = (1-ε) \cdot \binom{m}{\leq r}$ for any constant $ε> 0$, the space of degree at most $r$ multilinear polynomials vanishing on a random set $Z = \{z_1,\ldots, z_k\}$ has dimension exactly $\binom{m}{\leq r} - k$ with probability $1 - o(1)$. This bound shows that random sets have a much smaller space of degree at most $r$ multilinear polynomials vanishing on them, compared to the worst-case bound (due to Wei (IEEE Trans. Inform. Theory, 1991)) of $\binom{m}{\leq r} - \binom{\log_2 k}{\leq r} \gg \binom{m}{\leq r} - k$.
Using this bound, we show that high-degree Reed-Muller codes ($\text{RM}(m,d)$ with $d > (1-γ) m$) "achieve capacity" under the Binary Erasure Channel in the sense that, for any $ε> 0$, we can recover from $(1 - ε) \cdot \binom{m}{\leq m-d-1}$ random erasures with probability $1 - o(1)$. This also implies that $\text{RM}(m,d)$ is also efficiently decodable from $\approx \binom{m}{\leq m-(d/2)}$ random errors for the same range of parameters.
△ Less
Submitted 22 May, 2022;
originally announced May 2022.
-
PhoCaL: A Multi-Modal Dataset for Category-Level Object Pose Estimation with Photometrically Challenging Objects
Authors:
Pengyuan Wang,
HyunJun Jung,
Yitong Li,
Siyuan Shen,
Rahul Parthasarathy Srikanth,
Lorenzo Garattoni,
Sven Meier,
Nassir Navab,
Benjamin Busam
Abstract:
Object pose estimation is crucial for robotic applications and augmented reality. Beyond instance level 6D object pose estimation methods, estimating category-level pose and shape has become a promising trend. As such, a new research field needs to be supported by well-designed datasets. To provide a benchmark with high-quality ground truth annotations to the community, we introduce a multimodal d…
▽ More
Object pose estimation is crucial for robotic applications and augmented reality. Beyond instance level 6D object pose estimation methods, estimating category-level pose and shape has become a promising trend. As such, a new research field needs to be supported by well-designed datasets. To provide a benchmark with high-quality ground truth annotations to the community, we introduce a multimodal dataset for category-level object pose estimation with photometrically challenging objects termed PhoCaL. PhoCaL comprises 60 high quality 3D models of household objects over 8 categories including highly reflective, transparent and symmetric objects. We developed a novel robot-supported multi-modal (RGB, depth, polarisation) data acquisition and annotation process. It ensures sub-millimeter accuracy of the pose for opaque textured, shiny and transparent objects, no motion blur and perfect camera synchronisation. To set a benchmark for our dataset, state-of-the-art RGB-D and monocular RGB methods are evaluated on the challenging scenes of PhoCaL.
△ Less
Submitted 18 May, 2022;
originally announced May 2022.
-
Extrinsic Calibration of LiDAR, IMU and Camera
Authors:
Subodh Mishra,
Srikanth Saripalli
Abstract:
In this work we present a novel method to jointly calibrate a sensor suite consisting a 3D-LiDAR, Inertial Measurement Unit (IMU) and Camera under an Extended Kalman Filter (EKF) framework. We exploit pairwise constraints between the 3 sensor pairs to perform EKF update and experimentally demonstrate the superior performance obtained with joint calibration as against individual sensor pair calibra…
▽ More
In this work we present a novel method to jointly calibrate a sensor suite consisting a 3D-LiDAR, Inertial Measurement Unit (IMU) and Camera under an Extended Kalman Filter (EKF) framework. We exploit pairwise constraints between the 3 sensor pairs to perform EKF update and experimentally demonstrate the superior performance obtained with joint calibration as against individual sensor pair calibration.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Bridging Sim2Real Gap Using Image Gradients for the Task of End-to-End Autonomous Driving
Authors:
Unnikrishnan R Nair,
Sarthak Sharma,
Udit Singh Parihar,
Midhun S Menon,
Srikanth Vidapanakal
Abstract:
We present the first prize solution to NeurIPS 2021 - AWS Deepracer Challenge. In this competition, the task was to train a reinforcement learning agent (i.e. an autonomous car), that learns to drive by interacting with its environment, a simulated track, by taking an action in a given state to maximize the expected reward. This model was then tested on a real-world track with a miniature AWS Deep…
▽ More
We present the first prize solution to NeurIPS 2021 - AWS Deepracer Challenge. In this competition, the task was to train a reinforcement learning agent (i.e. an autonomous car), that learns to drive by interacting with its environment, a simulated track, by taking an action in a given state to maximize the expected reward. This model was then tested on a real-world track with a miniature AWS Deepracer car. Our goal is to train a model that can complete a lap as fast as possible without going off the track. The Deepracer challenge is a part of a series of embodied intelligence competitions in the field of autonomous vehicles, called The AI Driving Olympics (AI-DO). The overall objective of the AI-DO is to provide accessible mechanisms for benchmarking progress in autonomy applied to the task of autonomous driving. The tricky section of this challenge was the sim2real transfer of the learned skills. To reduce the domain gap in the observation space we did a canny edge detection in addition to cropping out of the unnecessary background information. We modeled the problem as a behavioral cloning task and used MLP-MIXER to optimize for runtime. We made sure our model was capable of handling control noise by careful filtration of the training data and that gave us a robust model capable of completing the track even when 50% of the commands were randomly changed. The overall runtime of the model was only 2-3ms on a modern CPU.
△ Less
Submitted 16 May, 2022;
originally announced May 2022.
-
NMR: Neural Manifold Representation for Autonomous Driving
Authors:
Unnikrishnan R. Nair,
Sarthak Sharma,
Midhun S. Menon,
Srikanth Vidapanakal
Abstract:
Autonomous driving requires efficient reasoning about the Spatio-temporal nature of the semantics of the scene. Recent approaches have successfully amalgamated the traditional modular architecture of an autonomous driving stack comprising perception, prediction, and planning in an end-to-end trainable system. Such a system calls for a shared latent space embedding with interpretable intermediate t…
▽ More
Autonomous driving requires efficient reasoning about the Spatio-temporal nature of the semantics of the scene. Recent approaches have successfully amalgamated the traditional modular architecture of an autonomous driving stack comprising perception, prediction, and planning in an end-to-end trainable system. Such a system calls for a shared latent space embedding with interpretable intermediate trainable projected representation. One such successfully deployed representation is the Bird's-Eye View(BEV) representation of the scene in ego-frame. However, a fundamental assumption for an undistorted BEV is the local coplanarity of the world around the ego-vehicle. This assumption is highly restrictive, as roads, in general, do have gradients. The resulting distortions make path planning inefficient and incorrect. To overcome this limitation, we propose Neural Manifold Representation (NMR), a representation for the task of autonomous driving that learns to infer semantics and predict way-points on a manifold over a finite horizon, centered on the ego-vehicle. We do this using an iterative attention mechanism applied on a latent high dimensional embedding of surround monocular images and partial ego-vehicle state. This representation helps generate motion and behavior plans consistent with and cognizant of the surface geometry. We propose a sampling algorithm based on edge-adaptive coverage loss of BEV occupancy grid and associated guidance flow field to generate the surface manifold while incurring minimal computational overhead. We aim to test the efficacy of our approach on CARLA and SYNTHIA-SF.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Fibrewise stratification of group representations
Authors:
Dave Benson,
Srikanth B. Iyengar,
Henning Krause,
Julia Pevtsova
Abstract:
Given a finite cocommutative Hopf algebra $A$ over a commutative regular ring $R$, the lattice of localising tensor ideals of the stable category of Gorenstein projective $A$-modules is described in terms of the corresponding lattices for the fibres of $A$ over the spectrum of $R$. Under certain natural conditions on the cohomology of $A$ over $R$, this yields a stratification of the stable catego…
▽ More
Given a finite cocommutative Hopf algebra $A$ over a commutative regular ring $R$, the lattice of localising tensor ideals of the stable category of Gorenstein projective $A$-modules is described in terms of the corresponding lattices for the fibres of $A$ over the spectrum of $R$. Under certain natural conditions on the cohomology of $A$ over $R$, this yields a stratification of the stable category. These results apply when $A$ is the group algebra over $R$ of a finite group, and also when $A$ is the exterior algebra on a finite free $R$-module.
△ Less
Submitted 13 June, 2022; v1 submitted 21 April, 2022;
originally announced April 2022.
-
Overestimated inclinations of Milgromian disc galaxies: the case of the ultradiffuse galaxy AGC 114905
Authors:
Indranil Banik,
Srikanth Togere Nagesh,
Hosein Haghi,
Pavel Kroupa,
Hongsheng Zhao
Abstract:
We present hydrodynamical star-forming simulations in the Milgromian dynamics (MOND) framework of a gas-rich disc galaxy with properties similar to AGC 114905, which has recently been argued to have a rotation curve (RC) that is inconsistent with the MOND prediction. Our first model considers the galaxy in isolation, while our second model includes an external field of $0.05 \, a_{_0}$, the estima…
▽ More
We present hydrodynamical star-forming simulations in the Milgromian dynamics (MOND) framework of a gas-rich disc galaxy with properties similar to AGC 114905, which has recently been argued to have a rotation curve (RC) that is inconsistent with the MOND prediction. Our first model considers the galaxy in isolation, while our second model includes an external field of $0.05 \, a_{_0}$, the estimated gravitational field from large-scale structure. We show that isophotes in the face-on view can differ from circular at the 50% level. This could mislead observers into overestimating the inclination $i$ between disc and sky planes. Because RCs require a correction factor of $1/\sin i$, the actual RC could be much higher than reported by observers. This plausibly reconciles AGC 114905 with MOND expectations.
△ Less
Submitted 17 May, 2022; v1 submitted 13 April, 2022;
originally announced April 2022.
-
Crossover in dynamics in the Kob-Andersen binary mixture glass-forming liquid
Authors:
Pallai Das,
Srikanth Sastry
Abstract:
Glass-forming liquids are broadly classified as being fragile or strong, depending on the deviation from Arrhenius behavior of their relaxation times. A fragile to strong crossover is observed or inferred in liquids like water and silica, and more recently also in metallic glasses and phase change alloys, leading to the expectation that such a crossover is more widely realised among glass formers.…
▽ More
Glass-forming liquids are broadly classified as being fragile or strong, depending on the deviation from Arrhenius behavior of their relaxation times. A fragile to strong crossover is observed or inferred in liquids like water and silica, and more recently also in metallic glasses and phase change alloys, leading to the expectation that such a crossover is more widely realised among glass formers. We investigate computationally the well-studied Kob-Andersen model, accessing temperatures well below the mode coupling temperature $T_{MCT}$. We find that relaxation times exhibit a crossover in dynamics around $T_{MCT}$, and discuss whether it bears characteristics of the fragile to strong crossover. Several aspects of dynamical heterogeneity exhibit behavior mirroring the dynamical crossover, whereas thermodynamic quantities do not. In particular, the Adam-Gibbs relation describing the relation between relaxation times and configurational entropy continues to hold below the dynamical crossover, when anharmonic corrections to the vibrational entropy are included.
△ Less
Submitted 9 April, 2022;
originally announced April 2022.
-
Dependence of the glass transition and jamming densities on spatial dimension
Authors:
Monoj Adhikari,
Smarajit Karmakar,
Srikanth Sastry
Abstract:
We investigate the dynamics of soft sphere liquids through computer simulations for spatial dimensions from $d =3$ to $8$, over a wide range of temperatures and densities. Employing a scaling of density-temperature dependent relaxation times, we precisely identify the density $φ_0$ which marks the ideal glass transition in the hard sphere limit, and a crossover from sub- to super-Arrhenius tempera…
▽ More
We investigate the dynamics of soft sphere liquids through computer simulations for spatial dimensions from $d =3$ to $8$, over a wide range of temperatures and densities. Employing a scaling of density-temperature dependent relaxation times, we precisely identify the density $φ_0$ which marks the ideal glass transition in the hard sphere limit, and a crossover from sub- to super-Arrhenius temperature dependence. The difference between $φ_0$ and the athermal jamming density $φ_J$, small in 3 and 4 dimensions, increases with dimension, with $φ_0 > φ_J$ for $d > 4$. We compare our results with recent theoretical calculations.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
Zero-Query Transfer Attacks on Context-Aware Object Detectors
Authors:
Zikui Cai,
Shantanu Rane,
Alejandro E. Brito,
Chengyu Song,
Srikanth V. Krishnamurthy,
Amit K. Roy-Chowdhury,
M. Salman Asif
Abstract:
Adversarial attacks perturb images such that a deep neural network produces incorrect classification results. A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check, wherein, if the detected objects are not consistent with an appropriately defined context, then an attack is suspected. Stronger attacks are needed to fool su…
▽ More
Adversarial attacks perturb images such that a deep neural network produces incorrect classification results. A promising approach to defend against adversarial attacks on natural multi-object scenes is to impose a context-consistency check, wherein, if the detected objects are not consistent with an appropriately defined context, then an attack is suspected. Stronger attacks are needed to fool such context-aware detectors. We present the first approach for generating context-consistent adversarial attacks that can evade the context-consistency check of black-box object detectors operating on complex, natural scenes. Unlike many black-box attacks that perform repeated attempts and open themselves to detection, we assume a "zero-query" setting, where the attacker has no knowledge of the classification decisions of the victim system. First, we derive multiple attack plans that assign incorrect labels to victim objects in a context-consistent manner. Then we design and use a novel data structure that we call the perturbation success probability matrix, which enables us to filter the attack plans and choose the one most likely to succeed. This final attack plan is implemented using a perturbation-bounded adversarial attack algorithm. We compare our zero-query attack against a few-query scheme that repeatedly checks if the victim system is fooled. We also compare against state-of-the-art context-agnostic attacks. Against a context-aware defense, the fooling rate of our zero-query approach is significantly higher than context-agnostic approaches and higher than that achievable with up to three rounds of the few-query scheme.
△ Less
Submitted 29 March, 2022;
originally announced March 2022.
-
Quantum counterfactuality with identical particles
Authors:
Vinod N. Rao,
Anindita Banerjee,
R. Srikanth
Abstract:
Quantum self-interference enables the counterfactual transmission of information, whereby the transmitted bits involve no particles traveling through the channel. In this work, we show how counterfactuality can be realized even when the self interference is replaced by interference between identical particles. Interestingly, the facet of indistinguishability called forth here is associated with fi…
▽ More
Quantum self-interference enables the counterfactual transmission of information, whereby the transmitted bits involve no particles traveling through the channel. In this work, we show how counterfactuality can be realized even when the self interference is replaced by interference between identical particles. Interestingly, the facet of indistinguishability called forth here is associated with first-order coherence, and is different from the usual notion of indistinguishability associated with the (anti-)commutation relations of mode operators. From an experimental perspective, the simplest implementation of the proposed idea can be realized by slight modifications to existing protocols for differential-phase-shift quantum key distribution or interaction-free measurement.
△ Less
Submitted 17 October, 2023; v1 submitted 21 March, 2022;
originally announced March 2022.
-
On the eternal non-Markovianity of non-unital quantum channels
Authors:
Shrikant Utagi,
Subhashish Banerjee,
R. Srikanth
Abstract:
The eternally non-Markovian Pauli channel is an example of a unital channel characterized by a negative decay rate for all time $t>0$. Here we consider the problem of constructing an analogous non-unital channel, and show in particular that a $d$-dimensional generalized amplitude damping (GAD) channel cannot be eternally non-Markovian when the non-Markovianity originates solely from the non-unital…
▽ More
The eternally non-Markovian Pauli channel is an example of a unital channel characterized by a negative decay rate for all time $t>0$. Here we consider the problem of constructing an analogous non-unital channel, and show in particular that a $d$-dimensional generalized amplitude damping (GAD) channel cannot be eternally non-Markovian when the non-Markovianity originates solely from the non-unital part of the channel. We study specific ramifications of this result for qubit GAD. Specifically, we construct a quasi-eternally non-Markovian qubit GAD channel, characterized by a time $t^\ast > 0$, such that the channel is non-Markovian only and for all time $t > t^\ast$. We further point out that our negative result for the qudit GAD channel, namely the impossibility of the eternal non-Markovian property, does not hold for a general qubit or higher-dimensional non-unital channel.
△ Less
Submitted 2 October, 2023; v1 submitted 20 March, 2022;
originally announced March 2022.
-
Label Semantics for Few Shot Named Entity Recognition
Authors:
Jie Ma,
Miguel Ballesteros,
Srikanth Doss,
Rishita Anubhai,
Sunil Mallya,
Yaser Al-Onaizan,
Dan Roth
Abstract:
We study the problem of few shot learning for named entity recognition. Specifically, we leverage the semantic information in the names of the labels as a way of giving the model additional signal and enriched priors. We propose a neural architecture that consists of two BERT encoders, one to encode the document and its tokens and another one to encode each of the labels in natural language format…
▽ More
We study the problem of few shot learning for named entity recognition. Specifically, we leverage the semantic information in the names of the labels as a way of giving the model additional signal and enriched priors. We propose a neural architecture that consists of two BERT encoders, one to encode the document and its tokens and another one to encode each of the labels in natural language format. Our model learns to match the representations of named entities computed by the first encoder with label representations computed by the second encoder. The label semantics signal is shown to support improved state-of-the-art results in multiple few shot NER benchmarks and on-par performance in standard benchmarks. Our model is especially effective in low resource settings.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Cohomological supports of tensor products of modules over commutative rings
Authors:
Srikanth B. Iyengar,
Josh Pollitz,
William T. Sanders
Abstract:
This works concerns cohomological support varieties of modules over commutative local rings. The main result is that the support of a derived tensor product of a pair of differential graded modules over a Koszul complex is the join of the supports of the modules. This generalizes, and gives another proof of, a result of Dao and the third author dealing with Tor-independent modules over complete in…
▽ More
This works concerns cohomological support varieties of modules over commutative local rings. The main result is that the support of a derived tensor product of a pair of differential graded modules over a Koszul complex is the join of the supports of the modules. This generalizes, and gives another proof of, a result of Dao and the third author dealing with Tor-independent modules over complete intersection rings. The result for Koszul complexes has a broader applicability, including to exterior algebras over local rings.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN
Authors:
Bolor-Erdene Zolbayar,
Ryan Sheatsley,
Patrick McDaniel,
Michael J. Weisman,
Sencun Zhu,
Shitong Zhu,
Srikanth Krishnamurthy
Abstract:
Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examp…
▽ More
Network intrusion detection systems (NIDS) are an essential defense for computer networks and the hosts within them. Machine learning (ML) nowadays predominantly serves as the basis for NIDS decision making, where models are tuned to reduce false alarms, increase detection rates, and detect known and unknown attacks. At the same time, ML models have been found to be vulnerable to adversarial examples that undermine the downstream task. In this work, we ask the practical question of whether real-world ML-based NIDS can be circumvented by crafted adversarial flows, and if so, how can they be created. We develop the generative adversarial network (GAN)-based attack algorithm NIDSGAN and evaluate its effectiveness against realistic ML-based NIDS. Two main challenges arise for generating adversarial network traffic flows: (1) the network features must obey the constraints of the domain (i.e., represent realistic network behavior), and (2) the adversary must learn the decision behavior of the target NIDS without knowing its model internals (e.g., architecture and meta-parameters) and training data. Despite these challenges, the NIDSGAN algorithm generates highly realistic adversarial traffic flows that evade ML-based NIDS. We evaluate our attack algorithm against two state-of-the-art DNN-based NIDS in whitebox, blackbox, and restricted-blackbox threat models and achieve success rates which are on average 99%, 85%, and 70%, respectively. We also show that our attack algorithm can evade NIDS based on classical ML models including logistic regression, SVM, decision trees and KNNs, with a success rate of 70% on average. Our results demonstrate that deploying ML-based NIDS without careful defensive strategies against adversarial flows may (and arguably likely will) lead to future compromises.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
Enhancing associative memory recall in non-equilibrium materials through activity
Authors:
Agnish Kumar Behera,
Madan Rao,
Srikanth Sastry,
Suriyanarayanan Vaikuntanathan
Abstract:
Associative memory, a form of content-addressable memory, facilitates information storage and retrieval in many biological and physical systems. In statistical mechanics models, associative memory at equilibrium is represented through attractor basins in the free energy landscape. Here, we use the Hopfield model, a paradigmatic model to describe associate memory, to investigate the effect of non-e…
▽ More
Associative memory, a form of content-addressable memory, facilitates information storage and retrieval in many biological and physical systems. In statistical mechanics models, associative memory at equilibrium is represented through attractor basins in the free energy landscape. Here, we use the Hopfield model, a paradigmatic model to describe associate memory, to investigate the effect of non-equilibrium activity on memory retention and recall. We introduce activity into the system as gaussian-colored noise which breaks detailed balance and forces the system out of equilibrium. We observe that, under these non-equilibrium conditions, the Hopfield network has a higher storage capacity than that allowed at equilibrium. Using analytical and numerical techniques, we show that the rate of entropy production modifies the energy landscape and helps the system to access memory regions which were previously inaccessible.
△ Less
Submitted 6 March, 2022;
originally announced March 2022.
-
Spin Seebeck effect in iron oxide thin films: Effects of phase transition, phase coexistence, and surface magnetism
Authors:
Amit Chanda,
Derick DeTellem,
Yen Thi Hai Pham,
Jenae E. Shoup,
Anh Tuan Duong,
Raja Das,
Sunglae Cho,
Dmitri V. Voronine,
M. Tuan Trinh,
Dario A. Arena,
Sarath Witanachchi,
Hariharan Srikanth,
Manh-Huong Phan
Abstract:
Understanding impacts of phase transition, phase coexistence, and surface magnetism on the longitudinal spin Seebeck effect (LSSE) in a magnetic system is essential to manipulate the spin to charge current conversion efficiency for spincaloritronic applications. We aim to elucidate these effects by performing a comprehensive study of the temperature dependence of LSSE in biphase iron oxide (BPIO =…
▽ More
Understanding impacts of phase transition, phase coexistence, and surface magnetism on the longitudinal spin Seebeck effect (LSSE) in a magnetic system is essential to manipulate the spin to charge current conversion efficiency for spincaloritronic applications. We aim to elucidate these effects by performing a comprehensive study of the temperature dependence of LSSE in biphase iron oxide (BPIO = alpha-Fe2O3 + Fe3O4) thin films grown on Si (100) and Al2O3 (111) substrates. A combination of temperature-dependent anomalous Nernst effect (ANE) and electrical resistivity measurements show that the contribution of ANE from the BPIO layer is negligible compared to the intrinsic LSSE in the Si/BPIO/Pt heterostructure even at room temperature. Below the Verwey transition of the Fe3O4 phase, the total signal across BPIO/Pt is dominated by the LSSE. Noticeable changes in the intrinsic LSSE signal for both Si/BPIO/Pt and Al2O3/BPIO/Pt heterostructures around the Verwey transition of the Fe3O4 phase and the antiferromagnetic (AFM) Morin transition of the alpha-Fe2O3 phase are observed. The LSSE signal for Si/BPIO/Pt is found to be almost two times greater than that for Al2O3/BPIO/Pt, an opposite trend is observed for the saturation magnetization though. Magnetic force microscopy reveals the higher density of surface magnetic moments of the Si/BPIO film compared to the Al2O3/BPIO film, which underscores a dominant role of interfacial magnetism on the LSSE signal and thereby explains the larger LSSE for Si/BPIO/Pt.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
A Robust Version of Hegedűs's Lemma, with Applications
Authors:
Srikanth Srinivasan
Abstract:
Hegedűs's lemma is the following combinatorial statement regarding polynomials over finite fields. Over a field $\mathbb{F}$ of characteristic $p > 0$ and for $q$ a power of $p$, the lemma says that any multilinear polynomial $P\in \mathbb{F}[x_1,\ldots,x_n]$ of degree less than $q$ that vanishes at all points in $\{0,1\}^n$ of some fixed Hamming weight $k\in [q,n-q]$ must also vanish at all point…
▽ More
Hegedűs's lemma is the following combinatorial statement regarding polynomials over finite fields. Over a field $\mathbb{F}$ of characteristic $p > 0$ and for $q$ a power of $p$, the lemma says that any multilinear polynomial $P\in \mathbb{F}[x_1,\ldots,x_n]$ of degree less than $q$ that vanishes at all points in $\{0,1\}^n$ of some fixed Hamming weight $k\in [q,n-q]$ must also vanish at all points in $\{0,1\}^n$ of weight $k + q$. This lemma was used by Hegedűs (2009) to give a solution to \emph{Galvin's problem}, an extremal problem about set systems; by Alon, Kumar and Volk (2018) to improve the best-known multilinear circuit lower bounds; and by Hrubeš, Ramamoorthy, Rao and Yehudayoff (2019) to prove optimal lower bounds against depth-$2$ threshold circuits for computing some symmetric functions.
In this paper, we formulate a robust version of Hegedűs's lemma. Informally, this version says that if a polynomial of degree $o(q)$ vanishes at most points of weight $k$, then it vanishes at many points of weight $k+q$. We prove this lemma and give three different applications.
△ Less
Submitted 24 February, 2023; v1 submitted 10 February, 2022;
originally announced February 2022.
-
Integration of a machine learning model into a decision support tool to predict absenteeism at work of prospective employees
Authors:
Gopal Nath,
Antoine Harfouche,
Austin Coursey,
Krishna K. Saha,
Srikanth Prabhu,
Saptarshi Sengupta
Abstract:
Purpose - Inefficient hiring may result in lower productivity and higher training costs. Productivity losses caused by absenteeism at work cost U.S. employers billions of dollars each year. Also, employers typically spend a considerable amount of time managing employees who perform poorly. The purpose of this study is to develop a decision support tool to predict absenteeism among potential employ…
▽ More
Purpose - Inefficient hiring may result in lower productivity and higher training costs. Productivity losses caused by absenteeism at work cost U.S. employers billions of dollars each year. Also, employers typically spend a considerable amount of time managing employees who perform poorly. The purpose of this study is to develop a decision support tool to predict absenteeism among potential employees. Design/methodology/approach - We utilized a popular open-access dataset. In order to categorize absenteeism classes, the data have been preprocessed, and four methods of machine learning classification have been applied: Multinomial Logistic Regression (MLR), Support Vector Machines (SVM), Artificial Neural Networks (ANN), and Random Forests (RF). We selected the best model, based on several validation scores, and compared its performance against the existing model; we then integrated the best model into our proposed web-based for hiring managers. Findings - A web-based decision tool allows hiring managers to make more informed decisions before hiring a potential employee, thus reducing time, financial loss and reducing the probability of economic insolvency. Originality/value - In this paper, we propose a model that is trained based on attributes that can be collected during the hiring process. Furthermore, hiring managers may lack experience in machine learning or do not have the time to spend developing machine learning algorithms. Thus, we propose a web-based interactive tool that can be used without prior knowledge of machine learning algorithms.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Robust Audio Anomaly Detection
Authors:
Wo Jae Lee,
Karim Helwani,
Arvindh Krishnaswamy,
Srikanth Tenneti
Abstract:
We propose an outlier robust multivariate time series model which can be used for detecting previously unseen anomalous sounds based on noisy training data. The presented approach doesn't assume the presence of labeled anomalies in the training dataset and uses a novel deep neural network architecture to learn the temporal dynamics of the multivariate time series at multiple resolutions while bein…
▽ More
We propose an outlier robust multivariate time series model which can be used for detecting previously unseen anomalous sounds based on noisy training data. The presented approach doesn't assume the presence of labeled anomalies in the training dataset and uses a novel deep neural network architecture to learn the temporal dynamics of the multivariate time series at multiple resolutions while being robust to contaminations in the training dataset. The temporal dynamics are modeled using recurrent layers augmented with attention mechanism. These recurrent layers are built on top of convolutional layers allowing the network to extract features at multiple resolutions. The output of the network is an outlier robust probability density function modeling the conditional probability of future samples given the time series history. State-of-the-art approaches using other multiresolution architectures are contrasted with our proposed approach. We validate our solution using publicly available machine sound datasets. We demonstrate the effectiveness of our approach in anomaly detection by comparing against several state-of-the-art models.
△ Less
Submitted 3 February, 2022;
originally announced February 2022.
-
New Insights on Target Speaker Extraction
Authors:
Mohamed Elminshawi,
Wolfgang Mack,
Srikanth Raj Chetupalli,
Soumitro Chakrabarty,
Emanuël A. P. Habets
Abstract:
Speaker extraction (SE) aims to segregate the speech of a target speaker from a mixture of interfering speakers with the help of auxiliary information. Several forms of auxiliary information have been employed in single-channel SE, such as a speech snippet enrolled from the target speaker or visual information corresponding to the spoken utterance. The effectiveness of the auxiliary information in…
▽ More
Speaker extraction (SE) aims to segregate the speech of a target speaker from a mixture of interfering speakers with the help of auxiliary information. Several forms of auxiliary information have been employed in single-channel SE, such as a speech snippet enrolled from the target speaker or visual information corresponding to the spoken utterance. The effectiveness of the auxiliary information in SE is typically evaluated by comparing the extraction performance of SE with uninformed speaker separation (SS) methods. Following this evaluation protocol, many SE studies have reported performance improvement compared to SS, attributing this to the auxiliary information. However, such studies have been conducted on a few datasets and have not considered recent deep neural network architectures for SS that have shown impressive separation performance. In this paper, we examine the role of the auxiliary information in SE for different input scenarios and over multiple datasets. Specifically, we compare the performance of two SE systems (audio-based and video-based) with SS using a common framework that utilizes the recently proposed dual-path recurrent neural network as the main learning machine. Experimental evaluation on various datasets demonstrates that the use of auxiliary information in the considered SE systems does not always lead to better extraction performance compared to the uninformed SS system. Furthermore, we offer insights into the behavior of the SE systems when provided with different and distorted auxiliary information given the same mixture input.
△ Less
Submitted 15 September, 2023; v1 submitted 1 February, 2022;
originally announced February 2022.
-
Solar supergranular fractal dimension dependence on the Solar cycle phase
Authors:
G. Rajani,
G. M. Sowmya,
U. Paniveni,
R. Srikanth
Abstract:
We study the complexity of the supergranular network through fractal dimension by using Ca II K digitized data archive obtained from Kodaikanal solar observatory. The data consists of 326 visually selected supergranular cells spread across the 23rd solar cycle. Only cells that were well-defined were chosen for the analysis and we discuss the potential selection effect thereof, mainly that it favor…
▽ More
We study the complexity of the supergranular network through fractal dimension by using Ca II K digitized data archive obtained from Kodaikanal solar observatory. The data consists of 326 visually selected supergranular cells spread across the 23rd solar cycle. Only cells that were well-defined were chosen for the analysis and we discuss the potential selection effect thereof, mainly that it favors cells of a smaller size (< 20 Mm). Within this sample, we analyzed the fractal dimension of supergranules across the Solar cycle and find that it is anticorrelated with the activity level.
△ Less
Submitted 21 July, 2022; v1 submitted 1 February, 2022;
originally announced February 2022.
-
PostGAN: A GAN-Based Post-Processor to Enhance the Quality of Coded Speech
Authors:
Srikanth Korse,
Nicola Pia,
Kishan Gupta,
Guillaume Fuchs
Abstract:
The quality of speech coded by transform coding is affected by various artefacts especially when bitrates to quantize the frequency components become too low. In order to mitigate these coding artefacts and enhance the quality of coded speech, a post-processor that relies on a-priori information transmitted from the encoder is traditionally employed at the decoder side. In recent years, several da…
▽ More
The quality of speech coded by transform coding is affected by various artefacts especially when bitrates to quantize the frequency components become too low. In order to mitigate these coding artefacts and enhance the quality of coded speech, a post-processor that relies on a-priori information transmitted from the encoder is traditionally employed at the decoder side. In recent years, several data-driven post-postprocessors have been proposed which were shown to outperform traditional approaches. In this paper, we propose PostGAN, a GAN-based neural post-processor that operates in the sub-band domain and relies on the U-Net architecture and a learned affine transform. It has been tested on the recently standardized low-complexity, low-delay bluetooth codec (LC3) for wideband speech at the lowest bitrate (16 kbit/s). Subjective evaluations and objective scores show that the newly introduced post-processor surpasses previously published methods and can improve the quality of coded speech by around 20 MUSHRA points.
△ Less
Submitted 31 January, 2022;
originally announced January 2022.
-
A DNN Based Post-Filter to Enhance the Quality of Coded Speech in MDCT Domain
Authors:
Kishan Gupta,
Srikanth Korse,
Bernd Edler,
Guillaume Fuchs
Abstract:
Frequency domain processing, and in particular the use of Modified Discrete Cosine Transform (MDCT), is the most widespread approach to audio coding. However, at low bitrates, audio quality, especially for speech, degrades drastically due to the lack of available bits to directly code the transform coefficients. Traditionally, post-filtering has been used to mitigate artefacts in the coded speech…
▽ More
Frequency domain processing, and in particular the use of Modified Discrete Cosine Transform (MDCT), is the most widespread approach to audio coding. However, at low bitrates, audio quality, especially for speech, degrades drastically due to the lack of available bits to directly code the transform coefficients. Traditionally, post-filtering has been used to mitigate artefacts in the coded speech by exploiting a-priori information of the source and extra transmitted parameters. Recently, data-driven post-filters have shown better results, but at the cost of significant additional complexity and delay. In this work, we propose a mask-based post-filter operating directly in MDCT domain of the codec, inducing no extra delay. The real-valued mask is applied to the quantized MDCT coefficients and is estimated from a relatively lightweight convolutional encoder-decoder network. Our solution is tested on the recently standardized low-delay, low-complexity codec (LC3) at lowest possible bitrate of 16 kbps. Objective and subjective assessments clearly show the advantage of this approach over the conventional post-filter, with an average improvement of 10 MUSHRA points over the LC3 coded speech.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Criticality and marginal stability of the shear jamming transition of frictionless soft spheres
Authors:
Varghese Babu,
Srikanth Sastry
Abstract:
We study numerically the critical behavior and marginal stability of the shear jamming transition for frictionless soft spheres, observed to occur over a finite range of densities, associated with isotropic jamming for densities above the minimum jamming (J-point) density. Several quantities are shown to scale near the shear jamming point in the same way as the isotropic jamming point. We compute…
▽ More
We study numerically the critical behavior and marginal stability of the shear jamming transition for frictionless soft spheres, observed to occur over a finite range of densities, associated with isotropic jamming for densities above the minimum jamming (J-point) density. Several quantities are shown to scale near the shear jamming point in the same way as the isotropic jamming point. We compute the exponents associated with the small force distribution and the interparticle gap distribution,and show that the corresponding exponents are consistent with the marginal stability condition observed for isotropic jamming, and with predictions of the mean field theory of jamming in hard spheres.
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
Socioeconomic disparities and COVID-19: the causal connections
Authors:
Tannista Banerjee,
Ayan Paul,
Vishak Srikanth,
Inga Strümke
Abstract:
The analysis of causation is a challenging task that can be approached in various ways. With the increasing use of machine learning based models in computational socioeconomics, explaining these models while taking causal connections into account is a necessity. In this work, we advocate the use of an explanatory framework from cooperative game theory augmented with $do$ calculus, namely causal Sh…
▽ More
The analysis of causation is a challenging task that can be approached in various ways. With the increasing use of machine learning based models in computational socioeconomics, explaining these models while taking causal connections into account is a necessity. In this work, we advocate the use of an explanatory framework from cooperative game theory augmented with $do$ calculus, namely causal Shapley values. Using causal Shapley values, we analyze socioeconomic disparities that have a causal link to the spread of COVID-19 in the USA. We study several phases of the disease spread to show how the causal connections change over time. We perform a causal analysis using random effects models and discuss the correspondence between the two methods to verify our results. We show the distinct advantages a non-linear machine learning models have over linear models when performing a multivariate analysis, especially since the machine learning models can map out non-linear correlations in the data. In addition, the causal Shapley values allow for including the causal structure in the variable importance computed for the machine learning model.
△ Less
Submitted 18 January, 2022;
originally announced January 2022.
-
Yielding behavior of glasses under asymmetric cyclic deformation
Authors:
Monoj Adhikari,
Muhittin Mungan,
Srikanth Sastry
Abstract:
We consider the yielding behaviour of a model glass subjected to asymmetric cyclic shear deformation, wherein the applied strain varies between 0 and a maximum value $γ_{\rm max}$, and study its dependence on the degree of annealing of the glass and system size. The yielding behaviour of well annealed glasses (unlike poorly annealed glasses) display striking differences from the symmetric case, wi…
▽ More
We consider the yielding behaviour of a model glass subjected to asymmetric cyclic shear deformation, wherein the applied strain varies between 0 and a maximum value $γ_{\rm max}$, and study its dependence on the degree of annealing of the glass and system size. The yielding behaviour of well annealed glasses (unlike poorly annealed glasses) display striking differences from the symmetric case, with the emergence of an intermediate strain regime with substantial plasticity but no yielding. The observed behaviour is satisfactorily captured by a recently proposed model. For larger system sizes, the intermediate strain regime narrows, leading to a remarkable reversal of yield strain with annealing.
△ Less
Submitted 18 January, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
Lepton flavor violating $Z$ and Higgs decays in the scotogenic model
Authors:
Raghavendra Srikanth Hundi
Abstract:
In this work, we have studied lepton flavor violating (LFV) decays of $Z$ gauge boson and Higgs boson ($H$) in the scotogenic model. We have computed branching ratios for the decays $Z\to\ell_α\ell_β$ and $H\to\ell_α\ell_β$ in this model. Here, $\ell_α$ and $\ell_β$ are different charged lepton fields. After fitting to the neutrino oscillation observables in the scotogenic model, we have found tha…
▽ More
In this work, we have studied lepton flavor violating (LFV) decays of $Z$ gauge boson and Higgs boson ($H$) in the scotogenic model. We have computed branching ratios for the decays $Z\to\ell_α\ell_β$ and $H\to\ell_α\ell_β$ in this model. Here, $\ell_α$ and $\ell_β$ are different charged lepton fields. After fitting to the neutrino oscillation observables in the scotogenic model, we have found that the branching ratios for the LFV decays of $Z$ and $H$ can be as large as $\sim10^{-8}$ and $\sim10^{-3}$ respectively. However, after satisfying the constraints due to non-observation of $\ell_α\to\ell_βγ$ decays, the above mentioned branching ratio results are found to be suppressed by a factor of $\sim10^{-7}$.
△ Less
Submitted 6 June, 2022; v1 submitted 10 January, 2022;
originally announced January 2022.
-
Measure of invertible dynamical maps under convex combinations of noninvertible dynamical maps
Authors:
Vinayak Jagadish,
R. Srikanth,
Francesco Petruccione
Abstract:
We study the convex combinations of the $(d+1)$ generalized Pauli dynamical maps in a Hilbert space of dimension $d$. For certain choices of the decoherence function, the maps are noninvertible and they remain under convex combinations as well. For the case of dynamical maps characterized by the decoherence function $(1-e^{-ct})/n$ with the decoherence parameter $n$ and decay factor $c$, we evalua…
▽ More
We study the convex combinations of the $(d+1)$ generalized Pauli dynamical maps in a Hilbert space of dimension $d$. For certain choices of the decoherence function, the maps are noninvertible and they remain under convex combinations as well. For the case of dynamical maps characterized by the decoherence function $(1-e^{-ct})/n$ with the decoherence parameter $n$ and decay factor $c$, we evaluate the fraction of invertible maps obtained upon mixing, which is found to increase superexponentially with dimension $d$.
△ Less
Submitted 28 July, 2022; v1 submitted 10 January, 2022;
originally announced January 2022.
-
Phase Boundary Segregation in Multicomponent Alloys: A Diffuse-Interface Thermodynamic Model
Authors:
Sourabh Bhagwan Kadambi,
Srikanth Patala
Abstract:
Microalloying elements tend to segregate to the matrix-precipitate phase boundaries to reduce the interfacial energy. The segregation mechanism is emerging as a novel design strategy for developing precipitation-hardened alloys with significantly improved coarsening resistance for high temperature applications. In this paper, we report a nanoscopic diffuse-interface thermodynamic model that descri…
▽ More
Microalloying elements tend to segregate to the matrix-precipitate phase boundaries to reduce the interfacial energy. The segregation mechanism is emerging as a novel design strategy for developing precipitation-hardened alloys with significantly improved coarsening resistance for high temperature applications. In this paper, we report a nanoscopic diffuse-interface thermodynamic model that describes multicomponent segregation behavior in two-phase substitutional alloys. Following classical approaches for grain boundaries, we employ the regular solution thermodynamics to establish segregation isotherms. We show that the model recovers the Guttmann multicomponent isotherm describing local interfacial concentrations, and the generalized Gibbs adsorption isotherm that governs the total solute excess and interfacial energy. A variety of multicomponent segregation behaviors are demonstrated for a model two-phase quaternary alloy. The nature of interfacial parameters and the resulting analytic solutions make the model amenable for parameterization and comparison with atomistic calculations and experimental characterizations.
△ Less
Submitted 9 January, 2022;
originally announced January 2022.
-
Self-coupling: An Effective Method to Mitigate Thermoacoustic Instability
Authors:
Sneha Srikanth,
Ankit Sahay,
Samadhan A. Pawar,
Krishna Manoj,
R. I. Sujith
Abstract:
The presence of undesirable large-amplitude self-sustained oscillations in combustors resulting from thermoacoustic instability can lead to performance loss and structural damage to components of gas turbine and rocket engines. Traditional feedback controls to mitigate thermoacoustic instability possess electromechanical components, which are expensive to maintain regularly and unreliable in the h…
▽ More
The presence of undesirable large-amplitude self-sustained oscillations in combustors resulting from thermoacoustic instability can lead to performance loss and structural damage to components of gas turbine and rocket engines. Traditional feedback controls to mitigate thermoacoustic instability possess electromechanical components, which are expensive to maintain regularly and unreliable in the harsh environments of combustors. In this study, we demonstrate the quenching of thermoacoustic instability through self-coupling -- a method wherein a hollow tube is used to provide acoustic self-feedback to a thermoacoustic system. Through experiments and modeling, we identify the optimal coupling conditions for attaining amplitude death, i.e., complete suppression of thermoacoustic instabilities, in a horizontal Rijke tube. We examine the effect of both system and coupling parameters on the occurrence of amplitude death. We thereby show that the parametric regions of amplitude death occur when the coupling tube length is close to an odd multiple of the length of the Rijke tube. The optimal location of the coupling tube for achieving amplitude death is near the anti-node of the acoustic standing wave in the Rijke tube. Furthermore, we find that self-coupling mitigates thermoacoustic instability in a Rijke tube more effectively than mutual coupling of two identical Rijke tubes. Thus, we believe that self-coupling can prove to be a simple, cost-effective solution for mitigating thermoacoustic instability in gas turbine combustors.
△ Less
Submitted 18 January, 2022; v1 submitted 28 December, 2021;
originally announced December 2021.
-
Faster Deep Ensemble Averaging for Quantification of DNA Damage from Comet Assay Images With Uncertainty Estimates
Authors:
Srikanth Namuduri,
Prateek Mehta,
Lise Barbe,
Stephanie Lam,
Zohreh Faghihmonzavi,
Steve Finkbeiner,
Shekhar Bhansali
Abstract:
Several neurodegenerative diseases involve the accumulation of cellular DNA damage. Comet assays are a popular way of estimating the extent of DNA damage. Current literature on the use of deep learning to quantify DNA damage presents an empirical approach to hyper-parameter optimization and does not include uncertainty estimates. Deep ensemble averaging is a standard approach to estimating uncerta…
▽ More
Several neurodegenerative diseases involve the accumulation of cellular DNA damage. Comet assays are a popular way of estimating the extent of DNA damage. Current literature on the use of deep learning to quantify DNA damage presents an empirical approach to hyper-parameter optimization and does not include uncertainty estimates. Deep ensemble averaging is a standard approach to estimating uncertainty but it requires several iterations of network training, which makes it time-consuming. Here we present an approach to quantify the extent of DNA damage that combines deep learning with a rigorous and comprehensive method to optimize the hyper-parameters with the help of statistical tests. We also use an architecture that allows for a faster computation of deep ensemble averaging and performs statistical tests applicable to networks using transfer learning. We applied our approach to a comet assay dataset with more than 1300 images and achieved an $R^2$ of 0.84, where the output included the confidence interval for each prediction. The proposed architecture is an improvement over the current approaches since it speeds up the uncertainty estimation by 30X while being statistically more rigorous.
△ Less
Submitted 23 December, 2021;
originally announced December 2021.
-
Mean field theory of yielding under oscillatory shear
Authors:
Jack T. Parley,
Srikanth Sastry,
Peter Sollich
Abstract:
We study a mean field elastoplastic model, embedded within a disordered landscape of local yield barriers, to shed light on the behaviour of athermal amorphous solids subject to oscillatory shear. We show that the model presents a genuine dynamical transition between an elastic and a yielded state, and qualitatively reproduces the dependence on the initial degree of annealing found in particle sim…
▽ More
We study a mean field elastoplastic model, embedded within a disordered landscape of local yield barriers, to shed light on the behaviour of athermal amorphous solids subject to oscillatory shear. We show that the model presents a genuine dynamical transition between an elastic and a yielded state, and qualitatively reproduces the dependence on the initial degree of annealing found in particle simulations. For initial conditions prepared below the analytically derived threshold energy, we observe a non-trivial, non-monotonic approach to the yielded state. The timescale diverges as one approaches the yielding point from above, which we identify with the fatigue limit. We finally discuss the connections to brittle yielding under uniform shear.
△ Less
Submitted 14 April, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
MnP films with desired magnetic, magnetocaloric and thermoelectric properties for a perspective magneto-thermo-electric cooling device
Authors:
C. M. Hung,
R. P. Madhogaria,
B. Muchharla,
E. M. Clements,
A. T. Duong,
R. Das,
P. T. Huy,
S. L. Cho,
S. Witanachchi,
H. Srikanth,
Manh-Huong Phan
Abstract:
A perspective magneto-thermo-electric cooling device (MTECD) comprising a central magnetocaloric (MC) material (e.g., Gd) sandwiched by two thermoelectric (TE) materials (e.g., MnP) is proposed. The presence of the TE materials in the MTECD guides the heat flow direction and enhances heat pulsation. In this case, the usage of a ferromagnetic TE material that combines large TE with small MC propert…
▽ More
A perspective magneto-thermo-electric cooling device (MTECD) comprising a central magnetocaloric (MC) material (e.g., Gd) sandwiched by two thermoelectric (TE) materials (e.g., MnP) is proposed. The presence of the TE materials in the MTECD guides the heat flow direction and enhances heat pulsation. In this case, the usage of a ferromagnetic TE material that combines large TE with small MC properties within a similar temperature region can enhance the magnetic flux density and heat exchange efficiency. Here, we show that MnP nanorod-structured films with desired magnetic, MC and TE properties are very promising for use in MTECDs. The films were grown on Si substrates at 300, 400 and 500°C using molecular beam epitaxy. The 400 oC sample shows a desired TE and MC combination. A large power factor of 24.06 μW m-1 K-2 is achieved at room temperature. In this temperature region, the film exhibits a small MC effect (-deltaSM ~0.64 J/kg K and deltaTad ~0.3 K at m0H = 2 T) but ferromagnetism that gives rise to the enhanced MC effect of the central MC material. These properties could enable the MTECD to operate at high frequency.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Context-Aware Transfer Attacks for Object Detection
Authors:
Zikui Cai,
Xinxin Xie,
Shasha Li,
Mingjun Yin,
Chengyu Song,
Srikanth V. Krishnamurthy,
Amit K. Roy-Chowdhury,
M. Salman Asif
Abstract:
Blackbox transfer attacks for image classifiers have been extensively studied in recent years. In contrast, little progress has been made on transfer attacks for object detectors. Object detectors take a holistic view of the image and the detection of one object (or lack thereof) often depends on other objects in the scene. This makes such detectors inherently context-aware and adversarial attacks…
▽ More
Blackbox transfer attacks for image classifiers have been extensively studied in recent years. In contrast, little progress has been made on transfer attacks for object detectors. Object detectors take a holistic view of the image and the detection of one object (or lack thereof) often depends on other objects in the scene. This makes such detectors inherently context-aware and adversarial attacks in this space are more challenging than those targeting image classifiers. In this paper, we present a new approach to generate context-aware attacks for object detectors. We show that by using co-occurrence of objects and their relative locations and sizes as context information, we can successfully generate targeted mis-categorization attacks that achieve higher transfer success rates on blackbox object detectors than the state-of-the-art. We test our approach on a variety of object detectors with images from PASCAL VOC and MS COCO datasets and demonstrate up to $20$ percentage points improvement in performance compared to the other state-of-the-art methods.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Energy-Proportional Data Center Network Architecture Through OS, Switch and Laser Co-design
Authors:
Haiyang Han,
Nikos Terzenidis,
Dimitris Syrivelis,
Arash F. Beldachi,
George T. Kanellos,
Yigit Demir,
Jie Gu,
Srikanth Kandula,
Nikos Pleros,
Fabián Bustamante,
Nikos Hardavellas
Abstract:
Optical interconnects are already the dominant technology in large-scale data center networks. However, the high optical loss of many optical components coupled with the low efficiency of laser sources result in high aggregate power requirements for the thousands of optical transceivers used by these networks. As optical interconnects stay always on even as traffic demands ebb and flow, most of th…
▽ More
Optical interconnects are already the dominant technology in large-scale data center networks. However, the high optical loss of many optical components coupled with the low efficiency of laser sources result in high aggregate power requirements for the thousands of optical transceivers used by these networks. As optical interconnects stay always on even as traffic demands ebb and flow, most of this power is wasted. We present LC/DC, a data center network system architecture in which the operating system, the switch, and the optical components are co-designed to achieve energy proportionality.
LC/DC capitalizes on the path divergence of data center networks to turn on and off redundant paths according to traffic demand, while maintaining full connectivity. Turning off redundant paths allows the optical transceivers and their electronic drivers to power down and save energy. Maintaining full connectivity hides the laser turn-on delay. At the node layer, intercepting send requests within the OS allows for the NIC's laser turn-on delay to be fully overlapped with TCP/IP packet processing, and thus egress links can remain powered off until needed with zero performance penalty.
We demonstrate the feasibility of LC/DC by i) implementing the necessary modifications in the Linux kernel and device drivers, ii) implementing a 10Gbit/s FPGA switch, and iii) performing physical experiments with optical devices and circuit simulations. Our results on university data center traces and models of Facebook and Microsoft data center traffic show that LC/DC saves on average 60% of the optical transceivers power (68% max) at the cost of 6% higher packet delay.
△ Less
Submitted 20 December, 2021; v1 submitted 3 December, 2021;
originally announced December 2021.
-
Monolith to Microservices: Representing Application Software through Heterogeneous Graph Neural Network
Authors:
Alex Mathai,
Sambaran Bandyopadhyay,
Utkarsh Desai,
Srikanth Tamilselvam
Abstract:
Monolithic software encapsulates all functional capabilities into a single deployable unit. But managing it becomes harder as the demand for new functionalities grow. Microservice architecture is seen as an alternate as it advocates building an application through a set of loosely coupled small services wherein each service owns a single functional responsibility. But the challenges associated wit…
▽ More
Monolithic software encapsulates all functional capabilities into a single deployable unit. But managing it becomes harder as the demand for new functionalities grow. Microservice architecture is seen as an alternate as it advocates building an application through a set of loosely coupled small services wherein each service owns a single functional responsibility. But the challenges associated with the separation of functional modules, slows down the migration of a monolithic code into microservices. In this work, we propose a representation learning based solution to tackle this problem. We use a heterogeneous graph to jointly represent software artifacts (like programs and resources) and the different relationships they share (function calls, inheritance, etc.), and perform a constraint-based clustering through a novel heterogeneous graph neural network. Experimental studies show that our approach is effective on monoliths of different types.
△ Less
Submitted 20 May, 2022; v1 submitted 1 December, 2021;
originally announced December 2021.
-
Origin of the spectacular tidal shells of galaxy NGC474
Authors:
Michal Bílek,
Jérémy Fensch,
Ivana Ebrová,
Srikanth T. Nagesh,
Benoit Famaey,
Pierre-Alain Duc,
Pavel Kroupa
Abstract:
The lenticular galaxy NGC474 hosts a rich system of tidal shells and streams, some of which are exceptionally bright. Two teams recently presented spectroscopic observations of the brightest shells. These were the first shell spectra ever observed in integrated starlight. The authors studied the stellar populations of the shell, of the center of the galaxy and of its globular clusters. The precise…
▽ More
The lenticular galaxy NGC474 hosts a rich system of tidal shells and streams, some of which are exceptionally bright. Two teams recently presented spectroscopic observations of the brightest shells. These were the first shell spectra ever observed in integrated starlight. The authors studied the stellar populations of the shell, of the center of the galaxy and of its globular clusters. The precise formation scenario for the tidal features of this prominent galaxy however still remained unclear.
Here, we add further clues on their formation from the radii of the shells, and we present a scenario for the formation of the tidal features that seems to be unique and explaining all available data.
Shell radii are analyzed with the shell identification method, and we run self-consistent simulations of the formation of the tidal features. We consider Newtonian as well as MOND gravity.
Observations suggest that the tidal features originate from the accretion of a spiral galaxy. The shell identification method yields that the merging galaxies collided first 1.3Gyr ago and then again 0.9Gyr ago, thereby forming the shells in two generations. This would also explain the young ages of stellar populations in the center of the galaxy and the young age of the globular clusters. The analytic models of shell propagation, that underlie the shell identification method, are verified by a simulation. The simulations reproduce well the observed morphology of the tidal features. The accreted spiral likely reached NGC474 nearly radially, in the plane of the sky, from the south, its rotation axis pointing toward us. It should have had a stellar mass of around 1/6 of NGC474, i.e. $10^{9.8}\,M_\odot$. It seems that all tidal features in the galaxy originate from one merger.
△ Less
Submitted 14 January, 2022; v1 submitted 29 November, 2021;
originally announced November 2021.
-
Noninvertibility as a requirement for creating a semigroup under convex combinations of channels
Authors:
Vinayak Jagadish,
R. Srikanth,
Francesco Petruccione
Abstract:
We study the conditions under which a semigroup is obtained upon convex combinations of channels. In particular, we study the set of Pauli and generalized Pauli channels. We find that mixing only semigroups can never produce a semigroup. Counter-intuitively, we find that for a convex combination to yield a semigroup, most of the input channels have to be noninvertible.
We study the conditions under which a semigroup is obtained upon convex combinations of channels. In particular, we study the set of Pauli and generalized Pauli channels. We find that mixing only semigroups can never produce a semigroup. Counter-intuitively, we find that for a convex combination to yield a semigroup, most of the input channels have to be noninvertible.
△ Less
Submitted 10 March, 2022; v1 submitted 17 November, 2021;
originally announced November 2021.
-
Direct calculation of the ZZ-interaction rates in the multi-mode circuit-QED
Authors:
Firat Solgun,
Srikanth Srinivasan
Abstract:
Hamiltonians of the superconducting qubits of Transmon type involve non-zero ZZ-interaction terms due to their finite and small anharmonicities. These terms might lead to the unwanted accumulation of spurious phases during the execution of the two-qubit gates. Exact calculation of the ZZ-interaction rates requires the full diagonalization of the circuit Hamiltonians which very quickly becomes comp…
▽ More
Hamiltonians of the superconducting qubits of Transmon type involve non-zero ZZ-interaction terms due to their finite and small anharmonicities. These terms might lead to the unwanted accumulation of spurious phases during the execution of the two-qubit gates. Exact calculation of the ZZ-interaction rates requires the full diagonalization of the circuit Hamiltonians which very quickly becomes computationally demanding as the number of the modes in the coupler circuit increases. Here we propose a direct analytical method for the accurate estimation of the ZZ-interaction rates between low-anharmonicity qubits in the dispersive limit of the multi-mode circuit-QED. We observe very good agreement between the predictions of our method and the measurement data collected from the multi-qubit devices. Our method being an extension of our previous work in [1] is a new addition to the toolbox of the quantum microwave engineers as it relates the ZZ-interaction rates directly to the entries of the impedance matrix defined between the qubit ports.
△ Less
Submitted 19 November, 2021; v1 submitted 10 November, 2021;
originally announced November 2021.
-
On Vanishing Properties of Polynomials on Symmetric Sets of the Boolean Cube, in Positive Characteristic
Authors:
Srikanth Srinivasan,
S. Venkitesh
Abstract:
The finite-degree Zariski (Z-) closure is a classical algebraic object, that has found a key place in several applications of the polynomial method in combinatorics. In this work, we characterize the finite-degree Z-closures of a subclass of symmetric sets (subsets that are invariant under permutations of coordinates) of the Boolean cube, in positive characteristic.
Our results subsume multiple…
▽ More
The finite-degree Zariski (Z-) closure is a classical algebraic object, that has found a key place in several applications of the polynomial method in combinatorics. In this work, we characterize the finite-degree Z-closures of a subclass of symmetric sets (subsets that are invariant under permutations of coordinates) of the Boolean cube, in positive characteristic.
Our results subsume multiple statements on finite-degree Z-closures that have found applications in extremal combinatorial problems, for instance, pertaining to set systems (Hegedűs, Stud. Sci. Math. Hung. 2010; Hegedűs, arXiv 2021), and Boolean circuits (Hrǔbes et al., ICALP 2019). Our characterization also establishes that for the subclasses of symmetric sets that we consider, the finite-degree Z-closures have low computational complexity.
A key ingredient in our characterization is a new variant of finite-degree Z-closures, defined using vanishing conditions on only symmetric polynomials satisfying a degree bound.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Correlation between plastic rearrangements and local structure in a cyclically driven glass
Authors:
Saheli Mitra,
Susana Marin-Aguilar,
Srikanth Sastry,
Frank Smallenburg,
Giuseppe Foffi
Abstract:
The correlation between local structure and the propensity for structural rearrangements has been widely investigated in glass forming liquids and glasses. In this paper we use the excess two-body entropy $S_2$ and tetrahedrality $\n_{tet}$ as the per-particle local structural order parameters to explore such correlations in a three-dimensional model glass subjected to cyclic shear deformation. We…
▽ More
The correlation between local structure and the propensity for structural rearrangements has been widely investigated in glass forming liquids and glasses. In this paper we use the excess two-body entropy $S_2$ and tetrahedrality $\n_{tet}$ as the per-particle local structural order parameters to explore such correlations in a three-dimensional model glass subjected to cyclic shear deformation. We first show that for both liquid configurations and the corresponding inherent structures, local ordering increases upon lowering temperature, signaled by a decrease in the two-body entropy and an increase in tetrahedrality. When the inherent structures, or glasses, are periodically sheared athermally, they eventually reach absorbing states for small shear amplitudes, which do not change from one cycle to the next. Large strain amplitudes result in the formation of shear bands, within which particle motion is diffusive. We show that in the steady state, there is a clear difference in the local structural environment of particles that will be part of plastic rearrangements during the next shear cycle and that of particles that are immobile. In particular, particles with higher $S_2$ and lower $n_{tet}$ are more likely to go through rearrangements irrespective of the average energies of the configurations and strain amplitude. For high shear, we find very distinctive local order outside the mobile shear band region, where almost $30\%$ of the particles are involved in icosahedral clusters, contrasting strongly with the fraction of $<5\%$ found inside the shear band.
△ Less
Submitted 7 November, 2021;
originally announced November 2021.
-
Scaling of the thermally induced sign inversion of longitudinal spin Seebeck effect in a compensated ferrimagnet: Role of magnetic anisotropy
Authors:
Amit Chanda,
Noah Schulz,
Christian Holzmann,
Johannes Seyd,
Manfred Albrecht,
Manh-Huong Phan,
Hari Srikanth
Abstract:
We report on a systematic investigation of the longitudinal spin Seebeck effect (LSSE) in a GGG(Gd3Ga5O12)/GdIG(Gd3Fe5O12)/Pt film series exhibiting an in-plane magnetic easy axis with a compensation temperature (T_Comp) that decreases from 270 to 220 K when decreasing GdIG film thickness from 272 to 31 nm, respectively. For all the films, the LSSE signal flips its sign below T_Comp. We demonstrat…
▽ More
We report on a systematic investigation of the longitudinal spin Seebeck effect (LSSE) in a GGG(Gd3Ga5O12)/GdIG(Gd3Fe5O12)/Pt film series exhibiting an in-plane magnetic easy axis with a compensation temperature (T_Comp) that decreases from 270 to 220 K when decreasing GdIG film thickness from 272 to 31 nm, respectively. For all the films, the LSSE signal flips its sign below T_Comp. We demonstrate a universal scaling behavior of the temperature dependence of LSSE signal for our GdIG films around their respective T_Comp. Additionally, we demonstrate LSSE in a 31 nm GdIG film grown on a lattice-mismatched GSGG (Gd3Sc2Ga3O12) substrate that exhibits an out-of-plane magnetic easy axis at room temperature. However, this sample reveals a spin reorientation transition where the magnetic easy axis changes its orientation to in-plane at low temperatures. We observed a clear distinction in the LSSE signal for the GSGG/GdIG(31 nm)/Pt heterostructure, relative to GGG/GdIG(31nm)/Pt showing an in-plane magnetic easy axis. Our findings underscore a strong correlation between the LSSE signal and the orientation of magnetic easy axis in compensated ferrimagnets and opens the possibility to tune LSSE through effective anisotropy.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
ADC: Adversarial attacks against object Detection that evade Context consistency checks
Authors:
Mingjun Yin,
Shasha Li,
Chengyu Song,
M. Salman Asif,
Amit K. Roy-Chowdhury,
Srikanth V. Krishnamurthy
Abstract:
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples, which are slightly perturbed input images which lead DNNs to make wrong predictions. To protect from such examples, various defense strategies have been proposed. A very recent defense strategy for detecting adversarial examples, that has been shown to be robust to current attacks, is to check for intrinsic conte…
▽ More
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples, which are slightly perturbed input images which lead DNNs to make wrong predictions. To protect from such examples, various defense strategies have been proposed. A very recent defense strategy for detecting adversarial examples, that has been shown to be robust to current attacks, is to check for intrinsic context consistencies in the input data, where context refers to various relationships (e.g., object-to-object co-occurrence relationships) in images. In this paper, we show that even context consistency checks can be brittle to properly crafted adversarial examples and to the best of our knowledge, we are the first to do so. Specifically, we propose an adaptive framework to generate examples that subvert such defenses, namely, Adversarial attacks against object Detection that evade Context consistency checks (ADC). In ADC, we formulate a joint optimization problem which has two attack goals, viz., (i) fooling the object detector and (ii) evading the context consistency check system, at the same time. Experiments on both PASCAL VOC and MS COCO datasets show that examples generated with ADC fool the object detector with a success rate of over 85% in most cases, and at the same time evade the recently proposed context consistency checks, with a bypassing rate of over 80% in most cases. Our results suggest that how to robustly model context and check its consistency, is still an open problem.
△ Less
Submitted 23 October, 2021;
originally announced October 2021.