Skip to main content

Showing 1–22 of 22 results for author: Adhikary, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.10659  [pdf, other

    cs.CL cs.AI

    MARRO: Multi-headed Attention for Rhetorical Role Labeling in Legal Documents

    Authors: Purbid Bambroo, Subinay Adhikary, Paheli Bhattacharya, Abhijnan Chakraborty, Saptarshi Ghosh, Kripabandhu Ghosh

    Abstract: Identification of rhetorical roles like facts, arguments, and final judgments is central to understanding a legal case document and can lend power to other downstream tasks like legal case summarization and judgment prediction. However, there are several challenges to this task. Legal documents are often unstructured and contain a specialized vocabulary, making it hard for conventional transformer… ▽ More

    Submitted 8 March, 2025; originally announced March 2025.

  2. arXiv:2502.00823  [pdf, ps, other

    quant-ph cs.LG

    Online Learning of Pure States is as Hard as Mixed States

    Authors: Maxime Meyer, Soumik Adhikary, Naixu Guo, Patrick Rebentrost

    Abstract: Quantum state tomography, the task of learning an unknown quantum state, is a fundamental problem in quantum information. In standard settings, the complexity of this problem depends significantly on the type of quantum state that one is trying to learn, with pure states being substantially easier to learn than general mixed states. A natural question is whether this separation holds for any quant… ▽ More

    Submitted 18 May, 2025; v1 submitted 2 February, 2025; originally announced February 2025.

    Comments: 22 pages, 5 figures

    MSC Class: 81P18 (Primary) 68T05; 62L10 (Secondary) ACM Class: I.2.6

  3. arXiv:2411.15229  [pdf, other

    eess.SY cs.CR cs.GT

    Learning-Enabled Adaptive Voltage Protection Against Load Alteration Attacks On Smart Grids

    Authors: Anjana B., Suman Maiti, Sunandan Adhikary, Soumyajit Dey, Ashish R. Hota

    Abstract: Smart grids are designed to efficiently handle variable power demands, especially for large loads, by real-time monitoring, distributed generation and distribution of electricity. However, the grid's distributed nature and the internet connectivity of large loads like Heating Ventilation, and Air Conditioning (HVAC) systems introduce vulnerabilities in the system that cyber-attackers can exploit,… ▽ More

    Submitted 21 November, 2024; originally announced November 2024.

  4. arXiv:2409.07150  [pdf, other

    cs.CR

    ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes

    Authors: Puja Mondal, Supriya Adhikary, Suparna Kundu, Angshuman Karmakar

    Abstract: Computationally hard problems based on coding theory, such as the syndrome decoding problem, have been used for constructing secure cryptographic schemes for a long time. Schemes based on these problems are also assumed to be secure against quantum computers. However, these schemes are often considered impractical for real-world deployment due to large key sizes and inefficient computation time. I… ▽ More

    Submitted 11 September, 2024; originally announced September 2024.

    Comments: 35 pages including appendix and bibliography

    ACM Class: E.3.3

  5. arXiv:2408.00341  [pdf, other

    eess.SY cs.CR cs.OS

    Enhancing Attack Resilience in Real-Time Systems through Variable Control Task Sampling Rates

    Authors: Arkaprava Sain, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey

    Abstract: Cyber-physical systems (CPSs) in modern real-time applications integrate numerous control units linked through communication networks, each responsible for executing a mix of real-time safety-critical and non-critical tasks. To ensure predictable timing behaviour, most safety-critical tasks are scheduled with fixed sampling periods, which supports rigorous safety and performance analyses. However,… ▽ More

    Submitted 14 November, 2024; v1 submitted 1 August, 2024; originally announced August 2024.

    Comments: 12 pages including references, Total 10 figures (with 3 having subfigures)

  6. arXiv:2311.12830  [pdf, other

    cs.NE cs.AI

    Nature Inspired Evolutionary Swarm Optimizers for Biomedical Image and Signal Processing -- A Systematic Review

    Authors: Subhrangshu Adhikary

    Abstract: The challenge of finding a global optimum in a solution search space with limited resources and higher accuracy has given rise to several optimization algorithms. Generally, the gradient-based optimizers converge to the global solution very accurately, but they often require a large number of iterations to find the solution. Researchers took inspiration from different natural phenomena and behavio… ▽ More

    Submitted 2 October, 2023; originally announced November 2023.

  7. arXiv:2310.12131  [pdf, other

    cs.IR

    Automated Attribute Extraction from Legal Proceedings

    Authors: Subinay Adhikary, Sagnik Das, Sagnik Saha, Procheta Sen, Dwaipayan Roy, Kripabandhu Ghosh

    Abstract: The escalating number of pending cases is a growing concern world-wide. Recent advancements in digitization have opened up possibilities for leveraging artificial intelligence (AI) tools in the processing of legal documents. Adopting a structured representation for legal documents, as opposed to a mere bag-of-words flat text representation, can significantly enhance processing capabilities. With t… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Presented in Mining and Learning in the Legal Domain (MLLD) workshop 2023

  8. arXiv:2306.09206  [pdf, other

    cs.CR eess.SY

    Concealing CAN Message Sequences to Prevent Schedule-based Bus-off Attacks

    Authors: Sunandan Adhikary, Ipsita Koley, Arkaprava Sain, Soumyadeep das, Shuvam Saha, Soumyajit Dey

    Abstract: This work focuses on eliminating timing-side channels in real-time safety-critical cyber-physical network protocols like Controller Area Networks (CAN). Automotive Electronic Control Units (ECUs) implement predictable scheduling decisions based on task level response time estimation. Such levels of determinism exposes timing information about task executions and therefore corresponding message tra… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  9. arXiv:2306.09057  [pdf, other

    cs.CR

    A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities

    Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey

    Abstract: Intelligent attackers can suitably tamper sensor/actuator data at various Smart grid surfaces causing intentional power oscillations, which if left undetected, can lead to voltage disruptions. We develop a novel combination of formal methods and machine learning tools that learns power system dynamics with the objective of generating unsafe yet stealthy false data based attack sequences. We enable… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  10. arXiv:2304.12325  [pdf

    q-bio.QM cs.AI cs.LG physics.bio-ph

    Dependence of Physiochemical Features on Marine Chlorophyll Analysis with Learning Techniques

    Authors: Subhrangshu Adhikary, Sudhir Kumar Chaturvedi, Saikat Banerjee, Sourav Basu

    Abstract: Marine chlorophyll which is present within phytoplankton are the basis of photosynthesis and they have a high significance in sustaining ecological balance as they highly contribute toward global primary productivity and comes under the food chain of many marine organisms. Imbalance in the concentrations of phytoplankton can disrupt the ecological balance. The growth of phytoplankton depends upon… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: Advances in Environment Engineering and Management. Year 2021. Springer Proceedings in Earth and Environmental Sciences. Springer, Cham. https://doi.org/10.1007/978-3-030-79065-3_29

    Journal ref: Advances in Environment Engineering and Management. Year 2021. Springer Proceedings in Earth and Environmental Sciences. Springer, Cham

  11. COVID-19 Spreading Prediction and Impact Analysis by Using Artificial Intelligence for Sustainable Global Health Assessment

    Authors: Subhrangshu Adhikary, Sonam Chaturvedi, Sudhir Kumar Chaturvedi, Saikat Banerjee

    Abstract: The COVID-19 pandemic is considered as the most alarming global health calamity of this century. COVID-19 has been confirmed to be mutated from coronavirus family. As stated by the records of The World Health Organization (WHO at April 18 2020), the present epidemic of COVID-19, has influenced more than 2,164,111 persons and killed more than 146,198 folks in over 200 countries across the globe and… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: Advances in Environment Engineering and Management. Year 2021. Springer Proceedings in Earth and Environmental Sciences. Springer, Cham. https://doi.org/10.1007/978-3-030-79065-3_30

    Journal ref: Advances in Environment Engineering and Management. Year 2021. Springer Proceedings in Earth and Environmental Sciences. Springer, Cham

  12. Images Within Images? A Multi-image Paradigm with Novel Key-Value Graph Oriented Steganography

    Authors: Subhrangshu Adhikary

    Abstract: Steganographic methods have been in the limelight of research and development for concealing secret data within a cover media without being noticed through general visualization. The Least Significant Bits (LSBs) of 8-bit color code for the RGB image arises the possibility of replacing the last two bits with the bits of the encrypted message. Several procedures have been developed to hide an image… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: Intelligent Computing & Optimization. ICO 2021. Lecture Notes in Networks and Systems, vol 371. Springer, Cham. https://doi.org/10.1007/978-3-030-93247-3_83

    Journal ref: Intelligent Computing & Optimization. ICO 2021. Lecture Notes in Networks and Systems, vol 371. Springer, Cham

  13. Automatized marine vessel monitoring from sentinel-1 data using convolution neural network

    Authors: Surya Prakash Tiwari, Sudhir Kumar Chaturvedi, Subhrangshu Adhikary, Saikat Banerjee, Sourav Basu

    Abstract: The advancement of multi-channel synthetic aperture radar (SAR) system is considered as an upgraded technology for surveillance activities. SAR sensors onboard provide data for coastal ocean surveillance and a view of the oceanic surface features. Vessel monitoring has earlier been performed using Constant False Alarm Rate (CFAR) algorithm which is not a smart technique as it lacks decision-making… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS

    Journal ref: 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS, Brussels, Belgium, 2021, pp. 1311-1314

  14. arXiv:2304.01349  [pdf, other

    q-bio.NC cs.AI cs.HC eess.SP

    Optimized EEG based mood detection with signal processing and deep neural networks for brain-computer interface

    Authors: Subhrangshu Adhikary, Kushal Jain, Biswajit Saha, Deepraj Chowdhury

    Abstract: Electroencephalogram (EEG) is a very promising and widely implemented procedure to study brain signals and activities by amplifying and measuring the post-synaptical potential arising from electrical impulses produced by neurons and detected by specialized electrodes attached to specific points in the scalp. It can be studied for detecting brain abnormalities, headaches, and other conditions. Howe… ▽ More

    Submitted 30 March, 2023; originally announced April 2023.

    Journal ref: Biomedical Physics & Engineering Express, Year 2023, Volume 9, Number 3

  15. Exploring The Resilience of Control Execution Skips against False Data Injection Attacks

    Authors: Ipsita Koley, Sunandan Adhikary, Soumyajit Dey

    Abstract: Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In t… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

  16. arXiv:2207.02851  [pdf, other

    quant-ph cond-mat.dis-nn cs.AI cs.LG

    Tensor networks in machine learning

    Authors: Richik Sengupta, Soumik Adhikary, Ivan Oseledets, Jacob Biamonte

    Abstract: A tensor network is a type of decomposition used to express and approximate large arrays of data. A given data-set, quantum state or higher dimensional multi-linear map is factored and approximated by a composition of smaller multi-linear maps. This is reminiscent to how a Boolean function might be decomposed into a gate array: this represents a special case of tensor decomposition, in which the t… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

    Comments: 7 pages

  17. A CAD Framework for Simulation of Network Level Attack on Platoons

    Authors: Ipsita Koley, Sunandan Adhikary, Rohit Rohit, Soumyajit Dey

    Abstract: Recent developments in the smart mobility domain have transformed automobiles into networked transportation agents helping realize new age, large-scale intelligent transportation systems (ITS). The motivation behind such networked transportation is to improve road safety as well as traffic efficiency. In this setup, vehicles can share information about their speed and/or acceleration values among… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  18. arXiv:2103.02872  [pdf, other

    cs.CR cs.LG

    An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems

    Authors: Ipsita Koley, Sunandan Adhikary, Soumyajit Dey

    Abstract: Increased dependence on networked, software based control has escalated the vulnerabilities of Cyber Physical Systems (CPSs). Detection and monitoring components developed leveraging dynamical systems theory are often employed as lightweight security measures for protecting such safety critical CPSs against false data injection attacks. However, existing approaches do not correlate attack scenario… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  19. arXiv:2010.10653  [pdf, other

    cs.LG quant-ph

    Quantum Tensor Networks, Stochastic Processes, and Weighted Automata

    Authors: Siddarth Srinivasan, Sandesh Adhikary, Jacob Miller, Guillaume Rabusseau, Byron Boots

    Abstract: Modeling joint probability distributions over sequences has been studied from many perspectives. The physics community developed matrix product states, a tensor-train decomposition for probabilistic modeling, motivated by the need to tractably model many-body systems. But similar models have also been studied in the stochastic processes and weighted automata literature, with little work on how the… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

  20. Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions

    Authors: Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay

    Abstract: We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional s… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 9 pages

  21. arXiv:1912.02098  [pdf, other

    cs.LG quant-ph stat.ML

    Expressiveness and Learning of Hidden Quantum Markov Models

    Authors: Sandesh Adhikary, Siddarth Srinivasan, Geoff Gordon, Byron Boots

    Abstract: Extending classical probabilistic reasoning using the quantum mechanical view of probability has been of recent interest, particularly in the development of hidden quantum Markov models (HQMMs) to model stochastic processes. However, there has been little progress in characterizing the expressiveness of such models and learning them from data. We tackle these problems by showing that HQMMs are a s… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.03730

  22. arXiv:1903.03730  [pdf, other

    cs.LG quant-ph stat.ML

    Learning Quantum Graphical Models using Constrained Gradient Descent on the Stiefel Manifold

    Authors: Sandesh Adhikary, Siddarth Srinivasan, Byron Boots

    Abstract: Quantum graphical models (QGMs) extend the classical framework for reasoning about uncertainty by incorporating the quantum mechanical view of probability. Prior work on QGMs has focused on hidden quantum Markov models (HQMMs), which can be formulated using quantum analogues of the sum rule and Bayes rule used in classical graphical models. Despite the focus on developing the QGM framework, there… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.