Skip to main content

Showing 1–26 of 26 results for author: Banerjee, N

Searching in archive cs. Search in all archives.
.
  1. VirtLab: An AI-Powered System for Flexible, Customizable, and Large-scale Team Simulations

    Authors: Mohammed Almutairi, Charles Chiang, Haoze Guo, Matthew Belcher, Nandini Banerjee, Maria Milkowski, Svitlana Volkova, Daniel Nguyen, Tim Weninger, Michael Yankoski, Trenton W. Ford, Diego Gomez-Zara

    Abstract: Simulating how team members collaborate within complex environments using Agentic AI is a promising approach to explore hypotheses grounded in social science theories and study team behaviors. We introduce VirtLab, a user-friendly, customizable, multi-agent, and scalable team simulation system that enables testing teams with LLM-based agents in spatial and temporal settings. This system addresses… ▽ More

    Submitted 6 August, 2025; originally announced August 2025.

    Comments: 5 pages, 2 figures, UIST 2025

  2. arXiv:2502.04361  [pdf, other

    cs.CV cs.AI cs.HC

    Predicting 3D Motion from 2D Video for Behavior-Based VR Biometrics

    Authors: Mingjun Li, Natasha Kholgade Banerjee, Sean Banerjee

    Abstract: Critical VR applications in domains such as healthcare, education, and finance that use traditional credentials, such as PIN, password, or multi-factor authentication, stand the chance of being compromised if a malicious person acquires the user credentials or if the user hands over their credentials to an ally. Recently, a number of approaches on user authentication have emerged that use motions… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

    Comments: IEEE AIxVR 2025: 7th International Conference on Artificial Intelligence & extended and Virtual Reality

  3. arXiv:2411.16149  [pdf, ps, other

    cs.DS

    Directed Token Sliding

    Authors: Niranka Banerjee, Christian Engels, Duc A. Hoang

    Abstract: Reconfiguration problems involve determining whether two given configurations can be transformed into each other under specific rules. The Token Sliding problem asks whether, given two different set of tokens on vertices of a graph $G$, we can transform one into the other by sliding tokens step-by-step along edges of $G$ such that each resulting set of tokens forms an independent set in $G$. Recen… ▽ More

    Submitted 25 November, 2024; originally announced November 2024.

  4. arXiv:2402.12705  [pdf, other

    cs.DS cs.DM

    Distance Recoloring

    Authors: Niranka Banerjee, Christian Engels, Duc A. Hoang

    Abstract: For integers $d \geq 1$ and $k \geq d+1$, the \textsc{Distance Coloring} problem asks if a given graph $G$ has a $(d, k)$-coloring, i.e., a coloring of the vertices of $G$ by $k$ colors such that any two vertices within distance $d$ from each other have different colors. In particular, the well-known \textsc{Coloring} problem is a special case of \textsc{Distance Coloring} when $d = 1$. For intege… ▽ More

    Submitted 6 March, 2025; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: 31 pages, 8 figures, v3: revision of v2, update results on split graphs and chordal graphs

  5. arXiv:2401.16649  [pdf, other

    cs.LG cs.CR

    Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication

    Authors: Mingjun Li, Natasha Kholgade Banerjee, Sean Banerjee

    Abstract: Task-based behavioral biometric authentication of users interacting in virtual reality (VR) environments enables seamless continuous authentication by using only the motion trajectories of the person's body as a unique signature. Deep learning-based approaches for behavioral biometrics show high accuracy when using complete or near complete portions of the user trajectory, but show lower performan… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: AIxVR 2024 Best Paper Award

  6. arXiv:2401.16443  [pdf, other

    cs.HC cs.AI cs.LG

    Evaluating Deep Networks for Detecting User Familiarity with VR from Hand Interactions

    Authors: Mingjun Li, Numan Zafar, Natasha Kholgade Banerjee, Sean Banerjee

    Abstract: As VR devices become more prevalent in the consumer space, VR applications are likely to be increasingly used by users unfamiliar with VR. Detecting the familiarity level of a user with VR as an interaction medium provides the potential of providing on-demand training for acclimatization and prevents the user from being burdened by the VR environment in accomplishing their tasks. In this work, we… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: AIxVR 2024 poster paper

  7. arXiv:2310.00723  [pdf, other

    cs.CV cs.RO

    HOH: Markerless Multimodal Human-Object-Human Handover Dataset with Large Object Count

    Authors: Noah Wiederhold, Ava Megyeri, DiMaggio Paris, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present the HOH (Human-Object-Human) Handover Dataset, a large object count dataset with 136 objects, to accelerate data-driven research on handover studies, human-robot handover implementation, and artificial intelligence (AI) on handover parameter estimation from 2D and 3D data of person interactions. HOH contains multi-view RGB and depth data, skeletons, fused point clouds, grasp type and ha… ▽ More

    Submitted 3 May, 2024; v1 submitted 1 October, 2023; originally announced October 2023.

    Comments: NeurIPS 2023 Datasets and Benchmarks

  8. arXiv:2310.00241  [pdf, other

    cs.DS cs.DM

    The Complexity of Distance-$r$ Dominating Set Reconfiguration

    Authors: Niranka Banerjee, Duc A. Hoang

    Abstract: For a fixed integer $r \geq 1$, a distance-$r$ dominating set (D$r$DS) of a graph $G = (V, E)$ is a vertex subset $D \subseteq V$ such that every vertex in $V$ is within distance $r$ from some member of $D$. Given two D$r$DSs $D_s, D_t$ of $G$, the Distance-$r$ Dominating Set Reconfiguration (D$r$DSR) problem asks if there is a sequence of D$r$DSs that transforms $D_s$ into $D_t$ (or vice versa) s… ▽ More

    Submitted 2 February, 2024; v1 submitted 29 September, 2023; originally announced October 2023.

    Comments: 32 pages, 10 figures, v2: revise some incorrect proofs in v1, add new results for split graphs and planar graphs, add minor modifications. The HTML version of the abstract was shorten to fit the requirement of arXiv

    MSC Class: 05C85

  9. arXiv:2308.14659  [pdf, other

    cs.LG

    RESTORE: Graph Embedding Assessment Through Reconstruction

    Authors: Hong Yung Yip, Chidaksh Ravuru, Neelabha Banerjee, Shashwat Jha, Amit Sheth, Aman Chadha, Amitava Das

    Abstract: Following the success of Word2Vec embeddings, graph embeddings (GEs) have gained substantial traction. GEs are commonly generated and evaluated extrinsically on downstream applications, but intrinsic evaluations of the original graph properties in terms of topological structure and semantic information have been lacking. Understanding these will help identify the deficiency of the various families… ▽ More

    Submitted 5 September, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

  10. arXiv:2305.18273  [pdf, other

    cs.CV

    Pix2Repair: Implicit Shape Restoration from Images

    Authors: Xinchao Song, Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present Pix2Repair, an automated shape repair approach that generates restoration shapes from images to repair fractured objects. Prior repair approaches require a high-resolution watertight 3D mesh of the fractured object as input. Input 3D meshes must be obtained using expensive 3D scanners, and scanned meshes require manual cleanup, limiting accessibility and scalability. Pix2Repair takes an… ▽ More

    Submitted 20 December, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  11. arXiv:2304.11489  [pdf, other

    cs.CR cs.AR

    FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: With the increased utilization, the small embedded and IoT devices have become an attractive target for sophisticated attacks that can exploit the devices security critical information and data in malevolent activities. Secure boot and Remote Attestation (RA) techniques verifies the integrity of the devices software state at boot-time and runtime. Correct implementation and formal verification of… ▽ More

    Submitted 22 April, 2023; originally announced April 2023.

  12. arXiv:2303.14152  [pdf, other

    cs.CV

    Fantastic Breaks: A Dataset of Paired 3D Scans of Real-World Broken Objects and Their Complete Counterparts

    Authors: Nikolas Lamb, Cameron Palmer, Benjamin Molloy, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: Automated shape repair approaches currently lack access to datasets that describe real-world damaged geometry. We present Fantastic Breaks (and Where to Find Them: https://terascale-all-sensing-research-studio.github.io/FantasticBreaks), a dataset containing scanned, waterproofed, and cleaned 3D meshes for 150 broken objects, paired and geometrically aligned with complete counterparts. Fantastic B… ▽ More

    Submitted 1 May, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: To be published at CVPR 2023

  13. arXiv:2303.01547  [pdf, other

    cs.CV cs.AI

    Simultaneous prediction of hand gestures, handedness, and hand keypoints using thermal images

    Authors: Sichao Li, Sean Banerjee, Natasha Kholgade Banerjee, Soumyabrata Dey

    Abstract: Hand gesture detection is a well-explored area in computer vision with applications in various forms of Human-Computer Interactions. In this work, we propose a technique for simultaneous hand gesture classification, handedness detection, and hand keypoints localization using thermal data captured by an infrared camera. Our method uses a novel deep multi-task learning architecture that includes sha… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: ICDEC 2022

  14. DeepJoin: Learning a Joint Occupancy, Signed Distance, and Normal Field Function for Shape Repair

    Authors: Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We introduce DeepJoin, an automated approach to generate high-resolution repairs for fractured shapes using deep neural networks. Existing approaches to perform automated shape repair operate exclusively on symmetric objects, require a complete proxy shape, or predict restoration shapes using low-resolution voxels which are too coarse for physical repair. We generate a high-resolution restoration… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: To be published at SIGGRAPH Asia 2022 (Journal)

  15. arXiv:2210.05728  [pdf, other

    cs.CV

    DeepMend: Learning Occupancy Functions to Represent Shape for Repair

    Authors: Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present DeepMend, a novel approach to reconstruct restorations to fractured shapes using learned occupancy functions. Existing shape repair approaches predict low-resolution voxelized restorations, or require symmetries or access to a pre-existing complete oracle. We represent the occupancy of a fractured shape as the conjunction of the occupancy of an underlying complete shape and the fracture… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: To be published at ECCV 2020 (poster)

  16. arXiv:2101.06300  [pdf, other

    cs.CR

    CARE: Lightweight Attack Resilient Secure Boot Architecturewith Onboard Recovery for RISC-V based SOC

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: Recent technological advancements have proliferated the use of small embedded devices for collecting, processing, and transferring the security-critical information. The Internet of Things (IoT) has enabled remote access and control of these network-connected devices. Consequently, an attacker can exploit security vulnerabilities and compromise these devices. In this context, the secure boot becom… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  17. arXiv:2101.06148  [pdf, other

    cs.CR

    SRACARE: Secure Remote Attestation with Code Authentication and Resilience Engine

    Authors: Avani Dave, Nilanjan Banerjee, Chintan Patel

    Abstract: Recent technological advancements have enabled proliferated use of small embedded and IoT devices for collecting, processing, and transferring the security-critical information and user data. This exponential use has acted as a catalyst in the recent growth of sophisticated attacks such as the replay, man-in-the-middle, and malicious code modification to slink, leak, tweak or exploit the security-… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

  18. arXiv:2008.04073  [pdf

    cs.CY cs.AI

    AI Failures: A Review of Underlying Issues

    Authors: Debarag Narayan Banerjee, Sasanka Sekhar Chanda

    Abstract: Instances of Artificial Intelligence (AI) systems failing to deliver consistent, satisfactory performance are legion. We investigate why AI failures occur. We address only a narrow subset of the broader field of AI Safety. We focus on AI failures on account of flaws in conceptualization, design and deployment. Other AI Safety issues like trade-offs between privacy and security or convenience, bad… ▽ More

    Submitted 18 July, 2020; originally announced August 2020.

    Comments: 8 pages

  19. arXiv:2004.09900  [pdf, other

    cs.LG stat.ML

    An RNN-Survival Model to Decide Email Send Times

    Authors: Harvineet Singh, Moumita Sinha, Atanu R. Sinha, Sahil Garg, Neha Banerjee

    Abstract: Email communications are ubiquitous. Firms control send times of emails and thereby the instants at which emails reach recipients (it is assumed email is received instantaneously from the send time). However, they do not control the duration it takes for recipients to open emails, labeled as time-to-open. Importantly, among emails that are opened, most occur within a short window from their send t… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: 11 pages, 3 figures, 2 tables

  20. arXiv:1908.03605  [pdf, other

    cs.RO

    View management for lifelong visual maps

    Authors: Nandan Banerjee, Ryan C. Connolly, Dimitri Lisin, Jimmy Briggs, Manjunath Narayana, Mario E. Munich

    Abstract: The time complexity of making observations and loop closures in a graph-based visual SLAM system is a function of the number of views stored. Clever algorithms, such as approximate nearest neighbor search, can make this function sub-linear. Despite this, over time the number of views can still grow to a point at which the speed and/or accuracy of the system becomes unacceptable, especially in comp… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: IEEE International Conference on Intelligent Robots and Systems (IROS), 2019

  21. arXiv:1901.07469  [pdf, other

    cs.LG cs.AI stat.ML

    Estimating Buildings' Parameters over Time Including Prior Knowledge

    Authors: Nilavra Pathak, James Foulds, Nirmalya Roy, Nilanjan Banerjee, Ryan Robucci

    Abstract: Modeling buildings' heat dynamics is a complex process which depends on various factors including weather, building thermal capacity, insulation preservation, and residents' behavior. Gray-box models offer a causal inference of those dynamics expressed in few parameters specific to built environments. These parameters can provide compelling insights into the characteristics of building artifacts a… ▽ More

    Submitted 18 February, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 11 pages with reference

  22. arXiv:1805.10401  [pdf, other

    cs.CR

    Unsupervised Learning for Trustworthy IoT

    Authors: Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took

    Abstract: The advancement of Internet-of-Things (IoT) edge devices with various types of sensors enables us to harness diverse information with Mobile Crowd-Sensing applications (MCS). This highly dynamic setting entails the collection of ubiquitous data traces, originating from sensors carried by people, introducing new information security challenges; one of them being the preservation of data trustworthi… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Comments: 9 pages, 9 figures, 2018 IEEE International Conference on Fuzzy Systems

  23. arXiv:1606.04718  [pdf, other

    cs.DS

    Improved Space efficient linear time algorithms for BFS, DFS and applications

    Authors: Niranka Banerjee, Sankardeep Chakraborty, Venkatesh Raman, Srinivasa Rao Satti

    Abstract: Recent work by Elmasry et al. (STACS 2015) and Asano et al. (ISAAC 2014), reconsidered classical fundamental graph algorithms focusing on improving the space complexity. We continue this line of work focusing on space. Our first result is a simple data structure that can maintain any subset $S$ of a universe of $n$ elements using $n+o(n)$ bits and support in constant time, apart from the standard… ▽ More

    Submitted 27 July, 2017; v1 submitted 15 June, 2016; originally announced June 2016.

    Comments: A preliminary version of this paper appears in the proceedings of COCOON 2016

  24. arXiv:1201.3981  [pdf

    cs.OH

    A comparison algorithm to check LTSA Layer 1 and SCORM compliance in e-Learning sites

    Authors: Souvik Sengupta, Saurabh Pal, Nilanjan Banerjee

    Abstract: The success of e-Learning is largely dependent on the impact of its multimedia aided learning content on the learner over the hyper media. The e-Learning portals with different proportion of multimedia elements have different impact on the learner, as there is lack of standardization. The Learning Technology System Architecture (LTSA) Layer 1 deals with the effect of environment on the learner. Fr… ▽ More

    Submitted 19 January, 2012; originally announced January 2012.

  25. arXiv:1006.5502  [pdf, other

    cs.CR

    Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    Authors: Jonathan White, Nilanjan Banerjee

    Abstract: Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restoc… ▽ More

    Submitted 29 June, 2010; originally announced June 2010.

  26. arXiv:0710.4663  [pdf

    cs.AR

    Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies

    Authors: Animesh Datta, Swarup Bhunia, Saibal Mukhopadhyay, Nilanjan Banerjee, Kaushik Roy

    Abstract: Operating frequency of a pipelined circuit is determined by the delay of the slowest pipeline stage. However, under statistical delay variation in sub-100nm technology regime, the slowest stage is not readily identifiable and the estimation of the pipeline yield with respect to a target delay is a challenging problem. We have proposed analytical models to estimate yield for a pipelined design ba… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)