Skip to main content

Showing 1–30 of 30 results for author: Banik, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2509.09281  [pdf, ps, other

    cs.HC

    Flip Co-op: Cooperative Takeovers in Shared Autonomy

    Authors: Sandeep Banik, Naira Hovakimyan

    Abstract: Shared autonomy requires principled mechanisms for allocating and transferring control between a human and an autonomous agent. Existing approaches often rely on blending control inputs between human and autonomous agent or switching rules, which lack theoretical guarantees. This paper develops a game-theoretic framework for modeling cooperative takeover in shared autonomy. We formulate the switch… ▽ More

    Submitted 11 September, 2025; originally announced September 2025.

    Comments: 11 pages and 4 figures

  2. arXiv:2508.18294  [pdf

    cs.CV cs.AI

    MobileDenseAttn:A Dual-Stream Architecture for Accurate and Interpretable Brain Tumor Detection

    Authors: Shudipta Banik, Muna Das, Trapa Banik, Md. Ehsanul Haque

    Abstract: The detection of brain tumor in MRI is an important aspect of ensuring timely diagnostics and treatment; however, manual analysis is commonly long and error-prone. Current approaches are not universal because they have limited generalization to heterogeneous tumors, are computationally inefficient, are not interpretable, and lack transparency, thus limiting trustworthiness. To overcome these issue… ▽ More

    Submitted 22 August, 2025; originally announced August 2025.

    Comments: Submitted at ICCIT 2025 cox bazar, Bangladesh

  3. arXiv:2507.07734  [pdf, ps, other

    cs.CV cs.NE

    EEvAct: Early Event-Based Action Recognition with High-Rate Two-Stream Spiking Neural Networks

    Authors: Michael Neumeier, Jules Lecomte, Nils Kazinski, Soubarna Banik, Bing Li, Axel von Arnim

    Abstract: Recognizing human activities early is crucial for the safety and responsiveness of human-robot and human-machine interfaces. Due to their high temporal resolution and low latency, event-based vision sensors are a perfect match for this early recognition demand. However, most existing processing approaches accumulate events to low-rate frames or space-time voxels which limits the early prediction c… ▽ More

    Submitted 10 July, 2025; originally announced July 2025.

    Comments: International Conference on Neuromorphic Systems (ICONS) 2025

  4. arXiv:2412.09505  [pdf, other

    cs.RO cs.ET

    Integrating Vision Systems and STPA for Robust Landing and Take-Off in VTOL Aircraft

    Authors: Sandeep Banik, Jinrae Kim, Naira Hovakimyan, Luca Carlone, John P. Thomas, Nancy G. Leveson

    Abstract: Vertical take-off and landing (VTOL) unmanned aerial vehicles (UAVs) are versatile platforms widely used in applications such as surveillance, search and rescue, and urban air mobility. Despite their potential, the critical phases of take-off and landing in uncertain and dynamic environments pose significant safety challenges due to environmental uncertainties, sensor noise, and system-level inter… ▽ More

    Submitted 12 December, 2024; originally announced December 2024.

    Comments: 12 pages, 5 figures and 5 tables. Submitted to SciTech 2025

  5. arXiv:2410.06127  [pdf, other

    cs.LG

    De-VertiFL: A Solution for Decentralized Vertical Federated Learning

    Authors: Alberto Huertas Celdrán, Chao Feng, Sabyasachi Banik, Gerome Bovet, Gregorio Martinez Perez, Burkhard Stiller

    Abstract: Federated Learning (FL), introduced in 2016, was designed to enhance data privacy in collaborative model training environments. Among the FL paradigm, horizontal FL, where clients share the same set of features but different data samples, has been extensively studied in both centralized and decentralized settings. In contrast, Vertical Federated Learning (VFL), which is crucial in real-world decen… ▽ More

    Submitted 4 February, 2025; v1 submitted 8 October, 2024; originally announced October 2024.

  6. arXiv:2407.06217  [pdf, other

    eess.SY cs.SE

    On Simulation of Power Systems and Microgrid Components with SystemC-AMS

    Authors: Rahul Bhadani, Satyaki Banik, Hao Tu, Srdjan Lukic, Gabor Karsai

    Abstract: Cyber-physical systems such as microgrids consist of interconnected components, localized power systems, and distributed energy resources with clearly defined electrical boundaries. They can function independently but can also work in tandem with the main grid. Power system converters and their control loops play an essential role in stabilizing grids and interfacing a microgrid with the main grid… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  7. arXiv:2406.16812  [pdf, other

    cs.GT

    FlipDyn in Graphs: Resource Takeover Games in Graphs

    Authors: Sandeep Banik, Shaunak D. Bopardikar, Naira Hovakimyan

    Abstract: We present \texttt{FlipDyn-G}, a dynamic game model extending the \texttt{FlipDyn} framework to a graph-based setting, where each node represents a dynamical system. This model captures the interactions between a defender and an adversary who strategically take over nodes in a graph to minimize (resp. maximize) a finite horizon additive cost. At any time, the \texttt{FlipDyn} state is represented… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 25 pages, 8 figures, submitted to GameSec 2024

  8. arXiv:2402.12612  [pdf, other

    cs.AR

    A System Development Kit for Big Data Applications on FPGA-based Clusters: The EVEREST Approach

    Authors: Christian Pilato, Subhadeep Banik, Jakub Beranek, Fabien Brocheton, Jeronimo Castrillon, Riccardo Cevasco, Radim Cmar, Serena Curzel, Fabrizio Ferrandi, Karl F. A. Friebel, Antonella Galizia, Matteo Grasso, Paulo Silva, Jan Martinovic, Gianluca Palermo, Michele Paolino, Andrea Parodi, Antonio Parodi, Fabio Pintus, Raphael Polig, David Poulet, Francesco Regazzoni, Burkhard Ringlein, Roberto Rocco, Katerina Slaninova , et al. (6 additional authors not shown)

    Abstract: Modern big data workflows are characterized by computationally intensive kernels. The simulated results are often combined with knowledge extracted from AI models to ultimately support decision-making. These energy-hungry workflows are increasingly executed in data centers with energy-efficient hardware accelerators since FPGAs are well-suited for this task due to their inherent parallelism. We pr… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: Accepted for presentation at DATE 2024 (multi-partner project session)

  9. arXiv:2310.14484  [pdf, other

    eess.SY cs.GT

    FlipDyn with Control: Resource Takeover Games with Dynamics

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We present the FlipDyn, a dynamic game in which two opponents (a defender and an adversary) choose strategies to optimally takeover a resource that involves a dynamical system. At any time instant, each player can take over the resource and thereby control the dynamical system after incurring a state-dependent and a control-dependent costs. The resulting model becomes a hybrid dynamical system whe… ▽ More

    Submitted 25 October, 2023; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: 17 Pages, 2 figures. Under review at IEEE TAC

  10. arXiv:2310.09510  [pdf, other

    cs.CR cs.NI

    Survey on Security Attacks in Connected and Autonomous Vehicular Systems

    Authors: S M Mostaq Hossain, Shampa Banik, Trapa Banik, Ashfak Md Shibli

    Abstract: Connected and autonomous vehicles, also known as CAVs, are a general trend in the evolution of the automotive industry that can be utilized to make transportation safer, improve the number of mobility options available, user costs will go down and new jobs will be created. However, as our society grows more automated and networked, criminal actors will have additional opportunities to conduct a va… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 6 pages, 1 figure, 1 table, Conference info: 2023 IEEE International Conference on Computing (ICOCO)

  11. arXiv:2308.11440  [pdf, other

    cs.CV

    PoseGraphNet++: Enriching 3D Human Pose with Orientation Estimation

    Authors: Soubarna Banik, Edvard Avagyan, Sayantan Auddy, Alejandro Mendoza Gracia, Alois Knoll

    Abstract: Existing skeleton-based 3D human pose estimation methods only predict joint positions. Although the yaw and pitch of bone rotations can be derived from joint positions, the roll around the bone axis remains unresolved. We present PoseGraphNet++ (PGN++), a novel 2D-to-3D lifting Graph Convolution Network that predicts the complete human pose in 3D including joint positions and bone orientations. We… ▽ More

    Submitted 10 May, 2024; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: This paper is under review in Pattern Recognition Letters Journal

  12. arXiv:2306.02473  [pdf, other

    cs.CR cs.LG

    Anomaly Detection Techniques in Smart Grid Systems: A Review

    Authors: Shampa Banik, Sohag Kumar Saha, Trapa Banik, S M Mostaq Hossain

    Abstract: Smart grid data can be evaluated for anomaly detection in numerous fields, including cyber-security, fault detection, electricity theft, etc. The strange anomalous behaviors may have been caused by various reasons, including peculiar consumption patterns of the consumers, malfunctioning grid infrastructures, outages, external cyber-attacks, or energy fraud. Recently, anomaly detection of the smart… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

    Comments: 7 pages, 3 figures and conference paper (accepted for publication in 2023 IEEE World AI IOT Congress (AIIOT)

    Report number: #149 (1570906937

    Journal ref: 2023 IEEE World AI IOT Congress (AIIOT)

  13. arXiv:2306.00234  [pdf, other

    cs.CR

    Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed

    Authors: Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha

    Abstract: The smart-grid introduces several new data-gathering, communication, and information-sharing capabilities into the electrical system, as well as additional privacy threats, vulnerabilities, and cyber-attacks. In this study, Modbus is regarded as one of the most prevalent interfaces for control systems in power plants. Modern control interfaces are vulnerable to cyber-attacks, posing a risk to the… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

    Comments: 7 pages, 10 figures, Conference paper, Accepted in publication for 2023 IEEE World AI IoT Congress (AIIoT)

    Journal ref: 2023 IEEE World AI IoT Congress (AIIoT) Conference

  14. arXiv:2305.16158  [pdf, other

    cs.NI cs.AI

    A New Era of Mobility: Exploring Digital Twin Applications in Autonomous Vehicular Systems

    Authors: S M Mostaq Hossain, Sohag Kumar Saha, Shampa Banik, Trapa Banik

    Abstract: Digital Twins (DTs) are virtual representations of physical objects or processes that can collect information from the real environment to represent, validate, and replicate the physical twin's present and future behavior. The DTs are becoming increasingly prevalent in a variety of fields, including manufacturing, automobiles, medicine, smart cities, and other related areas. In this paper, we pres… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 7 pages, conference paper, accepted for publication in IEEE AIIoT 2023 conference

    Report number: paper #1570907205

    Journal ref: IEEE AIIoT 2023 conference

  15. arXiv:2304.12069  [pdf, other

    cs.CV

    Occlusion Robust 3D Human Pose Estimation with StridedPoseGraphFormer and Data Augmentation

    Authors: Soubarna Banik, Patricia Gschoßmann, Alejandro Mendoza Garcia, Alois Knoll

    Abstract: Occlusion is an omnipresent challenge in 3D human pose estimation (HPE). In spite of the large amount of research dedicated to 3D HPE, only a limited number of studies address the problem of occlusion explicitly. To fill this gap, we propose to combine exploitation of spatio-temporal features with synthetic occlusion augmentation during training to deal with occlusion. To this end, we build a spat… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: IEEE IJCNN 2023

  16. arXiv:2303.09645  [pdf

    cs.RO cs.SD eess.AS

    Development of a Voice Controlled Robotic Arm

    Authors: Akkas U. Haque, Humayun Kabir, S. C. Banik, M. T. Islam

    Abstract: This paper describes a robotic arm with 5 degrees-of-freedom (DOF) which is controlled by human voice and has been developed in the Mechatronics Laboratory, CUET. This robotic arm is interfaced with a PC by serial communication (RS-232). Users' voice command is captured by a microphone, and this voice is processed by software which is made by Microsoft visual studio. Then the specific signal (obta… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  17. arXiv:2209.05574  [pdf, other

    cs.GT eess.SY

    FlipDyn: A game of resource takeovers in dynamical systems

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We introduce a game in which two players with opposing objectives seek to repeatedly takeover a common resource. The resource is modeled as a discrete time dynamical system over which a player can gain control after spending a state-dependent amount of energy at each time step. We use a FlipIT-inspired deterministic model that decides which player is in control at every time step. A player's polic… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 8 pages, 13 figures, accepted at the 61st IEEE Conference on Decision and Control, 2022, in Cancún, Mexico

  18. A Deep Learning Approach to Create DNS Amplification Attacks

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance

    Abstract: In recent years, deep learning has shown itself to be an incredibly valuable tool in cybersecurity as it helps network intrusion detection systems to classify attacks and detect new ones. Adversarial learning is the process of utilizing machine learning to generate a perturbed set of inputs to then feed to the neural network to misclassify it. Much of the current work in the field of adversarial l… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: https://doi.org/10.1145/3535782.3535838, accepted to conference above, not yet published

  19. CoAP-DoS: An IoT Network Intrusion Dataset

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik

    Abstract: The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled networ… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published

  20. arXiv:2203.05985  [pdf, other

    cs.LG cs.CV cs.RO

    Graph Neural Networks for Relational Inductive Bias in Vision-based Deep Reinforcement Learning of Robot Control

    Authors: Marco Oliva, Soubarna Banik, Josip Josifovski, Alois Knoll

    Abstract: State-of-the-art reinforcement learning algorithms predominantly learn a policy from either a numerical state vector or images. Both approaches generally do not take structural knowledge of the task into account, which is especially prevalent in robotic applications and can benefit learning if exploited. This work introduces a neural network architecture that combines relational inductive bias and… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

    Comments: 8 pages, 7 figures, 1 table. For supplemental material and code, see https://mrcoliva.github.io/relational-inductive-bias-in-vision-based-rl

    ACM Class: I.2; I.4

  21. arXiv:2108.10272  [pdf, other

    cs.CV

    Vogtareuth Rehab Depth Datasets: Benchmark for Marker-less Posture Estimation in Rehabilitation

    Authors: Soubarna Banik, Alejandro Mendoza Garcia, Lorenz Kiwull, Steffen Berweck, Alois Knoll

    Abstract: Posture estimation using a single depth camera has become a useful tool for analyzing movements in rehabilitation. Recent advances in posture estimation in computer vision research have been possible due to the availability of large-scale pose datasets. However, the complex postures involved in rehabilitation exercises are not represented in the existing benchmark depth datasets. To address this l… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 4 pages

  22. arXiv:2105.10379  [pdf, other

    cs.CV

    3D Human Pose Regression using Graph Convolutional Network

    Authors: Soubarna Banik, Alejandro Mendoza Gracia, Alois Knoll

    Abstract: 3D human pose estimation is a difficult task, due to challenges such as occluded body parts and ambiguous poses. Graph convolutional networks encode the structural information of the human skeleton in the form of an adjacency matrix, which is beneficial for better pose prediction. We propose one such graph convolutional network named PoseGraphNet for 3D human pose regression from 2D poses. Our net… ▽ More

    Submitted 13 December, 2022; v1 submitted 21 May, 2021; originally announced May 2021.

    Comments: Paper accepted in IEEE ICIP 2021, DOI will be updated once published

  23. arXiv:2011.04635  [pdf, other

    cs.LG eess.SY

    Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning

    Authors: Arnab Bhattacharya, Thiagarajan Ramachandran, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar

    Abstract: Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to ad… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: To appear in the Proceedings of the 18th IEEE International Conference on Intelligence and Security Informatics (2020)

  24. arXiv:2006.07452  [pdf, other

    cs.GT cs.RO

    Secure Route Planning Using Dynamic Games with Stopping States

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We consider the classic motion planning problem defined over a roadmap in which a vehicle seeks to find an optimal path from a source to a destination in presence of an attacker who can launch attacks on the vehicle over any edge of the roadmap. The vehicle (defender) has the capability to switch on/off a countermeasure that can detect and permanently disable the attack if it occurs concurrently.… ▽ More

    Submitted 15 April, 2022; v1 submitted 12 June, 2020; originally announced June 2020.

    Comments: 8 pages, 5 figures. Technical report for the corresponding conference paper accepted at IEEE International Conference on Intelligent Robots and Systems (IROS), 2020

  25. arXiv:1907.03592  [pdf, other

    cs.DC cs.NI

    IoT Platforms for 5G Network and Practical Considerations: A Survey

    Authors: Sejuti Banik, Irvin Steve Cardenas, Jong Hoon Kim

    Abstract: The fifth generation (5G) mobile network will enable the Internet of Things (IoT) to take a large leap into the age of future computing. As a result of extended connectivity, high speed, reduced latency services being provided by 5G, IoT has experienced and will continue to undergo a remarkable transition in every field of daily life. Furthermore, fog computing will revolutionize the IoT platforms… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

    Comments: 14 pages, 1 figure

  26. arXiv:1903.07963  [pdf, other

    cs.IT cs.NI

    Minimizing Age in Gateway Based Update Systems

    Authors: Sandeep Banik, Sanjit K. Kaul, P. B. Sujit

    Abstract: We consider a network of status updating sensors whose updates are collected and sent to a monitor by a gateway. The monitor desires as fresh as possible updates from the network of sensors. The gateway may either poll a sensor for its status update or it may transmit collected sensor updates to the monitor. We derive the average age at the monitor for such a setting. We observe that increasing th… ▽ More

    Submitted 17 June, 2019; v1 submitted 19 March, 2019; originally announced March 2019.

    Comments: 6 pages, 8 figures. Accepted at IEEE International Symposium on Information Theory (ISIT), 2019 (Conference version)

  27. arXiv:1811.04309  [pdf, ps, other

    cs.CV

    Multi-label Object Attribute Classification using a Convolutional Neural Network

    Authors: Soubarna Banik, Mikko Lauri, Simone Frintrop

    Abstract: Objects of different classes can be described using a limited number of attributes such as color, shape, pattern, and texture. Learning to detect object attributes instead of only detecting objects can be helpful in dealing with a priori unknown objects. With this inspiration, a deep convolutional neural network for low-level object attribute classification, called the Deep Attribute Network (DAN)… ▽ More

    Submitted 10 November, 2018; originally announced November 2018.

    Comments: 14 pages, 7 figures

  28. arXiv:1805.05986  [pdf

    cs.CR

    Runtime Optimization of Identification Event in ECG Based Biometric Authentication

    Authors: Nafis Neehal, Dewan Ziaul Karim, Sejuti Banik, Tasfia Anika

    Abstract: Biometric Authentication has become a very popular method for different state-of-the-art security architectures. Albeit the ubiquitous acceptance and constant development of trivial biometric authentication methods such as fingerprint, palm-print, retinal scan etc., the possibility of producing a highly competitive performance from somewhat less-popular methods still remains. Electrocardiogram (EC… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: 11 Pages, 4 Figures, 1 Table

  29. arXiv:1312.2175   

    cs.NI

    Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services

    Authors: Bibhas Roy, Suman Banik, Parthi Dey, Sugata Sanyal, Nabendu Chaki

    Abstract: Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristi… ▽ More

    Submitted 10 December, 2013; v1 submitted 7 December, 2013; originally announced December 2013.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in equation 1

  30. arXiv:1108.4138  [pdf

    cs.NI

    QoS Routing using OLSR with Optimization for Flooding

    Authors: Suman Banik, Bibhash Roy, Parthi Dey, Nabendu Chaki, Sugata Sanyal

    Abstract: Mobile Ad-hoc Network (MANET) is the self organizing collection of mobile nodes. The communication in MANET is done via a wireless media. Ad hoc wireless networks have massive commercial and military potential because of their mobility support. Due to demanding real time multimedia applications, Quality of Services (QoS) support in such infrastructure less networks have become essential. QoS routi… ▽ More

    Submitted 20 August, 2011; originally announced August 2011.

    Comments: 4 Pages, 3 Figures