Skip to main content

Showing 1–33 of 33 results for author: Chauhan, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.06261  [pdf, ps, other

    cs.CL cs.AI

    Gemini 2.5: Pushing the Frontier with Advanced Reasoning, Multimodality, Long Context, and Next Generation Agentic Capabilities

    Authors: Gheorghe Comanici, Eric Bieber, Mike Schaekermann, Ice Pasupat, Noveen Sachdeva, Inderjit Dhillon, Marcel Blistein, Ori Ram, Dan Zhang, Evan Rosen, Luke Marris, Sam Petulla, Colin Gaffney, Asaf Aharoni, Nathan Lintz, Tiago Cardal Pais, Henrik Jacobsson, Idan Szpektor, Nan-Jiang Jiang, Krishna Haridasan, Ahmed Omran, Nikunj Saunshi, Dara Bahri, Gaurav Mishra, Eric Chu , et al. (3278 additional authors not shown)

    Abstract: In this report, we introduce the Gemini 2.X model family: Gemini 2.5 Pro and Gemini 2.5 Flash, as well as our earlier Gemini 2.0 Flash and Flash-Lite models. Gemini 2.5 Pro is our most capable model yet, achieving SoTA performance on frontier coding and reasoning benchmarks. In addition to its incredible coding and reasoning skills, Gemini 2.5 Pro is a thinking model that excels at multimodal unde… ▽ More

    Submitted 7 July, 2025; originally announced July 2025.

    Comments: 72 pages, 17 figures

  2. arXiv:2502.08282  [pdf, other

    cs.LG cs.AI

    Individualised Treatment Effects Estimation with Composite Treatments and Composite Outcomes

    Authors: Vinod Kumar Chauhan, Lei Clifton, Gaurav Nigam, David A. Clifton

    Abstract: Estimating individualised treatment effect (ITE) -- that is the causal effect of a set of variables (also called exposures, treatments, actions, policies, or interventions), referred to as \textit{composite treatments}, on a set of outcome variables of interest, referred to as \textit{composite outcomes}, for a unit from observational data -- remains a fundamental problem in causal inference with… ▽ More

    Submitted 12 May, 2025; v1 submitted 12 February, 2025; originally announced February 2025.

    Comments: 6 pages (double column), 4 figures

  3. arXiv:2407.17346  [pdf, other

    cs.CR

    Insider Threats Mitigation: Role of Penetration Testing

    Authors: Krutarth Chauhan

    Abstract: Conventional security solutions are insufficient to address the urgent cybersecurity challenge posed by insider attacks. While a great deal of research has been done in this area, our systematic literature analysis attempts to give readers a thorough grasp of penetration testing's role in reducing insider risks. We aim to arrange and integrate the body of knowledge on insider threat prevention by… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

  4. arXiv:2405.07841  [pdf, other

    cs.LG

    Sample Selection Bias in Machine Learning for Healthcare

    Authors: Vinod Kumar Chauhan, Lei Clifton, Achille Salaün, Huiqi Yvonne Lu, Kim Branson, Patrick Schwab, Gaurav Nigam, David A. Clifton

    Abstract: While machine learning algorithms hold promise for personalised medicine, their clinical adoption remains limited, partly due to biases that can compromise the reliability of predictions. In this paper, we focus on sample selection bias (SSB), a specific type of bias where the study population is less representative of the target population, leading to biased and potentially harmful decisions. Des… ▽ More

    Submitted 26 November, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: 21 pages and 11 figures (under review)

  5. arXiv:2403.15077  [pdf, other

    cs.LG

    GTAGCN: Generalized Topology Adaptive Graph Convolutional Networks

    Authors: Sukhdeep Singh, Anuj Sharma, Vinod Kumar Chauhan

    Abstract: Graph Neural Networks (GNN) have emerged as a popular and standard approach for learning from graph-structured data. The literature on GNN highlights the potential of this evolving research area and its widespread adoption in real-life applications. However, most of the approaches are either new in concept or derived from specific techniques. Therefore, the potential of more than one approach in h… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: 2 figures, 3 tables and 26 pages

  6. A Brief Review of Hypernetworks in Deep Learning

    Authors: Vinod Kumar Chauhan, Jiandong Zhou, Ping Lu, Soheila Molaei, David A. Clifton

    Abstract: Hypernetworks, or hypernets for short, are neural networks that generate weights for another neural network, known as the target network. They have emerged as a powerful deep learning technique that allows for greater flexibility, adaptability, dynamism, faster training, information sharing, and model compression. Hypernets have shown promising results in a variety of deep learning problems, inclu… ▽ More

    Submitted 13 July, 2024; v1 submitted 12 June, 2023; originally announced June 2023.

    Comments: 2 figures and 2 tables -- Accepted to Artificial Intelligence Review

    Journal ref: Artificial Intelligence Review, Volume 57(250), 2024

  7. arXiv:2305.15984  [pdf, other

    cs.LG stat.ME

    Dynamic Inter-treatment Information Sharing for Individualized Treatment Effects Estimation

    Authors: Vinod Kumar Chauhan, Jiandong Zhou, Ghadeer Ghosheh, Soheila Molaei, David A. Clifton

    Abstract: Estimation of individualized treatment effects (ITE) from observational studies is a fundamental problem in causal inference and holds significant importance across domains, including healthcare. However, limited observational datasets pose challenges in reliable ITE estimation as data have to be split among treatment groups to train an ITE learner. While information sharing among treatment groups… ▽ More

    Submitted 12 February, 2024; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: accepted to The 27th International Conference on Artificial Intelligence and Statistics (AISTATS) 2024

  8. arXiv:2302.14679  [pdf, other

    cs.LG cs.CL

    Synthesizing Mixed-type Electronic Health Records using Diffusion Models

    Authors: Taha Ceritli, Ghadeer O. Ghosheh, Vinod Kumar Chauhan, Tingting Zhu, Andrew P. Creagh, David A. Clifton

    Abstract: Electronic Health Records (EHRs) contain sensitive patient information, which presents privacy concerns when sharing such data. Synthetic data generation is a promising solution to mitigate these risks, often relying on deep generative models such as Generative Adversarial Networks (GANs). However, recent studies have shown that diffusion models offer several advantages over GANs, such as generati… ▽ More

    Submitted 10 August, 2023; v1 submitted 28 February, 2023; originally announced February 2023.

    Comments: Page 2, Figure 1 is updated

  9. arXiv:2212.07430  [pdf, other

    cs.LG cs.AI

    Interactive Concept Bottleneck Models

    Authors: Kushal Chauhan, Rishabh Tiwari, Jan Freyberg, Pradeep Shenoy, Krishnamurthy Dvijotham

    Abstract: Concept bottleneck models (CBMs) are interpretable neural networks that first predict labels for human-interpretable concepts relevant to the prediction task, and then predict the final label based on the concept label predictions. We extend CBMs to interactive prediction settings where the model can query a human collaborator for the label to some concepts. We develop an interaction policy that,… ▽ More

    Submitted 27 April, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: Accepted at AAAI 2023

  10. arXiv:2211.08140  [pdf, other

    physics.soc-ph cs.CE

    Network science approach for identifying disruptive elements of an airline

    Authors: Vinod Kumar Chauhan, Anna Ledwoch, Alexandra Brintrup, Manuel Herrera, Vaggelis Giannikas, Goran Stojkovic, Duncan Mcfarlane

    Abstract: Currently, flight delays are common and they propagate from an originating flight to connecting flights, leading to large disruptions in the overall schedule. These disruptions cause massive economic losses, affect airlines' reputations, waste passengers' time and money, and directly impact the environment. This study adopts a network science approach for solving the delay propagation problem by m… ▽ More

    Submitted 14 April, 2023; v1 submitted 19 October, 2022; originally announced November 2022.

    Comments: accepted to Data Science and Management

  11. Real-time large-scale supplier order assignments across two-tiers of a supply chain with penalty and dual-sourcing

    Authors: Vinod Kumar Chauhan, Stephen Mak, Ajith Kumar Parlikad, Muhannad Alomari, Linus Casassa, Alexandra Brintrup

    Abstract: Supplier selection and order allocation (SSOA) are key strategic decisions in supply chain management which greatly impact the performance of the supply chain. Although, the SSOA problem has been studied extensively but less attention paid to scalability presents a significant gap preventing adoption of SSOA algorithms by industrial practitioners. This paper presents a novel multi-item, multi-supp… ▽ More

    Submitted 30 December, 2022; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: accepted at Computers & Industrial Engineering (2022)

  12. Exploitation of material consolidation trade-offs in multi-tier complex supply networks

    Authors: Vinod Kumar Chauhan, Muhannad Alomari, James Arney, Ajith Kumar Parlikad, Alexandra Brintrup

    Abstract: While consolidation strategies form the backbone of many supply chain optimisation problems, exploitation of multi-tier material relationships through consolidation remains an understudied area, despite being a prominent feature of industries that produce complex made-to-order products. In this paper, we propose an optimisation framework for exploiting multi-to-multi relationship between tiers of… ▽ More

    Submitted 19 November, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: accepted to Supply Chain Analytics

    Journal ref: Supply Chain Analytics, Volume 4, December 2023, 100050

  13. arXiv:2210.10530  [pdf, other

    cs.LG cs.AI stat.ME

    Adversarial De-confounding in Individualised Treatment Effects Estimation

    Authors: Vinod Kumar Chauhan, Soheila Molaei, Marzia Hoque Tania, Anshul Thakur, Tingting Zhu, David A. Clifton

    Abstract: Observational studies have recently received significant attention from the machine learning community due to the increasingly available non-experimental observational data and the limitations of the experimental studies, such as considerable cost, impracticality, small and less representative sample sizes, etc. In observational studies, de-confounding is a fundamental problem of individualised tr… ▽ More

    Submitted 24 January, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: accepted to AISTATS 2023

  14. arXiv:2210.09440  [pdf, other

    cs.CL cs.AI

    Using Bottleneck Adapters to Identify Cancer in Clinical Notes under Low-Resource Constraints

    Authors: Omid Rohanian, Hannah Jauncey, Mohammadmahdi Nouriborji, Vinod Kumar Chauhan, Bronner P. Gonçalves, Christiana Kartsonaki, ISARIC Clinical Characterisation Group, Laura Merson, David Clifton

    Abstract: Processing information locked within clinical health records is a challenging task that remains an active area of research in biomedical NLP. In this work, we evaluate a broad set of machine learning techniques ranging from simple RNNs to specialised transformers such as BioBERT on a dataset containing clinical notes along with a set of annotations indicating whether a sample is cancer-related or… ▽ More

    Submitted 7 June, 2023; v1 submitted 17 October, 2022; originally announced October 2022.

    MSC Class: 68T50 ACM Class: I.2.7

  15. Trolley Optimisation for Loading Printed Circuit Board Components

    Authors: Vinod Kumar Chauhan, Mark Bass, Ajith Kumar Parlikad, Alexandra Brintrup

    Abstract: A trolley is a container for loading printed circuit board (PCB) components, and a trolley optimisation problem (TOP) is an assignment of PCB components to trolleys for use in the production of a set of PCBs in an assembly line. In this paper, we introduce the TOP, a novel operation research application. To formulate the TOP, we derive a novel extension of the bin packing problem. We exploit the p… ▽ More

    Submitted 13 August, 2024; v1 submitted 19 September, 2022; originally announced September 2022.

    Comments: Accepted to Operations Research Forum (Springer Nature)

    Journal ref: Operations Research Forum, Volume 5 (72), 2024

  16. arXiv:2208.13579  [pdf, other

    cs.LG

    Shaken, and Stirred: Long-Range Dependencies Enable Robust Outlier Detection with PixelCNN++

    Authors: Barath Mohan Umapathi, Kushal Chauhan, Pradeep Shenoy, Devarajan Sridharan

    Abstract: Reliable outlier detection is critical for real-world deployment of deep learning models. Although extensively studied, likelihoods produced by deep generative models have been largely dismissed as being impractical for outlier detection. First, deep generative model likelihoods are readily biased by low-level input statistics. Second, many recent solutions for correcting these biases are computat… ▽ More

    Submitted 20 May, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

  17. COPER: Continuous Patient State Perceiver

    Authors: Vinod Kumar Chauhan, Anshul Thakur, Odhran O'Donoghue, David A. Clifton

    Abstract: In electronic health records (EHRs), irregular time-series (ITS) occur naturally due to patient health dynamics, reflected by irregular hospital visits, diseases/conditions and the necessity to measure different vitals signs at each visit etc. ITS present challenges in training machine learning algorithms which mostly are built on assumption of coherent fixed dimensional feature space. In this pap… ▽ More

    Submitted 24 November, 2022; v1 submitted 5 August, 2022; originally announced August 2022.

    Comments: 2 figures; presented in IEEE International Conference on Biomedical and Health Informatics (IEEE BHI-2022)

  18. arXiv:2207.10992  [pdf, other

    cs.CV cs.AI

    Taguchi based Design of Sequential Convolution Neural Network for Classification of Defective Fasteners

    Authors: Manjeet Kaur, Krishan Kumar Chauhan, Tanya Aggarwal, Pushkar Bharadwaj, Renu Vig, Isibor Kennedy Ihianle, Garima Joshi, Kayode Owa

    Abstract: Fasteners play a critical role in securing various parts of machinery. Deformations such as dents, cracks, and scratches on the surface of fasteners are caused by material properties and incorrect handling of equipment during production processes. As a result, quality control is required to ensure safe and reliable operations. The existing defect inspection method relies on manual examination, whi… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

    Comments: 13 pages, 6 figures

  19. arXiv:2206.05750  [pdf, other

    cs.LG

    Matching options to tasks using Option-Indexed Hierarchical Reinforcement Learning

    Authors: Kushal Chauhan, Soumya Chatterjee, Akash Reddy, Balaraman Ravindran, Pradeep Shenoy

    Abstract: The options framework in Hierarchical Reinforcement Learning breaks down overall goals into a combination of options or simpler tasks and associated policies, allowing for abstraction in the action space. Ideally, these options can be reused across different higher-level goals; indeed, such reuse is necessary to realize the vision of a continual learning agent that can effectively leverage its pri… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

    Comments: 10 pages, 4 figures

  20. arXiv:2201.06100  [pdf

    cs.CR cs.DC

    Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain

    Authors: Hardik Sachdeva, Shivam Gupta, Anushka Misra, Khushbu Chauhan, Mayank Dave

    Abstract: Unmanned Aerial Vehicles (UAVs), also known as drones, have exploded in every segment present in todays business industry. They have scope in reinventing old businesses, and they are even developing new opportunities for various brands and franchisors. UAVs are used in the supply chain, maintaining surveillance and serving as mobile hotspots. Although UAVs have potential applications, they bring s… ▽ More

    Submitted 27 June, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: 18 Pages; 14 Figures; 2 Tables

    Journal ref: Int. J. of Communication Networks and Distributed Systems (IJCNDS) 2023

  21. arXiv:2108.08760  [pdf, other

    cs.LG cs.CV

    Robust outlier detection by de-biasing VAE likelihoods

    Authors: Kushal Chauhan, Barath Mohan U, Pradeep Shenoy, Manish Gupta, Devarajan Sridharan

    Abstract: Deep networks often make confident, yet, incorrect, predictions when tested with outlier data that is far removed from their training distributions. Likelihoods computed by deep generative models (DGMs) are a candidate metric for outlier detection with unlabeled data. Yet, previous studies have shown that DGM likelihoods are unreliable and can be easily biased by simple transformations to input da… ▽ More

    Submitted 19 July, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

    Comments: CVPR 2022. 20 pages and 19 figures

    ACM Class: I.2.10; I.4.8; I.5.4

  22. HCR-Net: A deep learning based script independent handwritten character recognition network

    Authors: Vinod Kumar Chauhan, Sukhdeep Singh, Anuj Sharma

    Abstract: Handwritten character recognition (HCR) remains a challenging pattern recognition problem despite decades of research, and lacks research on script independent recognition techniques. {\color{black}This is mainly because of similar character structures, different handwriting styles, diverse scripts, handcrafted feature extraction techniques, unavailability of data and code, and the development of… ▽ More

    Submitted 17 February, 2024; v1 submitted 15 August, 2021; originally announced August 2021.

    Comments: accepted to Multimedia Tools and Applications

    Journal ref: Multimedia Tools and Applications, Volume 83, pages 78433-78467, 2024

  23. arXiv:2009.08590  [pdf, ps, other

    cs.CL cs.IR

    NEU at WNUT-2020 Task 2: Data Augmentation To Tell BERT That Death Is Not Necessarily Informative

    Authors: Kumud Chauhan

    Abstract: Millions of people around the world are sharing COVID-19 related information on social media platforms. Since not all the information shared on the social media is useful, a machine learning system to identify informative posts can help users in finding relevant information. In this paper, we present a BERT classifier system for W-NUT2020 Shared Task 2: Identification of Informative COVID-19 Engli… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: WNUT-2020 Task 2 System Description paper

  24. arXiv:2005.11055  [pdf, other

    cs.CL

    Improving Segmentation for Technical Support Problems

    Authors: Kushal Chauhan, Abhirut Gupta

    Abstract: Technical support problems are often long and complex. They typically contain user descriptions of the problem, the setup, and steps for attempted resolution. Often they also contain various non-natural language text elements like outputs of commands, snippets of code, error messages or stack traces. These elements contain potentially crucial information for problem resolution. However, they canno… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

    Comments: Accepted at ACL 2020

  25. Automated Content Grading Using Machine Learning

    Authors: Rahul Kr Chauhan, Ravinder Saharan, Siddhartha Singh, Priti Sharma

    Abstract: Grading of examination papers is a hectic, time-labor intensive task and is often subjected to inefficiency and bias in checking. This research project is a primitive experiment in the automation of grading of theoretical answers written in exams by students in technical courses which yet had continued to be human graded. In this paper, we show how the algorithmic approach in machine learning can… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

    Comments: 7 pages, 6 figures

  26. arXiv:2002.01792  [pdf

    cs.IR cs.DL

    Experiments with Different Indexing Techniques for Text Retrieval tasks on Gujarati Language using Bag of Words Approach

    Authors: Jyoti Pareek, Hardik Joshi, Krunal Chauhan, Rushikesh Patel

    Abstract: This paper presents results of various experiments carried out to improve text retrieval of gujarati text documents. Text retrieval involves searching and ranking of text documents for a given set of query terms. We have tested various retrieval models that uses bag-of-words approach. Bag-of-words approach is a traditional approach that is being used till date where the text document is represente… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

  27. LIBS2ML: A Library for Scalable Second Order Machine Learning Algorithms

    Authors: Vinod Kumar Chauhan, Anuj Sharma, Kalpana Dahiya

    Abstract: LIBS2ML is a library based on scalable second order learning algorithms for solving large-scale problems, i.e., big data problems in machine learning. LIBS2ML has been developed using MEX files, i.e., C++ with MATLAB/Octave interface to take the advantage of both the worlds, i.e., faster learning using C++ and easy I/O using MATLAB. Most of the available libraries are either in MATLAB/Python/R whi… ▽ More

    Submitted 20 April, 2019; originally announced April 2019.

    Comments: 5 page JMLR library format, 4 figures. Library available as open source for download at: https://github.com/jmdvinodjmd/LIBS2ML

    Journal ref: Software Impacts, Volume 10, November 2021, 100123 (2021)

  28. Stochastic Trust Region Inexact Newton Method for Large-scale Machine Learning

    Authors: Vinod Kumar Chauhan, Anuj Sharma, Kalpana Dahiya

    Abstract: Nowadays stochastic approximation methods are one of the major research direction to deal with the large-scale machine learning problems. From stochastic first order methods, now the focus is shifting to stochastic second order methods due to their faster convergence and availability of computing resources. In this paper, we have proposed a novel Stochastic Trust RegiOn Inexact Newton method, call… ▽ More

    Submitted 26 December, 2019; v1 submitted 26 December, 2018; originally announced December 2018.

    Comments: 32 figures, accepted in International Journal of Machine Learning and Cybernetics

  29. arXiv:1807.08934  [pdf, ps, other

    cs.LG cs.AI stat.ML

    SAAGs: Biased Stochastic Variance Reduction Methods for Large-scale Learning

    Authors: Vinod Kumar Chauhan, Anuj Sharma, Kalpana Dahiya

    Abstract: Stochastic approximation is one of the effective approach to deal with the large-scale machine learning problems and the recent research has focused on reduction of variance, caused by the noisy approximations of the gradients. In this paper, we have proposed novel variants of SAAG-I and II (Stochastic Average Adjusted Gradient) (Chauhan et al. 2017), called SAAG-III and IV, respectively. Unlike S… ▽ More

    Submitted 6 April, 2019; v1 submitted 24 July, 2018; originally announced July 2018.

    Comments: Final journal version. Appl Intell (2019)

  30. arXiv:1801.05931  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Faster Learning by Reduction of Data Access Time

    Authors: Vinod Kumar Chauhan, Anuj Sharma, Kalpana Dahiya

    Abstract: Nowadays, the major challenge in machine learning is the Big Data challenge. The big data problems due to large number of data points or large number of features in each data point, or both, the training of models have become very slow. The training time has two major components: Time to access the data and time to process (learn from) the data. So far, the research has focused only on the second… ▽ More

    Submitted 25 July, 2018; v1 submitted 17 January, 2018; originally announced January 2018.

    Comments: 80 figures, final journal version

    Journal ref: Applied Intelligence, Springer, 2018

  31. Securing Mobile Ad hoc Networks:Key Management and Routing

    Authors: Kamal Kumar Chauhan, Amit Kumar Singh Sanger

    Abstract: Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in netwo… ▽ More

    Submitted 11 May, 2012; originally announced May 2012.

    Comments: 11 pages,(65-75)

    Journal ref: International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012

  32. arXiv:1108.5592  [pdf

    cs.DB

    A Performance Study of Data Mining Techniques: Multiple Linear Regression vs. Factor Analysis

    Authors: Abhishek Taneja, R. K. Chauhan

    Abstract: The growing volume of data usually creates an interesting challenge for the need of data analysis tools that discover regularities in these data. Data mining has emerged as disciplines that contribute tools for data analysis, discovery of hidden knowledge, and autonomous decision making in many application domains. The purpose of this study is to compare the performance of two data mining techniqu… ▽ More

    Submitted 26 August, 2011; originally announced August 2011.

    Comments: Data mining, Multiple Linear Regression, Factor Analysis, Principal Component Regression, Maximum Liklihood Regression, Generalized Least Square Regression

  33. A Low Overhead Minimum Process Global Snapshop Collection Algorithm for Mobile Distributed System

    Authors: Surender Kumar, R. K. Chauhan, Parveen Kumar

    Abstract: Coordinated checkpointing is an effective fault tolerant technique in distributed system as it avoids the domino effect and require minimum storage requirement. Most of the earlier coordinated checkpoint algorithms block their computation during checkpointing and forces minimum-process or non-blocking but forces all nodes to takes checkpoint even though many of them may not be necessary or non-blo… ▽ More

    Submitted 29 May, 2010; originally announced May 2010.

    Comments: 19 Pages, IJMA

    Journal ref: International journal of Multimedia & Its Applications 2.2 (2010) 12-30