Skip to main content

Showing 1–7 of 7 results for author: Dinesh, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.05107  [pdf, other

    cs.SI eess.SP

    Modeling Viral Information Spreading via Directed Acyclic Graph Diffusion

    Authors: Chinthaka Dinesh, Gene Cheung, Fei Chen, Yuejiang Li, H. Vicky Zhao

    Abstract: Viral information like rumors or fake news is spread over a communication network like a virus infection in a unidirectional manner: entity $i$ conveys information to a neighbor $j$, resulting in two equally informed (infected) parties. Existing graph diffusion works focus only on bidirectional diffusion on an undirected graph. Instead, we propose a new directed acyclic graph (DAG) diffusion model… ▽ More

    Submitted 22 December, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

  2. arXiv:2210.14164  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Understanding Key Point Cloud Features for Development Three-dimensional Adversarial Attacks

    Authors: Hanieh Naderi, Chinthaka Dinesh, Ivan V. Bajic, Shohreh Kasaei

    Abstract: Adversarial attacks pose serious challenges for deep neural network (DNN)-based analysis of various input signals. In the case of three-dimensional point clouds, methods have been developed to identify points that play a key role in network decision, and these become crucial in generating existing adversarial attacks. For example, a saliency map approach is a popular method for identifying adversa… ▽ More

    Submitted 18 December, 2024; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: 10 pages, 6 figures

  3. arXiv:2208.08726  [pdf, other

    eess.SP cs.LG

    Efficient Signed Graph Sampling via Balancing & Gershgorin Disc Perfect Alignment

    Authors: Chinthaka Dinesh, Gene Cheung, Saghar Bagheri, Ivan V. Bajic

    Abstract: A basic premise in graph signal processing (GSP) is that a graph encoding pairwise (anti-)correlations of the targeted signal as edge weights is exploited for graph filtering. However, existing fast graph sampling schemes are designed and tested only for positive graphs describing positive correlations. In this paper, we show that for datasets with strong inherent anti-correlations, a suitable gra… ▽ More

    Submitted 15 January, 2023; v1 submitted 18 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: text overlap with arXiv:2103.06153

  4. arXiv:2208.02714  [pdf, other

    cs.LG

    Unsupervised Graph Spectral Feature Denoising for Crop Yield Prediction

    Authors: Saghar Bagheri, Chinthaka Dinesh, Gene Cheung, Timothy Eadie

    Abstract: Prediction of annual crop yields at a county granularity is important for national food production and price stability. In this paper, towards the goal of better crop yield prediction, leveraging recent graph signal processing (GSP) tools to exploit spatial correlation among neighboring counties, we denoise relevant features via graph spectral filtering that are inputs to a deep learning predictio… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  5. arXiv:1303.5950  [pdf

    cs.SE

    High Quality Requirement Engineering and Applying Priority Based Tools for QoS Standardization in Web Service Architecture

    Authors: C. Dinesh

    Abstract: Even though there are more development to improving the Quality of Service and requirement engineering in web services yet there is a big scarcity for its related standardization in day to day progress leading to vast needs in its area. Also in web service environment it always has been a big challenge to raise the standard of Quality of Service in requirement engineering analysis.

    Submitted 24 March, 2013; originally announced March 2013.

    Comments: 9 pages, 8 figures

  6. arXiv:1111.2418  [pdf

    cs.DC

    Data Integrity and Dynamic Storage Way in Cloud Computing

    Authors: C. Dinesh

    Abstract: It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn't have copy of all stored data. But any authors don't tell us data integrity through its user and CSP level by comparison before and after the data update in cloud. So we have to establish… ▽ More

    Submitted 10 November, 2011; originally announced November 2011.

    Comments: 1 figure,6 pages, i am the only author for this title and related information

  7. arXiv:1111.2412  [pdf

    cs.DC

    Secured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm

    Authors: C. Dinesh

    Abstract: It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn't have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don't tell us about total storage capacity of… ▽ More

    Submitted 10 November, 2011; originally announced November 2011.

    Comments: 6 pages,3 figures. I am the only author of this title and related information; International Journal of Computer Applications (0975 - 8887) Volume 31- No.6, October 2011