Skip to main content

Showing 1–50 of 186 results for author: Keshav

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.10897  [pdf, ps, other

    cs.AI

    GenPlanX. Generation of Plans and Execution

    Authors: Daniel Borrajo, Giuseppe Canonaco, Tomás de la Rosa, Alfredo Garrachón, Sriram Gopalakrishnan, Simerjot Kaur, Marianela Morales, Sunandita Patra, Alberto Pozanco, Keshav Ramani, Charese Smiley, Pietro Totis, Manuela Veloso

    Abstract: Classical AI Planning techniques generate sequences of actions for complex tasks. However, they lack the ability to understand planning tasks when provided using natural language. The advent of Large Language Models (LLMs) has introduced novel capabilities in human-computer interaction. In the context of planning tasks, LLMs have shown to be particularly good in interpreting human intents among ot… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

  2. arXiv:2506.03884  [pdf

    cs.CL cs.CV

    Kinship in Speech: Leveraging Linguistic Relatedness for Zero-Shot TTS in Indian Languages

    Authors: Utkarsh Pathak, Chandra Sai Krishna Gunda, Anusha Prakash, Keshav Agarwal, Hema A. Murthy

    Abstract: Text-to-speech (TTS) systems typically require high-quality studio data and accurate transcriptions for training. India has 1369 languages, with 22 official using 13 scripts. Training a TTS system for all these languages, most of which have no digital resources, seems a Herculean task. Our work focuses on zero-shot synthesis, particularly for languages whose scripts and phonotactics come from diff… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: Accepted at INTERSPEECH 2025

    ACM Class: I.5.4

  3. arXiv:2505.18944  [pdf, other

    cs.CR cs.ET

    Exemplifying Emerging Phishing: QR-based Browser-in-The-Browser (BiTB) Attack

    Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan, Basant Subba

    Abstract: Lately, cybercriminals constantly formulate productive approaches to exploit individuals. This article exemplifies an innovative attack, namely QR-based Browser-in-The-Browser (BiTB), using proficiencies of Large Language Model (LLM) i.e. Google Gemini. The presented attack is a fusion of two emerging attacks: BiTB and Quishing (QR code phishing). Our study underscores attack's simplistic implemen… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

    Comments: This manuscript is of 5 pages including 7 figures and 2 algorithms

  4. arXiv:2505.17126  [pdf, ps, other

    cs.CL cs.LG stat.ML

    Conformal Language Model Reasoning with Coherent Factuality

    Authors: Maxon Rubin-Toles, Maya Gambhir, Keshav Ramji, Aaron Roth, Surbhi Goel

    Abstract: Language models are increasingly being used in important decision pipelines, so ensuring the correctness of their outputs is crucial. Recent work has proposed evaluating the "factuality" of claims decomposed from a language model generation and applying conformal prediction techniques to filter out those claims that are not factual. This can be effective for tasks such as information retrieval, wh… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

  5. arXiv:2505.16927  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Latent Principle Discovery for Language Model Self-Improvement

    Authors: Keshav Ramji, Tahira Naseem, Ramón Fernandez Astudillo

    Abstract: When language model (LM) users aim to improve the quality of its generations, it is crucial to specify concrete behavioral attributes that the model should strive to reflect. However, curating such principles across many domains, even non-exhaustively, requires a labor-intensive annotation process. To automate this process, we propose eliciting these latent attributes guiding model reasoning towar… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  6. arXiv:2505.04123  [pdf, other

    cs.CR

    A Framework to Prevent Biometric Data Leakage in the Immersive Technologies Domain

    Authors: Keshav Sood, Iynkaran Natgunanathan, Uthayasanker Thayasivam, Vithurabiman Senthuran, Xiaoning Zhang, Shui Yu

    Abstract: Doubtlessly, the immersive technologies have potential to ease people's life and uplift economy, however the obvious data privacy risks cannot be ignored. For example, a participant wears a 3D headset device which detects participant's head motion to track the pose of participant's head to match the orientation of camera with participant's eyes positions in the real-world. In a preliminary study,… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

    Comments: 11 pages, 6 figures

  7. arXiv:2505.03455  [pdf, other

    cs.CR

    Mitigating Backdoor Triggered and Targeted Data Poisoning Attacks in Voice Authentication Systems

    Authors: Alireza Mohammadi, Keshav Sood, Dhananjay Thiruvady, Asef Nazari

    Abstract: Voice authentication systems remain susceptible to two major threats: backdoor triggered attacks and targeted data poisoning attacks. This dual vulnerability is critical because conventional solutions typically address each threat type separately, leaving systems exposed to adversaries who can exploit both attacks simultaneously. We propose a unified defense framework that effectively addresses bo… ▽ More

    Submitted 6 May, 2025; originally announced May 2025.

  8. arXiv:2504.14903  [pdf, other

    cs.IR

    ColBERT-serve: Efficient Multi-Stage Memory-Mapped Scoring

    Authors: Kaili Huang, Thejas Venkatesh, Uma Dingankar, Antonio Mallia, Daniel Campos, Jian Jiao, Christopher Potts, Matei Zaharia, Kwabena Boahen, Omar Khattab, Saarthak Sarup, Keshav Santhanam

    Abstract: We study serving retrieval models, specifically late interaction models like ColBERT, to many concurrent users at once and under a small budget, in which the index may not fit in memory. We present ColBERT-serve, a novel serving system that applies a memory-mapping strategy to the ColBERT index, reducing RAM usage by 90% and permitting its deployment on cheap servers, and incorporates a multi-stag… ▽ More

    Submitted 21 April, 2025; originally announced April 2025.

    Comments: Accepted by ECIR 2025

  9. arXiv:2504.12568  [pdf, other

    cs.LG cs.NE

    Evolutionary Policy Optimization

    Authors: Zelal Su "Lain" Mustafaoglu, Keshav Pingali, Risto Miikkulainen

    Abstract: A key challenge in reinforcement learning (RL) is managing the exploration-exploitation trade-off without sacrificing sample efficiency. Policy gradient (PG) methods excel in exploitation through fine-grained, gradient-based optimization but often struggle with exploration due to their focus on local search. In contrast, evolutionary computation (EC) methods excel in global exploration, but lack m… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

    Comments: Builds upon previous GECCO 2025 work

  10. arXiv:2504.12480  [pdf, other

    cs.NE cs.LG q-bio.NC

    Boosting Reservoir Computing with Brain-inspired Adaptive Dynamics

    Authors: Keshav Srinivasan, Dietmar Plenz, Michelle Girvan

    Abstract: Reservoir computers (RCs) provide a computationally efficient alternative to deep learning while also offering a framework for incorporating brain-inspired computational principles. By using an internal neural network with random, fixed connections$-$the 'reservoir'$-$and training only the output weights, RCs simplify the training process but remain sensitive to the choice of hyperparameters that… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  11. arXiv:2504.03624  [pdf, other

    cs.CL cs.AI cs.LG

    Nemotron-H: A Family of Accurate and Efficient Hybrid Mamba-Transformer Models

    Authors: NVIDIA, :, Aaron Blakeman, Aarti Basant, Abhinav Khattar, Adithya Renduchintala, Akhiad Bercovich, Aleksander Ficek, Alexis Bjorlin, Ali Taghibakhshi, Amala Sanjay Deshmukh, Ameya Sunil Mahabaleshwarkar, Andrew Tao, Anna Shors, Ashwath Aithal, Ashwin Poojary, Ayush Dattagupta, Balaram Buddharaju, Bobby Chen, Boris Ginsburg, Boxin Wang, Brandon Norick, Brian Butterfield, Bryan Catanzaro, Carlo del Mundo , et al. (176 additional authors not shown)

    Abstract: As inference-time scaling becomes critical for enhanced reasoning capabilities, it is increasingly becoming important to build models that are efficient to infer. We introduce Nemotron-H, a family of 8B and 56B/47B hybrid Mamba-Transformer models designed to reduce inference cost for a given accuracy level. To achieve this goal, we replace the majority of self-attention layers in the common Transf… ▽ More

    Submitted 15 April, 2025; v1 submitted 4 April, 2025; originally announced April 2025.

  12. arXiv:2504.00712  [pdf, other

    cs.LG

    Spectral Normalization and Voigt-Reuss net: A universal approach to microstructure-property forecasting with physical guarantees

    Authors: Sanath Keshav, Julius Herb, Felix Fritzen

    Abstract: Heterogeneous materials are crucial to producing lightweight components, functional components, and structures composed of them. A crucial step in the design process is the rapid evaluation of their effective mechanical, thermal, or, in general, constitutive properties. The established procedure is to use forward models that accept microstructure geometry and local constitutive properties as input… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

  13. arXiv:2503.24019  [pdf, other

    stat.ML cs.LG stat.AP

    AutoML Algorithms for Online Generalized Additive Model Selection: Application to Electricity Demand Forecasting

    Authors: Keshav Das, Julie Keisler, Margaux Brégère, Amaury Durand

    Abstract: Electricity demand forecasting is key to ensuring that supply meets demand lest the grid would blackout. Reliable short-term forecasts may be obtained by combining a Generalized Additive Models (GAM) with a State-Space model (Obst et al., 2021), leading to an adaptive (or online) model. A GAM is an over-parameterized linear model defined by a formula and a state-space model involves hyperparameter… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

    Comments: 13 pages, 1 figure

  14. arXiv:2503.20666  [pdf, other

    cs.HC cs.CL

    TAMA: A Human-AI Collaborative Thematic Analysis Framework Using Multi-Agent LLMs for Clinical Interviews

    Authors: Huimin Xu, Seungjun Yi, Terence Lim, Jiawei Xu, Andrew Well, Carlos Mery, Aidong Zhang, Yuji Zhang, Heng Ji, Keshav Pingali, Yan Leng, Ying Ding

    Abstract: Thematic analysis (TA) is a widely used qualitative approach for uncovering latent meanings in unstructured text data. TA provides valuable insights in healthcare but is resource-intensive. Large Language Models (LLMs) have been introduced to perform TA, yet their applications in healthcare remain unexplored. Here, we propose TAMA: A Human-AI Collaborative Thematic Analysis framework using Multi-A… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

    Comments: Submitted to the American Medical Informatics Association (AMIA) 2025 Annual Symposium, 10 pages

  15. arXiv:2503.18308  [pdf, other

    cs.RO

    Vision-Guided Loco-Manipulation with a Snake Robot

    Authors: Adarsh Salagame, Sasank Potluri, Keshav Bharadwaj Vaidyanathan, Kruthika Gangaraju, Eric Sihite, Milad Ramezani, Alireza Ramezani

    Abstract: This paper presents the development and integration of a vision-guided loco-manipulation pipeline for Northeastern University's snake robot, COBRA. The system leverages a YOLOv8-based object detection model and depth data from an onboard stereo camera to estimate the 6-DOF pose of target objects in real time. We introduce a framework for autonomous detection and control, enabling closed-loop loco-… ▽ More

    Submitted 23 March, 2025; originally announced March 2025.

  16. arXiv:2503.09477  [pdf, other

    cs.RO cs.LG cs.NE

    Neural reservoir control of a soft bio-hybrid arm

    Authors: Noel Naughton, Arman Tekinalp, Keshav Shivam, Seung Hung Kim, Volodymyr Kindratenko, Mattia Gazzola

    Abstract: A long-standing engineering problem, the control of soft robots is difficult because of their highly non-linear, heterogeneous, anisotropic, and distributed nature. Here, bridging engineering and biology, a neural reservoir is employed for the dynamic control of a bio-hybrid model arm made of multiple muscle-tendon groups enveloping an elastic spine. We show how the use of reservoirs facilitates s… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

    Comments: 12 pages; 4 figures

  17. arXiv:2503.00428  [pdf, other

    cs.CV

    DashCop: Automated E-ticket Generation for Two-Wheeler Traffic Violations Using Dashcam Videos

    Authors: Deepti Rawat, Keshav Gupta, Aryamaan Basu Roy, Ravi Kiran Sarvadevabhatla

    Abstract: Motorized two-wheelers are a prevalent and economical means of transportation, particularly in the Asia-Pacific region. However, hazardous driving practices such as triple riding and non-compliance with helmet regulations contribute significantly to accident rates. Addressing these violations through automated enforcement mechanisms can enhance traffic safety. In this paper, we propose DashCop, an… ▽ More

    Submitted 1 March, 2025; originally announced March 2025.

  18. arXiv:2502.04522  [pdf, other

    cs.SD cs.AI eess.AS

    ImprovNet -- Generating Controllable Musical Improvisations with Iterative Corruption Refinement

    Authors: Keshav Bhandari, Sungkyun Chang, Tongyu Lu, Fareza R. Enus, Louis B. Bradshaw, Dorien Herremans, Simon Colton

    Abstract: Despite deep learning's remarkable advances in style transfer across various domains, generating controllable performance-level musical style transfer for complete symbolically represented musical works remains a challenging area of research. Much of this is owed to limited datasets, especially for genres such as jazz, and the lack of unified models that can handle multiple music generation tasks.… ▽ More

    Submitted 16 May, 2025; v1 submitted 6 February, 2025; originally announced February 2025.

    Comments: 10 pages, 6 figures, IJCNN 2025 conference

  19. arXiv:2502.01089  [pdf, other

    cs.NI cs.AI

    Advanced Architectures Integrated with Agentic AI for Next-Generation Wireless Networks

    Authors: Kapal Dev, Sunder Ali Khowaja, Keshav Singh, Engin Zeydan, Merouane Debbah

    Abstract: This paper investigates a range of cutting-edge technologies and architectural innovations aimed at simplifying network operations, reducing operational expenditure (OpEx), and enabling the deployment of new service models. The focus is on (i) Proposing novel, more efficient 6G architectures, with both Control and User planes enabling the seamless expansion of services, while addressing long-term… ▽ More

    Submitted 15 April, 2025; v1 submitted 3 February, 2025; originally announced February 2025.

    Comments: 6 Pages

  20. arXiv:2502.00275  [pdf, other

    cs.RO cs.CV cs.ET cs.HC

    Simultaneous Estimation of Manipulation Skill and Hand Grasp Force from Forearm Ultrasound Images

    Authors: Keshav Bimbraw, Srikar Nekkanti, Daniel B. Tiller II, Mihir Deshmukh, Berk Calli, Robert D. Howe, Haichong K. Zhang

    Abstract: Accurate estimation of human hand configuration and the forces they exert is critical for effective teleoperation and skill transfer in robotic manipulation. A deeper understanding of human interactions with objects can further enhance teleoperation performance. To address this need, researchers have explored methods to capture and translate human manipulation skills and applied forces to robotic… ▽ More

    Submitted 31 January, 2025; originally announced February 2025.

    Comments: 30 pages, 52 references, 10 figures, 8 tables and 2 supplementary videos. Currently under review

  21. arXiv:2501.17759  [pdf, other

    cs.SD cs.AI cs.SC

    Yin-Yang: Developing Motifs With Long-Term Structure And Controllability

    Authors: Keshav Bhandari, Geraint A. Wiggins, Simon Colton

    Abstract: Transformer models have made great strides in generating symbolically represented music with local coherence. However, controlling the development of motifs in a structured way with global form remains an open research area. One of the reasons for this challenge is due to the note-by-note autoregressive generation of such models, which lack the ability to correct themselves after deviations from t… ▽ More

    Submitted 29 January, 2025; originally announced January 2025.

    Comments: 16 Pages, 4 Figures, Accepted at Artificial Intelligence in Music, Sound, Art and Design: 14th International Conference, EvoMUSART 2025

  22. arXiv:2501.15321  [pdf, other

    cs.CL cs.SI

    Figurative-cum-Commonsense Knowledge Infusion for Multimodal Mental Health Meme Classification

    Authors: Abdullah Mazhar, Zuhair hasan shaik, Aseem Srivastava, Polly Ruhnke, Lavanya Vaddavalli, Sri Keshav Katragadda, Shweta Yadav, Md Shad Akhtar

    Abstract: The expression of mental health symptoms through non-traditional means, such as memes, has gained remarkable attention over the past few years, with users often highlighting their mental health struggles through figurative intricacies within memes. While humans rely on commonsense knowledge to interpret these complex expressions, current Multimodal Language Models (MLMs) struggle to capture these… ▽ More

    Submitted 25 January, 2025; originally announced January 2025.

    Comments: Accepted for oral presentation at The Web Conference (WWW) 2025

  23. arXiv:2501.10209  [pdf, other

    cs.CV cs.LG

    Hypercone Assisted Contour Generation for Out-of-Distribution Detection

    Authors: Annita Vapsi, Andrés Muñoz, Nancy Thomas, Keshav Ramani, Daniel Borrajo

    Abstract: Recent advances in the field of out-of-distribution (OOD) detection have placed great emphasis on learning better representations suited to this task. While there are distance-based approaches, distributional awareness has seldom been exploited for better performance. We present HAC$_k$-OOD, a novel OOD detection method that makes no distributional assumption about the data, but automatically adap… ▽ More

    Submitted 17 February, 2025; v1 submitted 17 January, 2025; originally announced January 2025.

  24. arXiv:2501.07731  [pdf, other

    cs.LG cs.SI

    HyperQuery: Beyond Binary Link Prediction

    Authors: Sepideh Maleki, Josh Vekhter, Keshav Pingali

    Abstract: Groups with complex set intersection relations are a natural way to model a wide array of data, from the formation of social groups to the complex protein interactions which form the basis of biological life. One approach to representing such higher order relationships is as a hypergraph. However, efforts to apply machine learning techniques to hypergraph structured datasets have been limited thus… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

  25. arXiv:2412.17819  [pdf, other

    cs.CL cs.AI

    Inductive Linguistic Reasoning with Large Language Models

    Authors: Raghav Ramji, Keshav Ramji

    Abstract: Evaluating large language models (LLMs) on their linguistic reasoning capabilities is an important task to understand the gaps in their skills that may surface during large-scale adoption. In this work, we investigate the abilities of such models to perform abstract multilingual reasoning through the lens of linguistic puzzles on extremely low-resource languages. As these translation tasks involve… ▽ More

    Submitted 8 December, 2024; originally announced December 2024.

  26. arXiv:2412.17310  [pdf, other

    cs.IR cs.AI

    Popularity Estimation and New Bundle Generation using Content and Context based Embeddings

    Authors: Ashutosh Nayak, Prajwal NJ, Sameeksha Keshav, Kavitha S. N., Roja Reddy, Rajasekhara Reddy Duvvuru Muni

    Abstract: Recommender systems create enormous value for businesses and their consumers. They increase revenue for businesses while improving the consumer experience by recommending relevant products amidst huge product base. Product bundling is an exciting development in the field of product recommendations. It aims at generating new bundles and recommending exciting and relevant bundles to their consumers.… ▽ More

    Submitted 23 December, 2024; originally announced December 2024.

  27. arXiv:2412.16526  [pdf, other

    cs.SD cs.AI cs.CL eess.AS

    Text2midi: Generating Symbolic Music from Captions

    Authors: Keshav Bhandari, Abhinaba Roy, Kyra Wang, Geeta Puri, Simon Colton, Dorien Herremans

    Abstract: This paper introduces text2midi, an end-to-end model to generate MIDI files from textual descriptions. Leveraging the growing popularity of multimodal generative approaches, text2midi capitalizes on the extensive availability of textual data and the success of large language models (LLMs). Our end-to-end system harnesses the power of LLMs to generate symbolic music in the form of MIDI files. Speci… ▽ More

    Submitted 31 December, 2024; v1 submitted 21 December, 2024; originally announced December 2024.

    Comments: 9 pages, 3 figures, Accepted at the 39th AAAI Conference on Artificial Intelligence (AAAI 2025)

    Journal ref: Proceedings of the 39th AAAI Conference on Artificial Intelligence (AAAI 2025)

  28. LogBabylon: A Unified Framework for Cross-Log File Integration and Analysis

    Authors: Rabimba Karanjai, Yang Lu, Dana Alsagheer, Keshav Kasichainula, Lei Xu, Weidong Shi, Shou-Hsuan Stephen Huang

    Abstract: Logs are critical resources that record events, activities, or messages produced by software applications, operating systems, servers, and network devices. However, consolidating the heterogeneous logs and cross-referencing them is challenging and complicated. Manually analyzing the log data is time-consuming and prone to errors. LogBabylon is a centralized log data consolidating solution that lev… ▽ More

    Submitted 16 December, 2024; originally announced December 2024.

  29. arXiv:2411.17719  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    SlideSpawn: An Automatic Slides Generation System for Research Publications

    Authors: Keshav Kumar, Ravindranath Chowdary

    Abstract: Research papers are well structured documents. They have text, figures, equations, tables etc., to covey their ideas and findings. They are divided into sections like Introduction, Model, Experiments etc., which deal with different aspects of research. Characteristics like these set research papers apart from ordinary documents and allows us to significantly improve their summarization. In this pa… ▽ More

    Submitted 20 November, 2024; originally announced November 2024.

    Comments: 6 pages, 4 figures, 2 tables, 5 equations, 41 references

    ACM Class: H.3

  30. arXiv:2411.10284  [pdf, ps, other

    cs.DS cs.GT

    Optimal Capacity Modification for Stable Matchings with Ties

    Authors: Keshav Ranjan, Meghana Nasre, Prajakta Nimbhorkar

    Abstract: We consider the Hospitals/Residents (HR) problem in the presence of ties in preference lists. Among the three notions of stability, viz. weak, strong, and super stability, we focus on the notion of strong stability. Strong stability has many desirable properties, both theoretically and practically; however, its existence is not guaranteed. In this paper, our objective is to optimally increase the… ▽ More

    Submitted 23 May, 2025; v1 submitted 15 November, 2024; originally announced November 2024.

    Comments: 33 pages, 6 figures, To appear at IJCAI 2025

  31. arXiv:2410.15344  [pdf, other

    cs.AR

    LLC Intra-set Write Balancing

    Authors: Keshav Krishna, Ayush Verma

    Abstract: The increasing use of Non-Volatile Memory (NVM) in computer architecture has brought about new challenges, one of which is the write endurance problem. Frequent writes to a particular cache cell in NVM can lead to degradation of the memory cell and reduce its lifespan. To solve this problem, we propose a sample-based blocking technique for the Last Level Cache (LLC). Our approach involves defining… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: 11 pages, 7 figures

  32. arXiv:2409.16431  [pdf, other

    cs.CV cs.RO eess.IV

    Hand Gesture Classification Based on Forearm Ultrasound Video Snippets Using 3D Convolutional Neural Networks

    Authors: Keshav Bimbraw, Ankit Talele, Haichong K. Zhang

    Abstract: Ultrasound based hand movement estimation is a crucial area of research with applications in human-machine interaction. Forearm ultrasound offers detailed information about muscle morphology changes during hand movement which can be used to estimate hand gestures. Previous work has focused on analyzing 2-Dimensional (2D) ultrasound image frames using techniques such as convolutional neural network… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

    Comments: Accepted to IUS 2024

  33. arXiv:2409.16415  [pdf, other

    cs.CV cs.RO

    Improving Intersession Reproducibility for Forearm Ultrasound based Hand Gesture Classification through an Incremental Learning Approach

    Authors: Keshav Bimbraw, Jack Rothenberg, Haichong K. Zhang

    Abstract: Ultrasound images of the forearm can be used to classify hand gestures towards developing human machine interfaces. In our previous work, we have demonstrated gesture classification using ultrasound on a single subject without removing the probe before evaluation. This has limitations in usage as once the probe is removed and replaced, the accuracy declines since the classifier performance is sens… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

    Comments: Accepted to IUS 2024

  34. arXiv:2409.09915  [pdf, other

    cs.CV cs.RO

    Forearm Ultrasound based Gesture Recognition on Edge

    Authors: Keshav Bimbraw, Haichong K. Zhang, Bashima Islam

    Abstract: Ultrasound imaging of the forearm has demonstrated significant potential for accurate hand gesture classification. Despite this progress, there has been limited focus on developing a stand-alone end- to-end gesture recognition system which makes it mobile, real-time and more user friendly. To bridge this gap, this paper explores the deployment of deep neural networks for forearm ultrasound-based h… ▽ More

    Submitted 15 September, 2024; originally announced September 2024.

    Comments: Please contact the authors for code and any additional questions pertaining to the project. You can reach Keshav Bimbraw at bimbrawkeshav at gmail dot com

  35. arXiv:2408.10148  [pdf, other

    cs.GT cs.MA

    Auctioning Escape Permits for Multiple Correlated Pollutants Using CMRA

    Authors: Keshav Goyal, Sooraj Sathish, Shrisha Rao

    Abstract: In the context of increasingly complex environmental challenges, effective pollution control mechanisms are crucial. By extending the state of the art auction mechanisms, we aim to develop an efficient approach for allocating pollution abatement resources in a multi-pollutant setting with pollutants affecting each other's reduction costs. We modify the Combinatorial Multi-Round Ascending Auction f… ▽ More

    Submitted 19 August, 2024; originally announced August 2024.

  36. arXiv:2407.10874  [pdf, other

    cs.HC cs.CV cs.LG

    Random Channel Ablation for Robust Hand Gesture Classification with Multimodal Biosignals

    Authors: Keshav Bimbraw, Jing Liu, Ye Wang, Toshiaki Koike-Akino

    Abstract: Biosignal-based hand gesture classification is an important component of effective human-machine interaction. For multimodal biosignal sensing, the modalities often face data loss due to missing channels in the data which can adversely affect the gesture classification performance. To make the classifiers robust to missing channels in the data, this paper proposes using Random Channel Ablation (RC… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: 5 pages, 4 figures

  37. arXiv:2407.10870  [pdf, other

    cs.CV cs.AI cs.HC cs.LG

    GPT Sonograpy: Hand Gesture Decoding from Forearm Ultrasound Images via VLM

    Authors: Keshav Bimbraw, Ye Wang, Jing Liu, Toshiaki Koike-Akino

    Abstract: Large vision-language models (LVLMs), such as the Generative Pre-trained Transformer 4-omni (GPT-4o), are emerging multi-modal foundation models which have great potential as powerful artificial-intelligence (AI) assistance tools for a myriad of applications, including healthcare, industrial, and academic sectors. Although such foundation models perform well in a wide range of general tasks, their… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: 8 pages, 9 figures

  38. arXiv:2407.04014  [pdf, other

    cs.DC

    Offline Energy-Optimal LLM Serving: Workload-Based Energy Models for LLM Inference on Heterogeneous Systems

    Authors: Grant Wilkins, Srinivasan Keshav, Richard Mortier

    Abstract: The rapid adoption of large language models (LLMs) has led to significant advances in natural language processing and text generation. However, the energy consumed through LLM model inference remains a major challenge for sustainable AI deployment. To address this problem, we model the workload-dependent energy consumption and runtime of LLM inference tasks on heterogeneous GPU-CPU systems. By con… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 7 pages, appearing at HotCarbon 2024

  39. arXiv:2407.00010  [pdf, other

    cs.DC cs.AI

    Hybrid Heterogeneous Clusters Can Lower the Energy Consumption of LLM Inference Workloads

    Authors: Grant Wilkins, Srinivasan Keshav, Richard Mortier

    Abstract: Both the training and use of Large Language Models (LLMs) require large amounts of energy. Their increasing popularity, therefore, raises critical concerns regarding the energy efficiency and sustainability of data centers that host them. This paper addresses the challenge of reducing energy consumption in data centers running LLMs. We propose a hybrid data center model that uses a cost-based sche… ▽ More

    Submitted 25 April, 2024; originally announced July 2024.

  40. arXiv:2406.17277  [pdf, other

    cs.CR

    Securing Voice Authentication Applications Against Targeted Data Poisoning

    Authors: Alireza Mohammadi, Keshav Sood, Asef Nazari, Dhananjay Thiruvady

    Abstract: Deep neural network-based voice authentication systems are promising biometric verification techniques that uniquely identify biological characteristics to verify a user. However, they are particularly susceptible to targeted data poisoning attacks, where attackers replace legitimate users' utterances with their own. We propose an enhanced framework using realworld datasets considering realistic a… ▽ More

    Submitted 1 October, 2024; v1 submitted 25 June, 2024; originally announced June 2024.

  41. arXiv:2406.10572  [pdf

    cs.SI

    Collaborative Framework with Shared Responsibility for Relief Management in Disaster Scenarios

    Authors: Bhupesh Kumar Mishra, Keshav Dahal

    Abstract: Disasters instances have been increasing both in frequency and intensity causing the tragic loss of life and making life harder for the survivors. Disaster relief management plays a crucial role in enhancing the lifestyle of disaster victims by managing the disaster impacts. Disaster relief management is a process with many collaborative sectors where different stakeholders should operate in all m… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

    Comments: 7 pages, 1 Figure

  42. arXiv:2406.01650  [pdf, other

    q-bio.BM cs.AI cs.LG

    TAGMol: Target-Aware Gradient-guided Molecule Generation

    Authors: Vineeth Dorna, D. Subhalingam, Keshav Kolluru, Shreshth Tuli, Mrityunjay Singh, Saurabh Singal, N. M. Anoop Krishnan, Sayan Ranu

    Abstract: 3D generative models have shown significant promise in structure-based drug design (SBDD), particularly in discovering ligands tailored to specific target binding sites. Existing algorithms often focus primarily on ligand-target binding, characterized by binding affinity. Moreover, models trained solely on target-ligand distribution may fall short in addressing the broader objectives of drug disco… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  43. arXiv:2405.18953  [pdf, other

    cs.LG

    MAGIC: Modular Auto-encoder for Generalisable Model Inversion with Bias Corrections

    Authors: Yihang She, Clement Atzberger, Andrew Blake, Adriano Gualandi, Srinivasan Keshav

    Abstract: Scientists often model physical processes to understand the natural world and uncover the causation behind observations. Due to unavoidable simplification, discrepancies often arise between model predictions and actual observations, in the form of systematic biases, whose impact varies with model completeness. Classical model inversion methods such as Bayesian inference or regressive neural networ… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2403.02922

  44. arXiv:2405.10918  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    A Framework for Leveraging Partially-Labeled Data for Product Attribute-Value Identification

    Authors: D. Subhalingam, Keshav Kolluru, Mausam, Saurabh Singal

    Abstract: In the e-commerce domain, the accurate extraction of attribute-value pairs (e.g., Brand: Apple) from product titles and user search queries is crucial for enhancing search and recommendation systems. A major challenge with neural models for this task is the lack of high-quality training data, as the annotations for attribute-value pairs in the available datasets are often incomplete. To address th… ▽ More

    Submitted 18 November, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: Accepted to KDD 2025 ADS Track

  45. arXiv:2405.03356  [pdf, other

    cs.NI eess.SP

    An Overview of Intelligent Meta-surfaces for 6G and Beyond: Opportunities, Trends, and Challenges

    Authors: Mayur Katwe, Aryan Kaushik, Lina Mohjazi, Mohammad Abualhayja'a, Davide Dardari, Keshav Singh, Muhammad Ali Imran, M. Majid Butt, Octavia A. Dobre

    Abstract: With the impending arrival of the sixth generation (6G) of wireless communication technology, the telecommunications landscape is poised for another revolutionary transformation. At the forefront of this evolution are intelligent meta-surfaces (IS), emerging as a disruptive physical layer technology with the potential to redefine the capabilities and performance metrics of future wireless networks… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  46. arXiv:2404.15243  [pdf, other

    cs.NI cs.AI cs.LG eess.SP

    UCINet0: A Machine Learning based Receiver for 5G NR PUCCH Format 0

    Authors: Anil Kumar Yerrapragada, Jeeva Keshav Sattianarayanin, Radha Krishna Ganti

    Abstract: Accurate decoding of Uplink Control Information (UCI) on the Physical Uplink Control Channel (PUCCH) is essential for enabling 5G wireless links. This paper explores an AI/ML-based receiver design for PUCCH Format 0. Format 0 signaling encodes the UCI content within the phase of a known base waveform and even supports multiplexing of up to 12 users within the same time-frequency resources. Our fir… ▽ More

    Submitted 10 March, 2024; originally announced April 2024.

  47. Biomimicry in Radiation Therapy: Optimizing Patient Scheduling for Improved Treatment Outcomes

    Authors: Keshav Kumar K., NVSL Narasimham

    Abstract: In the realm of medical science, the pursuit of enhancing treatment efficacy and patient outcomes continues to drive innovation. This study delves into the integration of biomimicry principles within the domain of Radiation Therapy (RT) to optimize patient scheduling, ultimately aiming to augment treatment results. RT stands as a vital medical technique for eradicating cancer cells and diminishing… ▽ More

    Submitted 16 January, 2024; originally announced April 2024.

    Comments: 8 pages, 8 figures

    Journal ref: Advances in Artificial Intelligence and Machine Learning. 2024

  48. arXiv:2403.14581  [pdf, other

    cs.CR

    Global, robust and comparable digital carbon assets

    Authors: Sadiq Jaffer, Michael Dales, Patrick Ferris, Thomas Swinfield, Derek Sorensen, Robin Message, Srinivasan Keshav, Anil Madhavapeddy

    Abstract: Carbon credits purchased in the voluntary carbon market allow unavoidable emissions, such as from international flights for essential travel, to be offset by an equivalent climate benefit, such as avoiding emissions from tropical deforestation. However, many concerns regarding the credibility of these offsetting claims have been raised. Moreover, the credit market is manual, therefore inefficient… ▽ More

    Submitted 3 April, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

    Comments: 10 pages. Extended version, March 2024. A shortened version is to be published at the 6th IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2024)

  49. arXiv:2403.12092  [pdf, other

    cs.IR cs.AI cs.CL

    Methods for Matching English Language Addresses

    Authors: Keshav Ramani, Daniel Borrajo

    Abstract: Addresses occupy a niche location within the landscape of textual data, due to the positional importance carried by every word, and the geographical scope it refers to. The task of matching addresses happens everyday and is present in various fields like mail redirection, entity resolution, etc. Our work defines, and formalizes a framework to generate matching and mismatching pairs of addresses in… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  50. arXiv:2403.07995  [pdf, ps, other

    cs.SD cs.LG cs.SC eess.AS

    Motifs, Phrases, and Beyond: The Modelling of Structure in Symbolic Music Generation

    Authors: Keshav Bhandari, Simon Colton

    Abstract: Modelling musical structure is vital yet challenging for artificial intelligence systems that generate symbolic music compositions. This literature review dissects the evolution of techniques for incorporating coherent structure, from symbolic approaches to foundational and transformative deep learning methods that harness the power of computation and data across a wide variety of training paradig… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: Accepted to 13th International Conference on Artificial Intelligence in Music, Sound, Art and Design (EvoMUSART) 2024