Skip to main content

Showing 1–13 of 13 results for author: Kothari, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.01884  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Adversarial Robustness of Deep Learning Models for Inland Water Body Segmentation from SAR Images

    Authors: Siddharth Kothari, Srinivasan Murali, Sankalp Kothari, Ujjwal Verma, Jaya Sreevalsan-Nair

    Abstract: Inland water body segmentation from Synthetic Aperture Radar (SAR) images is an important task needed for several applications, such as flood mapping. While SAR sensors capture data in all-weather conditions as high-resolution images, differentiating water and water-like surfaces from SAR images is not straightforward. Inland water bodies, such as large river basins, have complex geometry, which a… ▽ More

    Submitted 6 May, 2025; v1 submitted 3 May, 2025; originally announced May 2025.

    Comments: 21 pages, 15 figures, 2 tables

  2. arXiv:2502.06336  [pdf, other

    cs.CV cs.AI

    DefTransNet: A Transformer-based Method for Non-Rigid Point Cloud Registration in the Simulation of Soft Tissue Deformation

    Authors: Sara Monji-Azad, Marvin Kinz, Siddharth Kothari, Robin Khanna, Amrei Carla Mihan, David Maennel, Claudia Scherl, Juergen Hesser

    Abstract: Soft-tissue surgeries, such as tumor resections, are complicated by tissue deformations that can obscure the accurate location and shape of tissues. By representing tissue surfaces as point clouds and applying non-rigid point cloud registration (PCR) methods, surgeons can better understand tissue deformations before, during, and after surgery. Existing non-rigid PCR methods, such as feature-based… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

  3. arXiv:2501.13687  [pdf, other

    cs.CL cs.AI

    Question Answering on Patient Medical Records with Private Fine-Tuned LLMs

    Authors: Sara Kothari, Ayush Gupta

    Abstract: Healthcare systems continuously generate vast amounts of electronic health records (EHRs), commonly stored in the Fast Healthcare Interoperability Resources (FHIR) standard. Despite the wealth of information in these records, their complexity and volume make it difficult for users to retrieve and interpret crucial health insights. Recent advances in Large Language Models (LLMs) offer a solution, e… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  4. arXiv:2304.00944  [pdf, other

    cs.CR cs.CY

    Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA)

    Authors: Nikita Samarin, Shayna Kothari, Zaina Siyed, Oscar Bjorkman, Reena Yuan, Primal Wijesekera, Noura Alomar, Jordan Fischer, Chris Hoofnagle, Serge Egelman

    Abstract: The California Consumer Privacy Act (CCPA) provides California residents with a range of enhanced privacy protections and rights. Our research investigated the extent to which Android app developers comply with the provisions of the CCPA that require them to provide consumers with accurate privacy notices and respond to "verifiable consumer requests" (VCRs) by disclosing personal information that… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Appears in Issue 3 of 23rd Privacy Enhancing Technologies Symposium (PETS 23)

  5. arXiv:2210.00731  [pdf, other

    q-fin.CP cs.LG

    Sentiment Analysis of ESG disclosures on Stock Market

    Authors: Sudeep R. Bapat, Saumya Kothari, Rushil Bansal

    Abstract: In this paper, we look at the impact of Environment, Social and Governance related news articles and social media data on the stock market performance. We pick four stocks of companies which are widely known in their domain to understand the complete effect of ESG as the newly opted investment style remains restricted to only the stocks with widespread information. We summarise live data of both t… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

  6. arXiv:2205.01947  [pdf, other

    cs.CV cs.HC cs.RO

    EllSeg-Gen, towards Domain Generalization for head-mounted eyetracking

    Authors: Rakshit S. Kothari, Reynold J. Bailey, Christopher Kanan, Jeff B. Pelz, Gabriel J. Diaz

    Abstract: The study of human gaze behavior in natural contexts requires algorithms for gaze estimation that are robust to a wide range of imaging conditions. However, algorithms often fail to identify features such as the iris and pupil centroid in the presence of reflective artifacts and occlusions. Previous work has shown that convolutional networks excel at extracting gaze features despite the presence o… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: Code available at https://bitbucket.org/RSKothari/multiset_gaze/

  7. EllSeg: An Ellipse Segmentation Framework for Robust Gaze Tracking

    Authors: Rakshit S. Kothari, Aayush K. Chaudhary, Reynold J. Bailey, Jeff B. Pelz, Gabriel J. Diaz

    Abstract: Ellipse fitting, an essential component in pupil or iris tracking based video oculography, is performed on previously segmented eye parts generated using various computer vision techniques. Several factors, such as occlusions due to eyelid shape, camera position or eyelashes, frequently break ellipse fitting algorithms that rely on well-defined pupil or iris edge segments. In this work, we propose… ▽ More

    Submitted 4 May, 2022; v1 submitted 19 July, 2020; originally announced July 2020.

    Comments: Code available at https://bitbucket.org/RSKothari/ellseg/src/master/

  8. arXiv:2003.07347  [pdf, other

    stat.AP cs.AI

    Building a COVID-19 Vulnerability Index

    Authors: Dave DeCaprio, Joseph Gartner, Thadeus Burgess, Kristian Garcia, Sarthak Kothari, Shaayan Sayed, Carol J. McCall

    Abstract: COVID-19 is an acute respiratory disease that has been classified as a pandemic by the World Health Organization. Characterization of this disease is still in its early stages. However, it is known to have high mortality rates, particularly among individuals with preexisting medical conditions. Creating models to identify individuals who are at the greatest risk for severe complications due to COV… ▽ More

    Submitted 18 July, 2020; v1 submitted 16 March, 2020; originally announced March 2020.

    MSC Class: 68T05 ACM Class: J.3; I.5.4; I.2.1

  9. arXiv:1907.07818  [pdf, other

    cs.IR cs.CL

    Decoding the Style and Bias of Song Lyrics

    Authors: Manash Pratim Barman, Amit Awekar, Sambhav Kothari

    Abstract: The central idea of this paper is to gain a deeper understanding of song lyrics computationally. We focus on two aspects: style and biases of song lyrics. All prior works to understand these two aspects are limited to manual analysis of a small corpus of song lyrics. In contrast, we analyzed more than half a million songs spread over five decades. We characterize the lyrics style in terms of vocab… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: Accepted for ACM SIGIR 2019

  10. Utilizing Provenance in Reusable Research Objects

    Authors: Zhihao Yuan, Dai Hai Ton That, Siddhant Kothari, Gabriel Fils, Tanu Malik

    Abstract: Science is conducted collaboratively, often requiring the sharing of knowledge about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation… ▽ More

    Submitted 17 June, 2018; originally announced June 2018.

    Comments: 25 pages

    Journal ref: Informatics 2018, 5(1), 14

  11. arXiv:1504.01693  [pdf, other

    cs.CR cs.HC

    Security Toolbox for Detecting Novel and Sophisticated Android Malware

    Authors: Benjamin Holland, Tom Deering, Suresh Kothari, Jon Mathews, Nikhil Ranade

    Abstract: This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project. The adversarial challenge ("Red") teams in the DARPA APAC program are tasked with designing sophisticated malware to test the bounds of malware detection technology… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    Comments: 4 pages, 1 listing, 2 figures

  12. arXiv:1404.1279  [pdf, other

    cs.SE

    Event-Flow Graphs for Efficient Path-Sensitive Analyses

    Authors: Ahmed Tamrawi, Suresh Kothari

    Abstract: Efficient and accurate path-sensitive analyses pose the challenges of: (a) analyzing an exponentially-increasing number of paths in a control-flow graph (CFG), and (b) checking feasibility of paths in a CFG. We address these challenges by introducing an equivalence relation on the CFG paths to partition them into equivalence classes. It is then sufficient to perform analysis on these equivalence c… ▽ More

    Submitted 8 March, 2015; v1 submitted 4 April, 2014; originally announced April 2014.

    Comments: Technical Report

  13. A Machine Checked Model of Idempotent MGU Axioms For Lists of Equational Constraints

    Authors: Sunil Kothari, James Caldwell

    Abstract: We present formalized proofs verifying that the first-order unification algorithm defined over lists of satisfiable constraints generates a most general unifier (MGU), which also happens to be idempotent. All of our proofs have been formalized in the Coq theorem prover. Our proofs show that finite maps produced by the unification algorithm provide a model of the axioms characterizing idempotent M… ▽ More

    Submitted 22 December, 2010; originally announced December 2010.

    Comments: In Proceedings UNIF 2010, arXiv:1012.4554

    Journal ref: EPTCS 42, 2010, pp. 24-38