Skip to main content

Showing 1–50 of 71 results for author: Krishnan, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19916  [pdf, ps, other

    cs.IT

    An Achievability Bound for Type-Based Unsourced Multiple Access

    Authors: Deekshith Pathayappilly Krishnan, Kaan Okumus, Khac-Hoang Ngo, Giuseppe Durisi

    Abstract: We derive an achievability bound to quantify the performance of a type-based unsourced multiple access system -- an information-theoretic model for grant-free multiple access with correlated messages. The bound extends available achievability results for the per-user error probability in the unsourced multiple access framework, where, different from our setup, message collisions are treated as err… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

    Comments: 8 pages, 1 figure. Extended version of a paper accepted for presentation at ISIT 2025

  2. arXiv:2501.18908  [pdf, other

    cs.SE

    Streamlining Security Vulnerability Triage with Large Language Models

    Authors: Mohammad Jalili Torkamani, Joey NG, Nikita Mehrotra, Mahinthan Chandramohan, Padmanabhan Krishnan, Rahul Purandare

    Abstract: Bug triaging for security vulnerabilities is a critical part of software maintenance, ensuring that the most pressing vulnerabilities are addressed promptly to safeguard system integrity and user data. However, the process is resource-intensive and comes with challenges, including classifying software vulnerabilities, assessing their severity, and managing a high volume of bug reports. In this pap… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

    Comments: 16 pages, 22 figures, 6 tables, preprint

    ACM Class: D.2; K.6.3; I.2.7

  3. arXiv:2501.11505  [pdf, other

    cs.IT

    Sun-Jafar-Type Schemes for Weak Private Information Retrieval

    Authors: Chandan Anand, Jayesh Seshadri, Prasad Krishnan, Gowtham R. Kurri

    Abstract: In information-theoretic private information retrieval (PIR), a client wants to retrieve one desired file out of $M$ files, stored across $N$ servers, while keeping the index of the desired file private from each $T$-sized subset of servers. A PIR protocol must ideally maximize the rate, which is the ratio of the file size to the total quantum of the download from the servers, while ensuring such… ▽ More

    Submitted 20 January, 2025; originally announced January 2025.

  4. Unsupervised Replay Strategies for Continual Learning with Limited Data

    Authors: Anthony Bazhenov, Pahan Dewasurendra, Giri P. Krishnan, Jean Erik Delanois

    Abstract: Artificial neural networks (ANNs) show limited performance with scarce or imbalanced training data and face challenges with continuous learning, such as forgetting previously learned data after new tasks training. In contrast, the human brain can learn continuously and from just a few examples. This research explores the impact of 'sleep', an unsupervised phase incorporating stochastic activation… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Journal ref: 2024 International Joint Conference on Neural Networks (IJCNN)

  5. arXiv:2410.08427  [pdf

    cs.CR cs.SE

    Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds

    Authors: Jens Dietrich, Tim White, Behnaz Hassanshahi, Paddy Krishnan

    Abstract: In response to challenges in software supply chain security, several organisations have created infrastructures to independently build commodity open source projects and release the resulting binaries. Build platform variability can strengthen security as it facilitates the detection of compromised build environments. Furthermore, by improving the security posture of the build platform and collect… ▽ More

    Submitted 9 April, 2025; v1 submitted 10 October, 2024; originally announced October 2024.

    Comments: 20 pages, 1 figure, 10 tables

    ACM Class: D.2.13; D.3.4; F.3.2

  6. arXiv:2407.21783  [pdf, other

    cs.AI cs.CL cs.CV

    The Llama 3 Herd of Models

    Authors: Aaron Grattafiori, Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Abhishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Alex Vaughan, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava Spataru, Baptiste Roziere , et al. (536 additional authors not shown)

    Abstract: Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical… ▽ More

    Submitted 23 November, 2024; v1 submitted 31 July, 2024; originally announced July 2024.

  7. arXiv:2407.02732  [pdf, other

    cs.SE cs.IR

    Supporting Cross-language Cross-project Bug Localization Using Pre-trained Language Models

    Authors: Mahinthan Chandramohan, Dai Quoc Nguyen, Padmanabhan Krishnan, Jovan Jancic

    Abstract: Automatically locating a bug within a large codebase remains a significant challenge for developers. Existing techniques often struggle with generalizability and deployment due to their reliance on application-specific data and large model sizes. This paper proposes a novel pre-trained language model (PLM) based technique for bug localization that transcends project and language boundaries. Our ap… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  8. arXiv:2406.01062  [pdf, other

    cs.CV

    Layout Agnostic Scene Text Image Synthesis with Diffusion Models

    Authors: Qilong Zhangli, Jindong Jiang, Di Liu, Licheng Yu, Xiaoliang Dai, Ankit Ramchandani, Guan Pang, Dimitris N. Metaxas, Praveen Krishnan

    Abstract: While diffusion models have significantly advanced the quality of image generation their capability to accurately and coherently render text within these images remains a substantial challenge. Conventional diffusion-based methods for scene text generation are typically limited by their reliance on an intermediate layout output. This dependency often results in a constrained diversity of text styl… ▽ More

    Submitted 15 September, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024, pp. 7496-7506

    Journal ref: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2024, pp. 7496-7506

  9. arXiv:2405.07870  [pdf

    cs.SE

    Mapping the Invisible: A Framework for Tracking COVID-19 Spread Among College Students with Google Location Data

    Authors: Prajindra Sankar Krishnan, Chai Phing Chen, Gamal Alkawsi, Sieh Kiong Tiong, Luiz Fernando Capretz

    Abstract: The COVID-19 pandemic and the implementation of social distancing policies have rapidly changed people's visiting patterns, as reflected in mobility data that tracks mobility traffic using location trackers on cell phones. However, the frequency and duration of concurrent occupancy at specific locations govern the transmission rather than the number of customers visiting. Therefore, understanding… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 8 pages

    Journal ref: Latin American Workshop on Data Fusion (LAFUSION 2023), November/2023, pp 1-8, Rio de Janeiro, Brazil

  10. arXiv:2404.19552  [pdf, ps, other

    cs.IT

    Type-Based Unsourced Multiple Access

    Authors: Khac-Hoang Ngo, Deekshith Pathayappilly Krishnan, Kaan Okumus, Giuseppe Durisi, Erik G. Ström

    Abstract: We generalize the type-based multiple access framework proposed by Mergen and Tong (2006) to the case of unsourced multiple access. In the proposed framework, each device tracks the state of a physical/digital process, quantizes this state, and communicates it to a common receiver through a shared channel in an uncoordinated manner. The receiver aims to estimate the type of the states, i.e., the s… ▽ More

    Submitted 15 July, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: accepted to the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); simulation code available at: https://github.com/khachoang1412/TUMA

  11. arXiv:2404.11420  [pdf, other

    cs.ET cs.DC

    Quantum Cloud Computing: A Review, Open Problems, and Future Directions

    Authors: Hoa T. Nguyen, Prabhakar Krishnan, Dilip Krishnaswamy, Muhammad Usman, Rajkumar Buyya

    Abstract: Quantum cloud computing is an emerging paradigm of computing that empowers quantum applications and their deployment on quantum computing resources without the need for a specialized environment to host and operate physical quantum computers. This paper reviews recent advances, identifies open problems, and proposes future directions in quantum cloud computing. It discusses the state-of-the-art qu… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  12. arXiv:2401.16342  [pdf, other

    cs.IT

    On Achievable Rates for the Shotgun Sequencing Channel with Erasures

    Authors: Hrishi Narayanan, Prasad Krishnan, Nita Parekh

    Abstract: In shotgun sequencing, the input string (typically, a long DNA sequence composed of nucleotide bases) is sequenced as multiple overlapping fragments of much shorter lengths (called \textit{reads}). Modelling the shotgun sequencing pipeline as a communication channel for DNA data storage, the capacity of this channel was identified in a recent work, assuming that the reads themselves are noiseless… ▽ More

    Submitted 12 May, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Accepted for presentation at ISIT 2024

  13. arXiv:2401.15678  [pdf, other

    cs.IT

    Recursive Subproduct Codes with Reed-Muller-like Structure

    Authors: Aditya Siddheshwar, Lakshmi Prasad Natarajan, Prasad Krishnan

    Abstract: We study a family of subcodes of the $m$-dimensional product code $\mathscr{C}^{\otimes m}$ ('subproduct codes') that have a recursive Plotkin-like structure, and which include Reed-Muller (RM) codes and Dual Berman codes as special cases. We denote the codes in this family as $\mathscr{C}^{\otimes [r,m]}$, where $0 \leq r \leq m$ is the 'order' of the code. These codes allow a 'projection' operat… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  14. arXiv:2308.13173  [pdf, other

    cs.CV cs.CL

    DISGO: Automatic End-to-End Evaluation for Scene Text OCR

    Authors: Mei-Yuh Hwang, Yangyang Shi, Ankit Ramchandani, Guan Pang, Praveen Krishnan, Lucas Kabela, Frank Seide, Samyak Datta, Jun Liu

    Abstract: This paper discusses the challenges of optical character recognition (OCR) on natural scenes, which is harder than OCR on documents due to the wild content and various image backgrounds. We propose to uniformly use word error rates (WER) as a new measurement for evaluating scene-text OCR, both end-to-end (e2e) performance and individual system component performances. Particularly for the e2e metri… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 9 pages

  15. arXiv:2307.03981  [pdf

    cs.NI

    BER Analysis of Full Duplex Relay assisted BPSK-SIM based VLC System for Indoor Applications

    Authors: L Bhargava Kumar, Ramavath Prasad Naik, Datta Choudhari, Prabu Krishnan, Goutham Simha G D, Jagadeesh V K

    Abstract: This paper contemplates a relay-assisted visible light communication (VLC) system, where the light source (Table lamp) acts as a relay node and cooperates with the main light source. Following the IEEE 802.15.7r1 VLC reference channel model, we assume that there are two different light sources present in an office room. The first one is the source terminal present on the ceiling and another one is… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  16. arXiv:2305.14828  [pdf, other

    cs.CL cs.CV

    Towards Few-shot Entity Recognition in Document Images: A Graph Neural Network Approach Robust to Image Manipulation

    Authors: Prashant Krishnan, Zilong Wang, Yangkun Wang, Jingbo Shang

    Abstract: Recent advances of incorporating layout information, typically bounding box coordinates, into pre-trained language models have achieved significant performance in entity recognition from document images. Using coordinates can easily model the absolute position of each token, but they might be sensitive to manipulations in document images (e.g., shifting, rotation or scaling), especially when the t… ▽ More

    Submitted 23 February, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  17. arXiv:2305.05596  [pdf, ps, other

    cs.IT

    On the Structure of Higher Order MDS Codes

    Authors: Harshithanjani Athi, Rasagna Chigullapally, Prasad Krishnan, Lalitha Vadlamani

    Abstract: A code of length $n$ is said to be (combinatorially) $(ρ,L)$-list decodable if the Hamming ball of radius $ρn$ around any vector in the ambient space does not contain more than $L$ codewords. We study a recently introduced class of higher order MDS codes, which are closely related (via duality) to codes that achieve a generalized Singleton bound for list decodability. For some $\ell\geq 1$, higher… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: Accepted into IEEE International Symposium on Information Theory 2023

  18. arXiv:2305.04606  [pdf, ps, other

    cs.IT

    $t$-PIR Schemes with Flexible Parameters via Star Products of Berman Codes

    Authors: Srikar Kale, Keshav Agarwal, Prasad Krishnan

    Abstract: We present a new class of private information retrieval (PIR) schemes that keep the identity of the file requested private in the presence of at most $t$ colluding servers, based on the recent framework developed for such $t$-PIR schemes using star products of transitive codes. These $t$-PIR schemes employ the class of Berman codes as the storage-retrieval code pairs. Berman codes, which are binar… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

    Comments: Accepted at IEEE International Symposium for Information Technology (ISIT), 2023

  19. arXiv:2302.03452  [pdf, other

    cs.IT

    Cache-Aided Communication Schemes via Combinatorial Designs and their $q$-analogs

    Authors: Shailja Agrawal, K V Sushena Sree, Prasad Krishnan, Abhinav Vaishya, Srikar Kale

    Abstract: We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called cache) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2001.05438, arXiv:1901.06383

  20. arXiv:2208.10389  [pdf, other

    cs.IT math.CO

    Bounding the Optimal Length of Pliable Index Coding via a Hypergraph-based Approach

    Authors: Tulasi Sowjanya B., Visvesh Subramanian, Prasad Krishnan

    Abstract: In pliable index coding (PICOD), a number of clients are connected via a noise-free broadcast channel to a server which has a list of messages. Each client has a unique subset of messages at the server as side-information and requests for any one message not in the side-information. A PICOD scheme of length $\ell$ is a set of $\ell$ encoded transmissions broadcast from the server such that all cli… ▽ More

    Submitted 26 December, 2022; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: Accepted at the IEEE Information Theory Workshop, 2022

  21. arXiv:2205.06257  [pdf, ps, other

    cs.IT cs.DC

    Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage

    Authors: Abhinav Vaishya, Athreya Chandramouli, Srikar Kale, Prasad Krishnan

    Abstract: We consider replication-based distributed storage systems in which each node stores the same quantum of data and each data bit stored has the same replication factor across the nodes. Such systems are referred to as balanced distributed databases. When existing nodes leave or new nodes are added to this system, the balanced nature of the database is lost, either due to the reduction in the replica… ▽ More

    Submitted 12 December, 2024; v1 submitted 12 May, 2022; originally announced May 2022.

    Comments: 37 pages, updated previous version with new results

  22. arXiv:2205.03259  [pdf

    cs.CY cs.CR

    Decentralized Digital Currency System using Merkle Hash Trees

    Authors: Shreekanth M Prabhu, Natarajan Subramanyam, Ms. Shreya P Krishnan, Ms. Brindavana Sachidananda

    Abstract: In India, post the demonetization exercise in 2016, digital payments have become extremely popular. Among them, the volume of transactions using Paytm wallets and UPI (Unified Payment Interface) have grown manifold. The lockdowns due to COVID-19 Pandemic have furthered this trend. Side by side, crypto-currencies such as bitcoin are also gaining traction. Many countries are considering issuing a Di… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: 37 pages, 9 Figures, 8 Tables, submitted to Journal of Banking and Financial Technology

  23. arXiv:2202.09981  [pdf, other

    cs.IT

    Berman Codes: A Generalization of Reed-Muller Codes that Achieve BEC Capacity

    Authors: Lakshmi Prasad Natarajan, Prasad Krishnan

    Abstract: We identify a family of binary codes whose structure is similar to Reed-Muller (RM) codes and which include RM codes as a strict subclass. The codes in this family are denoted as $C_n(r,m)$, and their duals are denoted as $B_n(r,m)$. The length of these codes is $n^m$, where $n \geq 2$, and $r$ is their `order'. When $n=2$, $C_n(r,m)$ is the RM code of order $r$ and length $2^m$. The special case… ▽ More

    Submitted 25 July, 2023; v1 submitted 20 February, 2022; originally announced February 2022.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory

  24. arXiv:2202.04161  [pdf, other

    cs.CL cs.AI

    Logical Reasoning for Task Oriented Dialogue Systems

    Authors: Sajjad Beygi, Maryam Fazel-Zarandi, Alessandra Cervone, Prakash Krishnan, Siddhartha Reddy Jonnalagadda

    Abstract: In recent years, large pretrained models have been used in dialogue systems to improve successful task completion rates. However, lack of reasoning capabilities of dialogue platforms make it difficult to provide relevant and fluent responses, unless the designers of a conversational experience spend a considerable amount of time implementing these capabilities in external rule based modules. In th… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  25. arXiv:2106.14516  [pdf, other

    cs.CV

    A Diffeomorphic Aging Model for Adult Human Brain from Cross-Sectional Data

    Authors: Alphin J Thottupattu, Jayanthi Sivaswamy, Venkateswaran P. Krishnan

    Abstract: Normative aging trends of the brain can serve as an important reference in the assessment of neurological structural disorders. Such models are typically developed from longitudinal brain image data -- follow-up data of the same subject over different time points. In practice, obtaining such longitudinal data is difficult. We propose a method to develop an aging model for a given population, in th… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

  26. arXiv:2106.10997  [pdf, other

    eess.AS cs.SD

    Towards sound based testing of COVID-19 -- Summary of the first Diagnostics of COVID-19 using Acoustics (DiCOVA) Challenge

    Authors: Neeraj Kumar Sharma, Ananya Muguli, Prashant Krishnan, Rohit Kumar, Srikanth Raj Chetupalli, Sriram Ganapathy

    Abstract: The technology development for point-of-care tests (POCTs) targeting respiratory diseases has witnessed a growing demand in the recent past. Investigating the presence of acoustic biomarkers in modalities such as cough, breathing and speech sounds, and using them for building POCTs can offer fast, contactless and inexpensive testing. In view of this, over the past year, we launched the ``Coswara''… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Comments: Manuscript in review in the Elsevier Computer Speech and Language journal

  27. arXiv:2106.08385  [pdf, other

    cs.CV

    TextStyleBrush: Transfer of Text Aesthetics from a Single Example

    Authors: Praveen Krishnan, Rama Kovvuri, Guan Pang, Boris Vassilev, Tal Hassner

    Abstract: We present a novel approach for disentangling the content of a text image from all aspects of its appearance. The appearance representation we derive can then be applied to new content, for one-shot transfer of the source style to new content. We learn this disentanglement in a self-supervised manner. Our method processes entire word boxes, without requiring segmentation of text from background, p… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: 18 pages, 13 figures

  28. arXiv:2106.00639  [pdf, other

    eess.AS cs.SD eess.SP

    Multi-modal Point-of-Care Diagnostics for COVID-19 Based On Acoustics and Symptoms

    Authors: Srikanth Raj Chetupalli, Prashant Krishnan, Neeraj Sharma, Ananya Muguli, Rohit Kumar, Viral Nanda, Lancelot Mark Pinto, Prasanta Kumar Ghosh, Sriram Ganapathy

    Abstract: The research direction of identifying acoustic bio-markers of respiratory diseases has received renewed interest following the onset of COVID-19 pandemic. In this paper, we design an approach to COVID-19 diagnostic using crowd-sourced multi-modal data. The data resource, consisting of acoustic signals like cough, breathing, and speech signals, along with the data of symptoms, are recorded using a… ▽ More

    Submitted 5 June, 2021; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: The Manuscript is submitted to IEEE-EMBS Journal of Biomedical and Health Informatics on June 1, 2021

  29. arXiv:2104.09088  [pdf, other

    cs.CL cs.LG

    Alexa Conversations: An Extensible Data-driven Approach for Building Task-oriented Dialogue Systems

    Authors: Anish Acharya, Suranjit Adhikari, Sanchit Agarwal, Vincent Auvray, Nehal Belgamwar, Arijit Biswas, Shubhra Chandra, Tagyoung Chung, Maryam Fazel-Zarandi, Raefer Gabriel, Shuyang Gao, Rahul Goel, Dilek Hakkani-Tur, Jan Jezabek, Abhay Jha, Jiun-Yu Kao, Prakash Krishnan, Peter Ku, Anuj Goyal, Chien-Wei Lin, Qing Liu, Arindam Mandal, Angeliki Metallinou, Vishal Naik, Yi Pan , et al. (6 additional authors not shown)

    Abstract: Traditional goal-oriented dialogue systems rely on various components such as natural language understanding, dialogue state tracking, policy learning and response generation. Training each component requires annotations which are hard to obtain for every new domain, limiting scalability of such systems. Similarly, rule-based dialogue systems require extensive writing and maintenance of rules and… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

    Journal ref: NAACL 2021 System Demonstrations Track

  30. arXiv:2104.04132  [pdf, other

    q-bio.NC cs.AI cs.LG

    Replay in Deep Learning: Current Approaches and Missing Biological Elements

    Authors: Tyler L. Hayes, Giri P. Krishnan, Maxim Bazhenov, Hava T. Siegelmann, Terrence J. Sejnowski, Christopher Kanan

    Abstract: Replay is the reactivation of one or more neural patterns, which are similar to the activation patterns experienced during past waking experiences. Replay was first observed in biological neural networks during sleep, and it is now thought to play a critical role in memory formation, retrieval, and consolidation. Replay-like mechanisms have been incorporated into deep artificial neural networks th… ▽ More

    Submitted 28 May, 2021; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: Accepted for publication in the MIT Press journal of Neural Computation

  31. arXiv:2103.15992  [pdf, other

    cs.CV

    A Multiplexed Network for End-to-End, Multilingual OCR

    Authors: Jing Huang, Guan Pang, Rama Kovvuri, Mandy Toh, Kevin J Liang, Praveen Krishnan, Xi Yin, Tal Hassner

    Abstract: Recent advances in OCR have shown that an end-to-end (E2E) training pipeline that includes both detection and recognition leads to the best results. However, many existing methods focus primarily on Latin-alphabet languages, often even only case-insensitive English characters. In this paper, we propose an E2E approach, Multiplexed Multilingual Mask TextSpotter, that performs script identification… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  32. arXiv:2103.09148  [pdf, other

    eess.AS cs.SD

    DiCOVA Challenge: Dataset, task, and baseline system for COVID-19 diagnosis using acoustics

    Authors: Ananya Muguli, Lancelot Pinto, Nirmala R., Neeraj Sharma, Prashant Krishnan, Prasanta Kumar Ghosh, Rohit Kumar, Shrirama Bhat, Srikanth Raj Chetupalli, Sriram Ganapathy, Shreyas Ramoji, Viral Nanda

    Abstract: The DiCOVA challenge aims at accelerating research in diagnosing COVID-19 using acoustics (DiCOVA), a topic at the intersection of speech and audio processing, respiratory health diagnosis, and machine learning. This challenge is an open call for researchers to analyze a dataset of sound recordings collected from COVID-19 infected and non-COVID-19 individuals for a two-class classification. These… ▽ More

    Submitted 17 June, 2021; v1 submitted 16 March, 2021; originally announced March 2021.

    Comments: To appear in Proceedings of Interspeech, 2021

  33. arXiv:2102.02182  [pdf, other

    cs.IT cs.DM math.CO

    Pliable Index Coding via Conflict-Free Colorings of Hypergraphs

    Authors: Prasad Krishnan, Rogers Mathew, Subrahmanyam Kalyanasundaram

    Abstract: In the pliable index coding (PICOD) problem, a server is to serve multiple clients, each of which possesses a unique subset of the complete message set as side information and requests a new message which it does not have. The goal of the server is to do this using as few transmissions as possible. This work presents a hypergraph coloring approach to the scalar PICOD problem. A \textit{conflict-fr… ▽ More

    Submitted 26 December, 2022; v1 submitted 3 February, 2021; originally announced February 2021.

    Comments: A shorter version has appeared in IEEE International Symposium on Information Theory, 2021

  34. arXiv:2011.14298  [pdf, other

    cs.CV

    A method for large diffeomorphic registration via broken geodesics

    Authors: Alphin J. Thottupattu, Jayanthi Sivaswamy, Venkateswaran P. Krishnan

    Abstract: Anatomical variabilities seen in longitudinal data or inter-subject data is usually described by the underlying deformation, captured by non-rigid registration of these images. Stationary Velocity Field (SVF) based non-rigid registration algorithms are widely used for registration. SVF based methods form a metric-free framework which captures a finite dimensional submanifold of deformations embedd… ▽ More

    Submitted 3 January, 2021; v1 submitted 29 November, 2020; originally announced November 2020.

    Comments: 18 pages and 9 figures

  35. arXiv:2010.14411  [pdf, other

    cs.CV

    Improving Word Recognition using Multiple Hypotheses and Deep Embeddings

    Authors: Siddhant Bansal, Praveen Krishnan, C. V. Jawahar

    Abstract: We propose a novel scheme for improving the word recognition accuracy using word image embeddings. We use a trained text recognizer, which can predict multiple text hypothesis for a given word image. Our fusion scheme improves the recognition process by utilizing the word image and text embeddings obtained from a trained word image embedding network. We propose EmbedNet, which is trained using a t… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 8 pages, 6 figures, Accepted in International Conference on Pattern Recognition (ICPR) 2020

  36. arXiv:2010.11935  [pdf, other

    cs.DC cs.IT

    Coded Data Rebalancing for Decentralized Distributed Databases

    Authors: K V Sushena Sree, Prasad Krishnan

    Abstract: The performance of replication-based distributed databases is affected due to non-uniform storage across storage nodes (also called \textit{data skew}) and reduction in the replication factor during operation, particularly due to node additions or removals. Data rebalancing refers to the communication involved between the nodes in correcting this data skew, while maintaining the replication factor… ▽ More

    Submitted 12 November, 2020; v1 submitted 22 October, 2020; originally announced October 2020.

    Comments: 10 pages

  37. arXiv:2010.10464  [pdf, other

    cs.IT

    Blind Updates in Coded Caching

    Authors: Suman Ghosh, Prasad Krishnan, Lakshmi Prasad Natarajan

    Abstract: We consider the centralized coded caching system where a library of files is available at the server and their subfiles are cached at the clients as prescribed by a placement delivery array (PDA). We are interested in the problem where a specific file in the library is replaced with a new file at the server, the contents of which are correlated with the file being replaced, and this change needs t… ▽ More

    Submitted 15 May, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: Shorter version was accepted and presented in ITW 2020, Riva del Garda, Italy. Changes with respect to arXiv:2010.10464v1 -- improved presentation and corrected minor errors. Keywords: blind update, broadcast channel, coded caching, communication cost, placement delivery array

  38. An Umbrella Converse for Data Exchange: Applied to Caching, Computing, and Shuffling

    Authors: Prasad Krishnan, Lakshmi Natarajan, V. Lalitha

    Abstract: The problem of data exchange between multiple nodes with storage and communication capabilities models several current multi-user communication problems like Coded Caching, Data Shuffling, Coded Computing, etc. The goal in such problems is to design communication schemes which accomplish the desired data exchange between the nodes with the optimal (minimum) amount of communication load. In this wo… ▽ More

    Submitted 8 June, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: 32 pages, refined some sections over previous version (shorter version appeared in ITW 2020)

  39. arXiv:2009.10801  [pdf, ps, other

    cs.SE

    DeepIaC: Deep Learning-Based Linguistic Anti-pattern Detection in IaC

    Authors: Nemania Borovits, Indika Kumara, Parvathy Krishnan, Stefano Dalla Palma, Dario Di Nucci, Fabio Palomba, Damian A. Tamburri, Willem-Jan van den Heuvel

    Abstract: Linguistic anti-patterns are recurring poor practices concerning inconsistencies among the naming, documentation, and implementation of an entity. They impede readability, understandability, and maintainability of source code. This paper attempts to detect linguistic anti-patterns in infrastructure as code (IaC) scripts used to provision and manage computing environments. In particular, we conside… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

    Comments: 6 pages

  40. arXiv:2008.04527  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    Neural PLDA Modeling for End-to-End Speaker Verification

    Authors: Shreyas Ramoji, Prashant Krishnan, Sriram Ganapathy

    Abstract: While deep learning models have made significant advances in supervised classification problems, the application of these models for out-of-set verification tasks like speaker recognition has been limited to deriving feature embeddings. The state-of-the-art x-vector PLDA based speaker verification systems use a generative model based on probabilistic linear discriminant analysis (PLDA) for computi… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: Accepted in Interspeech 2020. GitHub Implementation Repos: https://github.com/iiscleap/E2E-NPLDA and https://github.com/iiscleap/NeuralPlda

  41. arXiv:2007.14319  [pdf, other

    cs.CR

    Coding Practices and Recommendations of Spring Security for Enterprise Applications

    Authors: Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng, Yao

    Abstract: Spring security is tremendously popular among practitioners for its ease of use to secure enterprise applications. In this paper, we study the application framework misconfiguration vulnerabilities in the light of Spring security, which is relatively understudied in the existing literature. Towards that goal, we identify 6 types of security anti-patterns and 4 insecure vulnerable defaults by condu… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Journal ref: IEEE Secure Development Conference. Atlanta, GA, September 2020

  42. arXiv:2007.06021  [pdf, other

    eess.AS cs.LG

    NISP: A Multi-lingual Multi-accent Dataset for Speaker Profiling

    Authors: Shareef Babu Kalluri, Deepu Vijayasenan, Sriram Ganapathy, Ragesh Rajan M, Prashant Krishnan

    Abstract: Many commercial and forensic applications of speech demand the extraction of information about the speaker characteristics, which falls into the broad category of speaker profiling. The speaker characteristics needed for profiling include physical traits of the speaker like height, age, and gender of the speaker along with the native language of the speaker. Many of the datasets available have onl… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 5pages, Initial version submitted to Interspeech2020

  43. Fused Text Recogniser and Deep Embeddings Improve Word Recognition and Retrieval

    Authors: Siddhant Bansal, Praveen Krishnan, C. V. Jawahar

    Abstract: Recognition and retrieval of textual content from the large document collections have been a powerful use case for the document image analysis community. Often the word is the basic unit for recognition as well as retrieval. Systems that rely only on the text recogniser (OCR) output are not robust enough in many situations, especially when the word recognition rates are poor, as in the case of his… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

    Comments: 15 pages, 8 figures, Accepted in IAPR International Workshop on Document Analysis Systems (DAS) 2020, "Visit project page, at http://cvit.iiit.ac.in/research/projects/cvit-projects/fused-text-recogniser-and-deep-embeddings-improve-word-recognition-and-retrieval"

  44. Coswara -- A Database of Breathing, Cough, and Voice Sounds for COVID-19 Diagnosis

    Authors: Neeraj Sharma, Prashant Krishnan, Rohit Kumar, Shreyas Ramoji, Srikanth Raj Chetupalli, Nirmala R., Prasanta Kumar Ghosh, Sriram Ganapathy

    Abstract: The COVID-19 pandemic presents global challenges transcending boundaries of country, race, religion, and economy. The current gold standard method for COVID-19 detection is the reverse transcription polymerase chain reaction (RT-PCR) testing. However, this method is expensive, time-consuming, and violates social distancing. Also, as the pandemic is expected to stay for a while, there is a need for… ▽ More

    Submitted 11 August, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: A description of Coswara dataset to evaluate COVID-19 diagnosis using respiratory sounds

  45. arXiv:2004.06292  [pdf, other

    cs.SE cs.CR

    Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications

    Authors: Behnaz Hassanshahi, Hyunjun Lee, Paddy Krishnan, Jörn Güy Suß

    Abstract: Even though a lot of effort has been invested in analyzing client-side web applications during the past decade, the existing tools often fail to deal with the complexity of modern JavaScript applications. However, from an attacker point of view, the client side of such web applications can reveal invaluable information about the server side. In this paper, first we study the existing tools and enu… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Comments: 15 pages, 2 figures, 5 algorithms, 5 listings, 7 tables

  46. arXiv:2002.03562  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    NPLDA: A Deep Neural PLDA Model for Speaker Verification

    Authors: Shreyas Ramoji, Prashant Krishnan, Sriram Ganapathy

    Abstract: The state-of-art approach for speaker verification consists of a neural network based embedding extractor along with a backend generative model such as the Probabilistic Linear Discriminant Analysis (PLDA). In this work, we propose a neural network approach for backend modeling in speaker recognition. The likelihood ratio score of the generative PLDA model is posed as a discriminative similarity f… ▽ More

    Submitted 24 May, 2020; v1 submitted 10 February, 2020; originally announced February 2020.

    Comments: Published in Odyssey 2020, the Speaker and Language Recognition Workshop (VOiCES Special Session). Link to GitHub Implementation: https://github.com/iiscleap/NeuralPlda. arXiv admin note: substantial text overlap with arXiv:2001.07034

    Journal ref: in Proc. Odyssey 2020 The Speaker and Language Recognition Workshop, Pages 202-209

  47. arXiv:2002.02735  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    LEAP System for SRE19 CTS Challenge -- Improvements and Error Analysis

    Authors: Shreyas Ramoji, Prashant Krishnan, Bhargavram Mysore, Prachi Singh, Sriram Ganapathy

    Abstract: The NIST Speaker Recognition Evaluation - Conversational Telephone Speech (CTS) challenge 2019 was an open evaluation for the task of speaker verification in challenging conditions. In this paper, we provide a detailed account of the LEAP SRE system submitted to the CTS challenge focusing on the novel components in the back-end system modeling. All the systems used the time-delay neural network (T… ▽ More

    Submitted 24 May, 2020; v1 submitted 7 February, 2020; originally announced February 2020.

    Comments: Published In Proc. Odyssey 2020, the Speaker and Language Recognition Workshop. Link to GitHub Implementation: https://github.com/iiscleap/NeuralPlda

    Journal ref: in Proc. Odyssey 2020 The Speaker and Language Recognition Workshop, 281--288

  48. arXiv:2001.07034  [pdf, other

    eess.AS cs.LG cs.SD eess.SP

    Pairwise Discriminative Neural PLDA for Speaker Verification

    Authors: Shreyas Ramoji, Prashant Krishnan V, Prachi Singh, Sriram Ganapathy

    Abstract: The state-of-art approach to speaker verification involves the extraction of discriminative embeddings like x-vectors followed by a generative model back-end using a probabilistic linear discriminant analysis (PLDA). In this paper, we propose a Pairwise neural discriminative model for the task of speaker verification which operates on a pair of speaker embeddings such as x-vectors/i-vectors and ou… ▽ More

    Submitted 7 February, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

    Comments: This paper was submitted to IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2020. Link to GitHub Repository: https://github.com/iiscleap/NeuralPlda

  49. arXiv:2001.05438  [pdf, other

    cs.IT

    Low Complexity Distributed Computing via Binary Matrices with Extension to Stragglers

    Authors: Shailja Agrawal, Prasad Krishnan

    Abstract: We consider the distributed computing framework of MapReduce, which consists of three phases, the Map phase, the Shuffle phase and the Reduce phase. For this framework, we propose the use of binary matrices (with $0,1$ entries) called \textit{computing matrices} to describe the map phase and the shuffle phase. Similar binary matrices were recently proposed for the coded caching framework. The stru… ▽ More

    Submitted 30 January, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

    Comments: 8 pages, Submitted to ISIT 2020

  50. arXiv:2001.04939  [pdf, other

    cs.IT

    Coded Data Rebalancing: Fundamental Limits and Constructions

    Authors: Prasad Krishnan, V. Lalitha, Lakshmi Natarajan

    Abstract: Distributed databases often suffer unequal distribution of data among storage nodes, which is known as `data skew'. Data skew arises from a number of causes such as removal of existing storage nodes and addition of new empty nodes to the database. Data skew leads to performance degradations and \textcolor{black}{thus} necessitates `rebalancing' at regular intervals to reduce the amount of skew. We… ▽ More

    Submitted 13 July, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: 12 pages, 4 figures, To appear in Proceedings of the IEEE ISIT 2020. A video presentation of this paper is available at https://www.youtube.com/watch?v=a2fVfKiXnOY