Skip to main content

Showing 1–30 of 30 results for author: Kumar, U

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.07110  [pdf, other

    cs.IR cs.LG

    DashCLIP: Leveraging multimodal models for generating semantic embeddings for DoorDash

    Authors: Omkar Gurjar, Kin Sum Liu, Praveen Kolli, Utsaw Kumar, Mandar Rahurkar

    Abstract: Despite the success of vision-language models in various generative tasks, obtaining high-quality semantic representations for products and user intents is still challenging due to the inability of off-the-shelf models to capture nuanced relationships between the entities. In this paper, we introduce a joint training framework for product and user queries by aligning uni-modal and multi-modal enco… ▽ More

    Submitted 18 March, 2025; originally announced April 2025.

  2. arXiv:2501.07957  [pdf, other

    cs.RO cs.AI cs.CV cs.HC cs.LG

    AI Guide Dog: Egocentric Path Prediction on Smartphone

    Authors: Aishwarya Jadhav, Jeffery Cao, Abhishree Shetty, Urvashi Priyam Kumar, Aditi Sharma, Ben Sukboontip, Jayant Sravan Tamarapalli, Jingyi Zhang, Anirudh Koul

    Abstract: This paper presents AI Guide Dog (AIGD), a lightweight egocentric (first-person) navigation system for visually impaired users, designed for real-time deployment on smartphones. AIGD employs a vision-only multi-label classification approach to predict directional commands, ensuring safe navigation across diverse environments. We introduce a novel technique for goal-based outdoor navigation by inte… ▽ More

    Submitted 16 February, 2025; v1 submitted 14 January, 2025; originally announced January 2025.

    Comments: Accepted at the AAAI 2025 Spring Symposium on Human-Compatible AI for Well-being: Harnessing Potential of GenAI for AI-Powered Science

  3. arXiv:2411.13251  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    BelHouse3D: A Benchmark Dataset for Assessing Occlusion Robustness in 3D Point Cloud Semantic Segmentation

    Authors: Umamaheswaran Raman Kumar, Abdur Razzaq Fayjie, Jurgen Hannaert, Patrick Vandewalle

    Abstract: Large-scale 2D datasets have been instrumental in advancing machine learning; however, progress in 3D vision tasks has been relatively slow. This disparity is largely due to the limited availability of 3D benchmarking datasets. In particular, creating real-world point cloud datasets for indoor scene semantic segmentation presents considerable challenges, including data collection within confined s… ▽ More

    Submitted 20 November, 2024; originally announced November 2024.

    Comments: 20 pages, 6 figures, 3 tables, accepted at ECCV 2024 Workshops

  4. arXiv:2410.16161  [pdf, ps, other

    cs.CR cs.LG

    DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning Based on Constant-Overhead Linear Secret Resharing

    Authors: Alexander Bienstock, Ujjwal Kumar, Antigoni Polychroniadou

    Abstract: Federated Learning (FL) solutions with central Differential Privacy (DP) have seen large improvements in their utility in recent years arising from the matrix mechanism, while FL solutions with distributed (more private) DP have lagged behind. In this work, we introduce the distributed matrix mechanism to achieve the best-of-both-worlds; better privacy of distributed DP and better utility from the… ▽ More

    Submitted 16 June, 2025; v1 submitted 21 October, 2024; originally announced October 2024.

    Comments: International Conference on Machine Learning (ICML), 2025

  5. arXiv:2409.17806  [pdf, other

    cs.LG

    Continual learning with task specialist

    Authors: Indu Solomon, Aye Phyu Phyu Aung, Uttam Kumar, Senthilnath Jayavelu

    Abstract: Continual learning (CL) adapt the deep learning scenarios with timely updated datasets. However, existing CL models suffer from the catastrophic forgetting issue, where new knowledge replaces past learning. In this paper, we propose Continual Learning with Task Specialists (CLTS) to address the issues of catastrophic forgetting and limited labelled data in real-world datasets by performing class i… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

  6. Spatiotemporal Forecasting of Traffic Flow using Wavelet-based Temporal Attention

    Authors: Yash Jakhmola, Madhurima Panja, Nitish Kumar Mishra, Kripabandhu Ghosh, Uttam Kumar, Tanujit Chakraborty

    Abstract: Spatiotemporal forecasting of traffic flow data represents a typical problem in the field of machine learning, impacting urban traffic management systems. In general, spatiotemporal forecasting problems involve complex interactions, nonlinearities, and long-range dependencies due to the interwoven nature of the temporal and spatial dimensions. Due to this, traditional statistical and machine learn… ▽ More

    Submitted 21 September, 2024; v1 submitted 5 July, 2024; originally announced July 2024.

    Journal ref: IEEE Access, 2024, Volume: 12

  7. arXiv:2406.19538  [pdf, other

    cs.CL

    Context Matters: An Empirical Study of the Impact of Contextual Information in Temporal Question Answering Systems

    Authors: Dan Schumacher, Fatemeh Haji, Tara Grey, Niharika Bandlamudi, Nupoor Karnik, Gagana Uday Kumar, Jason Cho-Yu Chiang, Paul Rad, Nishant Vishwamitra, Anthony Rios

    Abstract: Large language models (LLMs) often struggle with temporal reasoning, crucial for tasks like historical event analysis and time-sensitive information retrieval. Despite advancements, state-of-the-art models falter in handling temporal information, especially when faced with irrelevant or noisy contexts. This paper addresses this gap by empirically examining the robustness of temporal question-answe… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  8. arXiv:2406.15673  [pdf, other

    cs.CL cs.AI

    Large Language Models have Intrinsic Self-Correction Ability

    Authors: Dancheng Liu, Amir Nassereldine, Ziming Yang, Chenhui Xu, Yuting Hu, Jiajie Li, Utkarsh Kumar, Changjae Lee, Ruiyang Qin, Yiyu Shi, Jinjun Xiong

    Abstract: Large language models (LLMs) have attracted significant attention for their exceptional abilities in various natural language processing tasks, but they suffer from hallucinations that will cause performance degradation. One promising solution to improve the LLMs' performance is to ask LLMs to revise their answer after generation, a technique known as self-correction. Among the two types of self-c… ▽ More

    Submitted 23 December, 2024; v1 submitted 21 June, 2024; originally announced June 2024.

    Comments: in submission

  9. arXiv:2405.14623  [pdf, other

    cs.LG

    U-TELL: Unsupervised Task Expert Lifelong Learning

    Authors: Indu Solomon, Aye Phyu Phyu Aung, Uttam Kumar, Senthilnath Jayavelu

    Abstract: Continual learning (CL) models are designed to learn new tasks arriving sequentially without re-training the network. However, real-world ML applications have very limited label information and these models suffer from catastrophic forgetting. To address these issues, we propose an unsupervised CL model with task experts called Unsupervised Task Expert Lifelong Learning (U-TELL) to continually lea… ▽ More

    Submitted 10 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: Accepted by International Conference on Image Processing 2024 (ICIP2024)

  10. arXiv:2405.09605  [pdf, other

    cs.CL cs.AI cs.LG

    Elements of World Knowledge (EWOK): A cognition-inspired framework for evaluating basic world knowledge in language models

    Authors: Anna A. Ivanova, Aalok Sathe, Benjamin Lipkin, Unnathi Kumar, Setayesh Radkani, Thomas H. Clark, Carina Kauf, Jennifer Hu, R. T. Pramod, Gabriel Grand, Vivian Paulun, Maria Ryskina, Ekin Akyürek, Ethan Wilcox, Nafisa Rashid, Leshem Choshen, Roger Levy, Evelina Fedorenko, Joshua Tenenbaum, Jacob Andreas

    Abstract: The ability to build and leverage world models is essential for a general-purpose AI agent. Testing such capabilities is hard, in part because the building blocks of world models are ill-defined. We present Elements of World Knowledge (EWOK), a framework for evaluating world modeling in language models by testing their ability to use knowledge of a concept to match a target text with a plausible/i… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 21 pages (11 main), 7 figures. Authors Anna Ivanova, Aalok Sathe, Benjamin Lipkin contributed equally

  11. arXiv:2309.15821  [pdf, other

    cs.RO

    LGMCTS: Language-Guided Monte-Carlo Tree Search for Executable Semantic Object Rearrangement

    Authors: Haonan Chang, Kai Gao, Kowndinya Boyalakuntla, Alex Lee, Baichuan Huang, Harish Udhaya Kumar, Jinjin Yu, Abdeslam Boularias

    Abstract: We introduce a novel approach to the executable semantic object rearrangement problem. In this challenge, a robot seeks to create an actionable plan that rearranges objects within a scene according to a pattern dictated by a natural language description. Unlike existing methods such as StructFormer and StructDiffusion, which tackle the issue in two steps by first generating poses and then leveragi… ▽ More

    Submitted 7 October, 2024; v1 submitted 27 September, 2023; originally announced September 2023.

    Comments: Our code and supplementary materials are accessible at https://github.com/changhaonan/LG-MCTS

  12. arXiv:2306.05951  [pdf, other

    cs.LG physics.geo-ph stat.AP

    Prediction of Transportation Index for Urban Patterns in Small and Medium-sized Indian Cities using Hybrid RidgeGAN Model

    Authors: Rahisha Thottolil, Uttam Kumar, Tanujit Chakraborty

    Abstract: The rapid urbanization trend in most developing countries including India is creating a plethora of civic concerns such as loss of green space, degradation of environmental health, clean water availability, air pollution, traffic congestion leading to delays in vehicular transportation, etc. Transportation and network modeling through transportation indices have been widely used to understand tran… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Journal ref: Scientific Reports, 2023, Vol. 13

  13. arXiv:2212.08323  [pdf, ps, other

    q-bio.PE cs.CY cs.LG

    An ensemble neural network approach to forecast Dengue outbreak based on climatic condition

    Authors: Madhurima Panja, Tanujit Chakraborty, Sk Shahid Nadim, Indrajit Ghosh, Uttam Kumar, Nan Liu

    Abstract: Dengue fever is a virulent disease spreading over 100 tropical and subtropical countries in Africa, the Americas, and Asia. This arboviral disease affects around 400 million people globally, severely distressing the healthcare systems. The unavailability of a specific drug and ready-to-use vaccine makes the situation worse. Hence, policymakers must rely on early warning systems to control interven… ▽ More

    Submitted 19 December, 2022; v1 submitted 16 December, 2022; originally announced December 2022.

  14. arXiv:2206.10696  [pdf, other

    cs.LG nlin.CD q-bio.PE q-bio.QM stat.AP

    Epicasting: An Ensemble Wavelet Neural Network (EWNet) for Forecasting Epidemics

    Authors: Madhurima Panja, Tanujit Chakraborty, Uttam Kumar, Nan Liu

    Abstract: Infectious diseases remain among the top contributors to human illness and death worldwide, among which many diseases produce epidemic waves of infection. The unavailability of specific drugs and ready-to-use vaccines to prevent most of these epidemics makes the situation worse. These force public health officials and policymakers to rely on early warning systems generated by reliable and accurate… ▽ More

    Submitted 14 March, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

    Report number: Volume 165, August 2023, Pages 185-212

    Journal ref: Neural Networks. 2023

  15. Probabilistic AutoRegressive Neural Networks for Accurate Long-range Forecasting

    Authors: Madhurima Panja, Tanujit Chakraborty, Uttam Kumar, Abdenour Hadid

    Abstract: Forecasting time series data is a critical area of research with applications spanning from stock prices to early epidemic prediction. While numerous statistical and machine learning methods have been proposed, real-life prediction problems often require hybrid solutions that bridge classical forecasting approaches and modern neural network models. In this study, we introduce the Probabilistic Aut… ▽ More

    Submitted 27 June, 2023; v1 submitted 1 April, 2022; originally announced April 2022.

    Report number: December 2023, Pages 457--477

    Journal ref: International Conference on Neural Information Processing 2023

  16. arXiv:2112.07606  [pdf, ps, other

    cs.CL cs.AI

    Semantic Answer Type and Relation Prediction Task (SMART 2021)

    Authors: Nandana Mihindukulasooriya, Mohnish Dubey, Alfio Gliozzo, Jens Lehmann, Axel-Cyrille Ngonga Ngomo, Ricardo Usbeck, Gaetano Rossiello, Uttam Kumar

    Abstract: Each year the International Semantic Web Conference organizes a set of Semantic Web Challenges to establish competitions that will advance state-of-the-art solutions in some problem domains. The Semantic Answer Type and Relation Prediction Task (SMART) task is one of the ISWC 2021 Semantic Web challenges. This is the second year of the challenge after a successful SMART 2020 at ISWC 2020. This yea… ▽ More

    Submitted 10 January, 2022; v1 submitted 7 December, 2021; originally announced December 2021.

    ACM Class: F.4.1; I.2.4; I.2.7

  17. arXiv:2102.00319  [pdf, other

    cs.CR cs.LG

    Efficient CNN Building Blocks for Encrypted Data

    Authors: Nayna Jain, Karthik Nandakumar, Nalini Ratha, Sharath Pankanti, Uttam Kumar

    Abstract: Machine learning on encrypted data can address the concerns related to privacy and legality of sharing sensitive data with untrustworthy service providers. Fully Homomorphic Encryption (FHE) is a promising technique to enable machine learning and inferencing while providing strict guarantees against information leakage. Since deep convolutional neural networks (CNNs) have become the machine learni… ▽ More

    Submitted 30 January, 2021; originally announced February 2021.

    Comments: The Second AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-21)

  18. Comparative Analysis of Cryptography Library in IoT

    Authors: Uday Kumar, Tuhin Borgohain, Sugata Sanyal

    Abstract: The paper aims to do a survey along with a comparative analysis of the various cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half of the paper briefly introduces the various cryptography libraries available in the field of cryptography along with a list of all the algorithms contained within the libraries. The second half of the paper deals with cry… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 5 pages, 14 tables

  19. arXiv:1504.02517  [pdf

    cs.OS

    Survey of Operating Systems for the IoT Environment

    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper is a comprehensive survey of the various operating systems available for the Internet of Things environment. At first the paper introduces the various aspects of the operating systems designed for the IoT environment where resource constraint poses a huge problem for the operation of the general OS designed for the various computing devices. The latter part of the paper describes the va… ▽ More

    Submitted 13 April, 2015; v1 submitted 9 April, 2015; originally announced April 2015.

    Comments: 5 pages, 7 tables

  20. Benchmarking NLopt and state-of-art algorithms for Continuous Global Optimization via Hybrid IACO$_\mathbb{R}$

    Authors: Udit Kumar, Sumit Soman, Jayadeva

    Abstract: This paper presents a comparative analysis of the performance of the Incremental Ant Colony algorithm for continuous optimization ($IACO_\mathbb{R}$), with different algorithms provided in the NLopt library. The key objective is to understand how the various algorithms in the NLopt library perform in combination with the Multi Trajectory Local Search (Mtsls1) technique. A hybrid approach has been… ▽ More

    Submitted 11 March, 2015; originally announced March 2015.

    Comments: 24 pages, 10 figures

    MSC Class: 80M50 ACM Class: G.1.6

    Journal ref: Swarm and Evolutionary Computation 27 (2016): 116-131

  21. arXiv:1502.00870  [pdf

    cs.CR

    Authentication Systems in Internet of Things

    Authors: Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper analyses the various authentication systems implemented for enhanced security and private re-position of an individual's log-in credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user's credentials. MFA is followed by a brief description of the wor… ▽ More

    Submitted 3 February, 2015; originally announced February 2015.

    Comments: 5 pages, 2 figures

  22. arXiv:1501.02211  [pdf

    cs.CR

    Survey of Security and Privacy Issues of Internet of Things

    Authors: Tuhin Borgohain, Uday Kumar, Sugata Sanyal

    Abstract: This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks ha… ▽ More

    Submitted 9 January, 2015; originally announced January 2015.

    Comments: 7 pages, 3 figures

  23. arXiv:1212.0291  [pdf

    cs.CV

    An Image Based Technique for Enhancement of Underwater Images

    Authors: C. J. Prabhakar, P. U. Praveen Kumar

    Abstract: The underwater images usually suffers from non-uniform lighting, low contrast, blur and diminished colors. In this paper, we proposed an image based preprocessing technique to enhance the quality of the underwater images. The proposed technique comprises a combination of four filters such as homomorphic filtering, wavelet denoising, bilateral filter and contrast equalization. These filters are app… ▽ More

    Submitted 3 December, 2012; originally announced December 2012.

    Journal ref: International Journal of Machine Intelligence, Volume 3, Issue 4, pages 217-224, 2011

  24. arXiv:1211.2082  [pdf

    cs.CV

    3D Surface Reconstruction of Underwater Objects

    Authors: C. J. Prabhakar, P. U. Praveen Kumar

    Abstract: In this paper, we propose a novel technique to reconstruct 3D surface of an underwater object using stereo images. Reconstructing the 3D surface of an underwater object is really a challenging task due to degraded quality of underwater images. There are various reason of quality degradation of underwater images i.e., non-uniform illumination of light on the surface of objects, scattering and absor… ▽ More

    Submitted 9 November, 2012; originally announced November 2012.

    Comments: International Journal of Computer Applications (2012)

  25. arXiv:1202.1990  [pdf

    cs.CV

    Non-parametric convolution based image-segmentation of ill-posed objects applying context window approach

    Authors: Upendra Kumar, Tapobrata Lahiri, Manoj Kumar Pal

    Abstract: Context-dependence in human cognition process is a well-established fact. Following this, we introduced the image segmentation method that can use context to classify a pixel on the basis of its membership to a particular object-class of the concerned image. In the broad methodological steps, each pixel was defined by its context window (CW) surrounding it the size of which was fixed heuristically… ▽ More

    Submitted 9 February, 2012; originally announced February 2012.

    Comments: 10 pages, 7 figures, 4 tables, not published anywhere

  26. arXiv:1007.0960  [pdf

    cs.NI

    Analysis of Spatio-Temporal Preferences and Encounter Statistics for DTN Performance

    Authors: Gautam S. Thakur, Udayan Kumar, Ahmed Helmy, Wei-Jen Hsu

    Abstract: Spatio-temporal preferences and encounter statistics provide realistic measures to understand mobile user's behavioral preferences and transfer opportunities in Delay Tolerant Networks (DTNs). The time dependent behavior and periodic reappearances at specific locations can approximate future online presence while encounter statistics can aid to forward the routing decisions. It is theoretically sh… ▽ More

    Submitted 6 July, 2010; originally announced July 2010.

  27. arXiv:1005.0963  [pdf

    cs.OH

    Tunable Multifunction Filter Using Current Conveyor

    Authors: Manish Kumar, M. C. Srivastava, Umesh Kumar

    Abstract: The paper presents a current tunable multifunction filter using current conveyor. The proposed circuit can be realized as on chip tunable low pass, high pass, band pass and elliptical notch filter. The circuit employs two current conveyors, one OTA, four resistors and two grounded capacitors, ideal for integration. It has only one output terminal and the number of input terminals may be used. Furt… ▽ More

    Submitted 6 May, 2010; originally announced May 2010.

    Comments: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/

  28. arXiv:1004.4326  [pdf, ps, other

    cs.NI

    PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies

    Authors: Udayan Kumar, Gautam Thakur, Ahmed Helmy

    Abstract: Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

  29. Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks

    Authors: S. Sumathy, B. Upendra Kumar

    Abstract: Secured communication in ad hoc wireless networks is primarily important, because the communication signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. Nodes act both as hosts… ▽ More

    Submitted 18 March, 2010; originally announced March 2010.

    Comments: 8 Pages, JGraph-Hoc Journal

    Journal ref: International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.1 (2010) 9-16

  30. arXiv:1003.1491  [pdf

    cs.OH

    Current Conveyor Based Multifunction Filter

    Authors: Manish Kumar, M. C. Srivastava, Umesh Kumar

    Abstract: The paper presents a current conveyor based multifunction filter. The proposed circuit can be realized as low pass, high pass, band pass and elliptical notch filter. The circuit employs two balanced output current conveyors, four resistors and two grounded capacitors, ideal for integration. It has only one output terminal and the number of input terminals may be used. Further, there is no requirem… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/