Skip to main content

Showing 1–14 of 14 results for author: P., M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.07574  [pdf, ps, other

    cs.CR

    Security through the Eyes of AI: How Visualization is Shaping Malware Detection

    Authors: Matteo Brosolo, Asmitha K. A., Mauro Conti, Rafidha Rehiman K. A., Muhammed Shafi K. P., Serena Nicolazzo, Antonino Nocera, Vinod P

    Abstract: Malware, a persistent cybersecurity threat, increasingly targets interconnected digital systems such as desktop, mobile, and IoT platforms through sophisticated attack vectors. By exploiting these vulnerabilities, attackers compromise the integrity and resilience of modern digital ecosystems. To address this risk, security experts actively employ Machine Learning or Deep Learning-based strategies,… ▽ More

    Submitted 19 June, 2025; v1 submitted 12 May, 2025; originally announced May 2025.

  2. arXiv:2503.20257  [pdf, other

    cs.CR

    How Secure is Forgetting? Linking Machine Unlearning to Machine Learning Attacks

    Authors: Muhammed Shafi K. P., Serena Nicolazzo, Antonino Nocera, Vinod P

    Abstract: As Machine Learning (ML) evolves, the complexity and sophistication of security threats against this paradigm continue to grow as well, threatening data privacy and model integrity. In response, Machine Unlearning (MU) is a recent technology that aims to remove the influence of specific data from a trained model, enabling compliance with privacy regulations and user requests. This can be done for… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

  3. arXiv:2410.08223  [pdf

    eess.IV cs.CV

    Removal of clouds from satellite images using time compositing techniques

    Authors: Atma Bharathi Mani, Nagashree TR, Manavalan P, Diwakar PG

    Abstract: Clouds in satellite images are a deterrent to qualitative and quantitative study. Time compositing methods compare a series of co-registered images and retrieve only those pixels that have comparatively lesser cloud cover for the resultant image. Two different approaches of time compositing were tested. The first method recoded the clouds to value 0 on all the constituent images and ran a 'max' fu… ▽ More

    Submitted 26 September, 2024; originally announced October 2024.

    Comments: 10 pages, 8 figures

  4. arXiv:2407.10630  [pdf

    eess.IV cs.CV cs.LG

    Brain Tumor Classification From MRI Images Using Machine Learning

    Authors: Vidhyapriya Ranganathan, Celshiya Udaiyar, Jaisree Jayanth, Meghaa P V, Srija B, Uthra S

    Abstract: Brain tumor is a life-threatening problem and hampers the normal functioning of the human body. The average five-year relative survival rate for malignant brain tumors is 35.6 percent. For proper diagnosis and efficient treatment planning, it is necessary to detect the brain tumor in early stages. Due to advancement in medical imaging technology, the brain images are taken in different modalities.… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  5. arXiv:2310.18263  [pdf, other

    cs.CL cs.CY

    MalFake: A Multimodal Fake News Identification for Malayalam using Recurrent Neural Networks and VGG-16

    Authors: Adhish S. Sujan, Ajitha. V, Aleena Benny, Amiya M. P., V. S. Anoop

    Abstract: The amount of news being consumed online has substantially expanded in recent years. Fake news has become increasingly common, especially in regional languages like Malayalam, due to the rapid publication and lack of editorial standards on some online sites. Fake news may have a terrible effect on society, causing people to make bad judgments, lose faith in authorities, and even engage in violent… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

  6. arXiv:2306.02264  [pdf, other

    cs.ET quant-ph

    Quantum Circuit Optimization of Arithmetic circuits using ZX Calculus

    Authors: Aravind Joshi, Akshara Kairali, Renju Raju, Adithya Athreya, Reena Monica P, Sanjay Vishwakarma, Srinjoy Ganguly

    Abstract: Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum co… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

  7. arXiv:2301.12943  [pdf, other

    cs.CV

    Factors that affect Camera based Self-Monitoring of Vitals in the Wild

    Authors: Nikhil S. Narayan, Shashanka B. R., Rohit Damodaran, Chandrashekhar Jayaram, M. A. Kareem, Mamta P., Saravanan K. R., Monu Krishnan, Raja Indana

    Abstract: The reliability of the results of self monitoring of the vitals in the wild using medical devices or wearables or camera based smart phone solutions is subject to variabilities such as position of placement, hardware of the device and environmental factors. In this first of its kind study, we demonstrate that this variability in self monitoring of Blood Pressure (BP), Blood oxygen saturation level… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: 10 pages, 9 figures

  8. arXiv:2210.16954  [pdf, other

    cs.CV cs.AI cs.LG

    Few-Shot Classification of Skin Lesions from Dermoscopic Images by Meta-Learning Representative Embeddings

    Authors: Karthik Desingu, Mirunalini P., Aravindan Chandrabose

    Abstract: Annotated images and ground truth for the diagnosis of rare and novel diseases are scarce. This is expected to prevail, considering the small number of affected patient population and limited clinical expertise to annotate images. Further, the frequently occurring long-tailed class distributions in skin lesion and other disease classification datasets cause conventional training approaches to lead… ▽ More

    Submitted 30 October, 2022; originally announced October 2022.

    Comments: 10 pages, 3 figures, 2 tables

  9. arXiv:2110.15558  [pdf

    eess.IV cs.CV

    AI-Powered Semantic Segmentation and Fluid Volume Calculation of Lung CT images in Covid-19 Patients

    Authors: Sabeerali K. P, Saleena T. S, Dr. Muhamed Ilyas P, Neha Mohan

    Abstract: COVID-19 pandemic is a deadly disease spreading very fast. People with the confronted immune system are susceptible to many health conditions. A highly significant condition is pneumonia, which is found to be the cause of death in the majority of patients. The main purpose of this study is to find the volume of GGO and consolidation of a covid-19 patient so that the physicians can prioritize the p… ▽ More

    Submitted 29 October, 2021; originally announced October 2021.

    Comments: https://www.uietkuk.ac.in/etbs2021/wp-content/uploads/2021/02/Special-Session-Proposal-ETBS-2021.doc

    MSC Class: 68T10 (Primary)

  10. arXiv:2006.11347  [pdf, other

    cs.RO

    Student Mixture Model Based Visual Servoing

    Authors: Mithun. P, Shaunak A. Mehta, Suril V. Shah, Gaurav Bhatnagar, K. Madhava Krishna

    Abstract: Classical Image-Based Visual Servoing (IBVS) makes use of geometric image features like point, straight line and image moments to control a robotic system. Robust extraction and real-time tracking of these features are crucial to the performance of the IBVS. Moreover, such features can be unsuitable for real world applications where it might not be easy to distinguish a target from the rest of the… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: 35 pages, 17 figures

  11. arXiv:1912.01478  [pdf, other

    cs.DC

    A Hybrid Graph Coloring Algorithm for GPUs

    Authors: Shanthanu S Rai, Rohit M P, Sreepathi Pai

    Abstract: Graph algorithms mainly belong to two categories, topology-driven and data-driven. Data-driven approach maintains a worklist of active nodes, the nodes on which work has to be done. Topology-driven approach sweeps over the entire graph to find active nodes. Hybridization is an optimization technique where in each iteration, the computation is done in a topology-driven or data-driven manner based… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: 5 pages, 4 figures, 4 tables, 2 listings, accepted at 26th IEEE International Conference on High Performance Computing, Data, and Analytics (Student Research Symposium)

  12. arXiv:1809.04228  [pdf, other

    cs.CV

    Ensemble of Convolutional Neural Networks for Automatic Grading of Diabetic Retinopathy and Macular Edema

    Authors: Avinash Kori, Sai Saketh Chennamsetty, Mohammed Safwan K. P., Varghese Alex

    Abstract: In this manuscript, we automate the procedure of grading of diabetic retinopathy and macular edema from fundus images using an ensemble of convolutional neural networks. The availability of limited amount of labeled data to perform supervised learning was circumvented by using transfer learning approach. The models in the ensemble were pre-trained on a large dataset comprising natural images and w… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 5 pages

  13. arXiv:1612.01006  [pdf

    cs.CV

    A Non-Local Means Approach for Gaussian Noise Removal from Images using a Modified Weighting Kernel

    Authors: Mojtaba Kazemi, Ehsan Mohammadi. P, Parichehr shahidi sadeghi, Mohamad B. Menhaj

    Abstract: Gaussian noise removal is an interesting area in digital image processing not only to improve the visual quality, but for its impact on other post-processing algorithms like image registration or segmentation. Many presented state-of-the-art denoising methods are based on the self-similarity or patch-based image processing. Specifically, Non-Local Means (NLM) as a patch-based filter has gained inc… ▽ More

    Submitted 3 December, 2016; originally announced December 2016.

    Comments: 2017 25th Iranian Conference on Electrical Engineering (ICEE)

  14. arXiv:0710.0748  [pdf

    cs.DM cs.CC

    A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem

    Authors: Murali Krishna P, Sabu . M Thampi

    Abstract: A clique in an undirected graph G= (V, E) is a subset V' V of vertices, each pair of which is connected by an edge in E. The clique problem is an optimization problem of finding a clique of maximum size in graph. The clique problem is NP-Complete. We have succeeded in developing a fast algorithm for maximum clique problem by employing the method of verification and elimination. For a graph of si… ▽ More

    Submitted 3 October, 2007; originally announced October 2007.

    Comments: 06 pages,01 figures