Skip to main content

Showing 1–11 of 11 results for author: Vijayan, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.12647  [pdf, ps, other

    cs.LG

    Spiking Neural Network: a low power solution for physical layer authentication

    Authors: Jung Hoon Lee, Sujith Vijayan

    Abstract: Deep learning (DL) is a powerful tool that can solve complex problems, and thus, it seems natural to assume that DL can be used to enhance the security of wireless communication. However, deploying DL models to edge devices in wireless networks is challenging, as they require significant amounts of computing and power resources. Notably, Spiking Neural Networks (SNNs) are known to be efficient in… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

    Comments: 11 pages, 7 figures and 2 pages

  2. arXiv:2505.12642  [pdf, ps, other

    cs.LG cs.CV

    Two out of Three (ToT): using self-consistency to make robust predictions

    Authors: Jung Hoon Lee, Sujith Vijayan

    Abstract: Deep learning (DL) can automatically construct intelligent agents, deep neural networks (alternatively, DL models), that can outperform humans in certain tasks. However, the operating principles of DL remain poorly understood, making its decisions incomprehensible. As a result, it poses a great risk to deploy DL in high-stakes domains in which mistakes or errors may lead to critical consequences.… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

    Comments: 12 pages, 7 main figures, 1 supplementary table and 2 supplementary figures

  3. arXiv:2504.19014  [pdf, ps, other

    cs.LG stat.ML

    Towards minimax optimal algorithms for Active Simple Hypothesis Testing

    Authors: Sushant Vijayan

    Abstract: We study the Active Simple Hypothesis Testing (ASHT) problem, a simpler variant of the Fixed Budget Best Arm Identification problem. In this work, we provide novel game theoretic formulation of the upper bounds of the ASHT problem. This formulation allows us to leverage tools of differential games and Partial Differential Equations (PDEs) to propose an approximately optimal algorithm that is compu… ▽ More

    Submitted 26 April, 2025; originally announced April 2025.

  4. arXiv:2503.03195  [pdf, other

    cs.LG

    Online Bidding under RoS Constraints without Knowing the Value

    Authors: Sushant Vijayan, Zhe Feng, Swati Padmanabhan, Karthikeyan Shanmugam, Arun Suggala, Di Wang

    Abstract: We consider the problem of bidding in online advertising, where an advertiser aims to maximize value while adhering to budget and Return-on-Spend (RoS) constraints. Unlike prior work that assumes knowledge of the value generated by winning each impression ({e.g.,} conversions), we address the more realistic setting where the advertiser must simultaneously learn the optimal bidding strategy and the… ▽ More

    Submitted 5 March, 2025; originally announced March 2025.

  5. arXiv:2405.20605  [pdf, other

    cs.LG cs.AI cs.CV

    Searching for internal symbols underlying deep learning

    Authors: Jung H. Lee, Sujith Vijayan

    Abstract: Deep learning (DL) enables deep neural networks (DNNs) to automatically learn complex tasks or rules from given examples without instructions or guiding principles. As we do not engineer DNNs' functions, it is extremely difficult to diagnose their decisions, and multiple lines of studies proposed to explain the principles of their operations. Notably, one line of studies suggests that DNNs may lea… ▽ More

    Submitted 17 November, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: 16 pages, 10 figures, 5 tables and 1 supplementary table

  6. arXiv:2402.08789  [pdf, other

    eess.AS cs.AI cs.LG q-bio.QM

    Leveraging cough sounds to optimize chest x-ray usage in low-resource settings

    Authors: Alexander Philip, Sanya Chawla, Lola Jover, George P. Kafentzis, Joe Brew, Vishakh Saraf, Shibu Vijayan, Peter Small, Carlos Chaccour

    Abstract: Chest X-ray is a commonly used tool during triage, diagnosis and management of respiratory diseases. In resource-constricted settings, optimizing this resource can lead to valuable cost savings for the health care system and the patients as well as to and improvement in consult time. We used prospectively-collected data from 137 patients referred for chest X-ray at the Christian Medical Center and… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  7. arXiv:2402.01933  [pdf, other

    eess.AS cs.SD

    ToMoBrush: Exploring Dental Health Sensing using a Sonic Toothbrush

    Authors: Kuang Yuan, Mohamed Ibrahim, Yiwen Song, Guoxiang Deng, Suvendra Vijayan, Robert Nerone, Akshay Gadre, Swarun Kumar

    Abstract: Early detection of dental disease is crucial to prevent adverse outcomes. Today, dental X-rays are currently the most accurate gold standard for dental disease detection. Unfortunately, regular X-ray exam is still a privilege for billions of people around the world. In this paper, we ask: "Can we develop a low-cost sensing system that enables dental self-examination in the comfort of one's home?"… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

    ACM Class: J.3; C.3; H.5.2

  8. arXiv:2311.15356  [pdf, other

    cs.CV cs.AI

    Having Second Thoughts? Let's hear it

    Authors: Jung H. Lee, Sujith Vijayan

    Abstract: Deep learning models loosely mimic bottom-up signal pathways from low-order sensory areas to high-order cognitive areas. After training, DL models can outperform humans on some domain-specific tasks, but their decision-making process has been known to be easily disrupted. Since the human brain consists of multiple functional areas highly connected to one another and relies on intricate interplays… ▽ More

    Submitted 31 May, 2024; v1 submitted 26 November, 2023; originally announced November 2023.

    Comments: 10 pages, 6 figures, 3 table and Append/Supplementary materials. Section 3 has been substantially revised

  9. arXiv:2303.07627  [pdf, ps, other

    cs.LG stat.ML

    Best arm identification in rare events

    Authors: Anirban Bhattacharjee, Sushant Vijayan, Sandeep K Juneja

    Abstract: We consider the best arm identification problem in the stochastic multi-armed bandit framework where each arm has a tiny probability of realizing large rewards while with overwhelming probability the reward is zero. A key application of this framework is in online advertising where click rates of advertisements could be a fraction of a single percent and final conversion to sales, while highly pro… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: 32 pages

  10. arXiv:2205.10952  [pdf, other

    cs.LG

    Generalization ability and Vulnerabilities to adversarial perturbations: Two sides of the same coin

    Authors: Jung Hoon Lee, Sujith Vijayan

    Abstract: Deep neural networks (DNNs), the agents of deep learning (DL), require a massive number of parallel/sequential operations, which makes it difficult to comprehend them and impedes proper diagnosis. Without better knowledge of DNNs' internal process, deploying DNNs in high-stakes domains may lead to catastrophic failures. Therefore, to build more reliable DNNs/DL, it is imperative that we gain insig… ▽ More

    Submitted 17 November, 2024; v1 submitted 22 May, 2022; originally announced May 2022.

    Comments: 19 pages, 12 main figures, 4 supplemental figures, 2 tables

  11. Spectral Clustering with Jensen-type kernels and their multi-point extensions

    Authors: Debarghya Ghoshdastidar, Ambedkar Dukkipati, Ajay P. Adsul, Aparna S. Vijayan

    Abstract: Motivated by multi-distribution divergences, which originate in information theory, we propose a notion of `multi-point' kernels, and study their applications. We study a class of kernels based on Jensen type divergences and show that these can be extended to measure similarity among multiple points. We study tensor flattening methods and develop a multi-point (kernel) spectral clustering (MSC) me… ▽ More

    Submitted 18 March, 2014; originally announced March 2014.

    Comments: To appear in IEEE Computer Society Conference on Computer Vision and Pattern Recognition