Skip to main content

Showing 1–10 of 10 results for author: Vyas, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03928  [pdf, other

    cs.GT

    Balancing rationality and social influence: Alpha-rational Nash equilibrium in games with herding

    Authors: Khushboo Agarwal, Konstantin Avrachenkov, Veeraruna Kavitha, Raghupati Vyas

    Abstract: The classical game theory models rational players and proposes Nash equilibrium (NE) as the solution. However, real-world scenarios rarely feature rational players; instead, players make inconsistent and irrational decisions. Often, irrational players exhibit herding behaviour by simply following the majority. In this paper, we consider the mean-field game with $α$-fraction of rational players a… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 8 pages, 3 figure, 1 table

  2. arXiv:2312.15319  [pdf, other

    cs.CR

    TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)

    Authors: Kumar Saurabh, Deepak Gajjala, Krishna Kaipa, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker

    Abstract: Industrial cyber-physical systems (ICPS) are gradually integrating information technology and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deploy secure Industrial Control and Production Systems (ICPS) in smart factories, cyber threats and risks must be addressed. To identify all possible threats, Threat Modeling is a promising solution.… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

  3. arXiv:2212.11376  [pdf, other

    cs.CV

    Artistic Arbitrary Style Transfer

    Authors: Weiting Li, Rahul Vyas, Ramya Sree Penta

    Abstract: Arbitrary Style Transfer is a technique used to produce a new image from two images: a content image, and a style image. The newly produced image is unseen and is generated from the algorithm itself. Balancing the structure and style components has been the major challenge that other state-of-the-art algorithms have tried to solve. Despite all the efforts, it's still a major challenge to apply the… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: 12 pages, 7 figures

  4. arXiv:2207.00424  [pdf, other

    cs.CR cs.LG

    LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks

    Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker

    Abstract: In the recent years, we have witnessed a huge growth in the number of Internet of Things (IoT) and edge devices being used in our everyday activities. This demands the security of these devices from cyber attacks to be improved to protect its users. For years, Machine Learning (ML) techniques have been used to develop Network Intrusion Detection Systems (NIDS) with the aim of increasing their reli… ▽ More

    Submitted 23 June, 2022; originally announced July 2022.

    Journal ref: IEEE World AI IoT Congress 2022

  5. arXiv:2206.09420  [pdf, other

    cs.CV cs.AI cs.LG

    Agricultural Plantation Classification using Transfer Learning Approach based on CNN

    Authors: Uphar Singh, Tushar Musale, Ranjana Vyas, O. P. Vyas

    Abstract: Hyper-spectral images are images captured from a satellite that gives spatial and spectral information of specific region.A Hyper-spectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. It makes them well suited for the classification of objects in a snap. In the past years, the efficiency of hyper-spectral… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

  6. Terrain Classification using Transfer Learning on Hyperspectral Images: A Comparative study

    Authors: Uphar Singh, Kumar Saurabh, Neelaksh Trehan, Ranjana Vyas, O. P. Vyas

    Abstract: A Hyperspectral image contains much more number of channels as compared to a RGB image, hence containing more information about entities within the image. The convolutional neural network (CNN) and the Multi-Layer Perceptron (MLP) have been proven to be an effective method of image classification. However, they suffer from the issues of long training time and requirement of large amounts of the la… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

  7. arXiv:2011.11610  [pdf, other

    cs.CV cs.LG eess.IV

    Transfer Learning for Oral Cancer Detection using Microscopic Images

    Authors: Rutwik Palaskar, Renu Vyas, Vilas Khedekar, Sangeeta Palaskar, Pranjal Sahu

    Abstract: Oral cancer has more than 83% survival rate if detected in its early stages, however, only 29% of cases are currently detected early. Deep learning techniques can detect patterns of oral cancer cells and can aid in its early detection. In this work, we present the first results of neural networks for oral cancer detection using microscopic images. We compare numerous state-of-the-art models via tr… ▽ More

    Submitted 9 April, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

  8. arXiv:2007.09549  [pdf, other

    cs.CV cs.LG

    Leveraging Seen and Unseen Semantic Relationships for Generative Zero-Shot Learning

    Authors: Maunil R Vyas, Hemanth Venkateswara, Sethuraman Panchanathan

    Abstract: Zero-shot learning (ZSL) addresses the unseen class recognition problem by leveraging semantic information to transfer knowledge from seen classes to unseen classes. Generative models synthesize the unseen visual features and convert ZSL into a classical supervised learning problem. These generative models are trained using the seen classes and are expected to implicitly transfer the knowledge fro… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

    Comments: 19 Pages, To be appear in ECCV 2020

  9. arXiv:1909.06045  [pdf

    cs.CV eess.IV

    A Collaborative Approach using Ridge-Valley Minutiae for More Accurate Contactless Fingerprint Identification

    Authors: Ritesh Vyas, Ajay Kumar

    Abstract: Contactless fingerprint identification has emerged as an reliable and user friendly alternative for the personal identification in a range of e-business and law-enforcement applications. It is however quite known from the literature that the contactless fingerprint images deliver remarkably low matching accuracies as compared with those obtained from the contact-based fingerprint sensors. This pap… ▽ More

    Submitted 19 September, 2019; v1 submitted 13 September, 2019; originally announced September 2019.

  10. arXiv:1710.00977  [pdf, other

    cs.CV cs.LG stat.ML

    Facial Key Points Detection using Deep Convolutional Neural Network - NaimishNet

    Authors: Naimish Agarwal, Artus Krohn-Grimberghe, Ranjana Vyas

    Abstract: Facial Key Points (FKPs) Detection is an important and challenging problem in the fields of computer vision and machine learning. It involves predicting the co-ordinates of the FKPs, e.g. nose tip, center of eyes, etc, for a given face. In this paper, we propose a LeNet adapted Deep CNN model - NaimishNet, to operate on facial key points data and compare our model's performance against existing st… ▽ More

    Submitted 3 October, 2017; originally announced October 2017.

    Comments: 7 pages, 21 figures, 3 tables