Skip to main content

Showing 1–4 of 4 results for author: Sikdar, A

Searching in archive eess. Search in all archives.
.
  1. arXiv:2410.12953  [pdf, other

    cs.LG cs.CV eess.IV

    Syn2Real Domain Generalization for Underwater Mine-like Object Detection Using Side-Scan Sonar

    Authors: Aayush Agrawal, Aniruddh Sikdar, Rajini Makam, Suresh Sundaram, Suresh Kumar Besai, Mahesh Gopi

    Abstract: Underwater mine detection with deep learning suffers from limitations due to the scarcity of real-world data. This scarcity leads to overfitting, where models perform well on training data but poorly on unseen data. This paper proposes a Syn2Real (Synthetic to Real) domain generalization approach using diffusion models to address this challenge. We demonstrate that synthetic data generated with… ▽ More

    Submitted 16 October, 2024; originally announced October 2024.

    Comments: 7 pages, 4 figures and 3 tables

  2. arXiv:2212.07084  [pdf, other

    cs.CV eess.IV

    Fully Complex-valued Fully Convolutional Multi-feature Fusion Network (FC2MFN) for Building Segmentation of InSAR images

    Authors: Aniruddh Sikdar, Sumanth Udupa, Suresh Sundaram, Narasimhan Sundararajan

    Abstract: Building segmentation in high-resolution InSAR images is a challenging task that can be useful for large-scale surveillance. Although complex-valued deep learning networks perform better than their real-valued counterparts for complex-valued SAR data, phase information is not retained throughout the network, which causes a loss of information. This paper proposes a Fully Complex-valued, Fully Conv… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: Accepted for publication in IEEE Symposium Series On Computational Intelligence 2022, 8 pages, 6 figures

  3. Quickest Bayesian and non-Bayesian detection of false data injection attack in remote state estimation

    Authors: Akanshu Gupta, Abhinava Sikdar, Arpan Chattopadhyay

    Abstract: In this paper, quickest detection of false data injection attack on remote state estimation is considered. A set of $N$ sensors make noisy linear observations of a discrete-time linear process with Gaussian noise, and report the observations to a remote estimator. The challenge is the presence of a few potentially malicious sensors which can start strategically manipulating their observations at a… ▽ More

    Submitted 16 January, 2022; v1 submitted 29 October, 2020; originally announced October 2020.

  4. A Stochastic Game Framework for Efficient Energy Management in Microgrid Networks

    Authors: Shravan Nayak, Chanakya Ajit Ekbote, Annanya Pratap Singh Chauhan, Raghuram Bharadwaj Diddigi, Prishita Ray, Abhinava Sikdar, Sai Koti Reddy Danda, Shalabh Bhatnagar

    Abstract: We consider the problem of energy management in microgrid networks. A microgrid is capable of generating a limited amount of energy from a renewable resource and is responsible for handling the demands of its dedicated customers. Owing to the variable nature of renewable generation and the demands of the customers, it becomes imperative that each microgrid optimally manages its energy. This involv… ▽ More

    Submitted 15 November, 2020; v1 submitted 5 February, 2020; originally announced February 2020.