Skip to main content

Showing 1–50 of 128 results for author: Pandey, A

  1. arXiv:2407.04879  [pdf, other

    cs.SD eess.AS

    All Neural Low-latency Directional Speech Extraction

    Authors: Ashutosh Pandey, Sanha Lee, Juan Azcarreta, Daniel Wong, Buye Xu

    Abstract: We introduce a novel all neural model for low-latency directional speech extraction. The model uses direction of arrival (DOA) embeddings from a predefined spatial grid, which are transformed and fused into a recurrent neural network based speech extraction model. This process enables the model to effectively extract speech from a specified DOA. Unlike previous methods that relied on hand-crafted… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: Accepted for publication at INTERSPEECH 2024

  2. arXiv:2407.03831  [pdf, other

    math.CO cs.DM

    Exploring Algorithmic Solutions for the Independent Roman Domination Problem in Graphs

    Authors: Kaustav Paul, Ankit Sharma, Arti Pandey

    Abstract: Given a graph $G=(V,E)$, a function $f:V\to \{0,1,2\}$ is said to be a \emph{Roman Dominating function} if for every $v\in V$ with $f(v)=0$, there exists a vertex $u\in N(v)$ such that $f(u)=2$. A Roman Dominating function $f$ is said to be an \emph{Independent Roman Dominating function} (or IRDF), if $V_1\cup V_2$ forms an independent set, where $V_i=\{v\in V~\vert~f(v)=i\}$, for… ▽ More

    Submitted 12 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

  3. arXiv:2407.03812  [pdf, other

    cs.DM cs.DS

    Algorithmic Results for Weak Roman Domination Problem in Graphs

    Authors: Kaustav Paul, Ankit Sharma, Arti Pandey

    Abstract: Consider a graph $G = (V, E)$ and a function $f: V \rightarrow \{0, 1, 2\}$. A vertex $u$ with $f(u)=0$ is defined as \emph{undefended} by $f$ if it lacks adjacency to any vertex with a positive $f$-value. The function $f$ is said to be a \emph{Weak Roman Dominating function} (WRD function) if, for every vertex $u$ with $f(u) = 0$, there exists a neighbour $v$ of $u$ with $f(v) > 0$ and a new func… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  4. arXiv:2407.01738  [pdf, other

    cs.NI

    SONIC: Connect the Unconnected via FM Radio & SMS

    Authors: Ayush Pandey, Rohail Asim, Khalid Mengal, Matteo Varvello, Yasir Zaki

    Abstract: As of 2022, about 2.78 billion people in developing countries do not have access to the Internet. Lack of Internet access hinders economic growth, educational opportunities, and access to information and services. Recent initiatives to ``connect the unconnected'' have either failed (project Loon and Aquila) or are characterized by exorbitant costs (Starlink and similar), which are unsustainable fo… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 8 pages, 5 figures

  5. arXiv:2406.19402  [pdf, other

    q-fin.ST cs.LG stat.ML

    Modelling financial volume curves with hierarchical Poisson processes

    Authors: Creighton Heaukulani, Abhinav Pandey, Lancelot F. James

    Abstract: Modeling the trading volume curves of financial instruments throughout the day is of key interest in financial trading applications. Predictions of these so-called volume profiles guide trade execution strategies, for example, a common strategy is to trade a desired quantity across many orders in line with the expected volume curve throughout the day so as not to impact the price of the instrument… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  6. arXiv:2405.19563  [pdf, other

    cs.CL

    Unlearning Climate Misinformation in Large Language Models

    Authors: Michael Fore, Simranjit Singh, Chaehong Lee, Amritanshu Pandey, Antonios Anastasopoulos, Dimitrios Stamoulis

    Abstract: Misinformation regarding climate change is a key roadblock in addressing one of the most serious threats to humanity. This paper investigates factual accuracy in large language models (LLMs) regarding climate information. Using true/false labeled Q&A data for fine-tuning and evaluating LLMs on climate-related claims, we compare open-source models, assessing their ability to generate truthful respo… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  7. arXiv:2405.01741  [pdf, other

    cs.CR cs.AI cs.AR cs.LG

    PVF (Parameter Vulnerability Factor): A Scalable Metric for Understanding AI Vulnerability Against SDCs in Model Parameters

    Authors: Xun Jiao, Fred Lin, Harish D. Dixit, Joel Coburn, Abhinav Pandey, Han Wang, Venkat Ramesh, Jianyu Huang, Wang Xu, Daniel Moore, Sriram Sankar

    Abstract: Reliability of AI systems is a fundamental concern for the successful deployment and widespread adoption of AI technologies. Unfortunately, the escalating complexity and heterogeneity of AI hardware systems make them increasingly susceptible to hardware faults, e.g., silent data corruptions (SDC), that can potentially corrupt model parameters. When this occurs during AI inference/servicing, it can… ▽ More

    Submitted 11 June, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

  8. arXiv:2404.18963  [pdf, other

    cs.LG cs.CL

    RE-GrievanceAssist: Enhancing Customer Experience through ML-Powered Complaint Management

    Authors: Venkatesh C, Harshit Oberoi, Anurag Kumar Pandey, Anil Goyal, Nikhil Sikka

    Abstract: In recent years, digital platform companies have faced increasing challenges in managing customer complaints, driven by widespread consumer adoption. This paper introduces an end-to-end pipeline, named RE-GrievanceAssist, designed specifically for real estate customer complaint management. The pipeline consists of three key components: i) response/no-response ML model using TF-IDF vectorization an… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  9. arXiv:2404.17177  [pdf, other

    cs.LG cs.IR

    RE-RFME: Real-Estate RFME Model for customer segmentation

    Authors: Anurag Kumar Pandey, Anil Goyal, Nikhil Sikka

    Abstract: Marketing is one of the high-cost activities for any online platform. With the increase in the number of customers, it is crucial to understand customers based on their dynamic behaviors to design effective marketing strategies. Customer segmentation is a widely used approach to group customers into different categories and design the marketing strategy targeting each group individually. Therefore… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  10. arXiv:2404.07898  [pdf, other

    cs.LG stat.AP

    Anomaly Detection in Power Grids via Context-Agnostic Learning

    Authors: SangWoo Park, Amritanshu Pandey

    Abstract: An important tool grid operators use to safeguard against failures, whether naturally occurring or malicious, involves detecting anomalies in the power system SCADA data. In this paper, we aim to solve a real-time anomaly detection problem. Given time-series measurement values coming from a fixed set of sensors on the grid, can we identify anomalies in the network topology or measurement data? Exi… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  11. arXiv:2403.06387  [pdf, other

    cs.SD eess.AS

    Towards Decoupling Frontend Enhancement and Backend Recognition in Monaural Robust ASR

    Authors: Yufeng Yang, Ashutosh Pandey, DeLiang Wang

    Abstract: It has been shown that the intelligibility of noisy speech can be improved by speech enhancement (SE) algorithms. However, monaural SE has not been established as an effective frontend for automatic speech recognition (ASR) in noisy conditions compared to an ASR model trained on noisy speech directly. The divide between SE and ASR impedes the progress of robust ASR systems, especially as SE has ma… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: Submitted to IEEE/ACM Transactions on Audio, Speech and Language Processing. arXiv admin note: text overlap with arXiv:2210.13318

  12. arXiv:2402.07301  [pdf, other

    cs.CV

    LISR: Learning Linear 3D Implicit Surface Representation Using Compactly Supported Radial Basis Functions

    Authors: Atharva Pandey, Vishal Yadav, Rajendra Nagar, Santanu Chaudhury

    Abstract: Implicit 3D surface reconstruction of an object from its partial and noisy 3D point cloud scan is the classical geometry processing and 3D computer vision problem. In the literature, various 3D shape representations have been developed, differing in memory efficiency and shape retrieval effectiveness, such as volumetric, parametric, and implicit surfaces. Radial basis functions provide memory-effi… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Journal ref: AAAI 2024

  13. arXiv:2402.06856  [pdf, ps, other

    math.PR cs.IT

    Community detection in the hypergraph stochastic block model and reconstruction on hypertrees

    Authors: Yuzhou Gu, Aaradhya Pandey

    Abstract: We study the weak recovery problem on the $r$-uniform hypergraph stochastic block model ($r$-HSBM) with two balanced communities. In this model, $n$ vertices are randomly divided into two communities, and size-$r$ hyperedges are added randomly depending on whether all vertices in the hyperedge are in the same community. The goal of weak recovery is to recover a non-trivial fraction of the communit… ▽ More

    Submitted 11 June, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

  14. arXiv:2402.00332  [pdf, other

    cs.LG stat.ML

    Comparing Spectral Bias and Robustness For Two-Layer Neural Networks: SGD vs Adaptive Random Fourier Features

    Authors: Aku Kammonen, Lisi Liang, Anamika Pandey, Raúl Tempone

    Abstract: We present experimental results highlighting two key differences resulting from the choice of training algorithm for two-layer neural networks. The spectral bias of neural networks is well known, while the spectral bias dependence on the choice of training algorithm is less studied. Our experiments demonstrate that an adaptive random Fourier features algorithm (ARFF) can yield a spectral bias clos… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

    Comments: 6 Pages, 4 Figures; Accepted in the International Conference on Scientific Computing and Machine Learning

  15. arXiv:2401.07882  [pdf, other

    cs.SD eess.AS

    On the Importance of Neural Wiener Filter for Resource Efficient Multichannel Speech Enhancement

    Authors: Tsun-An Hsieh, Jacob Donley, Daniel Wong, Buye Xu, Ashutosh Pandey

    Abstract: We introduce a time-domain framework for efficient multichannel speech enhancement, emphasizing low latency and computational efficiency. This framework incorporates two compact deep neural networks (DNNs) surrounding a multichannel neural Wiener filter (NWF). The first DNN enhances the speech signal to estimate NWF coefficients, while the second DNN refines the output from the NWF. The NWF, while… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Accepted for publication at ICASSP

  16. arXiv:2401.07879  [pdf, other

    cs.SD eess.AS

    Decoupled Spatial and Temporal Processing for Resource Efficient Multichannel Speech Enhancement

    Authors: Ashutosh Pandey, Buye Xu

    Abstract: We present a novel model designed for resource-efficient multichannel speech enhancement in the time domain, with a focus on low latency, lightweight, and low computational requirements. The proposed model incorporates explicit spatial and temporal processing within deep neural network (DNN) layers. Inspired by frequency-dependent multichannel filtering, our spatial filtering process applies multi… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Comments: Accepted for publication at ICASSP

  17. arXiv:2312.15994  [pdf, other

    cs.LG cs.CY

    Practical Bias Mitigation through Proxy Sensitive Attribute Label Generation

    Authors: Bhushan Chaudhary, Anubha Pandey, Deepak Bhatt, Darshika Tiwari

    Abstract: Addressing bias in the trained machine learning system often requires access to sensitive attributes. In practice, these attributes are not available either due to legal and policy regulations or data unavailability for a given demographic. Existing bias mitigation algorithms are limited in their applicability to real-world scenarios as they require access to sensitive attributes to achieve fairne… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

    Comments: Modelling Uncertainty in the Financial World (MUFin) Workshop in AAAI2023

  18. GroupMixNorm Layer for Learning Fair Models

    Authors: Anubha Pandey, Aditi Rai, Maneet Singh, Deepak Bhatt, Tanmoy Bhowmik

    Abstract: Recent research has identified discriminatory behavior of automated prediction algorithms towards groups identified on specific protected attributes (e.g., gender, ethnicity, age group, etc.). When deployed in real-world scenarios, such techniques may demonstrate biased predictions resulting in unfair outcomes. Recent literature has witnessed algorithms for mitigating such biased behavior mostly b… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: 12 pages, 6 figures, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2023

  19. arXiv:2309.13035  [pdf, other

    cs.RO

    PyPose v0.6: The Imperative Programming Interface for Robotics

    Authors: Zitong Zhan, Xiangfu Li, Qihang Li, Haonan He, Abhinav Pandey, Haitao Xiao, Yangmengfei Xu, Xiangyu Chen, Kuan Xu, Kun Cao, Zhipeng Zhao, Zihan Wang, Huan Xu, Zihang Fang, Yutian Chen, Wentao Wang, Xu Fang, Yi Du, Tianhao Wu, Xiao Lin, Yuheng Qiu, Fan Yang, Jingnan Shi, Shaoshu Su, Yiren Lu , et al. (11 additional authors not shown)

    Abstract: PyPose is an open-source library for robot learning. It combines a learning-based approach with physics-based optimization, which enables seamless end-to-end robot learning. It has been used in many tasks due to its meticulously designed application programming interface (API) and efficient implementation. From its initial launch in early 2022, PyPose has experienced significant enhancements, inco… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

  20. Effect of Attention and Self-Supervised Speech Embeddings on Non-Semantic Speech Tasks

    Authors: Payal Mohapatra, Akash Pandey, Yueyuan Sui, Qi Zhu

    Abstract: Human emotion understanding is pivotal in making conversational technology mainstream. We view speech emotion understanding as a perception task which is a more realistic setting. With varying contexts (languages, demographics, etc.) different share of people perceive the same speech segment as a non-unanimous emotion. As part of the ACM Multimedia 2023 Computational Paralinguistics ChallengE (Com… ▽ More

    Submitted 27 September, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted to appear at ACM Multimedia 2023 Multimedia Grand Challenges Track

  21. arXiv:2306.12434  [pdf, other

    q-fin.ST cs.CE

    Using Internal Bar Strength as a Key Indicator for Trading Country ETFs

    Authors: Aditya Pandey, Kunal Joshi

    Abstract: This report aims to investigate the effectiveness of using internal bar strength (IBS) as a key indicator for trading country exchange-traded funds (ETFs). The study uses a quantitative approach to analyze historical price data for a bucket of country ETFs over a period of 10 years and uses the idea of Mean Reversion to create a profitable trading strategy. Our findings suggest that IBS can be a u… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  22. arXiv:2305.17251  [pdf, other

    cs.LG

    Duality in Multi-View Restricted Kernel Machines

    Authors: Sonny Achten, Arun Pandey, Hannes De Meulemeester, Bart De Moor, Johan A. K. Suykens

    Abstract: We propose a unifying setting that combines existing restricted kernel machine methods into a single primal-dual multi-view framework for kernel principal component analysis in both supervised and unsupervised settings. We derive the primal and dual representations of the framework and relate different training and inference algorithms from a theoretical perspective. We show how to achieve full eq… ▽ More

    Submitted 6 July, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: ICML 2023 Workshop on Duality for Modern Machine Learning, Honolulu, Hawaii, USA

  23. arXiv:2304.12483  [pdf, other

    cs.CV

    Towards Realistic Generative 3D Face Models

    Authors: Aashish Rai, Hiresh Gupta, Ayush Pandey, Francisco Vicente Carrasco, Shingo Jason Takagi, Amaury Aubel, Daeil Kim, Aayush Prakash, Fernando de la Torre

    Abstract: In recent years, there has been significant progress in 2D generative face models fueled by applications such as animation, synthetic data generation, and digital avatars. However, due to the absence of 3D information, these 2D models often struggle to accurately disentangle facial attributes like pose, expression, and illumination, limiting their editing capabilities. To address this limitation,… ▽ More

    Submitted 26 October, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

    Comments: Preprint

  24. arXiv:2304.06727  [pdf, other

    cs.CR eess.SY

    Contingency Analyses with Warm Starter using Probabilistic Graphical Model

    Authors: Shimiao Li, Amritanshu Pandey, Larry Pileggi

    Abstract: Cyberthreats are an increasingly common risk to the power grid and can thwart secure grid operations. We propose to extend contingency analysis to include cyberthreat evaluations. However, unlike the traditional N-1 or N-2 contingencies, cyberthreats (e.g., MadIoT) require simulating hard-to-solve N-k (with k >> 2) contingencies in a practical amount of time. Purely physics-based power flow solver… ▽ More

    Submitted 19 March, 2024; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.03673

  25. arXiv:2303.17751  [pdf, other

    cs.LO eess.SY

    Pacti: Scaling Assume-Guarantee Reasoning for System Analysis and Design

    Authors: Inigo Incer, Apurva Badithela, Josefine Graebener, Piergiuseppe Mallozzi, Ayush Pandey, Sheng-Jung Yu, Albert Benveniste, Benoit Caillaud, Richard M. Murray, Alberto Sangiovanni-Vincentelli, Sanjit A. Seshia

    Abstract: Contract-based design is a method to facilitate modular system design. While there has been substantial progress on the theory of contracts, there has been less progress on scalable algorithms for the algebraic operations in this theory. In this paper, we present: 1) principles to implement a contract-based design tool at scale and 2) Pacti, a tool that can efficiently compute these operations. We… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

  26. arXiv:2303.03766  [pdf, other

    cs.NI

    Benchmarking and Security Considerations of Wi-Fi FTM for Ranging in IoT Devices

    Authors: Govind Singh, Anshul Pandey, Monika Prakash, Martin Andreoni, Michael Baddeley

    Abstract: The IEEE 802.11mc standard introduces fine time measurement (Wi-Fi FTM), allowing high-precision synchronization between peers and round-trip time calculation (Wi-Fi RTT) for location estimation - typically with a precision of one to two meters. This has considerable advantages over received signal strength (RSS)-based trilateration, which is prone to errors due to multipath reflections. We examin… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  27. arXiv:2303.01746  [pdf, other

    cs.DM cs.CC math.CO

    Complexity of total dominator coloring in graphs

    Authors: Michael A. Henning, Kusum, Arti Pandey, Kaustav Paul

    Abstract: Let $G=(V,E)$ be a graph with no isolated vertices. A vertex $v$ totally dominate a vertex $w$ ($w \ne v$), if $v$ is adjacent to $w$. A set $D \subseteq V$ called a total dominating set of $G$ if every vertex $v\in V$ is totally dominated by some vertex in $D$. The minimum cardinality of a total dominating set is the total domination number of $G$ and is denoted by $γ_t(G)$. A total dominator col… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: V1, 18 pages, 1 figure

  28. Addressing DAO Insider Attacks in IPv6-Based Low-Power and Lossy Networks

    Authors: Sachin Kumar Verma, Abhishek Verma, Avinash Chandra Pandey

    Abstract: Low-Power and Lossy Networks (LLNs) run on resource-constrained devices and play a key role in many Industrial Internet of Things and Cyber-Physical Systems based applications. But, achieving an energy-efficient routing in LLNs is a major challenge nowadays. This challenge is addressed by Routing Protocol for Low-power Lossy Networks (RPL), which is specified in RFC 6550 as a "Proposed Standard" a… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Journal ref: In 2022 IEEE Region 10 Symposium (TENSYMP) (pp. 1-6). IEEE (July, 2022)

  29. arXiv:2302.13031  [pdf, other

    cs.DM cs.CC math.CO

    Cosecure Domination: Hardness Results and Algorithm

    Authors: Kusum, Arti Pandey

    Abstract: For a simple graph $G=(V,E)$ without any isolated vertex, a cosecure dominating set $D$ of $G$ satisfies the following two properties (i) $S$ is a dominating set of $G$, (ii) for every vertex $v \in S$ there exists a vertex $u \in V \setminus S$ such that $uv \in E$ and $(S \setminus \{v\}) \cup \{u\}$ is a dominating set of $G$. The minimum cardinality of a cosecure dominating set of $G$ is calle… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

    Comments: V1, 19 pages, 2 figures

  30. arXiv:2301.09811  [pdf, other

    cs.LG

    Multi-view Kernel PCA for Time series Forecasting

    Authors: Arun Pandey, Hannes De Meulemeester, Bart De Moor, Johan A. K. Suykens

    Abstract: In this paper, we propose a kernel principal component analysis model for multi-variate time series forecasting, where the training and prediction schemes are derived from the multi-view formulation of Restricted Kernel Machines. The training problem is simply an eigenvalue decomposition of the summation of two kernel matrices corresponding to the views of the input and output data. When a linear… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

  31. arXiv:2212.14689  [pdf, other

    q-fin.ST cs.DC cs.IR cs.LG cs.SI

    Cross-Domain Shopping and Stock Trend Analysis

    Authors: Aditya Pandey, Haseeba Fathiya, Nivedita Patel

    Abstract: This paper presents a cross-domain trend analysis that aims to identify and analyze the relationships between stock prices, stock news on Twitter, and users' behaviors on e-commerce websites. The analysis is based on three datasets: a US stock dataset, a stock tweets dataset, and an e-commerce behavior dataset. The analysis is performed using Hadoop, Hive, and Tableau, allowing for efficient and s… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  32. arXiv:2212.13916  [pdf, other

    cs.IR cs.DC cs.LG

    Cross-Domain Consumer Review Analysis

    Authors: Aditya Pandey, Kunal Joshi

    Abstract: The paper presents a cross-domain review analysis on four popular review datasets: Amazon, Yelp, Steam, IMDb. The analysis is performed using Hadoop and Spark, which allows for efficient and scalable processing of large datasets. By examining close to 12 million reviews from these four online forums, we hope to uncover interesting trends in sales and customer sentiment over the years. Our analysis… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  33. arXiv:2212.06149  [pdf, other

    physics.ao-ph cs.AI cs.CV cs.LG

    Forecasting formation of a Tropical Cyclone Using Reanalysis Data

    Authors: Sandeep Kumar, Koushik Biswas, Ashish Kumar Pandey

    Abstract: The tropical cyclone formation process is one of the most complex natural phenomena which is governed by various atmospheric, oceanographic, and geographic factors that varies with time and space. Despite several years of research, accurately predicting tropical cyclone formation remains a challenging task. While the existing numerical models have inherent limitations, the machine learning models… ▽ More

    Submitted 10 December, 2022; originally announced December 2022.

  34. arXiv:2211.11740  [pdf, other

    cs.CL cs.SD eess.AS

    SpeechNet: Weakly Supervised, End-to-End Speech Recognition at Industrial Scale

    Authors: Raphael Tang, Karun Kumar, Gefei Yang, Akshat Pandey, Yajie Mao, Vladislav Belyaev, Madhuri Emmadi, Craig Murray, Ferhan Ture, Jimmy Lin

    Abstract: End-to-end automatic speech recognition systems represent the state of the art, but they rely on thousands of hours of manually annotated speech for training, as well as heavyweight computation for inference. Of course, this impedes commercialization since most companies lack vast human and computational resources. In this paper, we explore training and deploying an ASR system in the label-scarce,… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: Accepted to EMNLP 2022 Industry Track; 9 pages, 7 figures

  35. arXiv:2211.03451  [pdf, other

    cs.HC cs.CV eess.SP

    XAI-BayesHAR: A novel Framework for Human Activity Recognition with Integrated Uncertainty and Shapely Values

    Authors: Anand Dubey, Niall Lyons, Avik Santra, Ashutosh Pandey

    Abstract: Human activity recognition (HAR) using IMU sensors, namely accelerometer and gyroscope, has several applications in smart homes, healthcare and human-machine interface systems. In practice, the IMU-based HAR system is expected to encounter variations in measurement due to sensor degradation, alien environment or sensor noise and will be subjected to unknown activities. In view of practical deploym… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

  36. arXiv:2211.01413  [pdf, other

    cs.LG cs.AI

    Harnessing the Power of Explanations for Incremental Training: A LIME-Based Approach

    Authors: Arnab Neelim Mazumder, Niall Lyons, Ashutosh Pandey, Avik Santra, Tinoosh Mohsenin

    Abstract: Explainability of neural network prediction is essential to understand feature importance and gain interpretable insight into neural network performance. However, explanations of neural network outcomes are mostly limited to visualization, and there is scarce work that looks to use these explanations as feedback to improve model performance. In this work, model explanations are fed back to the fee… ▽ More

    Submitted 11 July, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: Accepted at EUSIPCO 2023

  37. arXiv:2210.13318  [pdf, other

    eess.AS cs.SD

    Time-Domain Speech Enhancement for Robust Automatic Speech Recognition

    Authors: Yufeng Yang, Ashutosh Pandey, DeLiang Wang

    Abstract: It has been shown that the intelligibility of noisy speech can be improved by speech enhancement algorithms. However, speech enhancement has not been established as an effective frontend for robust automatic speech recognition (ASR) in noisy conditions compared to an ASR model trained on noisy speech directly. The divide between speech enhancement and ASR impedes the progress of robust ASR systems… ▽ More

    Submitted 20 June, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

    Comments: Accepted by Interspeech 2023, 5 pages, 2 figures

  38. arXiv:2210.06417  [pdf, other

    cs.HC cs.CY cs.GR cs.SI

    BiaScope: Visual Unfairness Diagnosis for Graph Embeddings

    Authors: Agapi Rissaki, Bruno Scarone, David Liu, Aditeya Pandey, Brennan Klein, Tina Eliassi-Rad, Michelle A. Borkin

    Abstract: The issue of bias (i.e., systematic unfairness) in machine learning models has recently attracted the attention of both researchers and practitioners. For the graph mining community in particular, an important goal toward algorithmic fairness is to detect and mitigate bias incorporated into graph embeddings since they are commonly used in human-centered applications, e.g., social-media recommendat… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

    Comments: Accepted to VDS at IEEE VIS 2022

  39. arXiv:2210.04885  [pdf, other

    cs.CV cs.CL

    What the DAAM: Interpreting Stable Diffusion Using Cross Attention

    Authors: Raphael Tang, Linqing Liu, Akshat Pandey, Zhiying Jiang, Gefei Yang, Karun Kumar, Pontus Stenetorp, Jimmy Lin, Ferhan Ture

    Abstract: Large-scale diffusion neural networks represent a substantial milestone in text-to-image generation, but they remain poorly understood, lacking interpretability analyses. In this paper, we perform a text-image attribution analysis on Stable Diffusion, a recently open-sourced model. To produce pixel-level attribution maps, we upscale and aggregate cross-attention word-pixel scores in the denoising… ▽ More

    Submitted 8 December, 2022; v1 submitted 10 October, 2022; originally announced October 2022.

    Comments: First two authors contributed equally. 13 pages, 15 figures

  40. arXiv:2209.15428  [pdf, other

    cs.RO

    PyPose: A Library for Robot Learning with Physics-based Optimization

    Authors: Chen Wang, Dasong Gao, Kuan Xu, Junyi Geng, Yaoyu Hu, Yuheng Qiu, Bowen Li, Fan Yang, Brady Moon, Abhinav Pandey, Aryan, Jiahe Xu, Tianhao Wu, Haonan He, Daning Huang, Zhongqiang Ren, Shibo Zhao, Taimeng Fu, Pranay Reddy, Xiao Lin, Wenshan Wang, Jingnan Shi, Rajat Talak, Kun Cao, Yi Du , et al. (12 additional authors not shown)

    Abstract: Deep learning has had remarkable success in robotic perception, but its data-centric nature suffers when it comes to generalizing to ever-changing environments. By contrast, physics-based optimization generalizes better, but it does not perform as well in complicated tasks due to the lack of high-level semantic information and reliance on manual parametric tuning. To take advantage of these two co… ▽ More

    Submitted 24 March, 2023; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: Project Website: https://pypose.org Documentation: https://pypose.org/docs/ Tutorial: https://pypose.org/tutorials/ Source code: https://github.com/pypose/pypose

    Journal ref: IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023

  41. arXiv:2208.03175  [pdf, other

    cs.HC

    MEDLEY: Intent-based Recommendations to Support Dashboard Composition

    Authors: Aditeya Pandey, Arjun Srinivasan, Vidya Setlur

    Abstract: Despite the ever-growing popularity of dashboards across a wide range of domains, their authoring still remains a tedious and complex process. Current tools offer considerable support for creating individual visualizations but provide limited support for discovering groups of visualizations that can be collectively useful for composing analytic dashboards. To address this problem, we present MEDLE… ▽ More

    Submitted 5 August, 2022; originally announced August 2022.

    Comments: 11 pages, 8 figures, 2 tables, accepted to IEEE Transaction on Visualization and Graphics (also appearing in the proceedings of IEEE VIS 2022)

    ACM Class: H.5.0

  42. arXiv:2207.06882  [pdf, other

    cs.CL cs.AI cs.LG

    Multilinguals at SemEval-2022 Task 11: Complex NER in Semantically Ambiguous Settings for Low Resource Languages

    Authors: Amit Pandey, Swayatta Daw, Narendra Babu Unnam, Vikram Pudi

    Abstract: We leverage pre-trained language models to solve the task of complex NER for two low-resource languages: Chinese and Spanish. We use the technique of Whole Word Masking(WWM) to boost the performance of masked language modeling objective on large and unsupervised corpora. We experiment with multiple neural network architectures, incorporating CRF, BiLSTMs, and Linear Classifiers on top of a fine-tu… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  43. arXiv:2206.13655  [pdf, other

    cs.LG cs.DC

    Deployment of ML Models using Kubeflow on Different Cloud Providers

    Authors: Aditya Pandey, Maitreya Sonawane, Sumit Mamtani

    Abstract: This project aims to explore the process of deploying Machine learning models on Kubernetes using an open-source tool called Kubeflow [1] - an end-to-end ML Stack orchestration toolkit. We create end-to-end Machine Learning models on Kubeflow in the form of pipelines and analyze various points including the ease of setup, deployment models, performance, limitations and features of the tool. We hop… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

  44. arXiv:2205.03673  [pdf, other

    cs.LG eess.SP

    Towards Practical Physics-Informed ML Design and Evaluation for Power Grid

    Authors: Shimiao Li, Amritanshu Pandey, Larry Pileggi

    Abstract: When applied to a real-world safety critical system like the power grid, general machine learning methods suffer from expensive training, non-physical solutions, and limited interpretability. To address these challenges for power grids, many recent works have explored the inclusion of grid physics (i.e., domain expertise) into their method design, primarily through including system constraints and… ▽ More

    Submitted 24 May, 2022; v1 submitted 7 May, 2022; originally announced May 2022.

  45. arXiv:2204.11286  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    Improved far-field speech recognition using Joint Variational Autoencoder

    Authors: Shashi Kumar, Shakti P. Rath, Abhishek Pandey

    Abstract: Automatic Speech Recognition (ASR) systems suffer considerably when source speech is corrupted with noise or room impulse responses (RIR). Typically, speech enhancement is applied in both mismatched and matched scenario training and testing. In matched setting, acoustic model (AM) is trained on dereverberated far-field features while in mismatched setting, AM is fixed. In recent past, mapping spee… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    Comments: 5 pages, 2 figures, 3 tables

  46. arXiv:2204.02173  [pdf, other

    cs.CL cs.AI

    Multilinguals at SemEval-2022 Task 11: Transformer Based Architecture for Complex NER

    Authors: Amit Pandey, Swayatta Daw, Vikram Pudi

    Abstract: We investigate the task of complex NER for the English language. The task is non-trivial due to the semantic ambiguity of the textual structure and the rarity of occurrence of such entities in the prevalent literature. Using pre-trained language models such as BERT, we obtain a competitive performance on this task. We qualitatively analyze the performance of multiple architectures for this task. A… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  47. arXiv:2202.04069  [pdf, other

    cs.CV cs.LG eess.IV

    Detecting and Localizing Copy-Move and Image-Splicing Forgery

    Authors: Aditya Pandey, Anshuman Mitra

    Abstract: In the world of fake news and deepfakes, there have been an alarmingly large number of cases of images being tampered with and published in newspapers, used in court, and posted on social media for defamation purposes. Detecting these tampered images is an important task and one we try to tackle. In this paper, we focus on the methods to detect if an image has been tampered with using both Deep Le… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  48. arXiv:2112.05486  [pdf, other

    cs.DM math.CO

    Complexity of Paired Domination in AT-free and Planar Graphs

    Authors: Vikash Tripathi, Ton Kloks, Arti Pandey, Kaustav Paul, Hung-Lung Wang

    Abstract: For a graph $G=(V,E)$, a subset $D$ of vertex set $V$, is a dominating set of $G$ if every vertex not in $D$ is adjacent to atleast one vertex of $D$. A dominating set $D$ of a graph $G$ with no isolated vertices is called a paired dominating set (PD-set), if $G[D]$, the subgraph induced by $D$ in $G$ has a perfect matching. The Min-PD problem requires to compute a PD-set of minimum cardinality. T… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  49. arXiv:2112.02248  [pdf, other

    cs.DS cs.DM

    Algorithms for Maximum Internal Spanning Tree Problem for Some Graph Classes

    Authors: Gopika Sharma, Arti Pandey, Michael C. Wigal

    Abstract: For a given graph $G$, a maximum internal spanning tree of $G$ is a spanning tree of $G$ with maximum number of internal vertices. The Maximum Internal Spanning Tree (MIST) problem is to find a maximum internal spanning tree of the given graph. The MIST problem is a generalization of the Hamiltonian path problem. Since the Hamiltonian path problem is NP-hard, even for bipartite and chordal graphs,… ▽ More

    Submitted 23 December, 2021; v1 submitted 4 December, 2021; originally announced December 2021.

  50. arXiv:2112.01025  [pdf, other

    eess.AS cs.CL cs.SD

    A Mixture of Expert Based Deep Neural Network for Improved ASR

    Authors: Vishwanath Pratap Singh, Shakti P. Rath, Abhishek Pandey

    Abstract: This paper presents a novel deep learning architecture for acoustic model in the context of Automatic Speech Recognition (ASR), termed as MixNet. Besides the conventional layers, such as fully connected layers in DNN-HMM and memory cells in LSTM-HMM, the model uses two additional layers based on Mixture of Experts (MoE). The first MoE layer operating at the input is based on pre-defined broad phon… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.