Skip to main content

Showing 1–50 of 81 results for author: Debnath

  1. arXiv:2407.13318  [pdf, other

    cs.CR

    A new approach to delegate signing rights to proxy signers using isogeny-based cryptography

    Authors: Kunal Dey, Somnath Kumar, Vikas Srivastava, Sumit Kumar Debnath

    Abstract: E-governance is a two-way protocol through which one can use government services, share data and request information. It refers to the use of communication and information technologies to provide government services to public in an efficient and fast manner. In addition, any document submitted to the e-Government system must be authenticated by a government officer using a digital signature scheme… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2407.03486  [pdf, other

    cs.CV

    Celeb-FBI: A Benchmark Dataset on Human Full Body Images and Age, Gender, Height and Weight Estimation using Deep Learning Approach

    Authors: Pronay Debnath, Usafa Akther Rifa, Busra Kamal Rafa, Ali Haider Talukder Akib, Md. Aminur Rahman

    Abstract: The scarcity of comprehensive datasets in surveillance, identification, image retrieval systems, and healthcare poses a significant challenge for researchers in exploring new methodologies and advancing knowledge in these respective fields. Furthermore, the need for full-body image datasets with detailed attributes like height, weight, age, and gender is particularly significant in areas such as f… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted for publication in 3rd International Conference on Advanced Communication and Intelligent Systems

  3. arXiv:2406.15335  [pdf, other

    cs.CV cs.CY

    Keystroke Dynamics Against Academic Dishonesty in the Age of LLMs

    Authors: Debnath Kundu, Atharva Mehta, Rajesh Kumar, Naman Lal, Avinash Anand, Apoorv Singh, Rajiv Ratn Shah

    Abstract: The transition to online examinations and assignments raises significant concerns about academic integrity. Traditional plagiarism detection systems often struggle to identify instances of intelligent cheating, particularly when students utilize advanced generative AI tools to craft their responses. This study proposes a keystroke dynamics-based method to differentiate between bona fide and assist… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Accepted for publication at The IEEE International Joint Conference on Biometrics (IJCB2024), contains 9 pages, 3 figures, 3 tables

    ACM Class: I.5.4

  4. arXiv:2405.19948  [pdf, other

    cs.CR cs.SE

    Scalable Test Generation to Trigger Rare Targets in High-Level Synthesizable IPs for Cloud FPGAs

    Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay

    Abstract: High-Level Synthesis (HLS) has transformed the development of complex Hardware IPs (HWIP) by offering abstraction and configurability through languages like SystemC/C++, particularly for Field Programmable Gate Array (FPGA) accelerators in high-performance and cloud computing contexts. These IPs can be synthesized for different FPGA boards in cloud, offering compact area requirements and enhanced… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  5. arXiv:2405.12550  [pdf, other

    cs.CR

    Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities

    Authors: Anichur Rahman, Dipanjali Kundu, Tanoy Debnath, Muaz Rahman, Airin Afroj Aishi, Jahidul Islam

    Abstract: Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things (IIoT) are not only leading promising technologies in the world, but also these technologies facilitate the current society to develop the standard of living and make it easier for users. However, these technologies have been applied in various domains for different purposes. Then, these are successfu… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  6. arXiv:2405.10543  [pdf, other

    cs.CR

    SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification

    Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman

    Abstract: Agriculture has a significant role in a country's economy. The "SMARD" project aims to strengthen the country's agricultural sector by giving farmers with the information and tools they need to solve common difficulties and increase productivity. The project provides farmers with information on crop care, seed selection, and disease management best practices, as well as access to tools for recogni… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  7. arXiv:2405.07338  [pdf, other

    eess.IV cs.CV

    Explainable Convolutional Neural Networks for Retinal Fundus Classification and Cutting-Edge Segmentation Models for Retinal Blood Vessels from Fundus Images

    Authors: Fatema Tuj Johora Faria, Mukaffi Bin Moin, Pronay Debnath, Asif Iftekher Fahim, Faisal Muhammad Shah

    Abstract: Our research focuses on the critical field of early diagnosis of disease by examining retinal blood vessels in fundus images. While automatic segmentation of retinal blood vessels holds promise for early detection, accurate analysis remains challenging due to the limitations of existing methods, which often lack discrimination power and are susceptible to influences from pathological regions. Our… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  8. arXiv:2405.07010  [pdf, other

    cs.CY cs.CL

    Deciphering public attention to geoengineering and climate issues using machine learning and dynamic analysis

    Authors: Ramit Debnath, Pengyu Zhang, Tianzhu Qin, R. Michael Alvarez, Shaun D. Fitzgerald

    Abstract: As the conversation around using geoengineering to combat climate change intensifies, it is imperative to engage the public and deeply understand their perspectives on geoengineering research, development, and potential deployment. Through a comprehensive data-driven investigation, this paper explores the types of news that captivate public interest in geoengineering. We delved into 30,773 English… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: 46 page, 6 main figures and SI

    ACM Class: J.4; K.4

  9. arXiv:2405.04716  [pdf, other

    cs.CY cs.AI cs.LG cs.NE

    Physics-based deep learning reveals rising heating demand heightens air pollution in Norwegian cities

    Authors: Cong Cao, Ramit Debnath, R. Michael Alvarez

    Abstract: Policymakers frequently analyze air quality and climate change in isolation, disregarding their interactions. This study explores the influence of specific climate factors on air quality by contrasting a regression model with K-Means Clustering, Hierarchical Clustering, and Random Forest techniques. We employ Physics-based Deep Learning (PBDL) and Long Short-Term Memory (LSTM) to examine the air p… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 52 pages, 23 figures

    ACM Class: K.4.1; J.2; I.2

  10. arXiv:2405.02937  [pdf, other

    cs.CL

    Unraveling the Dominance of Large Language Models Over Transformer Models for Bangla Natural Language Inference: A Comprehensive Study

    Authors: Fatema Tuj Johora Faria, Mukaffi Bin Moin, Asif Iftekher Fahim, Pronay Debnath, Faisal Muhammad Shah

    Abstract: Natural Language Inference (NLI) is a cornerstone of Natural Language Processing (NLP), providing insights into the entailment relationships between text pairings. It is a critical component of Natural Language Understanding (NLU), demonstrating the ability to extract information from spoken or written interactions. NLI is mainly concerned with determining the entailment relationship between two s… ▽ More

    Submitted 7 May, 2024; v1 submitted 5 May, 2024; originally announced May 2024.

    Comments: Accepted in 4th International Conference on Computing and Communication Networks (ICCCNet-2024)

  11. arXiv:2404.12330  [pdf, other

    cs.CV cs.MM

    A Perspective on Deep Vision Performance with Standard Image and Video Codecs

    Authors: Christoph Reich, Oliver Hahn, Daniel Cremers, Stefan Roth, Biplob Debnath

    Abstract: Resource-constrained hardware, such as edge devices or cell phones, often rely on cloud servers to provide the required computational resources for inference in deep vision models. However, transferring image and video data from an edge or mobile device to a cloud server requires coding to deal with network constraints. The use of standardized codecs, such as JPEG or H.264, is prevalent and requir… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024 Workshop on AI for Streaming (AIS)

  12. arXiv:2404.12309  [pdf, other

    cs.CV cs.IR cs.LG

    iRAG: An Incremental Retrieval Augmented Generation System for Videos

    Authors: Md Adnan Arefeen, Biplob Debnath, Md Yusuf Sarwar Uddin, Srimat Chakradhar

    Abstract: Retrieval augmented generation (RAG) systems combine the strengths of language generation and information retrieval to power many real-world applications like chatbots. Use of RAG for combined understanding of multimodal data such as text, images and videos is appealing but two critical limitations exist: one-time, upfront capture of all content in large multimodal data as text descriptions entail… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  13. arXiv:2404.05159  [pdf

    cs.CL cs.CR cs.LG

    Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods

    Authors: Roopkatha Dey, Aivy Debnath, Sayak Kumar Dutta, Kaustav Ghosh, Arijit Mitra, Arghya Roy Chowdhury, Jaydip Sen

    Abstract: In various real-world applications such as machine translation, sentiment analysis, and question answering, a pivotal role is played by NLP models, facilitating efficient communication and decision-making processes in domains ranging from healthcare to finance. However, a significant challenge is posed to the robustness of these natural language processing models by text adversarial attacks. These… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: This report pertains to the Capstone Project done by Group 2 of the Fall batch of 2023 students at Praxis Tech School, Kolkata, India. The reports consists of 28 pages and it includes 10 tables. This is the preprint which will be submitted to IEEE CONIT 2024 for review

  14. arXiv:2404.03566  [pdf, other

    cs.CV

    PointInfinity: Resolution-Invariant Point Diffusion Models

    Authors: Zixuan Huang, Justin Johnson, Shoubhik Debnath, James M. Rehg, Chao-Yuan Wu

    Abstract: We present PointInfinity, an efficient family of point cloud diffusion models. Our core idea is to use a transformer-based architecture with a fixed-size, resolution-invariant latent representation. This enables efficient training with low-resolution point clouds, while allowing high-resolution point clouds to be generated during inference. More importantly, we show that scaling the test-time reso… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted to CVPR 2024, project website at https://zixuanh.com/projects/pointinfinity

  15. arXiv:2403.18247  [pdf, other

    cs.CR cs.IT

    An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay

    Abstract: Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital sign… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  16. arXiv:2403.15336  [pdf, other

    eess.AS cs.MM

    Dialogue Understandability: Why are we streaming movies with subtitles?

    Authors: Helard Becerra Martinez, Alessandro Ragano, Diptasree Debnath, Asad Ullah, Crisron Rudolf Lucas, Martin Walsh, Andrew Hines

    Abstract: Watching movies and TV shows with subtitles enabled is not simply down to audibility or speech intelligibility. A variety of evolving factors related to technological advances, cinema production and social behaviour challenge our perception and understanding. This study seeks to formalise and give context to these influential factors under a wider and novel term referred to as Dialogue Understanda… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  17. arXiv:2403.11494  [pdf, other

    cs.CV

    CCC++: Optimized Color Classified Colorization with Segment Anything Model (SAM) Empowered Object Selective Color Harmonization

    Authors: Mrityunjoy Gain, Avi Deb Raha, Rameswar Debnath

    Abstract: In this paper, we formulate the colorization problem into a multinomial classification problem and then apply a weighted function to classes. We propose a set of formulas to transform color values into color classes and vice versa. To optimize the classes, we experiment with different bin sizes for color class transformation. Observing class appearance, standard deviation, and model parameters on… ▽ More

    Submitted 24 June, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2403.01476

  18. arXiv:2403.01476  [pdf, other

    cs.CV

    CCC: Color Classified Colorization

    Authors: Mrityunjoy Gain, Avi Deb Raha, Rameswar Debnath

    Abstract: Automatic colorization of gray images with objects of different colors and sizes is challenging due to inter- and intra-object color variation and the small area of the main objects due to extensive backgrounds. The learning process often favors dominant features, resulting in a biased model. In this paper, we formulate the colorization problem into a multinomial classification problem and then ap… ▽ More

    Submitted 3 March, 2024; originally announced March 2024.

  19. arXiv:2401.13631  [pdf, other

    cs.NI

    Quantifying the Impact of Frame Preemption on Combined TSN Shapers

    Authors: Rubi Debnath, Philipp Hortig, Luxi Zhao, Sebastian Steinhorst

    Abstract: Different scheduling mechanisms in Time Sensitive Networking (TSN) can be integrated together to design and support complex architectures with enhanced capabilities for mixed critical networks. Integrating Frame Preemption (FP) with Credit-Based Shaper (CBS) and Gate Control List (GCL) opens up different modes and configuration choices resulting in a complex evaluation of several possibilities and… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

    Comments: Accepted in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2024

  20. arXiv:2401.01356  [pdf, other

    cs.IR

    Efficient Indexing of Meta-Data (Extracted from Educational Videos)

    Authors: Shalika Kumbham, Abhijit Debnath, Krothapalli Sreenivasa Rao

    Abstract: Video lectures are becoming more popular and in demand as online classroom teaching is becoming more prevalent. Massive Open Online Courses (MOOCs), such as NPTEL, have been creating high-quality educational content that is freely accessible to students online. A large number of colleges across the country are now using NPTEL videos in their classrooms. So more video lectures are being recorded, m… ▽ More

    Submitted 11 December, 2023; originally announced January 2024.

  21. arXiv:2401.00681  [pdf, ps, other

    cs.CE

    Mitigating Procrastination in Spatial Crowdsourcing Via Efficient Scheduling Algorithm

    Authors: Naren Debnath, Sajal Mukhopadhyay, Fatos Xhafa

    Abstract: Several works related to spatial crowdsourcing have been proposed in the direction where the task executers are to perform the tasks within the stipulated deadlines. Though the deadlines are set, it may be a practical scenario that majority of the task executers submit the tasks as late as possible. This situation where the task executers may delay their task submission is termed as procrastinatio… ▽ More

    Submitted 7 February, 2024; v1 submitted 1 January, 2024; originally announced January 2024.

  22. arXiv:2312.16322  [pdf, other

    cs.CR

    Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management

    Authors: Vikas Srivastava, Paresh Baidya, Sihem Mesnager, Debasish Roy, Sumit Kumar Debnath

    Abstract: Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secur… ▽ More

    Submitted 25 March, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  23. arXiv:2312.16318  [pdf, other

    quant-ph cs.CR

    Quantum Secure Protocols for Multiparty Computations

    Authors: Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica

    Abstract: Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face the threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand quantum attacks. We first present the design and… ▽ More

    Submitted 17 July, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  24. arXiv:2311.03792  [pdf, other

    cs.CL

    Character-Level Bangla Text-to-IPA Transcription Using Transformer Architecture with Sequence Alignment

    Authors: Jakir Hasan, Shrestha Datta, Ameya Debnath

    Abstract: The International Phonetic Alphabet (IPA) is indispensable in language learning and understanding, aiding users in accurate pronunciation and comprehension. Additionally, it plays a pivotal role in speech therapy, linguistic research, accurate transliteration, and the development of text-to-speech systems, making it an essential tool across diverse fields. Bangla being 7th as one of the widely use… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: Achieved top position with a word error rate of 0.10582 in the public ranking of DataVerse Challenge - ITVerse 2023 (link: https://www.kaggle.com/competitions/dataverse_2023/). All codes can be found on the respective competition webpage

  25. arXiv:2309.16282  [pdf, other

    cs.CR

    AgEncID: Aggregate Encryption Individual Decryption of Key for FPGA Bitstream IP Cores in Cloud

    Authors: Mukta Debnath, Krishnendu Guha, Debasri Saha, Susmita Sur-Kolay

    Abstract: Cloud computing platforms are progressively adopting Field Programmable Gate Arrays to deploy specialized hardware accelerators for specific computational tasks. However, the security of FPGA-based bitstream for Intellectual Property, IP cores from unauthorized interception in cloud environments remains a prominent concern. Existing methodologies for protection of such bitstreams possess several l… ▽ More

    Submitted 4 October, 2023; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: 21 pages, 7 figures, 5 tables

  26. arXiv:2309.12107  [pdf, ps, other

    cs.CL

    A Computational Analysis of Vagueness in Revisions of Instructional Texts

    Authors: Alok Debnath, Michael Roth

    Abstract: WikiHow is an open-domain repository of instructional articles for a variety of tasks, which can be revised by users. In this paper, we extract pairwise versions of an instruction before and after a revision was made. Starting from a noisy dataset of revision histories, we specifically extract and analyze edits that involve cases of vagueness in instructions. We further investigate the ability of… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: EACL 2021 best student paper

  27. Differentiable JPEG: The Devil is in the Details

    Authors: Christoph Reich, Biplob Debnath, Deep Patel, Srimat Chakradhar

    Abstract: JPEG remains one of the most widespread lossy image coding methods. However, the non-differentiable nature of JPEG restricts the application in deep learning pipelines. Several differentiable approximations of JPEG have recently been proposed to address this issue. This paper conducts a comprehensive review of existing diff. JPEG approaches and identifies critical details that have been missed by… ▽ More

    Submitted 22 December, 2023; v1 submitted 13 September, 2023; originally announced September 2023.

    Comments: Accepted at WACV 2024. Project page: https://christophreich1996.github.io/differentiable_jpeg/ WACV paper: https://openaccess.thecvf.com/content/WACV2024/html/Reich_Differentiable_JPEG_The_Devil_Is_in_the_Details_WACV_2024_paper.html

  28. arXiv:2309.00841  [pdf, other

    cs.CL cs.AI cs.IR

    LeanContext: Cost-Efficient Domain-Specific Question Answering Using LLMs

    Authors: Md Adnan Arefeen, Biplob Debnath, Srimat Chakradhar

    Abstract: Question-answering (QA) is a significant application of Large Language Models (LLMs), shaping chatbot capabilities across healthcare, education, and customer service. However, widespread LLM integration presents a challenge for small businesses due to the high expenses of LLM API usage. Costs rise rapidly when domain-specific data (context) is used alongside queries for accurate domain-specific LL… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

    Comments: The paper is under review

  29. arXiv:2308.16215  [pdf, other

    eess.IV cs.CV cs.LG cs.MM

    Deep Video Codec Control for Vision Models

    Authors: Christoph Reich, Biplob Debnath, Deep Patel, Tim Prangemeier, Daniel Cremers, Srimat Chakradhar

    Abstract: Standardized lossy video coding is at the core of almost all real-world video processing pipelines. Rate control is used to enable standard codecs to adapt to different network bandwidth conditions or storage constraints. However, standard video codecs (e.g., H.264) and their rate control modules aim to minimize video distortion w.r.t. human quality assessment. We demonstrate empirically that stan… ▽ More

    Submitted 16 April, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Accepted at CVPR 2024 Workshop on AI for Streaming (AIS)

  30. Integrating Information Technology in Healthcare: Recent Developments, Challenges, and Future Prospects for Urban and Regional Health

    Authors: Shipu Debnath

    Abstract: The use of technology in healthcare has become increasingly popular in recent years, with the potential to improve how healthcare is delivered, patient outcomes, and cost-effectiveness. This review paper provides an overview of how technology has been used in healthcare, particularly in cities and for personalized medicine. The paper discusses different ways technology is being used in healthcare,… ▽ More

    Submitted 5 August, 2023; v1 submitted 30 July, 2023; originally announced July 2023.

  31. arXiv:2307.13581  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Comparing Forward and Inverse Design Paradigms: A Case Study on Refractory High-Entropy Alloys

    Authors: Arindam Debnath, Lavanya Raman, Wenjie Li, Adam M. Krajewski, Marcia Ahn, Shuang Lin, Shunli Shang, Allison M. Beese, Zi-Kui Liu, Wesley F. Reinhart

    Abstract: The rapid design of advanced materials is a topic of great scientific interest. The conventional, ``forward'' paradigm of materials design involves evaluating multiple candidates to determine the best candidate that matches the target properties. However, recent advances in the field of deep learning have given rise to the possibility of an ``inverse'' design paradigm for advanced materials, where… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

  32. arXiv:2306.12634  [pdf, ps, other

    quant-ph cs.CV

    Efficient quantum image representation and compression circuit using zero-discarded state preparation approach

    Authors: Md Ershadul Haque, Manoranjan Paul, Anwaar Ulhaq, Tanmoy Debnath

    Abstract: Quantum image computing draws a lot of attention due to storing and processing image data faster than classical. With increasing the image size, the number of connections also increases, leading to the circuit complex. Therefore, efficient quantum image representation and compression issues are still challenging. The encoding of images for representation and compression in quantum systems is diffe… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: 7 figures

  33. arXiv:2304.09617  [pdf, other

    cs.RO

    Towards Autonomous Selective Harvesting: A Review of Robot Perception, Robot Design, Motion Planning and Control

    Authors: Vishnu Rajendran S, Bappaditya Debnath, Bappaditya Debnath, Sariah Mghames, Willow Mandil, Soran Parsa, Simon Parsons, Amir Ghalamzan-E

    Abstract: This paper provides an overview of the current state-of-the-art in selective harvesting robots (SHRs) and their potential for addressing the challenges of global food production. SHRs have the potential to increase productivity, reduce labour costs, and minimise food waste by selectively harvesting only ripe fruits and vegetables. The paper discusses the main components of SHRs, including percepti… ▽ More

    Submitted 19 April, 2023; originally announced April 2023.

    Comments: Preprint: to be appeared in Journal of Field Robotics

  34. arXiv:2301.03947  [pdf, other

    cs.RO cs.AI cs.CV

    Autonomous Strawberry Picking Robotic System (Robofruit)

    Authors: Soran Parsa, Bappaditya Debnath, Muhammad Arshad Khan, Amir Ghalamzan E.

    Abstract: Challenges in strawberry picking made selective harvesting robotic technology demanding. However, selective harvesting of strawberries is complicated forming a few scientific research questions. Most available solutions only deal with a specific picking scenario, e.g., picking only a single variety of fruit in isolation. Nonetheless, most economically viable (e.g. high-yielding and/or disease-resi… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

    Comments: To appear in the Journal of Field Robotics (Accepted) Please watch the video at https://www.youtube.com/watch?v=v8gGAvsISXU

  35. arXiv:2301.00808  [pdf, other

    cs.CV

    ConvNeXt V2: Co-designing and Scaling ConvNets with Masked Autoencoders

    Authors: Sanghyun Woo, Shoubhik Debnath, Ronghang Hu, Xinlei Chen, Zhuang Liu, In So Kweon, Saining Xie

    Abstract: Driven by improved architectures and better representation learning frameworks, the field of visual recognition has enjoyed rapid modernization and performance boost in the early 2020s. For example, modern ConvNets, represented by ConvNeXt, have demonstrated strong performance in various scenarios. While these models were originally designed for supervised learning with ImageNet labels, they can a… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Comments: Code and models available at https://github.com/facebookresearch/ConvNeXt-V2

  36. arXiv:2212.13169  [pdf, ps, other

    cs.IT

    Quantum Codes from additive constacyclic codes over a mixed alphabet and the MacWilliams identities

    Authors: Indibar Debnath, Ashutosh Singh, Om Prakash, Abdollah Alhevaz

    Abstract: Let $\mathbb{Z}_p$ be the ring of integers modulo a prime number $p$ where $p-1$ is a quadratic residue modulo $p$. This paper presents the study of constacyclic codes over chain rings $\mathcal{R}=\frac{\mathbb{Z}_p[u]}{\langle u^2\rangle}$ and $\mathcal{S}=\frac{\mathbb{Z}_p[u]}{\langle u^3\rangle}$. We also study additive constacyclic codes over $\mathcal{R}\mathcal{S}$ and… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: 22 pages

    MSC Class: 94B05; 94B15; 94B35; 94B60

  37. arXiv:2212.08801  [pdf, other

    cs.RO cs.CV

    Comparison of Model-Free and Model-Based Learning-Informed Planning for PointGoal Navigation

    Authors: Yimeng Li, Arnab Debnath, Gregory J. Stein, Jana Kosecka

    Abstract: In recent years several learning approaches to point goal navigation in previously unseen environments have been proposed. They vary in the representations of the environments, problem decomposition, and experimental evaluation. In this work, we compare the state-of-the-art Deep Reinforcement Learning based approaches with Partially Observable Markov Decision Process (POMDP) formulation of the poi… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: text overlap with arXiv:2211.07898

  38. arXiv:2212.07079  [pdf, other

    quant-ph cs.CV cs.CY

    A novel state connection strategy for quantum computing to represent and compress digital images

    Authors: Md Ershadul Haque, Manoranjan Paul, Tanmoy Debnath

    Abstract: Quantum image processing draws a lot of attention due to faster data computation and storage compared to classical data processing systems. Converting classical image data into the quantum domain and state label preparation complexity is still a challenging issue. The existing techniques normally connect the pixel values and the state position directly. Recently, the EFRQI (efficient flexible repr… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

    Comments: 8 pages, conference

  39. arXiv:2212.03558  [pdf, other

    cs.CL cs.SD eess.AS stat.ML

    Low-Resource End-to-end Sanskrit TTS using Tacotron2, WaveGlow and Transfer Learning

    Authors: Ankur Debnath, Shridevi S Patil, Gangotri Nadiger, Ramakrishnan Angarai Ganesan

    Abstract: End-to-end text-to-speech (TTS) systems have been developed for European languages like English and Spanish with state-of-the-art speech quality, prosody, and naturalness. However, development of end-to-end TTS for Indian languages is lagging behind in terms of quality. The challenges involved in such a task are: 1) scarcity of quality training data; 2) low efficiency during training and inference… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

  40. arXiv:2211.07898  [pdf, other

    cs.RO cs.CV

    Learning-Augmented Model-Based Planning for Visual Exploration

    Authors: Yimeng Li, Arnab Debnath, Gregory Stein, Jana Kosecka

    Abstract: We consider the problem of time-limited robotic exploration in previously unseen environments where exploration is limited by a predefined amount of time. We propose a novel exploration approach using learning-augmented model-based planning. We generate a set of subgoals associated with frontiers on the current map and derive a Bellman Equation for exploration with these subgoals. Visual sensing a… ▽ More

    Submitted 9 August, 2023; v1 submitted 14 November, 2022; originally announced November 2022.

    Comments: Accepted to IROS 2023

  41. Modeling Inter-Dependence Between Time and Mark in Multivariate Temporal Point Processes

    Authors: Govind Waghmare, Ankur Debnath, Siddhartha Asthana, Aakarsh Malhotra

    Abstract: Temporal Point Processes (TPP) are probabilistic generative frameworks. They model discrete event sequences localized in continuous time. Generally, real-life events reveal descriptive information, known as marks. Marked TPPs model time and marks of the event together for practical relevance. Conditioned on past events, marked TPPs aim to learn the joint distribution of the time and the mark of th… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

  42. arXiv:2210.07224  [pdf, other

    cs.CV

    Exploring Long-Sequence Masked Autoencoders

    Authors: Ronghang Hu, Shoubhik Debnath, Saining Xie, Xinlei Chen

    Abstract: Masked Autoencoding (MAE) has emerged as an effective approach for pre-training representations across multiple domains. In contrast to discrete tokens in natural languages, the input for image MAE is continuous and subject to additional specifications. We systematically study each input specification during the pre-training stage, and find sequence length is a key axis that further scales MAE. Ou… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: 11 pages

  43. arXiv:2208.14277  [pdf, other

    quant-ph cs.IR

    Advance quantum image representation and compression using DCTEFRQI approach

    Authors: Md Ershadul Haque, Manoranjon Paul, Anwaar Ulhaq, Tanmoy Debnath

    Abstract: In recent year, quantum image processing got a lot of attention in the field of image processing due to opportunity to place huge image data in quantum Hilbert space. Hilbert space or Euclidean space has infinite dimension to locate and process the image data faster. Moreover, several researches show that, the computational time of quantum process is faster than classical computer. By encoding and… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  44. arXiv:2208.09074  [pdf, other

    cs.RO

    dPMP-Deep Probabilistic Motion Planning: A use case in Strawberry Picking Robot

    Authors: Alessandra Tafuro, Bappaditya Debnath, Andrea M. Zanchettin, Amir Ghalamzan E

    Abstract: This paper presents a novel probabilistic approach to deep robot learning from demonstrations (LfD). Deep movement primitives (DMPs) are deterministic LfD model that maps visual information directly into a robot trajectory. This paper extends DMPs and presents a deep probabilistic model that maps the visual information into a distribution of effective robot trajectories. The architecture that lead… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: To appear In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2022

  45. arXiv:2208.00825  [pdf, other

    cs.SE cs.HC

    How Do Requirements Evolve During Elicitation? An Empirical Study Combining Interviews and App Store Analysis

    Authors: Alessio Ferrari, Paola Spoletini, Sourav Debnath

    Abstract: Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Then, requirements can be further extended, based on the analysis of the features of competing products available on the market. Understanding how this process takes place can help to identify the contribution of the different elicitation phase… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    ACM Class: D.2; D.2.1; H.1.2

  46. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  47. arXiv:2206.01211  [pdf

    physics.optics cs.ET

    Electrically pumped quantum-dot lasers grown on 300 mm patterned Si photonic wafers

    Authors: Chen Shang, Kaiyin Feng, Eamonn T. Hughes, Andrew Clark, Mukul Debnath, Rosalyn Koscica, Gerald Leake, Joshua Herman, David Harame, Peter Ludewig, Yating Wan, John E. Bowers

    Abstract: Monolithic integration of quantum dot (QD) gain materials onto Si photonic platforms via direct epitaxial growth is a promising solution for on-chip light sources. Recent developments have demonstrated superior device reliability in blanket hetero-epitaxy of III-V devices on Si at elevated temperatures. Yet, thick, defect management epi designs prevent vertical light coupling from the gain region… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: 11 pages including references, 6 figures

  48. arXiv:2205.04047  [pdf, other

    cs.SE cs.CR

    GreyConE: Greybox fuzzing+Concolic execution guided test generation for high level design

    Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay

    Abstract: Exhaustive testing of high-level designs pose an arduous challenge due to complex branching conditions, loop structures and inherent concurrency of hardware designs. Test engineers aim to generate quality test-cases satisfying various code coverage metrics to ensure minimal presence of bugs in a design. Prior works in testing SystemC designs are time inefficient which obstruct achieving the desire… ▽ More

    Submitted 13 July, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

    Comments: 5 pages, 5 figures, 2 tables, 2 algorithms. Accepted in International Test Conference (ITC 2022)

  49. arXiv:2203.12659  [pdf

    cs.LG cs.SI

    A Supervised Machine Learning Approach for Sequence Based Protein-protein Interaction (PPI) Prediction

    Authors: Soumyadeep Debnath, Ayatullah Faruk Mollah

    Abstract: Computational protein-protein interaction (PPI) prediction techniques can contribute greatly in reducing time, cost and false-positive interactions compared to experimental approaches. Sequence is one of the key and primary information of proteins that plays a crucial role in PPI prediction. Several machine learning approaches have been applied to exploit the characteristics of PPI datasets. Howev… ▽ More

    Submitted 27 March, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

    Comments: 10 pages, 5 figures, conference - COMSYS2020, competition - SeqPIP2020

  50. arXiv:2111.00805  [pdf, other

    cs.CR

    FuCE: Fuzzing+Concolic Execution guided Trojan Detection in Synthesizable Hardware Designs

    Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay

    Abstract: High-level synthesis (HLS) is the next emerging trend for designing complex customized architectures for applications such as Machine Learning, Video Processing. It provides a higher level of abstraction and freedom to hardware engineers to perform hardware software co-design. However, it opens up a new gateway to attackers to insert hardware trojans. Such trojans are semantically more meaningful… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: 23 pages, 4 figures, 6 tables, 4 listings