(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–50 of 124 results for author: Bansal, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11463  [pdf, other

    cs.LG stat.ML

    Just How Flexible are Neural Networks in Practice?

    Authors: Ravid Shwartz-Ziv, Micah Goldblum, Arpit Bansal, C. Bayan Bruss, Yann LeCun, Andrew Gordon Wilson

    Abstract: It is widely believed that a neural network can fit a training set containing at least as many samples as it has parameters, underpinning notions of overparameterized and underparameterized models. In practice, however, we only find solutions accessible via our training procedure, including the optimizer and regularizers, limiting flexibility. Moreover, the exact parameterization of the function c… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2406.04245  [pdf, ps, other

    quant-ph cs.LG

    Online learning of a panoply of quantum objects

    Authors: Akshay Bansal, Ian George, Soumik Ghosh, Jamie Sikora, Alice Zheng

    Abstract: In many quantum tasks, there is an unknown quantum object that one wishes to learn. An online strategy for this task involves adaptively refining a hypothesis to reproduce such an object or its measurement statistics. A common evaluation metric for such a strategy is its regret, or roughly the accumulated errors in hypothesis statistics. We prove a sublinear regret bound for learning over general… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 34 pages. Comments welcome

  3. arXiv:2405.20805  [pdf

    cs.CL

    Multilingual Text Style Transfer: Datasets & Models for Indian Languages

    Authors: Sourabrata Mukherjee, Atul Kr. Ojha, Akanksha Bansal, Deepak Alok, John P. McCrae, Ondřej Dušek

    Abstract: Text style transfer (TST) involves altering the linguistic style of a text while preserving its core content. This paper focuses on sentiment transfer, a vital TST subtask (Mukherjee et al., 2022a), across a spectrum of Indian languages: Hindi, Magahi, Malayalam, Marathi, Punjabi, Odia, Telugu, and Urdu, expanding upon previous work on English-Bangla sentiment transfer (Mukherjee et al., 2023). We… ▽ More

    Submitted 9 June, 2024; v1 submitted 31 May, 2024; originally announced May 2024.

  4. arXiv:2405.18573  [pdf, other

    cs.SE

    Programmer Visual Attention During Context-Aware Code Summarization

    Authors: Aakash Bansal, Robert Wallace, Zachary Karas, Ningzhi Tang, Yu Huang, Toby Jia-Jun Li, Collin McMillan

    Abstract: Abridged: Programmer attention represents the visual focus of programmers on parts of the source code in pursuit of programming tasks. We conducted an in-depth human study with XY Java programmers, where each programmer generated summaries for 40 methods from five large Java projects over five one-hour sessions. We used eye-tracking equipment to map the visual attention of programmers while they w… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 10 pages, 4 figures, 4 tables. this is a pre-print submitted to IEEE Transactions on Software Engineering for review

  5. arXiv:2405.17399  [pdf, other

    cs.LG cs.AI

    Transformers Can Do Arithmetic with the Right Embeddings

    Authors: Sean McLeish, Arpit Bansal, Alex Stein, Neel Jain, John Kirchenbauer, Brian R. Bartoldson, Bhavya Kailkhura, Abhinav Bhatele, Jonas Geiping, Avi Schwarzschild, Tom Goldstein

    Abstract: The poor performance of transformers on arithmetic tasks seems to stem in large part from their inability to keep track of the exact position of each digit inside of a large span of digits. We mend this problem by adding an embedding to each digit that encodes its position relative to the start of the number. In addition to the boost these embeddings provide on their own, we show that this fix ena… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  6. arXiv:2405.16081  [pdf, other

    cs.SE cs.HC

    A Study on Developer Behaviors for Validating and Repairing LLM-Generated Code Using Eye Tracking and IDE Actions

    Authors: Ningzhi Tang, Meng Chen, Zheng Ning, Aakash Bansal, Yu Huang, Collin McMillan, Toby Jia-Jun Li

    Abstract: The increasing use of large language model (LLM)-powered code generation tools, such as GitHub Copilot, is transforming software engineering practices. This paper investigates how developers validate and repair code generated by Copilot and examines the impact of code provenance awareness during these processes. We conducted a lab study with 28 participants, who were tasked with validating and rep… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  7. arXiv:2403.16365  [pdf, other

    cs.LG cs.CR cs.CV

    Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

    Authors: Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Geiping, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum

    Abstract: Modern neural networks are often trained on massive datasets that are web scraped with minimal human inspection. As a result of this insecure curation pipeline, an adversary can poison or backdoor the resulting model by uploading malicious data to the internet and waiting for a victim to scrape and train on it. Existing approaches for creating poisons and backdoors start with randomly sampled clea… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  8. arXiv:2402.15233  [pdf, other

    quant-ph cs.CR

    On the composable security of weak coin flipping

    Authors: Jiawei Wu, Yanglin Hu, Akshay Bansal, Marco Tomamichel

    Abstract: Weak coin flipping is a cryptographic primitive in which two mutually distrustful parties generate a shared random bit to agree on a winner via remote communication. While a stand-alone secure weak coin flipping protocol can be constructed from noiseless communication channels, its composability has not been explored. In this work, we demonstrate that no weak coin flipping protocol can be abstract… ▽ More

    Submitted 21 June, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  9. arXiv:2402.14096  [pdf, other

    cs.SE cs.AI cs.HC

    EyeTrans: Merging Human and Machine Attention for Neural Code Summarization

    Authors: Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang

    Abstract: Neural code summarization leverages deep learning models to automatically generate brief natural language summaries of code snippets. The development of Transformer models has led to extensive use of attention during model design. While existing work has primarily and almost exclusively focused on static properties of source code and related structural representations like the Abstract Syntax Tree… ▽ More

    Submitted 29 February, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

  10. arXiv:2402.07767  [pdf

    cs.CL

    Text Detoxification as Style Transfer in English and Hindi

    Authors: Sourabrata Mukherjee, Akanksha Bansal, Atul Kr. Ojha, John P. McCrae, Ondřej Dušek

    Abstract: This paper focuses on text detoxification, i.e., automatically converting toxic text into non-toxic text. This task contributes to safer and more respectful online communication and can be considered a Text Style Transfer (TST) task, where the text style changes while its content is preserved. We present three approaches: knowledge transfer from a similar task, multi-task learning approach, combin… ▽ More

    Submitted 9 June, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: Accepted and presented at the 20th International Conference on Natural Language Processing (ICON-2023) during December 14-17, 2023

  11. Amazon Locker Capacity Management

    Authors: Samyukta Sethuraman, Ankur Bansal, Setareh Mardan, Mauricio G. C. Resende, Timothy L. Jacobs

    Abstract: Amazon Locker is a self-service delivery or pickup location where customers can pick up packages and drop off returns. A basic first-come-first-served policy for accepting package delivery requests to lockers results in lockers becoming full with standard shipping speed (3-5 day shipping) packages, and leaving no space left for expedited packages which are mostly Next-Day or Two-Day shipping. This… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 22 pages, 10 figues

    MSC Class: 68T05; 90B05; 90B06; 90C90 ACM Class: G.1.6; I.2.6; I.2.8; I.6.3

    Journal ref: INFORMS J. on Applied Analytics, Published Online:29 Mar 2024

  12. arXiv:2312.03369  [pdf, other

    cs.PL

    Analysis of Linux-PRNG (Pseudo Random Number Generator)

    Authors: Ayush Bansal, Pramod Subramanyan, Satyadev Nandakumar

    Abstract: The Linux pseudorandom number generator (PRNG) is a PRNG with entropy inputs and is widely used in many security-related applications and protocols. This PRNG is written as an open-source code which is subject to regular changes. It has been analysed in the works of Gutterman et al., Lacharme et al., while in the meantime, several changes have been applied to the code, to counter the attacks prese… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  13. Synergistic Perception and Control Simplex for Verifiable Safe Vertical Landing

    Authors: Ayoosh Bansal, Yang Zhao, James Zhu, Sheng Cheng, Yuliang Gu, Hyung-Jin Yoon, Hunmin Kim, Naira Hovakimyan, Lui Sha

    Abstract: Perception, Planning, and Control form the essential components of autonomy in advanced air mobility. This work advances the holistic integration of these components to enhance the performance and robustness of the complete cyber-physical system. We adapt Perception Simplex, a system for verifiable collision avoidance amidst obstacle detection faults, to the vertical landing maneuver for autonomou… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: To appear in AIAA SciTech 2024

    ACM Class: C.3; C.4; J.7

    Journal ref: AIAA SCITECH 2024 Forum, p. 1167

  14. VR-NeRF: High-Fidelity Virtualized Walkable Spaces

    Authors: Linning Xu, Vasu Agrawal, William Laney, Tony Garcia, Aayush Bansal, Changil Kim, Samuel Rota Bulò, Lorenzo Porzi, Peter Kontschieder, Aljaž Božič, Dahua Lin, Michael Zollhöfer, Christian Richardt

    Abstract: We present an end-to-end system for the high-fidelity capture, model reconstruction, and real-time rendering of walkable spaces in virtual reality using neural radiance fields. To this end, we designed and built a custom multi-camera rig to densely capture walkable spaces in high fidelity and with multi-view high dynamic range images in unprecedented quality and density. We extend instant neural g… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

    Comments: SIGGRAPH Asia 2023; Project page: https://vr-nerf.github.io

  15. arXiv:2309.02326  [pdf, other

    cs.SE cs.AI

    Revisiting File Context for Source Code Summarization

    Authors: Aakash Bansal, Chia-Yi Su, Collin McMillan

    Abstract: Source code summarization is the task of writing natural language descriptions of source code. A typical use case is generating short summaries of subroutines for use in API documentation. The heart of almost all current research into code summarization is the encoder-decoder neural architecture, and the encoder input is almost always a single subroutine or other short code snippet. The problem wi… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

    Comments: 27 pages + references, Under peer review

  16. arXiv:2308.13920  [pdf, other

    cs.SE cs.HC

    Modeling Programmer Attention as Scanpath Prediction

    Authors: Aakash Bansal, Chia-Yi Su, Zachary Karas, Yifan Zhang, Yu Huang, Toby Jia-Jun Li, Collin McMillan

    Abstract: This paper launches a new effort at modeling programmer attention by predicting eye movement scanpaths. Programmer attention refers to what information people intake when performing programming tasks. Models of programmer attention refer to machine prediction of what information is important to people. Models of programmer attention are important because they help researchers build better interfac… ▽ More

    Submitted 26 August, 2023; originally announced August 2023.

    Comments: Accepter at ASE2023 NIER Track. 4 pages + 1 page for references, 4 figures, 1 table

  17. arXiv:2307.11709  [pdf, other

    cs.AI

    Statement-based Memory for Neural Source Code Summarization

    Authors: Aakash Bansal, Siyuan Jiang, Sakib Haque, Collin McMillan

    Abstract: Source code summarization is the task of writing natural language descriptions of source code behavior. Code summarization underpins software documentation for programmers. Short descriptions of code help programmers understand the program quickly without having to read the code itself. Lately, neural source code summarization has emerged as the frontier of research into automated code summarizati… ▽ More

    Submitted 21 July, 2023; originally announced July 2023.

    Comments: 10 pages 2 figures

  18. arXiv:2307.07929  [pdf, other

    cs.CV

    DocTr: Document Transformer for Structured Information Extraction in Documents

    Authors: Haofu Liao, Aruni RoyChowdhury, Weijian Li, Ankan Bansal, Yuting Zhang, Zhuowen Tu, Ravi Kumar Satzoda, R. Manmatha, Vijay Mahadevan

    Abstract: We present a new formulation for structured information extraction (SIE) from visually rich documents. It aims to address the limitations of existing IOB tagging or graph-based formulations, which are either overly reliant on the correct ordering of input text or struggle with decoding a complex graph. Instead, motivated by anchor-based object detectors in vision, we represent an entity as an anch… ▽ More

    Submitted 15 July, 2023; originally announced July 2023.

  19. arXiv:2307.03589  [pdf, other

    math.NA cs.CE

    Nitsche method for Navier-Stokes equations with slip boundary conditions: Convergence analysis and VMS-LES stabilization

    Authors: Aparna Bansal, Nicolás Alejandro Barnafi, Dwijendra Narain Pandey

    Abstract: In this paper, we analyze the Nitsche's method for the stationary Navier-Stokes equations on Lipschitz domains under minimal regularity assumptions. Our analysis provides a robust formulation for implementing slip (i.e. Navier) boundary conditions in arbitrarily complex boundaries. The well-posedness of the discrete problem is established using the Banach Nečas Babuška and the Banach fixed point t… ▽ More

    Submitted 18 July, 2023; v1 submitted 7 July, 2023; originally announced July 2023.

    MSC Class: 65N30; 65N12; 65N15; 65J15; 80A20; 76D07

  20. arXiv:2305.16487  [pdf, other

    cs.CV cs.AI

    EgoHumans: An Egocentric 3D Multi-Human Benchmark

    Authors: Rawal Khirodkar, Aayush Bansal, Lingni Ma, Richard Newcombe, Minh Vo, Kris Kitani

    Abstract: We present EgoHumans, a new multi-view multi-human video benchmark to advance the state-of-the-art of egocentric human 3D pose estimation and tracking. Existing egocentric benchmarks either capture single subject or indoor-only scenarios, which limit the generalization of computer vision algorithms for real-world applications. We propose a novel 3D capture setup to construct a comprehensive egocen… ▽ More

    Submitted 18 August, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: Accepted to ICCV 2023 (Oral)

  21. arXiv:2305.09773  [pdf

    cs.SE cs.AI

    Towards Modeling Human Attention from Eye Movements for Neural Source Code Summarization

    Authors: Aakash Bansal, Bonita Sharif, Collin McMillan

    Abstract: Neural source code summarization is the task of generating natural language descriptions of source code behavior using neural networks. A fundamental component of most neural models is an attention mechanism. The attention mechanism learns to connect features in source code to specific words to use when generating natural language descriptions. Humans also pay attention to some features in code mo… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

    Comments: 16 Single Column pages, 7 figures, 2 pages of references, accepted at ETRA2023 to appear at PACMHCI 2023, Vol. 7

  22. arXiv:2305.08286  [pdf

    cs.SE cs.AI

    A Language Model of Java Methods with Train/Test Deduplication

    Authors: Chia-Yi Su, Aakash Bansal, Vijayanta Jain, Sepideh Ghanavati, Collin McMillan

    Abstract: This tool demonstration presents a research toolkit for a language model of Java source code. The target audience includes researchers studying problems at the granularity level of subroutines, statements, or variables in Java. In contrast to many existing language models, we prioritize features for researchers including an open and easily-searchable training set, a held out test set with differen… ▽ More

    Submitted 14 May, 2023; originally announced May 2023.

    Comments: 4 pages + 2 references + 2 appendix. No captioned tables. Tool demonstration paper under review at ESEC/FSE 2023 Demonstration track

  23. arXiv:2304.10255  [pdf, other

    cs.LG stat.ML

    PED-ANOVA: Efficiently Quantifying Hyperparameter Importance in Arbitrary Subspaces

    Authors: Shuhei Watanabe, Archit Bansal, Frank Hutter

    Abstract: The recent rise in popularity of Hyperparameter Optimization (HPO) for deep learning has highlighted the role that good hyperparameter (HP) space design can play in training strong models. In turn, designing a good HP space is critically dependent on understanding the role of different HPs. This motivates research on HP Importance (HPI), e.g., with the popular method of functional ANOVA (f-ANOVA).… ▽ More

    Submitted 26 May, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: Accepted by IJCAI2023

  24. arXiv:2303.16178  [pdf, other

    cs.SE

    Label Smoothing Improves Neural Source Code Summarization

    Authors: Sakib Haque, Aakash Bansal, Collin McMillan

    Abstract: Label smoothing is a regularization technique for neural networks. Normally neural models are trained to an output distribution that is a vector with a single 1 for the correct prediction, and 0 for all other elements. Label smoothing converts the correct prediction location to something slightly less than 1, then distributes the remainder to the other elements such that they are slightly greater… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  25. arXiv:2302.07121  [pdf, other

    cs.CV cs.LG

    Universal Guidance for Diffusion Models

    Authors: Arpit Bansal, Hong-Min Chu, Avi Schwarzschild, Soumyadip Sengupta, Micah Goldblum, Jonas Geiping, Tom Goldstein

    Abstract: Typical diffusion models are trained to accept a particular form of conditioning, most commonly text, and cannot be conditioned on other modalities without retraining. In this work, we propose a universal guidance algorithm that enables diffusion models to be controlled by arbitrary guidance modalities without the need to retrain any use-specific components. We show that our algorithm successfully… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  26. arXiv:2212.09265  [pdf, other

    cs.IT eess.SP

    Diversity Analysis of Multi-Aperture UWOC System over EGG Channel with Pointing Errors

    Authors: Ziyaur Rahman, Ankur Bansal, S. M. Zafaruddin

    Abstract: Single aperture reception for underwater wireless optical communication (UWOC) is insufficient to deal with oceanic turbulence caused by the combined effect of temperature gradient and air bubbles. This paper analyzes the performance of multi-aperture reception for UWOC under channel irradiance fluctuations characterized by the mixture exponential generalized gamma (EGG) distribution. We analyze t… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    Comments: This paper has been submitted in IEEE for possible publication

  27. arXiv:2212.08613  [pdf, other

    cs.CV

    Atrous Space Bender U-Net (ASBU-Net/LogiNet)

    Authors: Anurag Bansal, Oleg Ostap, Miguel Maestre Trueba, Kristopher Perry

    Abstract: $ $With recent advances in CNNs, exceptional improvements have been made in semantic segmentation of high resolution images in terms of accuracy and latency. However, challenges still remain in detecting objects in crowded scenes, large scale variations, partial occlusion, and distortions, while still maintaining mobility and latency. We introduce a fast and efficient convolutional neural network,… ▽ More

    Submitted 27 April, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

  28. arXiv:2210.12310  [pdf, other

    cs.CV

    Tools for Extracting Spatio-Temporal Patterns in Meteorological Image Sequences: From Feature Engineering to Attention-Based Neural Networks

    Authors: Akansha Singh Bansal, Yoonjin Lee, Kyle Hilburn, Imme Ebert-Uphoff

    Abstract: Atmospheric processes involve both space and time. This is why human analysis of atmospheric imagery can often extract more information from animated loops of image sequences than from individual images. Automating such an analysis requires the ability to identify spatio-temporal patterns in image sequences which is a very challenging task, because of the endless possibilities of patterns in both… ▽ More

    Submitted 24 October, 2022; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: The paper is submitted for review to the EDS Journal

  29. arXiv:2210.10750  [pdf, other

    cs.LG cs.CR

    Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

    Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein

    Abstract: As industrial applications are increasingly automated by machine learning models, enforcing personal data ownership and intellectual property rights requires tracing training data back to their rightful owners. Membership inference algorithms approach this problem by using statistical techniques to discern whether a target sample was included in a model's training set. However, existing methods on… ▽ More

    Submitted 1 June, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: Code is available at https://github.com/YuxinWenRick/canary-in-a-coalmine, published as a conference paper at ICLR 2023

  30. arXiv:2209.10966  [pdf, other

    cs.CL

    Adaptation of domain-specific transformer models with text oversampling for sentiment analysis of social media posts on Covid-19 vaccines

    Authors: Anmol Bansal, Arjun Choudhry, Anubhav Sharma, Seba Susan

    Abstract: Covid-19 has spread across the world and several vaccines have been developed to counter its surge. To identify the correct sentiments associated with the vaccines from social media posts, we fine-tune various state-of-the-art pre-trained transformer models on tweets associated with Covid-19 vaccines. Specifically, we use the recently introduced state-of-the-art pre-trained transformer models RoBE… ▽ More

    Submitted 13 January, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: The paper has been accepted for publication in Computer Science journal: http://journals.agh.edu.pl/csci

  31. arXiv:2209.01710  [pdf, other

    cs.RO cs.LG eess.SY

    Perception Simplex: Verifiable Collision Avoidance in Autonomous Vehicles Amidst Obstacle Detection Faults

    Authors: Ayoosh Bansal, Hunmin Kim, Simon Yu, Bo Li, Naira Hovakimyan, Marco Caccamo, Lui Sha

    Abstract: Advances in deep learning have revolutionized cyber-physical applications, including the development of Autonomous Vehicles. However, real-world collisions involving autonomous control of vehicles have raised significant safety concerns regarding the use of Deep Neural Networks (DNN) in safety-critical tasks, particularly Perception. The inherent unverifiability of DNNs poses a key challenge in en… ▽ More

    Submitted 28 November, 2023; v1 submitted 4 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2208.14403

    ACM Class: D.2.11; I.2.9; C.4; J.7

    Journal ref: Software Testing, Verification and Reliability. 2024. e1879

  32. Verifiable Obstacle Detection

    Authors: Ayoosh Bansal, Hunmin Kim, Simon Yu, Bo Li, Naira Hovakimyan, Marco Caccamo, Lui Sha

    Abstract: Perception of obstacles remains a critical safety concern for autonomous vehicles. Real-world collisions have shown that the autonomy faults leading to fatal collisions originate from obstacle existence detection. Open source autonomous driving implementations show a perception pipeline with complex interdependent Deep Neural Networks. These networks are not fully verifiable, making them unsuitabl… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: Accepted at ISSRE 2022

    ACM Class: D.2.4; I.2.9; I.4.8

    Journal ref: 33rd International Symposium on Software Reliability Engineering (ISSRE), pp. 61-72. IEEE, 2022

  33. arXiv:2208.09392  [pdf, other

    cs.CV cs.LG

    Cold Diffusion: Inverting Arbitrary Image Transforms Without Noise

    Authors: Arpit Bansal, Eitan Borgnia, Hong-Min Chu, Jie S. Li, Hamid Kazemi, Furong Huang, Micah Goldblum, Jonas Geiping, Tom Goldstein

    Abstract: Standard diffusion models involve an image transform -- adding Gaussian noise -- and an image restoration operator that inverts this degradation. We observe that the generative behavior of diffusion models is not strongly dependent on the choice of image degradation, and in fact an entire family of generative models can be constructed by varying this choice. Even when using completely deterministi… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

  34. arXiv:2208.02699  [pdf, other

    cs.CR cs.OS

    Ellipsis: Towards Efficient System Auditing for Real-Time Systems

    Authors: Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan

    Abstract: System auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the security of traditional computers, existing audit frameworks are rarely designed with consideration for Real-Time Systems (RTS). The transparency provided… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: Extended version of a paper accepted at ESORICS 2022

    ACM Class: D.4.6; C.3

  35. arXiv:2207.10663  [pdf, other

    cs.CV cs.GR

    Neural Pixel Composition: 3D-4D View Synthesis from Multi-Views

    Authors: Aayush Bansal, Michael Zollhoefer

    Abstract: We present Neural Pixel Composition (NPC), a novel approach for continuous 3D-4D view synthesis given only a discrete set of multi-view observations as input. Existing state-of-the-art approaches require dense multi-view supervision and an extensive computational budget. The proposed formulation reliably operates on sparse and wide-baseline multi-view imagery and can be trained efficiently within… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: A technical report on 3D-4D view synthesis (40 pages, 22 figures and 18 tables). High-resolution version of paper: http://www.aayushbansal.xyz/npc/npc_hi-res.pdf. Project page (containing video results): http://www.aayushbansal.xyz/npc/

  36. arXiv:2207.07972  [pdf, other

    cs.LG cs.CR

    Certified Neural Network Watermarks with Randomized Smoothing

    Authors: Arpit Bansal, Ping-yeh Chiang, Michael Curry, Rajiv Jain, Curtis Wigington, Varun Manjunatha, John P Dickerson, Tom Goldstein

    Abstract: Watermarking is a commonly used strategy to protect creators' rights to digital images, videos and audio. Recently, watermarking methods have been extended to deep learning models -- in principle, the watermark should be preserved when an adversary tries to copy the model. However, in practice, watermarks can often be removed by an intelligent adversary. Several papers have proposed watermarking m… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

    Comments: ICML 2022

    Journal ref: ICML 2022

  37. arXiv:2206.15306  [pdf, other

    cs.LG stat.ML

    Transfer Learning with Deep Tabular Models

    Authors: Roman Levin, Valeriia Cherepanova, Avi Schwarzschild, Arpit Bansal, C. Bayan Bruss, Tom Goldstein, Andrew Gordon Wilson, Micah Goldblum

    Abstract: Recent work on deep learning for tabular data demonstrates the strong performance of deep tabular models, often bridging the gap between gradient boosted decision trees and neural networks. Accuracy aside, a major advantage of neural models is that they learn reusable features and are easily fine-tuned in new domains. This property is often exploited in computer vision and natural language applica… ▽ More

    Submitted 7 August, 2023; v1 submitted 30 June, 2022; originally announced June 2022.

    Journal ref: International Conference on Learning Representations (ICLR), 2023

  38. arXiv:2205.04992  [pdf, other

    cs.CV

    KeypointNeRF: Generalizing Image-based Volumetric Avatars using Relative Spatial Encoding of Keypoints

    Authors: Marko Mihajlovic, Aayush Bansal, Michael Zollhoefer, Siyu Tang, Shunsuke Saito

    Abstract: Image-based volumetric humans using pixel-aligned features promise generalization to unseen poses and identities. Prior work leverages global spatial encodings and multi-view geometric consistency to reduce spatial ambiguity. However, global encodings often suffer from overfitting to the distribution of the training data, and it is difficult to learn multi-view consistent reconstruction from spars… ▽ More

    Submitted 21 July, 2022; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: To appear at ECCV 2022. The project page is available at https://markomih.github.io/KeypointNeRF

  39. arXiv:2204.12552  [pdf, other

    cs.SI cs.CY

    These Deals Won't Last! Longevity, Uniformity and Bias in Product Badge Assignment in E-Commerce Platforms

    Authors: Archit Bansal, Kunal Banerjee, Abhijnan Chakraborty

    Abstract: Product badges are ubiquitous in e-commerce platforms, acting as effective psychological triggers to nudge customers to buy specific products, boosting revenues. However, to the best of our knowledge, there has been no attempt to systematically study these badges and their several idiosyncrasies - we intend to close this gap in our current work. Specifically, we try to answer questions such as: Ho… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

  40. arXiv:2204.06184  [pdf, other

    cs.CV

    COAP: Compositional Articulated Occupancy of People

    Authors: Marko Mihajlovic, Shunsuke Saito, Aayush Bansal, Michael Zollhoefer, Siyu Tang

    Abstract: We present a novel neural implicit representation for articulated human bodies. Compared to explicit template meshes, neural implicit body representations provide an efficient mechanism for modeling interactions with the environment, which is essential for human motion reconstruction and synthesis in 3D scenes. However, existing neural implicit bodies suffer from either poor generalization on high… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: To appear at CVPR 2022. The project page is available at https://neuralbodies.github.io/COAP/index.html

  41. arXiv:2204.01632  [pdf, other

    cs.SE

    Semantic Similarity Metrics for Evaluating Source Code Summarization

    Authors: Sakib Haque, Zachary Eberhart, Aakash Bansal, Collin McMillan

    Abstract: Source code summarization involves creating brief descriptions of source code in natural language. These descriptions are a key component of software documentation such as JavaDocs. Automatic code summarization is a prized target of software engineering research, due to the high value summaries have to programmers and the simultaneously high cost of writing and maintaining documentation by hand. C… ▽ More

    Submitted 4 April, 2022; originally announced April 2022.

  42. arXiv:2203.08124  [pdf, other

    cs.LG cs.CV

    Can Neural Nets Learn the Same Model Twice? Investigating Reproducibility and Double Descent from the Decision Boundary Perspective

    Authors: Gowthami Somepalli, Liam Fowl, Arpit Bansal, Ping Yeh-Chiang, Yehuda Dar, Richard Baraniuk, Micah Goldblum, Tom Goldstein

    Abstract: We discuss methods for visualizing neural network decision boundaries and decision regions. We use these visualizations to investigate issues related to reproducibility and generalization in neural network training. We observe that changes in model architecture (and its associate inductive bias) cause visible changes in decision boundaries, while multiple runs with the same architecture yield resu… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

    Comments: To appear in CVPR 2022

  43. arXiv:2202.10963  [pdf, other

    cs.LG cs.CE cs.SI

    A framework for spatial heat risk assessment using a generalized similarity measure

    Authors: Akshay Bansal, Ayda Kianmehr

    Abstract: In this study, we develop a novel framework to assess health risks due to heat hazards across various localities (zip codes) across the state of Maryland with the help of two commonly used indicators i.e. exposure and vulnerability. Our approach quantifies each of the two aforementioned indicators by developing their corresponding feature vectors and subsequently computes indicator-specific refere… ▽ More

    Submitted 20 October, 2023; v1 submitted 20 February, 2022; originally announced February 2022.

    Comments: 6 pages, 3 figures

  44. arXiv:2202.05826  [pdf, other

    cs.LG cs.AI

    End-to-end Algorithm Synthesis with Recurrent Networks: Logical Extrapolation Without Overthinking

    Authors: Arpit Bansal, Avi Schwarzschild, Eitan Borgnia, Zeyad Emam, Furong Huang, Micah Goldblum, Tom Goldstein

    Abstract: Machine learning systems perform well on pattern matching tasks, but their ability to perform algorithmic or logical reasoning is not well understood. One important reasoning capability is algorithmic extrapolation, in which models trained only on small/simple reasoning problems can synthesize complex strategies for large/complex problems at test time. Algorithmic extrapolation can be achieved thr… ▽ More

    Submitted 14 October, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

  45. arXiv:2112.13974  [pdf, other

    cs.LG cs.AI cs.CV

    A Moment in the Sun: Solar Nowcasting from Multispectral Satellite Data using Self-Supervised Learning

    Authors: Akansha Singh Bansal, Trapit Bansal, David Irwin

    Abstract: Solar energy is now the cheapest form of electricity in history. Unfortunately, significantly increasing the grid's fraction of solar energy remains challenging due to its variability, which makes balancing electricity's supply and demand more difficult. While thermal generators' ramp rate -- the maximum rate that they can change their output -- is finite, solar's ramp rate is essentially infinite… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

    Comments: 18 pages

  46. arXiv:2112.00319  [pdf, other

    cs.CV cs.LG

    Object-Aware Cropping for Self-Supervised Learning

    Authors: Shlok Mishra, Anshul Shah, Ankan Bansal, Abhyuday Jagannatha, Janit Anjaria, Abhishek Sharma, David Jacobs, Dilip Krishnan

    Abstract: A core component of the recent success of self-supervised learning is cropping data augmentation, which selects sub-regions of an image to be used as positive views in the self-supervised loss. The underlying assumption is that randomly cropped and resized regions of a given image share information about the objects of interest, which the learned representation will capture. This assumption is mos… ▽ More

    Submitted 6 April, 2023; v1 submitted 1 December, 2021; originally announced December 2021.

    Journal ref: Transactions on Machine Learning Research 2022

  47. arXiv:2111.09799  [pdf, other

    cs.CV

    LiDAR Cluster First and Camera Inference Later: A New Perspective Towards Autonomous Driving

    Authors: Jiyang Chen, Simon Yu, Rohan Tabish, Ayoosh Bansal, Shengzhong Liu, Tarek Abdelzaher, Lui Sha

    Abstract: Object detection in state-of-the-art Autonomous Vehicles (AV) framework relies heavily on deep neural networks. Typically, these networks perform object detection uniformly on the entire camera LiDAR frames. However, this uniformity jeopardizes the safety of the AV by giving the same priority to all objects in the scenes regardless of their risk of collision to the AV. In this paper, we present a… ▽ More

    Submitted 19 November, 2021; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: 6 pages

  48. arXiv:2111.03537  [pdf, other

    cs.CR

    A practical analysis of ROP attacks

    Authors: Ayush Bansal, Debadatta Mishra

    Abstract: Control Flow Hijacking attacks have posed a serious threat to the security of applications for a long time where an attacker can damage the control Flow Integrity of the program and execute arbitrary code. These attacks can be performed by injecting code in the program's memory or reusing already existing code in the program (also known as Code-Reuse Attacks). Code-Reuse Attacks in the form of Ret… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

  49. SmartSplit: Latency-Energy-Memory Optimisation for CNN Splitting on Smartphone Environment

    Authors: Ishan Prakash, Aniruddh Bansal, Rohit Verma, Rajeev Shorey

    Abstract: Artificial Intelligence has now taken centre stage in the smartphone industry owing to the need of bringing all processing close to the user and addressing privacy concerns. Convolution Neural Networks (CNNs), which are used by several AI applications, are highly resource and computation intensive. Although new generation smartphones come with AI-enabled chips, minimal memory and energy utilisatio… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

  50. arXiv:2110.09580  [pdf, other

    cs.CR

    Flexible Accuracy for Differential Privacy

    Authors: Aman Bansal, Rahul Chunduru, Deepesh Data, Manoj Prabhakaran

    Abstract: Differential Privacy (DP) has become a gold standard in privacy-preserving data analysis. While it provides one of the most rigorous notions of privacy, there are many settings where its applicability is limited. Our main contribution is in augmenting differential privacy with {\em Flexible Accuracy}, which allows small distortions in the input (e.g., dropping outliers) before measuring accuracy… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 42 pages