Skip to main content

Showing 1–50 of 77 results for author: Shukla, S

  1. arXiv:2406.09000  [pdf, other

    cs.CR

    A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication

    Authors: Sneha Shukla, Gaurav Varshney, Shreya Singh, Swati Goel

    Abstract: Despite being more secure and strongly promoted, two-factor (2FA) or multi-factor (MFA) schemes either fail to protect against recent phishing threats such as real-time MITM, controls/relay MITM, malicious browser extension-based phishing attacks, and/or need the users to purchase and carry other hardware for additional account protection. Leveraging the unprecedented popularity of NFC and BLE-ena… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2404.14219  [pdf, other

    cs.CL cs.AI

    Phi-3 Technical Report: A Highly Capable Language Model Locally on Your Phone

    Authors: Marah Abdin, Sam Ade Jacobs, Ammar Ahmad Awan, Jyoti Aneja, Ahmed Awadallah, Hany Awadalla, Nguyen Bach, Amit Bahree, Arash Bakhtiari, Jianmin Bao, Harkirat Behl, Alon Benhaim, Misha Bilenko, Johan Bjorck, Sébastien Bubeck, Qin Cai, Martin Cai, Caio César Teodoro Mendes, Weizhu Chen, Vishrav Chaudhary, Dong Chen, Dongdong Chen, Yen-Chun Chen, Yi-Ling Chen, Parul Chopra , et al. (90 additional authors not shown)

    Abstract: We introduce phi-3-mini, a 3.8 billion parameter language model trained on 3.3 trillion tokens, whose overall performance, as measured by both academic benchmarks and internal testing, rivals that of models such as Mixtral 8x7B and GPT-3.5 (e.g., phi-3-mini achieves 69% on MMLU and 8.38 on MT-bench), despite being small enough to be deployed on a phone. The innovation lies entirely in our dataset… ▽ More

    Submitted 23 May, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: 19 pages

  3. arXiv:2404.10012  [pdf, other

    cs.CR cs.DC

    Optimizing Malware Detection in IoT Networks: Leveraging Resource-Aware Distributed Computing for Enhanced Security

    Authors: Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

    Abstract: In recent years, networked IoT systems have revolutionized connectivity, portability, and functionality, offering a myriad of advantages. However, these systems are increasingly targeted by adversaries due to inherent security vulnerabilities and limited computational and storage resources. Malicious applications, commonly known as malware, pose a significant threat to IoT devices and networks. Wh… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2404.08808

  4. arXiv:2404.08808  [pdf, other

    cs.CR cs.DC

    Enhancing IoT Malware Detection through Adaptive Model Parallelism and Resource Optimization

    Authors: Sreenitha Kasarapu, Sanket Shukla, Sai Manoj Pudukotai Dinakarrao

    Abstract: The widespread integration of IoT devices has greatly improved connectivity and computational capabilities, facilitating seamless communication across networks. Despite their global deployment, IoT devices are frequently targeted for security breaches due to inherent vulnerabilities. Among these threats, malware poses a significant risk to IoT devices. The lack of built-in security features and li… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  5. arXiv:2404.07449  [pdf, other

    cs.CV

    Learning to Localize Objects Improves Spatial Reasoning in Visual-LLMs

    Authors: Kanchana Ranasinghe, Satya Narayan Shukla, Omid Poursaeed, Michael S. Ryoo, Tsung-Yu Lin

    Abstract: Integration of Large Language Models (LLMs) into visual domain tasks, resulting in visual-LLMs (V-LLMs), has enabled exceptional performance in vision-language tasks, particularly for visual question answering (VQA). However, existing V-LLMs (e.g. BLIP-2, LLaVA) demonstrate weak spatial reasoning and localization awareness. Despite generating highly descriptive and elaborate textual answers, these… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  6. arXiv:2404.02344  [pdf, other

    cs.CR cs.CV

    Generative AI-Based Effective Malware Detection for Embedded Computing Systems

    Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao

    Abstract: One of the pivotal security threats for the embedded computing systems is malicious software a.k.a malware. With efficiency and efficacy, Machine Learning (ML) has been widely adopted for malware detection in recent times. Despite being efficient, the existing techniques require a tremendous number of benign and malware samples for training and modeling an efficient malware detector. Furthermore,… ▽ More

    Submitted 12 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  7. arXiv:2403.03267  [pdf, other

    cs.CR

    TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports

    Authors: Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured… ▽ More

    Submitted 21 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Under Review

  8. arXiv:2402.11953  [pdf, other

    cs.CR cs.LG

    Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

    Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay

    Abstract: Machine learning, with its myriad applications, has become an integral component of numerous technological systems. A common practice in this domain is the use of transfer learning, where a pre-trained model's architecture, readily available to the public, is fine-tuned to suit specific tasks. As Machine Learning as a Service (MLaaS) platforms increasingly use pre-trained models in their backends,… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  9. arXiv:2312.16339  [pdf, other

    cs.CV cs.LG

    Universal Pyramid Adversarial Training for Improved ViT Performance

    Authors: Ping-yeh Chiang, Yipin Zhou, Omid Poursaeed, Satya Narayan Shukla, Ashish Shah, Tom Goldstein, Ser-Nam Lim

    Abstract: Recently, Pyramid Adversarial training (Herrmann et al., 2022) has been shown to be very effective for improving clean accuracy and distribution-shift robustness of vision transformers. However, due to the iterative nature of adversarial training, the technique is up to 7 times more expensive than standard training. To make the method more efficient, we propose Universal Pyramid Adversarial traini… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

  10. arXiv:2309.11569  [pdf, other

    cs.CV

    Revisiting Kernel Temporal Segmentation as an Adaptive Tokenizer for Long-form Video Understanding

    Authors: Mohamed Afham, Satya Narayan Shukla, Omid Poursaeed, Pengchuan Zhang, Ashish Shah, Sernam Lim

    Abstract: While most modern video understanding models operate on short-range clips, real-world videos are often several minutes long with semantically consistent segments of variable length. A common approach to process long videos is applying a short-form video model over uniformly sampled clips of fixed temporal length and aggregating the outputs. This approach neglects the underlying nature of long vide… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  11. arXiv:2308.16884  [pdf, other

    cs.CL cs.AI cs.LG

    The Belebele Benchmark: a Parallel Reading Comprehension Dataset in 122 Language Variants

    Authors: Lucas Bandarkar, Davis Liang, Benjamin Muller, Mikel Artetxe, Satya Narayan Shukla, Donald Husa, Naman Goyal, Abhinandan Krishnan, Luke Zettlemoyer, Madian Khabsa

    Abstract: We present Belebele, a multiple-choice machine reading comprehension (MRC) dataset spanning 122 language variants. Significantly expanding the language coverage of natural language understanding (NLU) benchmarks, this dataset enables the evaluation of text models in high-, medium-, and low-resource languages. Each question is based on a short passage from the Flores-200 dataset and has four multip… ▽ More

    Submitted 25 July, 2024; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: ACL 2024

    ACM Class: I.2.7

  12. arXiv:2308.08362  [pdf, other

    cs.CY

    Functional Consistency across Retail Central Bank Digital Currency and Commercial Bank Money

    Authors: Lee Braine, Shreepad Shukla, Piyush Agrawal

    Abstract: Central banks are actively exploring central bank digital currencies (CBDCs) by conducting research, proofs of concept and pilots. However, adoption of a retail CBDC can risk fragmenting both payments markets and retail deposits if the retail CBDC and commercial bank money do not have common operational characteristics. In this paper, we focus on a potential UK retail CBDC, the 'digital pound', an… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

    Comments: 24 pages, 3 figures, 3 tables

  13. arXiv:2308.05950  [pdf, other

    cs.DC cs.CR

    Blockchain-Based Transferable Digital Rights of Land

    Authors: Ras Dwivedi, Sumit Patel, Prof. Sandeep Shukla

    Abstract: Land, being a scarce and valuable resource, is in high demand, especially in densely populated areas of older cities. Development authorities require land for infrastructure projects and other amenities, while landowners hold onto their land for both its usage and its financial value. Transferable Development Rights (TDRs) serve as a mechanism to separate the development rights associated with the… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

    Comments: 5 pages, Paper presented in https://easychair.org/cfp/ICSF2023

  14. arXiv:2305.15336  [pdf, other

    cs.CR

    From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads

    Authors: P. V. Sai Charan, Hrushikesh Chunduri, P. Mohan Anand, Sandeep K Shukla

    Abstract: This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  15. arXiv:2304.07598  [pdf, other

    cs.CR

    Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators

    Authors: Trishie Sharma, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudulent schemes aimed at stealing investors' funds. Using data from 758 rug pulls across 10 NFT marketplaces, we examine the structural and behavioral pro… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

  16. arXiv:2303.10338  [pdf

    cs.AI cs.HC

    A general-purpose AI assistant embedded in an open-source radiology information system

    Authors: Saptarshi Purkayastha, Rohan Isaac, Sharon Anthony, Shikhar Shukla, Elizabeth A. Krupinski, Joshua A. Danish, Judy W. Gichoya

    Abstract: Radiology AI models have made significant progress in near-human performance or surpassing it. However, AI model's partnership with human radiologist remains an unexplored challenge due to the lack of health information standards, contextual and workflow differences, and data labeling variations. To overcome these challenges, we integrated an AI model service that uses DICOM standard SR annotation… ▽ More

    Submitted 18 March, 2023; originally announced March 2023.

    Comments: Full research paper version of the demo paper accepted at the AIME 2023 - 21st International Conference of Artificial Intelligence in Medicine

  17. arXiv:2303.00915  [pdf, other

    cs.CV cs.CL

    BiomedCLIP: a multimodal biomedical foundation model pretrained from fifteen million scientific image-text pairs

    Authors: Sheng Zhang, Yanbo Xu, Naoto Usuyama, Hanwen Xu, Jaspreet Bagga, Robert Tinn, Sam Preston, Rajesh Rao, Mu Wei, Naveen Valluri, Cliff Wong, Andrea Tupini, Yu Wang, Matt Mazzola, Swadheen Shukla, Lars Liden, Jianfeng Gao, Matthew P. Lungren, Tristan Naumann, Sheng Wang, Hoifung Poon

    Abstract: Biomedical data is inherently multimodal, comprising physical measurements and natural language narratives. A generalist biomedical AI model needs to simultaneously process different modalities of data, including text and images. Therefore, training an effective generalist biomedical model requires high-quality multimodal data, such as parallel image-text pairs. Here, we present PMC-15M, a novel d… ▽ More

    Submitted 16 January, 2024; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: The models are released at https://aka.ms/biomedclip

  18. arXiv:2208.02310  [pdf, other

    cs.CR cs.LG

    Design of secure and robust cognitive system for malware detection

    Authors: Sanket Shukla

    Abstract: Machine learning based malware detection techniques rely on grayscale images of malware and tends to classify malware based on the distribution of textures in graycale images. Albeit the advancement and promising results shown by machine learning techniques, attackers can exploit the vulnerabilities by generating adversarial samples. Adversarial samples are generated by intelligently crafting and… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2104.06652

  19. arXiv:2208.01113  [pdf, other

    cs.CR cs.LG

    On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

    Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra

    Abstract: Recent Deep Learning (DL) advancements in solving complex real-world tasks have led to its widespread adoption in practical applications. However, this opportunity comes with significant underlying risks, as many of these models rely on privacy-sensitive data for training in a variety of applications, making them an overly-exposed threat surface for privacy violations. Furthermore, the widespread… ▽ More

    Submitted 17 February, 2024; v1 submitted 1 August, 2022; originally announced August 2022.

    Comments: 15 pages, 20 figures

  20. arXiv:2205.04685  [pdf, other

    cs.CR cs.LG

    DNS based In-Browser Cryptojacking Detection

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptojacking. We use temporal features such as query frequency and query burst along with graph-based features such as degree and diameter, and non-temporal… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: Submitted

  21. arXiv:2204.04154  [pdf, other

    cs.CR cs.LG

    EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

    Authors: Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep Kumar Shukla

    Abstract: Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been develo… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: Submitted

  22. arXiv:2203.17018  [pdf, other

    cs.CY

    An Illustrative Industry Architecture to Mitigate Potential Fragmentation across Central Bank Digital Currency and Commercial Bank Money

    Authors: Lee Braine, Shreepad Shukla

    Abstract: Central banks are actively exploring central bank digital currencies (CBDCs) by conducting research, proofs of concept and pilots. However, adoption of a CBDC can risk fragmenting both payments markets and retail deposits. In this paper, we aim to provide a mitigation to this fragmentation risk by presenting an illustrative industry architecture which places CBDCs and commercial bank money on a si… ▽ More

    Submitted 31 March, 2022; originally announced March 2022.

    Comments: 7 pages, 2 figures, 1 table

  23. arXiv:2203.10636  [pdf, other

    cs.CV

    Transform your Smartphone into a DSLR Camera: Learning the ISP in the Wild

    Authors: Ardhendu Shekhar Tripathi, Martin Danelljan, Samarth Shukla, Radu Timofte, Luc Van Gool

    Abstract: We propose a trainable Image Signal Processing (ISP) framework that produces DSLR quality images given RAW images captured by a smartphone. To address the color misalignments between training image pairs, we employ a color-conditional ISP network and optimize a novel parametric color mapping between each input RAW and reference DSLR image. During inference, we predict the target color image by des… ▽ More

    Submitted 12 July, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

    Comments: Accepted at ECCV 2022

  24. Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots

    Authors: Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep Shukla

    Abstract: Cyber Security is a critical topic for organizations with IT/OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure. Tools like Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Threat I… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

    Comments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figures

    Journal ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)

  25. arXiv:2112.11721  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Towards Malicious address identification in Bitcoin

    Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not directly applicable in the Bitcoin blockchain. Several pre-processing steps should be performed before such temporal aspects are utilized. We are moti… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  26. arXiv:2112.11024  [pdf, other

    cs.CR cs.CY cs.DC

    Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma

    Abstract: In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilitate activities such as money laundering, gambling, and ransomware attacks. In recent times, different machine learning-based techniques can detect such… ▽ More

    Submitted 25 August, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  27. arXiv:2110.00949  [pdf

    cs.IR

    Unsupervised paradigm for information extraction from transcripts using BERT

    Authors: Aravind Chandramouli, Siddharth Shukla, Neeti Nair, Shiven Purohit, Shubham Pandey, Murali Mohana Krishna Dandu

    Abstract: Audio call transcripts are one of the valuable sources of information for multiple downstream use cases such as understanding the voice of the customer and analyzing agent performance. However, these transcripts are noisy in nature and in an industry setting, getting tagged ground truth data is a challenge. In this paper, we present a solution implemented in the industry using BERT Language Models… ▽ More

    Submitted 9 October, 2021; v1 submitted 3 October, 2021; originally announced October 2021.

    Journal ref: ECML PKDD 2021

  28. arXiv:2108.11818  [pdf, other

    cs.CR cs.SI

    Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain

    Authors: Banwari Lal, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: Submitted

  29. arXiv:2107.11350  [pdf, other

    cs.LG cs.AI

    Heteroscedastic Temporal Variational Autoencoder For Irregularly Sampled Time Series

    Authors: Satya Narayan Shukla, Benjamin M. Marlin

    Abstract: Irregularly sampled time series commonly occur in several domains where they present a significant challenge to standard deep learning models. In this paper, we propose a new deep learning framework for probabilistic interpolation of irregularly sampled time series that we call the Heteroscedastic Temporal Variational Autoencoder (HeTVAE). HeTVAE includes a novel input layer to encode information… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

  30. arXiv:2107.00817  [pdf, other

    cs.RO

    A Levy Flight based Narrow Passage Sampling Method for Probabilistic Roadmap Planners

    Authors: Shubham Shukla, Lokesh Kumar, Titas Bera, Ranjan Dasgupta

    Abstract: Sampling based probabilistic roadmap planners (PRM) have been successful in motion planning of robots with higher degrees of freedom, but may fail to capture the connectivity of the configuration space in scenarios with a critical narrow passage. In this paper, we show a novel technique based on Levy Flights to generate key samples in the narrow regions of configuration space, which, when combined… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

  31. arXiv:2106.13422  [pdf, other

    cs.CR cs.DC cs.LG

    Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep Kumar Shukla

    Abstract: Smart Contracts (SCs) in Ethereum can automate tasks and provide different functionalities to a user. Such automation is enabled by the `Turing-complete' nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In thi… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a conf

  32. arXiv:2106.13420  [pdf, other

    cs.CR cs.LG

    Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a journal

  33. arXiv:2105.08630  [pdf, other

    eess.IV cs.CV cs.LG

    Fast and Accurate Single-Image Depth Estimation on Mobile Devices, Mobile AI 2021 Challenge: Report

    Authors: Andrey Ignatov, Grigory Malivenko, David Plowman, Samarth Shukla, Radu Timofte, Ziyu Zhang, Yicheng Wang, Zilong Huang, Guozhong Luo, Gang Yu, Bin Fu, Yiran Wang, Xingyi Li, Min Shi, Ke Xian, Zhiguo Cao, Jin-Hua Du, Pei-Lin Wu, Chao Ge, Jiaoyang Yao, Fangwen Tu, Bo Li, Jung Eun Yoo, Kwanggyoon Seo, Jialei Xu , et al. (13 additional authors not shown)

    Abstract: Depth estimation is an important computer vision problem with many practical applications to mobile devices. While many solutions have been proposed for this task, they are usually very computationally expensive and thus are not applicable for on-device inference. To address this problem, we introduce the first Mobile AI challenge, where the target is to develop an end-to-end deep learning-based d… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Mobile AI 2021 Workshop and Challenges: https://ai-benchmark.com/workshops/mai/2021/. arXiv admin note: text overlap with arXiv:2105.07809

  34. arXiv:2104.06652  [pdf, other

    cs.CR cs.LG

    A Novel Malware Detection Mechanism based on Features Extracted from Converted Malware Binary Images

    Authors: Abhijitt Dhavlle, Sanket Shukla

    Abstract: Our computer systems for decades have been threatened by various types of hardware and software attacks of which Malwares have been one of them. This malware has the ability to steal, destroy, contaminate, gain unintended access, or even disrupt the entire system. There have been techniques to detect malware by performing static and dynamic analysis of malware files, but, stealthy malware has circ… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

  35. arXiv:2103.12326  [pdf

    cs.CR

    Security of Healthcare Data Using Blockchains: A Survey

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma

    Abstract: The advancement in the healthcare sector is entering into a new era in the form of Health 4.0. The integration of innovative technologies like Cyber-Physical Systems (CPS), Big Data, Cloud Computing, Machine Learning, and Blockchain with Healthcare services has led to improved performance and efficiency through data-based learning and interconnection of systems. On the other hand, it has also incr… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: Submitted as a book chapter

  36. arXiv:2101.11915  [pdf, other

    cs.CR cs.LG

    Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla

    Abstract: Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious expl… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: Submitted

  37. arXiv:2101.10318  [pdf, other

    cs.LG cs.AI

    Multi-Time Attention Networks for Irregularly Sampled Time Series

    Authors: Satya Narayan Shukla, Benjamin M. Marlin

    Abstract: Irregular sampling occurs in many time series modeling applications where it presents a significant challenge to standard deep learning models. This work is motivated by the analysis of physiological time series data in electronic health records, which are sparse, irregularly sampled, and multivariate. In this paper, we propose a new deep learning framework for this setting that we call Multi-Time… ▽ More

    Submitted 7 June, 2021; v1 submitted 25 January, 2021; originally announced January 2021.

    Comments: Accepted at International Conference on Learning Representations (ICLR) 2021

  38. arXiv:2101.03485  [pdf, other

    cs.CL cs.AI

    Detecting Hostile Posts using Relational Graph Convolutional Network

    Authors: Sarthak, Shikhar Shukla, Karm Veer Arya

    Abstract: This work is based on the submission to the competition Hindi Constraint conducted by AAAI@2021 for detection of hostile posts in Hindi on social media platforms. Here, a model is presented for detection and classification of hostile posts and further classify into fake, offensive, hate and defamation using Relational Graph Convolutional Networks. Unlike other existing work, our approach is focuse… ▽ More

    Submitted 7 April, 2021; v1 submitted 10 January, 2021; originally announced January 2021.

    Comments: 12 pages, 8 figures

  39. arXiv:2012.00168  [pdf, other

    cs.LG stat.ML

    A Survey on Principles, Models and Methods for Learning from Irregularly Sampled Time Series

    Authors: Satya Narayan Shukla, Benjamin M. Marlin

    Abstract: Irregularly sampled time series data arise naturally in many application domains including biology, ecology, climate science, astronomy, and health. Such data represent fundamental challenges to many classical models from machine learning and statistics due to the presence of non-uniform intervals between observations. However, there has been significant progress within the machine learning commun… ▽ More

    Submitted 5 January, 2021; v1 submitted 30 November, 2020; originally announced December 2020.

    Comments: Presented at NeurIPS 2020 Workshop: ML Retrospectives, Surveys & Meta-Analyses (ML-RSA)

  40. arXiv:2011.08575  [pdf, other

    cs.LG cs.CY

    Audience Creation for Consumables -- Simple and Scalable Precision Merchandising for a Growing Marketplace

    Authors: Shreyas S, Harsh Maheshwari, Avijit Saha, Samik Datta, Shashank Jain, Disha Makhija, Anuj Nagpal, Sneha Shukla, Suyash S

    Abstract: Consumable categories, such as grocery and fast-moving consumer goods, are quintessential to the growth of e-commerce marketplaces in developing countries. In this work, we present the design and implementation of a precision merchandising system, which creates audience sets from over 10 million consumers and is deployed at Flipkart Supermart, one of the largest online grocery stores in India. We… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: 10 pages

  41. arXiv:2011.06486  [pdf, ps, other

    cs.CL

    Overview of the Ninth Dialog System Technology Challenge: DSTC9

    Authors: Chulaka Gunasekara, Seokhwan Kim, Luis Fernando D'Haro, Abhinav Rastogi, Yun-Nung Chen, Mihail Eric, Behnam Hedayatnia, Karthik Gopalakrishnan, Yang Liu, Chao-Wei Huang, Dilek Hakkani-Tür, Jinchao Li, Qi Zhu, Lingxiao Luo, Lars Liden, Kaili Huang, Shahin Shayandeh, Runze Liang, Baolin Peng, Zheng Zhang, Swadheen Shukla, Minlie Huang, Jianfeng Gao, Shikib Mehri, Yulan Feng , et al. (14 additional authors not shown)

    Abstract: This paper introduces the Ninth Dialog System Technology Challenge (DSTC-9). This edition of the DSTC focuses on applying end-to-end dialog technologies for four distinct tasks in dialog systems, namely, 1. Task-oriented dialog Modeling with unstructured knowledge access, 2. Multi-domain task-oriented dialog, 3. Interactive evaluation of dialog, and 4. Situated interactive multi-modal dialog. This… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

  42. arXiv:2011.05680  [pdf, other

    cs.CV

    Zero-Pair Image to Image Translation using Domain Conditional Normalization

    Authors: Samarth Shukla, Andrés Romero, Luc Van Gool, Radu Timofte

    Abstract: In this paper, we propose an approach based on domain conditional normalization (DCN) for zero-pair image-to-image translation, i.e., translating between two domains which have no paired training data available but each have paired training data with a third domain. We employ a single generator which has an encoder-decoder structure and analyze different implementations of domain conditional norma… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: Paper accepted for publication at WACV 2021

  43. arXiv:2010.04205  [pdf, other

    cs.LG

    Gaussian MRF Covariance Modeling for Efficient Black-Box Adversarial Attacks

    Authors: Anit Kumar Sahu, Satya Narayan Shukla, J. Zico Kolter

    Abstract: We study the problem of generating adversarial examples in a black-box setting, where we only have access to a zeroth order oracle, providing us with loss function evaluations. Although this setting has been investigated in previous work, most past approaches using zeroth order optimization implicitly assume that the gradients of the loss function with respect to the input images are \emph{unstruc… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

  44. arXiv:2009.02930  [pdf, other

    cs.CR

    Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix

    Authors: Aneet K. Dutta, Bhaskar Mukhoty, Sandeep K. Shukla

    Abstract: Regular and uninterrupted operation of critical infrastructures such as power, transport, communication etc. are essential for proper functioning of a country. Cyber-attacks causing disruption in critical infrastructure service in the past, are considered as a significant threat. With the advancement in technology and the progress of the critical infrastructures towards IP based communication, cyb… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: 9pages, 14 figures

  45. arXiv:2008.11084  [pdf, other

    cs.CY

    Historical Context and Key Features of Digital Money Tokens

    Authors: Shreepad Shukla

    Abstract: Digital money tokens have attracted the attention of financial institutions, central banks, regulators, international associations and fintechs. Their research and experimentation with digital money tokens has included creating innovative technical and operational frameworks. In this paper, we present a 'money tree' which places this recent concept of digital money tokens into a historical context… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

    Comments: 15 pages, 3 figures, 1 table

  46. arXiv:2008.00317  [pdf, other

    q-bio.NC cs.NE

    Adaptive Chemotaxis for improved Contour Tracking using Spiking Neural Networks

    Authors: Shashwat Shukla, Rohan Pathak, Vivek Saraswat, Udayan Ganguly

    Abstract: In this paper we present a Spiking Neural Network (SNN) for autonomous navigation, inspired by the chemotaxis network of the worm Caenorhabditis elegans. In particular, we focus on the problem of contour tracking, wherein the bot must reach and subsequently follow a desired concentration setpoint. Past schemes that used only klinokinesis can follow the contour efficiently but take excessive time t… ▽ More

    Submitted 1 August, 2020; originally announced August 2020.

  47. arXiv:2007.09409  [pdf, other

    cs.CR

    A Comprehensive Survey of Aadhar and Security Issues

    Authors: Isha Pali, Lisa Krishania, Divya Chadha, Asmita Kandar, Gaurav Varshney, Sneha Shukla

    Abstract: The concept of Aadhaar came with the need for a unique identity for every individual. To implement this, the Indian government created the authority UIDAI to distribute and generate user identities for every individual based on their demographic and biometric data. After the implementation, came the security issues and challenges of Aadhaar and its authentication. So, our study focuses on the jour… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

  48. arXiv:2007.07210  [pdf, other

    cs.LG stat.ML

    Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes

    Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter

    Abstract: We focus on the problem of black-box adversarial attacks, where the aim is to generate adversarial examples for deep learning models solely based on information limited to output label~(hard label) to a queried data input. We propose a simple and efficient Bayesian Optimization~(BO) based approach for developing black-box adversarial attacks. Issues with BO's performance in high dimensions are avo… ▽ More

    Submitted 11 June, 2021; v1 submitted 13 July, 2020; originally announced July 2020.

    Comments: Accepted at KDD 2021. arXiv admin note: substantial text overlap with arXiv:1909.13857

  49. arXiv:2007.05169  [pdf, other

    cs.LG cs.SI stat.ML

    Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

    Authors: Rachit Agarwal, Shikhar Barve, Sandeep K. Shukla

    Abstract: The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal feat… ▽ More

    Submitted 28 January, 2021; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: Submitted to Springer Applied Network Science Journal

  50. arXiv:2005.08170  [pdf, other

    cs.CV cs.LG

    Neural Networks for Fashion Image Classification and Visual Search

    Authors: Fengzi Li, Shashi Kant, Shunichi Araki, Sumer Bangera, Swapna Samir Shukla

    Abstract: We discuss two potentially challenging problems faced by the ecommerce industry. One relates to the problem faced by sellers while uploading pictures of products on the platform for sale and the consequent manual tagging involved. It gives rise to misclassifications leading to its absence from search results. The other problem concerns with the potential bottleneck in placing orders when a custome… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.