这是indexloc提供的服务,不要输入任何密码
Skip to main content

Showing 1–34 of 34 results for author: Joshi, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2511.12664  [pdf

    quant-ph cs.ET cs.SC

    Quantum Hyperdimensional Computing: a foundational paradigm for quantum neuromorphic architectures

    Authors: Fabio Cumbo, Rui-Hao Li, Bryan Raubenolt, Jayadev Joshi, Abu Kaisar Mohammad Masum, Sercan Aygun, Daniel Blankenberg

    Abstract: A significant challenge in quantum computing (QC) is developing learning models that truly align with quantum principles, as many current approaches are complex adaptations of classical frameworks. In this work, we introduce Quantum Hyperdimensional Computing (QHDC), a fundamentally new paradigm. We demonstrate that the core operations of its classical counterpart, Hyperdimensional Computing (HDC)… ▽ More

    Submitted 16 November, 2025; originally announced November 2025.

    Comments: 44 pages, 6 figures

  2. arXiv:2507.00230  [pdf, ps, other

    cs.LG cs.CR

    PPFL-RDSN: Privacy-Preserving Federated Learning-based Residual Dense Spatial Networks for Encrypted Lossy Image Reconstruction

    Authors: Peilin He, James Joshi

    Abstract: Reconstructing high-quality images from low-resolution inputs using Residual Dense Spatial Networks (RDSNs) is crucial yet challenging. It is even more challenging in centralized training where multiple collaborating parties are involved, as it poses significant privacy risks, including data leakage and inference attacks, as well as high computational and communication costs. We propose a novel Pr… ▽ More

    Submitted 27 October, 2025; v1 submitted 30 June, 2025; originally announced July 2025.

    Comments: Accepted to be published on the 7th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, Nov. 11-14, 2025, Pittsburgh, PA, USA. https://www.sis.pitt.edu/lersais/conference/tps/2025/

  3. arXiv:2506.09923  [pdf, ps, other

    cs.LG

    Apollo: A Posteriori Label-Only Membership Inference Attack Towards Machine Unlearning

    Authors: Liou Tang, James Joshi, Ashish Kundu

    Abstract: Machine Unlearning (MU) aims to update Machine Learning (ML) models following requests to remove training samples and their influences on a trained model efficiently without retraining the original ML model from scratch. While MU itself has been employed to provide privacy protection and regulatory compliance, it can also increase the attack surface of the model. Existing privacy inference attacks… ▽ More

    Submitted 27 October, 2025; v1 submitted 11 June, 2025; originally announced June 2025.

  4. arXiv:2505.07013  [pdf, ps, other

    cs.CV cs.AI

    Efficient and Robust Multidimensional Attention in Remote Physiological Sensing through Target Signal Constrained Factorization

    Authors: Jitesh Joshi, Youngjun Cho

    Abstract: Remote physiological sensing using camera-based technologies offers transformative potential for non-invasive vital sign monitoring across healthcare and human-computer interaction domains. Although deep learning approaches have advanced the extraction of physiological signals from video data, existing methods have not been sufficiently assessed for their robustness to domain shifts. These shifts… ▽ More

    Submitted 11 May, 2025; originally announced May 2025.

    Comments: 25 pages, 6 figures

  5. arXiv:2505.01454  [pdf, ps, other

    cs.CR cs.LG

    Sparsification Under Siege: Defending Against Poisoning Attacks in Communication-Efficient Federated Learning

    Authors: Zhiyong Jin, Runhua Xu, Chao Li, Yizhong Liu, Jianxin Li, James Joshi

    Abstract: Federated Learning (FL) enables collaborative model training across distributed clients while preserving data privacy, yet it faces significant challenges in communication efficiency and vulnerability to poisoning attacks. While sparsification techniques mitigate communication overhead by transmitting only critical model parameters, they inadvertently amplify security risks: adversarial clients ca… ▽ More

    Submitted 21 July, 2025; v1 submitted 30 April, 2025; originally announced May 2025.

  6. arXiv:2504.20941  [pdf, ps, other

    cs.CR math.DG stat.OT

    Density-Aware Noise Mechanisms for Differential Privacy on Riemannian Manifolds via Conformal Transformation

    Authors: Peilin He, Liou Tang, M. Amin Rahimian, James Joshi

    Abstract: Differential Privacy (DP) enables privacy-preserving data analysis by adding calibrated noise. While recent works extend DP to curved manifolds such as diffusion-tensor MRI or social networks by adding geodesic noise, these assume uniform data distribution and are not always practical. Hence, these approaches may introduce biased noise and suboptimal privacy-utility tradeoffs for non-uniform data.… ▽ More

    Submitted 31 October, 2025; v1 submitted 29 April, 2025; originally announced April 2025.

    Comments: Submitted

  7. arXiv:2502.05547  [pdf, other

    cs.CR cs.AI

    Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning

    Authors: Runhua Xu, Shiqi Gao, Chao Li, James Joshi, Jianxin Li

    Abstract: Federated learning (FL) is inherently susceptible to privacy breaches and poisoning attacks. To tackle these challenges, researchers have separately devised secure aggregation mechanisms to protect data privacy and robust aggregation methods that withstand poisoning attacks. However, simultaneously addressing both concerns is challenging; secure aggregation facilitates poisoning attacks as most an… ▽ More

    Submitted 8 February, 2025; originally announced February 2025.

    Comments: accepted by The Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS 2024)

  8. TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning

    Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li

    Abstract: Federated learning is a computing paradigm that enhances privacy by enabling multiple parties to collaboratively train a machine learning model without revealing personal data. However, current research indicates that traditional federated learning platforms are unable to ensure privacy due to privacy leaks caused by the interchange of gradients. To achieve privacy-preserving federated learning, i… ▽ More

    Submitted 9 January, 2025; originally announced January 2025.

    Comments: The paper has been published in IEEE TDSC

    Journal ref: in IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 5, pp. 4309-4323, Sept.-Oct. 2024

  9. arXiv:2411.01542  [pdf, other

    cs.CV

    FactorizePhys: Matrix Factorization for Multidimensional Attention in Remote Physiological Sensing

    Authors: Jitesh Joshi, Sos S. Agaian, Youngjun Cho

    Abstract: Remote photoplethysmography (rPPG) enables non-invasive extraction of blood volume pulse signals through imaging, transforming spatial-temporal data into time series signals. Advances in end-to-end rPPG approaches have focused on this transformation where attention mechanisms are crucial for feature extraction. However, existing methods compute attention disjointly across spatial, temporal, and ch… ▽ More

    Submitted 3 November, 2024; originally announced November 2024.

    Comments: Accepted at NeurIPS, 2024

  10. arXiv:2405.16021  [pdf, other

    cs.RO

    VADER: Visual Affordance Detection and Error Recovery for Multi Robot Human Collaboration

    Authors: Michael Ahn, Montserrat Gonzalez Arenas, Matthew Bennice, Noah Brown, Christine Chan, Byron David, Anthony Francis, Gavin Gonzalez, Rainer Hessmer, Tomas Jackson, Nikhil J Joshi, Daniel Lam, Tsang-Wei Edward Lee, Alex Luong, Sharath Maddineni, Harsh Patel, Jodilyn Peralta, Jornell Quiambao, Diego Reyes, Rosario M Jauregui Ruano, Dorsa Sadigh, Pannag Sanketi, Leila Takayama, Pavel Vodenski, Fei Xia

    Abstract: Robots today can exploit the rich world knowledge of large language models to chain simple behavioral skills into long-horizon tasks. However, robots often get interrupted during long-horizon tasks due to primitive skill failures and dynamic environments. We propose VADER, a plan, execute, detect framework with seeking help as a new skill that enables robots to recover and complete long-horizon ta… ▽ More

    Submitted 30 May, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

    Comments: 9 pages, 4 figures

  11. arXiv:2404.09790  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Zongwei Wu, Eduard Zamfir, Kai Zhang, Yulun Zhang, Radu Timofte, Xiaokang Yang, Hongyuan Yu, Cheng Wan, Yuxin Hong, Zhijuan Huang, Yajun Zou, Yuan Huang, Jiamin Lin, Bingnan Han, Xianyu Guan, Yongsheng Yu, Daoan Zhang, Xuanwu Yin, Kunlong Zuo, Jinhua Hao, Kai Zhao, Kun Yuan, Ming Sun, Chao Zhou , et al. (63 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 challenge on image super-resolution ($\times$4), highlighting the solutions proposed and the outcomes obtained. The challenge involves generating corresponding high-resolution (HR) images, magnified by a factor of four, from low-resolution (LR) inputs using prior information. The LR images originate from bicubic downsampling degradation. The aim of the challenge i… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 webpage: https://cvlai.net/ntire/2024. Code: https://github.com/zhengchen1999/NTIRE2024_ImageSR_x4

  12. arXiv:2403.12943  [pdf, other

    cs.RO cs.AI

    Vid2Robot: End-to-end Video-conditioned Policy Learning with Cross-Attention Transformers

    Authors: Vidhi Jain, Maria Attarian, Nikhil J Joshi, Ayzaan Wahid, Danny Driess, Quan Vuong, Pannag R Sanketi, Pierre Sermanet, Stefan Welker, Christine Chan, Igor Gilitschenski, Yonatan Bisk, Debidatta Dwibedi

    Abstract: Large-scale multi-task robotic manipulation systems often rely on text to specify the task. In this work, we explore whether a robot can learn by observing humans. To do so, the robot must understand a person's intent and perform the inferred task despite differences in the embodiments and environments. We introduce Vid2Robot, an end-to-end video-conditioned policy that takes human videos demonstr… ▽ More

    Submitted 27 August, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: Robotics: Science & Systems (RSS) 2024. https://vid2robot.github.io/

  13. arXiv:2311.00899  [pdf, other

    cs.RO

    RoboVQA: Multimodal Long-Horizon Reasoning for Robotics

    Authors: Pierre Sermanet, Tianli Ding, Jeffrey Zhao, Fei Xia, Debidatta Dwibedi, Keerthana Gopalakrishnan, Christine Chan, Gabriel Dulac-Arnold, Sharath Maddineni, Nikhil J Joshi, Pete Florence, Wei Han, Robert Baruch, Yao Lu, Suvir Mirchandani, Peng Xu, Pannag Sanketi, Karol Hausman, Izhak Shafran, Brian Ichter, Yuan Cao

    Abstract: We present a scalable, bottom-up and intrinsically diverse data collection scheme that can be used for high-level reasoning with long and medium horizons and that has 2.2x higher throughput compared to traditional narrow top-down step-by-step collection. We collect realistic data by performing any user requests within the entirety of 3 office buildings and using multiple robot and human embodiment… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  14. arXiv:2310.14342  [pdf

    cs.HC cs.CY

    PulmoBell: Home-based Pulmonary Rehabilitation Assistive Technology for People with COPD

    Authors: Yuanxiang Ma, Andreas Polydorides, Jitesh Joshi, Youngjun Cho

    Abstract: Chronic Obstructive Pulmonary Disease (COPD) can be fatal and is challenging to live with due to its severe symptoms. Pulmonary rehabilitation (PR) is one of the managements means to maintain COPD in a stable status. However, implementation of PR in the UK has been challenging due to the environmental and personal barriers faced by patients, which hinder their uptake, adherence, and completion of… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: Short Technical Report: Best student-led project in COMP0145: Research Methods and Making Skills (2022/23)

  15. arXiv:2310.08864  [pdf, other

    cs.RO

    Open X-Embodiment: Robotic Learning Datasets and RT-X Models

    Authors: Open X-Embodiment Collaboration, Abby O'Neill, Abdul Rehman, Abhinav Gupta, Abhiram Maddukuri, Abhishek Gupta, Abhishek Padalkar, Abraham Lee, Acorn Pooley, Agrim Gupta, Ajay Mandlekar, Ajinkya Jain, Albert Tung, Alex Bewley, Alex Herzog, Alex Irpan, Alexander Khazatsky, Anant Rai, Anchit Gupta, Andrew Wang, Andrey Kolobov, Anikait Singh, Animesh Garg, Aniruddha Kembhavi, Annie Xie , et al. (269 additional authors not shown)

    Abstract: Large, high-capacity models trained on diverse datasets have shown remarkable successes on efficiently tackling downstream applications. In domains from NLP to Computer Vision, this has led to a consolidation of pretrained models, with general pretrained backbones serving as a starting point for many applications. Can such a consolidation happen in robotics? Conventionally, robotic learning method… ▽ More

    Submitted 14 May, 2025; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: Project website: https://robotics-transformer-x.github.io

  16. arXiv:2309.07297  [pdf, other

    cs.CV

    Multi-Modal Hybrid Learning and Sequential Training for RGB-T Saliency Detection

    Authors: Guangyu Ren, Jitesh Joshi, Youngjun Cho

    Abstract: RGB-T saliency detection has emerged as an important computer vision task, identifying conspicuous objects in challenging scenes such as dark environments. However, existing methods neglect the characteristics of cross-modal features and rely solely on network structures to fuse RGB and thermal features. To address this, we first propose a Multi-Modal Hybrid loss (MMHL) that comprises supervised a… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: 8 Pages main text, 3 pages supplementary information, 12 figures

  17. arXiv:2308.02756  [pdf, other

    cs.HC

    PhysioKit: Open-source, Low-cost Physiological Computing Toolkit for Single and Multi-user Studies

    Authors: Jitesh Joshi, Katherine Wang, Youngjun Cho

    Abstract: The proliferation of physiological sensors opens new opportunities to explore interactions, conduct experiments and evaluate the user experience with continuous monitoring of bodily functions. Commercial devices, however, can be costly or limit access to raw waveform data, while low-cost sensors are efforts-intensive to setup. To address these challenges, we introduce PhysioKit, an open-source, lo… ▽ More

    Submitted 12 September, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: 25 pages, 8 figures, 4 tables

  18. arXiv:2212.06817  [pdf, other

    cs.RO cs.AI cs.CL cs.CV cs.LG

    RT-1: Robotics Transformer for Real-World Control at Scale

    Authors: Anthony Brohan, Noah Brown, Justice Carbajal, Yevgen Chebotar, Joseph Dabis, Chelsea Finn, Keerthana Gopalakrishnan, Karol Hausman, Alex Herzog, Jasmine Hsu, Julian Ibarz, Brian Ichter, Alex Irpan, Tomas Jackson, Sally Jesmonth, Nikhil J Joshi, Ryan Julian, Dmitry Kalashnikov, Yuheng Kuang, Isabel Leal, Kuang-Huei Lee, Sergey Levine, Yao Lu, Utsav Malla, Deeksha Manjunath , et al. (26 additional authors not shown)

    Abstract: By transferring knowledge from large, diverse, task-agnostic datasets, modern machine learning models can solve specific downstream tasks either zero-shot or with small task-specific datasets to a high level of performance. While this capability has been demonstrated in other fields such as computer vision, natural language processing or speech recognition, it remains to be shown in robotics, wher… ▽ More

    Submitted 11 August, 2023; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: See website at robotics-transformer1.github.io

  19. arXiv:2209.10700  [pdf, other

    cs.CV

    Self-adversarial Multi-scale Contrastive Learning for Semantic Segmentation of Thermal Facial Images

    Authors: Jitesh Joshi, Nadia Bianchi-Berthouze, Youngjun Cho

    Abstract: Segmentation of thermal facial images is a challenging task. This is because facial features often lack salience due to high-dynamic thermal range scenes and occlusion issues. Limited availability of datasets from unconstrained settings further limits the use of the state-of-the-art segmentation networks, loss functions and learning strategies which have been built and validated for RGB images. To… ▽ More

    Submitted 7 October, 2022; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted at the British Machine Vision Conference (BMVC), 2022

  20. arXiv:2204.01691  [pdf, other

    cs.RO cs.CL cs.LG

    Do As I Can, Not As I Say: Grounding Language in Robotic Affordances

    Authors: Michael Ahn, Anthony Brohan, Noah Brown, Yevgen Chebotar, Omar Cortes, Byron David, Chelsea Finn, Chuyuan Fu, Keerthana Gopalakrishnan, Karol Hausman, Alex Herzog, Daniel Ho, Jasmine Hsu, Julian Ibarz, Brian Ichter, Alex Irpan, Eric Jang, Rosario Jauregui Ruano, Kyle Jeffrey, Sally Jesmonth, Nikhil J Joshi, Ryan Julian, Dmitry Kalashnikov, Yuheng Kuang, Kuang-Huei Lee , et al. (20 additional authors not shown)

    Abstract: Large language models can encode a wealth of semantic knowledge about the world. Such knowledge could be extremely useful to robots aiming to act upon high-level, temporally extended instructions expressed in natural language. However, a significant weakness of language models is that they lack real-world experience, which makes it difficult to leverage them for decision making within a given embo… ▽ More

    Submitted 16 August, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: See website at https://say-can.github.io/ V1. Initial Upload. V2. Added PaLM results. Added study about new capabilities (drawer manipulation, chain of thought prompting, multilingual instructions). Added an ablation study of language model size. Added an open-source version of \algname on a simulated tabletop environment. Improved readability

  21. arXiv:2109.04194  [pdf, other

    cs.HC eess.SP

    Novel Time Domain Based Upper-Limb Prosthesis Control using Incremental Learning Approach

    Authors: Sidharth Pancholi, Amit M. Joshi Deepak Joshi, Bradly S. Duerstock

    Abstract: The upper limb of the body is a vital for various kind of activities for human. The complete or partial loss of the upper limb would lead to a significant impact on daily activities of the amputees. EMG carries important information of human physique which helps to decode the various functionalities of human arm. EMG signal based bionics and prosthesis have gained huge research attention over the… ▽ More

    Submitted 13 January, 2024; v1 submitted 25 August, 2021; originally announced September 2021.

    Comments: 15 Pages, 8 Figures, This work has been submitted to the IEEE for possible publication

  22. arXiv:2108.04417  [pdf, other

    cs.LG cs.AI cs.CR

    Privacy-Preserving Machine Learning: Methods, Challenges and Directions

    Authors: Runhua Xu, Nathalie Baracaldo, James Joshi

    Abstract: Machine learning (ML) is increasingly being adopted in a wide variety of application domains. Usually, a well-performing ML model relies on a large volume of training data and high-powered computational resources. Such a need for and the use of huge volumes of data raise serious privacy concerns because of the potential risks of leakage of highly privacy-sensitive information; further, the evolvin… ▽ More

    Submitted 22 September, 2021; v1 submitted 9 August, 2021; originally announced August 2021.

  23. arXiv:2105.08587  [pdf, other

    cs.LG cs.AI cs.CR

    Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

    Authors: Leila Karimi, Mai Abdelhakim, James Joshi

    Abstract: With rapid advances in computing systems, there is an increasing demand for more effective and efficient access control (AC) approaches. Recently, Attribute Based Access Control (ABAC) approaches have been shown to be promising in fulfilling the AC needs of such emerging complex computing environments. An ABAC model grants access to a requester based on attributes of entities in a system and an au… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  24. arXiv:2104.11349  [pdf

    cs.DC cs.LG

    Scalable Predictive Time-Series Analysis of COVID-19: Cases and Fatalities

    Authors: Shradha Shinde, Jay Joshi, Sowmya Mareedu, Yeon Pyo Kim, Jongwook Woo

    Abstract: COVID 19 is an acute disease that started spreading throughout the world, beginning in December 2019. It has spread worldwide and has affected more than 7 million people, and 200 thousand people have died due to this infection as of Oct 2020. In this paper, we have forecasted the number of deaths and the confirmed cases in Los Angeles and New York of the United States using the traditional and Big… ▽ More

    Submitted 22 April, 2021; originally announced April 2021.

    Comments: 8 pages, 7 figures, 4 tables

  25. arXiv:2103.03918  [pdf, other

    cs.LG cs.AI cs.CR cs.DC

    FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

    Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig

    Abstract: Federated learning (FL) has been proposed to allow collaborative training of machine learning (ML) models among multiple parties where each party can keep its data private. In this paradigm, only model updates, such as model weights or gradients, are shared. Many existing approaches have focused on horizontal FL, where each party has the entire feature set and labels in the training data set. Howe… ▽ More

    Submitted 16 June, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

  26. Blockchain-based Transparency Framework for Privacy Preserving Third-party Services

    Authors: Runhua Xu, Chao Li, James Joshi

    Abstract: Increasingly, information systems rely on computational, storage, and network resources deployed in third-party facilities such as cloud centers and edge nodes. Such an approach further exacerbates cybersecurity concerns constantly raised by numerous incidents of security and privacy attacks resulting in data leakage and identity theft, among others. These have, in turn, forced the creation of str… ▽ More

    Submitted 3 June, 2022; v1 submitted 1 February, 2021; originally announced February 2021.

    Comments: 12 pages

    Journal ref: IEEE TDSC 2022

  27. arXiv:2012.10547  [pdf, other

    cs.LG cs.CR

    NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

    Authors: Runhua Xu, James Joshi, Chao Li

    Abstract: Training a machine learning model over an encrypted dataset is an existing promising approach to address the privacy-preserving machine learning task, however, it is extremely challenging to efficiently train a deep neural network (DNN) model over encrypted data for two reasons: first, it requires large-scale computation over huge datasets; second, the existing solutions for computation over encry… ▽ More

    Submitted 17 April, 2021; v1 submitted 18 December, 2020; originally announced December 2020.

  28. arXiv:2011.06191  [pdf, other

    cs.CR

    Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions

    Authors: Runhua Xu, James Joshi

    Abstract: Increasing incidents of security compromises and privacy leakage have raised serious privacy concerns related to cyberspace. Such privacy concerns have been instrumental in the creation of several regulations and acts to restrict the availability and use of privacy-sensitive data. The secure computation problem, initially and formally introduced as secure two-party computation by Andrew Yao in 198… ▽ More

    Submitted 7 December, 2020; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: 15 pages, 2 figures, IEEE TPS 2020

  29. arXiv:2009.13323  [pdf

    eess.IV cs.CV cs.LG

    AI Progress in Skin Lesion Analysis

    Authors: Philippe M. Burlina, William Paul, Phil A. Mathew, Neil J. Joshi, Alison W. Rebman, John N. Aucott

    Abstract: We examine progress in the use of AI for detecting skin lesions, with particular emphasis on the erythema migrans rash of acute Lyme disease, and other lesions, such as those from conditions like herpes zoster (shingles), tinea corporis, erythema multiforme, cellulitis, insect bites, or tick bites. We discuss important challenges for these applications, in particular the problems of AI bias regard… ▽ More

    Submitted 9 October, 2020; v1 submitted 28 September, 2020; originally announced September 2020.

  30. arXiv:2003.07270  [pdf, other

    cs.CR cs.AI cs.LG

    An Automatic Attribute Based Access Control Policy Extraction from Access Logs

    Authors: Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim

    Abstract: With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based access control (ABAC) model provides a more flexible approach for addressing the authorization needs of complex and dynamic systems. While organizations… ▽ More

    Submitted 30 January, 2021; v1 submitted 16 March, 2020; originally announced March 2020.

  31. arXiv:1904.07303  [pdf, other

    cs.CR cs.LG

    CryptoNN: Training Neural Networks over Encrypted Data

    Authors: Runhua Xu, James B. D. Joshi, Chao Li

    Abstract: Emerging neural networks based machine learning techniques such as deep learning and its variants have shown tremendous potential in many application domains. However, they raise serious privacy concerns due to the risk of leakage of highly privacy-sensitive data when data collected from users is used to train neural network models to support predictive tasks. To tackle such serious privacy concer… ▽ More

    Submitted 26 April, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: ePrint

  32. arXiv:1808.07269  [pdf, other

    hep-ex cs.CV physics.data-an physics.ins-det

    A Deep Neural Network for Pixel-Level Electromagnetic Particle Identification in the MicroBooNE Liquid Argon Time Projection Chamber

    Authors: MicroBooNE collaboration, C. Adams, M. Alrashed, R. An, J. Anthony, J. Asaadi, A. Ashkenazi, M. Auger, S. Balasubramanian, B. Baller, C. Barnes, G. Barr, M. Bass, F. Bay, A. Bhat, K. Bhattacharya, M. Bishai, A. Blake, T. Bolton, L. Camilleri, D. Caratelli, I. Caro Terrazas, R. Carr, R. Castillo Fernandez, F. Cavanna , et al. (148 additional authors not shown)

    Abstract: We have developed a convolutional neural network (CNN) that can make a pixel-level prediction of objects in image data recorded by a liquid argon time projection chamber (LArTPC) for the first time. We describe the network design, training techniques, and software tools developed to train this network. The goal of this work is to develop a complete deep neural network based data reconstruction cha… ▽ More

    Submitted 22 August, 2018; originally announced August 2018.

    Journal ref: Phys. Rev. D 99, 092001 (2019)

  33. arXiv:1309.6204   

    cs.SI cs.CR physics.soc-ph

    A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social Networks

    Authors: Lei Jin, Xuelian Long, James Joshi

    Abstract: In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be consistent. Even if one of them conceals the link… ▽ More

    Submitted 1 December, 2013; v1 submitted 24 September, 2013; originally announced September 2013.

    Comments: This paper has been withdrawn by the authors

  34. arXiv:1209.0126  [pdf

    cs.IR

    Evaluation of some Information Retrieval models for Gujarati Ad hoc Monolingual Tasks

    Authors: Hardik J. Joshi, Pareek Jyoti

    Abstract: This paper describes the work towards Gujarati Ad hoc Monolingual Retrieval task for widely used Information Retrieval (IR) models. We present an indexing baseline for the Gujarati Language represented by Mean Average Precision (MAP) values. Our objective is to obtain a relative picture of a better IR model for Gujarati Language. Results show that Classical IR models like Term Frequency Inverse Do… ▽ More

    Submitted 1 September, 2012; originally announced September 2012.

    Comments: 6 pages, Some text in Gujarati Language

    Journal ref: VNSGU Journal of Science and Technology,3,2,176-181,2012