Skip to main content

Showing 1–50 of 63 results for author: Shaunak

  1. arXiv:2410.07403  [pdf, other

    cs.RO

    On the Feasibility of A Mixed-Method Approach for Solving Long Horizon Task-Oriented Dexterous Manipulation

    Authors: Shaunak A. Mehta, Rana Soltani Zarrin

    Abstract: In-hand manipulation of tools using dexterous hands in real-world is an underexplored problem in the literature. In addition to more complex geometry and larger size of the tools compared to more commonly used objects like cubes or cylinders, task oriented in-hand tool manipulation involves many sub-tasks to be performed sequentially. This may involve reaching to the tool, picking it up, reorienti… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  2. arXiv:2408.06246  [pdf, other

    cs.RO

    Stable-BC: Controlling Covariate Shift with Stable Behavior Cloning

    Authors: Shaunak A. Mehta, Yusuf Umut Ciftci, Balamurugan Ramachandran, Somil Bansal, Dylan P. Losey

    Abstract: Behavior cloning is a common imitation learning paradigm. Under behavior cloning the robot collects expert demonstrations, and then trains a policy to match the actions taken by the expert. This works well when the robot learner visits states where the expert has already demonstrated the correct action; but inevitably the robot will also encounter new states outside of its training dataset. If the… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

  3. arXiv:2406.16812  [pdf, other

    cs.GT

    FlipDyn in Graphs: Resource Takeover Games in Graphs

    Authors: Sandeep Banik, Shaunak D. Bopardikar, Naira Hovakimyan

    Abstract: We present \texttt{FlipDyn-G}, a dynamic game model extending the \texttt{FlipDyn} framework to a graph-based setting, where each node represents a dynamical system. This model captures the interactions between a defender and an adversary who strategically take over nodes in a graph to minimize (resp. maximize) a finite horizon additive cost. At any time, the \texttt{FlipDyn} state is represented… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: 25 pages, 8 figures, submitted to GameSec 2024

  4. arXiv:2404.13755  [pdf, other

    cs.RO

    Combining and Decoupling Rigid and Soft Grippers to Enhance Robotic Manipulation

    Authors: Maya Keely, Yeunhee Kim, Shaunak A. Mehta, Joshua Hoegerman, Robert Ramirez Sanchez, Emily Paul, Camryn Mills, Dylan P. Losey, Michael D. Bartlett

    Abstract: For robot arms to perform everyday tasks in unstructured environments, these robots must be able to manipulate a diverse range of objects. Today's robots often grasp objects with either soft grippers or rigid end-effectors. However, purely rigid or purely soft grippers have fundamental limitations: soft grippers struggle with irregular, heavy objects, while rigid grippers often cannot grasp small,… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  5. arXiv:2404.12526  [pdf, other

    cs.LG cs.CL cs.CV

    Adaptive Memory Replay for Continual Learning

    Authors: James Seale Smith, Lazar Valkov, Shaunak Halbe, Vyshnavi Gutta, Rogerio Feris, Zsolt Kira, Leonid Karlinsky

    Abstract: Foundation Models (FMs) have become the hallmark of modern AI, however, these models are trained on massive data, leading to financially expensive training. Updating FMs as new data becomes available is important, however, can lead to `catastrophic forgetting', where models underperform on tasks related to data sub-populations observed too long ago. This continual learning (CL) phenomenon has been… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: CVPR-W 2024 (Spotlight)

  6. arXiv:2404.10157  [pdf, other

    cs.CV cs.LG

    Salient Object-Aware Background Generation using Text-Guided Diffusion Models

    Authors: Amir Erfan Eshratifar, Joao V. B. Soares, Kapil Thadani, Shaunak Mishra, Mikhail Kuznetsov, Yueh-Ning Ku, Paloma de Juan

    Abstract: Generating background scenes for salient objects plays a crucial role across various domains including creative design and e-commerce, as it enhances the presentation and context of subjects by integrating them into tailored environments. Background generation can be framed as a task of text-conditioned outpainting, where the goal is to extend image content beyond a salient object's boundaries on… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Accepted for publication at CVPR 2024's Generative Models for Computer Vision workshop

  7. arXiv:2403.14997  [pdf, ps, other

    cs.RO eess.SY

    Linear Quadratic Guidance Law for Joint Motion Planning of a Pursuer-Turret Assembly

    Authors: Bhargav Jha, Shaunak Bopardikar, Alexander Von Moll, David Casbeer

    Abstract: This paper presents joint motion planning of a vehicle with an attached rotating turret. The turret has a limited range as well as the field of view. The objective is capture a maneuvering target such that at the terminal time it is withing the field-of-view and range limits. Catering to it, we present a minimum effort guidance law that commensurate for the turn rate abilities of the vehicle and t… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  8. arXiv:2403.13281  [pdf, other

    cs.RO

    Waypoint-Based Reinforcement Learning for Robot Manipulation Tasks

    Authors: Shaunak A. Mehta, Soheil Habibian, Dylan P. Losey

    Abstract: Robot arms should be able to learn new tasks. One framework here is reinforcement learning, where the robot is given a reward function that encodes the task, and the robot autonomously learns actions to maximize its reward. Existing approaches to reinforcement learning often frame this problem as a Markov decision process, and learn a policy (or a hierarchy of policies) to complete the task. These… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  9. arXiv:2311.10899  [pdf, other

    cs.CV cs.CL cs.LG

    Extraction and Summarization of Explicit Video Content using Multi-Modal Deep Learning

    Authors: Shaunak Joshi, Raghav Gaggar

    Abstract: With the increase in video-sharing platforms across the internet, it is difficult for humans to moderate the data for explicit content. Hence, an automated pipeline to scan through video data for explicit content has become the need of the hour. We propose a novel pipeline that uses multi-modal deep learning to first extract the explicit segments of input videos and then summarize their content us… ▽ More

    Submitted 20 November, 2023; v1 submitted 17 November, 2023; originally announced November 2023.

    Comments: 8 pages, 3 figures

    ACM Class: I.2.10

  10. arXiv:2310.14484  [pdf, other

    eess.SY cs.GT

    FlipDyn with Control: Resource Takeover Games with Dynamics

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We present the FlipDyn, a dynamic game in which two opponents (a defender and an adversary) choose strategies to optimally takeover a resource that involves a dynamical system. At any time instant, each player can take over the resource and thereby control the dynamical system after incurring a state-dependent and a control-dependent costs. The resulting model becomes a hybrid dynamical system whe… ▽ More

    Submitted 25 October, 2023; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: 17 Pages, 2 figures. Under review at IEEE TAC

  11. arXiv:2310.05904  [pdf, other

    cs.RO eess.SY

    On Multi-Fidelity Impedance Tuning for Human-Robot Cooperative Manipulation

    Authors: Ethan Lau, Vaibhav Srivastava, Shaunak D. Bopardikar

    Abstract: We examine how a human-robot interaction (HRI) system may be designed when input-output data from previous experiments are available. In particular, we consider how to select an optimal impedance in the assistance design for a cooperative manipulation task with a new operator. Due to the variability between individuals, the design parameters that best suit one operator of the robot may not be the… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

    Comments: 7 pages, 3 figures. Submitted to the 2024 ACC on September 29, 2023

  12. arXiv:2309.01281  [pdf, other

    cs.CR cs.DC cs.GT

    Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions

    Authors: Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu

    Abstract: Many of our critical infrastructure systems and personal computing systems have a distributed computing systems structure. The incentives to attack them have been growing rapidly as has their attack surface due to increasing levels of connectedness. Therefore, we feel it is time to bring in rigorous reasoning to secure such systems. The distributed system security and the game theory technical com… ▽ More

    Submitted 28 May, 2024; v1 submitted 3 September, 2023; originally announced September 2023.

    Comments: Accepted to appear at the IEEE Security & Privacy Magazine

  13. arXiv:2308.09863  [pdf, other

    cs.RO

    StROL: Stabilized and Robust Online Learning from Humans

    Authors: Shaunak A. Mehta, Forrest Meng, Andrea Bajcsy, Dylan P. Losey

    Abstract: Robots often need to learn the human's reward function online, during the current interaction. This real-time learning requires fast but approximate learning rules: when the human's behavior is noisy or suboptimal, current approximations can result in unstable robot learning. Accordingly, in this paper we seek to enhance the robustness and convergence properties of gradient descent learning rules… ▽ More

    Submitted 4 January, 2024; v1 submitted 18 August, 2023; originally announced August 2023.

  14. arXiv:2307.15326  [pdf, other

    cs.CV cs.IR cs.LG

    Staging E-Commerce Products for Online Advertising using Retrieval Assisted Image Generation

    Authors: Yueh-Ning Ku, Mikhail Kuznetsov, Shaunak Mishra, Paloma de Juan

    Abstract: Online ads showing e-commerce products typically rely on the product images in a catalog sent to the advertising platform by an e-commerce platform. In the broader ads industry such ads are called dynamic product ads (DPA). It is common for DPA catalogs to be in the scale of millions (corresponding to the scale of products which can be bought from the e-commerce platform). However, not all product… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

    Comments: Accepted for publication in AdKDD 2023

  15. arXiv:2306.09970  [pdf, other

    cs.CV cs.AI cs.LG

    Continual Adaptation of Vision Transformers for Federated Learning

    Authors: Shaunak Halbe, James Seale Smith, Junjiao Tian, Zsolt Kira

    Abstract: In this paper, we focus on the important yet understudied problem of Continual Federated Learning (CFL), where a server communicates with a set of clients to incrementally learn new concepts over time without sharing or storing any data. The complexity of this problem is compounded by challenges from both the Continual and Federated Learning perspectives. Specifically, models trained in a CFL setu… ▽ More

    Submitted 21 September, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: Transactions on Machine Learning Research (TMLR) 2024

  16. arXiv:2304.02769  [pdf, other

    cs.AI

    Low-Shot Learning for Fictional Claim Verification

    Authors: Viswanath Chadalapaka, Derek Nguyen, JoonWon Choi, Shaunak Joshi, Mohammad Rostami

    Abstract: In this paper, we study the problem of claim verification in the context of claims about fictional stories in a low-shot learning setting. To this end, we generate two synthetic datasets and then develop an end-to-end pipeline and model that is tested on both benchmarks. To test the efficacy of our pipeline and the difficulty of benchmarks, we compare our models' results against human and random a… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages

  17. arXiv:2301.03034  [pdf, other

    cs.DB cs.SE

    Hunter: Using Change Point Detection to Hunt for Performance Regressions

    Authors: Matt Fleming, Piotr Kołaczkowski, Ishita Kumar, Shaunak Das, Sean McCarthy, Pushkala Pattabhiraman, Henrik Ingo

    Abstract: Change point detection has recently gained popularity as a method of detecting performance changes in software due to its ability to cope with noisy data. In this paper we present Hunter, an open source tool that automatically detects performance regressions and improvements in time-series data. Hunter uses a modified E-divisive means algorithm to identify statistically significant changes in norm… ▽ More

    Submitted 8 January, 2023; originally announced January 2023.

  18. arXiv:2210.15791  [pdf, other

    cs.RO

    RISO: Combining Rigid Grippers with Soft Switchable Adhesives

    Authors: Shaunak A. Mehta, Yeunhee Kim, Joshua Hoegerman, Michael D. Bartlett, Dylan P. Losey

    Abstract: Robot arms that assist humans should be able to pick up, move, and release everyday objects. Today's assistive robot arms use rigid grippers to pinch items between fingers; while these rigid grippers are well suited for large and heavy objects, they often struggle to grasp small, numerous, or delicate items (such as foods). Soft grippers cover the opposite end of the spectrum; these grippers use a… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

  19. arXiv:2210.03019  [pdf, other

    cs.NI

    Comparative Analysis and Calibration of Low Cost Resistive and Capacitive Soil Moisture Sensor

    Authors: Sourodip Chowdhury, Shaunak Sen, S. Janardhanan

    Abstract: Soil moisture is an essential parameter in agriculture. It determines several environmental and agricultural activities such as climate change, drought prediction, irrigation, etc. Smart irrigation management requires continuous soil moisture monitoring to reduce unnecessary water usage. In recent times, the use of low-cost sensors is becoming popular among farmers for soil moisture monitoring. In… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

  20. arXiv:2209.06970  [pdf, other

    cs.CV cs.GR cs.LG

    Generative Visual Prompt: Unifying Distributional Control of Pre-Trained Generative Models

    Authors: Chen Henry Wu, Saman Motamed, Shaunak Srivastava, Fernando De la Torre

    Abstract: Generative models (e.g., GANs, diffusion models) learn the underlying data distribution in an unsupervised manner. However, many applications of interest require sampling from a particular region of the output space or sampling evenly over a range of characteristics. For efficient sampling in these scenarios, we propose Generative Visual Prompt (PromptGen), a framework for distributional control o… ▽ More

    Submitted 17 October, 2022; v1 submitted 14 September, 2022; originally announced September 2022.

    Comments: NeurIPS 2022

  21. arXiv:2209.05574  [pdf, other

    cs.GT eess.SY

    FlipDyn: A game of resource takeovers in dynamical systems

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We introduce a game in which two players with opposing objectives seek to repeatedly takeover a common resource. The resource is modeled as a discrete time dynamical system over which a player can gain control after spending a state-dependent amount of energy at each time step. We use a FlipIT-inspired deterministic model that decides which player is in control at every time step. A player's polic… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 8 pages, 13 figures, accepted at the 61st IEEE Conference on Decision and Control, 2022, in Cancún, Mexico

  22. arXiv:2208.14263  [pdf

    cs.CV

    Controllable 3D Generative Adversarial Face Model via Disentangling Shape and Appearance

    Authors: Fariborz Taherkhani, Aashish Rai, Quankai Gao, Shaunak Srivastava, Xuanbai Chen, Fernando de la Torre, Steven Song, Aayush Prakash, Daeil Kim

    Abstract: 3D face modeling has been an active area of research in computer vision and computer graphics, fueling applications ranging from facial expression transfer in virtual avatars to synthetic data generation. Existing 3D deep learning generative models (e.g., VAE, GANs) allow generating compact face representations (both shape and texture) that can model non-linearities in the shape and appearance spa… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: 8 Pages

  23. arXiv:2207.03395  [pdf, other

    cs.RO

    Unified Learning from Demonstrations, Corrections, and Preferences during Physical Human-Robot Interaction

    Authors: Shaunak A. Mehta, Dylan P. Losey

    Abstract: Humans can leverage physical interaction to teach robot arms. This physical interaction takes multiple forms depending on the task, the user, and what the robot has learned so far. State-of-the-art approaches focus on learning from a single modality, or combine multiple interaction types by assuming that the robot has prior information about the human's intended task. By contrast, in this paper we… ▽ More

    Submitted 9 January, 2024; v1 submitted 7 July, 2022; originally announced July 2022.

  24. A State Transition Model for Mobile Notifications via Survival Analysis

    Authors: Yiping Yuan, Jing Zhang, Shaunak Chatterjee, Shipeng Yu, Romer Rosales

    Abstract: Mobile notifications have become a major communication channel for social networking services to keep users informed and engaged. As more mobile applications push notifications to users, they constantly face decisions on what to send, when and how. A lack of research and methodology commonly leads to heuristic decision making. Many notifications arrive at an inappropriate moment or introduce too m… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: 9 pages, 7 figures. Published in WSDM 19'

    ACM Class: I.2.6

    Journal ref: WSDM 2019 Pages 123-131

  25. arXiv:2205.09795  [pdf, other

    cs.RO

    SARI: Shared Autonomy across Repeated Interaction

    Authors: Ananth Jonnavittula, Shaunak A. Mehta, Dylan P. Losey

    Abstract: Assistive robot arms try to help their users perform everyday tasks. One way robots can provide this assistance is shared autonomy. Within shared autonomy, both the human and robot maintain control over the robot's motion: as the robot becomes confident it understands what the human wants, it intervenes to automate the task. But how does the robot know these tasks in the first place? State-of-the-… ▽ More

    Submitted 16 February, 2024; v1 submitted 19 May, 2022; originally announced May 2022.

    Comments: 33 pages, 20 figures. arXiv admin note: substantial text overlap with arXiv:2107.09650

  26. arXiv:2203.17269  [pdf, other

    cs.LG cs.AI cs.CV

    A Closer Look at Rehearsal-Free Continual Learning

    Authors: James Seale Smith, Junjiao Tian, Shaunak Halbe, Yen-Chang Hsu, Zsolt Kira

    Abstract: Continual learning is a setting where machine learning models learn novel concepts from continuously shifting training data, while simultaneously avoiding degradation of knowledge on previously seen classes which may disappear from the training data for extended periods of time (a phenomenon known as the catastrophic forgetting problem). Current approaches for continual learning of a single expand… ▽ More

    Submitted 3 April, 2023; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: Accepted by the 2023 IEEE/CVF Conference on Computer Vision and Pattern (CVPR) Workshop on Continual Learning in Computer Vision (CLVision 2023)

  27. arXiv:2110.11205  [pdf, other

    cs.LG cs.AI cs.CL cs.CV

    Robustness through Data Augmentation Loss Consistency

    Authors: Tianjian Huang, Shaunak Halbe, Chinnadhurai Sankar, Pooyan Amini, Satwik Kottur, Alborz Geramifard, Meisam Razaviyayn, Ahmad Beirami

    Abstract: While deep learning through empirical risk minimization (ERM) has succeeded at achieving human-level performance at a variety of complex tasks, ERM is not robust to distribution shifts or adversarial attacks. Synthetic data augmentation followed by empirical risk minimization (DA-ERM) is a simple and widely used solution to improve robustness in ERM. In addition, consistency regularization can be… ▽ More

    Submitted 24 January, 2023; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 40 pages

  28. arXiv:2110.04667  [pdf, other

    cs.DS eess.SY

    Competitive Perimeter Defense of Conical Environments

    Authors: Shivam Bajaj, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia, David W. Casbeer

    Abstract: We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measu… ▽ More

    Submitted 29 March, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

    Comments: Version 2 has additional images

  29. arXiv:2109.08801  [pdf, other

    cs.RO

    Learning Latent Actions without Human Demonstrations

    Authors: Shaunak A. Mehta, Sagar Parekh, Dylan P. Losey

    Abstract: We can make it easier for disabled users to control assistive robots by mapping the user's low-dimensional joystick inputs to high-dimensional, complex actions. Prior works learn these mappings from human demonstrations: a non-disabled human either teleoperates or kinesthetically guides the robot arm through a variety of motions, and the robot learns to reproduce the demonstrated behaviors. But th… ▽ More

    Submitted 22 February, 2022; v1 submitted 17 September, 2021; originally announced September 2021.

  30. TSI: an Ad Text Strength Indicator using Text-to-CTR and Semantic-Ad-Similarity

    Authors: Shaunak Mishra, Changwei Hu, Manisha Verma, Kevin Yen, Yifan Hu, Maxim Sviridenko

    Abstract: Coming up with effective ad text is a time consuming process, and particularly challenging for small businesses with limited advertising experience. When an inexperienced advertiser onboards with a poorly written ad text, the ad platform has the opportunity to detect low performing ad text, and provide improvement suggestions. To realize this opportunity, we propose an ad text strength indicator (… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at CIKM 2021

  31. VisualTextRank: Unsupervised Graph-based Content Extraction for Automating Ad Text to Image Search

    Authors: Shaunak Mishra, Mikhail Kuznetsov, Gaurav Srivastava, Maxim Sviridenko

    Abstract: Numerous online stock image libraries offer high quality yet copyright free images for use in marketing campaigns. To assist advertisers in navigating such third party libraries, we study the problem of automatically fetching relevant ad images given the ad text (via a short textual query for images). Motivated by our observations in logged data on ad image search queries (given ad text), we formu… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at KDD 2021

  32. arXiv:2106.11312  [pdf, other

    cs.CY cs.LG stat.ML

    Feedback Shaping: A Modeling Approach to Nurture Content Creation

    Authors: Ye Tu, Chun Lo, Yiping Yuan, Shaunak Chatterjee

    Abstract: Social media platforms bring together content creators and content consumers through recommender systems like newsfeed. The focus of such recommender systems has thus far been primarily on modeling the content consumer preferences and optimizing for their experience. However, it is equally critical to nurture content creation by prioritizing the creators' interests, as quality content forms the se… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Journal ref: KDD 2019: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining

  33. arXiv:2106.00762  [pdf, other

    cs.SI stat.AP stat.ME

    A/B Testing for Recommender Systems in a Two-sided Marketplace

    Authors: Preetam Nandy, Divya Venugopalan, Chun Lo, Shaunak Chatterjee

    Abstract: Two-sided marketplaces are standard business models of many online platforms (e.g., Amazon, Facebook, LinkedIn), wherein the platforms have consumers, buyers or content viewers on one side and producers, sellers or content-creators on the other. Consumer side measurement of the impact of a treatment variant can be done via simple online A/B testing. Producer side measurement is more challenging be… ▽ More

    Submitted 26 October, 2021; v1 submitted 28 May, 2021; originally announced June 2021.

    MSC Class: 62K99; 62G05; 62P30

  34. arXiv:2101.11556  [pdf, other

    cs.IR cs.HC

    Powering COVID-19 community Q&A with Curated Side Information

    Authors: Manisha Verma, Kapil Thadani, Shaunak Mishra

    Abstract: Community question answering and discussion platforms such as Reddit, Yahoo! answers or Quora provide users the flexibility of asking open ended questions to a large audience, and replies to such questions maybe useful both to the user and the community on certain topics such as health, sports or finance. Given the recent events around COVID-19, some of these platforms have attracted 2000+ questio… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

  35. arXiv:2011.04635  [pdf, other

    cs.LG eess.SY

    Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning

    Authors: Arnab Bhattacharya, Thiagarajan Ramachandran, Sandeep Banik, Chase P. Dowling, Shaunak D. Bopardikar

    Abstract: Adversary emulation is an offensive exercise that provides a comprehensive assessment of a system's resilience against cyber attacks. However, adversary emulation is typically a manual process, making it costly and hard to deploy in cyber-physical systems (CPS) with complex dynamics, vulnerabilities, and operational uncertainties. In this paper, we develop an automated, domain-aware approach to ad… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: To appear in the Proceedings of the 18th IEEE International Conference on Intelligence and Security Informatics (2020)

  36. arXiv:2008.07467  [pdf, other

    cs.CL cs.IR cs.LG

    Learning to Create Better Ads: Generation and Ranking Approaches for Ad Creative Refinement

    Authors: Shaunak Mishra, Manisha Verma, Yichao Zhou, Kapil Thadani, Wei Wang

    Abstract: In the online advertising industry, the process of designing an ad creative (i.e., ad text and image) requires manual labor. Typically, each advertiser launches multiple creatives via online A/B tests to infer effective creatives for the target audience, that are then refined further in an iterative fashion. Due to the manual nature of this process, it is time-consuming to learn, refine, and deplo… ▽ More

    Submitted 1 December, 2020; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: 9 pages, accepted for publication in CIKM 2020

  37. arXiv:2006.11347  [pdf, other

    cs.RO

    Student Mixture Model Based Visual Servoing

    Authors: Mithun. P, Shaunak A. Mehta, Suril V. Shah, Gaurav Bhatnagar, K. Madhava Krishna

    Abstract: Classical Image-Based Visual Servoing (IBVS) makes use of geometric image features like point, straight line and image moments to control a robotic system. Robust extraction and real-time tracking of these features are crucial to the performance of the IBVS. Moreover, such features can be unsuitable for real world applications where it might not be easy to distinguish a target from the rest of the… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: 35 pages, 17 figures

  38. arXiv:2006.07452  [pdf, other

    cs.GT cs.RO

    Secure Route Planning Using Dynamic Games with Stopping States

    Authors: Sandeep Banik, Shaunak D. Bopardikar

    Abstract: We consider the classic motion planning problem defined over a roadmap in which a vehicle seeks to find an optimal path from a source to a destination in presence of an attacker who can launch attacks on the vehicle over any edge of the roadmap. The vehicle (defender) has the capability to switch on/off a countermeasure that can detect and permanently disable the attack if it occurs concurrently.… ▽ More

    Submitted 15 April, 2022; v1 submitted 12 June, 2020; originally announced June 2020.

    Comments: 8 pages, 5 figures. Technical report for the corresponding conference paper accepted at IEEE International Conference on Intelligent Robots and Systems (IROS), 2020

  39. arXiv:2006.06637  [pdf, other

    cs.CV cs.CL

    Exploring Weaknesses of VQA Models through Attribution Driven Insights

    Authors: Shaunak Halbe

    Abstract: Deep Neural Networks have been successfully used for the task of Visual Question Answering for the past few years owing to the availability of relevant large scale datasets. However these datasets are created in artificial settings and rarely reflect the real world scenario. Recent research effectively applies these VQA models for answering visual questions for the blind. Despite achieving high ac… ▽ More

    Submitted 16 June, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: Second Grand-Challenge and Workshop on Multimodal Language, ACL 2020

  40. arXiv:2001.07194  [pdf, other

    cs.CL cs.CV cs.IR cs.LG cs.MM

    Recommending Themes for Ad Creative Design via Visual-Linguistic Representations

    Authors: Yichao Zhou, Shaunak Mishra, Manisha Verma, Narayan Bhamidipati, Wei Wang

    Abstract: There is a perennial need in the online advertising industry to refresh ad creatives, i.e., images and text used for enticing online users towards a brand. Such refreshes are required to reduce the likelihood of ad fatigue among online users, and to incorporate insights from other successful campaigns in related product categories. Given a brand, to come up with themes for a new ad is a painstakin… ▽ More

    Submitted 27 February, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

    Comments: 7 pages, 8 figures, 2 tables, accepted by The Web Conference 2020

  41. arXiv:1909.00057  [pdf, other

    cs.IR cs.LG stat.ML

    Learning from Multi-User Activity Trails for B2B Ad Targeting

    Authors: Shaunak Mishra, Jelena Gligorijevic, Narayan Bhamidipati

    Abstract: Online purchase decisions in organizations can go through a complex journey with multiple agents involved in the decision making process. Depending on the product being purchased, and the organizational structure, the process may involve employees who first conduct market research, and then influence decision makers who place the online purchase order. In such cases, the online activity trail of a… ▽ More

    Submitted 29 August, 2019; originally announced September 2019.

    Comments: 6 pages, accepted for AdKDD 2019 workshop held in conjunction with KDD 2019

  42. arXiv:1902.03098   

    cs.SI cs.LG stat.ML

    Measuring Long-term Impact of Ads on LinkedIn Feed

    Authors: Jinyun Yan, Birjodh Tiwana, Souvik Ghosh, Haishan Liu, Shaunak Chatterjee

    Abstract: Organic updates (from a member's network) and sponsored updates (or ads, from advertisers) together form the newsfeed on LinkedIn. The newsfeed, the default homepage for members, attracts them to engage, brings them value and helps LinkedIn grow. Engagement and Revenue on feed are two critical, yet often conflicting objectives. Hence, it is important to design a good Revenue-Engagement Tradeoff (R… ▽ More

    Submitted 26 May, 2019; v1 submitted 29 January, 2019; originally announced February 2019.

    Comments: Needs more polish

    Journal ref: 2018 Conference on Digital Experimentation (CODE)

  43. arXiv:1901.10550  [pdf, other

    stat.ME cs.LG

    Personalized Treatment Selection using Causal Heterogeneity

    Authors: Ye Tu, Kinjal Basu, Cyrus DiCiccio, Romil Bansal, Preetam Nandy, Padmini Jaikumar, Shaunak Chatterjee

    Abstract: Randomized experimentation (also known as A/B testing or bucket testing) is widely used in the internet industry to measure the metric impact obtained by different treatment variants. A/B tests identify the treatment variant showing the best performance, which then becomes the chosen or selected treatment for the entire population. However, the effect of a given treatment can differ across experim… ▽ More

    Submitted 21 December, 2020; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: 12 Pages, 7 Figures

  44. arXiv:1811.04475  [pdf, other

    cs.GT cs.LG stat.ML

    Managing App Install Ad Campaigns in RTB: A Q-Learning Approach

    Authors: Anit Kumar Sahu, Shaunak Mishra, Narayan Bhamidipati

    Abstract: Real time bidding (RTB) enables demand side platforms (bidders) to scale ad campaigns across multiple publishers affiliated to an RTB ad exchange. While driving multiple campaigns for mobile app install ads via RTB, the bidder typically has to: (i) maintain each campaign's efficiency (i.e., meet advertiser's target cost-per-install), (ii) be sensitive to advertiser's budget, and (iii) make profit… ▽ More

    Submitted 11 November, 2018; originally announced November 2018.

    Comments: 6 pages

  45. arXiv:1807.07752  [pdf

    cs.CL cs.LG stat.ML

    Twitter Sentiment Analysis System

    Authors: Shaunak Joshi, Deepali Deshpande

    Abstract: Social media is increasingly used by humans to express their feelings and opinions in the form of short text messages. Detecting sentiments in the text has a wide range of applications including identifying anxiety or depression of individuals and measuring well-being or mood of a community. Sentiments can be expressed in many ways that can be seen such as facial expression and gestures, speech an… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

    Comments: 5 pages

    Journal ref: International Journal of Computer Applications (2018)

  46. arXiv:1711.06989  [pdf, other

    cs.LG stat.ML

    Sequential Randomized Matrix Factorization for Gaussian Processes: Efficient Predictions and Hyper-parameter Optimization

    Authors: Shaunak D. Bopardikar, George S. Eskander Ekladious

    Abstract: This paper presents a sequential randomized lowrank matrix factorization approach for incrementally predicting values of an unknown function at test points using the Gaussian Processes framework. It is well-known that in the Gaussian processes framework, the computational bottlenecks are the inversion of the (regularized) kernel matrix and the computation of the hyper-parameters defining the kerne… ▽ More

    Submitted 19 November, 2017; originally announced November 2017.

  47. arXiv:1611.02329  [pdf, other

    cs.GT

    Convergence Analysis of Iterated Best Response for a Trusted Computation Game

    Authors: Shaunak D. Bopardikar, Alberto Speranzon, Cedric Langbort

    Abstract: We introduce a game of trusted computation in which a sensor equipped with limited computing power leverages a central node to evaluate a specified function over a large dataset, collected over time. We assume that the central computer can be under attack and we propose a strategy where the sensor retains a limited amount of the data to counteract the effect of attack. We formulate the problem as… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

    Comments: Contains detailed proofs of all results as well as an additional section on "the case of equal means" (Section 5)

  48. arXiv:1604.02380  [pdf, other

    cs.CR cs.IT

    Group secret key agreement over state-dependent wireless broadcast channels

    Authors: Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi

    Abstract: We consider a group of $m$ trusted and authenticated nodes that aim to create a shared secret key $K$ over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public c… ▽ More

    Submitted 8 April, 2016; originally announced April 2016.

    Comments: 27 pages, 6 figures, submitted for publication

  49. arXiv:1602.06643  [pdf, other

    cs.DB cs.CR

    An Algebraic Topological Approach to Privacy: Numerical and Categorical Data

    Authors: Alberto Speranzon, Shaunak D. Bopardikar

    Abstract: In this paper, we cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We begin by addressing the simpler case when the data lies in a metric space. This case is instrumental to introduce the m… ▽ More

    Submitted 21 February, 2016; originally announced February 2016.

  50. arXiv:1510.02462  [pdf, other

    math.OC cs.CR cs.IT eess.SY

    Secure State Estimation against Sensor Attacks in the Presence of Noise

    Authors: Shaunak Mishra, Yasser Shoukry, Nikhil Karamchandani, Suhas Diggavi, Paulo Tabuada

    Abstract: We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over… ▽ More

    Submitted 12 October, 2015; v1 submitted 8 October, 2015; originally announced October 2015.

    Comments: Submitted to IEEE TCNS special issue on secure control of cyber physical systems. A preliminary version of this work appeared in the proceedings of ISIT 2015. arXiv admin note: text overlap with arXiv:1504.05566