1,009 results on '"Gupta, Shashank"'
Search Results
2. Proximal Ranking Policy Optimization for Practical Safety in Counterfactual Learning to Rank
- Author
-
Gupta, Shashank, Oosterhuis, Harrie, and de Rijke, Maarten
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Retrieval - Abstract
Counterfactual learning to rank (CLTR) can be risky and, in various circumstances, can produce sub-optimal models that hurt performance when deployed. Safe CLTR was introduced to mitigate these risks when using inverse propensity scoring to correct for position bias. However, the existing safety measure for CLTR is not applicable to state-of-the-art CLTR methods, cannot handle trust bias, and relies on specific assumptions about user behavior. We propose a novel approach, proximal ranking policy optimization (PRPO), that provides safety in deployment without assumptions about user behavior. PRPO removes incentives for learning ranking behavior that is too dissimilar to a safe ranking model. Thereby, PRPO imposes a limit on how much learned models can degrade performance metrics, without relying on any specific user assumptions. Our experiments show that PRPO provides higher performance than the existing safe inverse propensity scoring approach. PRPO always maintains safety, even in maximally adversarial situations. By avoiding assumptions, PRPO is the first method with unconditional safety in deployment that translates to robust safety for real-world applications., Comment: Accepted at the CONSEQUENCES 2024 workshop, co-located with ACM RecSys 2024
- Published
- 2024
3. A Simpler Alternative to Variational Regularized Counterfactual Risk Minimization
- Author
-
Bakker, Hua Chang, Gupta, Shashank, and Oosterhuis, Harrie
- Subjects
Computer Science - Machine Learning - Abstract
Variance regularized counterfactual risk minimization (VRCRM) has been proposed as an alternative off-policy learning (OPL) method. VRCRM method uses a lower-bound on the $f$-divergence between the logging policy and the target policy as regularization during learning and was shown to improve performance over existing OPL alternatives on multi-label classification tasks. In this work, we revisit the original experimental setting of VRCRM and propose to minimize the $f$-divergence directly, instead of optimizing for the lower bound using a $f$-GAN approach. Surprisingly, we were unable to reproduce the results reported in the original setting. In response, we propose a novel simpler alternative to f-divergence optimization by minimizing a direct approximation of f-divergence directly, instead of a $f$-GAN based lower bound. Experiments showed that minimizing the divergence using $f$-GANs did not work as expected, whereas our proposed novel simpler alternative works better empirically., Comment: Accepted at the CONSEQUENCES '24 workshop, co-located with ACM RecSys '24
- Published
- 2024
4. SUPER: Evaluating Agents on Setting Up and Executing Tasks from Research Repositories
- Author
-
Bogin, Ben, Yang, Kejuan, Gupta, Shashank, Richardson, Kyle, Bransom, Erin, Clark, Peter, Sabharwal, Ashish, and Khot, Tushar
- Subjects
Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Software Engineering - Abstract
Given that Large Language Models (LLMs) have made significant progress in writing code, can they now be used to autonomously reproduce results from research repositories? Such a capability would be a boon to the research community, helping researchers validate, understand, and extend prior work. To advance towards this goal, we introduce SUPER, the first benchmark designed to evaluate the capability of LLMs in setting up and executing tasks from research repositories. SUPERaims to capture the realistic challenges faced by researchers working with Machine Learning (ML) and Natural Language Processing (NLP) research repositories. Our benchmark comprises three distinct problem sets: 45 end-to-end problems with annotated expert solutions, 152 sub problems derived from the expert set that focus on specific challenges (e.g., configuring a trainer), and 602 automatically generated problems for larger-scale development. We introduce various evaluation measures to assess both task success and progress, utilizing gold solutions when available or approximations otherwise. We show that state-of-the-art approaches struggle to solve these problems with the best model (GPT-4o) solving only 16.3% of the end-to-end set, and 46.1% of the scenarios. This illustrates the challenge of this task, and suggests that SUPER can serve as a valuable resource for the community to make and measure progress.
- Published
- 2024
5. Threshold (Q, P) Quantum Distillation
- Author
-
Gupta, Shashank, Munro, William John, and Cid, Carlos
- Subjects
Quantum Physics - Abstract
Quantum distillation is the task of concentrating quantum correlations present in 'N' imperfect copies using free operations by involving all 'P' parties sharing the quantum correlations. We present a threshold quantum distillation task where the same objective is achieved but using fewer parties 'Q'. In particular, we give exact local filtering operations by the participating parties sharing a high-dimension multipartite GHZ or W state to distil the perfect quantum correlation. Specifically, an arbitrary GHZ state can be distilled using just one party in the network, as both the success probability of the distillation protocol and the fidelity after the distillation are independent of the number of parties. However, for a general W-state, at least 'P-1' parties are required for the distillation, indicating a strong relationship between the distillation and the separability of such states. Further, we connect threshold entanglement distillation and quantum steering distillation., Comment: 15 pages, including supplementary, six figures, and toy examples
- Published
- 2024
6. Practical and Robust Safety Guarantees for Advanced Counterfactual Learning to Rank
- Author
-
Gupta, Shashank, Oosterhuis, Harrie, and de Rijke, Maarten
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Retrieval - Abstract
Counterfactual learning to rank (CLTR) can be risky and, in various circumstances, can produce sub-optimal models that hurt performance when deployed. Safe CLTR was introduced to mitigate these risks when using inverse propensity scoring to correct for position bias. However, the existing safety measure for CLTR is not applicable to state-of-the-art CLTR methods, cannot handle trust bias, and relies on specific assumptions about user behavior. Our contributions are two-fold. First, we generalize the existing safe CLTR approach to make it applicable to state-of-the-art doubly robust CLTR and trust bias. Second, we propose a novel approach, proximal ranking policy optimization (PRPO), that provides safety in deployment without assumptions about user behavior. PRPO removes incentives for learning ranking behavior that is too dissimilar to a safe ranking model. Thereby, PRPO imposes a limit on how much learned models can degrade performance metrics, without relying on any specific user assumptions. Our experiments show that both our novel safe doubly robust method and PRPO provide higher performance than the existing safe inverse propensity scoring approach. However, in unexpected circumstances, the safe doubly robust approach can become unsafe and bring detrimental performance. In contrast, PRPO always maintains safety, even in maximally adversarial situations. By avoiding assumptions, PRPO is the first method with unconditional safety in deployment that translates to robust safety for real-world applications., Comment: Accepted as full paper at CIKM 2024
- Published
- 2024
- Full Text
- View/download PDF
7. AppWorld: A Controllable World of Apps and People for Benchmarking Interactive Coding Agents
- Author
-
Trivedi, Harsh, Khot, Tushar, Hartmann, Mareike, Manku, Ruskin, Dong, Vinty, Li, Edward, Gupta, Shashank, Sabharwal, Ashish, and Balasubramanian, Niranjan
- Subjects
Computer Science - Software Engineering ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Machine Learning - Abstract
Autonomous agents that address day-to-day digital tasks (e.g., ordering groceries for a household), must not only operate multiple apps (e.g., notes, messaging, shopping app) via APIs, but also generate rich code with complex control flow in an iterative manner based on their interaction with the environment. However, existing benchmarks for tool use are inadequate, as they only cover tasks that require a simple sequence of API calls. To remedy this gap, we built $\textbf{AppWorld Engine}$, a high-quality execution environment (60K lines of code) of 9 day-to-day apps operable via 457 APIs and populated with realistic digital activities simulating the lives of ~100 fictitious users. We then created $\textbf{AppWorld Benchmark}$ (40K lines of code), a suite of 750 natural, diverse, and challenging autonomous agent tasks requiring rich and interactive code generation. It supports robust programmatic evaluation with state-based unit tests, allowing for different ways of completing a task while also checking for unexpected changes, i.e., collateral damage. The state-of-the-art LLM, GPT-4o, solves only ~49% of our 'normal' tasks and ~30% of 'challenge' tasks, while other models solve at least 16% fewer. This highlights the benchmark's difficulty and AppWorld's potential to push the frontiers of interactive coding agents. The project website is available at https://appworld.dev/., Comment: ACL'24 Camera Ready
- Published
- 2024
8. Tough Cortical Bone-Inspired Tubular Architected Cement-based Material
- Author
-
Gupta, Shashank and Moini, Reza
- Subjects
Physics - Applied Physics - Abstract
Cortical bone is a tough biological material composed of tube-like osteons embedded in the organic matrix surrounded by weak interfaces known as cement lines. The cement lines provide a microstructurally preferable crack path, hence triggering in-plane crack deflection around osteons due to cement line-crack interaction. Here, inspired by this toughening mechanism and facilitated by a hybrid (3D-printing/casting) process, we engineer architected tubular cement-based materials with a new stepwise cracking toughening mechanism, that enabled a non-brittle fracture. Using experimental and theoretical approaches, we demonstrate the underlying competition between tube size and shape on the stress intensity factor from which engineering stepwise cracking can emerge. Two competing mechanisms, both positively and negatively affected by the growing tube size, arise to significantly enhance the overall fracture toughness by up to 5.6-fold compared to the monolithic brittle counterpart without sacrificing the specific strength. This is enabled by crack-tube interaction and engineering the tube size and shape, which leads to stepwise cracking and promotes rising R-curves. Disorder curves are proposed for the first time to quantitatively characterize the degree of disorder for describing the representation of architected arrangement of materials (using statistical mechanics parameters) in lieu of otherwise inadequate periodicity classification., Comment: 51 pages, 16 figures
- Published
- 2024
9. Optimal Baseline Corrections for Off-Policy Contextual Bandits
- Author
-
Gupta, Shashank, Jeunen, Olivier, Oosterhuis, Harrie, and de Rijke, Maarten
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Retrieval - Abstract
The off-policy learning paradigm allows for recommender systems and general ranking applications to be framed as decision-making problems, where we aim to learn decision policies that optimize an unbiased offline estimate of an online reward metric. With unbiasedness comes potentially high variance, and prevalent methods exist to reduce estimation variance. These methods typically make use of control variates, either additive (i.e., baseline corrections or doubly robust methods) or multiplicative (i.e., self-normalisation). Our work unifies these approaches by proposing a single framework built on their equivalence in learning scenarios. The foundation of our framework is the derivation of an equivalent baseline correction for all of the existing control variates. Consequently, our framework enables us to characterize the variance-optimal unbiased estimator and provide a closed-form solution for it. This optimal estimator brings significantly improved performance in both evaluation and learning, and minimizes data requirements. Empirical observations corroborate our theoretical findings.
- Published
- 2024
- Full Text
- View/download PDF
10. A First Look at Selection Bias in Preference Elicitation for Recommendation
- Author
-
Gupta, Shashank, Oosterhuis, Harrie, and de Rijke, Maarten
- Subjects
Computer Science - Information Retrieval - Abstract
Preference elicitation explicitly asks users what kind of recommendations they would like to receive. It is a popular technique for conversational recommender systems to deal with cold-starts. Previous work has studied selection bias in implicit feedback, e.g., clicks, and in some forms of explicit feedback, i.e., ratings on items. Despite the fact that the extreme sparsity of preference elicitation interactions make them severely more prone to selection bias than natural interactions, the effect of selection bias in preference elicitation on the resulting recommendations has not been studied yet. To address this gap, we take a first look at the effects of selection bias in preference elicitation and how they may be further investigated in the future. We find that a big hurdle is the current lack of any publicly available dataset that has preference elicitation interactions. As a solution, we propose a simulation of a topic-based preference elicitation process. The results from our simulation-based experiments indicate (i) that ignoring the effect of selection bias early in preference elicitation can lead to an exacerbation of overrepresentation in subsequent item recommendations, and (ii) that debiasing methods can alleviate this effect, which leads to significant improvements in subsequent item recommendation performance. Our aim is for the proposed simulator and initial results to provide a starting point and motivation for future research into this important but overlooked problem setting., Comment: Accepted at the CONSEQUENCES'23 workshop at RecSys '23
- Published
- 2024
11. LLM-SR: Scientific Equation Discovery via Programming with Large Language Models
- Author
-
Shojaee, Parshin, Meidani, Kazem, Gupta, Shashank, Farimani, Amir Barati, and Reddy, Chandan K
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computation and Language ,Computer Science - Neural and Evolutionary Computing - Abstract
Mathematical equations have been unreasonably effective in describing complex natural phenomena across various scientific disciplines. However, discovering such insightful equations from data presents significant challenges due to the necessity of navigating extremely high-dimensional combinatorial and nonlinear hypothesis spaces. Traditional methods of equation discovery, commonly known as symbolic regression, largely focus on extracting equations from data alone, often neglecting the rich domain-specific prior knowledge that scientists typically depend on. To bridge this gap, we introduce LLM-SR, a novel approach that leverages the extensive scientific knowledge and robust code generation capabilities of Large Language Models (LLMs) to discover scientific equations from data in an efficient manner. Specifically, LLM-SR treats equations as programs with mathematical operators and combines LLMs' scientific priors with evolutionary search over equation programs. The LLM iteratively proposes new equation skeleton hypotheses, drawing from its physical understanding, which are then optimized against data to estimate skeleton parameters. We demonstrate LLM-SR's effectiveness across three diverse scientific domains, where it discovers physically accurate equations that provide significantly better fits to in-domain and out-of-domain data compared to the well-established symbolic regression baselines. Incorporating scientific prior knowledge also enables LLM-SR to search the equation space more efficiently than baselines. Code is available at: https://github.com/deep-symbolic-mathematics/LLM-SR
- Published
- 2024
12. NTIRE 2024 Quality Assessment of AI-Generated Content Challenge
- Author
-
Liu, Xiaohong, Min, Xiongkuo, Zhai, Guangtao, Li, Chunyi, Kou, Tengchuan, Sun, Wei, Wu, Haoning, Gao, Yixuan, Cao, Yuqin, Zhang, Zicheng, Wu, Xiele, Timofte, Radu, Peng, Fei, Fu, Huiyuan, Ming, Anlong, Wang, Chuanming, Ma, Huadong, He, Shuai, Dou, Zifei, Chen, Shu, Zhang, Huacong, Xie, Haiyi, Wang, Chengwei, Chen, Baoying, Zeng, Jishen, Yang, Jianquan, Wang, Weigang, Fang, Xi, Lv, Xiaoxin, Yan, Jun, Zhi, Tianwu, Zhang, Yabin, Li, Yaohui, Li, Yang, Xu, Jingwen, Liu, Jianzhao, Liao, Yiting, Li, Junlin, Yu, Zihao, Lu, Yiting, Li, Xin, Motamednia, Hossein, Hosseini-Benvidi, S. Farhad, Guan, Fengbin, Mahmoudi-Aznaveh, Ahmad, Mansouri, Azadeh, Gankhuyag, Ganzorig, Yoon, Kihwan, Xu, Yifang, Fan, Haotian, Kong, Fangyuan, Zhao, Shiling, Dong, Weifeng, Yin, Haibing, Zhu, Li, Wang, Zhiling, Huang, Bingchen, Saha, Avinab, Mishra, Sandeep, Gupta, Shashank, Sureddi, Rajesh, Saha, Oindrila, Celona, Luigi, Bianco, Simone, Napoletano, Paolo, Schettini, Raimondo, Yang, Junfeng, Fu, Jing, Zhang, Wei, Cao, Wenzhi, Liu, Limei, Peng, Han, Yuan, Weijun, Li, Zhan, Cheng, Yihang, Deng, Yifan, Li, Haohui, Qu, Bowen, Li, Yao, Luo, Shuqing, Wang, Shunzhou, Gao, Wei, Lu, Zihao, Conde, Marcos V., Wang, Xinrui, Chen, Zhibo, Liao, Ruling, Ye, Yan, Wang, Qiulin, Li, Bing, Zhou, Zhaokun, Geng, Miao, Chen, Rui, Tao, Xin, Liang, Xiaoyu, Sun, Shangkun, Ma, Xingyuan, Li, Jiaze, Yang, Mengduo, Xu, Haoran, Zhou, Jie, Zhu, Shiding, Yu, Bohan, Chen, Pengfei, Xu, Xinrui, Shen, Jiabin, Duan, Zhichao, Asadi, Erfan, Liu, Jiahe, Yan, Qi, Qu, Youran, Zeng, Xiaohui, Wang, Lele, and Liao, Renjie
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
This paper reports on the NTIRE 2024 Quality Assessment of AI-Generated Content Challenge, which will be held in conjunction with the New Trends in Image Restoration and Enhancement Workshop (NTIRE) at CVPR 2024. This challenge is to address a major challenge in the field of image and video processing, namely, Image Quality Assessment (IQA) and Video Quality Assessment (VQA) for AI-Generated Content (AIGC). The challenge is divided into the image track and the video track. The image track uses the AIGIQA-20K, which contains 20,000 AI-Generated Images (AIGIs) generated by 15 popular generative models. The image track has a total of 318 registered participants. A total of 1,646 submissions are received in the development phase, and 221 submissions are received in the test phase. Finally, 16 participating teams submitted their models and fact sheets. The video track uses the T2VQA-DB, which contains 10,000 AI-Generated Videos (AIGVs) generated by 9 popular Text-to-Video (T2V) models. A total of 196 participants have registered in the video track. A total of 991 submissions are received in the development phase, and 185 submissions are received in the test phase. Finally, 12 participating teams submitted their models and fact sheets. Some methods have achieved better results than baseline methods, and the winning methods in both tracks have demonstrated superior prediction performance on AIGC.
- Published
- 2024
13. Exploring Explainability in Video Action Recognition
- Author
-
Saha, Avinab, Gupta, Shashank, Ankireddy, Sravan Kumar, Chahine, Karl, and Ghosh, Joydeep
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Image Classification and Video Action Recognition are perhaps the two most foundational tasks in computer vision. Consequently, explaining the inner workings of trained deep neural networks is of prime importance. While numerous efforts focus on explaining the decisions of trained deep neural networks in image classification, exploration in the domain of its temporal version, video action recognition, has been scant. In this work, we take a deeper look at this problem. We begin by revisiting Grad-CAM, one of the popular feature attribution methods for Image Classification, and its extension to Video Action Recognition tasks and examine the method's limitations. To address these, we introduce Video-TCAV, by building on TCAV for Image Classification tasks, which aims to quantify the importance of specific concepts in the decision-making process of Video Action Recognition models. As the scalable generation of concepts is still an open problem, we propose a machine-assisted approach to generate spatial and spatiotemporal concepts relevant to Video Action Recognition for testing Video-TCAV. We then establish the importance of temporally-varying concepts by demonstrating the superiority of dynamic spatiotemporal concepts over trivial spatial concepts. In conclusion, we introduce a framework for investigating hypotheses in action recognition and quantitatively testing them, thus advancing research in the explainability of deep neural networks used in video action recognition., Comment: 6 pages, 10 figures, Accepted to the 3rd Explainable AI for Computer Vision (XAI4CV) Workshop at CVPR 2024
- Published
- 2024
14. Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure
- Author
-
Garg, Tanya, Gupta, Shashank, Obaidat, Mohammad S., and Raj, Meghna
- Published
- 2024
- Full Text
- View/download PDF
15. Device-Independent Quantum Secure Direct Communication Under Non-Markovian Quantum Channels
- Author
-
Roy, Pritam, Bera, Subhankar, Gupta, Shashank, and Majumdar, A. S.
- Subjects
Quantum Physics - Abstract
Device-independent quantum secure direct communication (DI-QSDC) is a promising primitive in quantum cryptography aimed towards addressing the problems of device imperfections and key management. However, significant effort is required to tackle practical challenges such as the distance limitation due to the decohering effects of quantum channels. Here, we explore the constructive effect of non-Markovian noise to improve the performance of DI-QSDC. Considering two different environmental dynamics modelled by the amplitude damping and the dephasing channels, we show that for both cases non-Markovianty leads to a considerable improvement over Markovian dynamics in terms of three benchmark performance criteria of the DI-QSDC task. Specifically, we find that non-Markovian noise (i) enhances the protocol security measured by Bell violation, (ii) leads to a lower quantum bit error rate, and (iii) enables larger communication distances by increasing the capacity of secret communication., Comment: 13 pages, 10 figures, comments are welcome
- Published
- 2023
- Full Text
- View/download PDF
16. A randomised controlled trial to compare TIVA infusion of mixture of ketamine propofol (ketofol) and fentanyl-propofol (fentofol) in short orthopaedic surgeries
- Author
-
Sharma, Rajneendra, Jaitawat, S.S., Partani, Seema, Saini, Ramavtar, Sharma, Nagendra, and Gupta, Shashank
- Published
- 2016
- Full Text
- View/download PDF
17. Comparison of pipeline, sequence-to-sequence, and GPT models for end-to-end relation extraction: experiments with the rare disease use-case
- Author
-
Gupta, Shashank, Ai, Xuguang, and Kavuluru, Ramakanth
- Subjects
Computer Science - Computation and Language - Abstract
End-to-end relation extraction (E2ERE) is an important and realistic application of natural language processing (NLP) in biomedicine. In this paper, we aim to compare three prevailing paradigms for E2ERE using a complex dataset focused on rare diseases involving discontinuous and nested entities. We use the RareDis information extraction dataset to evaluate three competing approaches (for E2ERE): NER $\rightarrow$ RE pipelines, joint sequence to sequence models, and generative pre-trained transformer (GPT) models. We use comparable state-of-the-art models and best practices for each of these approaches and conduct error analyses to assess their failure modes. Our findings reveal that pipeline models are still the best, while sequence-to-sequence models are not far behind; GPT models with eight times as many parameters are worse than even sequence-to-sequence models and lose to pipeline models by over 10 F1 points. Partial matches and discontinuous entities caused many NER errors contributing to lower overall E2E performances. We also verify these findings on a second E2ERE dataset for chemical-protein interactions. Although generative LM-based methods are more suitable for zero-shot settings, when training data is available, our results show that it is better to work with more conventional models trained and tailored for E2ERE. More innovative methods are needed to marry the best of the both worlds from smaller encoder-decoder pipeline models and the larger GPT models to improve E2ERE. As of now, we see that well designed pipeline models offer substantial performance gains at a lower cost and carbon footprint for E2ERE. Our contribution is also the first to conduct E2ERE for the RareDis dataset., Comment: In V2 we added new experiments with T5 models. The dataset and code for all our experiments are publicly available: https://github.com/shashank140195/Raredis
- Published
- 2023
18. Bias Runs Deep: Implicit Reasoning Biases in Persona-Assigned LLMs
- Author
-
Gupta, Shashank, Shrivastava, Vaishnavi, Deshpande, Ameet, Kalyan, Ashwin, Clark, Peter, Sabharwal, Ashish, and Khot, Tushar
- Subjects
Computer Science - Computation and Language - Abstract
Recent works have showcased the ability of LLMs to embody diverse personas in their responses, exemplified by prompts like 'You are Yoda. Explain the Theory of Relativity.' While this ability allows personalization of LLMs and enables human behavior simulation, its effect on LLMs' capabilities remains unclear. To fill this gap, we present the first extensive study of the unintended side-effects of persona assignment on the ability of LLMs to perform basic reasoning tasks. Our study covers 24 reasoning datasets, 4 LLMs, and 19 diverse personas (e.g. an Asian person) spanning 5 socio-demographic groups. Our experiments unveil that LLMs harbor deep rooted bias against various socio-demographics underneath a veneer of fairness. While they overtly reject stereotypes when explicitly asked ('Are Black people less skilled at mathematics?'), they manifest stereotypical and erroneous presumptions when asked to answer questions while adopting a persona. These can be observed as abstentions in responses, e.g., 'As a Black person, I can't answer this question as it requires math knowledge', and generally result in a substantial performance drop. Our experiments with ChatGPT-3.5 show that this bias is ubiquitous - 80% of our personas demonstrate bias; it is significant - some datasets show performance drops of 70%+; and can be especially harmful for certain groups - some personas suffer statistically significant drops on 80%+ of the datasets. Overall, all 4 LLMs exhibit this bias to varying extents, with GPT-4-Turbo showing the least but still a problematic amount of bias (evident in 42% of the personas). Further analysis shows that these persona-induced errors can be hard-to-discern and hard-to-avoid. Our findings serve as a cautionary tale that the practice of assigning personas to LLMs - a trend on the rise - can surface their deep-rooted biases and have unforeseeable and detrimental side-effects., Comment: Project page: https://allenai.github.io/persona-bias. Paper to appear at ICLR 2024. Added results for other LLMs in v2 (similar findings)
- Published
- 2023
19. Top K Relevant Passage Retrieval for Biomedical Question Answering
- Author
-
Gupta, Shashank
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Information Retrieval ,Computer Science - Machine Learning - Abstract
Question answering is a task that answers factoid questions using a large collection of documents. It aims to provide precise answers in response to the user's questions in natural language. Question answering relies on efficient passage retrieval to select candidate contexts, where traditional sparse vector space models, such as TF-IDF or BM25, are the de facto method. On the web, there is no single article that could provide all the possible answers available on the internet to the question of the problem asked by the user. The existing Dense Passage Retrieval model has been trained on Wikipedia dump from Dec. 20, 2018, as the source documents for answering questions. Question answering (QA) has made big strides with several open-domain and machine comprehension systems built using large-scale annotated datasets. However, in the clinical domain, this problem remains relatively unexplored. According to multiple surveys, Biomedical Questions cannot be answered correctly from Wikipedia Articles. In this work, we work on the existing DPR framework for the biomedical domain and retrieve answers from the Pubmed articles which is a reliable source to answer medical questions. When evaluated on a BioASQ QA dataset, our fine-tuned dense retriever results in a 0.81 F1 score., Comment: 6 pages, 5 figures. arXiv admin note: text overlap with arXiv:2004.04906 by other authors
- Published
- 2023
20. An Ethereum-based Product Identification System for Anti-counterfeits
- Author
-
Gupta, Shashank
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Databases ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Fake products are items that are marketed and sold as genuine, high-quality products but are counterfeit or low-quality knockoffs. These products are often designed to closely mimic the appearance and branding of the genuine product to deceive consumers into thinking they are purchasing the real thing. Fake products can range from clothing and accessories to electronics and other goods and can be found in a variety of settings, including online marketplaces and brick-and-mortar stores. Blockchain technology can be used to help detect fake products in a few different ways. One of the most common ways is through the use of smart contracts, which are self-executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code. This allows for a high level of transparency and traceability in supply chain transactions, making it easier to identify and prevent the sale of fake products and the use of unique product identifiers, such as serial numbers or QR codes, that are recorded on the blockchain. This allows consumers to easily verify the authenticity of a product by scanning the code and checking it against the information recorded on the blockchain. In this study, we will use smart contracts to detect fake products and will evaluate based on Gas cost and ethers used for each implementation., Comment: 5 page, 5 figures
- Published
- 2023
21. Decoding mood of the Twitterverse on ESG investing: opinion mining and key themes using machine learning
- Author
-
Jaiswal, Rachana, Gupta, Shashank, and Tiwari, Aviral Kumar
- Published
- 2024
- Full Text
- View/download PDF
22. Tough double-bouligand architected concrete enabled by robotic additive manufacturing
- Author
-
Prihar, Arjun, Gupta, Shashank, Esmaeeli, Hadi S., and Moini, Reza
- Published
- 2024
- Full Text
- View/download PDF
23. ChaQra: a cellular unit of the Indian quantum network
- Author
-
Gupta, Shashank, Agarwal, Iteash, Mogiligidda, Vijayalaxmi, Kumar Krishnan, Rajesh, Chennuri, Sruthi, Aggarwal, Deepika, Hoodati, Anwesha, Cooper, Sheroy, Ranjan, Bilal Sheik, Mohammad, Bhavya, K. M., Hegde, Manasa, Krishna, M. Naveen, Chauhan, Amit Kumar, Korrapati, Mallikarjun, Singh, Sumit, Singh, J. B., Sud, Sunil, Gupta, Sunil, Pant, Sidhartha, Sankar, Agrawal, Neha, Ranjan, Ashish, Mohapatra, Piyush, Roopak, T., Ahmad, Arsh, Nanjunda, M., and Singh, Dilip
- Published
- 2024
- Full Text
- View/download PDF
24. Employing cross-domain modelings for robust object detection in dynamic environment of autonomous vehicles
- Author
-
Rawlley, Oshin, Gupta, Shashank, Kathera, Hardik, Katyal, Siddharth, and Batwara, Yashvardhan
- Published
- 2024
- Full Text
- View/download PDF
25. Recent Advances in the Foundations and Applications of Unbiased Learning to Rank
- Author
-
Gupta, Shashank, Hager, Philipp, Huang, Jin, Vardasbi, Ali, and Oosterhuis, Harrie
- Subjects
Computer Science - Information Retrieval ,Computer Science - Machine Learning - Abstract
Since its inception, the field of unbiased learning to rank (ULTR) has remained very active and has seen several impactful advancements in recent years. This tutorial provides both an introduction to the core concepts of the field and an overview of recent advancements in its foundations along with several applications of its methods. The tutorial is divided into four parts: Firstly, we give an overview of the different forms of bias that can be addressed with ULTR methods. Secondly, we present a comprehensive discussion of the latest estimation techniques in the ULTR field. Thirdly, we survey published results of ULTR in real-world applications. Fourthly, we discuss the connection between ULTR and fairness in ranking. We end by briefly reflecting on the future of ULTR research and its applications. This tutorial is intended to benefit both researchers and industry practitioners who are interested in developing new ULTR solutions or utilizing them in real-world applications., Comment: SIGIR 2023 - Tutorial
- Published
- 2023
- Full Text
- View/download PDF
26. Safe Deployment for Counterfactual Learning to Rank with Exposure-Based Risk Minimization
- Author
-
Gupta, Shashank, Oosterhuis, Harrie, and de Rijke, Maarten
- Subjects
Computer Science - Information Retrieval ,Computer Science - Machine Learning - Abstract
Counterfactual learning to rank (CLTR) relies on exposure-based inverse propensity scoring (IPS), a LTR-specific adaptation of IPS to correct for position bias. While IPS can provide unbiased and consistent estimates, it often suffers from high variance. Especially when little click data is available, this variance can cause CLTR to learn sub-optimal ranking behavior. Consequently, existing CLTR methods bring significant risks with them, as naively deploying their models can result in very negative user experiences. We introduce a novel risk-aware CLTR method with theoretical guarantees for safe deployment. We apply a novel exposure-based concept of risk regularization to IPS estimation for LTR. Our risk regularization penalizes the mismatch between the ranking behavior of a learned model and a given safe model. Thereby, it ensures that learned ranking models stay close to a trusted model, when there is high uncertainty in IPS estimation, which greatly reduces the risks during deployment. Our experimental results demonstrate the efficacy of our proposed method, which is effective at avoiding initial periods of bad performance when little data is available, while also maintaining high performance at convergence. For the CLTR field, our novel exposure-based risk minimization method enables practitioners to adopt CLTR methods in a safer manner that mitigates many of the risks attached to previous methods., Comment: SIGIR 2023 - Full paper
- Published
- 2023
- Full Text
- View/download PDF
27. Cryptanalysis of quantum permutation pad
- Author
-
Amil, Avval and Gupta, Shashank
- Subjects
Computer Science - Cryptography and Security ,Mathematics - Combinatorics - Abstract
Cryptanalysis increases the level of confidence in cryptographic algorithms. We analyze the security of a symmetric cryptographic algorithm - quantum permutation pad (QPP) [8]. We found the instances of ciphertext the same as plaintext even after the action of QPP with the probability 1/N when the entire set of permutation matrices of dimension N is used and with the probability 1/N^m when an incomplete set of m permutation matrices of dimension N are used. We visually show such instances in a cipher image created by QPP of 256 permutation matrices of different dimensions. For any practical usage of QPP, we recommend a set of 256 permutation matrices of a dimension more or equal to 2048., Comment: 7 pages, 1 figures, comments are welcome
- Published
- 2023
28. Self-Refine: Iterative Refinement with Self-Feedback
- Author
-
Madaan, Aman, Tandon, Niket, Gupta, Prakhar, Hallinan, Skyler, Gao, Luyu, Wiegreffe, Sarah, Alon, Uri, Dziri, Nouha, Prabhumoye, Shrimai, Yang, Yiming, Gupta, Shashank, Majumder, Bodhisattwa Prasad, Hermann, Katherine, Welleck, Sean, Yazdanbakhsh, Amir, and Clark, Peter
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Like humans, large language models (LLMs) do not always generate the best output on their first try. Motivated by how humans refine their written text, we introduce Self-Refine, an approach for improving initial outputs from LLMs through iterative feedback and refinement. The main idea is to generate an initial output using an LLMs; then, the same LLMs provides feedback for its output and uses it to refine itself, iteratively. Self-Refine does not require any supervised training data, additional training, or reinforcement learning, and instead uses a single LLM as the generator, refiner, and feedback provider. We evaluate Self-Refine across 7 diverse tasks, ranging from dialog response generation to mathematical reasoning, using state-of-the-art (GPT-3.5, ChatGPT, and GPT-4) LLMs. Across all evaluated tasks, outputs generated with Self-Refine are preferred by humans and automatic metrics over those generated with the same LLM using conventional one-step generation, improving by ~20% absolute on average in task performance. Our work demonstrates that even state-of-the-art LLMs like GPT-4 can be further improved at test time using our simple, standalone approach., Comment: Code, data, and demo at https://selfrefine.info/
- Published
- 2023
29. Genuine three qubit Einstein-Podolsky-Rosen steering under decoherence: Revealing hidden genuine steerability via pre-processing
- Author
-
Gupta, Shashank
- Subjects
Quantum Physics - Abstract
The behaviour of genuine EPR steering of three qubit states under various environmental noises is investigated. In particular, we consider the two possible steering scenarios in the tripartite setting: (1 -> 2), where Alice demonstrates genuine steering to Bob-Charlie, and (2 -> 1), where Alice-Bob together demonstrates genuine steering to Charlie. In both these scenarios, we analyze the genuine steerability of the generalized Greenberger-Horne-Zeilinger (gGHZ) states or the W-class states under the action of noise modeled by amplitude damping (AD), phase flip (PF), bit flip (BF), and phase damping (PD) channels. In each case, we consider three different interactions with the noise depending upon the number of parties undergoing decoherence. We observed that the tendency to demonstrate genuine steering decreases as the number of parties undergoing decoherence increases from one to three. We have observed several instances where the genuine steerability of the state revives after collapsing if one keeps on increasing the damping. However, the hidden genuine steerability of a state cannot be revealed solely from the action of noise. So, the parties having a characterized subsystem, perform local pre-processing operations depending upon the steering scenario and the state shared with the dual intent of revealing hidden genuine steerability or enhancing it., Comment: 15 pages, 11 figures, close to quantum information processing accepted version
- Published
- 2022
- Full Text
- View/download PDF
30. Geometric Fidelity of Interlocking Bodies in Two-Component Robotic Additive Manufacturing
- Author
-
Daneshvar, Dana, Rabiei, Mahsa, Gupta, Shashank, Najmeddine, Aimane, Prihar, Arjun, Moini, Reza, Lowke, Dirk, editor, Freund, Niklas, editor, Böhler, David, editor, and Herding, Friedrich, editor
- Published
- 2024
- Full Text
- View/download PDF
31. Students’ Perceptions of Study Efficacy, Effectiveness, and Efficiency: Effects of Voice Assistant Use
- Author
-
Devkota, Ananta, Gupta, Shashank, Shrestha, Raju, Sandnes, Frode Eika, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Cheng, Yu-Ping, editor, Pedaste, Margus, editor, Bardone, Emanuele, editor, and Huang, Yueh-Min, editor
- Published
- 2024
- Full Text
- View/download PDF
32. Application of Methano Bacteria for Production of Biogas
- Author
-
Singh, Sonal, Dwivedi, Kuldip, Gupta, Shashank, Shukla, Nidhi, Srivastava, Neha, Series Editor, Mishra, P. K., Series Editor, and Singh, Pardeep, editor
- Published
- 2024
- Full Text
- View/download PDF
33. Acyldepsipeptide Antibiotics and a Bioactive Fragment Thereof Differentially Perturb Mycobacterium tuberculosis ClpXP1P2 Activity in Vitro
- Author
-
Schmitz, Karl R, Handy, Emma L, Compton, Corey L, Gupta, Shashank, Bishai, William R, Sauer, Robert T, and Sello, Jason K
- Subjects
Tuberculosis ,Infectious Diseases ,Rare Diseases ,Orphan Drug ,Infection ,Good Health and Well Being ,Humans ,Adenosine Triphosphate ,Anti-Bacterial Agents ,Bacterial Proteins ,Endopeptidase Clp ,Molecular Chaperones ,Mycobacterium tuberculosis ,Peptide Hydrolases ,Chemical Sciences ,Biological Sciences ,Organic Chemistry - Abstract
Proteolytic complexes in Mycobacterium tuberculosis (Mtb), the deadliest bacterial pathogen, are major foci in tuberculosis drug development programs. The Clp proteases, which are essential for Mtb viability, are high-priority targets. These proteases function through the collaboration of ClpP1P2, a barrel-shaped heteromeric peptidase, with associated ATP-dependent chaperones like ClpX and ClpC1 that recognize and unfold specific substrates in an ATP-dependent fashion. The critical interaction of the peptidase and its unfoldase partners is blocked by the competitive binding of acyldepsipeptide antibiotics (ADEPs) to the interfaces of the ClpP2 subunits. The resulting inhibition of Clp protease activity is lethal to Mtb. Here, we report the surprising discovery that a fragment of the ADEPs retains anti-Mtb activity yet stimulates rather than inhibits the ClpXP1P2-catalyzed degradation of proteins. Our data further suggest that the fragment stabilizes the ClpXP1P2 complex and binds ClpP1P2 in a fashion distinct from that of the intact ADEPs. A structure-activity relationship study of the bioactive fragment defines the pharmacophore and points the way toward the development of new drug leads for the treatment of tuberculosis.
- Published
- 2023
34. A universal whitening algorithm for commercial random number generators
- Author
-
Amil, Avval and Gupta, Shashank
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security - Abstract
Random number generators are imperfect due to manufacturing bias and technological imperfections. These imperfections are removed using post-processing algorithms that in general compress the data and do not work in every scenario. In this work, we present a universal whitening algorithm using n-qubit permutation matrices to remove the imperfections in commercial random number generators without compression. Specifically, we demonstrate the efficacy of our algorithm in several categories of random number generators and its comparison with cryptographic hash functions and block ciphers. We have achieved improvement in almost every randomness parameter evaluated using ENT randomness test suite. The modified random number files obtained after the application of our algorithm in the raw random data file pass the NIST SP 800-22 tests in both the cases: 1. The raw file does not pass all the tests. 2. The raw file also passes all the tests.
- Published
- 2022
35. Quantum entropy expansion using n-qubit permutation matrices in Galois field
- Author
-
Amil, Avval and Gupta, Shashank
- Subjects
Quantum Physics - Abstract
Random numbers are critical for any cryptographic application. However, the data that is flowing through the internet is not secure because of entropy deprived pseudo random number generators and unencrypted IoTs. In this work, we address the issue of lesser entropy of several data formats. Specifically, we use the large information space associated with the n-qubit permutation matrices to expand the entropy of any data without increasing the size of the data. We take English text with the entropy in the range 4 - 5 bits per byte. We manipulate the data using a set of n-qubit (n $\leq$ 10) permutation matrices and observe the expansion of the entropy in the manipulated data (to more than 7.9 bits per byte). We also observe similar behaviour with other data formats like image, audio etc. (n $\leq$ 15).
- Published
- 2022
36. Device-independent quantum secure direct communication under non-Markovian quantum channels
- Author
-
Roy, Pritam, Bera, Subhankar, Gupta, Shashank, and Majumdar, A. S.
- Published
- 2024
- Full Text
- View/download PDF
37. Device-Independent Quantum Key Distribution Using Random Quantum States
- Author
-
Bera, Subhankar, Gupta, Shashank, and Majumdar, A. S.
- Subjects
Quantum Physics - Abstract
We Haar uniformly generate random states of various ranks and study their performance in an entanglement-based quantum key distribution (QKD) task. In particular, we analyze the efficacy of random two-qubit states in realizing device-independent (DI) QKD. We first find the normalized distribution of entanglement and Bell-nonlocality which are the key resource for DI-QKD for random states ranging from rank-1 to rank-4. The number of entangled as well as Bell-nonlocal states decreases as rank increases. We observe that decrease of the secure key rate is more pronounced in comparison to that of the quantum resource with increase in rank. We find that the pure state and Werner state provide the upper and lower bound, respectively, on the minimum secure key rate of all mixed two-qubit states possessing the same magnitude of entanglement under general as well as optimal collective attack strategies., Comment: 12 pages, 6 figures
- Published
- 2022
- Full Text
- View/download PDF
38. Quantum contextuality provides communication complexity advantage
- Author
-
Gupta, Shashank, Saha, Debashis, Xu, Zhen-Peng, Cabello, Adán, and Majumdar, A. S.
- Subjects
Quantum Physics - Abstract
Despite the conceptual importance of contextuality in quantum mechanics, there is a hitherto limited number of applications requiring contextuality but not entanglement. Here, we show that for any quantum state and observables of sufficiently small dimensions producing contextuality, there exists a communication task with quantum advantage. Conversely, any quantum advantage in this task admits a proof of contextuality whenever an additional condition holds. We further show that given any set of observables allowing for quantum state-independent contextuality, there exists a class of communication tasks wherein the difference between classical and quantum communication complexities increases as the number of inputs grows. Finally, we show how to convert each of these communication tasks into a semi-device-independent protocol for quantum key distribution., Comment: 6+9 pages. Close to the published version
- Published
- 2022
- Full Text
- View/download PDF
39. Sparsely Activated Mixture-of-Experts are Robust Multi-Task Learners
- Author
-
Gupta, Shashank, Mukherjee, Subhabrata, Subudhi, Krishan, Gonzalez, Eduardo, Jose, Damien, Awadallah, Ahmed H., and Gao, Jianfeng
- Subjects
Computer Science - Machine Learning ,Computer Science - Computation and Language - Abstract
Traditional multi-task learning (MTL) methods use dense networks that use the same set of shared weights across several different tasks. This often creates interference where two or more tasks compete to pull model parameters in different directions. In this work, we study whether sparsely activated Mixture-of-Experts (MoE) improve multi-task learning by specializing some weights for learning shared representations and using the others for learning task-specific information. To this end, we devise task-aware gating functions to route examples from different tasks to specialized experts which share subsets of network weights conditioned on the task. This results in a sparsely activated multi-task model with a large number of parameters, but with the same computational cost as that of a dense model. We demonstrate such sparse networks to improve multi-task learning along three key dimensions: (i) transfer to low-resource tasks from related tasks in the training mixture; (ii) sample-efficient generalization to tasks not seen during training by making use of task-aware routing from seen related tasks; (iii) robustness to the addition of unrelated tasks by avoiding catastrophic forgetting of existing tasks.
- Published
- 2022
40. Knowledge Infused Decoding
- Author
-
Liu, Ruibo, Zheng, Guoqing, Gupta, Shashank, Gaonkar, Radhika, Gao, Chongyang, Vosoughi, Soroush, Shokouhi, Milad, and Awadallah, Ahmed Hassan
- Subjects
Computer Science - Computation and Language ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Pre-trained language models (LMs) have been shown to memorize a substantial amount of knowledge from the pre-training corpora; however, they are still limited in recalling factually correct knowledge given a certain context. Hence, they tend to suffer from counterfactual or hallucinatory generation when used in knowledge-intensive natural language generation (NLG) tasks. Recent remedies to this problem focus on modifying either the pre-training or task fine-tuning objectives to incorporate knowledge, which normally require additional costly training or architecture modification of LMs for practical applications. We present Knowledge Infused Decoding (KID) -- a novel decoding algorithm for generative LMs, which dynamically infuses external knowledge into each step of the LM decoding. Specifically, we maintain a local knowledge memory based on the current context, interacting with a dynamically created external knowledge trie, and continuously update the local memory as a knowledge-aware constraint to guide decoding via reinforcement learning. On six diverse knowledge-intensive NLG tasks, task-agnostic LMs (e.g., GPT-2 and BART) armed with KID outperform many task-optimized state-of-the-art models, and show particularly strong performance in few-shot scenarios over seven related knowledge-infusion techniques. Human evaluation confirms KID's ability to generate more relevant and factual language for the input context when compared with multiple baselines. Finally, KID also alleviates exposure bias and provides stable generation quality when generating longer sequences. Code for KID is available at https://github.com/microsoft/KID., Comment: In ICLR 2022
- Published
- 2022
41. How can we improve AI competencies for tomorrow's leaders: Insights from multi-stakeholders’ interaction
- Author
-
Gupta, Shashank and Jaiswal, Rachana
- Published
- 2024
- Full Text
- View/download PDF
42. Lung-Originated Tumor Segmentation from Computed Tomography Scan (LOTUS) Benchmark
- Author
-
Afshar, Parnian, Mohammadi, Arash, Plataniotis, Konstantinos N., Farahani, Keyvan, Kirby, Justin, Oikonomou, Anastasia, Asif, Amir, Wee, Leonard, Dekker, Andre, Wu, Xin, Haque, Mohammad Ariful, Hossain, Shahruk, Hasan, Md. Kamrul, Kamal, Uday, Hsu, Winston, Lin, Jhih-Yuan, Rahman, M. Sohel, Ibtehaz, Nabil, Foisol, Sh. M. Amir, Lam, Kin-Man, Guang, Zhong, Zhang, Runze, Channappayya, Sumohana S., Gupta, Shashank, and Dev, Chander
- Subjects
Electrical Engineering and Systems Science - Image and Video Processing ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
Lung cancer is one of the deadliest cancers, and in part its effective diagnosis and treatment depend on the accurate delineation of the tumor. Human-centered segmentation, which is currently the most common approach, is subject to inter-observer variability, and is also time-consuming, considering the fact that only experts are capable of providing annotations. Automatic and semi-automatic tumor segmentation methods have recently shown promising results. However, as different researchers have validated their algorithms using various datasets and performance metrics, reliably evaluating these methods is still an open challenge. The goal of the Lung-Originated Tumor Segmentation from Computed Tomography Scan (LOTUS) Benchmark created through 2018 IEEE Video and Image Processing (VIP) Cup competition, is to provide a unique dataset and pre-defined metrics, so that different researchers can develop and evaluate their methods in a unified fashion. The 2018 VIP Cup started with a global engagement from 42 countries to access the competition data. At the registration stage, there were 129 members clustered into 28 teams from 10 countries, out of which 9 teams made it to the final stage and 6 teams successfully completed all the required tasks. In a nutshell, all the algorithms proposed during the competition, are based on deep learning models combined with a false positive reduction technique. Methods developed by the three finalists show promising results in tumor segmentation, however, more effort should be put into reducing the false positive rate. This competition manuscript presents an overview of the VIP-Cup challenge, along with the proposed algorithms and results.
- Published
- 2022
43. Creep Failure Analysis of Western Union Splice Joints in Distribution Transformer Winding
- Author
-
Gupta, Shashank, Dwivedi, D. K., and Tripathy, Manoj
- Published
- 2023
- Full Text
- View/download PDF
44. Big data and machine learning-based decision support system to reshape the vaticination of insurance claims
- Author
-
Jaiswal, Rachana, Gupta, Shashank, and Tiwari, Aviral Kumar
- Published
- 2024
- Full Text
- View/download PDF
45. Exploring Low-Cost Transformer Model Compression for Large-Scale Commercial Reply Suggestions
- Author
-
Shrivastava, Vaishnavi, Gaonkar, Radhika, Gupta, Shashank, and Jha, Abhishek
- Subjects
Computer Science - Computation and Language - Abstract
Fine-tuning pre-trained language models improves the quality of commercial reply suggestion systems, but at the cost of unsustainable training times. Popular training time reduction approaches are resource intensive, thus we explore low-cost model compression techniques like Layer Dropping and Layer Freezing. We demonstrate the efficacy of these techniques in large-data scenarios, enabling the training time reduction for a commercial email reply suggestion system by 42%, without affecting the model relevance or user engagement. We further study the robustness of these techniques to pre-trained model and dataset size ablation, and share several insights and recommendations for commercial applications.
- Published
- 2021
46. Sublingual allergen immunotherapy prevents house dust mite inhalant type 2 immunity through dendritic cell-mediated induction of Foxp3+ regulatory T cells
- Author
-
Van der Borght, Katrien, Brimnes, Jens, Haspeslagh, Eline, Brand, Stephanie, Neyt, Katrijn, Gupta, Shashank, Knudsen, Niels Peter Hell, Hammad, Hamida, Andersen, Peter S., and Lambrecht, Bart N.
- Published
- 2024
- Full Text
- View/download PDF
47. Leveraging precision agriculture techniques using UAVs and emerging disruptive technologies
- Author
-
Raj, Meghna, N B, Harshini, Gupta, Shashank, Atiquzzaman, Mohammed, Rawlley, Oshin, and Goel, Lavika
- Published
- 2024
- Full Text
- View/download PDF
48. Preclinical murine models for the testing of antimicrobials against Mycobacterium abscessus pulmonary infections: Current practices and recommendations
- Author
-
Dartois, Véronique, Bonfield, Tracey L., Boyce, Jim P., Daley, Charles L., Dick, Thomas, Gonzalez-Juarrero, Mercedes, Gupta, Shashank, Kramnik, Igor, Lamichhane, Gyanu, Laughon, Barbara E., Lorè, Nicola I., Malcolm, Kenneth C., Olivier, Kenneth N., Tuggle, Katherine L., and Jackson, Mary
- Published
- 2024
- Full Text
- View/download PDF
49. Education and Metaverse
- Author
-
Kadari, Sai Kiran, primary, Gupta, Shashank Raj, additional, Raj, D. Prithvi, additional, and Kabanda, Gabriel, additional
- Published
- 2023
- Full Text
- View/download PDF
50. Eavesdropping a Quantum Key Distribution network using sequential quantum unsharp measurement attacks
- Author
-
Wath, Yash, M, Hariprasad, Shah, Freya, and Gupta, Shashank
- Subjects
Quantum Physics - Abstract
We investigate the possibility of eavesdropping on a quantum key distribution network by local sequential quantum unsharp measurement attacks by the eavesdropper. In particular, we consider a pure two-qubit state shared between two parties Alice and Bob, sharing quantum steerable correlations that form the one-sided device-independent quantum key distribution network. One qubit of the shared state is with Alice and the other one while going to the Bob's place is intercepted by multiple sequential eavesdroppers who perform quantum unsharp measurement attacks thus gaining some positive key rate while preserving the quantum steerable correlations for the Bob. In this way, Bob will also have a positive secret key rate although reduced. However, this reduction is not that sharp and can be perceived due to decoherence and imperfection of the measurement devices. At the end, we show that an unbounded number of eavesdroppers can also get secret information in some specific scenario., Comment: 8 pages, 3 tables, comments are welcomed
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.