Search Results for author: Sudipta Paul

Found 12 papers, 3 papers with code

C2P-GCN: Cell-to-Patch Graph Convolutional Network for Colorectal Cancer Grading

no code implementations8 Mar 2024 Sudipta Paul, Bulent Yener, Amanda W. Lund

As C2P-GCN integrates the structural data of an entire WSI into a single graph, it allows our model to work with significantly fewer training data compared to the latest models for colorectal cancer.

graph construction whole slide images

Towards Granularity-adjusted Pixel-level Semantic Annotation

no code implementations5 Dec 2023 Rohit Kundu, Sudipta Paul, Rohit Lal, Amit K. Roy-Chowdhury

Specifically, we propose an approach to enable the Segment Anything Model (SAM) with semantic recognition capability to generate pixel-level annotations for images without any manual supervision.

Semantic Segmentation

CAVEN: An Embodied Conversational Agent for Efficient Audio-Visual Navigation in Noisy Environments

no code implementations6 Jun 2023 Xiulong Liu, Sudipta Paul, Moitreya Chatterjee, Anoop Cherian

Audio-visual navigation of an agent towards locating an audio goal is a challenging task especially when the audio is sporadic or the environment is noisy.

Hierarchical Reinforcement Learning Navigate +5

AVLEN: Audio-Visual-Language Embodied Navigation in 3D Environments

no code implementations14 Oct 2022 Sudipta Paul, Amit K. Roy-Chowdhury, Anoop Cherian

Similar to audio-visual navigation tasks, the goal of our embodied agent is to localize an audio event via navigating the 3D visual world; however, the agent may also seek help from a human (oracle), where the assistance is provided in free-form natural language.

Hierarchical Reinforcement Learning Navigate +1

Exploiting Context for Robustness to Label Noise in Active Learning

no code implementations18 Oct 2020 Sudipta Paul, Shivkumar Chandrasekaran, B. S. Manjunath, Amit K. Roy-Chowdhury

Several works in computer vision have demonstrated the effectiveness of active learning for adapting the recognition model when new unlabeled data becomes available.

Active Learning Document Classification +2

FLaPS: Federated Learning and Privately Scaling

1 code implementation13 Sep 2020 Sudipta Paul, Poushali Sengupta, Subhankar Mishra

FL uses the FedAvg algorithm, which is trained in the iterative model averaging way, on the non-iid and unbalanced distributed data, without depending on the data quantity.

Federated Learning

Text-based Localization of Moments in a Video Corpus

no code implementations20 Aug 2020 Sudipta Paul, Niluthpol Chowdhury Mithun, Amit K. Roy-Chowdhury

This task poses a unique challenge as the system is required to perform: (i) retrieval of the relevant video where only a segment of the video corresponds with the queried sentence, and (ii) temporal localization of moment in the relevant video based on sentence query.

Moment Retrieval Retrieval +2

LAC : LSTM AUTOENCODER with Community for Insider Threat Detection

1 code implementation13 Aug 2020 Sudipta Paul, Subhankar Mishra

The employees of any organization, institute, or industry, spend a significant amount of time on a computer network, where they develop their own routine of activities in the form of network transactions over a time period.

Feature Engineering

Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency

no code implementations ECCV 2020 Shasha Li, Shitong Zhu, Sudipta Paul, Amit Roy-Chowdhury, Chengyu Song, Srikanth Krishnamurthy, Ananthram Swami, Kevin S. Chan

There has been a recent surge in research on adversarial perturbations that defeat Deep Neural Networks (DNNs) in machine vision; most of these perturbation-based attacks target object classifiers.

Learning With Differential Privacy

no code implementations10 Jun 2020 Poushali Sengupta, Sudipta Paul, Subhankar Mishra

The different aspects of differential privacy, it's application in privacy protection and leakage of information, a comparative discussion, on the current research approaches in this field, its utility in the real world as well as the trade-offs - will be discussed.

Intrusion Detection

BUDS: Balancing Utility and Differential Privacy by Shuffling

no code implementations7 Jun 2020 Poushali Sengupta, Sudipta Paul, Subhankar Mishra

In this work, after collecting one-hot encoded data from different sources and clients, a step of novel attribute shuffling technique using iterative shuffling (based on the query asked by the analyst) and loss estimation with an updation function and risk minimization produces a utility and privacy balanced differential private report.

Attribute

ARA : Aggregated RAPPOR and Analysis for Centralized Differential Privacy

1 code implementation6 Jan 2020 Sudipta Paul, Subhankar Mishra

The Tf-Idf estimation model then estimates the reports on the basis of the occurrence of "on bit" in a particular position and its contribution to that position.

Position

Cannot find the paper you are looking for? You can Submit a new open access paper.