Skip to main content

Showing 1–29 of 29 results for author: Choudhary, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2603.23994  [pdf, ps, other

    cs.LG cs.AI

    Understanding the Challenges in Iterative Generative Optimization with LLMs

    Authors: Allen Nie, Xavier Daull, Zhiyi Kuang, Abhinav Akkiraju, Anish Chaudhuri, Max Piasevoli, Ryan Rong, YuCheng Yuan, Prerit Choudhary, Shannon Xiao, Rasool Fakoor, Adith Swaminathan, Ching-An Cheng

    Abstract: Generative optimization uses large language models (LLMs) to iteratively improve artifacts (such as code, workflows or prompts) using execution feedback. It is a promising approach to building self-improving agents, yet in practice remains brittle: despite active research, only 9% of surveyed agents used any automated optimization. We argue that this brittleness arises because, to set up a learnin… ▽ More

    Submitted 25 March, 2026; originally announced March 2026.

    Comments: 36 pages, 17 figures

  2. arXiv:2602.23817  [pdf, ps, other

    cs.CV

    Footprint-Guided Exemplar-Free Continual Histopathology Report Generation

    Authors: Pratibha Kumari, Daniel Reisenbüchler, Afshin Bozorgpour, yousef Sadegheih, Priyankar Choudhary, Dorit Merhof

    Abstract: Rapid progress in vision-language modeling has enabled pathology report generation from gigapixel whole-slide images, but most approaches assume static training with simultaneous access to all data. In clinical deployment, however, new organs, institutions, and reporting conventions emerge over time, and sequential fine-tuning can cause catastrophic forgetting. We introduce an exemplar-free contin… ▽ More

    Submitted 27 February, 2026; originally announced February 2026.

  3. Structured Insight from Unstructured Data: Large Language Models for SDOH-Driven Diabetes Risk Prediction

    Authors: Sasha Ronaghi, Prerit Choudhary, David H Rehkopf, Bryant Lin

    Abstract: Social determinants of health (SDOH) play a critical role in Type 2 Diabetes (T2D) management but are often absent from electronic health records and risk prediction models. Most individual-level SDOH data is collected through structured screening tools, which lack the flexibility to capture the complexity of patient experiences and unique needs of a clinic's population. This study explores the us… ▽ More

    Submitted 19 January, 2026; originally announced January 2026.

    Comments: 7 pages, 5 figures

    Journal ref: Annu Int Conf IEEE Eng Med Biol Soc. 2025 Jul;2025:1-7

  4. arXiv:2512.09586  [pdf, ps, other

    quant-ph cs.AI cs.LG cs.NE cs.NI

    Graph-Based Bayesian Optimization for Quantum Circuit Architecture Search with Uncertainty Calibrated Surrogates

    Authors: Prashant Kumar Choudhary, Nouhaila Innan, Muhammad Shafique, Rajeev Singh

    Abstract: Quantum circuit design is a key bottleneck for practical quantum machine learning on complex, real-world data. We present an automated framework that discovers and refines variational quantum circuits (VQCs) using graph-based Bayesian optimization with a graph neural network (GNN) surrogate. Circuits are represented as graphs and mutated and selected via an expected improvement acquisition functio… ▽ More

    Submitted 10 December, 2025; originally announced December 2025.

    Comments: 17 pages, 13 figures

  5. arXiv:2509.22898  [pdf, ps, other

    cs.IT math.CO

    The Service Rate Region of Hamming Codes

    Authors: Priyanka Choudhary, Maheshanand Bhaintwal

    Abstract: The service rate region of a coded distributed storage system is the set of all achievable data access requests under the capacity constraints. This paper investigates the service rate regions of systematic Hamming codes using hypergraph theory and derives bounds for the maximal achievable service rate of individual data objects. We establish upper bounds on the sum of service rates of data symbol… ▽ More

    Submitted 26 September, 2025; originally announced September 2025.

  6. arXiv:2505.15216  [pdf, ps, other

    cs.CR cs.AI cs.CL cs.LG

    BountyBench: Dollar Impact of AI Agent Attackers and Defenders on Real-World Cybersecurity Systems

    Authors: Andy K. Zhang, Joey Ji, Celeste Menders, Riya Dulepet, Thomas Qin, Ron Y. Wang, Junrong Wu, Kyleen Liao, Jiliang Li, Jinghan Hu, Sara Hong, Nardos Demilew, Shivatmica Murgai, Jason Tran, Nishka Kacheria, Ethan Ho, Denis Liu, Lauren McLane, Olivia Bruvik, Dai-Rong Han, Seungwoo Kim, Akhil Vyas, Cuiyuanxiu Chen, Ryan Li, Weiran Xu , et al. (9 additional authors not shown)

    Abstract: AI agents have the potential to significantly alter the cybersecurity landscape. Here, we introduce the first framework to capture offensive and defensive cyber-capabilities in evolving real-world systems. Instantiating this framework with BountyBench, we set up 25 systems with complex, real-world codebases. To capture the vulnerability lifecycle, we define three task types: Detect (detecting a ne… ▽ More

    Submitted 2 December, 2025; v1 submitted 21 May, 2025; originally announced May 2025.

    Comments: 113 pages

  7. arXiv:2503.16622  [pdf, ps, other

    cs.CL

    Leveraging Large Language Models for Explainable Activity Recognition in Smart Homes: A Critical Evaluation

    Authors: Michele Fiori, Gabriele Civitarese, Priyankar Choudhary, Claudio Bettini

    Abstract: Explainable Artificial Intelligence (XAI) aims to uncover the inner reasoning of machine learning models. In IoT systems, XAI improves the transparency of models processing sensor data from multiple heterogeneous devices, ensuring end-users understand and trust their outputs. Among the many applications, XAI has also been applied to sensor-based Activities of Daily Living (ADLs) recognition in sma… ▽ More

    Submitted 20 August, 2025; v1 submitted 20 March, 2025; originally announced March 2025.

  8. arXiv:2503.15403  [pdf, other

    q-fin.ST cs.LG quant-ph

    HQNN-FSP: A Hybrid Classical-Quantum Neural Network for Regression-Based Financial Stock Market Prediction

    Authors: Prashant Kumar Choudhary, Nouhaila Innan, Muhammad Shafique, Rajeev Singh

    Abstract: Financial time-series forecasting remains a challenging task due to complex temporal dependencies and market fluctuations. This study explores the potential of hybrid quantum-classical approaches to assist in financial trend prediction by leveraging quantum resources for improved feature representation and learning. A custom Quantum Neural Network (QNN) regressor is introduced, designed with a nov… ▽ More

    Submitted 19 March, 2025; originally announced March 2025.

    Comments: 11 pages and 11 figures

  9. arXiv:2501.14330  [pdf, ps, other

    cs.CR cs.CY

    Online Authentication Habits of Indian Users

    Authors: Pratyush Choudhary, Subhrajit Das, Mukul Paras Potta, Prasuj Das, Abhishek Bichhawat

    Abstract: Passwords have been long used as the primary authentication method for web services. Weak passwords used by the users have prompted the use of password management tools and two-factor authentication to ensure better account security. While prior studies have studied their adoption individually, none of these studies focuses particularly on the Indian setting, which is culturally and economically d… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

    Comments: Submitted on 2024-10-25. Accepted at BuildSec 2024, to be published in IEEE Xplore. Original version: 8 pages

  10. arXiv:2411.15997  [pdf, other

    cs.LG cs.AI cs.DC cs.MA

    Ensuring Fair LLM Serving Amid Diverse Applications

    Authors: Redwan Ibne Seraj Khan, Kunal Jain, Haiying Shen, Ankur Mallick, Anjaly Parayil, Anoop Kulkarni, Steve Kofsky, Pankhuri Choudhary, Renèe St. Amant, Rujia Wang, Yue Cheng, Ali R. Butt, Victor Rühle, Chetan Bansal, Saravan Rajmohan

    Abstract: In a multi-tenant large language model (LLM) serving platform hosting diverse applications, some users may submit an excessive number of requests, causing the service to become unavailable to other users and creating unfairness. Existing fairness approaches do not account for variations in token lengths across applications and multiple LLM calls, making them unsuitable for such platforms. To addre… ▽ More

    Submitted 24 November, 2024; originally announced November 2024.

  11. arXiv:2407.18423  [pdf, other

    cs.LG cs.AI

    HDL-GPT: High-Quality HDL is All You Need

    Authors: Bhuvnesh Kumar, Saurav Nanda, Ganapathy Parthasarathy, Pawan Patil, Austin Tsai, Parivesh Choudhary

    Abstract: This paper presents Hardware Description Language Generative Pre-trained Transformers (HDL-GPT), a novel approach that leverages the vast repository of open-source High Definition Language (HDL) codes to train superior quality large code models. The core premise of this paper is the hypothesis that high-quality HDL is all you need to create models with exceptional performance and broad zero-shot g… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: DAC 2024 Invited Paper

  12. arXiv:2407.01238  [pdf, other

    cs.AI cs.CL eess.SP

    Large Language Models are Zero-Shot Recognizers for Activities of Daily Living

    Authors: Gabriele Civitarese, Michele Fiori, Priyankar Choudhary, Claudio Bettini

    Abstract: The sensor-based recognition of Activities of Daily Living (ADLs) in smart home environments enables several applications in the areas of energy management, safety, well-being, and healthcare. ADLs recognition is typically based on deep learning methods requiring large datasets to be trained. Recently, several studies proved that Large Language Models (LLMs) effectively capture common-sense knowle… ▽ More

    Submitted 20 March, 2025; v1 submitted 1 July, 2024; originally announced July 2024.

    Comments: Paper accepted for publication in the ACM Transactions on Intelligent Systems and Technology (TIST) journal

  13. arXiv:2401.00388  [pdf, other

    cs.CL

    FusionMind -- Improving question and answering with external context fusion

    Authors: Shreyas Verma, Manoj Parmar, Palash Choudhary, Sanchita Porwal

    Abstract: Answering questions using pre-trained language models (LMs) and knowledge graphs (KGs) presents challenges in identifying relevant knowledge and performing joint reasoning.We compared LMs (fine-tuned for the task) with the previously published QAGNN method for the Question-answering (QA) objective and further measured the impact of additional factual context on the QAGNN performance. The QAGNN met… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: 5 pages, 4 figures, 4 tables

  14. arXiv:2401.00353  [pdf, other

    cs.IR

    EXPLORE -- Explainable Song Recommendation

    Authors: Abhinav Arun, Mehul Soni, Palash Choudhary, Saksham Arora

    Abstract: This study explores the development of an explainable music recommendation system with enhanced user control. Leveraging a hybrid of collaborative filtering and content-based filtering, we address the challenges of opaque recommendation logic and lack of user influence on results. We present a novel approach combining advanced algorithms and an interactive user interface. Our methodology integrate… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: 6 pages, 7 figures

  15. EdgeAISim: A Toolkit for Simulation and Modelling of AI Models in Edge Computing Environments

    Authors: Aadharsh Roshan Nandhakumar, Ayush Baranwal, Priyanshukumar Choudhary, Muhammed Golec, Sukhpal Singh Gill

    Abstract: To meet next-generation IoT application demands, edge computing moves processing power and storage closer to the network edge to minimise latency and bandwidth utilisation. Edge computing is becoming popular as a result of these benefits, but resource management is still challenging. Researchers are utilising AI models to solve the challenge of resource management in edge computing systems. Howeve… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

    Comments: The Preprint version is submitted to Elsevier

    Journal ref: Elsevier Measurement: Sensors 2024

  16. arXiv:2308.08941  [pdf, other

    cs.CV

    Automatic Signboard Recognition in Low Quality Night Images

    Authors: Manas Kagde, Priyanka Choudhary, Rishi Joshi, Somnath Dey

    Abstract: An essential requirement for driver assistance systems and autonomous driving technology is implementing a robust system for detecting and recognizing traffic signs. This system enables the vehicle to autonomously analyze the environment and make appropriate decisions regarding its movement, even when operating at higher frame rates. However, traffic sign images captured in inadequate lighting and… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 13 pages, CVIP 2023

  17. arXiv:2305.12518  [pdf, other

    cs.CL

    VAKTA-SETU: A Speech-to-Speech Machine Translation Service in Select Indic Languages

    Authors: Shivam Mhaskar, Vineet Bhat, Akshay Batheja, Sourabh Deoghare, Paramveer Choudhary, Pushpak Bhattacharyya

    Abstract: In this work, we present our deployment-ready Speech-to-Speech Machine Translation (SSMT) system for English-Hindi, English-Marathi, and Hindi-Marathi language pairs. We develop the SSMT system by cascading Automatic Speech Recognition (ASR), Disfluency Correction (DC), Machine Translation (MT), and Text-to-Speech Synthesis (TTS) models. We discuss the challenges faced during the research and deve… ▽ More

    Submitted 21 May, 2023; originally announced May 2023.

  18. arXiv:2207.13430  [pdf, other

    cs.CV

    Concept Drift Challenge in Multimedia Anomaly Detection: A Case Study with Facial Datasets

    Authors: Pratibha Kumari, Priyankar Choudhary, Pradeep K. Atrey, Mukesh Saini

    Abstract: Anomaly detection in multimedia datasets is a widely studied area. Yet, the concept drift challenge in data has been ignored or poorly handled by the majority of the anomaly detection frameworks. The state-of-the-art approaches assume that the data distribution at training and deployment time will be the same. However, due to various real-life environmental factors, the data may encounter drift in… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: 14 pages, 13 figures, 4 tables

  19. arXiv:2207.01109  [pdf, other

    cs.DS cs.DM math.CO

    On Polynomial Kernels for Traveling Salesperson Problem and its Generalizations

    Authors: Václav Blažej, Pratibha Choudhary, Dušan Knop, Šimon Schierreich, Ondřej Suchý, Tomáš Valla

    Abstract: For many problems, the important instances from practice possess certain structure that one should reflect in the design of specific algorithms. As data reduction is an important and inextricable part of today's computation, we employ one of the most successful models of such precomputation -- the kernelization. Within this framework, we focus on Traveling Salesperson Problem (TSP) and some of its… ▽ More

    Submitted 3 July, 2022; originally announced July 2022.

    Comments: 46 pages, 4 figures, Full version of ESA '22 paper

  20. arXiv:2202.11927  [pdf, other

    cs.DS

    Polynomial Kernels for Tracking Shortest Paths

    Authors: Václav Blažej, Pratibha Choudhary, Dušan Knop, Jan Matyáš Křišťan, Ondřej Suchý, Tomáš Valla

    Abstract: Given an undirected graph $G=(V,E)$, vertices $s,t\in V$, and an integer $k$, Tracking Shortest Paths requires deciding whether there exists a set of $k$ vertices $T\subseteq V$ such that for any two distinct shortest paths between $s$ and $t$, say $P_1$ and $P_2$, we have $T\cap V(P_1)\neq T\cap V(P_2)$. In this paper, we give the first polynomial size kernel for the problem. Specifically we show… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

  21. arXiv:2110.06656  [pdf, other

    cs.DS

    Parameterized Complexity of Minimum Membership Dominating Set

    Authors: Akanksha Agrawal, Pratibha Choudhary, N. S. Narayanaswamy, K. K. Nisha, Vijayaragunathan Ramamoorthi

    Abstract: Given a graph $G=(V,E)$ and an integer $k$, the Minimum Membership Dominating Set (MMDS) problem seeks to find a dominating set $S \subseteq V$ of $G$ such that for each $v \in V$, $|N[v] \cap S|$ is at most $k$. We investigate the parameterized complexity of the problem and obtain the following results about MMDS: W[1]-hardness of the problem parameterized by the pathwidth (and thus, treewidth… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  22. arXiv:2108.01430  [pdf, other

    cs.DS

    Constant Factor Approximation for Tracking Paths and Fault Tolerant Feedback Vertex Set

    Authors: Václav Blažej, Pratibha Choudhary, Dušan Knop, Jan Matyáš Křišťan, Ondřej Suchý, Tomáš Valla

    Abstract: Consider a vertex-weighted graph $G$ with a source $s$ and a target $t$. Tracking Paths requires finding a minimum weight set of vertices (trackers) such that the sequence of trackers in each path from $s$ to $t$ is unique. In this work, we derive a factor $6$-approximation algorithm for Tracking Paths in weighted graphs and a factor $4$-approximation algorithm if the input is unweighted. This is… ▽ More

    Submitted 24 February, 2022; v1 submitted 3 August, 2021; originally announced August 2021.

  23. arXiv:2107.12245  [pdf, other

    cs.DS

    On Kernels for d-Path Vertex Cover

    Authors: Radovan Červený, Pratibha Choudhary, Ondřej Suchý

    Abstract: In this paper we study the kernelization of the $d$-Path Vertex Cover ($d$-PVC) problem. Given a graph $G$, the problem requires finding whether there exists a set of at most $k$ vertices whose removal from $G$ results in a graph that does not contain a path (not necessarily induced) with $d$ vertices. It is known that $d$-PVC is NP-complete for $d\geq 2$. Since the problem generalizes to $d$-Hitt… ▽ More

    Submitted 4 July, 2022; v1 submitted 26 July, 2021; originally announced July 2021.

  24. arXiv:2008.09806  [pdf, other

    cs.DS

    Structural Parameterizations of Tracking Paths Problem

    Authors: Pratibha Choudhary, Venkatesh Raman

    Abstract: Given a graph $G$ with source and destination vertices $s,t\in V(G)$ respectively, \textsc{Tracking Paths} asks for a minimum set of vertices $T\subseteq V(G)$, such that the sequence of vertices encountered in each simple path from $s$ to $t$ is unique. The problem was proven \textsc{NP}-hard \cite{tr-j} and was found to admit a quadratic kernel when parameterized by the size of the desired solut… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

  25. arXiv:2002.07799  [pdf, other

    cs.DS

    Polynomial Time Algorithms for Tracking Path Problems

    Authors: Pratibha Choudhary

    Abstract: Given a graph $G$, and terminal vertices $s$ and $t$, the TRACKING PATHS problem asks to compute a minimum number of vertices to be marked as trackers, such that the sequence of trackers encountered in each s-t path is unique. TRACKING PATHS is NP-hard in both directed and undirected graphs in general. In this paper we give a collection of polynomial time algorithms for some restricted versions of… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: Submitted to IWOCA 2020

  26. arXiv:2001.08977  [pdf, ps, other

    cs.DS

    Fixed-parameter tractable algorithms for Tracking Shortest Paths

    Authors: Aritra Banik, Pratibha Choudhary, Venkatesh Raman, Saket Saurabh

    Abstract: We consider the parameterized complexity of the problem of tracking shortest s-t paths in graphs, motivated by applications in security and wireless networks. Given an undirected and unweighted graph with a source s and a destination t, Tracking Shortest Paths asks if there exists a k-sized subset of vertices (referred to as tracking set) that intersects each shortest s-t path in a distinct set of… ▽ More

    Submitted 18 August, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

  27. arXiv:2001.03161  [pdf, other

    cs.DS

    Improved Kernels for Tracking Path Problem

    Authors: Pratibha Choudhary, Venkatesh Raman

    Abstract: Tracking of moving objects is crucial to security systems and networks. Given a graph $G$, terminal vertices $s$ and $t$, and an integer $k$, the \textsc{Tracking Paths} problem asks whether there exists at most $k$ vertices, which if marked as trackers, would ensure that the sequence of trackers encountered in each s-t path is unique. It is known that the problem is NP-hard and admits a kernel (r… ▽ More

    Submitted 21 August, 2020; v1 submitted 9 January, 2020; originally announced January 2020.

  28. arXiv:1804.08675  [pdf

    cs.CL

    Data-Driven Investigative Journalism For Connectas Dataset

    Authors: Aniket Jain, Bhavya Sharma, Paridhi Choudhary, Rohan Sangave, William Yang

    Abstract: The following paper explores the possibility of using Machine Learning algorithms to detect the cases of corruption and malpractice by governments. The dataset used by the authors contains information about several government contracts in Colombia from year 2007 to 2012. The authors begin with exploring and cleaning the data, followed by which they perform feature engineering before finally implem… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

  29. arXiv:1306.1740  [pdf

    cs.CR cs.NI cs.PF

    HTTPI Based Web Service Security over SOAP

    Authors: Pankaj Choudhary, Rajendra Aaseri, Nirmal Roberts

    Abstract: Now a days, a new family of web applications open applications, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a new transport protocol is proposed, which ens… ▽ More

    Submitted 7 June, 2013; originally announced June 2013.

    Comments: International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013

    Journal ref: Choudhary, P., Aaseri, R., Roberts, N., (2013) "HTTPI Based Web Service Security over SOAP", IJNSA, Vol.5, No.3, on pp. 55-66