Skip to main content

Showing 1–9 of 9 results for author: Vijayakumar, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2601.13263  [pdf

    cs.CV

    Deep Learning for Semantic Segmentation of 3D Ultrasound Data

    Authors: Chenyu Liu, Marco Cecotti, Harikrishnan Vijayakumar, Patrick Robinson, James Barson, Mihai Caleap

    Abstract: Developing cost-efficient and reliable perception systems remains a central challenge for automated vehicles. LiDAR and camera-based systems dominate, yet they present trade-offs in cost, robustness and performance under adverse conditions. This work introduces a novel framework for learning-based 3D semantic segmentation using Calyo Pulse, a modular, solid-state 3D ultrasound sensor system for us… ▽ More

    Submitted 19 January, 2026; originally announced January 2026.

    Comments: 14 pages, 10 figures, 8 tables, presented at 2025 13th International Conference on Robot Intelligence Technology and Applications (RITA)

  2. arXiv:2507.11599  [pdf

    cs.HC

    Neuroaesthetics and the Science of Visual Experience

    Authors: Harish Vijayakumar

    Abstract: Neuroaesthetics is an interdisciplinary field that brings together neuroscience, psychology, and the arts to explore how the human brain perceives and responds to visual beauty. This paper examines the neural mechanisms behind aesthetic experiences, aiming to explain why certain designs or artworks feel emotionally or cognitively "right." By analyzing the interaction between perception, emotion, a… ▽ More

    Submitted 15 July, 2025; originally announced July 2025.

    Comments: 7 pages

  3. arXiv:2504.13885  [pdf

    cs.HC

    User Satisfaction -- UX Design Strategies for Seamless Virtual Experience

    Authors: Harish Vijayakumar

    Abstract: User Experience (UX) in virtual worlds is a fast-developing discipline that requires creative design concepts to overcome the divide between physical and virtual interaction. This research investigates primary principles and techniques to improve UX in virtual experiences based on usability, accessibility, user engagement, and technology advancements. It gives detailed insight into trends, issues,… ▽ More

    Submitted 4 April, 2025; originally announced April 2025.

    Comments: 11 pages

  4. arXiv:2407.11279  [pdf, other

    cs.CR

    Static Detection of Filesystem Vulnerabilities in Android Systems

    Authors: Yu-Tsung Lee, Hayawardh Vijayakumar, Zhiyun Qian, Trent Jaeger

    Abstract: Filesystem vulnerabilities persist as a significant threat to Android systems, despite various proposed defenses and testing techniques. The complexity of program behaviors and access control mechanisms in Android systems makes it challenging to effectively identify these vulnerabilities. In this paper, we present PathSentinel, which overcomes the limitations of previous techniques by combining st… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  5. arXiv:2302.13506  [pdf, other

    cs.CR

    PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage

    Authors: Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger

    Abstract: Android's filesystem access control is a crucial aspect of its system integrity. It utilizes a combination of mandatory access controls, such as SELinux, and discretionary access controls, like Unix permissions, along with specialized access controls such as Android permissions to safeguard OEM and Android services from third-party applications. However, when OEMs introduce differentiating feature… ▽ More

    Submitted 27 February, 2023; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: 14 pages, 5 figures, submitted to IEEE TDSC. arXiv admin note: substantial text overlap with arXiv:2008.03593

  6. arXiv:2008.03593  [pdf, other

    cs.CR

    PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems

    Authors: Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger

    Abstract: Android filesystem access control provides a foundation for Android system integrity. Android utilizes a combination of mandatory (e.g., SEAndroid) and discretionary (e.g., UNIX permissions) access control, both to protect the Android platform from Android/OEM services and to protect Android/OEM services from third-party apps. However, OEMs often create vulnerabilities when they introduce market-d… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

  7. Understanding the Twitter Usage of Science Citation Index (SCI) Journals

    Authors: Aravind Sesagiri Raamkumar, Mojisola Erdt, Harsha Vijayakumar, Aarthy Nagarajan, Yin-Leng Theng

    Abstract: This paper investigates the Twitter interaction patterns of journals from the Science Citation Index (SCI) of Master Journal List (MJL). A total of 953,253 tweets extracted from 857 journal accounts, were analyzed in this study. Findings indicate that SCI journals interacted more with each other but much less with journals from other citation indices. The network structure of the communication gra… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: Paper accepted for presentation at 21st International Conference on Asia-Pacific Digital Libraries (ICADL 2019)

  8. Understanding the Twitter Usage of Humanities and Social Sciences Academic Journals

    Authors: Aravind Sesagiri Raamkumar, Mojisola Erdt, Harsha Vijayakumar, Edie Rasmussen, Yin-Leng Theng

    Abstract: Scholarly communication has the scope to transcend the limitations of the physical world through social media extended coverage and shortened information paths. Accordingly, publishers have created profiles for their journals in Twitter to promote their publications and to initiate discussions with public. This paper investigates the Twitter presence of humanities and social sciences (HSS) journal… ▽ More

    Submitted 15 July, 2018; originally announced July 2018.

    Comments: 2018 Annual Meeting of The Association for Information Science & Technology

    ACM Class: H.3.1

  9. arXiv:1410.7747  [pdf

    cs.CR cs.OS

    Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture

    Authors: Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger

    Abstract: Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are now a threat to smartphones. While researchers have advocated using virtualization to detect and prevent attacks on operating systems (e.g., VM introspection and trusted virtual domains), virtualization is not practical on smartphone systems due to the lack of virtualiz… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674)

    Report number: MoST/2014/06