Search Results for author: Rohit Singh

Found 12 papers, 3 papers with code

Designing the Game to Play: Optimizing Payoff Structure in Security Games

no code implementations5 May 2018 Zheyuan Ryan Shi, Ziye Tang, Long Tran-Thanh, Rohit Singh, Fei Fang

We study Stackelberg Security Games where the defender, in addition to allocating defensive resources to protect targets from the attacker, can strategically manipulate the attacker's payoff under budget constraints in weighted L^p-norm form regarding the amount of change.

Deep Reinforcement Learning for Green Security Games with Real-Time Information

no code implementations6 Nov 2018 Yufei Wang, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang

Green Security Games (GSGs) have been proposed and applied to optimize patrols conducted by law enforcement agencies in green security domains such as combating poaching, illegal logging and overfishing.

Q-Learning reinforcement-learning +1

Applying SVGD to Bayesian Neural Networks for Cyclical Time-Series Prediction and Inference

no code implementations17 Jan 2019 Xinyu Hu, Paul Szerlip, Theofanis Karaletsos, Rohit Singh

A regression-based BNN model is proposed to predict spatiotemporal quantities like hourly rider demand with calibrated uncertainties.

regression Time Series +1

MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) application

no code implementations13 Nov 2019 Rohit Singh, Douglas Sicker, Kazi Mohammed Saidul Huq

One solution is to maximize the user coverage for a single AP, which might be dependent on multiple parameters.

Ultra-dense Low Data Rate (UDLD) Communication in the THz

no code implementations22 Sep 2020 Rohit Singh, Doug Sicker

Using distributed device-to-device (D2D) communication in the THz, we can cater to these Ultra-dense Low Data Rate (UDLD) type applications.

Multi-agent Reinforcement Learning

Consenting to Internet of Things Across Different Social Settings

no code implementations18 Feb 2021 Yasasvi Hari, Rohit Singh, Kizito Nyuytiymbiy, David Butera

Devices connected to the Internet of Things (IoT) are rapidly becoming ubiquitous across modern homes, workplaces, and other social environments.

Cryptography and Security

Granger causal inference on DAGs identifies genomic loci regulating transcription

1 code implementation ICLR 2022 Rohit Singh, Alexander P. Wu, Bonnie Berger

When a dynamical system can be modeled as a sequence of observations, Granger causality is a powerful approach for detecting predictive interactions between its variables.

Causal Inference

Causally-guided Regularization of Graph Attention Improves Generalizability

no code implementations20 Oct 2022 Alexander P. Wu, Thomas Markovich, Bonnie Berger, Nils Hammerla, Rohit Singh

Graph attention networks estimate the relational importance of node neighbors to aggregate relevant information over local neighborhoods for a prediction task.

Causal Inference Graph Attention +1

Enhancements for 5G NR PRACH Reception: An AI/ML Approach

no code implementations12 Jan 2024 Rohit Singh, Anil Kumar Yerrapragada, Jeeva Keshav S, Radha Krishna Ganti

The UE identifies itself by embedding a Preamble Index (RAPID) in the phase rotation of a known base sequence, which it transmits on the Physical Random Access Channel (PRACH).

A Quick Guide to Quantum Communication

no code implementations24 Feb 2024 Rohit Singh, Roshan M. Bodile

This article provides a quick overview of quantum communication, bringing together several innovative aspects of quantum enabled transmission.

Cannot find the paper you are looking for? You can Submit a new open access paper.