Ajitha Rajan

ORCID: 0000-0003-3765-3075
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • vaccines and immunoinformatics approaches
  • Peptidase Inhibition and Analysis
  • Software Testing and Debugging Techniques
  • Immunotherapy and Immune Responses
  • Monoclonal and Polyclonal Antibodies Research
  • Glycosylation and Glycoproteins Research
  • Software System Performance and Reliability
  • Software Engineering Research
  • Adversarial Robustness in Machine Learning
  • Parallel Computing and Optimization Techniques
  • Software Reliability and Analysis Research
  • Explainable Artificial Intelligence (XAI)
  • Formal Methods in Verification
  • Advanced Malware Detection Techniques
  • Advanced Software Engineering Methodologies
  • Machine Learning and Data Classification
  • Advanced Neural Network Applications
  • Blockchain Technology Applications and Security
  • Speech Recognition and Synthesis
  • Model-Driven Software Engineering Techniques
  • Radiation Effects in Electronics
  • Computational Drug Discovery Methods
  • Advanced Proteomics Techniques and Applications
  • Topic Modeling
  • Software Engineering Techniques and Practices

University of Edinburgh
2016-2025

Government Medical College
2024

University of Glasgow
2023

Halliburton (United States)
2023

University of Oxford
2012-2013

Laboratoire d'Informatique de Grenoble
2010-2011

Université Joseph Fourier
2011

Université Grenoble Alpes
2010

University of Minnesota
2006-2008

University of Minnesota System
2006-2008

In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior software system without regard to internal structure implementation. current practice, adequacy black box test suites inferred by examining coverage on an executable artifact, either source code or model.In this paper, we define structural metrics directly high-level formal requirements. These provide objective, implementation-independent measures how well exercises...

10.1145/1146238.1146242 article EN 2006-07-21

In avionics and other critical systems domains, adequacy of test suites is currently measured using the MC/DC metric on source code (or a model in model-based development). We believe that rigor highly sensitive to structure implementation can therefore be misleading as criterion. investigate this hypothesis by empirically studying effect program coverage.

10.1145/1368088.1368111 article EN 2008-01-01

Executing, verifying and enforcing credible transactions on permissionless blockchains is done using smart contracts. A key challenge with contracts ensuring their correctness security. To address this challenge, we present a fully automated technique, SolAnalyser, for vulnerability detection over Solidity that uses both static dynamic analysis. Analysis techniques in the literature rely analysis high rate of false positives or lack support vulnerabilities like out gas, unchecked send,...

10.1109/apsec48747.2019.00071 article EN 2019-12-01

Deep learning models for medical image classification tasks are becoming widely implemented in AI-assisted diagnostic tools, aiming to enhance accuracy, reduce clinician workloads, and improve patient outcomes. However, their vulnerability adversarial attacks poses significant risks safety. Current attack methodologies use general techniques such as model querying or pixel value perturbations generate examples designed fool a model. These approaches may not adequately address the unique...

10.48550/arxiv.2502.05214 preprint EN arXiv (Cornell University) 2025-02-04

Abstract ProteinMPNN is widely used in protein design workflows due to its ability identify amino acid sequences that fold into specific 3D structures. In our work, we adjust proteins for a given structure with reduced immune-visibility cytotoxic T lymphocytes recognize via the MHC-I pathway. To achieve this, developed novel framework integrates Direct Preference Optimization (DPO)—a tuning method originally designed large language models—with peptide presentation predictions. This approach...

10.1093/protein/gzaf003 article EN cc-by Protein Engineering Design and Selection 2025-03-18

Abstract Tumor antigens can emerge through multiple mechanisms, including translation of noncoding genomic regions. This noncanonical category tumor has recently gained attention; however, our understanding how they recur within and between cancer types is still in its infancy. Therefore, we developed a proteogenomic pipeline based on deep learning de novo mass spectrometry (MS) to enable the discovery MHC class I–associated peptides (ncMAP) from Considering that emergence also involve...

10.1158/2326-6066.cir-22-0621 article EN cc-by Cancer Immunology Research 2023-03-24

Abstract The ability to predict whether a peptide will get presented on Major Histocompatibility Complex (MHC) class I molecules has profound implications in designing vaccines. Numerous deep learning-based predictors for presentation MHC exist with high levels of accuracy. However, these are treated as black-box functions, providing little insight into their decision making. To build turst predictors, it is crucial understand the rationale behind decisions human-interpretable explanations....

10.1038/s42003-024-05968-2 article EN cc-by Communications Biology 2024-03-06

Software design patterns are widely used in software engineering to enhance productivity and maintainability.However, recent empirical studies revealed the high energy overhead these patterns. Our vision is automatically detect transform during compilation for better efficiency without impacting existing coding practices. In this paper, we propose compiler transformations two patterns, Observer Decorator, perform an initial evaluation of their efficiency.

10.1109/icse.2015.208 article EN 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2015-05-01

Test adequacy metrics defined over the structure of a program, such as Modified Condition and Decision Coverage (MC/DC), are used to assess testing efforts. However, MC/DC can be “cheated” by restructuring program make it easier achieve desired coverage. This is concerning, given importance in assessing test suites for critical systems domains. In this work, we have explored impact implementation on efficacy satisfying criterion using four real-world avionics systems. Our results demonstrate...

10.1145/2934672 article EN ACM Transactions on Software Engineering and Methodology 2016-07-19

Solidity is an object-oriented and high-level language for writing smart contracts that are used to execute, verify enforce credible transactions on permissionless blockchains. In the last few years, analysis of has raised considerable interest numerous techniques have been proposed check presence vulnerabilities in them. Current lack traceability source code widely differing work flows. There no single unifying framework analysis, instrumentation, optimisation generation at level. this...

10.1109/apsec48747.2019.00069 article EN 2019-12-01

As product life-cycles become shorter and the scale complexity of systems increase, accelerating execution large test suites gains importance. Existing research has primarily focussed on techniques that reduce size suite. By contrast, we propose a technique accelerates execution, allowing to run in fraction original time, by parallel with Graphics Processing Unit (GPU).

10.1145/2642937.2642957 article EN 2014-09-15

In civil avionics, obtaining DO-178B certification for highly critical airborne software requires that the adequacy of code testing effort be measured using a structural coverage criterion known as Modified Condition and Decision Coverage (MC/DC). We hypothesized effectiveness MC/DC metric is sensitive to structure implementation can therefore problematic test criterion. tested this hypothesis by evaluating fault-finding ability MC/DC-adequate suites on five industrial systems (flight...

10.1109/dasc.2008.4702848 article EN 2011 IEEE/AIAA 30th Digital Avionics Systems Conference 2008-10-01

Model-based software development is gaining interest in domains such as avionics, space, and automotives.The model serves the central artifact for efforts (such as, code generation), therefore, it crucial that be extensively validated.Automatic generation of interaction test suites a candidate partial automation this validation task.Interaction testing combinatorial approach systematically tests all t-way combinations inputs system.In paper, we report how well (2-way through 5-way suites)...

10.1109/apsec.2006.42 article EN 2006-01-01

Embedded software is found everywhere from our highly visible mobile devices to the confines of car in form smart sensors. companies are under huge pressure produce safe applications that limit risks, and testing absolutely critical alleviate concerns regarding safety user privacy. This requires using large test suites throughout development process, increasing time-to-market ultimately hindering competitivity.

10.1145/3092703.3092720 article EN 2017-07-10

Library migration is a challenging problem, where most existing approaches rely on prior knowledge. This can be, for example, information derived from changelogs or statistical models of API usage.

10.1145/3324884.3416618 article EN 2020-12-21

Explainable AI (XAI) techniques have been widely used to help explain and understand the output of deep learning models in fields such as image classification Natural Language Processing. Interest using XAI learning-based Automatic Speech Recognition (ASR) is emerging. But there not enough evidence on whether these explanations can be trusted. To address this, we adapt a state-of-the-art technique from domain, Local Interpretable Model-Agnostic Explanations (LIME), model trained for...

10.1109/icassp48485.2024.10445989 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

The rapidly advancing field of Explainable Artificial Intelligence (XAI) aims to tackle the issue trust regarding use complex black-box deep learning models in real-world applications. Existing post-hoc XAI techniques have recently been shown poor performance on medical data, producing unreliable explanations which are infeasible for clinical use. To address this, we propose an ante-hoc approach based concept bottleneck introduces first time concepts into classification pipeline, allowing...

10.48550/arxiv.2403.19444 preprint EN arXiv (Cornell University) 2024-03-28

Proteins have an arsenal of medical applications that include disrupting protein interactions, acting as potent vaccines, and replacing genetically deficient proteins. While therapeutics must avoid triggering unwanted immune-responses, vaccines should support a robust immune-reaction targeting broad range pathogen variants. Therefore, computational methods modifying proteins' immunogenicity without function are needed. many components the immune-system can be involved in reaction, we focus...

10.1016/j.immuno.2024.100035 article EN cc-by ImmunoInformatics 2024-05-07

This paper proposes a fully explainable approach to speaker verification (SV), task that fundamentally relies on individual characteristics. The opaque use of attributes in current SV systems raises concerns trust. Addressing this, we propose an attribute-based system identifies speakers by comparing personal such as gender, nationality, and age extracted automatically from voice recordings. We believe this better aligns with human reasoning, making it more understandable than traditional...

10.48550/arxiv.2405.19796 preprint EN arXiv (Cornell University) 2024-05-30

ProteinMPNN is crucial in many protein design pipelines, identifying amino acid (AA) sequences that fold into given 3D backbone structures. We explore the context of designing therapeutic proteins need to avoid triggering unwanted immune reactions. More specifically, we focus on intra-cellular face challenge evading detection by Cytotoxic T-lymphocytes (CTLs) detect their presence via MHC Class I (MHC-I) pathway. To reduce visibility designed this immune-system component, develop a framework...

10.1101/2024.06.04.597365 preprint EN cc-by bioRxiv (Cold Spring Harbor Laboratory) 2024-06-05
Coming Soon ...