Tejas Kulkarni

ORCID: 0009-0005-1627-0878
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Reinforcement Learning in Robotics
  • Adversarial Robustness in Machine Learning
  • Cryptography and Data Security
  • Mobile Crowdsensing and Crowdsourcing
  • Statistical Methods and Bayesian Inference
  • Robot Manipulation and Learning
  • Internet Traffic Analysis and Secure E-voting
  • Stochastic Gradient Optimization Techniques
  • Distributed systems and fault tolerance
  • Generative Adversarial Networks and Image Synthesis
  • Interactive and Immersive Displays
  • Digital Media Forensic Detection
  • Tactile and Sensory Interactions
  • Topic Modeling
  • Cell Image Analysis Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Chaos-based Image/Signal Encryption
  • Statistical Methods and Inference
  • Probability and Risk Models
  • Peer-to-Peer Network Technologies
  • Artificial Intelligence in Games
  • Data Stream Mining Techniques
  • Advanced Steganography and Watermarking Techniques

Purdue University West Lafayette
2023-2025

National Institute of Technology Rourkela
2023

Aalto University
2019-2021

DeepMind (United Kingdom)
2020-2021

University of Warwick
2016-2019

Google (United States)
2019

Massachusetts Institute of Technology
2015

Indian Institute of Technology Madras
2013-2015

Qualcomm (United Kingdom)
2011

In this paper, we consider the task of learning control policies for text-based games.In these games, all interactions in virtual world are through text and underlying state is not observed.The resulting language barrier makes such environments challenging automatic game players.We employ a deep reinforcement framework to jointly learn representations action using rewards as feedback.This enables us map descriptions into vector that capture semantics states.We evaluate our approach on two...

10.18653/v1/d15-1001 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2015-01-01

Local differential privacy (LDP), where users randomly perturb their inputs to provide plausible deniability of data without the need for a trusted party, has been adopted recently by several major technology organizations, including Google, Apple and Microsoft. This tutorial aims introduce key technical underpinnings these deployed systems, survey current research that addresses related problems within LDP model, identify relevant open directions community.

10.1145/3183713.3197390 article EN Proceedings of the 2022 International Conference on Management of Data 2018-05-25

Many analysis and machine learning tasks require the availability of marginal statistics on multidimensional datasets while providing strong privacy guarantees for data subjects. Applications these range from finding correlations in to fitting sophisticated prediction models. In this paper, we provide a set algorithms materializing under model local differential privacy. We prove first tight theoretical bounds accuracy marginals compiled each approach, perform empirical evaluation confirm...

10.1145/3183713.3196906 article EN Proceedings of the 2022 International Conference on Management of Data 2018-05-25

Advances in deep generative networks have led to impressive results recent years. Nevertheless, such models can often waste their capacity on the minutiae of datasets, presumably due weak inductive biases decoders. This is where graphics engines may come handy since they abstract away low-level details and represent images as high-level programs. Current methods that combine learning renderers are limited by hand-crafted likelihood or distance functions, a need for large amounts supervision,...

10.48550/arxiv.1804.01118 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Counting the fraction of a population having an input within specified interval i.e. range query, is fundamental data analysis primitive. Range queries can also be used to compute other core statistics such as quantiles, and build prediction models. However, frequently subject privacy concerns when it drawn from individuals, relates for example their financial, health, religious or political status. In this paper, we introduce analyze methods support under local variant differential [23],...

10.14778/3339490.3339496 article EN Proceedings of the VLDB Endowment 2019-06-01

The study of object representations in computer vision has primarily focused on developing that are useful for image classification, detection, or semantic segmentation as downstream tasks. In this work we aim to learn control and reinforcement learning (RL). To end, introduce Transporter, a neural network architecture discovering concise geometric terms keypoints image-space coordinates. Our method learns from raw video frames fully unsupervised manner, by transporting learnt features...

10.48550/arxiv.1906.11883 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Learning to control an environment without hand-crafted rewards or expert data remains challenging and is at the frontier of reinforcement learning research. We present unsupervised algorithm train agents achieve perceptually-specified goals using only a stream observations actions. Our agent simultaneously learns goal-conditioned policy goal achievement reward function that measures how similar state state. This dual optimization leads co-operative game, giving rise learned reflects...

10.48550/arxiv.1811.11359 preprint EN other-oa arXiv (Cornell University) 2018-01-01

We investigate using reinforcement learning agents as generative models of images (extending arXiv:1804.01118). A agent controls a simulated painting environment, and is trained with rewards provided by discriminator network simultaneously to assess the realism agent's samples, either unconditional or reconstructions. Compared prior work, we make number improvements architectures discriminators that lead intriguing at times surprising results. find when sufficiently constrained, can learn...

10.48550/arxiv.1910.01007 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Counting the fraction of a population having an input within specified interval i.e. range count query is fundamental database operation. Range queries can also be used to compute other interesting statistics such as quantiles. The framework differential privacy [6] (DP) becoming standard for privacy-preserving data analysis [1]. While many works address problem counting in trusted aggregation model, surprisingly, this has not been addressed specifically under untrusted (local DP [10]). In...

10.1145/3299869.3300102 article EN Proceedings of the 2022 International Conference on Management of Data 2019-06-18

We introduce a neural network architecture and learning algorithm to produce factorized symbolic representations. propose learn these concepts by observing consecutive frames, letting all the components of hidden representation except small discrete set (gating units) be predicted from previous frame, let factors variation in next frame represented entirely gated units (corresponding representations). demonstrate efficacy our approach on datasets faces undergoing 3D transformations Atari 2600 games.

10.48550/arxiv.1602.06822 preprint EN other-oa arXiv (Cornell University) 2016-01-01

For a considerable time, individuals have been searching for the most effective way to secretly transmit information, making it challenging anyone without authorization decode it. Steganography is method that conceals confidential information from unauthorized users. The message encrypted, allowing only intended recipient access message. In case of image steganography, hidden within cover image. One technique involves modifying image, so receiver can still even though not visible human eye....

10.1109/icoei56765.2023.10126072 article EN 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) 2023-04-11

We present an evaluation of text entry methods for tabletop displays given small display space allocations, increasingly important design constraint as tabletops become collaborative platforms. Small is already a requirement mobile methods, and these can often be easily ported to settings. The purpose this work determine whether are equally useful displays, or there unique aspects on large, horizontal surfaces that influence design. Our consists two studies designed elicit differences...

10.1145/2076354.2076379 article EN 2011-11-13

We investigate the problem of electing a leader in sparse but well-connected synchronous dynamic network which up to fraction nodes chosen adversarially can leave/join per time step. At this churn rate, all be replaced by new constant number rounds. Moreover, adversary shield (which may include leader) repeatedly churning their neighbourhood and thus hinder communication with rest network. However, empirical studies peer-to-peer networks have shown that significant are usually stable well...

10.1109/ipdps.2015.80 article EN 2015-05-01

We consider the problem of electing a leader among nodes in highly dynamic network where adversary has unbounded capacity to insert and remove (including leader) from change connectivity at will. present randomized Las Vegas algorithm that (re)elects O(D\log n) rounds with high probability, D is bound on diameter n maximum number any point time. assume model broadcast-based communication node can send only 1 message O(\log bits per round not aware receivers advance. Thus, our results also...

10.4204/eptcs.132.4 article EN cc-by-nc-nd arXiv (Cornell University) 2013-10-17

Concern about how to aggregate sensitive user data without compromising individual privacy is a major barrier greater availability of data. Differential has emerged as an accepted model release information while giving statistical guarantee for privacy. Many different algorithms are possible address target functions. We focus on the core problem count queries, and seek design mechanisms associated with group n individuals. Prior work focused designing by raw optimization loss function,...

10.1109/tkde.2019.2912179 article EN IEEE Transactions on Knowledge and Data Engineering 2019-01-01

Projecting high-dimensional environment observations into lower-dimensional structured representations can considerably improve data-efficiency for reinforcement learning in domains with limited data such as robotics. Can a single generally useful representation be found? In order to answer this question, it is important understand how the will used by agent and what properties good should have. paper we systematically evaluate number of common learnt hand-engineered context three robotics...

10.1109/icra48506.2021.9560733 article EN 2021-05-30

Concern about how to aggregate sensitive user data without compromising individual privacy is a major barrier greater availability of data. Differential has emerged as an accepted model release information while giving statistical guarantee for privacy. Many different algorithms are possible address target functions. We focus on the core problem count queries, and seek design mechanisms associated with group n individuals. Prior work focused designing by raw optimization loss function,...

10.1109/icde.2018.00081 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2018-04-01

In this paper, we consider the task of learning control policies for text-based games. these games, all interactions in virtual world are through text and underlying state is not observed. The resulting language barrier makes such environments challenging automatic game players. We employ a deep reinforcement framework to jointly learn representations action using rewards as feedback. This enables us map descriptions into vector that capture semantics states. evaluate our approach on two...

10.48550/arxiv.1506.08941 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...