Search Results - "Muthu, Annamalai"

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Smart Traffic Control: Adaptive Signal Management Based on Real-time Lane Detection using YOLOv8 by Ravichandran, M., Laxmikant, Kumar, Muthu, Annamalai

    “…As cities grow, handling traffic in big urban are-as becomes a huge proble-m. More cars on the road and not enough roads le-ad to heavy traffic jams. This…”
    Get full text
    Conference Proceeding
  2. 2

    Efficient Vehicle Detection and Classification using YOLO v8 for Real-Time Applications by Ravichandran, M., Laxmikant, Kumar, Muthu, Annamalai

    “…In the realm of real-time applications such as autonomous driving and surveillance, efficient vehicle detection stands as a paramount concern. The…”
    Get full text
    Conference Proceeding
  3. 3

    Power Generation System using Solar and Wind - A Hybrid Approach by Muthu, Annamalai, Varatharaju, Vm, Dhanalakshmi, K.M., Balamurugan, A.

    “…Today energy is the fundamental motivation for financial improvement. Yet, because of the gradual pace of ecological concern, sustainable power gives a huge…”
    Get full text
    Conference Proceeding
  4. 4

    An Improved Fuzzy Logic Based Alcohol Detection System to Preserve Road Safety using Smart Sensors Association by Kavitha, V. R., Muthu, Annamalai, Geetha, B., Pandi, V. Samuthira, Dinesh, M, Princy, B. Anni

    “…The increased risk of being involved in a traffic collision is directly proportional to the rate at which the number of vehicles on the road is growing. The…”
    Get full text
    Conference Proceeding
  5. 5

    CoVnita, an end-to-end privacy-preserving framework for SARS-CoV-2 classification by Sim, Jun Jie, Zhou, Weizhuang, Chan, Fook Mun, Annamalai, Meenatchi Sundaram Muthu Selva, Deng, Xiaoxia, Tan, Benjamin Hong Meng, Aung, Khin Mi Mi

    Published in Scientific reports (08-05-2023)
    “…Classification of viral strains is essential in monitoring and managing the COVID-19 pandemic, but patient privacy and data security concerns often limit the…”
    Get full text
    Journal Article
  6. 6

    Computer multimedia assisted language and literature teaching using Heuristic hidden Markov model and statistical language model by Zhang, Jing, Wang, Changhai, Muthu, Annamalai, Varatharaju, V.M.

    Published in Computers & electrical engineering (01-03-2022)
    “…Computer technology has been used for decades in secondary education and foreign language preparation. Still, attempts to incorporate technology have presented…”
    Get full text
    Journal Article
  7. 7

    Communication-Efficient Secure Federated Statistical Tests from Multiparty Homomorphic Encryption by Annamalai, Meenatchi Sundaram Muthu Selva, Jin, Chao, Aung, Khin Mi Mi

    Published in Applied sciences (01-11-2022)
    “…The power and robustness of statistical tests are strongly tied to the amount of data available for testing. However, much of the collected data today is…”
    Get full text
    Journal Article
  8. 8

    Privacy-Preserving Collective Learning With Homomorphic Encryption by Paul, Jestine, Annamalai, Meenatchi Sundaram Muthu Selva, Ming, William, Badawi, Ahmad Al, Veeravalli, Bharadwaj, Aung, Khin Mi Mi

    Published in IEEE access (2021)
    “…Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to…”
    Get full text
    Journal Article
  9. 9

    It's Our Loss: No Privacy Amplification for Hidden State DP-SGD With Non-Convex Loss by Annamalai, Meenatchi Sundaram Muthu Selva

    Published 08-07-2024
    “…Published in the Proceedings of the 17th ACM Workshop on Artificial Intelligence and Security (AISec 2024), please cite accordingly Differentially Private…”
    Get full text
    Journal Article
  10. 10

    The Elusive Pursuit of Replicating PATE-GAN: Benchmarking, Auditing, Debugging by Ganev, Georgi, Annamalai, Meenatchi Sundaram Muthu Selva, De Cristofaro, Emiliano

    Published 20-06-2024
    “…Synthetic data created by differentially private (DP) generative models is increasingly used in real-world settings. In this context, PATE-GAN has emerged as a…”
    Get full text
    Journal Article
  11. 11

    Nearly Tight Black-Box Auditing of Differentially Private Machine Learning by Annamalai, Meenatchi Sundaram Muthu Selva, De Cristofaro, Emiliano

    Published 22-05-2024
    “…This paper presents an auditing procedure for the Differentially Private Stochastic Gradient Descent (DP-SGD) algorithm in the black-box threat model that is…”
    Get full text
    Journal Article
  12. 12

    "What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation by Annamalai, Meenatchi Sundaram Muthu Selva, Ganev, Georgi, De Cristofaro, Emiliano

    Published 16-05-2024
    “…Differentially private synthetic data generation (DP-SDG) algorithms are used to release datasets that are structurally and statistically similar to sensitive…”
    Get full text
    Journal Article
  13. 13

    FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting by Annamalai, Meenatchi Sundaram Muthu Selva, Bilogrevic, Igor, De Cristofaro, Emiliano

    Published 28-11-2023
    “…Published in the Proceedings of the 31st Network and Distributed System Security Symposium (NDSS 2024), please cite accordingly Browser fingerprinting often…”
    Get full text
    Journal Article
  14. 14

    To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling by Annamalai, Meenatchi Sundaram Muthu Selva, Balle, Borja, De Cristofaro, Emiliano, Hayes, Jamie

    Published 15-11-2024
    “…Differentially Private Stochastic Gradient Descent (DP-SGD) is a popular method for training machine learning models with formal Differential Privacy (DP)…”
    Get full text
    Journal Article
  15. 15

    A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data by Annamalai, Meenatchi Sundaram Muthu Selva, Gadotti, Andrea, Rocher, Luc

    Published 24-01-2023
    “…Published in the Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024), please cite accordingly Recent advances in synthetic data generation…”
    Get full text
    Journal Article
  16. 16

    Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice by Gadotti, Andrea, Houssiau, Florimond, Annamalai, Meenatchi Sundaram Muthu Selva, de Montjoye, Yves-Alexandre

    Published 14-04-2023
    “…USENIX Security 22 (2022) Behavioral data generated by users' devices, ranging from emoji use to pages visited, are collected at scale to improve apps and…”
    Get full text
    Journal Article