no code implementations • 21 Dec 2023 • Sahil Nokhwal, Manoj Chandrasekharan, Ankit Chaudhary
Various methods have been proposed to secure access to sensitive information over time, such as the many cryptographic methods in use to facilitate secure communications on the internet.
no code implementations • 15 Dec 2023 • Sahil Nokhwal, Suman Nokhwal, Saurabh Pahune, Ankit Chaudhary
In this pioneering research paper, we present a groundbreaking exploration into the synergistic fusion of classical and quantum computing paradigms within the realm of Generative Adversarial Networks (GANs).
1 code implementation • 15 Dec 2023 • Sahil Nokhwal, Priyanka Chilakalapudi, Preeti Donekal, Suman Nokhwal, Saurabh Pahune, Ankit Chaudhary
This study examines innovative approaches to expedite the training process of deep neural networks (DNN), with specific emphasis on three state-of-the-art models such as ResNet50, Vision Transformer (ViT), and EfficientNet.
no code implementations • 14 Dec 2023 • Sahil Nokhwal, Nirman Kumar
In regularization-based approaches to mitigate CF, modifications to important training parameters are penalized in subsequent tasks using an appropriate loss function.
no code implementations • 14 Dec 2023 • Sahil Nokhwal, Nirman Kumar
Rehearsal-based techniques are commonly used to mitigate catastrophic forgetting (CF) in Incremental learning (IL).
no code implementations • 14 Dec 2023 • Sahil Nokhwal, Nirman Kumar
We propose a novel exemplar selection approach based on Principal Component Analysis (PCA) and median sampling, and a neural network training regime in the setting of class-incremental learning.
no code implementations • 13 Dec 2023 • Sahil Nokhwal, Saurabh Pahune, Ankit Chaudhary
In our currently proposed image steganographic technique, we used the Shuffled Frog Leaping Algorithm (SFLA) to determine the order of pixels by which sensitive information can be placed in the cover image.