Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kumar Sricharan is active.

Publication


Featured researches published by Kumar Sricharan.


international symposium on information theory | 2016

Improving convergence of divergence functional ensemble estimators

Kevin R. Moon; Kumar Sricharan; Kristjan H. Greenewald; Alfred O. Hero

Recent work has focused on the problem of non-parametric estimation of divergence functionals. Many existing approaches are restrictive in their assumptions on the density support or require difficult calculations at the support boundary which must be known a priori. We derive the MSE convergence rate of a leave-one-out kernel density plug-in divergence functional estimator for general bounded density support sets where knowledge of the support boundary is not required. We generalize the theory of optimally weighted ensemble estimation to derive two estimators that achieve the parametric rate when the densities are sufficiently smooth. The asymptotic distribution of these estimators and tuning parameter selection guidelines are provided. Based on the theory, we propose an empirical estimator of Rényi-α divergence that outperforms the standard kernel density plug-in estimator, especially in higher dimensions.


Ai Magazine | 2016

Graph Analysis for Detecting Fraud, Waste, and Abuse in Healthcare Data

Juan Liu; Eric A. Bier; Aaron Wilson; John Alexis Guerra-Gomez; Tomonori Honda; Kumar Sricharan; Leilani Gilpin; Daniel Davies

Detection of fraud, waste, and abuse (FWA) is an important yet difficult problem. In this paper, we describe a system to detect suspicious activities in large healthcare claims datasets. Each healthcare dataset is viewed as a heterogeneous network of patients, doctors, pharmacies, and other entities. These networks can be large, with millions of patients, hundreds of thousands of doctors, and tens of thousands of pharmacies, for example. Graph analysis techniques are developed to find suspicious individuals, suspicious relationships between individuals, unusual changes over time, unusual geospatial dispersion, and anomalous networks within the overall graph structure. The system has been deployed on multiple sites and data sets, both government and commercial, to facilitate the work of FWA investigation analysts.


computer and communications security | 2015

Detecting Insider Threat from Enterprise Social and Online Activity Data

Gaurang Gavai; Kumar Sricharan; Dave Gunning; Rob Rolleston; John Hanley; Mudita Singhal

Insider threat is a significant security risk for organizations. In this paper, we attempt to discover insider threat by identifying abnormal behavior in enterprise social and online activity data of employees. To this end, we process and extract relevant features that are possibly indicative of insider threat behavior. This includes features extracted from social data including email communication patterns and content, and online activity data such as web browsing patterns, email frequency, and file and machine access patterns. Subsequently, we detect statistically abnormal behavior with respect to these features using state-of-the-art anomaly detection methods, and declare this abnormal behavior as a proxy for insider threat activity. We test our approach on a real world data set with artificially injected insider threat events. We obtain a ROC score of 0.77, which shows that our proposed approach is fairly successful in identifying insider threat events. Finally, we build a visualization dashboard that enables managers and HR personnel to quickly identify employees with high threat risk scores which will enable them to take suitable preventive measures and limit security risk.


international symposium on information theory | 2017

Ensemble estimation of mutual information

Kevin R. Moon; Kumar Sricharan; Alfred O. Hero

We derive the mean squared error convergence rates of kernel density-based plug-in estimators of mutual information measures between two multidimensional random variables X and Y for two cases: 1) X and Y are both continuous; 2) X is continuous and Y is discrete. Using the derived rates, we propose an ensemble estimator of these information measures for the second case by taking a weighted sum of the plug-in estimators with varied bandwidths. The resulting ensemble estimator achieves the 1 /N parametric convergence rate when the conditional densities of the continuous variables are sufficiently smooth. To the best of our knowledge, this is the first nonparametric mutual information estimator known to achieve the parametric convergence rate for this case, which frequently arises in applications (e.g. variable selection in classification). The estimator is simple to implement as it uses the solution to an offline convex optimization problem and simple plug-in estimators. Ensemble estimators that achieve the parametric rate are also derived for the first case (X and Y are both continuous) and another case: 3) X and Y may have any mixture of discrete and continuous components.


IEEE Transactions on Information Forensics and Security | 2018

Latent Laplacian Maximum Entropy Discrimination for Detection of High-Utility Anomalies

Elizabeth Hou; Kumar Sricharan; Alfred O. Hero

Data-driven anomaly detection methods suffer from the drawback of detecting all instances that are statistically rare, irrespective of whether the detected instances have real-world significance or not. In this paper, we are interested in the problem of specifically detecting anomalous instances that are known to have high real-world utility, while ignoring the low-utility statistically anomalous instances. To this end, we propose a novel method called Latent Laplacian Maximum Entropy Discrimination (LatLapMED) as a potential solution. This method uses the Entropy Minimization (EM) algorithm to simultaneously incorporate the Geometric EM principle for identifying statistical anomalies, and the MED principle to incorporate utility labels, in order to detect high-utility anomalies. We apply our method in both simulated and real datasets to demonstrate that it has superior performance over existing alternatives that independently pre-process with unsupervised anomaly detection algorithms before classifying.


international conference on management of data | 2014

Localizing anomalous changes in time-evolving graphs

Kumar Sricharan; Kamalika Das


JoWUA | 2015

Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data.

Gaurang Gavai; Kumar Sricharan; Dave Gunning; John Hanley; Mudita Singhal; Rob Rolleston


computing in cardiology conference | 2016

Classifying heart sound recordings using deep convolutional neural networks and mel-frequency cepstral coefficients

Jonathan Rubin; Anurag Ganguli; Saigopal Nelaturi; Ion Matei; Kumar Sricharan


JoWUA | 2014

Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks.

Hoda Eldardiry; Kumar Sricharan; Juan Liu; John Hanley; Bob Price; Oliver Brdiczka; Eugene Bart


international joint conference on artificial intelligence | 2017

Recognizing Abnormal Heart Sounds Using Deep Learning.

Jonathan Rubin; Anurag Ganguli; Saigopal Nelaturi; Ion Matei; Kumar Sricharan

Collaboration


Dive into the Kumar Sricharan's collaboration.

Researchain Logo
Decentralizing Knowledge