Skip to main content

Showing 1–10 of 10 results for author: Chaki, R

.
  1. arXiv:1911.03407  [pdf, other

    cs.CL

    Question Generation from Paragraphs: A Tale of Two Hierarchical Models

    Authors: Vishwajeet Kumar, Raktim Chaki, Sai Teja Talluri, Ganesh Ramakrishnan, Yuan-Fang Li, Gholamreza Haffari

    Abstract: Automatic question generation from paragraphs is an important and challenging problem, particularly due to the long context from paragraphs. In this paper, we propose and study two hierarchical models for the task of question generation from paragraphs. Specifically, we propose (a) a novel hierarchical BiLSTM model with selective attention and (b) a novel hierarchical Transformer architecture, bot… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  2. arXiv:1406.4941  [pdf

    cs.NI cs.CR

    Study of Security Issues in Pervasive Environment of Next Generation Internet of Things

    Authors: Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki

    Abstract: Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current secu… ▽ More

    Submitted 19 June, 2014; originally announced June 2014.

    Comments: 12 pages, CISIM 2013

  3. arXiv:1211.4866  [pdf

    cs.DB cs.NE

    A Brief Review of Data Mining Application Involving Protein Sequence Classification

    Authors: Suprativ Saha, Rituparna Chaki

    Abstract: Data mining techniques have been used by researchers for analyzing protein sequences. In protein analysis, especially in protein sequence classification, selection of feature is most important. Popular protein sequence classification techniques involve extraction of specific features from the sequences. Researchers apply some well-known classification techniques like neural networks, Genetic algor… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 10 pages, 1 table, 1 figure. arXiv admin note: substantial text overlap with arXiv:1211.4654

  4. Application of Data mining in Protein sequence Classification

    Authors: Suprativ Saha, Rituparna Chaki

    Abstract: Protein sequence classification involves feature selection for accurate classification. Popular protein sequence classification techniques involve extraction of specific features from the sequences. Researchers apply some well-known classification techniques like neural networks, Genetic algorithm, Fuzzy ARTMAP,Rough Set Classifier etc for accurate classification. This paper presents a review is w… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 16 Pages, 7 Figures, 3 Tables

    Journal ref: International Journal of Database Management Systems ( IJDMS ) Vol.4, No.5, October 2012

  5. arXiv:1203.1777  [pdf

    cs.NI

    AMC Model for Denial of Sleep Attack Detection

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is… ▽ More

    Submitted 8 March, 2012; originally announced March 2012.

    Comments: 4 pages,Journal Paper

    Journal ref: Journal of Recent Research Trends (JRRT), February 2012 edition, ISSN: 2250-3951[Online], 2250-3943[Print]

  6. arXiv:1203.0240  [pdf

    cs.NI

    A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, wh… ▽ More

    Submitted 1 March, 2012; originally announced March 2012.

    Comments: 10 pages,5 figures,proceedings of CNSA 2011 conference held in Chennai

    Journal ref: Advances in Network Security and Applications: Conference Proceedings of Fourth International Conference on Network Security and Applications (CNSA 2011), Chennai, July 15-17, 2011, pp. 268-280, ISBN: 978-3-642-22539-0

  7. Sleep Deprivation Attack Detection in Wireless Sensor Network

    Authors: Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal

    Abstract: Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most danger… ▽ More

    Submitted 1 March, 2012; originally announced March 2012.

    Comments: 7 pages,4 figures, IJCA Journal February 2012

    Journal ref: International Journal of Computer Applications 40(15):19-25, February 2012. Published by Foundation of Computer Science, New York, USA

  8. Lightweight Hierarchical Model for HWSNET

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Heterogeneous wireless sensor networks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of different constraints of sensor networks, security solutio… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: 14 pages, 7 figures, AIRCC Journal

  9. arXiv:1109.5388   

    cs.CR

    A Survey on Security Issues in Cloud Computing

    Authors: Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal

    Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or capabilities of the existing and new software. In… ▽ More

    Submitted 21 May, 2013; v1 submitted 25 September, 2011; originally announced September 2011.

    Comments: This review is incomplete and contains some erroneous interpretation of existing works

  10. arXiv:1004.0587  [pdf

    cs.NI

    A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks

    Authors: Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki

    Abstract: In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is oft… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 9Pages

    Journal ref: International Journal of Network Security & Its Applications 1.1 (2009) 44-52