Skip to main content

Showing 1–11 of 11 results for author: Gnawali, O

.
  1. Deception Detection with Feature-Augmentation by soft Domain Transfer

    Authors: Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali

    Abstract: In this era of information explosion, deceivers use different domains or mediums of information to exploit the users, such as News, Emails, and Tweets. Although numerous research has been done to detect deception in all these domains, information shortage in a new event necessitates these domains to associate with each other to battle deception. To form this association, we propose a feature augme… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

  2. arXiv:2301.04781  [pdf, other

    cs.CR cs.SE

    Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

    Authors: Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka

    Abstract: Although researchers have characterized the bug-bounty ecosystem from the point of view of platforms and programs, minimal effort has been made to understand the perspectives of the main workers: bug hunters. To improve bug bounties, it is important to understand hunters' motivating factors, challenges, and overall benefits. We address this research gap with three studies: identifying key factors… ▽ More

    Submitted 7 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

  3. arXiv:2208.06792  [pdf

    cs.SI

    Improving Phishing Detection Via Psychological Trait Scoring

    Authors: Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali

    Abstract: Phishing emails exhibit some unique psychological traits which are not present in legitimate emails. From empirical analysis and previous research, we find three psychological traits most dominant in Phishing emails - A Sense of Urgency, Inducing Fear by Threatening, and Enticement with Desire. We manually label 10% of all phishing emails in our training dataset for these three traits. We leverage… ▽ More

    Submitted 14 August, 2022; originally announced August 2022.

  4. A Domain-Independent Holistic Approach to Deception Detection

    Authors: Sadat Shahriar, Arjun Mukherjee, Omprakash Gnawali

    Abstract: The deception in the text can be of different forms in different domains, including fake news, rumor tweets, and spam emails. Irrespective of the domain, the main intent of the deceptive text is to deceit the reader. Although domain-specific deception detection exists, domain-independent deception detection can provide a holistic picture, which can be crucial to understand how deception occurs in… ▽ More

    Submitted 20 November, 2021; originally announced November 2021.

  5. arXiv:2108.00270  [pdf, other

    cs.CL cs.AI

    Opinion Prediction with User Fingerprinting

    Authors: Kishore Tumarada, Yifan Zhang, Fan Yang, Eduard Dragut, Omprakash Gnawali, Arjun Mukherjee

    Abstract: Opinion prediction is an emerging research area with diverse real-world applications, such as market research and situational awareness. We identify two lines of approaches to the problem of opinion prediction. One uses topic-based sentiment analysis with time-series modeling, while the other uses static embedding of text. The latter approaches seek user-specific solutions by generating user finge… ▽ More

    Submitted 10 September, 2021; v1 submitted 31 July, 2021; originally announced August 2021.

    Comments: 10 pages, 6 figures, RANLP conference 2021

  6. arXiv:2102.10260  [pdf, other

    eess.SY

    Wireless sensor network for in situ soil moisture monitoring

    Authors: Jianing Fang, Chuheng Hu, Nour Smaoui, Doug Carlson, Jayant Gupchup, Razvan Musaloiu-E., Chieh-Jan Mike Liang, Marcus Chang, Omprakash Gnawali, Tamas Budavari, Andreas Terzis, Katalin Szlavecz, Alexander S. Szalay

    Abstract: We discuss the history and lessons learned from a series of deployments of environmental sensors measuring soil parameters and CO2 fluxes over the last fifteen years, in an outdoor environment. We present the hardware and software architecture of our current Gen-3 system, and then discuss how we are simplifying the user facing part of the software, to make it easier and friendlier for the environm… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: 12 pages, 16 figures, Sensornets 2021 Conference

  7. arXiv:2008.13064  [pdf, other

    cs.LG cs.PL cs.SE stat.ML

    Towards Demystifying Dimensions of Source Code Embeddings

    Authors: Md Rafiqul Islam Rabin, Arjun Mukherjee, Omprakash Gnawali, Mohammad Amin Alipour

    Abstract: Source code representations are key in applying machine learning techniques for processing and analyzing programs. A popular approach in representing source code is neural source code embeddings that represents programs with high-dimensional vectors computed by training deep neural networks on a large volume of programs. Although successful, there is little known about the contents of these vector… ▽ More

    Submitted 28 September, 2020; v1 submitted 29 August, 2020; originally announced August 2020.

    Comments: 1st ACM SIGSOFT International Workshop on Representation Learning for Software Engineering and Program Languages, Co-located with ESEC/FSE (RL+SE&PL'20)

  8. arXiv:2008.00087  [pdf, other

    cs.NI cs.DC

    Adaptive Bitrate Video Streaming for Wireless nodes: A Survey

    Authors: Kamran Nishat, Omprakash Gnawali, Ahmed Abdelhadi

    Abstract: In today's Internet, video is the most dominant application and in addition to this, wireless networks such as WiFi, Cellular, and Bluetooth have become ubiquitous. Hence, most of the Internet traffic is video over wireless nodes. There is a plethora of research to improve video streaming to achieve high Quality of Experience (QoE) over the Internet. Many of them focus on wireless nodes. Recent me… ▽ More

    Submitted 27 July, 2020; originally announced August 2020.

  9. arXiv:2006.13499  [pdf, other

    cs.CR cs.HC cs.SI

    Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

    Authors: Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali

    Abstract: Cyber attacks such as phishing, IRS scams, etc., still are successful in fooling Internet users. Users are the last line of defense against these attacks since attackers seem to always find a way to bypass security systems. Understanding users' reason about the scams and frauds can help security providers to improve users security hygiene practices. In this work, we study the users' reasoning and… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 6 figures

    ACM Class: H.5.m; I.2.7; J.4

  10. arXiv:1906.10607  [pdf, other

    cs.IR cs.CL cs.SI

    Newswire versus Social Media for Disaster Response and Recovery

    Authors: Rakesh Verma, Samaneh Karimi, Daniel Lee, Omprakash Gnawali, Azadeh Shakery

    Abstract: In a disaster situation, first responders need to quickly acquire situational awareness and prioritize response based on the need, resources available and impact. Can they do this based on digital media such as Twitter alone, or newswire alone, or some combination of the two? We examine this question in the context of the 2015 Nepal Earthquakes. Because newswire articles are longer, effective summ… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

  11. arXiv:1902.06384  [pdf, ps, other

    cs.HC

    Topics of Concern: Identifying User Issues in Reviews of IoT Apps and Devices

    Authors: Andrew Truelove, Farah Naz Chowdhury, Omprakash Gnawali, Mohammad Amin Alipour

    Abstract: Internet of Things (IoT) systems are bundles of networked sensors and actuators that are deployed in an environment and act upon the sensory data that they receive. These systems, especially consumer electronics, have two main cooperating components: a device and a mobile app. The unique combination of hardware and software in IoT systems presents challenges that are lesser known to mainstream sof… ▽ More

    Submitted 29 March, 2019; v1 submitted 17 February, 2019; originally announced February 2019.

    Comments: 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2019)