Skip to main content

Showing 1–7 of 7 results for author: Gulati, P

.
  1. arXiv:2210.09904  [pdf, other

    cs.LG cs.CR cs.CY

    MaSS: Multi-attribute Selective Suppression

    Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati

    Abstract: The recent rapid advances in machine learning technologies largely depend on the vast richness of data available today, in terms of both the quantity and the rich content contained within. For example, biometric data such as images and voices could reveal people's attributes like age, gender, sentiment, and origin, whereas location/motion data could be used to infer people's activity levels, trans… ▽ More

    Submitted 24 October, 2022; v1 submitted 18 October, 2022; originally announced October 2022.

  2. arXiv:2210.05136  [pdf, other

    q-fin.RM q-fin.CP

    Classification based credit risk analysis: The case of Lending Club

    Authors: Aadi Gupta, Priya Gulati, Siddhartha P. Chakrabarty

    Abstract: In this paper, we performs a credit risk analysis, on the data of past loan applicants of a company named Lending Club. The calculation required the use of exploratory data analysis and machine learning classification algorithms, namely, Logistic Regression and Random Forest Algorithm. We further used the calculated probability of default to design a credit derivative based on the idea of a Credit… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  3. arXiv:2205.11246  [pdf, other

    cs.CV cs.LG

    [Re] Distilling Knowledge via Knowledge Review

    Authors: Apoorva Verma, Pranjal Gulati, Sarthak Gupta

    Abstract: This effort aims to reproduce the results of experiments and analyze the robustness of the review framework for knowledge distillation introduced in the CVPR '21 paper 'Distilling Knowledge via Knowledge Review' by Chen et al. Previous works in knowledge distillation only studied connections paths between the same levels of the student and the teacher, and cross-level connection paths had not been… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

    Comments: This is a reproducibility effort based on the CVPR '21 paper 'Distilling Knowledge via Knowledge Review' by Chen et al

  4. arXiv:2205.08636  [pdf, other

    cond-mat.soft physics.bio-ph

    Boundaries control active channel flows

    Authors: Paarth Gulati, Suraj Shankar, M. Cristina Marchetti

    Abstract: Boundary conditions dictate how fluids, including liquid crystals, flow when pumped through a channel. Can boundary conditions also be used to control internally driven active fluids that generate flows spontaneously? By using numerical simulations and stability analysis we explore how surface anchoring of active agents at the boundaries and substrate drag can be used to rectify coherent flow of a… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 12 pages, 9 figures

  5. arXiv:1306.4758  [pdf

    cs.IR cs.CV

    Analysing Word Importance for Image Annotation

    Authors: Payal Gulati, A. K. Sharma

    Abstract: Image annotation provides several keywords automatically for a given image based on various tags to describe its contents which is useful in Image retrieval. Various researchers are working on text based and content based image annotations [7,9]. It is seen, in traditional Image annotation approaches, annotation words are treated equally without considering the importance of each word in real worl… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: 4 pages, 3 figures, Published in IJCSI (International Journal of Computer Science Issues) Journal, Volume 10, Issue 1, No 2, January 2013

  6. A Dynamic ID-based Remote User Authentication Scheme

    Authors: Manik Lal Das, Ashutosh Saxena, Ved P. Gulati

    Abstract: Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dy… ▽ More

    Submitted 13 December, 2007; originally announced December 2007.

    Comments: Published in IEEE Transactions On Consumer Electronics

    Journal ref: IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, 2004, pp. 629-631

  7. arXiv:cs/0505062  [pdf

    cs.CR

    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing

    Authors: Ravi S. Veerubhotla, Ashutosh Saxena, V. P. Gulati, A. K. Pujari

    Abstract: This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discu… ▽ More

    Submitted 24 May, 2005; originally announced May 2005.

    Comments: 28 pages

    Journal ref: Journal of Universal Computer Science, vol. 11, no. 1 (2005), 122-149