Skip to main content

Showing 1–6 of 6 results for author: Asawa, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12997  [pdf, other

    cs.CL

    Suitability of CCA for Generating Latent State/ Variables in Multi-View Textual Data

    Authors: Akanksha Mehndiratta, Krishna Asawa

    Abstract: The probabilistic interpretation of Canonical Correlation Analysis (CCA) for learning low-dimensional real vectors, called as latent variables, has been exploited immensely in various fields. This study takes a step further by demonstrating the potential of CCA in discovering a latent state that captures the contextual information within the textual data under a two-view setting. The interpretatio… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2403.02172  [pdf

    cs.CR

    Mirage: Defense against CrossPath Attacks in Software Defined Networks

    Authors: Shariq Murtuza, Krishna Asawa

    Abstract: The Software-Defined Networks (SDNs) face persistent threats from various adversaries that attack them using different methods to mount Denial of Service attacks. These attackers have different motives and follow diverse tactics to achieve their nefarious objectives. In this work, we focus on the impact of CrossPath attacks in SDNs and introduce our framework, Mirage, which not only detects but al… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  3. arXiv:2011.10981  [pdf, other

    cs.LG cs.DC

    A decentralized aggregation mechanism for training deep learning models using smart contract system for bank loan prediction

    Authors: Pratik Ratadiya, Khushi Asawa, Omkar Nikhal

    Abstract: Data privacy and sharing has always been a critical issue when trying to build complex deep learning-based systems to model data. Facilitation of a decentralized approach that could take benefit from data across multiple nodes while not needing to merge their data contents physically has been an area of active research. In this paper, we present a solution to benefit from a distributed data setup… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

    Comments: Accepted at the Workshop on AI and Blockchains at the 29th International Joint Conference on Artificial Intelligence (IJCAI-PRICAI), 2020

  4. arXiv:1612.05865  [pdf

    cs.NI

    New Architecture for Dynamic Spectrum Allocation in Cognitive Heterogeneous Network using Self Organizing Map

    Authors: Himanshu Agrawal, Krishna Asawa

    Abstract: This paper introduces the Hybrid Architecture of Dynamic Spectrum Allocation in the hierarchical network combining centralized and distributed architecture to get optimum allocation of radio resources. It can limit the interference by interacting dynamically and enhance the spectrum efficiency while maintaining the desired QoS in the network. This paper presented dynamic framework for the interact… ▽ More

    Submitted 18 December, 2016; originally announced December 2016.

    Comments: 13 pages, 4 figures

  5. arXiv:1008.0336  [pdf

    cs.LG

    Close Clustering Based Automated Color Image Annotation

    Authors: Ankit Garg, Rahul Dwivedi, Krishna Asawa

    Abstract: Most image-search approaches today are based on the text based tags associated with the images which are mostly human generated and are subject to various kinds of errors. The results of a query to the image database thus can often be misleading and may not satisfy the requirements of the user. In this work we propose our approach to automate this tagging process of images, where image results gen… ▽ More

    Submitted 2 August, 2010; originally announced August 2010.

  6. arXiv:1003.1492  [pdf

    cs.CR

    A Secure Hash Function MD-192 With Modified Message Expansion

    Authors: Harshvardhan Tiwari, Dr. Krishna Asawa

    Abstract: Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is presente… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/