Skip to main content

Showing 1–20 of 20 results for author: KP, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.11838  [pdf, other

    cs.CV cs.AI

    Geometry Based Machining Feature Retrieval with Inductive Transfer Learning

    Authors: N S Kamal, Barathi Ganesh HB, Sajith Variyar VV, Sowmya V, Soman KP

    Abstract: Manufacturing industries have widely adopted the reuse of machine parts as a method to reduce costs and as a sustainable manufacturing practice. Identification of reusable features from the design of the parts and finding their similar features from the database is an important part of this process. In this project, with the help of fully convolutional geometric features, we are able to extract an… ▽ More

    Submitted 15 November, 2021; v1 submitted 26 August, 2021; originally announced August 2021.

    Comments: Submitted to 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021)

    MSC Class: 68T07 ACM Class: I.4; I.2; I.5

  2. arXiv:2004.04812  [pdf, other

    cs.LG cs.CR cs.NE cs.SI eess.SP

    Deep Learning based Frameworks for Handling Imbalance in DGA, Email, and URL Data Analysis

    Authors: Simran K, Prathiksha Balakrishna, Vinayakumar Ravi, Soman KP

    Abstract: Deep learning is a state of the art method for a lot of applications. The main issue is that most of the real-time data is highly imbalanced in nature. In order to avoid bias in training, cost-sensitive approach can be used. In this paper, we propose cost-sensitive deep learning based frameworks and the performance of the frameworks is evaluated on three different Cyber Security use cases which ar… ▽ More

    Submitted 17 October, 2020; v1 submitted 30 March, 2020; originally announced April 2020.

    Comments: 12 pages

  3. arXiv:2004.00503  [pdf, other

    cs.CL cs.CR cs.LG cs.NE cs.SI

    Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

    Authors: Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman KP

    Abstract: In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work proposes a deep learning based approach for tweet data analysis. To convert the tweets into numerical representations, various text representations are… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 11 pages

  4. arXiv:2004.00502  [pdf, other

    cs.CL cs.CR cs.LG cs.NE

    Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security

    Authors: Simran K, Sriram S, Vinayakumar R, Soman KP

    Abstract: In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data which can be used by a lot of applications. The existing methods on NER for Cyber Security data ar… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 10 pages

  5. arXiv:1910.03188  [pdf, other

    cs.CV cs.LG eess.IV stat.ML

    Dynamic Mode Decomposition based feature for Image Classification

    Authors: Rahul-Vigneswaran K, Sachin-Kumar S, Neethu Mohan, Soman KP

    Abstract: Irrespective of the fact that Machine learning has produced groundbreaking results, it demands an enormous amount of data in order to perform so. Even though data production has been in its all-time high, almost all the data is unlabelled, hence making them unsuitable for training the algorithms. This paper proposes a novel method of extracting the features using Dynamic Mode Decomposition (DMD).… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

    Comments: Selected for Spotlight presentation at TENCON 2019

  6. arXiv:1904.10434  [pdf, other

    cs.CE

    Data-driven Computing in Elasticity via Chebyshev Approximation

    Authors: Rahul-Vigneswaran K, Neethu Mohan, Soman KP

    Abstract: This paper proposes a data-driven approach for computing elasticity by means of a non-parametric regression approach rather than an optimization approach. The Chebyshev approximation is utilized for tackling the material data-sets non-linearity of the elasticity. Also, additional efforts have been taken to compare the results with several other state-of-the-art methodologies.

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: 6 pages, Accepted for ICCS 2019

  7. arXiv:1904.03491  [pdf, ps, other

    cs.LG cs.CR cs.NE cs.NI stat.ML

    A Compendium on Network and Host based Intrusion Detection Systems

    Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP

    Abstract: The techniques of deep learning have become the state of the art methodology for executing complicated tasks from various domains of computer vision, natural language processing, and several other areas. Due to its rapid development and promising benchmarks in those fields, researchers started experimenting with this technique to perform in the area of, especially in intrusion detection related ta… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: 8 pages, Accepted for ICDSMLA 2019

  8. RNNSecureNet: Recurrent neural networks for Cyber security use-cases

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl… ▽ More

    Submitted 5 January, 2019; originally announced January 2019.

    Comments: 12 pages. arXiv admin note: text overlap with arXiv:1812.03519

  9. arXiv:1901.03141  [pdf

    cs.CL cs.LG

    Emotion Detection using Data Driven Models

    Authors: Naveenkumar K S, Vinayakumar R, Soman KP

    Abstract: Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings which has an high influence on the decision making tasks. Datasets are collected which are available publically and combined together based on the three… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 11 pages

  10. arXiv:1901.01051  [pdf, other

    eess.SY cs.AI cs.RO math.CA

    An Insight into the Dynamics and State Space Modelling of a 3-D Quadrotor

    Authors: Rahul Vigneswaran K, Soman KP

    Abstract: Drones have gained popularity in a wide range of field ranging from aerial photography, aerial map**, and investigation of electric power lines. Every drone that we know today is carrying out some kind of control algorithm at the low level in order to manoeuvre itself around. For the quadrotor to either control itself autonomously or to develop a high-level user interface for us to control it, w… ▽ More

    Submitted 4 January, 2019; originally announced January 2019.

    Comments: 16 pages, 6 figures

  11. arXiv:1901.00297  [pdf

    cs.CL

    A Deep Learning Approach for Similar Languages, Varieties and Dialects

    Authors: Vidya Prasad K, Akarsh S, Vinayakumar R, Soman KP

    Abstract: Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirectional- Long Short-Term Memory (B-LSTM) for the task of dialectic identification in Arabic and German broadcast speech and Long Short-Term Memory (LSTM)… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 17 pages

  12. arXiv:1812.06292  [pdf

    cs.CR cs.AI cs.LG

    A short review on Applications of Deep learning for Cyber security

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works… ▽ More

    Submitted 29 January, 2019; v1 submitted 15 December, 2018; originally announced December 2018.

    Comments: 15 pages

  13. arXiv:1812.03519  [pdf

    cs.LG cs.CL cs.CR

    Deep-Net: Deep Neural Network for Cyber Security Use Cases

    Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP

    Abstract: Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and others. In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud d… ▽ More

    Submitted 9 December, 2018; originally announced December 2018.

    MSC Class: 68T50

  14. arXiv:1810.04144  [pdf, other

    cs.HC cs.CV cs.RO

    A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities

    Authors: Amara Dinesh Kumar, Koti Naga Renu Chebrolu, Vinayakumar R, Soman KP

    Abstract: Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in develo** the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences.… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 5 Pages,1 Figure

  15. arXiv:1810.03977  [pdf, other

    cs.CV cs.CR

    DeepImageSpam: Deep Learning based Image Spam Detection

    Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP

    Abstract: Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistinguishable from the original image fooling the users. This paper proposes a deep learning based approach for image spam detection using the convolutional… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 4 pages

  16. arXiv:1809.04461  [pdf

    q-bio.QM cs.LG cs.NE stat.ML

    DeepProteomics: Protein family classification using Shallow and Deep Networks

    Authors: Anu Vazhayil, Vinayakumar R, Soman KP

    Abstract: The knowledge regarding the function of proteins is necessary as it gives a clear picture of biological processes. Nevertheless, there are many protein sequences found and added to the databases but lacks functional annotation. The laboratory experiments take a considerable amount of time for annotation of the sequences. This arises the need to use computational techniques to classify proteins bas… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

  17. arXiv:1710.08396  [pdf, ps, other

    cs.CL cs.AI

    Deep Health Care Text Classification

    Authors: Vinayakumar R, Barathi Ganesh HB, Anand Kumar M, Soman KP

    Abstract: Health related social media mining is a valuable apparatus for the early recognition of the diverse antagonistic medicinal conditions. Mostly, the existing methods are based on machine learning with knowledge-based learning. This working note presents the Recurrent neural network (RNN) and Long short-term memory (LSTM) based embedding for automatic health text classification in the social media mi… ▽ More

    Submitted 23 October, 2017; originally announced October 2017.

    Comments: 4 pages

    MSC Class: 68T50

  18. arXiv:1708.06068  [pdf, other

    cs.CL cs.AI cs.SI

    Vector Space Model as Cognitive Space for Text Classification

    Authors: Barathi Ganesh HB, Anand Kumar M, Soman KP

    Abstract: In this era of digitization, knowing the user's sociolect aspects have become essential features to build the user specific recommendation systems. These sociolect aspects could be found by mining the user's language sharing in the form of text in social media and reviews. This paper describes about the experiment that was performed in PAN Author Profiling 2017 shared task. The objective of the ta… ▽ More

    Submitted 20 August, 2017; originally announced August 2017.

    Comments: 6 pages, 6 figures, 3 tables

    MSC Class: 68T50

  19. An Algorithm for Alignment-free Sequence Comparison using Logical Match

    Authors: Sanil Shanker KP, Elizabeth Sherly, Jim Austin

    Abstract: This paper proposes an algorithm for alignment-free sequence comparison using Logical Match. Here, we compute the score using fuzzy membership values which generate automatically from the number of matches and mismatches. We demonstrate the method with both the artificial and real datum. The results show the uniqueness of the proposed method by analyzing DNA sequences taken from NCBI databank with… ▽ More

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on

  20. Sequential Data Mining using Correlation Matrix Memory

    Authors: Sanil Shanker KP, Aaron Turner, Elizabeth Sherly, Jim Austin

    Abstract: This paper proposes a method for sequential data mining using correlation matrix memory. Here, we use the concept of the Logical Match to mine the indices of the sequential pattern. We demonstrate the uniqueness of the method with both the artificial and the real datum taken from NCBI databank.

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: Networking and Information Technology (ICNIT), 2010 International Conference on