Skip to main content

Showing 1–7 of 7 results for author: Khattar, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.12724  [pdf, other

    cs.GR

    A Multi-scale Yarn Appearance Model with Fiber Details

    Authors: Apoorv Khattar, Junqui Zhu, Emiliano Padovani, Jean-Marie Aurby, Marc Droske, Ling-Qi Yan, Zahra Montazeri

    Abstract: Rendering realistic cloth has always been a challenge due to its intricate structure. Cloth is made up of fibers, plies, and yarns, and previous curved-based models, while detailed, were computationally expensive and inflexible for large cloth. To address this, we propose a simplified approach. We introduce a geometric aggregation technique that reduces ray-tracing computation by using fewer cur… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  2. arXiv:2104.00107  [pdf, other

    cs.CV cs.CL cs.LG

    Analysis on Image Set Visual Question Answering

    Authors: Abhinav Khattar, Aviral Joshi, Har Simrat Singh, Pulkit Goel, Rohit Prakash Barnwal

    Abstract: We tackle the challenge of Visual Question Answering in multi-image setting for the ISVQA dataset. Traditional VQA tasks have focused on a single-image setting where the target answer is generated from a single image. Image set VQA, however, comprises of a set of images and requires finding connection between images, relate the objects across images based on these connections and generate a unifie… ▽ More

    Submitted 31 March, 2021; originally announced April 2021.

  3. arXiv:2004.11702  [pdf, other

    eess.IV cs.GR

    Multimodal Medical Volume Colorization from 2D Style

    Authors: Aradhya Neeraj Mathur, Apoorv Khattar, Ojaswa Sharma

    Abstract: Colorization involves the synthesis of colors on a target image while preserving structural content as well as the semantics of the target image. This is a well-explored problem in 2D with many state-of-the-art solutions. We propose a novel deep learning-based approach for the colorization of 3D medical volumes. Our system is capable of directly map** the colors of a 2D photograph to a 3D MRI vo… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.

  4. arXiv:1903.04879  [pdf, other

    cs.SI cs.CY cs.LG

    What sets Verified Users apart? Insights, Analysis and Prediction of Verified Users on Twitter

    Authors: Indraneil Paul, Abhinav Khattar, Shaan Chopra, Ponnurangam Kumaraguru, Manish Gupta

    Abstract: Social network and publishing platforms, such as Twitter, support the concept of a secret proprietary verification process, for handles they deem worthy of platform-wide public interest. In line with significant prior work which suggests that possessing such a status symbolizes enhanced credibility in the eyes of the platform audience, a verified badge is clearly coveted among public figures and b… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

  5. arXiv:1812.09710  [pdf, other

    cs.SI cs.CY

    Elites Tweet? Characterizing the Twitter Verified User Network

    Authors: Indraneil Paul, Abhinav Khattar, Ponnurangam Kumaraguru, Manish Gupta, Shaan Chopra

    Abstract: Social network and publishing platforms, such as Twitter, support the concept of verification. Verified accounts are deemed worthy of platform-wide public interest and are separately authenticated by the platform itself. There have been repeated assertions by these platforms about verification not being tantamount to endorsement. However, a significant body of prior work suggests that possessing a… ▽ More

    Submitted 12 March, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

  6. arXiv:1802.04168  [pdf, other

    cs.SI

    Collective Classification of Spam Campaigners on Twitter: A Hierarchical Meta-Path Based Approach

    Authors: Srishti Gupta, Abhinav Khattar, Arpit Gogia, Ponnurangam Kumaraguru, Tanmoy Chakraborty

    Abstract: Cybercriminals have leveraged the popularity of a large user base available on Online Social Networks to spread spam campaigns by propagating phishing URLs, attaching malicious contents, etc. However, another kind of spam attacks using phone numbers has recently become prevalent on OSNs, where spammers advertise phone numbers to attract users' attention and convince them to make a call to these ph… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

    Comments: To appear in WWW 2018

  7. arXiv:1801.05588  [pdf, other

    cs.SI

    White or Blue, the Whale gets its Vengeance: A Social Media Analysis of the Blue Whale Challenge

    Authors: Abhinav Khattar, Karan Dabas, Kshitij Gupta, Shaan Chopra, Ponnurangam Kumaraguru

    Abstract: The Blue Whale Challenge is a series of self-harm causing tasks that are propagated via online social media under the disguise of a "game." The list of tasks must be completed in a duration of 50 days and they cause both physical and mental harm to the player. The final task is to commit suicide. The game is supposed to be administered by people called "curators" who incite others to cause self-mu… ▽ More

    Submitted 17 January, 2018; originally announced January 2018.

    Comments: 18 pages