Skip to main content

Showing 1–45 of 45 results for author: Shukla, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02917  [pdf, other

    cs.LG physics.comp-ph

    A comprehensive and FAIR comparison between MLP and KAN representations for differential equations and operator networks

    Authors: Khemraj Shukla, Juan Diego Toscano, Zhicheng Wang, Zongren Zou, George Em Karniadakis

    Abstract: Kolmogorov-Arnold Networks (KANs) were recently introduced as an alternative representation model to MLP. Herein, we employ KANs to construct physics-informed machine learning models (PIKANs) and deep operator models (DeepOKANs) for solving differential equations for forward and inverse problems. In particular, we compare them with physics-informed neural networks (PINNs) and deep operator network… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2404.00613  [pdf, ps, other

    cs.IT

    On $(θ, Θ)$-cyclic codes and their applications in constructing QECCs

    Authors: Awadhesh Kumar Shukla, Sachin Pathak, Om Prakash Pandey, Vipul Mishra, Ashish Kumar Upadhyay

    Abstract: Let $\mathbb F_q$ be a finite field, where $q$ is an odd prime power. Let $R=\mathbb{F}_q+u\mathbb{F}_q+v\mathbb{F}_q+uv\mathbb F_q$ with $u^2=u,v^2=v,uv=vu$. In this paper, we study the algebraic structure of $(θ, Θ)$-cyclic codes of block length $(r,s )$ over $\mathbb{F}_qR.$ Specifically, we analyze the structure of these codes as left $R[x:Θ]$-submodules of… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: 30 pages, 4 tables

  3. arXiv:2403.03267  [pdf, other

    cs.CR

    TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports

    Authors: Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured… ▽ More

    Submitted 21 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Under Review

  4. arXiv:2312.05410  [pdf, other

    cs.LG physics.comp-ph

    Rethinking materials simulations: Blending direct numerical simulations with neural operators

    Authors: Vivek Oommen, Khemraj Shukla, Saaketh Desai, Remi Dingreville, George Em Karniadakis

    Abstract: Direct numerical simulations (DNS) are accurate but computationally expensive for predicting materials evolution across timescales, due to the complexity of the underlying evolution equations, the nature of multiscale spatio-temporal interactions, and the need to reach long-time integration. We develop a new method that blends numerical solvers with neural operators to accelerate such simulations.… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  5. arXiv:2310.14168  [pdf, other

    math.OC cs.AI cs.LG

    Randomized Forward Mode of Automatic Differentiation For Optimization Algorithms

    Authors: Khemraj Shukla, Yeonjong Shin

    Abstract: We present a randomized forward mode gradient (RFG) as an alternative to backpropagation. RFG is a random estimator for the gradient that is constructed based on the directional derivative along a random vector. The forward mode automatic differentiation (AD) provides an efficient computation of RFG. The probability distribution of the random vector determines the statistical properties of RFG. Th… ▽ More

    Submitted 1 February, 2024; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: 22 Pages, 7 Figures

    MSC Class: 65K05; 65B99; 65Y20

  6. arXiv:2310.01433  [pdf, other

    q-bio.QM cs.AI cs.LG

    AI-Aristotle: A Physics-Informed framework for Systems Biology Gray-Box Identification

    Authors: Nazanin Ahmadi Daryakenari, Mario De Florio, Khemraj Shukla, George Em Karniadakis

    Abstract: Discovering mathematical equations that govern physical and biological systems from observed data is a fundamental challenge in scientific research. We present a new physics-informed framework for parameter estimation and missing physics identification (gray-box) in the field of Systems Biology. The proposed framework -- named AI-Aristotle -- combines eXtreme Theory of Functional Connections (X-TF… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

    MSC Class: 37N25 (Primary); 34-04 (Secondary) ACM Class: G.1.7; I.2.0

  7. arXiv:2307.12306  [pdf, other

    cs.LG cs.AI math.DS math.NA stat.ML

    Tackling the Curse of Dimensionality with Physics-Informed Neural Networks

    Authors: Zheyuan Hu, Khemraj Shukla, George Em Karniadakis, Kenji Kawaguchi

    Abstract: The curse-of-dimensionality taxes computational resources heavily with exponentially increasing computational cost as the dimension increases. This poses great challenges in solving high-dimensional PDEs, as Richard E. Bellman first pointed out over 60 years ago. While there has been some recent success in solving numerically partial differential equations (PDEs) in high dimensions, such computati… ▽ More

    Submitted 17 May, 2024; v1 submitted 23 July, 2023; originally announced July 2023.

    Comments: Accepted by Neural Networks. Code is available at https://github.com/zheyuanhu01/SDGD_PINN

    MSC Class: 14J60 ACM Class: F.2.2; I.2.7

    Journal ref: Neural Networks, Volume 176, 2024, 106369, ISSN 0893-6080

  8. arXiv:2307.09142  [pdf, other

    physics.flu-dyn cs.LG

    Characterization of partial wetting by CMAS droplets using multiphase many-body dissipative particle dynamics and data-driven discovery based on PINNs

    Authors: Elham Kiyani, Mahdi Kooshkbaghi, Khemraj Shukla, Rahul Babu Koneru, Zhen Li, Luis Bravo, Anindya Ghoshal, George Em Karniadakis, Mikko Karttunen

    Abstract: The molten sand, a mixture of calcia, magnesia, alumina, and silicate, known as CMAS, is characterized by its high viscosity, density, and surface tension. The unique properties of CMAS make it a challenging material to deal with in high-temperature applications, requiring innovative solutions and materials to prevent its buildup and damage to critical equipment. Here, we use multiphase many-body… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  9. arXiv:2307.01719  [pdf, other

    q-fin.PM cs.AI cs.LG

    MOPO-LSI: A User Guide

    Authors: Yong Zheng, Kumar Neelotpal Shukla, Jasmine Xu, David, Wang, Michael O'Leary

    Abstract: MOPO-LSI is an open-source Multi-Objective Portfolio Optimization Library for Sustainable Investments. This document provides a user guide for MOPO-LSI version 1.0, including problem setup, workflow and the hyper-parameters in configurations.

    Submitted 12 July, 2023; v1 submitted 4 July, 2023; originally announced July 2023.

  10. arXiv:2306.15551  [pdf, other

    cs.LG cs.CL physics.soc-ph

    MyCrunchGPT: A chatGPT assisted framework for scientific machine learning

    Authors: Varun Kumar, Leonard Gleyzer, Adar Kahana, Khemraj Shukla, George Em Karniadakis

    Abstract: Scientific Machine Learning (SciML) has advanced recently across many different areas in computational science and engineering. The objective is to integrate data and physics seamlessly without the need of employing elaborate and computationally taxing data assimilation schemes. However, preprocessing, problem formulation, code generation, postprocessing and analysis are still time consuming and m… ▽ More

    Submitted 31 July, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

    Comments: Updated title, abstract and added references

  11. arXiv:2305.15336  [pdf, other

    cs.CR

    From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads

    Authors: P. V. Sai Charan, Hrushikesh Chunduri, P. Mohan Anand, Sandeep K Shukla

    Abstract: This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  12. arXiv:2305.10706  [pdf, other

    cond-mat.dis-nn cs.LG

    A Framework Based on Symbolic Regression Coupled with eXtended Physics-Informed Neural Networks for Gray-Box Learning of Equations of Motion from Data

    Authors: Elham Kiyani, Khemraj Shukla, George Em Karniadakis, Mikko Karttunen

    Abstract: We propose a framework and an algorithm to uncover the unknown parts of nonlinear equations directly from data. The framework is based on eXtended Physics-Informed Neural Networks (X-PINNs), domain decomposition in space-time, but we augment the original X-PINN method by imposing flux continuity across the domain interfaces. The well-known Allen-Cahn equation is used to demonstrate the approach. T… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  13. arXiv:2305.03235  [pdf

    cs.ET

    Hardware in Loop Learning with Spin Stochastic Neurons

    Authors: A N M Nafiul Islam, Kezhou Yang, Amit K. Shukla, Pravin Khanal, Bowei Zhou, Wei-Gang Wang, Abhronil Sengupta

    Abstract: Despite the promise of superior efficiency and scalability, real-world deployment of emerging nanoelectronic platforms for brain-inspired computing have been limited thus far, primarily because of inter-device variations and intrinsic non-idealities. In this work, we demonstrate mitigating these issues by performing learning directly on practical devices through a hardware-in-loop approach, utiliz… ▽ More

    Submitted 21 March, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  14. arXiv:2304.07598  [pdf, other

    cs.CR

    Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators

    Authors: Trishie Sharma, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudulent schemes aimed at stealing investors' funds. Using data from 758 rug pulls across 10 NFT marketplaces, we examine the structural and behavioral pro… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

  15. arXiv:2302.03173  [pdf, other

    physics.ao-ph cs.AI physics.comp-ph

    Learning bias corrections for climate models using deep neural operators

    Authors: Aniruddha Bora, Khemraj Shukla, Shixuan Zhang, Bryce Harrop, Ruby Leung, George Em Karniadakis

    Abstract: Numerical simulation for climate modeling resolving all important scales is a computationally taxing process. Therefore, to circumvent this issue a low resolution simulation is performed, which is subsequently corrected for bias using reanalyzed data (ERA5), known as nudging correction. The existing implementation for nudging correction uses a relaxation based method for the algebraic difference b… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

  16. arXiv:2302.00807  [pdf, other

    physics.flu-dyn cs.AI math.OC

    Deep neural operators can serve as accurate surrogates for shape optimization: A case study for airfoils

    Authors: Khemraj Shukla, Vivek Oommen, Ahmad Peyvan, Michael Penwarden, Luis Bravo, Anindya Ghoshal, Robert M. Kirby, George Em Karniadakis

    Abstract: Deep neural operators, such as DeepONets, have changed the paradigm in high-dimensional nonlinear regression from function regression to (differential) operator regression, paving the way for significant changes in computational engineering applications. Here, we investigate the use of DeepONets to infer flow fields around unseen airfoils with the aim of shape optimization, an important design pro… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: 21 pages, 14 Figures

  17. arXiv:2211.04934  [pdf, other

    cs.CL

    DoSA : A System to Accelerate Annotations on Business Documents with Human-in-the-Loop

    Authors: Neelesh K Shukla, Msp Raja, Raghu Katikeri, Amit Vaid

    Abstract: Business documents come in a variety of structures, formats and information needs which makes information extraction a challenging task. Due to these variations, having a document generic model which can work well across all types of documents and for all the use cases seems far-fetched. For document-specific models, we would need customized document-specific labels. We introduce DoSA (Document Sp… ▽ More

    Submitted 9 November, 2022; originally announced November 2022.

    Comments: Accepted at DaSH@EMNLP2022, 5 pages, 4 figures

  18. Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain

    Authors: Muhammad Fahad Khan, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, Piyush Kumar Shukla

    Abstract: The protection of confidential information is a global issue and block encryption algorithms are the most reliable option. The famous information theorist, Claude Shannon has given two desirable characteristics that should exist in a strong cipher which are substitution and permutation in their fundamental research on Communication Theory of Secrecy Systems. block ciphers strictly follow the subst… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Comments: 17 pages, 5 figures, Journal

    MSC Class: 94-11 ACM Class: E.3

    Journal ref: Computational Intelligence and Neuroscience,2022

  19. arXiv:2205.08332  [pdf, other

    cs.LG cs.AI cs.DC math.AP math.DS

    Scalable algorithms for physics-informed neural and graph networks

    Authors: Khemraj Shukla, Mengjia Xu, Nathaniel Trask, George Em Karniadakis

    Abstract: Physics-informed machine learning (PIML) has emerged as a promising new approach for simulating complex physical and biological systems that are governed by complex multiscale processes for which some data are also available. In some instances, the objective is to discover part of the hidden physics from the available data, and PIML has been shown to be particularly effective for such problems for… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

    Comments: 26 pages, 13 figures. arXiv admin note: text overlap with arXiv:2104.10013

  20. arXiv:2205.04685  [pdf, other

    cs.CR cs.LG

    DNS based In-Browser Cryptojacking Detection

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptojacking. We use temporal features such as query frequency and query burst along with graph-based features such as degree and diameter, and non-temporal… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: Submitted

  21. arXiv:2204.07230  [pdf, other

    cond-mat.mtrl-sci cs.LG physics.comp-ph

    Learning two-phase microstructure evolution using neural operators and autoencoder architectures

    Authors: Vivek Oommen, Khemraj Shukla, Somdatta Goswami, Remi Dingreville, George Em Karniadakis

    Abstract: Phase-field modeling is an effective but computationally expensive method for capturing the mesoscale morphological and microstructure evolution in materials. Hence, fast and generalizable surrogate models are needed to alleviate the cost of computationally taxing processes such as in optimization and design of materials. The intrinsic discontinuous nature of the physical phenomena incurred by the… ▽ More

    Submitted 29 June, 2022; v1 submitted 11 April, 2022; originally announced April 2022.

  22. arXiv:2204.04154  [pdf, other

    cs.CR cs.LG

    EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

    Authors: Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep Kumar Shukla

    Abstract: Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been develo… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: Submitted

  23. arXiv:2112.11721  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Towards Malicious address identification in Bitcoin

    Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not directly applicable in the Bitcoin blockchain. Several pre-processing steps should be performed before such temporal aspects are utilized. We are moti… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  24. arXiv:2112.11024  [pdf, other

    cs.CR cs.CY cs.DC

    Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma

    Abstract: In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilitate activities such as money laundering, gambling, and ransomware attacks. In recent times, different machine learning-based techniques can detect such… ▽ More

    Submitted 25 August, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  25. arXiv:2108.12816  [pdf, other

    cs.LG cs.CR

    Privacy-preserving Machine Learning for Medical Image Classification

    Authors: Shreyansh Singh, K. K. Shukla

    Abstract: With the rising use of Machine Learning (ML) and Deep Learning (DL) in various industries, the medical industry is also not far behind. A very simple yet extremely important use case of ML in this industry is for image classification. This is important for doctors to help them detect certain diseases timely, thereby acting as an aid to reduce chances of human judgement error. However, when using a… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  26. arXiv:2108.11818  [pdf, other

    cs.CR cs.SI

    Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain

    Authors: Banwari Lal, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: Submitted

  27. arXiv:2106.13422  [pdf, other

    cs.CR cs.DC cs.LG

    Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep Kumar Shukla

    Abstract: Smart Contracts (SCs) in Ethereum can automate tasks and provide different functionalities to a user. Such automation is enabled by the `Turing-complete' nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In thi… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a conf

  28. arXiv:2106.13420  [pdf, other

    cs.CR cs.LG

    Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a journal

  29. arXiv:2105.00065  [pdf, other

    quant-ph cond-mat.stat-mech cs.ET

    Quantum Foundations of Classical Reversible Computing

    Authors: Michael P. Frank, Karpur Shukla

    Abstract: The reversible computation paradigm aims to provide a new foundation for general classical digital computing that is capable of circumventing the thermodynamic limits to the energy efficiency of the conventional, non-reversible digital paradigm. However, to date, the essential rationale for and analysis of classical reversible computing (RC) has not yet been expressed in terms that leverage the mo… ▽ More

    Submitted 27 May, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

    Comments: 73 pages, 16 figures, accepted by Entropy

    Journal ref: Entropy 2021, 23 (6), 701

  30. arXiv:2104.10013  [pdf, other

    cs.DC

    Parallel Physics-Informed Neural Networks via Domain Decomposition

    Authors: Khemraj Shukla, Ameya D. Jagtap, George Em Karniadakis

    Abstract: We develop a distributed framework for the physics-informed neural networks (PINNs) based on two recent extensions, namely conservative PINNs (cPINNs) and extended PINNs (XPINNs), which employ domain decomposition in space and in time-space, respectively. This domain decomposition endows cPINNs and XPINNs with several advantages over the vanilla PINNs, such as parallelization capacity, large repre… ▽ More

    Submitted 8 September, 2021; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 23 pages, 13 figures

  31. arXiv:2103.12326  [pdf

    cs.CR

    Security of Healthcare Data Using Blockchains: A Survey

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma

    Abstract: The advancement in the healthcare sector is entering into a new era in the form of Health 4.0. The integration of innovative technologies like Cyber-Physical Systems (CPS), Big Data, Cloud Computing, Machine Learning, and Blockchain with Healthcare services has led to improved performance and efficiency through data-based learning and interconnection of systems. On the other hand, it has also incr… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: Submitted as a book chapter

  32. arXiv:2101.11915  [pdf, other

    cs.CR cs.LG

    Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla

    Abstract: Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious expl… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: Submitted

  33. arXiv:2012.03089  [pdf, other

    cs.LG

    Understanding Interpretability by generalized distillation in Supervised Classification

    Authors: Adit Agarwal, Dr. K. K. Shukla, Arjan Kuijper, Anirban Mukhopadhyay

    Abstract: The ability to interpret decisions taken by Machine Learning (ML) models is fundamental to encourage trust and reliability in different practical applications. Recent interpretation strategies focus on human understanding of the underlying decision mechanisms of the complex ML models. However, these strategies are restricted by the subjective biases of humans. To dissociate from such human biases,… ▽ More

    Submitted 5 December, 2020; originally announced December 2020.

    Comments: 9 pages Paper + 3 pages Supplementary Material

  34. arXiv:2009.02930  [pdf, other

    cs.CR

    Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix

    Authors: Aneet K. Dutta, Bhaskar Mukhoty, Sandeep K. Shukla

    Abstract: Regular and uninterrupted operation of critical infrastructures such as power, transport, communication etc. are essential for proper functioning of a country. Cyber-attacks causing disruption in critical infrastructure service in the past, are considered as a significant threat. With the advancement in technology and the progress of the critical infrastructures towards IP based communication, cyb… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: 9pages, 14 figures

  35. arXiv:2007.05169  [pdf, other

    cs.LG cs.SI stat.ML

    Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

    Authors: Rachit Agarwal, Shikhar Barve, Sandeep K. Shukla

    Abstract: The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal feat… ▽ More

    Submitted 28 January, 2021; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: Submitted to Springer Applied Network Science Journal

  36. arXiv:2005.03596  [pdf, other

    cs.LG stat.ML

    Physics-informed neural network for ultrasound nondestructive quantification of surface breaking cracks

    Authors: Khemraj Shukla, Patricio Clark Di Leoni, James Blackshire, Daniel Sparkman, George Em Karniadakis

    Abstract: We introduce an optimized physics-informed neural network (PINN) trained to solve the problem of identifying and characterizing a surface breaking crack in a metal plate. PINNs are neural networks that can combine data and physics in the learning process by adding the residuals of a system of Partial Differential Equations to the loss function. Our PINN is supervised with realistic ultrasonic surf… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: 19 pages, 12 Figures

  37. Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges

    Authors: Yalin Liu, Hong-Ning Dai, Qubeijian Wang, Mahendra K. Shukla, Muhammad Imran

    Abstract: The recent advances in information and communication technology (ICT) have further extended Internet of Things (IoT) from the sole "things" aspect to the omnipotent role of "intelligent connection of things". Meanwhile, the concept of internet of everything (IoE) is presented as such an omnipotent extension of IoT. However, the IoE realization meets critical challenges including the restricted net… ▽ More

    Submitted 12 April, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 21 pages, 9 figures

    Journal ref: Computer Communications, 2020

  38. arXiv:1909.11039   

    cs.GT math.OC

    Globalized Robust Markov Perfect Equilibrium for Discounted Stochastic Games and its Application on Intrusion Detection in Wireless Sensor Networks: Part I -- Theory

    Authors: Debdas Ghosh, Akshay Sharma, K. K. Shukla

    Abstract: In this article, we study a discounted stochastic game to model resource optimal intrusion detection in wireless sensor networks. To address the problem of uncertainties in various network parameters, we propose a globalized robust game theoretic framework for discounted robust stochastic games. A robust solution to the considered problem is an optimal point that is feasible for all realizations o… ▽ More

    Submitted 28 October, 2019; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: paper has incorrect graphs and results

  39. arXiv:1904.13081  [pdf, other

    cs.LG stat.ML

    Sequence to sequence deep learning models for solar irradiation forecasting

    Authors: Bhaskar Pratim Mukhoty, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: The energy output a photo voltaic(PV) panel is a function of solar irradiation and weather parameters like temperature and wind speed etc. A general measure for solar irradiation called Global Horizontal Irradiance (GHI), customarily reported in Watt/meter$^2$, is a generic indicator for this intermittent energy resource. An accurate prediction of GHI is necessary for reliable grid integration of… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  40. arXiv:1901.00228  [pdf, ps, other

    cs.DB cs.DC

    Verity: Blockchains to Detect Insider Attacks in DBMS

    Authors: Shubham S. Srivastava, Medha Atre, Shubham Sharma, Rahul Gupta, Sandeep K. Shukla

    Abstract: Integrity and security of the data in database systems are typically maintained with access control policies and firewalls. However, insider attacks -- where someone with an intimate knowledge of the system and administrative privileges tampers with the data -- pose a unique challenge. Measures like append only logging prove to be insufficient because an attacker with administrative privileges can… ▽ More

    Submitted 1 January, 2019; originally announced January 2019.

    ACM Class: H.2.7

  41. arXiv:1501.06515  [pdf

    cs.DS

    Approximation Algorithms for P2P Orienteering and Stochastic Vehicle Routing Problem

    Authors: Shalabh Vidyarthi, Kaushal K Shukla

    Abstract: We consider the P2P orienteering problem on general metrics and present a (2+ε) approximation algorithm. In the stochastic P2P orienteering problem we are given a metric and each node has a fixed reward and random size. The goal is to devise a strategy for visiting the nodes so as to maximize the expected value of the reward without violating the budget constraints. We present an approximation alg… ▽ More

    Submitted 26 January, 2015; originally announced January 2015.

  42. arXiv:1304.5991  [pdf

    cs.DS

    Approximation Algorithms for Vehicle Routing Problems with Stochastic Demands on Trees

    Authors: Shalabh Vidyarthi, Kaushal K Shukla

    Abstract: We consider the vehicle routing problem with stochastic demands (VRPSD) on tree structured networks with a single depot. The problem we are concerned with in this paper is to find a set of tours for the vehicle with minimum expected length. Every tour begins at the depot, visits a subset of customers and returns to the depot without violating the capacity constraint. Randomized approximation algor… ▽ More

    Submitted 22 April, 2013; originally announced April 2013.

  43. arXiv:1202.5953  [pdf

    cs.NE cs.SD

    On an Ethical Use of Neural Networks: A Case Study on a North Indian Raga

    Authors: Ripunjai Kumar Shukla, Soubhik Chakraborty

    Abstract: The paper gives an artificial neural network (ANN) approach to time series modeling, the data being instance versus notes (characterized by pitch) depicting the structure of a North Indian raga, namely, Bageshree. Respecting the sentiments of the artists' community, the paper argues why it is more ethical to model a structure than try and "manufacture" an artist by training the neural network to c… ▽ More

    Submitted 27 February, 2012; originally announced February 2012.

    Comments: 16 pages

    Journal ref: Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 41-56

  44. arXiv:0911.2034  [pdf, ps, other

    cs.LO cs.SE

    Expressing the Behavior of Three Very Different Concurrent Systems by Using Natural Extensions of Separation Logic

    Authors: Edgar G. Daylight, Sandeep K. Shukla, Davide Sergio

    Abstract: Separation Logic is a non-classical logic used to verify pointer-intensive code. In this paper, however, we show that Separation Logic, along with its natural extensions, can also be used as a specification language for concurrent-system design. To do so, we express the behavior of three very different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The Subway is originally implemen… ▽ More

    Submitted 10 November, 2009; originally announced November 2009.

    Journal ref: EPTCS 8, 2009, pp. 26-40

  45. arXiv:0907.0678  [pdf

    cs.CR cs.NI

    Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    Authors: Piyush Kumar Shukla, Dr. S. Silakari, Dr. Sarita Singh Bhadoria

    Abstract: The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering thi… ▽ More

    Submitted 3 July, 2009; originally announced July 2009.

    Comments: 10 pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS May 2009 Issue, Vol. 1, No. 1