Skip to main content

Showing 1–17 of 17 results for author: Shukla, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.13334  [pdf, other

    cs.LG cs.AI cs.CR

    Transparency and Privacy: The Role of Explainable AI and Federated Learning in Financial Fraud Detection

    Authors: Tomisin Awosika, Raj Mani Shukla, Bernardi Pranggono

    Abstract: Fraudulent transactions and how to detect them remain a significant problem for financial institutions around the world. The need for advanced fraud detection systems to safeguard assets and maintain customer trust is paramount for financial institutions, but some factors make the development of effective and efficient fraud detection systems a challenge. One of such factors is the fact that fraud… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: Paper submitted to a journal for review

  2. arXiv:2311.08621  [pdf, other

    cs.NI

    Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT

    Authors: Angela Grace Famera, Raj Mani Shukla, Suman Bhunia

    Abstract: A botnet is an army of zombified computers infected with malware and controlled by malicious actors to carry out tasks such as Distributed Denial of Service (DDoS) attacks. Billions of Internet of Things (IoT) devices are primarily targeted to be infected as bots since they are configured with weak credentials or contain common vulnerabilities. Detecting botnet propagation by monitoring the networ… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: Paper submitted to conference

  3. arXiv:2310.07380  [pdf, other

    cs.LG cs.AI

    Histopathological Image Classification and Vulnerability Analysis using Federated Learning

    Authors: Sankalp Vyas, Amar Nath Patra, Raj Mani Shukla

    Abstract: Healthcare is one of the foremost applications of machine learning (ML). Traditionally, ML models are trained by central servers, which aggregate data from various distributed devices to forecast the results for newly generated data. This is a major concern as models can access sensitive user information, which raises privacy concerns. A federated learning (FL) approach can help address this issue… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

  4. arXiv:2310.07354  [pdf, other

    cs.AI

    Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection

    Authors: Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta

    Abstract: The rapid growth in Internet of Things (IoT) technology has become an integral part of today's industries forming the Industrial IoT (IIoT) initiative, where industries are leveraging IoT to improve communication and connectivity via emerging solutions like data analytics and cloud computing. Unfortunately, the rapid use of IoT has made it an attractive target for cybercriminals. Therefore, protec… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

  5. arXiv:2307.08327  [pdf, other

    cs.LG cs.AI

    Analyzing the Impact of Adversarial Examples on Explainable Machine Learning

    Authors: Prathyusha Devabhakthini, Sasmita Parida, Raj Mani Shukla, Suvendu Chandan Nayak

    Abstract: Adversarial attacks are a type of attack on machine learning models where an attacker deliberately modifies the inputs to cause the model to make incorrect predictions. Adversarial attacks can have serious consequences, particularly in applications such as autonomous vehicles, medical diagnosis, and security systems. Work on the vulnerability of deep learning models to adversarial attacks has show… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  6. arXiv:2307.06556  [pdf

    physics.app-ph cond-mat.mtrl-sci cs.LG

    Metal Oxide-based Gas Sensor Array for the VOCs Analysis in Complex Mixtures using Machine Learning

    Authors: Shivam Singh, Sajana S, Poornima, Gajje Sreelekha, Chandranath Adak, Rajendra P. Shukla, Vinayak Kamble

    Abstract: Detection of Volatile Organic Compounds (VOCs) from the breath is becoming a viable route for the early detection of diseases non-invasively. This paper presents a sensor array with three metal oxide electrodes that can use machine learning methods to identify four distinct VOCs in a mixture. The metal oxide sensor array was subjected to various VOC concentrations, including ethanol, acetone, tolu… ▽ More

    Submitted 14 February, 2024; v1 submitted 13 July, 2023; originally announced July 2023.

  7. arXiv:2307.03197  [pdf, ps, other

    cs.LG cs.AI

    Analyzing the vulnerabilities in SplitFed Learning: Assessing the robustness against Data Poisoning Attacks

    Authors: Aysha Thahsin Zahir Ismail, Raj Mani Shukla

    Abstract: Distributed Collaborative Machine Learning (DCML) is a potential alternative to address the privacy concerns associated with centralized machine learning. The Split learning (SL) and Federated Learning (FL) are the two effective learning approaches in DCML. Recently there have been an increased interest on the hybrid of FL and SL known as the SplitFed Learning (SFL). This research is the earliest… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  8. arXiv:2305.07161  [pdf, other

    eess.IV cs.CV cs.LG

    A Deep Learning-based Compression and Classification Technique for Whole Slide Histopathology Images

    Authors: Agnes Barsi, Suvendu Chandan Nayak, Sasmita Parida, Raj Mani Shukla

    Abstract: This paper presents an autoencoder-based neural network architecture to compress histopathological images while retaining the denser and more meaningful representation of the original images. Current research into improving compression algorithms is focused on methods allowing lower compression rates for Regions of Interest (ROI-based approaches). Neural networks are great at extracting meaningful… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  9. arXiv:2212.10812  [pdf

    cs.CV

    Secure and Privacy Preserving Proxy Biometrics Identities

    Authors: Harkeerat Kaur, Rishabh Shukla, Isao Echizen, Pritee Khanna

    Abstract: With large-scale adaption to biometric based applications, security and privacy of biometrics is utmost important especially when operating in unsupervised online mode. This work proposes a novel approach for generating new artificial fingerprints also called proxy fingerprints that are natural looking, non-invertible, revocable and privacy preserving. These proxy biometrics can be generated from… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  10. A Survey on Applications of Cache-Aided NOMA

    Authors: Dipen Bepari, Soumen Mondal, Aniruddha Chandra, Rajeev Shukla, Yuanwei Liu, Mohsen Guizani, Arumugam Nallanathan

    Abstract: Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the sixth generation (6G) network requirements, such as, low latency, massive connectivity, users fairness, and high spectral efficiency. On the other hand, content caching restricts duplica… ▽ More

    Submitted 2 April, 2023; v1 submitted 11 May, 2022; originally announced May 2022.

  11. arXiv:2004.04099  [pdf

    eess.AS cs.SD eess.SP

    Keywords Extraction and Sentiment Analysis using Automatic Speech Recognition

    Authors: Rachit Shukla

    Abstract: Automatic Speech Recognition (ASR) is the interdisciplinary subfield of computational linguistics that develops methodologies and technologies that enables the recognition and translation of spoken language into text by computers. It incorporates knowledge and research in linguistics, computer science, and electrical engineering fields. Sentiment analysis is contextual mining of text which identif… ▽ More

    Submitted 7 April, 2020; originally announced April 2020.

    Comments: 23 pages, 20 figures. Based on the work done as a part of the Science Academies' Summer Research Fellowship Programme (SRFP '19) at Vijña Labs

  12. arXiv:1911.04013  [pdf

    cs.LG cs.CY cs.IR stat.ML

    Customized video filtering on YouTube

    Authors: Vishal Anand, Ravi Shukla, Ashwani Gupta, Abhishek Kumar

    Abstract: Inappropriate and profane content on social media is exponentially increasing and big corporations are becoming more aware of the type of content on which they are advertising and how it may affect their brand reputation. But with a huge surge in content being posted online it becomes seemingly difficult to filter out related videos on which they can run their ads without compromising brand name.… ▽ More

    Submitted 19 November, 2019; v1 submitted 10 November, 2019; originally announced November 2019.

    Comments: 13 pages, 5 figures, 1 table

  13. arXiv:1310.4949  [pdf

    cs.NI

    Global mibility and handover management for heterogeneous network in VANET

    Authors: Ravi Shankar Shukla, Neeraj Tyagi

    Abstract: Now a days Vehicular Ad hoc Network is an emerging technology. Mobility management is one of the most challenging research issues for Vehicular Ad hoc Network to support variety of intelligent transportation system applications. Vehicular Ad hoc Networks are getting importance for inter-vehicle communication, because they allow the communication among vehicles without any infrastructure, configura… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: 12 pages

  14. arXiv:1209.6297  [pdf

    cs.DB

    An Efficient Algorithm for Mining Multilevel Association Rule Based on Pincer Search

    Authors: Pratima Gautam, Rahul Shukla

    Abstract: Discovering frequent itemset is a key difficulty in significant data mining applications, such as the discovery of association rules, strong rules, episodes, and minimal keys. The problem of develo** models and algorithms for multilevel association mining poses for new challenges for mathematics and computer science. In this paper, we present a model of mining multilevel association rules which… ▽ More

    Submitted 27 September, 2012; originally announced September 2012.

    Journal ref: ijcsi international journal vol-9,issue-4,2012

  15. arXiv:1202.5953  [pdf

    cs.NE cs.SD

    On an Ethical Use of Neural Networks: A Case Study on a North Indian Raga

    Authors: Ripunjai Kumar Shukla, Soubhik Chakraborty

    Abstract: The paper gives an artificial neural network (ANN) approach to time series modeling, the data being instance versus notes (characterized by pitch) depicting the structure of a North Indian raga, namely, Bageshree. Respecting the sentiments of the artists' community, the paper argues why it is more ethical to model a structure than try and "manufacture" an artist by training the neural network to c… ▽ More

    Submitted 27 February, 2012; originally announced February 2012.

    Comments: 16 pages

    Journal ref: Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 41-56

  16. arXiv:1002.1185  [pdf

    cs.DB

    Significant Interval and Frequent Pattern Discovery in Web Log Data

    Authors: Kanak Saxena, Rahul Shukla

    Abstract: There is a considerable body of work on sequence mining of Web Log Data. We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the traditional apriori class of pattern detection algorithms. In this approach significant intervals for each Website are computed first (independently) and these interval used for detecting frequent patterns/Episode and th… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 3, January 2010, http://ijcsi.org/articles/Significant-Interval-and-Frequent-Pattern-Discovery-in-Web-Log-Data.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 3, January 2010, http://ijcsi.org/articles/Significant-Interval-and-Frequent-Pattern-Discovery-in-Web-Log-Data.php

  17. arXiv:1001.2270  [pdf

    cs.DB cs.IR

    An Improved Approach to High Level Privacy Preserving Itemset Mining

    Authors: Rajesh Kumar Boora, Ruchi Shukla, A. K. Misra

    Abstract: Privacy preserving association rule mining has triggered the development of many privacy preserving data mining techniques. A large fraction of them use randomized data distortion techniques to mask the data for preserving. This paper proposes a new transaction randomization method which is a combination of the fake transaction randomization method and a new per transaction randomization method.… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Volume 6, No. 3, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 216-223, December 2009, USA