Browsing by Title

Sort by: Order: Results:

  • Verma, Priyanka; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2015-12-03)
    Research in face and gender recognition under constrained environment has achieved an acceptable level of performance. There have been advancements in face and gender recognition in unconstrained environment, however, ...
  • Bharadwaj, Samarth; Dhamecha, Tejas I; Vatsa, Mayank; Singh, Richa (2014-06-03)
    For robust face biometrics, a reliable anti-spoofing approach has become an essential pre-requisite against attacks. While spoofing attacks are possible with any biometric modality, face spoofing attacks are relatively ...
  • Shah, Mahek; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2015-12-05)
    With increasing security concerns, surveillance cameras are playing an important role in the society and face recognition in crowd is gaining more importance than ever. For video face recognition, researchers have primarily ...
  • Jain, Arushi; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (2017-04-18)
    Face Recognition involves a wide range of applications, many of which are centered around forensic applications. Dead bodies in large-scale calamities like foods and earthquakes require to be identified. However, the bodies ...
  • Kalra, Isha; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-05-20)
    Unmanned Aerial Vehicles (UAVs) or drones are often used to reach remote areas or regions which are inaccessible to humans. Equipped with a large eld of view, compact size, and remote control abilities, drones are deemed ...
  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Gupta, Naina; Chang, Donghoon (Advisor) (2016-01-01)
    In the modern world, almost every computing device uses some cryptographic technique or the other. Over the years several schemes have been proposed implemented and standardized. For any kind of data transfer the primary ...
  • Choudhary, Simran; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-11-29)
    This research explores the evolving landscape of Explainable Artificial Intelligence (XAI), with a specific focus on counterfactual explanations and their role in ensuring fairness and reducing bias in AI decision-making. ...
  • Agrawal, Sankalp; Rawal, Jay; Mohania, Mukesh (Advisor); Padmanabhan, Deepak (Advisor) (IIIT- Delhi, 2021-05)
    Entity matching (EM) has been one of the long-standing challenges in databases domain. Tra- ditionally, the approaches for EM focuses on developing matching algorithms and works on pairwise similarity between attributes. ...
  • Budhija, Kuber; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2023-11-01)
    In a world where machine learning and AI play an increasing role in decision-making across various sectors, concerns about fairness have emerged. This report delves into the journey of understanding fairness in machine ...
  • Gupta, Gavish; Singh, Shrey Kumar; Shah, Rajiv Ratn (Advisor) (IIIT-Delhi, 2022-05)
    A rapid growth in the amount of fake news on social media is a very serious concern in our society. Fake news are usually created by making changes to text, images, audio, and videos. To bust these fake news, there are ...
  • Dhawan, Sarthika; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2019-04-15)
    Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, scammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. ...
  • Rai, Priyadarshini; Sengupta, Debarka (Advisor); Majumdar, Angshul (Advisor) (IIIT-Delhi, 2022-10)
    The advent of tissue and single cell based transcriptomic profiling technologies has allowed precise characterization of tissue specific gene activities in the context of development and disease. Human cells express about ...
  • Fatima, Zubaida; Jamal, Yusuf; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-12-07)
    This research report investigates the robustness of Federated Learning (FL) by understanding and examining the performance of Federated Averaging (FedAvg) and Federated Proximal (Fed- Prox), along with the study of fading ...
  • Bansal, Mehak; Chatterjee, Bapi (Advisor) (IIIT-Delhi, 2024-01-19)
    Distribution Learning is a form of machine learning which involves the distribution of data across in a network having multiple devices. Each node is trained independently, and then combined the results to generate a model ...
  • Jain, Shreyansh; Jerripothula, Koteswar Rao (Advisor) (IIIT-Delhi, 2023-05)
    With the growing awareness regarding user privacy and the demand for transparency, traditional distributed machine learning algorithms are becoming taboo that uses the user’s data without any restriction or privacy. The ...
  • Mehra, Arjun; Muttepawar, Varun; Prasad, Ranjitha (Advisor) (IIIT-Delhi, 2023-11-28)
    Wireless devices, including mobile phones, laptops, autonomous driving, UAT, etc., generate an enormous amount of local data, which could be employed to train machine learning models for decision-making and improve prediction ...
  • Reddy, Gunjapalli Sravani; Chatterjee, Bapi (Advisor) (IIIT-Delhi, 2024-06-14)
    This thesis investigates the integration of Mixture Density Networks (MDNs) within Federated Learning (FL) frameworks to tackle challenges in data privacy, security, and model robustness, focusing on Automatic Speech ...
  • Saha, Sanchita; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2023-05)
    Quantum algorithms like Shor’s and Grover’s algorithms have proven to break several cryptographic schemes theoretically. Shor’s algorithm, which can factor numbers exponentially faster than classical computers, can break ...
  • Kaur, Avneet; Roy, Sayan Basu (Advisor); Banerjee, Shilpak (Advisor) (IIIT-Delhi, 2020-06-02)
    The Report describes the Linear Quadratic Regulator(LQR) and the study of the linear systems on different types of systems i.e single agent and multi-agent systems.Different approaches are available for creating an optimal ...

Search Repository

Browse

My Account