IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Title

Browsing Computer Science and Engineering by Title

Sort by: Order: Results:

  • Bansal, Tarun Kumar; Sanadhya, Somitra Kumar (Advisor) (2013-07-11)
    In this work, we throw light on gaps between theoretical construction of cryptographic primitives and their practical instantiation. It is assumed that cryptographic primitives will not have any trapdoors in the given ...
  • Panjwani, Saurabh; Ghosh, Mohona; Kumaraguru, Ponnurangam; Singh, Soumya Vardhan (2012-07-25)
    Mobile-based branchless banking has become a key mech- anism for enabling financial inclusion in the developing re- gions of the world. A fundamental requirement of all branch- less banking systems is a mechanism to ...
  • Dwivedi, Purusharth; Chang, Donghoon (Advisor) (IIIT-Delhi, 2017-11-17)
    The following report discusses various facial recognition spoofing techniques in use today, and compares various algorithms, that have been developed for detecting the same. Continuing towards the previous semester’s ...
  • Jain, Atishay; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2021-12)
    Complex networks have been studied and modeled extensively due to their relevance in various real-world systems such as the world-wide-web, telecommunication network and a variety of social networks. A large number of ...
  • Goel, Lamha; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIITD-Delhi, 2019-04-15)
    The necessity of large labeled training database is ubiquitous now with the development of deep neural networks. But there are multiple challenges to collecting labeled data, with the primary concerns being time and cost ...
  • Arora, Kanchan; Bedathur, Srikanta (Advisor) (2014-12-12)
    Identifying semantic similarity between two texts has many applications in NLP including information extraction and retrieval, word sense disambigua- tion, text summarization and type classi cation. Similarity between ...
  • Sundriyal, Divyanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Deep learning systems require a large amount of labelled training dataset. However large amount of labelled data is not available in many cases as it requires considerable human effort to label each sample correctly. In ...
  • Fulara, Harish; Naik, Vinayak (Advisor); Maity, Mukulika (Advisor) (IIITD-Delhi, 2018-11-25)
    When a mobile client gets wirelessly associated with an access point, it continuously monitors its connection with the access point. To monitor the connection, the client continuously exchanges management frames with the ...
  • Gupta, Nalin; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-04-18)
  • Kataria, Tushar; Agarwal, Vasu; Chakraborty, Tanmoy (Advisor) (IIITD-Delhi, 2018-11-26)
    The problem of stock market predictability has intrigued both academia and industry. In this thesis, we try to empirically predict the stock market using models from deep natural language processing. We review existing ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Gupta, Neha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor); Mukhopadhyay, Sourav (Advisor) (2015-12-02)
    In this work, we present the rst side channel collision based key recovery attack on TWINE block cipher with 80-bit secret key and also present the improved version of the work done by Jongsung et al. in on DES.We focus ...
  • Sagar, Himanshu; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-11)
    Decoy Routing, the use of routers (rather than end hosts) as proxies, shows great promise as an anti-censorship mechanism. To use a Decoy Router, the user sends specially crafted packets, apparently to an uncensored website. ...
  • Shah, Daksh; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    Stack Overflow, a Q&A site on programming, awards reputation points and badges (game elements) to users on performing various actions. Situating our work in Digital Signaling Theory, we investigate the role of these game ...
  • Sundriyal, Himanshu; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06)
    Identifying face attributes is an ongoing problem of research which is used in bio-metrics, surveillance etc. In past, researchers have proposed methods which predict single facial attribute at a time. Real-time applications ...
  • Chaudhuri, Dibyendu Roy; Subramanyam, A.V. (Advisor) (IIIT-Delhi, 2021-07-01)
    Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the lp space. In this work, we propose a novel approach for generating adversarial ...
  • Chakraborty, Tapadeep; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-12)
    With the advent of big data, graphs have gained popularity as one of the most efficient data storage mechanisms. A graph can not only capture relationships between entities, but it can also store attributes associated with ...
  • Gautam, Alvika; Naik, Vinayak; Gupta, Archie; Sharma, SK (2014-09-17)
    Sleep quantity affects an individual’s personal health. The gold standard of measuring sleep and diagnosing sleep disorders is Polysomnography (PSG). Although PSG is accurate, it is expensive and it lacks portability. ...
  • Raina, Samarth; Sharma, Swati; Yadav, Muskan; Shukla, Jainendra (Advisor); Ray, Sonia Baloni (Advisor); Chakrabarty, Mrinmoy (Advisor) (IIIT-Delhi, 2023-12-30)
    This research aims to improve the diagnosis of neurodevelopmental disorders by using smartphones, focusing on the psychology of eyes through pupil dynamics analysis. We are developing a user-friendly smartphone app to track ...
  • Bansal, Varun; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2017-11-16)
    This project includes learning of big data tools like Apache Storm, elastic search, and data visualisations library like D3. Started with understanding how social media analytics tools work and done code refactoring, UI/UX ...

Search Repository


Advanced Search

Browse

My Account