IIIT-Delhi Institutional Repository

Browsing Computer Science and Engineering by Subject "Security"

Browsing Computer Science and Engineering by Subject "Security"

Sort by: Order: Results:

  • Goel, Akhil; Singh, Anirudh; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-30)
    Extensive research on attacks on deep learning models has shown that these models are not as robust as they seem. A carefully designed low magnitude perturbation is enough to cause havoc and completely confuse the model. ...
  • Mongia, Shreyans (IIITD-Delhi, 2018-11-26)
    With the increase in the usage of the Internet, there has been an exponential increase in the content generated on various platforms of the Internet, e.g. websites, blogs, Online Social Media (OSM), etc. Due to this increase ...
  • Mukherjee, Rajdeep; Chakravarty, Sambuddho (Advisor) (2017)
    Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveillance, more and more Internet ...
  • Jain, Prachi; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of ...
  • Thulasidoss, Bharath Kumar; Garimella, Pavan Kumar; Sethi, Tavpritesh (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    In an era where the volume of data sets for a particular topic keeps increasing, it is necessary to have quality checks on the data to keep it relevant to modern learning algorithms. Quality parameters provide an objective ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Batra, Manav; Naik, Vinayak (Advisor) (2017-07-05)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers but not quite there yet in implementation. However, with the heavy penetration of the Internet in the world ...
  • Gupta, Neha; Kumaraguru, Ponnurangam (Advisor) (2014-07-10)
    Existence of spam URLs over emails and Online Social Media (OSM) has become a growing phenomenon. To counter the dissemination issues associated with long complex URLs in emails and character limit imposed on various OSM ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Jindal, Arun Kumar; Naik, Vinayak (Advisor) (2013-07-15)
    Bring Your Own Device (BYOD) is an IT policy being adopted by corporate organizations worldwide. It permits the employees to bring their own devices like smartphones, tablets, etc to their place of work and use them to ...

Search Repository


Advanced Search

Browse

My Account