Browsing by Title

Sort by: Order: Results:

  • Goel, Anurag; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2023-11)
    The traditional way of clustering is first extracting the feature vectors according to domain-specific knowledge and then employing a clustering algorithm on the extracted features. Deep learning approaches attempt to ...
  • Tariyal, Snigdha; Majumdar, Angshul (Advisor) (2016-09-13)
    This Thesis focuses on combining the two well researched concepts of representation learning – Dictionary Learning and Deep Learning. These two learning paradigms have been known for long. Ever since, plethora of papers ...
  • Singhal, Vanika; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-08)
    Currently there are three basic frameworks in deep learning - stacked autoencoders (SAE), deep belief network (DBN) and convolutional neural network (CNN); SAE and DBN can be applied to arbitrary inputs but CNN can only ...
  • Chawla, Mohit; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2019-07)
    With the increased interest in face recognition across di erent applications, the research in this area has ourished over the past few decades. However, face recognition with disguise variations has gained little ...
  • Gehlot, Shiv; Gupta, Anubha (Advisor) (IIIT-Delhi, 2022-04-08)
    This thesis, “Deep Learning Assisted Methods for Microscopic Blood Cancer Imaging Analysis” aims to develop deep learning-based CAD tools for Acute Lymphoblastic Leukemia (ALL) and Multiple Myeloma (MM). A CAD tool typically ...
  • Hegde, Srinidhi; Anand, Saket (Advisor); Sharma, Ojaswa (Advisor) (2017-04-18)
    Recent advancement in deep learning techniques has opened doors for wide variety of applications. With growing interests in deep learning and geometry, lots of computer vision problems have been tackled using deep learning. ...
  • Gupta, Divam; Arora, Chetan (Advisor) (IIIT-Delhi, 2016-07-18)
    First person videos captured from wearable cameras are growing in popularity.Standard algo- rithms developed for third person videos often do not work for such egocentric videos because of drastic change in camera ...
  • Sethi, Akshay; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2018-04-17)
    The first part of this work focuses on facial attribute prediction using a novel deep learning formulation, termed as R-Codean autoencoder. The work presents Cosine similarity based loss function in an autoencoder which ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIITD-Delhi, 2019-04-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Madaan, Pulkit; Maiti, Abhishek; Anand, Saket (Advisor); Mittal, Sushil (Advisor) (IIIT-Delhi, 2019-11-15)
    We use Mean Shift clustering in the latent space of an auto-encoder to have a better representation of the data and a more structured latent space. Instead of just using the mode of the distribution calculated using kernel ...
  • Maggu, Jyoti; Majumdar, Angshul (Advisor) (IIIT-Delhi, 2019-12)
    Conventional dictionary learning is a synthesis formulation; it learns a dictionary to generate/synthesize the data from the learned coefficients. Transform learning is its analysis equivalent. The transform analyzes ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Gaur, Megha; Majumdar, Angshul (Advisor) (IIITD-Delhi, 2019-10-01)
    The rapidly growing demand for energy poses one of the biggest challenges in our society. This challenge is critical not just for the power utilities but also for the environment as it leads to increased carbon footprint ...
  • Somannagari, Neha Reddy; Sethi, Tavpritesh (Advisor) (2021-05)
    Health care systems all around the world have an ever-growing burden of intensive care on them. Complications such as sepsis, organ failure and shock contribute to a large portion of the deaths. However they can be treated ...
  • Jha, Shragvi Sidharth; Darak, Sumit Jagdish (Advisor) (IIIT-Delhi, 2022-05)
    Autonomous vehicles are becoming prevalent day-by-day, and with the advent of such technology comes its various safety risks and challenges. The primary objective is to improve road safety and mobility for all users. The ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Guntakindapalli, Venkatesh; Bera, Debajyoti (Advisor) (2017-05)
    Locality sensitive hashing(LSH) is a hashing scheme that hashes objects into several buckets such that objects that are similar hashes into the same bucket and objects that are dissimilar hashes into different bucket with ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Arora, Disha; Hashmi, Mohammad S. (Advisor) (2016-09-12)
    The growing gap between the processor and embedded memory speed is a major setback in the overall performance of electronic systems. Since the sense amplifier (SA) forms an integral part of the read circuitry in both ...

Search Repository

Browse

My Account