Computer Science and Engineering: Recent submissions

  • Thukral, Deepak; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2018-04-18)
    Automatic estimation of relative difficulty of a pair of questions is an important and challenging problem in community question answering (CQA) services. There are limited studies which addressed this problem. Past studies ...
  • Dahiya, Lakshay; Singh, Chaudhary Guroosh Gabriel; Gunturi, Venkata M. Viswanath (Advisor) (IIIT-Delhi, 2018-08-13)
    With the advent of mobile phones and wearable technology, there has been a sudden increase in the amount of geo-located data available to us. One of the basic forms of pattern recognition is the identification of hotspots. ...
  • Suri, Anshuman; Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Deep neural networks (DNNs) have been shown to be vulnerable to adversarial examples - malicious inputs which are crafted by the adversary to induce the trained model to produce erroneous outputs. This vulnerability has ...
  • Aggarwal, Akash; Goyal, Vikram (Advisor) (IIIT-Delhi, 2018-04-18)
    The goal is to study accessibility of web pages, specially those who have visual disabilities and finds it difficult to perceive, navigate and interact with the web. Most websites have some sort of accessibility barrier ...
  • Jaiswal, Aishwarya; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2018-04-21)
    The term bandwidth, capacity, and throughput characterize the amount of data that can be transferred per unit time. Accurate estimation of bandwidth can be leveraged by various applications which seek to provide best user ...
  • Bajaj, Agam Singh; Tyagi, Lakshit; Arora, Paarth; Vajpayee, Pankaj (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2018-04-18)
    Bitcoin is a virtual currency that emerged in the aftermath of the financial crisis. It allows people to bypass banks and traditional payment processes to pay for goods and services. The technology on which bitcoin works ...
  • Shanu; Bera, Debajyoti (Advisor) (IIIT-Delhi, 2018-07)
    Distinguishing between unitary operators is one of the fundamental problems in the field of quantum computing. In the operator identification problem, we are given access to unknown operator U as a black-box that implements ...
  • Sarika; Goyal, Vikram (Advisor); Chakraborty, Tanmoy (Advisor) (2018-06)
    Community detection has gained immense popularity in recent years. Real world networks consist of millions of nodes and edges. Groups of nodes exhibit interesting characteristics, whoseknowledge can be of great help in ...
  • Apurupa, Nagasuri Venkata; Singh, Pushpendra (Advisor); Chakravarty, Sambuddho (Advisor); Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2018-07)
    Energy conservation plays an important role in the economic development of a country. The total share of building ’s energy consumption in the country ’s energy consumption is increasing every year in India. Thus, it is ...
  • Bhatia, Gurpriya Kaur; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Kaulgud, Vikrant (Advisor) (IIIT-Delhi, 2018-07)
    Crowdsourcing is a process where an individual or an organization utilizes the talent pool presentover the Internet to accomplish their task(s). These platforms offer numerous advantages suchas reduced cost, better quality, ...
  • Tiwari, Abhiprayah; Kumar, Vivek (Advisor); Mitra, Gaurav (Advisor) (IIIT-Delhi, 2018-07)
    With energy efficiency becoming a major concern in the HPC community, low-power alternatives such as heterogeneous Multi-Processor System-on-chip (MPSoC) are gainingpopularity. These devices house several different kinds ...
  • Saxena, Simran; Kumaraguru, Ponnurangam (Advisor); Dubey, Alpana (Advisor); Buduru, Arun Balaji (Advisor); Sachdeva, Niharika (Advisor) (IIIT-Delhi, 2018-04)
    Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing ...
  • Vinayakarao, Venkatesh; Purandare, Rahul (Advisor) (IIIT-Delhi, 2018-04)
    Code variants represent alternative implementations of a code snippet, where each alternative provides the same functionality, but has different properties that make some of them better suited to the overall project ...
  • Bansal, Tarun Kumar; Chang, Donghoon (Advisor); Pieprzyk, Josef (Advisor); Sanadhya, Somitra Kumar (Advisor); Boyen, Xavier (Advisor) (IIIT-Delhi, 2017-10)
    RSA-OAEP is being used in PKCS #1 2.0 standard for a long time. OAEP (optimal asymmetric encryption padding) provides security strength to RSA and other deterministic one-way asymmetric primitives (trapdoor one-way ...
  • Rawat, Madhur; Chakravarty, Sambuddho (Advisor) (2017-06)
    Cyberwarfare remains a sparsely explored domain of cybersecurity research, most often involving targeted attacks by one nation against another, using botnets. These botnets use malware to launch various kinds of attacks ...
  • Arjunan, Pandarasamy; Singh, Amarjeet (Advisor); Singh, Pushpendra (Advisor) (IIIT-Delhi, 2018-03)
    As one of the largest consumers of overall energy, buildings have emerged as attractive targets for using information and communications technologies to advance large-scale sustainability goals. With increasing availability ...
  • Verma, Sagar; Arora, Chetan (Advisor) (2017-07)
    With an increase in usage and availability of wearable devices like GoPro, Microsoft Hololens, Google Glass, etc, egocentric video analysis has become essential. An interesting application is action recognition in egocentric ...
  • Mishra, Sweta; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2017-10)
    Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which are usually low in entropy, is delicate in cryptography because of the possibility of launching ...
  • Mongia, Aanchal; Gunturi, Venkata M. Viswanath; Naik, Vinayak (IIIT-Delhi, 2017-11-29)
    Our paper aims to build a classification-model which delineates the typical motion-related activities performed at a metro station using smart phone sensors. We focus on typical movements, such as climbing the stairs or ...
  • Dhamecha, Tejas Indulal; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2017-07)
    Due to the unconstrained nature of data capture and non-cooperative subjects, automatic face recognition is still a research challenge for application scenarios such as law enforcement. We observe that challenges of face ...

Search Repository


Advanced Search

Browse

My Account