PhD Theses

Recent Submissions

  • Sinha, Mitali; Deb, Sujay (Advisor) (IIIT-Delhi, 2022-04)
    In recent years, as multi-core processors are emerging as a solution to the limitations of power scaling, the software domain is also experiencing a surge of compute and data-intensive applications. These applications are ...
  • Singh, Monika; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2022-02)
    With the rapid growth of the World Wide Web and the Internet of Things, huge amounts of digital data are being produced everyday. Digital forensics investigators face an uphill battle when they have to manually screen ...
  • Likhyani, Ankita; Bedathur, Srikanta (Advisor) (IIIT-Delhi, 2022-01)
    Over the past decade with the explosion of smartphones and pervasive usage of data connectivity, location-based services have increasingly become popular. As a result, Location- based Social Network(LBSN) such as Foursquare, ...
  • V, Sathish; Butail, Sachit (Advisor); Orkisz, Michal (Advisor) (IIIT-Delhi, 2021-02)
    Industrial robots are complex systems that require technical expertise for condition monitoring and diagnostics. In small and medium scale industries, adequate skilled resources may not be available to monitor the robots ...
  • Singh, Maneet; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2021-12)
    Automated facial analysis has widespread applicability in scenarios related to image tagging, access control, and surveillance. Initial research focused primarily on face recognition in constrained settings, where the ...
  • Gupta, Monika; Jalote, Pankaj (Advisor); Serebrenik, Alexander (Advisor) (IIIT-Delhi, 2019-12)
    Software maintenance refers to the modification of software product after delivery and is required to correct faults, to improve the performance or other attributes, or to adapt the product to a modified environment. It ...
  • Gupta, Krishan; Sengupta, Debarka (Advisor); Ghosh, Abhik (Advisor); Ahuja, Gaurav (Advisor) (IIIT-Delhi, 2021-10)
    Delineation of the complex layers of biological system requires a cumulative effort from multiple disciplines of science. The present thesis work utilizes some of the interdisciplinary approaches by combining the automation ...
  • Dutta, Hridoy Sankar; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi., 2021-09)
    Online media platforms have enabled users to connect with individuals, organizations and share their thoughts. Other than connectivity, these platforms also serve multiple purposes - education, promotion, updates, awareness, ...
  • Kumar, Piyush; Chakravarty, Sambuddho (Advisor); Maity, Mukulika (Advisor) (IIIT- Delhi, 2021-08)
    Free and open communication over the Internet is essential for the overall advancement of modern societies. However, there are numerous ways with which malevolent adversaries try to control the flow of information, by ...
  • Sondhi, Devika; Purandare, Rahul (Advisor) (IIIT- Delhi, 2021-06)
    With the ever-growing dependency on software, testing for their unexpected behavior is as important as verifying for their known properties, to avoid potential losses. Existing software testing approaches assume either ...
  • Gosain, Devashish; Chakravarty, Sambuddho (Advisor) (IIIT-Delhi, 2020-07)
    The original design of the Internet was a resilient, distributed architecture, that should be able to route around (and therefore recover from) massive disruption — up to and including nuclear war. However, network routing ...
  • Yadav, Deepika; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2021-08)
    Community health workers (CHWs) in low- and middle-income countries play a vital role in public healthcare. CHWs particularly assist in improving maternal and child health conditions of the poor and vulnerable who often ...
  • Garg, Surabhi; Chang, Donghoon (Advisor) (IIIT-Delhi, 2021-06)
    The biometric systems are widely deployed in various sectors for authentication purposes– India’s Aadhaar project (a multi-biometric database of above 1.3 billion of India’s population) being the prominent example. The ...
  • Dawar, Siddharth; Goyal, Vikram (Advisor); Bera, Debajyoti (Advisor) (IIIT-Delhi, 2021-04)
    Technological advances have enabled organizations to store large amounts of data cost-effectively. Patterns hidden in such massive databases can be valuable to industries to gain actionable knowledge and promote their ...
  • Agrawal, Megha; Chang, Donghoon (Advisor); Sanadhya, Somitra Kumar (Advisor) (IIIT-Delhi, 2020-09)
    It is common knowledge that encryption is a useful tool for providing confidentiality. Authentication, however, is often overlooked. Authentication provides data integrity; it helps ensure that any tampering with or ...
  • Tiwari, Lokender; Anand, Saket (Advisor) (IIIT-Delhi, 2021)
    A scene can be interpreted from two perspectives: geometric and semantic. Geometric scene understanding requires inferring the3D layout of the scene from an image or video, while semantic scene understanding requires ...
  • Mondal, Sutapa; Mutharaju, Vijaya Raghava (Advisor); Bhatia, Sumit (Advisor) (IIIT-Delhi, 2020-07)
    Knowledge graph (KG) embedding models have recently gained increased attention. However, most of the existing models for KG embeddings ignore the structure and characteristics of the underlying ontology. KGs are not ...
  • Agarwal, Akshay; Singh, Richa (Advisor); Vatsa, Mayank (Advisor) (IIIT-Delhi, 2020-10)
    As the deployment and usage of computer vision systems increase, protecting these systems from malicious data has also become a critical task. The primary source of information in any computer vision system is the input ...
  • Ishant; Arora, Chetan (Advisor) (IIIT-Delhi, 2020-08-13)
    Many computer vision problems can be formulated as finding the best labeling configuration. If labelings satisfy Markov property then finding best labeling configuration becomes MRF (Markov Random Field)- MAP (Maximum A ...
  • Kansal, Kajal; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-05)
    The rise of surveillance cameras has led to a significant focus on large scale deployment of intelligent surveillance systems. Person re-identification (Re-ID) is one of the quintessential surveillance problems. Person ...

View more