IIIT-Delhi Institutional Repository

Browsing BTech Projects by Subject "Security"

Browsing BTech Projects by Subject "Security"

Sort by: Order: Results:

  • Goel, Akhil; Singh, Anirudh; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIITD-Delhi, 2019-04-30)
    Extensive research on attacks on deep learning models has shown that these models are not as robust as they seem. A carefully designed low magnitude perturbation is enough to cause havoc and completely confuse the model. ...
  • Vohra, Aryan; Jalote, Pankaj (Advisor) (IIIT-Delhi, 2023-11-29)
    Code refactoring, in which an existing module is modified for satisfying some property while maintaining the functionality, is often needed as software evolves. Since refactoring is tedious and error prone, it is sometimes ...
  • Mongia, Shreyans (IIITD-Delhi, 2018-11-26)
    With the increase in the usage of the Internet, there has been an exponential increase in the content generated on various platforms of the Internet, e.g. websites, blogs, Online Social Media (OSM), etc. Due to this increase ...
  • Thulasidoss, Bharath Kumar; Garimella, Pavan Kumar; Sethi, Tavpritesh (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2021-05)
    In an era where the volume of data sets for a particular topic keeps increasing, it is necessary to have quality checks on the data to keep it relevant to modern learning algorithms. Quality parameters provide an objective ...
  • Mehrotra, Pragyan; Shah, Rajiv Ratn (Advisor); Kumar, Rajesh (Advisor) (IIIT-Delhi, 2021-12)
    Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack. This paper proposes a novel Generative Adversarial Network ...
  • Himani; Sharma, Shubham; Chang, Donghoon (Advisor) (2017-04-18)
    We have researched on OpenSSL Random Number Generator (RNG) and Linux Random Number Generator and read about the vulnerabilities and loopholes in the RNGs which make it easier for the adversary to attack on the RNGs and ...
  • Batra, Manav; Naik, Vinayak (Advisor) (2017-07-05)
    With the term coined in 1985, Internet of Things (IoT) has been an idea that was always on the minds of researchers but not quite there yet in implementation. However, with the heavy penetration of the Internet in the world ...
  • Sengupta, Srishti; Gupta, Naman; Naik, Vinayak (Advisor) (2017-04-18)
    With the advent of the Internet of things, privacy and security of sensitive data has become a major concern. IoT devices generate a lot of data, and we need this data to go over the Internet in a secure manner. To solve ...
  • Khilariwal, Vishisht; Purandare, Rahul (Advisor) (2017-07-05)
    Memory or RAM of a device contains a lot of data.This work focuses on how to ensure security of our critical data like our passwords or encryption keys stored in the memory which if become public can pose a big security ...
  • Singh, Srishti; Goyal, Vikram (Advisor) (2023-11-29)
    The commercial use of Natural Language Processing (NLP) has gained significant popularity in recent years. Many companies train and deploy language models to perform tasks like Sentiment classification, Machine Translation ...

Search Repository


Advanced Search

Browse

My Account