Year-2020

 

Recent Submissions

  • Singhal, Sonali; Pandey, Tanisha; Kumaraguru, Ponnurangam (Advisor); Shah, Rajiv Ratn (Advisor) (IIIT- Delhi, 2020-05)
    The COVID19 pandemic, a public health emergency which broke out globally in December 2019 and is still going on, has put us all into an unprecedented situation where there are strict limitations on physical social interaction ...
  • Bansal, Tanmay; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    In 2015, Unicode introduced five different skin tone modifiers, that could be applied to the existing emojis that denoted humans. In this project, we analyze how people pose certain personalities using emoji skin colour ...
  • Rajpal, Rohan; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    This project aims to characterize the role of the NaMo app in shaping political discourse on social media. The Narendra Modi app, or the NaMo app, is the official app ofthe Prime Minister of India. It has an inbuilt social ...
  • Shah, Daksh; Kumaraguru, Ponnurangam (Advisor) (IIIT- Delhi, 2020-12)
    Stack Overflow, a Q&A site on programming, awards reputation points and badges (game elements) to users on performing various actions. Situating our work in Digital Signaling Theory, we investigate the role of these game ...
  • Maheshwary, Yashit; Kurian, Deepak; Buduru, Arun Balaji (Advisor) (IIIT-Delhi, 2020-05-29)
    Malware Detection is an important problem in modern day due to the increasing frequency of malware attacks using unknown malware strains. Unlike traditional detection techniques which require a signature for each sample, ...
  • Tomar, Yash; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-06-03)
    Taboo is prohibition or restriction by social custom. So generally teaching a taboo topic is not easy for a teacher as well a student might feel hesitated to ask doubts for the taboo topics.We aim to study can VR help ...
  • Ahuja, Yajur; Das, Syamantak (Advisor) (IIIT-DElhi, 2020-06-03)
    We consider a generalization of the classical K-center problem with capacities, demands, and outliers. The capacitated K-center problem adds a constraint to the original K-center problem of every vertex having a capacity ...
  • Saini, Vipul; Mutharaju, Vijaya Raghava (Advisor); Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-06-05)
    Knowledge graphs have become quite popular and their utility is increasing at a very fast rate. There exist numerous extensive knowledge graphs that contain information on a plethora of topics. With new information ...
  • Bhatia, Vedant; Sujit, PB (Advisor) (IIIT-Delhi, 2020-06-04)
    The shepherding problem is a problem setting in the multi-agent systems domain. The primary aim is to guide or ‘shepherd’ a swarm of unwilling agents to a destination, with the help of autonomous agents. We explore this ...
  • Ramanathan, Varun; Raman, Rajiv (Advisor) (IIIT-Delhi, 2020-06-01)
    Traditionally, algorithms try to find the optimal solution for a problem in a “three-phase” approach: fetch the input, run the algorithm, output the solution. But recently, there has been an interest in understanding ...
  • Suhavi; Shah, Rajiv Ratn (Advisor); Kumaraguru, Ponnurangam (Advisor) (IIIT-Delhi, 2020-05-29)
    Social media has now become the most popular medium for self-expression and community building. More and more people are turning to it to express, write, vent or just be while being comfortable doing so because it’s an ...
  • Jain, Shubhi; Singh, Pushpendra (Advisor) (IIIT-Delhi, 2020-06-05)
    Using the publicly available data-sets and the surveys, we aim to design a web-portal that would be able to provide insights into venues that are considered important for research as well as information of researchers ...
  • Mittal, Shravika; Chakraborty, Tanmoy (Advisor) (IIIT-Delhi, 2020-05-27)
    Community affiliation of a node plays an important role in determining its contextual position in the network, which may raise privacy concerns when a sensitive node wants to hide its identity in a network. Oftentimes, ...
  • Sood, Raghav; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (2020-05-31)
    Modality refers to how something happens or is experienced. It is the representation format in which information is stored. Multimodal Learning involves relating information from multiple sources. Many modalities are ...
  • Jain, Kshitiz; Priysha; Subramanyam, A V (Advisor) (IIIT-Delhi, 2020-05-28)
    Subspace learning has often been explored for various applications such as dimensionality reduction, denoising, clustering and feature extraction among others. However, low rank subspace learning for clustering as well ...
  • Prakash, Pragya; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-05-25)
    Transfer learning is widely used for many applications, but it is difficult to adapt intermediate layers of the network to a new learning task with less data available. Learning the importance that key connections play ...
  • Aggrawal, Palash; Anand, Saket (Advisor) (IIIT-Delhi, 2020)
    Monitoring of protected areas to curb illegal activities like poaching and animal trafficking is a monumental task. To augment existing manual patrolling efforts, unmanned aerial surveillance using visible and thermal ...
  • Sanghvi, Nilay; Singh, Sushant Kumar; Vatsa, Mayank (Advisor); Singh, Richa (Advisor) (IIIT-Delhi, 2020-06-01)
    The non-intrusive nature and high accuracy of face recognition algorithms have led to their successful deployment across multiple applications ranging from border access to mobile unlocking and digital payments. However, ...
  • Sachdeva, Nikhil; Mutharaju, Vijaya Raghava (Advisor) (IIIT-Delhi, 2020-06-08)
    Ontology Learning is the semi-automatic and automatic extraction of ontology from a natural language text, using text-mining and information extraction. Each ontology primarily represents some concepts and their corresponding ...
  • Agarwal, Navdha; Purandare, Rahul (Advisor) (IIIT-Delhi, 2020-06-03)
    Code clone detection plays an important role in software maintenance and evolution. There are many new applications emerging that rely on clones detected across software systems, and hence to address this, many code clone ...

View more

Search Repository


Advanced Search

Browse

My Account

Discover

RSS Feeds