- Network Security and Intrusion Detection
- Hate Speech and Cyberbullying Detection
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- IPv6, Mobility, Handover, Networks, Security
- IoT Networks and Protocols
- Topic Modeling
- Energy Efficient Wireless Sensor Networks
- Advanced Authentication Protocols Security
- Misinformation and Its Impacts
- Software-Defined Networks and 5G
- Natural Language Processing Techniques
- Face recognition and analysis
- Energy Harvesting in Wireless Networks
- Network Packet Processing and Optimization
- Security in Wireless Sensor Networks
- User Authentication and Security Systems
- Social Media and Politics
- Spam and Phishing Detection
- Advanced Memory and Neural Computing
Indian Institute of Information Technology Guwahati
2015-2024
Indian Institute of Technology Kharagpur
2021
Indian Institute of Technology Guwahati
2010-2021
Accenture (Switzerland)
2021
Nanjing University of Information Science and Technology
2021
Indian Institute of Technology Hyderabad
2021
IBM Research - India
2021
Indian Institute of Technology Indore
2010-2013
Conference Board
2011
Land is an immovable and non-liquid asset having high value. The integrity proper track of ownership/transfer records land a highly challenging task. As the ownership can constantly change over time that too sometimes very frequently, it poses daunting task keeping elaborate long transfer records. problem further escalates due to presence fraudulent or incomplete registries which are difficult trace back through time. Thus disputes in system, lead litigation running for years, leading...
In this paper, we present the results obtained by BERT, BiLSTM and SVM classifiers on shared task Sarcasm Detection held as part of The Second Workshop Figurative Language Processing. required use conversational context to detect sarcasm. We experimented varying amount used along with response (response is text be classified). includes (i) zero context, (ii) last one, two or three utterances, (iii) all utterances. It was found that including utterance in dialogue improved performance...
Internet of Things (IoT) with edge computing capability enhances efficiency, availability, and improves latency an industrial automation system. However, to provide dynamic services at the resource-constrained device, reconfiguration is necessary. This article proposes a programmable network (re)configure different IoT, that employs layers for reconfiguring sensor/actuator application services. The lowermost layer allows communication-related parameters middle consists software-defined...
Using Cryptography and Steganography at the same time, we try to provide Biometric as well Password security voter accounts. The scheme uses images cover objects for keys Cryptography. key image is a measure, such fingerprint image. Proper use of greatly reduces risks in these systems hackers have find both secret template. basic idea merge with on basis result this process produces stego which looks quite similar but not detectable by human eye. system targets authentication requirement...
This paper proposes a smart system cloud based weather station. The uses Raspberry Pi, for collecting and observing data. storing processing of the obtained data is done in to predicting effect this change. designed effectively monitor ambient conditions such as temperature, humidity, wind speed, pressure, rainfall etc. objective design which low cost, requires less maintenance, involved minimal manual intervention. built using commodity hardware various sensors WiFi communication medium...
The IEEE 802.11ah, also known as WiFi HaLow, is a scalable solution for medium-range communication in Internet of Things (IoT). While provisioning support the IoT and machine-to-machine (M2M) communication, 802.11ah leverages various innovative medium access control (MAC) layer concepts, such restricted window (RAW), hierarchical association identification (AID), traffic indication map (TIM) segmentation, etc. This article presents survey on MAC protocols 802.11ah. discussing essential...
Cloud is widely used for data storage. A user who has uploaded his/her private or commercial to the cloud always keen know whether that he/she stored secure not. Access logs of can be trace integrity data. are also known as provenance Provenance contains information users. As check so, it becomes very important securely store The should immutable and unreachable adversaries, users will assured their data, Storage Providers use this implementation improve brand value performance. This paper...
With the increase in number of hosts Internet, there is also a rise demand for IP address space. To cater to this issue, version 6 (IPv6) succeeded IPv4. Compared 32 bit space IPv4, IPv6 composed 128 bits. In when host wants communicate with another an LAN, it needs know MAC target host, which was possible through Address Resolution Protocol (ARP). As ARP stateless and due lack authorization messages, many attacks like request spoofing, response Man-in-the-Middle (MiTM), Denial-of- Service...
For better data availability and accessibility while ensuring secrecy, end-users often tend to outsource their the cloud servers in an encrypted form. However, this brings a major challenge perform search for some keywords over content without disclosing any information unintended entities. This paper proposes novel expressive authorized keyword scheme relying on concept of ciphertext-policy attribute-based encryption. The originality proposed is multifold. First, it supports generic...
Address Resolution Protocol (ARP) based attacks are caused by compromised hosts in the LAN and mainly involve spoofing with falsified IP-MAC pairs. Since ARP is a stateless protocol such possible. Neither there signatures available for these nor any significant statistical behavior change can be observed. So existing signature or anomaly intrusion detection systems unable to detect type of attacks. Several schemes have been proposed literature circumvent attacks, however, techniques either...
Ocular biometrics in the visible spectrum has emerged as an area of significant research activity. In this paper, we propose two convolution-based models for verifying a pair periocular images containing iris, and compare approaches amongst each other well with baseline model. first approach, perform deep learning unsupervised manner using stacked convolutional architecture, external learned a-priori on facial data, top model applied provided apply different score fusion models. second again...
In this paper, we present the results obtained using bi-directional long short-term memory (BiLSTM) with and without attention Logistic Regression (LR) models for SemEval-2019 Task 5 titled ”HatEval: Multilingual Detection of Hate Speech Against Immigrants Women in Twitter”. This paper presents Subtask A English language. The BiLSTM LR are compared two different types preprocessing. One no stemming performed stopwords removed. other model best first test, while character n-grams second test....
Role-Based Encryption (RBE) is an emerging new technique that integrates role based access control (RBAC) model with encryption. RBE embeds RBAC policies in encrypted data itself so only users belonging to appropriate roles are able decrypt and the data. However, existing schemes have been focusing on single-organization cloud storage system, where stored can be accessed by of same organization. This paper presents a novel scheme efficient user revocation for multi-organization from multiple...
Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to security standards near time. Man-in-the-Middle (MITM) attack is one most catastrophic attacks WLAN. Stealth MITM (SMITM) a new way doing based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning done directly victim by forging frame response protocol structure and exploiting WPA2 key management. paper we propose Intrusion...
A Man-In-The-Middle(MITM) attack is one of the most well known on computer networks. Out several variations MITM, Address Resolution Protocol(ARP) Spoofing/Poisoning widely used in packet interception and on-the-fly manipulation. Traditional MITM attacks by ARP Poisoning expose attacker's identity thereby physical location. In this paper, to best our knowledge it for first time that an has been added with stealth capabilities. We propose two new namely Stealth MITM(SMITM) Semi-Stealth...
In this paper, we propose a supervised learning based model for ocular biometrics. Using Speeded-Up Robust Features (SURF) detecting local features of the eye region, create feature descriptor vector each image. We cluster these vectors, representing an image as normalized histogram membership to various clusters, thereby creating bag-of-visual-words model. conduct multiphase training, first performing fast Multinomial Naïve Bayes learning, and subsequently using pyramid-up topology use top...
We propose a geometrical method, applied over eye-specific features, to improve the accuracy of art eye-center localization. Our solution is built upon: (a) checking radially constrained gradient vectors, (b) adding weightage iris specific features and (c) considering bi-directional image gradients eliminate errors due reflection on pupil. system outperforms state methods, when compared collectively across multiple benchmark databases, such as BioID FERET. process lightweight, robust...