Neha Gupta

ORCID: 0000-0003-0905-5457
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Sentiment Analysis and Opinion Mining
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Imbalanced Data Classification Techniques
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Web Data Mining and Analysis
  • Advanced Steganography and Watermarking Techniques
  • Machine Learning and Algorithms
  • Chaos-based Image/Signal Encryption
  • Algorithms and Data Compression
  • Cryptography and Data Security
  • Big Data and Business Intelligence
  • Data Mining Algorithms and Applications
  • IoT-based Smart Home Systems
  • Complexity and Algorithms in Graphs
  • Radiomics and Machine Learning in Medical Imaging

Manav Rachna International Institute of Research and Studies
2016-2025

Narsee Monjee Institute of Management Studies
2025

Bharati Vidyapeeth Deemed University
2020-2024

Centre for Development of Advanced Computing
2018-2024

Symbiosis International University
2021-2024

Indian Institute of Technology Bombay
2000-2024

ABES Engineering College
2022-2024

Guru Nanak Institutions
2024

IFTM University
2013-2023

Chitkara University
2022-2023

Crowdsourcing is a key current topic in CSCW. We build upon findings of few qualitative studies crowdworkers. conducted an ethnomethodological analysis publicly available content on Turker Nation, general forum for Amazon Mechanical Turk (AMT) users. Using data we provide novel depth and detail how the Nation members operate as economic actors, working out which Requesters jobs are worthwhile to them. show some ways functions community also look further into Turker-Requester relationships...

10.1145/2531602.2531663 article EN 2014-02-07

In the so called 'post-truth' era, characterized by a loss of public trust in various institutions, and rise 'fake news' disseminated via internet social media, individuals may face uncertainty about veracity information available, whether it be satire or malicious hoax. We investigate attitudes to news delivered subsequent verification strategies applied, not individuals. A survey reveals that two thirds respondents regularly consumed Facebook, one third had at some point come across fake...

10.1145/3173574.3173950 article EN 2018-04-20

Previous studies on Amazon Mechanical Turk (AMT), the most well-known marketplace for microtasks, show that largest population of workers AMT is U.S. based, while second based in India. In this paper, we present insights from an ethnographic study conducted India to introduce some these or "Turkers" -- who they are, how work and what turking means them. We examine do maintain their reputations work-life balance. doing this, illustrate AMT's design practically impacts turk-work. Understanding...

10.1145/2660398.2660403 article EN 2014-11-09

10.1007/s10606-015-9241-6 article EN Computer Supported Cooperative Work (CSCW) 2016-01-13

The importance of multi-armed bandit (MAB) problems is on the rise due to their recent application in a large variety areas such as online advertising, news article selection, wireless networks, and medicinal trials, name few. most common assumption made when solving MAB that unknown reward probability θ <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sup> each arm k fixed. However, this rarely holds practice simply because real-life often...

10.1109/icmla.2011.144 article EN 2011-12-01

Background: Diagnosing lung diseases accurately is crucial for proper treatment. Convolutional neural networks (CNNs) have advanced medical image processing, but challenges remain in their accurate explainability and reliability. This study combines U-Net with attention Vision Transformers (ViTs) to enhance disease segmentation classification. We hypothesize that Attention will accuracy ViTs improve classification performance. The methodologies shed light on model decision-making processes,...

10.3390/diagnostics14141534 article EN cc-by Diagnostics 2024-07-16

Maternal mental health is a largely ignored issue in the Indian population. Considering high prevalence of postpartum depression, assessment and screening high-risk cases should be part routine antenatal care.To study women at risk for peripartum depression using Edinburgh Postnatal Depression Scale (EPDS) score tertiary teaching hospital New Delhi, to associated factors population.Five hundred six (506) were interviewed structured questionnaire, which included sociodemographic details like...

10.1177/0020764011415210 article EN International Journal of Social Psychiatry 2011-08-05

The ubiquity of the Internet and widespread proliferation electronic devices has resulted in flourishing microtask crowdsourcing marketplaces, such as Amazon MTurk. An aspect that remained largely invisible is work environments; defined hardware software affordances at disposal crowd workers which are used to complete microtasks on platforms. In this paper, we reveal significant role environments shaping work. First, through a pilot study surveying good bad experiences had with UI elements...

10.1145/3130914 article EN Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 2017-09-11

&lt;p&gt;This paper is about preserving the Cloud data whose idea to cure everyday problems with computing. computing fundamentally pooling resources virtually and like storage are provided end-users through web. Information preservation, security, uniform quality, interoperability some issues related cloud However, most essential issue Security how it ensured by a supplier. of can be offered means cryptography. This presents an improved composite protection mechanism protect on from...

10.36227/techrxiv.20306157.v1 preprint EN cc-by 2022-07-19

Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods can be employed to uncover such devious tactics, but the first step are awareness methods even exist. There many good reasons as well use this type hiding, including watermarking or more secure central storage for things passwords, key processes. Regardless, technology easy difficult detect. Researchers scientists have made lot research work solve problem find an image .The...

10.1109/icroit.2014.6798368 article EN 2014-02-01
Coming Soon ...