Arnab Bag

ORCID: 0000-0003-1182-493X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Emotion and Mood Recognition
  • Advanced Malware Detection Techniques
  • EEG and Brain-Computer Interfaces
  • Chaos-based Image/Signal Encryption
  • Color perception and design
  • Security and Verification in Computing
  • Radiation Effects in Electronics
  • Cryptography and Residue Arithmetic
  • Coding theory and cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Data Security Solutions
  • Neuroscience and Neural Engineering
  • Complexity and Algorithms in Graphs
  • Integrated Circuits and Semiconductor Failure Analysis
  • Access Control and Trust
  • Caching and Content Delivery
  • Adversarial Robustness in Machine Learning
  • Privacy-Preserving Technologies in Data
  • Face and Expression Recognition
  • Network Security and Intrusion Detection

Indian Institute of Technology Kharagpur
2015-2024

IBM Research - India
2023

This paper considers two dimensional valence-arousal model. Pictorial stimuli of International Affective Picture Systems were chosen for emotion elicitation. Physiological signals like, Galvanic Skin Response, Heart Rate, Respiration Rate and Temperature measured accessing emotional responses. The experimental procedure uses non-invasive sensors signal collection. A group healthy volunteers was shown four types categorized as High Valence Arousal, Low Arousal around thirty minutes Linear...

10.1109/iciip.2015.7414739 article EN 2015-12-01

Emotions and affect are universal means of expressing the physiological state an individual. Most our daily interactions with other individuals involve emotions as integral part. It has become highly prominent in technological research, new technologies related to human-machine interaction or medical applications developed. Detecting analyzing have quite important area research. In this paper, we took effort find effect different on signals. We used International Affective Picture System...

10.1109/indicon.2016.7839091 article EN 2016-12-01

Searchable Symmetric Encryption (SSE) supports efficient yet secure query processing over outsourced symmetrically encrypted databases without the need for decryption. A longstanding open question has been following: can we design a fast, scalable, linear storage and low-leakage SSE scheme that efficiently arbitrary Boolean queries databases? In this paper, present design, analysis prototype implementation of first conjunctive, disjunctive more general (in both conjunctive normal forms)...

10.56553/popets-2023-0008 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-01-01

Emotion Recognition always has been one of the key areas in human machine interaction, learning or affective computing. Two dimensional valence arousal model used here. In this paper, we present how simple emotion recognition can be done by measuring nine basic non-invasive Biological markers physiological signals including BR [BReathing], ECG [ElectroCardioGram], EMG [ElectroMyoGram], GSR [Galvanic Skin Response], HR [Heart Rate], PR [Pulse RR [Respiration and ST [Skin Temperature] on...

10.1109/indicon.2015.7443733 article EN 2015-12-01

Neural Networks (NN) have recently emerged as backbone of several sensitive applications like automobile, medical image, security, etc. NNs inherently offer Partial Fault Tolerance (PFT) in their architecture; however, the biased PFT can lead to severe consequences cryptography and security critical scenarios. In this paper, we propose a revised implementation which enhances property NN significantly with detailed mathematical analysis. We evaluated performance considering both software FPGA...

10.48550/arxiv.1902.04560 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Fault injection-based cryptanalysis is one of the most powerful practical threats to modern cryptographic primitives. Popular countermeasures such fault-based attacks generally use some form redundant computation detect and react/correct injected faults. However, are shown be vulnerable selective fault injections. In this article, we aim develop a primitive that tolerant by its construction does not require compute same value multiple times. We utilize effectiveness Neural Networks (NNs),...

10.1145/3409594 article EN ACM Journal on Emerging Technologies in Computing Systems 2020-09-22

Pairing cryptosystems are extremely powerful mathematical tools for developing cryptographic protocols that can provide end-to-end security applications like Internet-of-Things (IoT), cloud services and cyber-physical systems (CPS). However, these require the implementations to be light-weight but still real-time, with additional feature of being flexible. The flexibility come from different choices underlying algorithms along suitable parameter choices. A software implementation offers...

10.1109/tc.2021.3058345 article EN IEEE Transactions on Computers 2021-02-12

Searchable symmetric encryption (SSE) allows a client to outsource the storage of her data an (untrusted) server in private manner, while maintaining ability selectively search over it. A key feature all existing SSE schemes is tradeoff between security (in terms information leakage server) and efficiency operational overhead on sides). The premise this work that typically offer scope for massively parallel implementations with improved without compromising security. Based idea, we propose...

10.1145/3243734.3278509 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

In this paper, we present the first Hardware (HW) / Software (SW) co-design based generic discrete Gaussian sampler architecture on Xilinx Zynq platform. The area optimized and secure can produce a distribution an arbitrary standard deviation center given as input. We use multi-level logic optimization Knuth-Yao algorithm's Discrete Distribution Generating (DDG) tree travel-based Boolean mapping of random bits samples instead previous two-level to reduce resource utilization. This method...

10.1109/asianhost51057.2020.9358267 article EN 2020-12-15

FPGAs (Field Programmable Gate arrays) have gained massive popularity today as accelerators for a variety of workloads, including big data analytics, and parallel distributed computing. This has fueled the study mechanisms to provision among multiple tenants general purpose computing resources on cloud. Such offer new challenges, such ensuring IP protection bitstream confidentiality mutually distrusting clients sharing same FPGA. A direct adoption existing techniques from single tenancy...

10.48550/arxiv.1802.04136 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Searchable symmetric encryption (SSE) is a special class of schemes for computing directly over encrypted data. SSE aims to be significantly more efficient as compared other solutions, such fully homomorphic (FHE), while leaking only minimal information the adversary. particularly and scalable Boolean queries large relational databases outsourced third-party cloud service providers. However, practical implementations often suffer from performance bottlenecks due randomised memory accesses...

10.1109/tcsi.2023.3279853 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2023-06-09

Searchable symmetric encryption (SSE) aims to support efficient query-execution directly over encrypted databases. Practical implementations of SSE suffer from performance bottlenecks due randomised memory accesses and computation-intensive cryptographic operations. We propose CAMISE – a fully associative memory-integrated framework for designing systems with fast query processing large show novel usage custom-designed Content Addressable Memory (CAM) minimise storage-access latencies during...

10.1109/cases55004.2022.00017 article EN 2022-10-01
Coming Soon ...