Zobrazeno 1 - 10
of 71
pro vyhledávání: '"Lodha, Sachin"'
Serious games are increasingly being used in cybersecurity education to engage and educate users. Several studies with cybersecurity serious games have shown that they are successful in educating users and the users also find them both fun and engagi
Externí odkaz:
http://arxiv.org/abs/2307.09401
Phishing attacks continue to be a significant threat on the Internet. Prior studies show that it is possible to determine whether a website is phishing or not just by analyzing its URL more carefully. A major advantage of the URL based approach is th
Externí odkaz:
http://arxiv.org/abs/2112.02226
Machine learning based data-driven technologies have shown impressive performances in a variety of application domains. Most enterprises use data from multiple sources to provide quality applications. The reliability of the external data sources rais
Externí odkaz:
http://arxiv.org/abs/2105.14803
Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. Therefore, applications that rely on external data-sources for training data are at
Externí odkaz:
http://arxiv.org/abs/2104.13230
Autor:
Tupsamudre, Harshal, Lodha, Sachin
Today, offline attacks are one of the most severe threats to password security. These attacks have claimed millions of passwords from prominent websites including Yahoo, LinkedIn, Twitter, Sony, Adobe and many more. Therefore, as a preventive measure
Externí odkaz:
http://arxiv.org/abs/2009.03062
Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time co
Externí odkaz:
http://arxiv.org/abs/2005.10634
Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fat
Externí odkaz:
http://arxiv.org/abs/2004.13328
Android's 3X3 graphical pattern lock scheme is one of the widely used authentication method on smartphone devices. However, users choose 3X3 patterns from a small subspace of all possible 389,112 patterns. The two recently proposed interfaces, SysPal
Externí odkaz:
http://arxiv.org/abs/1912.04231
Document digitization is becoming increasingly crucial. In this work, we propose a shape based approach for automatic stamp verification/detection in document images using an unsupervised feature learning. Given a small set of training images, our al
Externí odkaz:
http://arxiv.org/abs/1609.05001
We introduce a variant of the capacitated vehicle routing problem that is encountered in sensor networks for scientific data collection. Consider an undirected graph $G=(V \cup \{\mathbf{sink}\},E)$. Each vertex $v \in V$ holds a constant-sized readi
Externí odkaz:
http://arxiv.org/abs/0902.3517