Zobrazeno 1 - 10
of 150
pro vyhledávání: '"Pal, Arindam"'
Autor:
Chamikara, M. A. P., Jang, Seung Ick, Oppermann, Ian, Liu, Dongxi, Roberto, Musotto, Ruj, Sushmita, Pal, Arindam, Mohammady, Meisam, Camtepe, Seyit, Young, Sylvia, Dorrian, Chris, David, Nasir
Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential pr
Externí odkaz:
http://arxiv.org/abs/2306.03379
Estimating the similarity between two legal case documents is an important and challenging problem, having various downstream applications such as prior-case retrieval and citation recommendation. There are two broad approaches for the task -- citati
Externí odkaz:
http://arxiv.org/abs/2209.12474
Task allocation using a team or coalition of robots is one of the most important problems in robotics, computer science, operational research, and artificial intelligence. In recent work, research has focused on handling complex objectives and feasib
Externí odkaz:
http://arxiv.org/abs/2207.09650
Publikováno v:
IEEE Transactions on Information Forensics & Security 17, 1497-1512, 2022
In this paper, we propose a feature-free method for detecting phishing websites using the Normalized Compression Distance (NCD), a parameter-free similarity measure which computes the similarity of two websites by compressing them, thus eliminating t
Externí odkaz:
http://arxiv.org/abs/2207.10801
Autor:
Ruj, Sushmita, Pal, Arindam
We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees, betweenness, or clustering coefficient. This implies that nodes with high degrees, betweenness, or clust
Externí odkaz:
http://arxiv.org/abs/2206.12735
Machine learning (ML) has developed rapidly in the past few years and has successfully been utilized for a broad range of tasks, including phishing detection. However, building an effective ML-based detection system is not a trivial task, and require
Externí odkaz:
http://arxiv.org/abs/2108.12193
Phishing has grown significantly in the past few years and is predicted to further increase in the future. The dynamics of phishing introduce challenges in implementing a robust phishing detection system and selecting features which can represent phi
Externí odkaz:
http://arxiv.org/abs/2007.11955
Understanding the topical evolution in industrial innovation is a challenging problem. With the advancement in the digital repositories in the form of patent documents, it is becoming increasingly more feasible to understand the innovation secrets --
Externí odkaz:
http://arxiv.org/abs/2007.13520
Computing similarity between two legal case documents is an important and challenging task in Legal IR, for which text-based and network-based measures have been proposed in literature. All prior network-based similarity methods considered a preceden
Externí odkaz:
http://arxiv.org/abs/2007.03225
Computing similarity between two legal documents is an important and challenging task in the domain of Legal Information Retrieval. Finding similar legal documents has many applications in downstream tasks, including prior-case retrieval, recommendat
Externí odkaz:
http://arxiv.org/abs/2004.12307