Abhishek Singh

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Inexact Newton Method for Solving Generalized Nash Equilibrium Problems.
J. Optim. Theory Appl., June, 2024

DNASCANNER v2: A Web-Based Tool to Analyze the Characteristic Properties of Nucleotide Sequences.
J. Comput. Biol., 2024

Uncovering Semantics and Topics Utilized by Threat Actors to Deliver Malicious Attachments and URLs.
CoRR, 2024

AMC: Access to Miss Correlation Prefetcher for Evolving Graph Analytics.
CoRR, 2024

CoD: Coherent Detection of Entities from Images with Multiple Modalities.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Generalizable and Stable Finetuning of Pretrained Language Models on Low-Resource Texts.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

A Spectrally Regulated Convolution-Based Network for Crop-Mapping with Hyperspectral Images.
Proceedings of the IGARSS 2024, 2024

Domain2Vec: Identifying User Affinities using Domain Embeddings.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024

2023
Federated benchmarking of medical artificial intelligence with MedPerf.
Nat. Mac. Intell., July, 2023

WIANet: A Wavelet-Inspired Attention-Based Convolution Neural Network for Land Cover Classification.
IEEE Geosci. Remote. Sens. Lett., 2023

Eigen: Expert-Informed Joint Learning Aggregation for High-Fidelity Information Extraction from Document Images.
Proceedings of the Machine Learning for Health, 2023

Finding Beauty Products Chemicals Using Token Identification and Entity Recognition Transformer Model.
Proceedings of the Workshop Proceedings of the 19th International Conference on Intelligent Environments (IE2023), 2023

Refining Land-Cover Weak Labels Using a Discrete Wavelet Transform Inspired Deep Adversarial Model.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

A Review of Data Security in Cloud Computing.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

HIRAC: A Hierarchical Accelerator with Sorting-based Packing for SpGEMMs in DNN Applications.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

SkiLL: Skipping Color and Label Landscape: Self Supervised Design Representations for Products in E-commerce.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Generalized estimator for computation of population mean under neutrosophic ranked set technique: An application to solar energy data.
Comput. Appl. Math., June, 2022

Mono- and Dual-Regulated Contractive-Expansive-Contractive Deep Convolutional Networks for Classification of Multispectral Remote Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2022

SIGAN: Spectral Index Generative Adversarial Network for Data Augmentation in Multispectral Remote Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2022

Singularity: Planet-Scale, Preemptive and Elastic Scheduling of AI Workloads.
CoRR, 2022

Computing the effect of measurement errors on ranked set sampling estimators of the population mean.
Concurr. Comput. Pract. Exp., 2022

Team LEGO at SemEval-2022 Task 4: Machine Learning Methods for PCL Detection.
Proceedings of the 16th International Workshop on Semantic Evaluation, SemEval@NAACL 2022, 2022

Development of Multi-task Models for Emotion-Aware Gender Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2022

Data Augmentation Through Spectrally Controlled Adversarial Networks for Classification of Multispectral Remote Sensing Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

A Systematic Survey on COVID 19 Detection and Diagnosis by Utilizing Deep Learning Techniques and Modalities of Radiology.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
SPX64: A Scratchpad Memory for General-purpose Microprocessors.
ACM Trans. Archit. Code Optim., 2021

Static analysis for detecting high-level races in RTOS kernels.
Formal Methods Syst. Des., 2021

MedPerf: Open Benchmarking Platform for Medical Artificial Intelligence using Federated Evaluation.
CoRR, 2021

Mobility Data Analysis and Applications: A mid-year 2021 Survey.
CoRR, 2021

On-Device System for Device Directed Speech Detection for Improving Human Computer Interaction.
IEEE Access, 2021

Intent Classification from Code Mixed Input for Virtual Assistants.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021

Conformance testing of ARINC 653 compliance for a safety critical RTOS using UPPAAL model checker.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

An In-Memory Analog Computing Co-Processor for Energy-Efficient CNN Inference on Mobile Devices.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

Blockchain Based Accounts Payable Platform for Goods Trade.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Development of MEC system for indigenous 5G Test-Bed.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

A Combination of Enhanced WordNet and BERT for Semantic Textual Similarity.
Proceedings of the CCRIS 2021: 2nd International Conference on Control, 2021

2020
Fuzzy-based approach to incorporate spatial constraints in possibilistic c-means algorithm for remotely sensed imagery.
Int. J. Intell. Inf. Database Syst., 2020

Parzen Window Approximation on Riemannian Manifold.
CoRR, 2020

PoinT-5: Pointer Network and T-5 based Financial NarrativeSummarisation.
CoRR, 2020

Voice@SRIB at SemEval-2020 Task [9, 12]: Sentiment and Offensiveness detection in Social Media.
CoRR, 2020

Voice@SRIB at SemEval-2020 Tasks 9 and 12: Stacked Ensemblingmethod for Sentiment and Offensiveness detection in Social Media.
Proceedings of the Fourteenth Workshop on Semantic Evaluation, 2020

Multi-RAT multi-connectivity active steering antenna technology for IoT, Wi-Fi, LTE, and 5G.
Proceedings of the 2020 IEEE Radio and Wireless Symposium, 2020

Blockchain Based e-Invoicing Platform for Global Trade.
Proceedings of the IEEE International Conference on Blockchain, 2020

Blockchain-Based Platform for Trusted Collaborations on Data and AI Models.
Proceedings of the IEEE International Conference on Blockchain, 2020

The Tipping Point In Social Networks: Investigating the Mechanism Behind Viral Information Spreading.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

On Using Composite Word Embeddings To Improve Biomedical Term Similarity.
Proceedings of the 20th IEEE International Conference on Bioinformatics and Bioengineering, 2020

Classification of Imbalanced Data Using Decision Tree and Bayesian Classifier.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

Clinical XLNet: Modeling Sequential Clinical Notes and Predicting Prolonged Mechanical Ventilation.
Proceedings of the 3rd Clinical Natural Language Processing Workshop, 2020

2019
A walkthrough of the emerging IoT paradigm: Visualizing inside functionalities, key features, and open issues.
J. Netw. Comput. Appl., 2019

Extended Karush-Kuhn-Tucker condition for constrained interval optimization problems and its application in support vector machines.
Inf. Sci., 2019

Energy efficient resource management techniques in cloud environment for web-based community by machine learning: a survey.
Int. J. Web Based Communities, 2019

NASIB: Neural Architecture Search withIn Budget.
CoRR, 2019

Crew Planning for Commuter Rail Operations, a Case Study on Mumbai, India.
Proceedings of the Operations Research Proceedings 2019, 2019

Incorporating Emoji Descriptions Improves Tweet Classification.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

Static Analysis for Detecting High-Level Races in RTOS Kernels.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

Ownership Preserving AI Market Places Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

MIGAN: Malware Image Synthesis Using GANs.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Neural Architecture Construction using EnvelopeNets.
CoRR, 2018

Resource Fairness and Prioritization of Transactions in Permissioned Blockchain Systems (Industry Track).
Proceedings of the 19th International Middleware Conference, 2018

Detection of Rare Genetic Diseases using Facial 2D Images with Transfer Learning.
Proceedings of the 8th International Symposium on Embedded Computing and System Design, 2018

When and Where?: Behavior Dominant Location Forecasting with Micro-Blog Streams.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Formal Verification of Datarace in Safety Critical ARINC653 compliant RTOS.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
A Systematic Framework to Optimize Launch Times of Web Apps.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Certificate Transparency with Enhancements and Short Proofs.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Framework to Improve the Web Application Launch Time.
Proceedings of the 2016 IEEE International Conference on Mobile Services, MS 2016, San Francisco, CA, USA, June 27, 2016

Ranking Summaries for Informativeness and Coherence without Reference Summaries.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

Load Balancing among Wide-Area SDN Controllers.
Proceedings of the 2016 International Conference on Information Technology, 2016

2015
Provably secure one-round certificateless authenticated group key agreement protocol for secure communications.
Wirel. Pers. Commun., 2015

Demo: A Smart Framework for IoT Analytic Workflow Development.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

ConfValley: a systematic configuration validation framework for cloud services.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
The C-loss function for pattern classification.
Pattern Recognit., 2014

2013
Caching reverse-geocoded locations on smartphones.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
A variational approach for optimizing quadratic mutual information for medical image registration.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Information theoretic learning with adaptive kernels.
Signal Process., 2011

2010
Semantic-less coordination of power management and application performance.
ACM SIGOPS Oper. Syst. Rev., 2010

Image-Based Machine Learning for Reduction of User Fatigue in an Interactive Model Calibration System.
J. Comput. Civ. Eng., 2010

A loss function for classification based on a robust similarity metric.
Proceedings of the International Joint Conference on Neural Networks, 2010

Hidden Markov Models for modeling blood pressure data to predict acute hypotension.
Proceedings of the IEEE International Conference on Acoustics, 2010

A closed form recursive solution for Maximum Correntropy training.
Proceedings of the IEEE International Conference on Acoustics, 2010

Kernel width adaptation in information theoretic cost functions.
Proceedings of the IEEE International Conference on Acoustics, 2010

Algorithms for Entropy and Correntropy Adaptation with Applications to Linear Systems.
Proceedings of the Information Theoretic Learning, 2010

2009
Identifying Malicious Code Through Reverse Engineering
Advances in Information Security 44, Springer, ISBN: 978-0-387-09824-1, 2009

Co-scheduling Real-time Tasks and Non Real-time Tasks Using Empirical Probability Distribution of Execution Time Requirements.
PhD thesis, 2009

TransCPN - Software Tool for Transformation of Colored Petri Nets.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Using Correntropy as a cost function in linear adaptive filters.
Proceedings of the International Joint Conference on Neural Networks, 2009

Efficient Learning of Finite Mixture Densities Using Mutual Information.
Proceedings of the Seventh International Conference on Advances in Pattern Recognition, 2009

Resource management for isolation enhanced cloud services.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Generating hypotheses from the web.
Proceedings of the 17th International Conference on World Wide Web, 2008

A Sampling-Resampling Based Bayesian Learning Approach for Object Tracking.
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008

A Bayesian Learning Based Approach for Clustering of Satellite Images.
Proceedings of the Sixth Indian Conference on Computer Vision, Graphics & Image Processing, 2008

Background Subtraction in Videos using Bayesian Learning with Motion Information.
Proceedings of the British Machine Vision Conference 2008, Leeds, UK, September 2008, 2008

Vulnerability Analysis and Defense for the Internet
Advances in Information Security 37, Springer, ISBN: 978-0-387-74389-9, 2008

2007
On the Use of Lexeme Features for Writer Verification.
Proceedings of the 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 2007

Co-Scheduling Variable Execution Time Requirement Real-Time Tasks and Non Real-Time Tasks.
Proceedings of the 19th Euromicro Conference on Real-Time Systems, 2007

2004
Developing Surrogate Simulation Models for Computationally Intensive Real World Application.
Proceedings of the MAICS 2004, 2004

Context Free Grammar for the Generation of One Time Authentication Identity.
Proceedings of the Seventeenth International Florida Artificial Intelligence Research Society Conference, 2004

2003
Malicious ICMP Tunneling: Defense against the Vulnerability.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Grammar based off line generation of disposable credit card numbers.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Compiler optimizations for Java aglets in distributed data intensive applications.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Modified Linkage Learning Genetic Algorithm For Difficult Non-stationary Problems.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002

A Formal Service Specification for IIOP based on ISO/IEC 14752.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002


  Loading...