Debayan Gupta
Orcid: 0000-0002-4457-1556
According to our database1,
Debayan Gupta
authored at least 27 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Visual Concept Networks: A Graph-Based Approach to Detecting Anomalous Data in Deep Neural Networks.
CoRR, 2024
SimSAM: Simple Siamese Representations Based Semantic Affinity Matrix for Unsupervised Image Segmentation.
CoRR, 2024
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
ContextCLIP: Contextual Alignment of Image-Text pairs on CLIP visual representations.
Proceedings of the Thirteenth Indian Conference on Computer Vision, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
S++: A Fast and Deployable Secure-Computation Framework for Privacy-Preserving Neural Network Training.
CoRR, 2021
Differential Euler: Designing a Neural Network approximator to solve the Chaotic Three Body Problem.
CoRR, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
An Alternative to India's Reservation Policy: A Unified Framework for Rigorous and Adaptive Measurement of Socio-Economic Status.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2016
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012