Search
Now showing items 1-10 of 31
Towards Location Free Movement Recognition with Channel State Information
(2019-12-03)
Channel state information based movement recognition has gathered immense attention over recent years. Different from traditional systems which usually require wearable sensors or surveillance cameras, many existing works ...
ApproxML: Efficient Approximate Ad-Hoc ML Models Through Materialization and Reuse
(2019-12-10)
Machine Learning (ML) has become an essential tool in answering complex predictive analytic queries. Model building for large scale datasets is one of the most time-consuming parts of the data science pipeline. Often data ...
Effective Crypto Ransomware Detection Using Hardware Performance Counters
(2019-05-16)
Systems affected by malware in the past 10 years has risen from 29 million to 780 million, which tells us it is a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets, etc. all come under malware. Ransomware ...
BLOCKCHAIN: RESOURCE UTILISATION ANALYSIS WITH A GAME THEORY PERSPECTIVE
(2019-05-10)
Major blockchain networks are using proof-of-work based consensus protocols to establish trust and decentralize resource management with different incentive mechanisms for the participants or nodes in the network. We ...
ANALYSIS AND CATEGORIZATION OF DRIVE-BY DOWNLOAD MALWARE USING SANDBOXING AND YARA RULESET
(2019-05-08)
With the increase in the usage of websites as the main source of information gathering, malicious activity especially drive-by download has exponentially increased. A drive-by download refers to unintentional download of ...
FrameAnnotator - A Web-Based Frame Semantic Annotation Tool
(2019-05-14)
News headlines around the world are alarming. They aim to trigger emotional responses from the consumer. In an era where news and social media posts spread so quickly, it is often difficult to distinguish between what is ...
User Syndication Using Speech Rhythm
(2019-08-08)
In recent years we have seen a variety of approaches to increase security on computers and mobile devices including fingerprint, and facial recognition. Such techniques while effective are very expensive. Voice biometrics, ...
Deep Reinforcement Learning-based Portfolio Management
(2019-05-16)
Machine Learning is at the forefront of every field today. The subfields of Machine Learning called Reinforcement Learning and Deep Learning, when combined have given rise to advanced algorithms which have been successful ...
EXPERIMENTAL EVALUATION OF N-MODEL METHODOLOGY
(2019-05-13)
Software maintenance is an essential part of the software development life cycle. Usually software engineers use ad hoc approaches to enhance legacy systems in the absence of a systematic methodology. However, there exists ...
Using Property-Based Testing, Weighted Grammar-Based Generators, and a Consensus Oracle to Test Browser Rendering Engines and to Reproduce Minimized Versions of Existing Test Cases
(2019-12-10)
Verifying that a web browser rendering engine correctly renders all valid web pages is challenging due to the size of the input space (valid web pages), the difficulty of determining correct rendering for any given web ...