Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Bhattacharya, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.10394  [pdf, ps, other

    cs.IR cs.AI cs.LG

    Joint Modeling of Search and Recommendations Via an Unified Contextual Recommender (UniCoRn)

    Authors: Moumita Bhattacharya, Vito Ostuni, Sudarshan Lamkhede

    Abstract: Search and recommendation systems are essential in many services, and they are often developed separately, leading to complex maintenance and technical debt. In this paper, we present a unified deep learning model that efficiently handles key aspects of both tasks.

    Submitted 19 August, 2024; originally announced August 2024.

    Comments: 3 pages, 1 figure

  2. arXiv:2408.05353  [pdf, other

    cs.IR cs.LG

    IntentRec: Predicting User Session Intent with Hierarchical Multi-Task Learning

    Authors: Sejoon Oh, Moumita Bhattacharya, Yesu Feng, Sudarshan Lamkhede

    Abstract: Recommender systems have played a critical role in diverse digital services such as e-commerce, streaming media, social networks, etc. If we know what a user's intent is in a given session (e.g. do they want to watch short videos or a movie or play games; are they shopping for a camping trip), it becomes easier to provide high-quality recommendations. In this paper, we introduce IntentRec, a novel… ▽ More

    Submitted 25 July, 2024; originally announced August 2024.

  3. arXiv:2407.20695  [pdf, other

    cs.LG cs.CR cs.CV

    Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT

    Authors: Mirza Akhi Khatun, Mangolika Bhattacharya, Ciarán Eising, Lubna Luxmi Dhirani

    Abstract: This research develops a new method to detect anomalies in time series data using Convolutional Neural Networks (CNNs) in healthcare-IoT. The proposed method creates a Distributed Denial of Service (DDoS) attack using an IoT network simulator, Cooja, which emulates environmental sensors such as temperature and humidity. CNNs detect anomalies in time series data, resulting in a 92\% accuracy in ide… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

    Journal ref: Proceedings of the 12th IEEE International Conference on Healthcare Informatics (IEEE ICHI 2024)

  4. arXiv:2307.13164  [pdf

    cs.CR

    Malware Resistant Data Protection in Hyper-connected Networks: A survey

    Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam

    Abstract: Data protection is the process of securing sensitive information from being corrupted, compromised, or lost. A hyperconnected network, on the other hand, is a computer networking trend in which communication occurs over a network. However, what about malware. Malware is malicious software meant to penetrate private data, threaten a computer system, or gain unauthorised network access without the u… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: 30 pages, 9 figures, 7 tables, no where submitted yet

    MSC Class: F.2.2; I.2.7 ACM-class: F.2.2; I.2.7 j.2.1 ACM Class: F.2.2; I.2.7

  5. arXiv:2206.02254  [pdf, other

    cs.IR cs.AI cs.LG

    Augmenting Netflix Search with In-Session Adapted Recommendations

    Authors: Moumita Bhattacharya, Sudarshan Lamkhede

    Abstract: We motivate the need for recommendation systems that can cater to the members in-the-moment intent by leveraging their interactions from the current session. We provide an overview of an end-to-end in-session adaptive recommendations system in the context of Netflix Search. We discuss the challenges and potential solutions when developing such a system at production scale.

    Submitted 5 June, 2022; originally announced June 2022.

    Comments: 5 pages, 2 figures

    MSC Class: I.2 ARTIFICIAL INTELLIGENCE; H.3 INFORMATION STORAGE AND RETRIEVAL

  6. arXiv:2202.11781  [pdf, other

    cs.CV

    RadioTransformer: A Cascaded Global-Focal Transformer for Visual Attention-guided Disease Classification

    Authors: Moinak Bhattacharya, Shubham Jain, Prateek Prasanna

    Abstract: In this work, we present RadioTransformer, a novel visual attention-driven transformer framework, that leverages radiologists' gaze patterns and models their visuo-cognitive behavior for disease diagnosis on chest radiographs. Domain experts, such as radiologists, rely on visual information for medical image interpretation. On the other hand, deep neural networks have demonstrated significant prom… ▽ More

    Submitted 21 July, 2022; v1 submitted 23 February, 2022; originally announced February 2022.

  7. BYOD Security: A Study of Human Dimensions

    Authors: Kathleen Downer, Maumita Bhattacharya

    Abstract: The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID 19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

    Comments: 21 pages

    ACM Class: K.6.5

    Journal ref: Informatics, MDPI, 2022, 9(1), 16;

  8. arXiv:2111.13949  [pdf, other

    cs.DC

    Distributed Anomaly Detection in Edge Streams using Frequency based Sketch Datastructures

    Authors: Prateek Chanda, Malay Bhattacharya

    Abstract: Often logs hosted in large data centers represent network traffic data over a long period of time. For instance, such network traffic data logged via a TCP dump packet sniffer (as considered in the 1998 DARPA intrusion attack) included network packets being transmitted between computers. While an online framework is necessary for detecting any anomalous or suspicious network activities like denial… ▽ More

    Submitted 27 November, 2021; originally announced November 2021.

  9. arXiv:2110.03427  [pdf, other

    cs.LG cs.CL cs.SD eess.AS eess.SP

    Is Attention always needed? A Case Study on Language Identification from Speech

    Authors: Atanu Mandal, Santanu Pal, Indranil Dutta, Mahidas Bhattacharya, Sudip Kumar Naskar

    Abstract: Language Identification (LID) is a crucial preliminary process in the field of Automatic Speech Recognition (ASR) that involves the identification of a spoken language from audio samples. Contemporary systems that can process speech in multiple languages require users to expressly designate one or more languages prior to utilization. The LID task assumes a significant role in scenarios where ASR s… ▽ More

    Submitted 25 October, 2023; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in Natural Language Engineering

  10. Identifying Ventricular Arrhythmias and Their Predictors by Applying Machine Learning Methods to Electronic Health Records in Patients With Hypertrophic Cardiomyopathy(HCM-VAr-Risk Model)

    Authors: Moumita Bhattacharya, Dai-Yin Lu, Shibani M Kudchadkar, Gabriela Villarreal Greenland, Prasanth Lingamaneni, Celia P Corona-Villalobos, Yufan Guan, Joseph E Marine, Jeffrey E Olgin, Stefan Zimmerman, Theodore P Abraham, Hagit Shatkay, Maria Roselle Abraham

    Abstract: Clinical risk stratification for sudden cardiac death (SCD) in hypertrophic cardiomyopathy (HC) employs rules derived from American College of Cardiology Foundation/American Heart Association (ACCF/AHA) guidelines or the HCM Risk-SCD model (C-index of 0.69), which utilize a few clinical variables. We assessed whether data-driven machine learning methods that consider a wider range of variables can… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Journal ref: The American Journal of Cardiology, Volume 123, Issue 10, 15 May 2019, Pages 1681-1689

  11. Machine Learning Methods for Identifying Atrial Fibrillation Cases and Their Predictors in Patients With Hypertrophic Cardiomyopathy: The HCM-AF-Risk Model

    Authors: Moumita Bhattacharya, Dai-Yin Lu, Ioannis Ventoulis, Gabriela V. Greenland, Hulya Yalcin, Yufan Guan, Joseph E. Marine, Jeffrey E. Olgin, Stefan L. Zimmerman, Theodore P. Abraham, M. Roselle Abraham, Hagit Shatkay

    Abstract: Hypertrophic cardiomyopathy (HCM) patients have a high incidence of atrial fibrillation (AF) and increased stroke risk, even with low risk of congestive heart failure, hypertension, age, diabetes, previous stroke/transient ischemic attack scores. Hence, there is a need to understand the pathophysiology of AF and stroke in HCM. In this retrospective study, we develop and apply a data-driven, machin… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Journal ref: CJC Open, Volume 3, Issue 6, June 2021, Pages 801-813

  12. Co-occurrence of medical conditions: Exposing patterns through probabilistic topic modeling of SNOMED codes

    Authors: Moumita Bhattacharya, Claudine Jurkovitz, Hagit Shatkay

    Abstract: Patients associated with multiple co-occurring health conditions often face aggravated complications and less favorable outcomes. Co-occurring conditions are especially prevalent among individuals suffering from kidney disease, an increasingly widespread condition affecting 13% of the general population in the US. This study aims to identify and characterize patterns of co-occurring medical condit… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Journal ref: Journal of Biomedical Informatics Volume 82, June 2018, Pages 31-40

  13. A Human Dimension of Hacking: Social Engineering through Social Media

    Authors: Heidi Wilcox, Maumita Bhattacharya

    Abstract: Social engineering through social media channels targeting organizational employees is emerging as one of the most challenging information security threats. Social engineering defies traditional security efforts due to the method of attack relying on human naiveté or error. The vast amount of information now made available to social engineers through online social networks is facilitating methods… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

    ACM Class: K.6.5; D.4.6

    Journal ref: 2020 IOP Conf. Ser.: Mater. Sci. Eng. 790 012040

  14. Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities

    Authors: Michael Smurthwaite, Maumita Bhattacharya

    Abstract: As many industries shift towards centralised controlled information systems for monitoring and control, more importance is being placed upon technologies such as Supervisory Control and Data Acquisitions industrial systems (SCADA). This focus on integration and interoperability presents numerous challenges for security personnel and organisational management alike. It becomes paramount therefore t… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

    ACM Class: K.6.5; D.4.6

    Journal ref: 2020 IOP Conf. Ser.: Mater. Sci. Eng. 790 012041

  15. arXiv:1711.10960  [pdf

    cs.CL

    Identifying Patterns of Associated-Conditions through Topic Models of Electronic Medical Records

    Authors: Moumita Bhattacharya, Claudine Jurkovitz, Hagit Shatkay

    Abstract: Multiple adverse health conditions co-occurring in a patient are typically associated with poor prognosis and increased office or hospital visits. Developing methods to identify patterns of co-occurring conditions can assist in diagnosis. Thus identifying patterns of associations among co-occurring conditions is of growing interest. In this paper, we report preliminary results from a data-driven s… ▽ More

    Submitted 17 November, 2017; originally announced November 2017.

    Comments: 4 pages

  16. Identifying Growth-Patterns in Children by Applying Cluster analysis to Electronic Medical Records

    Authors: Moumita Bhattacharya, Deborah Ehrenthal, Hagit Shatkay

    Abstract: Obesity is one of the leading health concerns in the United States. Researchers and health care providers are interested in understanding factors affecting obesity and detecting the likelihood of obesity as early as possible. In this paper, we set out to recognize children who have higher risk of obesity by identifying distinct growth patterns in them. This is done by using clustering methods, whi… ▽ More

    Submitted 16 August, 2017; originally announced August 2017.

    Comments: 4 pages, 5 figure Published in Proc. of the IEEE Int. Conference on Bioinformatics and Biomedicine (BIBM), Belfast, Ireland, November, 2014

  17. arXiv:1601.01230  [pdf

    cs.CR cs.NI

    BYOD Security: A New Business Challenge

    Authors: K. Downer, Maumita Bhattacharya

    Abstract: Bring Your Own Device (BYOD) is a rapidly growing trend in businesses concerned with information technology. BYOD presents a unique list of security concerns for businesses implementing BYOD policies. Recent publications indicate a definite awareness of risks involved in incorporating BYOD into business, however it is still an underrated issue compared to other IT security concerns. This paper foc… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: K. Downer and Maumita Bhattacharya. "BYOD Security: A New Business Challenge", accepted for publication in Proceedings of The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press

    MSC Class: 68Uxx

  18. arXiv:1601.01228  [pdf

    cs.CR cs.AI

    Some Experimental Issues in Financial Fraud Detection: An Investigation

    Authors: J. West, Maumita Bhattacharya

    Abstract: Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as algorithm selection and performance analysis will affect the perceived ability of proposed solutions, so for auditors and re-searchers to be able to sufficiently detect financial fraud it is necessary that these issues be thoroughly explored. In this paper we will revisit the key performan… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

    Comments: J. West and Maumita Bhattacharya. "Some Experimental Issues in Financial Fraud Detection: An Investigation", In the Proceedings of The 5th International Symposium on Cloud and Service Computing (SC2 2015), IEEE CS Press

    MSC Class: 68Txx

  19. arXiv:1511.06915  [pdf

    cs.CY cs.CR

    Countering Social Engineering through Social Media: An Enterprise Security Perspective

    Authors: H. Wilcox, Maumita Bhattacharya

    Abstract: The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an… ▽ More

    Submitted 21 November, 2015; originally announced November 2015.

    Comments: Proceedings of The 7th International Conference on Computational Collective Intelligence Technologies and Applications (ICCCI 2015), LNAI, Springer, Vol. 9330, pp. 54-64

    MSC Class: 68-06

  20. arXiv:1510.07167  [pdf

    cs.CR cs.CY

    Mining Financial Statement Fraud: An Analysis of Some Experimental Issues

    Authors: J. West, Maumita Bhattacharya

    Abstract: Financial statement fraud detection is an important problem with a number of design aspects to consider. Issues such as (i) problem representation, (ii) feature selection, and (iii) choice of performance metrics all influence the perceived performance of detection algorithms. Efficient implementation of financial fraud detection methods relies on a clear understanding of these issues. In this pape… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Proceedings of The 10th IEEE Conference on Industrial Electronics and Applications (ICIEA 2015), IEEE Press

    MSC Class: 68U99

  21. arXiv:1510.07165  [pdf

    cs.CR

    Intelligent Financial Fraud Detection Practices: An Investigation

    Authors: J. West, Maumita Bhattacharya, R. Islam

    Abstract: Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded the problem. Traditional methods of detection involve extensive use of auditing, where a trained individual manually observes reports or transactions… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

    MSC Class: 68U01

  22. arXiv:1510.07163  [pdf

    cs.NE

    Evolutionary Landscape and Management of Population Diversity

    Authors: Maumita Bhattacharya

    Abstract: The search ability of an Evolutionary Algorithm (EA) depends on the variation among the individuals in the population [3, 4, 8]. Maintaining an optimal level of diversity in the EA population is imperative to ensure that progress of the EA search is unhindered by premature convergence to suboptimal solutions. Clearer understanding of the concept of population diversity, in the context of evolution… ▽ More

    Submitted 24 October, 2015; originally announced October 2015.

    Comments: Combinations of Intelligent Methods and Application, Smart Innovations, Systems & Technologies series, Springer

    MSC Class: 68T99

  23. arXiv:1411.4148  [pdf

    cs.NE

    Diversity Handling In Evolutionary Landscape

    Authors: Maumita Bhattacharya

    Abstract: The search ability of an Evolutionary Algorithm (EA) depends on the variation among the individuals in the population. Maintaining an optimal level of diversity in the EA population is imperative to ensure that progress of the EA search is unhindered by premature convergence to suboptimal solutions. Clearer understanding of the concept of population diversity, in the context of evolutionary search… ▽ More

    Submitted 15 November, 2014; originally announced November 2014.

    Comments: In the "Proceedings of the International Workshop on Combinations of Intelligent Methods and Applications (CIMA 2014)", pp. 1-8, November'2014

    MSC Class: 68T05

  24. Uncertainty And Evolutionary Optimization: A Novel Approach

    Authors: Maumita Bhattacharya, R. Islam, A. Mahmood

    Abstract: Evolutionary algorithms (EA) have been widely accepted as efficient solvers for complex real world optimization problems, including engineering optimization. However, real world optimization problems often involve uncertain environment including noisy and/or dynamic environments, which pose major challenges to EA-based optimization. The presence of noise interferes with the evaluation and the sele… ▽ More

    Submitted 21 November, 2014; v1 submitted 15 July, 2014; originally announced July 2014.

    Comments: In Proceedings of the The 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE Press, pp. 988-983, 2014

    MSC Class: 68T99 ACM Class: F.1.1

  25. arXiv:1306.4152  [pdf

    cs.LG stat.ML

    Bioclimating Modelling: A Machine Learning Perspective

    Authors: Maumita Bhattacharya

    Abstract: Many machine learning (ML) approaches are widely used to generate bioclimatic models for prediction of geographic range of organism as a function of climate. Applications such as prediction of range shift in organism, range of invasive species influenced by climate change are important parameters in understanding the impact of climate change. However, success of machine learning-based approaches d… ▽ More

    Submitted 18 June, 2013; originally announced June 2013.

    Comments: 8 pages, In the Proceedings of the 2012 International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2012)

    MSC Class: 68T05

  26. arXiv:1303.2745  [pdf

    cs.NE

    Evolutionary Approaches to Expensive Optimisation

    Authors: Maumita Bhattacharya

    Abstract: Surrogate assisted evolutionary algorithms (EA) are rapidly gaining popularity where applications of EA in complex real world problem domains are concerned. Although EAs are powerful global optimizers, finding optimal solution to complex high dimensional, multimodal problems often require very expensive fitness function evaluations. Needless to say, this could brand any population-based iterative… ▽ More

    Submitted 11 March, 2013; originally announced March 2013.

    Comments: 7 pages

    MSC Class: 97R40

    Journal ref: (IJARAI) International Journal of Advanced Research in Artificial Intelligence,Vol. 2, No. 3, 2013, pp. 53-59

  27. arXiv:1303.2739  [pdf

    cs.LG stat.AP

    Machine Learning for Bioclimatic Modelling

    Authors: Maumita Bhattacharya

    Abstract: Many machine learning (ML) approaches are widely used to generate bioclimatic models for prediction of geographic range of organism as a function of climate. Applications such as prediction of range shift in organism, range of invasive species influenced by climate change are important parameters in understanding the impact of climate change. However, success of machine learning-based approaches d… ▽ More

    Submitted 11 March, 2013; originally announced March 2013.

    Comments: 8 pages

    MSC Class: 97R30

    Journal ref: (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 4, No. 2, 2013, pp. 1-8

  28. arXiv:1303.2215  [pdf

    cs.NE

    Expensive Optimisation: A Metaheuristics Perspective

    Authors: Maumita Bhattacharya

    Abstract: Stochastic, iterative search methods such as Evolutionary Algorithms (EAs) are proven to be efficient optimizers. However, they require evaluation of the candidate solutions which may be prohibitively expensive in many real world optimization problems. Use of approximate models or surrogates is being explored as a way to reduce the number of such evaluations. In this paper we investigated three su… ▽ More

    Submitted 9 March, 2013; originally announced March 2013.

    Comments: 7 pages

    MSC Class: 97R40

    Journal ref: (IJACSA) International Journal of Advanced Computer Science and Applications,ISSN-2156-5570(Online, Vol. 4, No. 2, 2013, pp. 203-209