Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Mane, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.16872  [pdf

    cs.CR

    Mitigating Data Sharing in Public Cloud using Blockchain

    Authors: Patil Pratik Vijaykumar, Prerna Tulsiani, Sunil Mane

    Abstract: Public Cloud Computing has become a fundamental part of modern IT infrastructure as its adoption has transformed the way businesses operate. However, cloud security concerns introduce new risks and challenges related to data protection, sharing, and access control. A synergistic integration of blockchain with the cloud holds immense potential. Blockchain's distributed ledger ensures transparency,… ▽ More

    Submitted 28 May, 2024; v1 submitted 21 April, 2024; originally announced April 2024.

  2. arXiv:2404.09461  [pdf, other

    cs.CV cs.LG

    Improved Object-Based Style Transfer with Single Deep Network

    Authors: Harshmohan Kulkarni, Om Khare, Ninad Barve, Sunil Mane

    Abstract: This research paper proposes a novel methodology for image-to-image style transfer on objects utilizing a single deep convolutional neural network. The proposed approach leverages the You Only Look Once version 8 (YOLOv8) segmentation model and the backbone neural network of YOLOv8 for style transfer. The primary objective is to enhance the visual appeal of objects in images by seamlessly transfer… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: In Proceedings of the Fourth International Conference on Innovations in Computational Intelligence and Computer Vision

  3. arXiv:2311.18085  [pdf, other

    cs.CR

    Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

    Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi

    Abstract: An innovative strategy to enhance the security of symmetric substitution ciphers is presented, through the implementation of a randomized key matrix suitable for various file formats, including but not limited to binary and text files. Despite their historical relevance, symmetric substitution ciphers have been limited by vulnerabilities to cryptanalytic methods like frequency analysis and known p… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: In Proceedings of the 10th IEEE Asia-Pacific Conference on Computer Science and Data Engineering 2023 (CSDE)

  4. arXiv:2311.09367  [pdf, other

    cs.CL

    A Survey on Online User Aggression: Content Detection and Behavioural Analysis on Social Media Platforms

    Authors: Swapnil Mane, Suman Kundu, Rajesh Sharma

    Abstract: The rise of social media platforms has led to an increase in cyber-aggressive behavior, encompassing a broad spectrum of hostile behavior, including cyberbullying, online harassment, and the dissemination of offensive and hate speech. These behaviors have been associated with significant societal consequences, ranging from online anonymity to real-world outcomes such as depression, suicidal tenden… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

    Comments: 40 pages, 14 figures

  5. arXiv:2311.00073  [pdf, other

    cs.CV

    YOLOv8-Based Visual Detection of Road Hazards: Potholes, Sewer Covers, and Manholes

    Authors: Om M. Khare, Shubham Gandhi, Aditya M. Rahalkar, Sunil Mane

    Abstract: Effective detection of road hazards plays a pivotal role in road infrastructure maintenance and ensuring road safety. This research paper provides a comprehensive evaluation of YOLOv8, an object detection model, in the context of detecting road hazards such as potholes, Sewer Covers, and Man Holes. A comparative analysis with previous iterations, YOLOv5 and YOLOv7, is conducted, emphasizing the im… ▽ More

    Submitted 31 October, 2023; originally announced November 2023.

    Comments: Submitted to IEEE-PuneCon-2023 Conference

  6. Researchers eye-view of sarcasm detection in social media textual content

    Authors: Swapnil Mane, Vaibhav Khatavkar

    Abstract: The enormous use of sarcastic text in all forms of communication in social media will have a physiological effect on target users. Each user has a different approach to misusing and recognising sarcasm. Sarcasm detection is difficult even for users, and this will depend on many things such as perspective, context, special symbols. So, that will be a challenging task for machines to differentiate s… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: 8 pages

    Journal ref: International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.9, Issue 8, pp.150-157, 2021

  7. arXiv:2304.01424  [pdf, other

    cs.CL

    Polarity based Sarcasm Detection using Semigraph

    Authors: Swapnil Mane, Vaibhav Khatavkar

    Abstract: Sarcasm is an advanced linguistic expression often found on various online platforms. Sarcasm detection is challenging in natural language processing tasks that affect sentiment analysis. This article presents the inventive method of the semigraph, including semigraph construction and sarcasm detection processes. A variation of the semigraph is suggested in the pattern-relatedness of the text docu… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 11 pages

  8. arXiv:2304.01423  [pdf, other

    cs.CL

    Thematic context vector association based on event uncertainty for Twitter

    Authors: Vaibhav Khatavkar, Swapnil Mane, Parag Kulkarni

    Abstract: Keyword extraction is a crucial process in text mining. The extraction of keywords with respective contextual events in Twitter data is a big challenge. The challenging issues are mainly because of the informality in the language used. The use of misspelled words, acronyms, and ambiguous terms causes informality. The extraction of keywords with informal language in current systems is pattern based… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: 6 pages

  9. arXiv:2304.01166  [pdf, other

    cs.CR

    Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

    Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade

    Abstract: An Intrusion detection system (IDS) is essential for avoiding malicious activity. Mostly, IDS will be improved by machine learning approaches, but the model efficiency is degrading because of more headers (or features) present in the packet (each record). The proposed model extracts practical features using Non-negative matrix factorization and chi-square analysis. The more number of features incr… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Presented in International conference SACAIM 2021, 5 pages

  10. arXiv:2301.02872  [pdf, other

    cs.LG

    Machine Learning to Estimate Gross Loss of Jewelry for Wax Patterns

    Authors: Mihir Jain, Kashish Jain, Sandip Mane

    Abstract: In mass manufacturing of jewellery, the gross loss is estimated before manufacturing to calculate the wax weight of the pattern that would be investment casted to make multiple identical pieces of jewellery. Machine learning is a technology that is a part of AI which helps create a model with decision-making capabilities based on a large set of user-defined data. In this paper, the authors found a… ▽ More

    Submitted 7 January, 2023; originally announced January 2023.

  11. arXiv:2211.05351  [pdf

    cs.AI cs.LG cs.SI

    Biomedical Multi-hop Question Answering Using Knowledge Graph Embeddings and Language Models

    Authors: Dattaraj J. Rao, Shraddha S. Mane, Mukta A. Paliwal

    Abstract: Biomedical knowledge graphs (KG) are heterogenous networks consisting of biological entities as nodes and relations between them as edges. These entities and relations are extracted from millions of research papers and unified in a single resource. The goal of biomedical multi-hop question-answering over knowledge graph (KGQA) is to help biologist and scientist to get valuable insights by asking q… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    ACM Class: I.2.4; I.2.7

  12. arXiv:2210.00008  [pdf, other

    cs.CR cs.AI cs.LG

    Adversarial Attacks on Transformers-Based Malware Detectors

    Authors: Yash Jakhotiya, Heramb Patil, Jugal Rawlani, Sunil B. Mane

    Abstract: Signature-based malware detectors have proven to be insufficient as even a small change in malignant executable code can bypass these signature-based detectors. Many machine learning-based models have been proposed to efficiently detect a wide variety of malware. Many of these models are found to be susceptible to adversarial attacks - attacks that work by generating intentionally designed inputs… ▽ More

    Submitted 5 November, 2022; v1 submitted 1 October, 2022; originally announced October 2022.

    Comments: Accepted to the 2022 NeurIPS ML Safety Workshop. Code available at https://github.com/yashjakhotiya/Adversarial-Attacks-On-Transformers

  13. arXiv:2204.10181  [pdf, other

    cs.CL cs.AI

    WordAlchemy: A transformer-based Reverse Dictionary

    Authors: Sunil B. Mane, Harshal Patil, Kanhaiya Madaswar, Pranav Sadavarte

    Abstract: A reverse dictionary takes a target word's description as input and returns the words that fit the description. Reverse Dictionaries are useful for new language learners, anomia patients, and for solving common tip-of-the-tongue problems (lethologica). Currently, there does not exist any Reverse Dictionary provider with support for any Indian Language. We present a novel open-source cross-lingual… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

  14. arXiv:2203.12239  [pdf

    cs.DC

    Comparative Analysis of GPGPU based ACO and PSO Algorithm for Employee Scheduling Problems

    Authors: Harsha R. Gaikwad, Pradnyarani K. Mahind, Sandeep U. Mane

    Abstract: Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) are simple, easy to implement, their robustness to control parameters, and their computational efficiency when compared with mathematical algorithms and other heuristic optimization techniques. The calculation in PSO and ACO is very simple. Compared with the other developing calculations, it occupies the bigger optimization abilit… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: 1st National P. G. Conference RIT NCon PG - 2015

  15. arXiv:2203.11487  [pdf

    cs.DC

    Overview and Applications of GPGPU Based Parallel Ant Colony Optimization

    Authors: Sandeep U Mane, Pooja S. Lokare, Harsha R. Gaikwad

    Abstract: Ant Colony Optimization algorithm is a magnificent heuristics technique based on the behavior of ants. Parallel computing is a means to achieve the desired results in commensurable execution time. Parallelization of Ant Colony Optimization is utilized to solve large and complex problems. This paper discusses a review of different parallelization approaches for Ant Colony Optimization and its vario… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: International Conference on Advances in Computing and Information Technology (ICACIT 2014)

  16. arXiv:2106.14647  [pdf

    cs.CR cs.LG

    Zero-shot learning approach to adaptive Cybersecurity using Explainable AI

    Authors: Dattaraj Rao, Shraddha Mane

    Abstract: Cybersecurity is a domain where there is constant change in patterns of attack, and we need ways to make our Cybersecurity systems more adaptive to handle new attacks and categorize for appropriate action. We present a novel approach to handle the alarm flooding problem faced by Cybersecurity systems like security information and event management (SIEM) and intrusion detection (IDS). We apply a ze… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.07110

  17. arXiv:2103.07110  [pdf

    cs.CR cs.AI

    Explaining Network Intrusion Detection System Using Explainable AI Framework

    Authors: Shraddha Mane, Dattaraj Rao

    Abstract: Cybersecurity is a domain where the data distribution is constantly changing with attackers exploring newer patterns to attack cyber infrastructure. Intrusion detection system is one of the important layers in cyber safety in today's world. Machine learning based network intrusion detection systems started showing effective results in recent years. With deep learning models, detection rates of net… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

  18. arXiv:2101.08434  [pdf

    cs.CV

    Video Summarization: Study of various techniques

    Authors: Ravi Raj, Varad Bhatnagar, Aman Kumar Singh, Sneha Mane, Nilima Walde

    Abstract: A comparative study of various techniques which can be used for summarization of Videos i.e. Video to Video conversion is presented along with respective architecture, results, strengths and shortcomings. In all approaches, a lengthy video is converted into a shorter video which aims to capture all important events that are present in the original video. The definition of 'important event' may var… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

    Journal ref: Video Summarization: Study of Various Techniques Proceedings of IRAJ International Conference, 26th May, 2019, Pune, India

  19. arXiv:1910.13520  [pdf

    cs.AI cs.LG

    Digital Twin approach to Clinical DSS with Explainable AI

    Authors: Dattaraj Jagdish Rao, Shraddha Mane

    Abstract: We propose a digital twin approach to improve healthcare decision support systems with a combination of domain knowledge and data. Domain knowledge helps build decision thresholds that doctors can use to determine a risk or recommend a treatment or test based on the specific patient condition. However, these assessments tend to be highly subjective and differ from doctor to doctor and from patient… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

  20. arXiv:1407.0313  [pdf

    cs.CY cs.NI

    Analysis of Bus Tracking System Using GPS on Smartphones

    Authors: Mr. Pradip Suresh Mane, Vaishali D. Khairnar

    Abstract: Public transport networks(PTNs)are difficult to use when the user is unfamiliar with the area they are traveling to.This is true for both infrequent users(including visitors)and regular users who need to travel to areas with which they are not acquainted.In these situations,adequate on-trip navigation information can substantially ease the use of public transportation and be the driving factor in… ▽ More

    Submitted 30 June, 2014; originally announced July 2014.

    Comments: PP.80-82

    Journal ref: IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-06618727 Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 80-82