Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Mitra, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.01882  [pdf, other

    cs.HC

    Using Virtual Reality for Detection and Intervention of Depression -- A Systematic Literature Review

    Authors: Mohammad Waqas, Y Pawankumar Gururaj, V D Shanmukha Mitra, Sai Anirudh Karri, Raghu Reddy, Syed Azeemuddin

    Abstract: The use of emerging technologies like Virtual Reality (VR) in therapeutic settings has increased in the past few years. By incorporating VR, a mental health condition like depression can be assessed effectively, while also providing personalized motivation and meaningful engagement for treatment purposes. The integration of external sensors further enhances the engagement of the subjects with the… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: 8 pages, 2 figures, 3 tables, Conference full paper

  2. arXiv:2403.00192  [pdf, other

    cs.IT

    Block-MDS QC-LDPC Codes for Information Reconciliation in Key Distribution

    Authors: Lev Tauz, Debarnab Mitra, Jayanth Shreekumar, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: Quantum key distribution (QKD) is a popular protocol that provides information theoretically secure keys to multiple parties. Two important post-processing steps of QKD are 1) the information reconciliation (IR) step, where parties reconcile mismatches in generated keys through classical communication, and 2) the privacy amplification (PA) step, where parties distill their common key into a new se… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 7 pages, 1 figure, submitted to the International Symposium on Information Theory (ISIT) 2024

  3. arXiv:2305.00956  [pdf, other

    cs.IT

    Non-Binary LDPC Code Design for Energy-Time Entanglement Quantum Key Distribution

    Authors: Debarnab Mitra, Lev Tauz, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: In energy-time entanglement Quantum Key Distribution (QKD), two users extract a shared secret key from the arrival times (discretized as symbols) of entangled photon pairs. In prior work, Zhou et al. proposed a multi-level coding (MLC) scheme that splits the observed symbols into bit layers and utilizes binary Low-Density Parity-Check (LDPC) codes for reconciliation of the symbols. While binary LD… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures, submitted to International Symposium on Topics in Coding

  4. arXiv:2301.08295  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2DRS) codes with Merkle trees to mitigate DA attacks. These codes perform well across various metrics such as DA detection probability and communication cost. However, these codes are difficult to apply to bl… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

    Comments: 36 pages, 10 figures, 2 tables, submitted to IEEE Journal on Selected Areas in Information Theory

  5. arXiv:2207.09497  [pdf, other

    cs.CR econ.TH

    Economics and Optimal Investment Policies of Attackers and Defenders in Cybersecurity

    Authors: Austin Ebel, Debasis Mitra

    Abstract: In our time cybersecurity has grown to be a topic of massive proportion at the national and enterprise levels. Our thesis is that the economic perspective and investment decision-making are vital factors in determining the outcome of the struggle. To build our economic framework, we borrow from the pioneering work of Gordon and Loeb in which the Defender optimally trades-off investments for lower… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: 27 pages, 13 figures

    ACM Class: K.6.0; K.6.5; H.1.1

  6. arXiv:2201.07287  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where they accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle Trees to mitigate DA attacks. While these codes have demonstrated improved performance across a variety of metrics such as DA detection probability, they are difficul… ▽ More

    Submitted 16 May, 2022; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: 9 pages, 4 figures, 2 tables, To appear in IEEE International Symposium on Information Theory (ISIT) 2022

  7. Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes accept an invalid block by hiding the invalid portion of the block from the nodes in the system. Recently, a technique based on LDPC codes called Coded Merkle Tree w… ▽ More

    Submitted 27 August, 2022; v1 submitted 30 August, 2021; originally announced August 2021.

    Comments: 18 pages, 7 figures, 3 tables, accepted at IEEE Transactions on Communications (TCOM) 2022. This version reflects comments from reviewers at TCOM

  8. arXiv:2105.06004  [pdf, other

    cs.IT cs.CR

    Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: A popular method of improving the throughput of blockchain systems is by running smaller side blockchains that push the hashes of their blocks onto a trusted blockchain. Side blockchains are vulnerable to stalling attacks where a side blockchain node pushes the hash of a block to the trusted blockchain but makes the block unavailable to other side blockchain nodes. Recently, Sheng et al. proposed… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: 7 pages, 2 figures, 2 tables, To appear in Information Theory Workshop (ITW) 2021

  9. A Novel Quantum Algorithm for Ant Colony Optimization

    Authors: Mrityunjay Ghosh, Nivedita Dey, Debdeep Mitra, Amlan Chakrabarti

    Abstract: Ant colony optimization (ACO) is a commonly used meta-heuristic to solve complex combinatorial optimization problems like traveling salesman problem (TSP), vehicle routing problem (VRP), etc. However, classical ACO algorithms provide better optimal solutions but do not reduce computation time overhead to a significant extent. Algorithmic speed-up can be achieved by using parallelism offered by qua… ▽ More

    Submitted 4 September, 2021; v1 submitted 14 October, 2020; originally announced October 2020.

    Comments: 13 pages, 13 figures

    Journal ref: IET Quantum Communication 2021

  10. arXiv:2010.07363  [pdf, other

    cs.IT cs.CR

    Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: In certain blockchain systems, light nodes are clients that download only a small portion of the block. Light nodes are vulnerable to data availability (DA) attacks where a malicious node hides an invalid portion of the block from the light nodes. Recently, a technique based on erasure codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack wit… ▽ More

    Submitted 23 January, 2021; v1 submitted 14 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, To appear in Information Theory Workshop (ITW) 2020

  11. arXiv:2007.06804  [pdf, other

    cs.ET quant-ph

    2D Qubit Placement of Quantum Circuits using LONGPATH

    Authors: Mrityunjay Ghosh, Nivedita Dey, Debdeep Mitra, Amlan Chakrabarti

    Abstract: In order to achieve speedup over conventional classical computing for finding solution of computationally hard problems, quantum computing was introduced. Quantum algorithms can be simulated in a pseudo quantum environment, but implementation involves realization of quantum circuits through physical synthesis of quantum gates. This requires decomposition of complex quantum gates into a cascade of… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: Advanced Computing and Systems for Security, SpringerLink, Volume 10

  12. arXiv:1812.02580  [pdf

    cs.AI

    Selected Qualitative Spatio-temporal Calculi Developed for Constraint Reasoning: A Review

    Authors: Debasis Mitra

    Abstract: In this article a few of the qualitative spatio-temporal knowledge representation techniques developed by the constraint reasoning community within artificial intelligence are reviewed. The objective is to provide a broad exposure to any other interested group who may utilize these representations. The author has a particular interest in applying these calculi (in a broad sense) in topological dat… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

  13. arXiv:1612.02975  [pdf, ps, other

    cs.ET

    On Fault-Tolerant Design of Exclusive-OR Gates in QCA

    Authors: Dharmendra Kumar, Debasis Mitra, Bhargab B. Bhattacharya

    Abstract: Design paradigms of logic circuits with Quantum-dot Cellular Automata (QCA) have been extensively studied in the recent past. Unfortunately, due to the lack of mature fabrication support, QCA-based circuits often suffer from various types of manufacturing defects and variations, and therefore, are unreliable and error-prone. QCA-based Exclusive-OR (XOR) gates are frequently used in the constructio… ▽ More

    Submitted 9 December, 2016; originally announced December 2016.

    Comments: 9 pages, 26 figures, Microprocessors and Microsystems Journal (communicated)