Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Pandey, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.06053  [pdf, other

    cond-mat.mtrl-sci cs.LG quant-ph

    Learning local equivariant representations for quantum operators

    Authors: Zhanghao Zhouyin, Zixi Gan, Shishir Kumar Pandey, Linfeng Zhang, Qiangqiang Gu

    Abstract: Predicting quantum operator matrices such as Hamiltonian, overlap, and density matrices in the density functional theory (DFT) framework is crucial for understanding material properties. Current methods often focus on individual operators and struggle with efficiency and scalability for large systems. Here we introduce a novel deep learning model, SLEM (strictly localized equivariant message-passi… ▽ More

    Submitted 16 July, 2024; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: 11 pages, 5 figures and 5 tables

  2. arXiv:2402.07262  [pdf, other

    cs.CL cs.HC

    Low-Resource Counterspeech Generation for Indic Languages: The Case of Bengali and Hindi

    Authors: Mithun Das, Saurabh Kumar Pandey, Shivansh Sethi, Punyajoy Saha, Animesh Mukherjee

    Abstract: With the rise of online abuse, the NLP community has begun investigating the use of neural architectures to generate counterspeech that can "counter" the vicious tone of such abusive speech and dilute/ameliorate their rippling effect over the social network. However, most of the efforts so far have been primarily focused on English. To bridge the gap for low-resource languages such as Bengali and… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: Accepted to the Findings of the ACL: EACL 2024

  3. arXiv:2310.15577  [pdf, other

    cs.CL cs.AI

    CONTRASTE: Supervised Contrastive Pre-training With Aspect-based Prompts For Aspect Sentiment Triplet Extraction

    Authors: Rajdeep Mukherjee, Nithish Kannen, Saurabh Kumar Pandey, Pawan Goyal

    Abstract: Existing works on Aspect Sentiment Triplet Extraction (ASTE) explicitly focus on developing more efficient fine-tuning techniques for the task. Instead, our motivation is to come up with a generic approach that can improve the downstream performances of multiple ABSA tasks simultaneously. Towards this, we present CONTRASTE, a novel pre-training strategy using CONTRastive learning to enhance the AS… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: Accepted as a Long Paper at EMNLP 2023 (Findings); 16 pages; Codes: https://github.com/nitkannen/CONTRASTE/

    ACM Class: I.2.7

  4. arXiv:2308.00005  [pdf

    cs.IR

    Detection and Classification of Novel Attacks and Anomaly in IoT Network using Rule based Deep Learning Model

    Authors: Sanjay Chakraborty, Saroj Kumar Pandey, Saikat Maity, Lopamudra Dey

    Abstract: Attackers are now using sophisticated techniques, like polymorphism, to change the attack pattern for each new attack. Thus, the detection of novel attacks has become the biggest challenge for cyber experts and researchers. Recently, anomaly and hybrid approaches are used for the detection of network attacks. Detecting novel attacks, on the other hand, is a key enabler for a wide range of IoT appl… ▽ More

    Submitted 29 July, 2023; originally announced August 2023.

  5. arXiv:2306.12848  [pdf, ps, other

    cs.IT cs.CR

    On the Direct Construction of MDS and Near-MDS Matrices

    Authors: Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta

    Abstract: The optimal branch number of MDS matrices makes them a preferred choice for designing diffusion layers in many block ciphers and hash functions. Consequently, various methods have been proposed for designing MDS matrices, including search and direct methods. While exhaustive search is suitable for small order MDS matrices, direct constructions are preferred for larger orders due to the vast search… ▽ More

    Submitted 8 April, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

  6. On the Construction of Near-MDS Matrices

    Authors: Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta

    Abstract: The optimal branch number of MDS matrices makes them a preferred choice for designing diffusion layers in many block ciphers and hash functions. However, in lightweight cryptography, Near-MDS (NMDS) matrices with sub-optimal branch numbers offer a better balance between security and efficiency as a diffusion layer, compared to MDS matrices. In this paper, we study NMDS matrices, exploring their co… ▽ More

    Submitted 28 July, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

    Journal ref: Cryptography and Communications (2023)

  7. arXiv:2305.13276  [pdf

    cs.CL cs.LG

    Evaluating ChatGPT's Performance for Multilingual and Emoji-based Hate Speech Detection

    Authors: Mithun Das, Saurabh Kumar Pandey, Animesh Mukherjee

    Abstract: Hate speech is a severe issue that affects many online platforms. So far, several studies have been performed to develop robust hate speech detection systems. Large language models like ChatGPT have recently shown a great promise in performing several tasks, including hate speech detection. However, it is crucial to comprehend the limitations of these models to build robust hate speech detection s… ▽ More

    Submitted 22 May, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

  8. arXiv:2303.10311  [pdf, other

    cs.SI cs.CL cs.CY

    On the rise of fear speech in online social media

    Authors: Punyajoy Saha, Kiran Garimella, Narla Komal Kalyan, Saurabh Kumar Pandey, Pauras Mangesh Meher, Binny Mathew, Animesh Mukherjee

    Abstract: Recently, social media platforms are heavily moderated to prevent the spread of online hate speech, which is usually fertile in toxic words and is directed toward an individual or a community. Owing to such heavy moderation, newer and more subtle techniques are being deployed. One of the most striking among these is fear speech. Fear speech, as the name suggests, attempts to incite fear about a ta… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 16 pages, 9 tables, 15 figures, accepted in Proceedings of the National Academy of Sciences of the United States of America

  9. arXiv:2007.13325  [pdf, other

    eess.AS cs.LG cs.SD

    Analysis of Emotional Content in Indian Political Speeches

    Authors: Sharu Goel, Sandeep Kumar Pandey, Hanumant Singh Shekhawat

    Abstract: Emotions play an essential role in public speaking. The emotional content of speech has the power to influence minds. As such, we present an analysis of the emotional content of politicians speech in the Indian political scenario. We investigate the emotional content present in the speeches of politicians using an Attention based CNN+LSTM network. Experimental evaluations on a dataset of eight Ind… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

  10. arXiv:1603.01542   

    cs.CR

    Centralized group key management scheme for secure multicast communication without re-keying

    Authors: Vinod Kumar, S. K. Pandey, Rajendra Kumar

    Abstract: In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the key- tree in order to achieve logarithmic re-keying cost. The main challenging issue in… ▽ More

    Submitted 17 March, 2016; v1 submitted 4 March, 2016; originally announced March 2016.

    Comments: Wants to implement the method

  11. arXiv:1312.4179  [pdf, other

    cs.NI

    Multi-Parameter Decision Support with Data Transmission over GSM/GPRS Network: a Case Study of Landslide Monitoring

    Authors: Satyajit Rath, B. P. S. Sahoo, S. K. Pandey, D. P. Sandha

    Abstract: The planet Earth has hundreds of impact events, with some occurrences causing both in terms of human casualty as well as economic losses. Such attitudes of earth pushed the frontiers to develop innovative monitoring strategies for the earth system. To make that real, although, will require coherent and real-time data by observing the earth behavior contiguously. Wireless Sensor Network (WSN) appea… ▽ More

    Submitted 1 August, 2014; v1 submitted 15 December, 2013; originally announced December 2013.

    Comments: 6 pages, 2 figures, MODSOLVE 2013. Rath, Satyajit, et al. "Multi-Parameter Decision Support with Data Transmission over GSM/GPRS Network: a Case Study of Landslide Monitoring." in: Proceedings of MODSOLVE 2013, CSIR-NISCAIR, New Delhi, India. May 2013

  12. arXiv:0911.0494  [pdf

    cs.SE cs.CR

    Software Security Rules, SDLC Perspective

    Authors: C. Banerjee, S. K. Pandey

    Abstract: Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable sec… ▽ More

    Submitted 2 November, 2009; originally announced November 2009.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 123-128, October 2009, USA