Search Results - "Gangopadhyay, Aryya"
-
1
Machine Learning Based Algorithms for Global Dust Aerosol Detection from Satellite Images: Inter-Comparisons and Evaluation
Published in Remote sensing (Basel, Switzerland) (01-02-2021)“…Identifying dust aerosols from passive satellite images is of great interest for many applications. In this study, we developed five different machine-learning…”
Get full text
Journal Article -
2
STenSr: Spatio-temporal tensor streams for anomaly detection and pattern discovery
Published in Knowledge and information systems (01-05-2015)“…The focus of this paper is anomaly detection and pattern discovery in spatio-temporal tensor streams. As an example, sensor networks comprising of multiple…”
Get full text
Journal Article -
3
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
Published in The VLDB journal (01-11-2006)Get full text
Journal Article -
4
Mining sensor datasets with spatiotemporal neighborhoods
Published in Journal of spatial information science (01-01-2013)“…Many spatiotemporal data mining methods are dependent on how relationships between a spatiotemporal unit and its neighbors are defined. These relationships are…”
Get full text
Journal Article -
5
Using Randomness to Improve Robustness of Tree-Based Models Against Evasion Attacks
Published in IEEE transactions on knowledge and data engineering (01-02-2022)“…Machine learning models have been widely used in security applications. However, it is well-known that adversaries can adapt their attacks to evade detection…”
Get full text
Journal Article -
6
Multimode co-clustering for analyzing terrorist networks
Published in Information systems frontiers (01-10-2018)“…The phenomenon of terrorism is deemed one of the fundamental challenges in national security. Creating defensive technologies to mitigate terrorist attacks…”
Get full text
Journal Article -
7
Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems
Published in ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (14-04-2024)“…With a greater emphasis on data confidentiality and legislation, distributed training and collaborative machine learning algorithms are being developed to…”
Get full text
Conference Proceeding -
8
SAM-VQA: Supervised Attention-Based Visual Question Answering Model for Post-Disaster Damage Assessment on Remote Sensing Imagery
Published in IEEE transactions on geoscience and remote sensing (01-01-2023)“…Each natural disaster leaves a trail of destruction and damage that must be effectively managed to reduce its negative impact on human life. Any delay in…”
Get full text
Journal Article -
9
Fuzzy Approach Topic Discovery in Health and Medical Corpora
Published in International journal of fuzzy systems (01-04-2018)“…The majority of medical documents and electronic health records are in text format that poses a challenge for data processing and finding relevant documents…”
Get full text
Journal Article -
10
Analyzing The Emotions of Crowd For Improving The Emergency Response Services
Published in Pervasive and mobile computing (01-08-2019)“…Twitter is an extremely popular micro-blogging social platform with millions of users, generating thousands of tweets per second. The huge amount of Twitter…”
Get full text
Journal Article -
11
An edge–cloud integrated framework for flexible and dynamic stream analytics
Published in Future generation computer systems (01-12-2022)“…With the popularity of Internet of Things (IoT), edge computing and cloud computing, more and more stream analytics applications are being developed including…”
Get full text
Journal Article -
12
STAR-Lite: A light-weight scalable self-taught learning framework for older adults’ activity recognition
Published in Pervasive and mobile computing (01-12-2022)“…Recognizing activities for older adults is challenging as we observe a variety of activity patterns caused due to aging (e.g., limited dexterity, limb control,…”
Get full text
Journal Article -
13
CCS-GAN: COVID-19 CT Scan Generation and Classification with Very Few Positive Training Images
Published in Journal of digital imaging (01-08-2023)“…We present a novel algorithm that is able to generate deep synthetic COVID-19 pneumonia CT scan slices using a very small sample of positive training images in…”
Get full text
Journal Article -
14
Reproducible and Portable Big Data Analytics in the Cloud
Published in IEEE transactions on cloud computing (01-07-2023)“…Cloud computing has become a major approach to help reproduce computational experiments. Yet there are still two main difficulties in reproducing batch based…”
Get full text
Journal Article -
15
Target-Based, Privacy Preserving, and Incremental Association Rule Mining
Published in IEEE transactions on services computing (01-07-2017)“…We consider a special case in association rule mining where mining is conducted by a third party over data located at a central location that is updated from…”
Get full text
Journal Article -
16
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
Published in The VLDB journal (01-11-2006)“…Privacy preserving data mining has become increasingly popular because it allows sharing of privacy-sensitive data for analysis purposes. However, existing…”
Get full text
Journal Article -
17
A data recipient centered de-identification method to retain statistical attributes
Published in Journal of biomedical informatics (01-08-2014)“…[Display omitted] •Recipient’s needs are not considered when data is de-identified.•We present a framework for data recipient centered anonymization.•We…”
Get full text
Journal Article -
18
A Wavelet-Based Approach to Preserve Privacy for Classification Mining
Published in Decision sciences (01-11-2006)“…ABSTRACT Despite the commercial success of data mining, a major drawback has been acknowledged across academic, industry, and government sectors, namely, the…”
Get full text
Journal Article -
19
A smart segmentation technique towards improved infrequent non-speech gestural activity recognition model
Published in Pervasive and mobile computing (01-01-2017)“…Infrequent Non-Speech Gestural Activities (IGAs) such as coughing, deglutition and yawning help identify fine-grained physiological symptoms and chronic…”
Get full text
Journal Article -
20
A generic and distributed privacy preserving classification method with a worst-case privacy guarantee
Published in Distributed and parallel databases : an international journal (01-03-2014)“…It is often necessary for organizations to perform data mining tasks collaboratively without giving up their own data. This necessity has led to the…”
Get full text
Journal Article