Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
Published:
This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html
Published:
This lesson covers An Informal Introduction to Python 3.10.5, https://docs.python.org/3/tutorial/introduction.html
Published:
Published:
Tableau Fundamentals
Published:
This lesson is on basic commands of R
Published:
This lesson is from r-statistics.co
Published:
Download:
Published:
This post covers Multivariate Visualization.
Published:
This post covers Bivariate Visualization.
Published:
This post covers Univariate Data Visualization.
Published:
This post covers Data Assessing and Cleaning.
Published:
This post covers Data Gathering.
Published:
This post covers Data Wrangling.
Published:
This post covers Introduction to Pandas.
Published:
This post covers detecting outliers.
Published:
This post covers Introduction to Python Programming.
Published:
Download Python.
Published:
This page covers projects completed by Students.
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
This lesson is from An Introduction to Statistical Learning
Published:
Published:
This post covers Forecasting.
Published:
This post covers Trend Lines.
Published:
This post covers geo maps.
Published:
This post covers Calculated Field.
Published:
This post covers Data Aggregation.
Published:
This post covers Filtering and Sorting
Published:
This post covers visualization.
Published:
Published:
This post covers Dashboard and Stories.
Published:
Download
Published:
This lesson is from Adversarial Robustness - Theory and Practice
Published:
This lesson is for help.
Published:
This lesson covers Variance and Standard Deviation.
Published:
This lesson covers Range and Quartiles.
Published:
This lesson covers Introduction to Skewed Distribution.
Published:
This lesson covers Linear Regression.
Published:
permalink: /dt/agile-intro
Published:
permalink: /dt/agile
Published:
permalink: /digital-transformation/critical-factors
Published:
permalink: /digital-transformation/blockchain
Published:
permalink: /digital-transformation/cloud-computing
Published:
permalink: /digital-transformation/mobile-computing
Published:
permalink: /digital-transformation/reality-technologies
Published:
permalink: /digital-transformation/iot
Published:
permalink: /digital-transformation/bigdata
Published:
permalink: /digital-transformation/competitive-advantage-with-information-capabilities
Published:
permalink: /digital-transformation/online-business-models
Published:
permalink: /ai-for-everyone/building-ai
Published:
ai-for-everyone/what-is-ai
Published:
Published:
This post covers paper BLEU: a Method for Automatic Evaluation of Machine Translation
Published:
This post covers paper Natural Adversarial Examples
Published:
This post covers paper “Explaining and Harnessing Adversarial Examples”
Published:
This post covers paper “Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey”
Published:
This post covers MNIST implementation of ICLR 2015 paper “Explaining and Harnessing Adversarial Examples”
Published:
This post covers paper “Towards General Purpose Vision Systems”
Published:
This post explains Chi-square Test.
Published:
This post provides t Table.
Published:
This post covers Hypothesis Testing.
Published:
This post covers Estimation.
Published:
This post explains creating slides using Jupyter Notebook.
Published:
This post covers Sampling Distributions Example.
Published:
This post covers introduction to Logical and Physical Markups.
Published:
This lesson covers Client-side form validation.
Published:
This lesson covers Filtering HTML Elemens.
Published:
This lesson covers Document Object Model (DOM).
Published:
This post covers Probability Distributions.
Published:
This post covers Normal Distribution from https://www.mathsisfun.com/data/standard-normal-distribution.html and https://www.mathsisfun.com/data/standard-deviation.html
Published:
This post provides Z Table.
Published:
This lesson covers JavaScript Functional Programming.
Published:
This lesson covers JavaScript Fundamentals.
Published:
This post covers Sampling Distributions.
Published:
This post covers paper “What is being transferred in transfer learning” by Google / Google Brain (NeurIPS 2020).
Published:
This lesson covers JavaScript Lab Fundamentals.
Published:
This post covers installation of MySQL.
Published:
This post covers Cookie and Session in Flask.
Published:
This post covers user profile management system using MySQL.
Published:
This post covers cookie in Flask!
Published:
This post covers forms in Flask using Calculator App!
Published:
This post covers introduction to Flask!
Published:
This lesson is on Machine Learning notes.
Published:
This post covers introduction to Image Classification using Deep Learning.
Published:
This post covers introduction to Image Classification using Deep Learning.
Published:
This post covers CNN Architecture from cs231n.
Published:
This post covers CNN Architecture from cs231n.
Published:
This post covers Optimization and Backpropogation from cs231n.
Published:
This post covers Optimization and Gradient Descent from cs231n.
Published:
This post covers image classification, nearest neighbor classifier, k-nearest neighbor classifier and validation sets from cs231n.
Published:
This post covers Introduction to descriptive statistics.
Published:
This lesson is from Introduction to Descriptive Statistics by Jackie Nicholas, Mathematics Learning Centre, University of Sydney
Published:
This post covers Introduction to some other python libraries.
Published:
This post covers introduction to Neural Network using MNIST dataset.
Published:
This post covers introduction to Convolution Neural Network using MNIST dataset.
Published:
This post covers introduction to HTML Forms.
Published:
This lesson covers possible datasets to be used for projects.
Published:
https://app.datacamp.com/learn/courses/dealing-with-missing-data-in-r
Published:
This lesson is from datacamp Visualizing Geospatial data in R and https://eriqande.github.io/rep-res-eeb-2017/map-making-in-R.html
Published:
This lesson is from datacamp Visualization Best Practices in R
Published:
This lesson is from datacamp Introduction to Shiny
Published:
This lesson is from datacamp Introduction to Plotly
Published:
This lesson is from datacamp Introduction to Tidyverse
Published:
This lesson covers HTML Fundamentals.
Published:
This lesson covers CSS Fundamentals
Published:
This post covers certain formulas useful for Deep Learning.
U.S. Patent Publication, 2015
The patent describes a safe card that that by default is in a blocked state so that no transcation can be made. The safe card can be activated for a limited time by an authorized user for the transaction.
Recommended citation: Aneja, N., and Aneja, S. "Anti-fraud computer implemented method for financial card transaction." U.S. Patent Publication 2015/0339,657, filed May 23, 2014, published Nov 26, 2015. https://patentimages.storage.googleapis.com/06/22/8e/674c30a57d0fe8/US20150339657A1.pdf
U.S. Issued Patent, 2019
The patent describes a method to create a social network based on dynamic interests of users and using ad-hoc networking. A user of mobile device can identify another user who is close by and has similar interests. Dynamic interests of the users can be extracted or identified based on mobile usage, browsing history, places traveled, and other user actions. Users are notified if another user who is similar more than a threshold is present nearby. The system also facilitates communication between users by way of chatting, file sharing, image sharing etc.
Recommended citation: Aneja, N., and Gambhir, S. "Method and system for Ad-hoc Social Networking and Profile Matching." U.S. Patent 10,264,609, filed Dec 28, 2015, issued April 16, 2019. https://patentimages.storage.googleapis.com/0f/63/b5/a0d9ef4311bf34/US10264609B2.pdf
U.S. Issued Patent, 2020
The discloosure presents unified instant messaging application/service that enables to concurrently send messages via online mode using internet and Offline or Airplane mode
Recommended citation: Aneja, S., Aneja. N., and Petra, I. "Instant messaging for mobile device with offline and online mode." U.S. Patent 10,834,035, filed Dec 28, 2015, issued Nov 10, 2020. https://patentimages.storage.googleapis.com/58/d4/f7/58ebe5626a9362/US10834035.pdf
Published:
Detecting Fake News using language features
Published:
Implementation of convolutional neural network to clone driving behavior using Keras. The model outputs a steering angle to an autonomous vehicle.
Published:
Transfer Learning for detecting cancer from Histopathology images
Published:
NL-Augmenter 🦎 → 🐍 A Framework for Task-Sensitive Natural Language Augmentation
Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), 2006
The paper presents a co-operative security scheme called Reliable Ad hoc On-demand Distance Vector (RAODV) routing protocol based on local monitoring has been proposed to solve the problem of attack by malicious node as well as selfish behavior
Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol," International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), Morne, Mauritius, 2006, pp. 98-98, doi: 10.1109/ICNICONSMCL.2006.183. https://ieeexplore.ieee.org/document/1628344
Published in Sixth International Conference on Networking (ICN07), 2007
The paper presents algorithm to determine a path which is farthest from the endangered nodes in mobile ad-hoc social network.
Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)," Sixth International Conference on Networking (ICN07), Martinique, 2007, pp. 16-16, doi: 10.1109/ICN.2007.57. https://ieeexplore.ieee.org/document/4196209
Published in National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology, 2012
The paper presents research challenges in ad-hoc social network.
Recommended citation: Aneja, N. and Gambhir, S. (2012) "Various Issues in Ad-hoc Social Networks", National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology Faridabad Haryana India, 6-9
Published in International Journal of Scientific and Engineering Research, 2014
The paper presents research challenges in ad-hoc social network.
Recommended citation: Gambhir, S. and Aneja, N. (2013) International Journal of Scientific and Engineering Research, Vol 4, Issue 8, August 2013
Published in Social Networking, 2014
The paper presents a profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users.
Recommended citation: Aneja, N. and Gambhir, S. (2014) Geo-Social Profile Matching Algorithm for Dynamic Interests in Ad-Hoc Social Network. Social Networking, 3, 240-247. doi: 10.4236/sn.2014.35029 https://scirp.org/journal/PaperInformation.aspx?PaperID=51108
Published in IEEE International Conference on Computational Intelligence & Communication Technology, 2015
This paper provides an algorithm to semantically match users profiles based on geographic location and dynamic interests.
Recommended citation: N. Aneja and S. Gambhir, "Geo-Social Semantic Profile Matching Algorithm for Dynamic Interests in Ad-hoc Social Network," 2015 IEEE International Conference on Computational Intelligence and Communication Technology, Ghaziabad, 2015, pp. 354-358, doi: 10.1109/CICT.2015.50. https://ieeexplore.ieee.org/document/7078725
Published in International Conference on Soft Computing Techniques and Implementations (ICSCTI), 2015
This paper presents survey results for need of ad-hoc social network. Results indicate that users prefer 75 percent of average profile similarity to connect nearby users.
Recommended citation: S. Gambhir, N. Aneja and S. Mangla, "Need of ad-hoc social network based on users dynamic interests," 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), Faridabad, 2015, pp. 52-56, doi: 10.1109/ICSCTI.2015.7489562. https://ieeexplore.ieee.org/document/7489562
Published in 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android.
Recommended citation: S. Gambhir, S. Mangla and N. Aneja, "Software design for social profile matching algorithm to create ad-hoc social network on top of Android," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 3450-3454. https://ieeexplore.ieee.org/document/7724906
Published in Wireless Personal Communications, 2016
The paper presents middleware architecture for Ad-hoc Social Network that provides software developers a platform for developing mobile apps that enable social connections. The proposed architecture is a software suite that includes an application layer, transport layer, ad-hoc social layer and ad-hoc communication layer.
Recommended citation: Aneja, N., and Gambhir, S. (2016), "Middleware Architecture for Ad-hoc Social Network" Research Journal of Applied Sciences, Engineering and Technology https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.13.3342
Published in IEEE, 2017
The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product ratings.
Recommended citation: Glenn A. Fink, Mohammed Aledhari, Jared Bielby, Rajesh Nighot, Sukanya Mandal, Nagender Aneja, Chris Hrivnak, Lucian Cristache, "Internet of Things (IOT) Security Best Practices" IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/internet_of_things_may_2017.pdf
Published in IEEE, 2017
The white paper presents a set of well investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product ratings.
Recommended citation: Mohammed Aledhari, Sukanya Mandal, Nagender Aneja, Mikael Dautrey, Rajesh Nighot, Prasad Mantri, Jared Bielby, "Protecting Internet Traffic: Security Challenges and Solutions", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/protecting_internet_traffic_may_2017.pdf
Published in NoSQL Database for Storage and Retrieval of Data in Cloud, 2017
The chapter discusses security of traditional database systems using an example of PostgreSQL database system. It explains RBAC and its variations with an example of PostgreSQL and describes the basic RBAC model in context of MongoDB.
Recommended citation: Aneja S, Aneja N. "Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores", book chapter in NoSQL Database for Storage and Retrieval of Data in Cloud, 237-250., Taylor & Francis Group, CRC Press 2017, Print ISBN: 978-1-4987-8436-8, eBook ISBN: 978-1-4987-8437-5 https://www.taylorfrancis.com/books/e/9781315155579/chapters/10.1201/9781315155579-13
Published in Wireless Personal Communications, 2017
The paper proposes contextual social profile aware routing protocol that allows users to use social networking applications using social routing protocol.
Recommended citation: Aneja, N., Gambhir, S. Social Profile Aware AODV Protocol for Ad-Hoc Social Networks. Wireless Pers Commun 97, 4161–4182 (2017). https://doi.org/10.1007/s11277-017-4718-x https://link.springer.com/article/10.1007%2Fs11277-017-4718-x
Published in Wireless Personal Communications, 2017
The paper proposes Piecewise Maximal Similarity metric to match users profiles. The proposed metric is more effective to measure similarity than cosine similarity based on computations on real data.
Recommended citation: Gambhir, S., Aneja, N. and De Silva, L.C. Piecewise Maximal Similarity for Ad-hoc Social Networks. Wireless Pers Commun 97, 3519–3529 (2017). https://doi.org/10.1007/s11277-017-4683-4 https://link.springer.com/article/10.1007/s11277-017-4683-4
Published in IEEE, 2018
The white paper presents obstacles and challenges towards achieving universal Internet access.
Recommended citation: Prasad Mantri, Mohammed Aledhari, Helen Anne Hicks, Rajesh Nighot, Nagender Aneja, Sukanya Mandal, Ali Kashif Bashir, Jay Wack, Jared Bielby, "Options and Challenges in Providing Universal Access", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/OPTIONS-AND-CHALLENGES-IN-PROVIDING-UNIVERSAL-ACCESS-v180418.pdf
Published in Mobile Information Systems, 2018
The paper proposes a method to form a group of users based on their profile or interests using WiFi Direct.
Recommended citation: Aneja, N., & Gambhir, S. (2018). Profile-Based Ad Hoc Social Networking Using Wi-Fi Direct on the Top of Android. Mobile Information Systems, 2018. https://www.hindawi.com/journals/misy/2018/9469536/
Published in IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), 2018
This work proposes identifying IoT devices based on Inter-Arrival-Time of Packets and improves efficiency to identify a device by feeding 100 IATs in the form of a graph to CNN
Recommended citation: S. Aneja, N. Aneja and M. S. Islam (2018). " IoT Device Fingerprint using Deep Learning." IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), Bali, 2018, pp. 174-179, doi: 10.1109/IOTAIS.2018.8600824. https://ieeexplore.ieee.org/abstract/document/8600824
Published in Towards Causal, Explainable and Universal Medical Visual Diagnosis, CVPR Workshop, 2019
The proposed model trained with a semi-supervised learning approach by using pseudo labels on PCam-level significantly leads to better performances to strong CNN baseline on the AUC metric.
Recommended citation: Jaiswal, A. K., Panshin, I., Shulkin, D., Aneja, N., & Abramov, S. (2019). " Semi-Supervised Learning for Cancer Detection of Lymph Node Metastases." arXiv preprint arXiv:1906.09587. https://s1155026040.github.io/mvd-2019-cvpr-workshop/
Published in IEEE International Conference on Advances in Information Technology (ICAIT), 2019
This paper presents an analysis of pre-trained models to recognize handwritten Devanagari alphabets using transfer learning for Deep Convolution Neural Network (DCNN).
Recommended citation: N. Aneja and S. Aneja, "Transfer Learning using CNN for Handwritten Devanagari Character Recognition," 2019 1st International Conference on Advances in Information Technology (ICAIT), Chikmagalur, India, 2019, pp. 293-296, c. https://ieeexplore.ieee.org/document/8987286
Published in International Conference on Natural Language Processing (ICNLP 2020), 2020
A regional vocabulary-based application-oriented Neural Machine Translation (NMT) model is proposed over the data set of emails.
Recommended citation: Sandhya Aneja, Siti Nur Afikah Bte Abdul Mazid, Nagender Aneja, Neural Machine Translation model for University Email Application, International Conference on Natural Language Processing (ICNLP 2020), July 11-13, 2020, https://arxiv.org/abs/2007.16011 https://arxiv.org/abs/2007.16011
Published in 4th International Conference on Big Data and Internet of Things, BDIOT 2020, Singapore, 2020
TCP/IP packet header features to fingerprint a device for device identification based on its communication pattern.
Recommended citation: Chowdhury R., Aneja S., Aneja N., and Abas E. Network Traffic Analysis based IoT Device Identification. In Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things (BDIOT 2020). Association for Computing Machinery, New York, NY, USA, 79–89. DOI:https://doi.org/10.1145/3421537.3421545 https://dl.acm.org/doi/abs/10.1145/3421537.3421545
Published in Wireless Personal Communications, 2020
This paper presents survey and future directions in four areas of establishing ad-hoc social network using mobile ad-hoc social network (MANET) that includes architecture or implementation features, Profile Management of users, Similarity Metric, and Routing Protocols. The survey presents the need to provide social applications over MANET, optimizing profile matching algorithms of users, and context aware routing protocols.
Recommended citation: Aneja, N., Gambhir, S. Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07942-7 https://link.springer.com/article/10.1007/s11277-020-07942-7
Published in International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR), 2021
This paper provides algorithm to detect Fake News and in particular the paper proposes most important language features that can determine if the news content is fake or real.
Recommended citation: Aneja N., Aneja S. (2021) Detecting Fake News with Machine Learning. Conference Proceedings of ICDLAIR2019. ICDLAIR 2019. Lecture Notes in Networks and Systems, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-030-67187-7_7 https://link.springer.com/chapter/10.1007/978-3-030-67187-7_7
Published in Data in Brief, 2021
This paper presents network traffic traces data of D-Link IoT devices from packet and frame levels.
Recommended citation: Rajarshi Roy Chowdhury, Sandhya Aneja, Nagender Aneja, and Pg Emeroylariffion Abas (2021). " Packet-level and IEEE 802.11 MAC frame-level network traffic traces data of the D-Link IoT devices." Data in Brief, Volume 37, Aug 2021, 107208, ISSN 2352-3409, doi: 10.1109/IOTAIS.2018.8600824. https://www.sciencedirect.com/science/article/pii/S2352340921004923
Published in International Journal of Communication Networks and Distributed Systems, 2021
In this work, the idea is to define a device-specific unique fingerprint by analysing solely inter-arrival time of packets as a feature to identify a device.
Recommended citation: Sandhya Aneja, Nagender Aneja, Bharat K. Bhargava, Rajarshi Roy Chowdhury, "Device Fingerprinting using Deep Convolutional Neural Networks", International Journal of Communication Networks and Distributed Systems. https://doi.org/10.1504/IJCNDS.2022.10041894. https://doi.org/10.1504/IJCNDS.2022.10041894
Published in Recent Advances in Drug Delivery and Formulation, 2021
The main objective of the patent review is to survey and review patents from the past ten years that are related to the two particular areas of nanomedicines.
Recommended citation: Ali Hazis Umairah Nur, Aneja Nagender, Rajabalaya Rajan, David Rani Sheba, "Systematic Patent Review of Nanoparticles in Drug Delivery and Cancer Therapy in the Last Decade", Recent Advances in Drug Delivery and Formulation 2021; 15(1). https://doi.org/10.2174/1872211314666210521105534. https://www.eurekaselect.com/193475
Published in arXiv, 2021
In this paper, we present NL-Augmenter, a new participatory Python-based natural language augmentation framework which supports the creation of both transformations (modifications to the data) and filters (data splits according to specific features).
Recommended citation: Kaustubh D. Dhole, Varun Gangal, Sebastian Gehrmann, Aadesh Gupta, Zhenhao Li, Saad Mahamood, Abinaya Mahendiran, Simon Mille, Ashish Srivastava, Samson Tan, Tongshuang Wu, Jascha Sohl-Dickstein, Jinho D. Choi, Eduard Hovy, Ondrej Dusek, Sebastian Ruder, Sajant Anand, Nagender Aneja, Rabin Banjade, Lisa Barthe, Hanna Behnke, Ian Berlot-Attwell, Connor Boyle, Caroline Brun, Marco Antonio Sobrevilla Cabezudo, Samuel Cahyawijaya, Emile Chapuis, Wanxiang Che, Mukund Choudhary, Christian Clauss, Pierre Colombo, Filip Cornell, Gautier Dagan, Mayukh Das, Tanay Dixit, Thomas Dopierre, Paul-Alexis Dray, Suchitra Dubey, Tatiana Ekeinhor, Marco Di Giovanni, Rishabh Gupta, Rishabh Gupta, Louanes Hamla, Sang Han, Fabrice Harel-Canada, Antoine Honore, Ishan Jindal, Przemyslaw K. Joniak, Denis Kleyko, Venelin Kovatchev, Kalpesh Krishna, Ashutosh Kumar, Stefan Langer, Seungjae Ryan Lee, Corey James Levinson, Hualou Liang, Kaizhao Liang, Zhexiong Liu, Andrey Lukyanenko, Vukosi Marivate, Gerard de Melo, Simon Meoni, Maxime Meyer, Afnan Mir, Nafise Sadat Moosavi, Niklas Muennighoff, Timothy Sum Hon Mun, Kenton Murray, Marcin Namysl, Maria Obedkova, Priti Oli, Nivranshu Pasricha, Jan Pfister, Richard Plant, Vinay Prabhu, Vasile Pais, Libo Qin, Shahab Raji, Pawan Kumar Rajpoot, Vikas Raunak, Roy Rinberg, Nicolas Roberts, Juan Diego Rodriguez, Claude Roux, Vasconcellos P. H. S., Ananya B. Sai, Robin M. Schmidt, Thomas Scialom, Tshephisho Sefara, Saqib N. Shamsi, Xudong Shen, Haoyue Shi, Yiwen Shi, Anna Shvets, Nick Siegel, Damien Sileo, Jamie Simon, Chandan Singh, Roman Sitelew, Priyank Soni , Taylor Sorensen, William Soto, Aman Srivastava, KV Aditya Srivatsa, Tony Sun, Mukund Varma T, A Tabassum, Fiona Anting Tan, Ryan Teehan, Mo Tiwari, Marie Tolkiehn, Athena Wang, Zijian Wang, Gloria Wang, Zijie J. Wang, Fuxuan Wei, Bryan Wilie, Genta Indra Winata, Xinyi Wu, Witold Wydmański, Tianbao Xie, Usama Yaseen, M. Yee, Jing Zhang, Yue Zhang, "NL-Augmenter: A Framework for Task-Sensitive Natural Language Augmentation", https://arxiv.org/abs/2112.02721. https://arxiv.org/abs/2112.02721
Published in 14th International Conference on COMmunication Systems & NETworkS (COMSNETS 2022), 2021
The network traffic of IoT devices can be analyzed using AI techniques. The Adversary Learning (AdLIoTLog) model is proposed using Recurrent Neural Network (RNN) with attention mechanism on sequences of network events in the network traffic.
Recommended citation: Sandhya Aneja, Melanie Ang Xuan En, Nagender Aneja, "Collaborative adversary nodes learning on the logs of IoT devices in an IoT network", 14th International Conference on COMmunication Systems & NETworkS (COMSNETS 2022). https://arxiv.org/abs/2112.12546. https://arxiv.org/abs/2112.12546
Published:
This is a collection of some deep learning projects/papers.
Published:
This is the collection of posts on Machine Learning, Deep Learning, and Python Programming.
Published:
This is a list of Scopus indexed Journals of Computer Science.
Published:
This is list of FYP/Research students.
Published:
This is for future students who want to pursue research at School of Digital Science.
Published:
This post covers projects available for FYP/Research students. Students may also contact with their project proposals.
Published:
The webinar was conducted by IEEE Collaborate Group on the white paper related to protecting Internet Traffic.
Published:
The talk covered topics related to a talk on Prior Art Search, Patentability Criteria, and introduction to Patent Drafting.
Published:
A webinar on introduction to deep learning and practical implementation of neural network and convolutional neural network in MNIST dataset.
Published:
Keynote Speech at International Conference (Virtual) Recent Trends in Computing (ICRTC-2021), Compucom Institute of Information Technology & Management, Jaipur, India
Published:
This talk is for IEEE Delhi.
Bachelor of Science (Computer Science), Universiti Brunei Darussalam, Digital Science, 2021
Students will learn the latest technologies including Python in the field of Internet Programming.
Bachelor/Master's Degree, Universiti Brunei Darussalam, 2021
Students will learn the Introduction to Patents and Patents Search.
Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2021
Students will learn using digital technologies to create new or modify existing businesses.
Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2022
Students will learn the latest technologies including Tableau and Python in the field of data analytics.
Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2022
Students will learn the latest technologies including Tableau in the field of data analytics.
Short Term Course for visiting students of Singapore Management University, School of Digital Science, Universiti Brunei Darussalam, 2022
Students will learn to use digital technologies to create new or modify existing businesses in this short term course.