Abhishek Jain
YOU?
Author Swipe
View article: Laconic PSI on Authenticated Inputs and Applications
Laconic PSI on Authenticated Inputs and Applications Open
View article: Obfuscating Pseudorandom Functions is Post-quantum Complete
Obfuscating Pseudorandom Functions is Post-quantum Complete Open
View article: SAT-550 A Hidden Culprit: Insulinoma Masquerading as GLP-1 Agonist-Induced Hypoglycemia
SAT-550 A Hidden Culprit: Insulinoma Masquerading as GLP-1 Agonist-Induced Hypoglycemia Open
Disclosure: A.K. Jain: None. T. Amin: None. K. Chalasani: None. S.W. Holland: None. Introduction: Hypoglycemia in non-diabetic individuals is a diagnostic challenge that needs thorough evaluation to distinguish between endogenous and exoge…
View article: Adversarial Robustness in Deep Neural Networks: Techniques and Challenges for Secure AI Systems
Adversarial Robustness in Deep Neural Networks: Techniques and Challenges for Secure AI Systems Open
Secure AI systems face substantial hurdles due of Deep Neural Networks' (DNNs) sensitivity to adversarial assaults, notwithstanding DNNs' impressive accomplishment in multiple fields. Essential applications including autonomous driving, he…
View article: <p>Cybersecurity Risks In 5G Networks: Strategies for Safeguarding Next-Generation Communication Systems</p>
Cybersecurity Risks In 5G Networks: Strategies for Safeguarding Next-Generation Communication Systems Open
View article: Multi-Key Homomorphic Secret Sharing
Multi-Key Homomorphic Secret Sharing Open
View article: Cloud Service Broker Using Ontology-Based System
Cloud Service Broker Using Ontology-Based System Open
Cloud computing offers more advantages to clients and associations regarding capital uses and working cost investment funds. This study gives an ontological model of the cloud fabricating space to help with the data trade between the cloud…
View article: Scalable Multiparty Garbling
Scalable Multiparty Garbling Open
Multiparty garbling is the most popular approach for constant-round secure multiparty computation (MPC). Despite being the focus of significant research effort, instantiating prior approaches to multiparty garbling results in constant-roun…
View article: Entropy Maximization in Sparse Matrix by Vector Multiplication ($\max_E SpMV$)
Entropy Maximization in Sparse Matrix by Vector Multiplication ($\max_E SpMV$) Open
The peak performance of any SpMV depends primarily on the available memory bandwidth and its effective use. GPUs, ASICs, and new FPGAs have higher and higher bandwidth; however, for large scale and highly sparse matrices, SpMV is still a h…
View article: Time-Deniable Signatures
Time-Deniable Signatures Open
In this work we propose time-deniable signatures (TDS), a new primitive that facilitates deniable authentication in protocols such as DKIM-signed email. As with traditional signatures, TDS provide strong authenticity for message content, a…
View article: A Note on Non-interactive Zero-Knowledge from CDH
A Note on Non-interactive Zero-Knowledge from CDH Open
View article: Safe Spaces: Mitigating Potential Aggression in Acute Care Psychiatry
Safe Spaces: Mitigating Potential Aggression in Acute Care Psychiatry Open
Awareness of potential aggression and violence is crucial when treating patients experiencing mental health crises in psychiatric emergency and inpatient settings. To provide a practical overview for health care workers in acute care psych…
View article: Preserving Manusripts and Heirlooms through Digitization
Preserving Manusripts and Heirlooms through Digitization Open
Library is the indispensable part of educational institution designed to serve educational, cultural, research, recreational information to the users. . Libraries are the places wherever the complete information gathering takes place toget…
View article: Drug Discovery Using Machine Learning and Data Analysis
Drug Discovery Using Machine Learning and Data Analysis Open
An objective of drug discovery is to identify novel substances with certain chemical properties for the treatment of diseases. A significant amount of biological data has been produced recently from a variety of sources. Using this data, m…
View article: Succinct Zero Knowledge for Floating Point Computations
Succinct Zero Knowledge for Floating Point Computations Open
We study the problem of constructing succinct zero knowledge proof systems for floating point computations. The standard approach to handle floating point computations requires conversion to binary circuits, following the IEEE-754 floating…
View article: Self-Processing Private Sensor Data via Garbled Encryption
Self-Processing Private Sensor Data via Garbled Encryption Open
We introduce garbled encryption , a relaxation of secret-key multi-input functional encryption (MiFE) where a function key can be used to jointly compute upon only a particular subset of all possible tuples of ciphertexts. We construct gar…
View article: Trust based Intrusion Detection System Architecture for WSN
Trust based Intrusion Detection System Architecture for WSN Open
Today there are extraordinary attacks on all kind of networks. Security for Payload is considered one of the biggest agenda for all kind of organizations. To deal with new species if attacks like threat, which are blended in nature, no sec…
View article: Malicious Detection using Secure Mutual Trust Based Routing on an Intrusion Detection System in WSN
Malicious Detection using Secure Mutual Trust Based Routing on an Intrusion Detection System in WSN Open
The Lack of infrastructure makes secured data distribution, challenging task in Wireless Sensor Networks (WSNs). In traditional routing methods, either security or routing optimization is addressed separately; however, both are not address…
View article: A Novel Hybrid KH-PSO Algorithm for Ransomware Attack Identification in Intrusion Detection System
A Novel Hybrid KH-PSO Algorithm for Ransomware Attack Identification in Intrusion Detection System Open
View article: The Astropy Project: Building an Open-science Project and Status of the v2.0 Core Package<sup>*</sup>
The Astropy Project: Building an Open-science Project and Status of the v2.0 Core Package<sup>*</sup> Open
The Astropy Project supports and fosters the development of open-source and openly developed Python packages that provide commonly needed functionality to the astronomical community. A key element of the Astropy Project is the core package…
View article: The Astropy Project: Building an inclusive, open-science project and status of the v2.0 software
The Astropy Project: Building an inclusive, open-science project and status of the v2.0 software Open
The Astropy project supports and fosters the development of open-source and openly-developed Python packages that provide commonly-needed functionality to the astronomical community. A key element of the Astropy project is the core package…
View article: The Bottleneck Complexity of Secure Multiparty Computation
The Bottleneck Complexity of Secure Multiparty Computation Open
In this work, we initiate the study of bottleneck complexity as a new communication efficiency measure for secure multiparty computation (MPC). Roughly, the bottleneck complexity of an MPC protocol is defined as the maximum communication c…
View article: Fairness in an Unfair World
Fairness in an Unfair World Open
Secure multiparty computation allows mutually distrusting parties to compute a function on their private inputs such that nothing but the function output is revealed. Achieving fairness --- that all parties learn the output or no one does …
View article: Trends in IVC filter placement and retrieval at a single academic institution
Trends in IVC filter placement and retrieval at a single academic institution Open
View article: Efficient Authentication from Hard Learning Problems
Efficient Authentication from Hard Learning Problems Open
View article: Study Of Icons In Enterprise Application Software Context
Study Of Icons In Enterprise Application Software Context Open
Icons are not merely decorative elements in enterprise applications but very often used because of their many advantages such as compactness, visual appeal, etc. Despite these potential advantages, icons often cause usability problems when…
View article: Secure Multiparty Computation with General Interaction Patterns
Secure Multiparty Computation with General Interaction Patterns Open
We present a unified framework for studying secure multiparty computation (MPC) with arbitrarily restricted interaction patterns such as a chain, a star, a directed tree, or a directed graph. Our study generalizes both standard MPC and rec…
View article: Time-Lock Puzzles from Randomized Encodings
Time-Lock Puzzles from Randomized Encodings Open
Time-lock puzzles are a mechanism for sending messages "to the future". A sender can quickly generate a puzzle with a solution s that remains hidden until a moderately large amount of time t has elapsed. The solution s should be hidden fro…
View article: System Programming Drawbacks
System Programming Drawbacks Open
A system programming language usually refers to a programming language used for system programming; such languages are designed for writing system software, which usually requires different development approaches when compared to applicati…
View article: Greedy Algorithm
Greedy Algorithm Open
This paper describes the basic technological aspects of algorithm, algorithmic efficiency and Greedy algorithm. Algorithmic efficiency is the property of an algorithm which relate to the amount of resources use by the algorithm in computer…