Manish Shukla
YOU?
Author Swipe
View article: Adaptive Monitoring and Real-World Evaluation of Agentic AI Systems
Adaptive Monitoring and Real-World Evaluation of Agentic AI Systems Open
Agentic artificial intelligence (AI) — multi-agent systems that combine large language models with external tools and autonomous planning — are rapidly transitioning from research laboratories into high-stakes domains. Our earlier “Basic” …
View article: Evaluating Agentic AI Systems: A Balanced Framework for Performance, Robustness, Safety and Beyond
Evaluating Agentic AI Systems: A Balanced Framework for Performance, Robustness, Safety and Beyond Open
Agentic artificial intelligence (AI)—multi-agent systems that combine large language models with external tools and autonomous planning—are rapidly transitioning from research labs into high-stakes domains. Existing evaluations emphasise n…
View article: Adaptive Multi-Agent Role Reassignment over Model Context Protocol for Resilient AI Orchestration
Adaptive Multi-Agent Role Reassignment over Model Context Protocol for Resilient AI Orchestration Open
Multi-agent systems powered by large language models (LLMs) can automate complex workflows by dividing tasks among specialised roles such as research, critique and summarisation. Existing orchestration frameworks typically assign these rol…
View article: Toward Scalable Human-in-the-Loop Annotation Error Detection with Label Noise-Aware Training
Toward Scalable Human-in-the-Loop Annotation Error Detection with Label Noise-Aware Training Open
View article: Adaptive Multi-Agent Role Reassignment over Model Context Protocol for Resilient AI Orchestration
Adaptive Multi-Agent Role Reassignment over Model Context Protocol for Resilient AI Orchestration Open
View article: Evaluating Agentic AI Systems: A Balanced Framework for Performance, Robustness, Safety and Beyond
Evaluating Agentic AI Systems: A Balanced Framework for Performance, Robustness, Safety and Beyond Open
View article: Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks
Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks Open
View article: Poster: Context-Based Effective Password Detection in Plaintext
Poster: Context-Based Effective Password Detection in Plaintext Open
View article: Okanin alleviates symptoms of nociceptive-like responses in diabetic peripheral neuropathy in type 1 diabetic Wistar rats by regulating the AGEs/NF-κB/Nrf-2 pathway
Okanin alleviates symptoms of nociceptive-like responses in diabetic peripheral neuropathy in type 1 diabetic Wistar rats by regulating the AGEs/NF-κB/Nrf-2 pathway Open
Elevated reactive species and AGEs contribute to deregulation of transcription factors e.g., NF-κB and Nrf2 in diabetic peripheral neuropathy (DPN). Okanin, a bioactive chalcone, is active against redox imbalance, immune response, and pro-…
View article: Correlations in Quantum Network Topologies Created with Cloning
Correlations in Quantum Network Topologies Created with Cloning Open
With progress in quantum technologies, the field of quantum networks has emerged as an important area of research. In the last few years, there has been substantial progress in understanding the correlations present in quantum networks. In…
View article: Influence Based Defense Against Data Poisoning Attacks in Online Learning
Influence Based Defense Against Data Poisoning Attacks in Online Learning Open
Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. There are several known defensive mechanisms for handling offline attack…
View article: Gradient-based Data Subversion Attack Against Binary Classifiers
Gradient-based Data Subversion Attack Against Binary Classifiers Open
Machine learning based data-driven technologies have shown impressive performances in a variety of application domains. Most enterprises use data from multiple sources to provide quality applications. The reliability of the external data s…
View article: Influence Based Defense Against Data Poisoning Attacks in Online Learning
Influence Based Defense Against Data Poisoning Attacks in Online Learning Open
Data poisoning is a type of adversarial attack on training data where an attacker manipulates a fraction of data to degrade the performance of machine learning model. Therefore, applications that rely on external data-sources for training …
View article: Three Party Quantum Networks Created by Quantum Cloning
Three Party Quantum Networks Created by Quantum Cloning Open
With progress in quantum technologies, the field of quantum networks has emerged as an important area of research. In the last few years, there has been substantial progress in understanding the correlations present in quantum networks. In…
View article: Correction to: Quantifying the circularity of regional industrial waste across multi-channel enterprises
Correction to: Quantifying the circularity of regional industrial waste across multi-channel enterprises Open
View article: A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications
A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications Open
Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumberso…
View article: Privacy Guidelines for Contact Tracing Applications
Privacy Guidelines for Contact Tracing Applications Open
Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error…
View article: The impact of the Internet of Things (IoT) on servitization: an exploration of changing supply relationships
The impact of the Internet of Things (IoT) on servitization: an exploration of changing supply relationships Open
This research paper explores the emerging potential of IoT technology as an enabler for manufacturers seeking to exploit opportunities for new production, business and operating models. Following an analysis of extant literature and explor…
View article: A framework for understanding institutional factors affecting the success and failure of offshoring models in India
A framework for understanding institutional factors affecting the success and failure of offshoring models in India Open
The objective of this paper is to identify and analyse the factors that influence offshore location decisions from an institutional theory perspective. In the years, emerging economies have shown great growth potential and have attracted s…
View article: Quantifying the circularity of regional industrial waste across multi-channel enterprises
Quantifying the circularity of regional industrial waste across multi-channel enterprises Open
Circular economy is a theoretical concept that is widely discussed in recent literature as a way to achieve increased sustainability. However, published literature focuses on how to increase circularity without analysing the status quo of …
View article: Understanding the role of Tier-I suppliers in enabling sustainable practices across multi-tier supply chains
Understanding the role of Tier-I suppliers in enabling sustainable practices across multi-tier supply chains Open
This study aims to identify the conditions in which Tier-I suppliers will implement lead firms’ sustainability requirements across multi-tier supply chains. It aims to build on existing literature by examining the role of Tier-I supplier f…
View article: Application of additive manufacturing for mass customisation: understanding the interaction of critical barriers
Application of additive manufacturing for mass customisation: understanding the interaction of critical barriers Open
Additive Manufacturing (AM) technology presents a very optimistic case for its application for mass customisation. Even though theoretically suitable, practically several critical barriers inhibit its implementation. Thus, this paper attem…
View article: Next generation smart sustainable auditing systems using Big Data Analytics: Understanding the interaction of critical barriers
Next generation smart sustainable auditing systems using Big Data Analytics: Understanding the interaction of critical barriers Open
In the current scenario, sustainable auditing, for example roundtable of sustainable palm oil (RSPO), requires a huge amount of data to be manually collected and entered into paper forms by farmers. Such systems are inherently inefficient,…
View article: Dual Market Facility Network Design under Bounded Rationality
Dual Market Facility Network Design under Bounded Rationality Open
A number of markets, geographically separated, with different demand characteristics for different products that share a common component, are analyzed. This common component can either be manufactured locally in each of the markets or tra…
View article: Broadcasting quantum coherence via cloning
Broadcasting quantum coherence via cloning Open
Quantum coherence (QCh) is considered to be a key ingredient in quantum resource theories and also plays a pivotal role in the design and implementation of various information processing tasks. Consequently, it becomes important for us to …
View article: Big-data analytics framework for incorporating smallholders in sustainable palm oil production
Big-data analytics framework for incorporating smallholders in sustainable palm oil production Open
This paper aims to address the constraints faced in incorporating smallholders in sustainable palm oil production. There exists literature that acknowledges the need for incorporating smallholders in the production of sustainable palm oil …
View article: State Dependent and Independent cloner: Cloning and Broadcasting
State Dependent and Independent cloner: Cloning and Broadcasting Open
In this work, we extensively study the problem of broadcasting of entanglement. In the first part of the work, we reconceptualize the idea of state dependent quantum cloning machine, and in that process we introduce different types of stat…