17 results on '"Samrat Mondal"'
Search Results
2. Towards achieving efficient access control of medical data with both forward and backward secrecy
- Author
-
Suryakanta Panda, Samrat Mondal, Rinku Dewri, and Ashok Kumar Das
- Subjects
Computer Networks and Communications - Published
- 2022
- Full Text
- View/download PDF
3. Unsupervised sub-domain adaptation using optimal transport
- Author
-
Obsa Gilo, Jimson Mathew, Samrat Mondal, and Rakesh Kumar Sanodiya
- Subjects
Signal Processing ,Media Technology ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering - Published
- 2023
- Full Text
- View/download PDF
4. Subdomain Adaptation Via Correlation Alignment with Entropy Minimization for Unsupervised Domain Adaptation
- Author
-
Obsa Gilo Wakuma, Jimson Mathew, Samrat Mondal, and Rakesh Kumar Sanodiya
- Published
- 2022
- Full Text
- View/download PDF
5. Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services
- Author
-
Nilesh Chakraborty, Samrat Mondal, and Vijay S. Anand
- Subjects
Authentication ,General Computer Science ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Login ,Computer security ,computer.software_genre ,Threat model ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Side channel attack ,Session (computer science) ,Law ,computer - Abstract
Side channel attacks, based on the human behavior, have not received much attention in the domain of recording attack resilient unaided authentication services (RARUAS) that purely rely on human visual perception but not on hidden auxiliary channels. In this paper, for the first time, we have made an extensive analysis to show - how human behavior during the login can weaken the claimed security standard of RARUAS. We identify this threat as behavioral side channel attack. To make situation more alarming, our investigation revealed that the identified threat model is capable of reducing the claimed session resiliency of any RARUAS by a significant extent. For dealing with this threat model, the latter part of our proposal introduces a novel defense strategy that reduces attackers’ efficiency and improves the session resiliency. The subsequent study indicates that by nature of its design, the proposed defense strategy does not make any significant impact on the usability standard. To validate our claims, we have made a thorough experimental study to show that the proposed defense strategy is truly deployable in practice for improving the situation against the behavioral side channel attack.
- Published
- 2019
- Full Text
- View/download PDF
6. A divide-and-conquer based efficient non-dominated sorting approach
- Author
-
Samrat Mondal, Sriparna Saha, Carlos A. Coello Coello, and Sumit Mishra
- Subjects
Divide and conquer algorithms ,Optimization problem ,Theoretical computer science ,General Computer Science ,Computational complexity theory ,Computer science ,General Mathematics ,05 social sciences ,Evolutionary algorithm ,Sorting ,Pareto principle ,050301 education ,02 engineering and technology ,0202 electrical engineering, electronic engineering, information engineering ,Parallelism (grammar) ,020201 artificial intelligence & image processing ,0503 education ,Time complexity - Abstract
In general, evolutionary algorithms are very prevalent in solving multi-objective optimization problems. Pareto-based multi-objective evolutionary algorithms are popularly used in solving different multi-objective optimization problems. These algorithms work using several steps, non-dominated sorting being the most salient one. However, this non-dominated sorting step is associated with a high computational complexity. In the past, different approaches have been proposed for non-dominated sorting. In this paper, to address the problem of non-dominated sorting, a framework called DCNS (Divide-and-conquer based non-dominated sorting) is developed. Based on this DCNS framework, four different approaches are proposed. The best case time complexity of our proposed DCNS framework is proved to be O ( N log N + M N ) for M ≥ 2 where N is the number of solutions and M is the number of objectives. This best case time complexity is better than the best case time complexities of various other approaches. The number of dominance comparisons performed by the proposed framework is lower than those from other state-of-the-art approaches in different scenarios. The proposed framework has the parallelism property and the scope of parallelism is also discussed.
- Published
- 2019
- Full Text
- View/download PDF
7. Dispersion Ratio based Decision Tree Model for Classification
- Author
-
Asif Ekbal, Samrat Mondal, Maunendra Sankar Desarkar, and Smita Roy
- Subjects
0209 industrial biotechnology ,Discretization ,Computer science ,General Engineering ,Decision tree ,02 engineering and technology ,computer.software_genre ,Correlation ratio ,Class (biology) ,Computer Science Applications ,020901 industrial engineering & automation ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,Information gain ratio ,020201 artificial intelligence & image processing ,Statistical dispersion ,Data mining ,computer ,Decision tree model - Abstract
In predictive tasks like classification, Information Gain (IG) based Decision Tree is very popularly used. However, IG method has some inherent problems like its preference towards choosing attributes with higher number of distinct values as the splitting attribute in case of nominal attributes and another problem is associated with imbalanced datasets. Most of the real-world datasets have many nominal attributes, and those nominal attributes may have many number of distinct values. In this paper, we have tried to point out these characteristics of the datasets while discussing the performance of our proposed approach. Our approach is a variant of the traditional Decision Tree model and uses a new technique called Dispersion_Ratio, a modification of existing Correlation Ratio (CR) method. The whole approach is divided into two phases - firstly, the dataset is discretised using a discretization module and secondly, the preprocessed dataset is used to build a Dispersion Ratio based Decision Tree model. The proposed method does not prefer the attributes with many unique values and indifferent about class distribution. It performs better than previously proposed CR based Decision Tree (CRDT) Model since an efficient discretization module has been added with it. We have evaluated the performance of our approach on some benchmark datasets from various domains to demonstrate the effectiveness of the proposed technique and also compared our model with Information Gain, Gain Ratio and Gini Index based models. Result shows that the proposed model outperforms other models in majority of the cases that we have considered in our experiment.
- Published
- 2019
- Full Text
- View/download PDF
8. SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0
- Author
-
Suryakanta Panda, Samrat Mondal, and Neeraj Kumar
- Subjects
General Computer Science ,Control and Systems Engineering ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
9. GBOS: Generalized Best Order Sort algorithm for non-dominated sorting
- Author
-
Carlos A. Coello Coello, Samrat Mondal, Sumit Mishra, and Sriparna Saha
- Subjects
021103 operations research ,Sorting algorithm ,Current (mathematics) ,General Computer Science ,Computational complexity theory ,Spacetime ,Computer science ,General Mathematics ,0211 other engineering and technologies ,Sorting ,Evolutionary algorithm ,02 engineering and technology ,Order (exchange) ,0202 electrical engineering, electronic engineering, information engineering ,sort ,020201 artificial intelligence & image processing ,Algorithm - Abstract
Non-dominated sorting is one of the prominent steps in developing any Pareto-dominance based multi-objective evolutionary algorithm. The computational complexity of any Pareto-dominance based multi-objective evolutionary algorithm primarily depends on this step. Thus, researchers are working on reducing the complexity of this step. Recently, an efficient approach for non-dominated sorting known as Best Order Sort (BOS) has been proposed. This approach is very efficient in terms of the number of comparisons between the solutions. Another advantage of this approach is that while comparing two solutions, the number of objectives which are compared is reduced from the actual number of objectives associated with each solution. However, in spite of these two advantages, this approach is not suitable in its current form for cases in which we have duplicate solutions. This paper generalizes BOS to handle duplicate solutions while retaining both of its advantages. We call this generalized version Generalized Best Order Sort (GBOS). The present work shows that BOS can be generalized to handle its limitation without compromising its time and space complexity.
- Published
- 2018
- Full Text
- View/download PDF
10. On designing a modified-UI based honeyword generation approach for overcoming the existing limitations
- Author
-
Nilesh Chakraborty and Samrat Mondal
- Subjects
Password ,021110 strategic, defence & security studies ,Authentication ,General Computer Science ,Computer science ,0211 other engineering and technologies ,Password cracking ,02 engineering and technology ,Computer security ,computer.software_genre ,One-time password ,Password strength ,Computer engineering ,Authentication protocol ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Challenge–response authentication ,Law ,computer - Abstract
Inverting hashed passwords by performing brute force computation is one of the latest security threats on password based authentication technique. New technologies are being developed for reducing complexity of brute force computation and these increase the success rate of inversion attack. Honeyword base authentication protocol can successfully mitigate this threat by making password cracking detectable. However, existing honeyword based methods have several limitations likeMultiple System Vulnerability, Weak DoS Resistivity, Storage Overhead, etc. In this paper, we have proposed a new modified-UI based honeyword generation approach, identified as Paired Distance Protocol (PDP), which overcomes most of the drawbacks of previously proposed honeyword generation approaches. The comprehensive analysis shows that PDP not only attains a high detection rate of 97.23%, but also reduces the storage overhead to a great extent.
- Published
- 2017
- Full Text
- View/download PDF
11. Intelligent charge scheduling and eco-routing mechanism for electric vehicles: A multi-objective heuristic approach
- Author
-
Samrat Mondal, Nilotpal Chakraborty, and Arijit Mondal
- Subjects
Mathematical optimization ,Optimization problem ,business.product_category ,Renewable Energy, Sustainability and the Environment ,Heuristic (computer science) ,Computer science ,Geography, Planning and Development ,0211 other engineering and technologies ,Scheduling (production processes) ,Transportation ,02 engineering and technology ,Energy consumption ,010501 environmental sciences ,01 natural sciences ,Path (graph theory) ,Electric vehicle ,Graph (abstract data type) ,021108 energy ,Routing (electronic design automation) ,business ,0105 earth and related environmental sciences ,Civil and Structural Engineering - Abstract
Due to the rising pollution and greenhouse gas emissions resulting from fossil fuel-based transportation systems, researchers and policymakers are pushing for Electric Vehicle (EV) that is envisaged as an efficient, eco-friendly alternative. However, due to their limited range and battery capacity, EVs need frequent charging, which is time-consuming and available at specific locations. Therefore, proper charge scheduling and route management of EVs is essential and significant. This paper addresses this problem by proposing an intelligent heuristic mechanism that ensures that the EVs are always routed through a path that minimizes the energy consumption and the total time to travel. We formulate it as a multi-objective optimization problem considering real-world specifications and constraints and propose a graph-based multi-objective heuristic algorithm (MoHA) to obtain the desired solutions quickly. Further, multiple variants of the proposed algorithm are proposed, and comparative analysis is performed on practical datasets. The proposed algorithm is evaluated based on some of the well-known performance metrics for multi-objective approaches. The results obtained show that the energy-aware-MoHA variant produced 32.39% better results in minimizing energy consumption, and time-aware-MoHA performed better in optimizing average time requirements by 24.32%. Moreover, the initial ordering of the EVs has significant importance on the proposed algorithm's overall performance.
- Published
- 2021
- Full Text
- View/download PDF
12. A multiobjective optimization based entity matching technique for bibliographic databases
- Author
-
Samrat Mondal, Sumit Mishra, and Sriparna Saha
- Subjects
Information retrieval ,Database ,Computer science ,Feature vector ,General Engineering ,02 engineering and technology ,computer.software_genre ,Multi-objective optimization ,Distance measures ,Computer Science Applications ,Bibliographic database ,Artificial Intelligence ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,computer ,Classifier (UML) - Abstract
Multiobjective based solution framework for entity matching.Bibliographic database is used.Automatic determination of number of clusters and partitions.New encoding strategy, new mutation operators are explored.Several distance measures and cluster validity indices are used. With the increasing use of on-line resources, the size of the bibliographic database is growing day by day. The available huge amount of data belong to various entities. It is difficult to automatically identify the records which belong to a particular entity. Mapping the records to the corresponding entity is termed as the entity matching problem. In bibliographic database many attributes change over time. For example - affiliation of an author changes frequently. Many authors generally use different email-ids. The names of co-authors also change with time. All these aspects have made the entity matching problem challenging. Generally an entity matching task is carried out by constructing a feature vector to represent a record, then a classifier is trained to classify each feature vector. But for bibliographic database it is very difficult and time consuming to generate some manually annotated labeled data to train a classifier. Inspired by this observation, we have proposed an unsupervised approach for entity matching problem using non-dominated sorting genetic algorithm-II (NSGA-II). A new encoding strategy is used to encode the clusters in the form of a chromosome. New mutation and crossover operators are proposed which are suitable for bibliographic data clustering. Different distance measures are used to measure the dissimilarities between records. Finally, solutions are evolved using the search capability of NSGA-II. Experimental evaluations are carried out with 247 different combinations of eight objective functions for eight different bibliographic datasets. A comparative analysis with two existing systems - DBLP and ArnetMiner, shows that the proposed technique can produce better results in many cases.
- Published
- 2016
- Full Text
- View/download PDF
13. Efficient Load Control Based Demand Side Management Schemes Towards a Smart Energy Grid System
- Author
-
Samrat Mondal, Arijit Mondal, and Nilotpal Chakraborty
- Subjects
Mathematical optimization ,Schedule ,energy management ,Computer science ,Heuristic (computer science) ,Energy management ,Geography, Planning and Development ,0211 other engineering and technologies ,Transportation ,02 engineering and technology ,Demand side management ,010501 environmental sciences ,01 natural sciences ,Scheduling (computing) ,Reduction (complexity) ,heuristic algorithm ,Overhead (computing) ,scheduling ,021108 energy ,Direct load control ,smart grid ,0105 earth and related environmental sciences ,Civil and Structural Engineering ,Renewable Energy, Sustainability and the Environment ,Smart grid ,Benchmark (computing) - Abstract
In this paper, we propose efficient load scheduling based demand side management schemes for the objective of peak load reduction. We propose two heuristic algorithms, named G-MinPeak and LevelMatch, which are based on the generalized two-dimensional strip packing problem, where each of the appliances has their specific timing requirements to be fulfilled. Furthermore, we have proposed some improvement schemes that try to modify the resulted schedule from the proposed heuristic algorithms to reduce the peak. All the proposed algorithms and improvement schemes are experimented using benchmark data sets for performance evaluation. Extensive simulation studies have been conducted using practical data to evaluate the performance of the algorithms in real life. The results obtained show that all the proposed methodologies are thoroughly effective in reducing peak load, resulting in smoother load profiles. Specifically, for the benchmark datasets, the deviation from the optimal values has been about 6% and 7% for LevelMatch and G-MinPeak algorithms respectively and by using the improvement schemes the deviations are further reduced up to 3% in many cases. For the practical datasets, the proposed improvement schemes reduce the peak by 5.21− 7.35 % on top of the peaks obtained by the two proposed heuristic algorithms without much computation overhead.
- Published
- 2020
- Full Text
- View/download PDF
14. MobSecure: A Shoulder Surfing Safe Login Approach Implemented on Mobile Device
- Author
-
Kuntal Das, Samrat Mondal, Gurpinder Singh Randhawa, and Nilesh Chakraborty
- Subjects
Computer science ,Mobile device ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,One-time password ,S/KEY ,Password ,Shoulder surfing ,0202 electrical engineering, electronic engineering, information engineering ,0101 mathematics ,General Environmental Science ,Password policy ,Authentication ,010102 general mathematics ,020206 networking & telecommunications ,Usability ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Shoulder surfing attack ,Security ,Key (cryptography) ,General Earth and Planetary Sciences ,Challenge–response authentication ,computer - Abstract
Shoulder surfing attack is a great threat on password based authentication technique. As today's world has seen a rapid growth of mobile users thus, latest methodologies which are developed to address this attack preferably should support mobile users. In this paper we have proposed a new shoulder surfing resilient technique, MobSecure, which is designed to be used in smartphone and acts in a partially observable environment (where an auxiliary device is required for authentication). Additionally the proposed method is also capable of avoiding recording based attack for infinite number of authentication sessions. Allowing alphanumeric characters as password is one of the key properties of the proposed scheme here. Finally, we show that MobSecure attains highest security standard with moderate usability scores compared to existing partially observable approaches.
- Published
- 2016
- Full Text
- View/download PDF
15. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches
- Author
-
Nilesh Chakraborty and Samrat Mondal
- Subjects
Honeyword ,Storage Cost ,Zero-knowledge password proof ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,Computer security ,computer.software_genre ,One-time password ,Password strength ,S/KEY ,Password ,Attack model ,Syskey ,General Environmental Science ,021110 strategic, defence & security studies ,Authentication ,Plaintext ,Adversary ,Inversion Attack ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Rainbow table ,Security ,General Earth and Planetary Sciences ,Challenge–response authentication ,computer - Abstract
Password based authentication shows its vulnerability against inversion attack model in which adversary obtains plaintext password from its corresponding hashed value. To cope up with such attack, honeyword based authentication technique is introduced. In this technique, along with the original password of user, some dummy passwords or honeywords are also stored. Although this technique is good enough to address the aforementioned security breach, but use of additional storage to store the honeywords is still an overhead associated with such approach. In this paper, we have proposed few directions to minimize the storage cost of some of the existing honeyword generation approaches. We have even found that in some cases no additional storage overhead is required. A comparative analysis at the end also shows that the proposed techniques are able to raise some of the security features compared to existing honeyword generation approaches.
- Published
- 2016
- Full Text
- View/download PDF
16. Divide-and-conquer based non-dominated sorting with Reduced Comparisons
- Author
-
Sumit Mishra, Carlos A. Coello Coello, Sriparna Saha, and Samrat Mondal
- Subjects
Divide and conquer algorithms ,Optimization problem ,Theoretical computer science ,General Computer Science ,Computer science ,General Mathematics ,05 social sciences ,Sorting ,050301 education ,02 engineering and technology ,Dominance (economics) ,Research community ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,020201 artificial intelligence & image processing ,0503 education - Abstract
Non-dominated sorting has attracted a lot of attention of the research community due to its use in solving multi- and many-objective optimization problems. In recent years, several approaches for non-dominated sorting have been proposed. In this paper, we have developed a non-dominated sorting framework, namely DCNSRC (Divide-and-Conquer based Non-dominated Sorting with Reduced Comparisons). Based on this framework, two approaches have been proposed by varying the search technique. These approaches perform a lower number of dominance comparisons than various other approaches. The duplicate solutions are also handled efficiently. These approaches save various comparisons while comparing the two solutions. The proposed approaches are validated using some theoretical analyses. The number of dominance comparisons performed by the proposed framework are theoretically analyzed in three different scenarios, both in the worst and the best cases. Experimental results on synthetic datasets and the benchmark problems show the superiority of the proposed approach over state-of-the-art algorithms.
- Published
- 2019
- Full Text
- View/download PDF
17. Security analysis of GTRBAC and its variants using model checking
- Author
-
Shamik Sural, Vijayalakshmi Atluri, and Samrat Mondal
- Subjects
Model checking ,Security analysis ,Computation tree logic ,General Computer Science ,Database ,business.industry ,Computer science ,Distributed computing ,Liveness ,Access control ,computer.software_genre ,Safety property ,Transition system ,Role-based access control ,business ,Law ,computer ,Formal verification - Abstract
Security analysis is a formal verification technique to ascertain certain desirable guarantees on the access control policy specification. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. Such an analysis calls for the use of formal verification techniques. While formal analysis on traditional Role Based Access Control (RBAC) has been done to some extent, recent extensions to RBAC lack such an analysis. In this paper, we consider the temporal RBAC extensions and propose a formal technique using timed automata to perform security analysis by analyzing both safety and liveness properties. Using safety properties one ensures that something bad never happens while liveness properties show that some good state is also achieved. GTRBAC is a well accepted generalized temporal RBAC model which can handle a wide range of temporal constraints while specifying different access control policies. Analysis of such a model involves a process of mapping a GTRBAC based system into a state transition system. Different reduction rules are proposed to simplify the modeling process depending upon the constraints supported by the system. The effect of different constraints on the modeling process is also studied.
- Published
- 2011
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.