Alert button
Picture for Rajesh Kumar

Rajesh Kumar

Alert button

Dublin Business School, Dublin, Ireland

Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification

Dec 02, 2023
An Ngo, MinhPhuong Cao, Rajesh Kumar

Viaarxiv icon

Dictionary Attack on IMU-based Gait Authentication

Sep 21, 2023
Rajesh Kumar, Can Isik, Chilukuri K. Mohan

Viaarxiv icon

Synthesizing Human Gaze Feedback for Improved NLP Performance

Feb 11, 2023
Varun Khurana, Yaman Kumar Singla, Nora Hollenstein, Rajesh Kumar, Balaji Krishnamurthy

Figure 1 for Synthesizing Human Gaze Feedback for Improved NLP Performance
Figure 2 for Synthesizing Human Gaze Feedback for Improved NLP Performance
Figure 3 for Synthesizing Human Gaze Feedback for Improved NLP Performance
Figure 4 for Synthesizing Human Gaze Feedback for Improved NLP Performance
Viaarxiv icon

GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

Oct 02, 2022
Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Figure 1 for GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Figure 2 for GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Figure 3 for GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Figure 4 for GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System
Viaarxiv icon

iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

Oct 02, 2022
Jun Hyung Mo, Rajesh Kumar

Figure 1 for iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Figure 2 for iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Figure 3 for iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Figure 4 for iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems
Viaarxiv icon

Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots

Mar 29, 2022
Pranay Mathur, Rajesh Kumar, Sarthak Upadhyay

Figure 1 for Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots
Figure 2 for Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots
Figure 3 for Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots
Figure 4 for Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots
Viaarxiv icon

Estimation and Prediction of Deterministic Human Intent Signal to augment Haptic Glove aided Control of Robotic Hand

Oct 15, 2021
Rajesh Kumar, Pimmy Gandotra, Brejesh Lall, Arzad A. Kherani, Sudipto Mukherjee

Figure 1 for Estimation and Prediction of Deterministic Human Intent Signal to augment Haptic Glove aided Control of Robotic Hand
Figure 2 for Estimation and Prediction of Deterministic Human Intent Signal to augment Haptic Glove aided Control of Robotic Hand
Figure 3 for Estimation and Prediction of Deterministic Human Intent Signal to augment Haptic Glove aided Control of Robotic Hand
Figure 4 for Estimation and Prediction of Deterministic Human Intent Signal to augment Haptic Glove aided Control of Robotic Hand
Viaarxiv icon

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Jun 15, 2021
Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Figure 1 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 2 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 3 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 4 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Viaarxiv icon

Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists

Jun 14, 2021
Mahak Sharma, Abhishek Kaushik, Rajesh Kumar, Sushant Kumar Rai, Harshada Hanumant Desai, Sargam Yadav

Figure 1 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 2 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 3 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 4 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Viaarxiv icon

Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties

Apr 22, 2021
Rajesh Kumar, WenYong Wang, Cheng Yuan, Jay Kumar, Zakria, He Qing, Ting Yang, Abdullah Aman Khan

Figure 1 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 2 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 3 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 4 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Viaarxiv icon