Aashish Sharma

Orcid: 0000-0001-9211-3368

According to our database1, Aashish Sharma authored at least 19 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optical Flow Estimation in Dense Foggy Scenes With Domain-Adaptive Networks.
IEEE Trans. Artif. Intell., December, 2023

Network Detection of Interactive SSH Impostors Using Deep Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

2021
DC-ShadowNet: Single-Image Hard and Soft Shadow Removal Using Unsupervised Domain-Classifier Guided Network.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Nighttime Visibility Enhancement by Increasing the Dynamic Range and Suppression of Light Effects.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Optical Flow in Dense Foggy Scenes Using Semi-Supervised Learning.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Single-Image Camera Response Function Using Prediction Consistency and Gradual Refinement.
Proceedings of the Computer Vision - ACCV 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30, 2020

Nighttime Stereo Depth Estimation using Joint Translation-Stereo Learning: Light Effects and Uninformative Regions.
Proceedings of the 8th International Conference on 3D Vision, 2020

2019
Depth Estimation in Nighttime using Stereo-Consistent Cyclic Translations.
CoRR, 2019

2018
Into the Twilight Zone: Depth Estimation Using Joint Structure-Stereo Optimization.
Proceedings of the Computer Vision - ECCV 2018, 2018

2017
Detecting Credential Spearphishing in Enterprise Settings.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Color based human detection and tracking algorithm using a non-Gaussian adaptive Particle filter.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2012
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Analysis of security data from a large computing organization.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Analysis of Credential Stealing Attacks in an Open Networked Environment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2006
Security Assessment of E-Tax Filing Websites
CoRR, 2006

2004
An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003.
Proceedings of the ICETE 2004, 2004

2002
Transcoding and Caching Proxies for Heterogenous E-Commerce Clients.
Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems, 2002


  Loading...