Ashutosh Saxena

According to our database1, Ashutosh Saxena authored at least 169 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes.
Int. J. Inf. Comput. Secur., 2023

2022
A novel cryptographic protocol for privacy preserving classification over distributed encrypted databases.
J. Bank. Financial Technol., 2022

2021
Towards Finding Active Number of S-Boxes in Block Ciphers using Mixed Integer Linear Programming.
Informatica (Slovenia), 2021

Energy-efficient reporting scheme for cognitive radio networks.
IET Networks, 2021

Construction of $4\times 4$ MDS Matrices for Lightweight Block Ciphers.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
Senior Living Communities: Made Safer by AI.
CoRR, 2020

2018
Watch-n-Patch: Unsupervised Learning of Actions and Relations.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

2017
Learning to represent haptic feedback for partially-observable tasks.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

Deep multimodal embedding: Manipulating novel objects with point-clouds, language and trajectories.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

2016
Anticipating Human Activities Using Object Affordances for Reactive Robotic Response.
IEEE Trans. Pattern Anal. Mach. Intell., 2016

Modeling 3D Environments through Hidden Human Context.
IEEE Trans. Pattern Anal. Mach. Intell., 2016

Tell me Dave: Context-sensitive grounding of natural language to manipulation instructions.
Int. J. Robotics Res., 2016

Human Centred Object Co-Segmentation.
CoRR, 2016

Robobarista: Learning to Manipulate Novel Objects via Deep Multimodal Embedding.
CoRR, 2016

Unsupervised Semantic Action Discovery from Video Collections.
CoRR, 2016

Unsupervised Transductive Domain Adaptation.
CoRR, 2016

Brain4Cars: Car That Knows Before You Do via Sensory-Fusion Deep Learning Architecture.
CoRR, 2016

MDPs with Unawareness in Robotics.
Proceedings of the Thirty-Second Conference on Uncertainty in Artificial Intelligence, 2016

Learning Transferrable Representations for Unsupervised Domain Adaptation.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Watch-Bot: Unsupervised learning for reminding humans of forgotten actions.
Proceedings of the 2016 IEEE International Conference on Robotics and Automation, 2016

Recurrent Neural Networks for driver activity anticipation via sensory-fusion architecture.
Proceedings of the 2016 IEEE International Conference on Robotics and Automation, 2016

Structural-RNN: Deep Learning on Spatio-Temporal Graphs.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
3D Reasoning from Blocks to Stability.
IEEE Trans. Pattern Anal. Mach. Intell., 2015

Learning preferences for manipulation tasks from online coactive feedback.
Int. J. Robotics Res., 2015

Hierarchical classification of e-commerce related social media.
CoRR, 2015

Know Before You Do: Anticipating Maneuvers via Learning Temporal Driving Models.
CoRR, 2015

Exploring Correlation between Labels to improve Multi-Label Classification.
CoRR, 2015

rCRF: Recursive Belief Estimation over CRFs in RGB-D Activity Videos.
Proceedings of the Robotics: Science and Systems XI, Sapienza University of Rome, 2015

DeepMPC: Learning Deep Latent Features for Model Predictive Control.
Proceedings of the Robotics: Science and Systems XI, Sapienza University of Rome, 2015

Robobarista: Object Part Based Transfer of Manipulation Trajectories from Crowd-Sourcing in 3D Pointclouds.
Proceedings of the Robotics Research, 2015

PlanIt: A crowdsourcing approach for learning to plan paths from large scale preference feedback.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Unsupervised Semantic Parsing of Video Collections.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Car that Knows Before You Do: Anticipating Maneuvers via Learning Temporal Driving Models.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

Watch-n-patch: Unsupervised understanding of actions and relations.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015

Environment-Driven Lexicon Induction for High-Level Instructions.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
RoboBrain: Large-Scale Knowledge Engine for Robots.
CoRR, 2014

PlanIt: A Crowdsourcing Approach for Learning to Plan Paths from Large Scale Preference Feedback.
CoRR, 2014

Special issue on autonomous grasping and manipulation.
Auton. Robots, 2014

Hierarchical Semantic Labeling for Task-Relevant RGB-D Perception.
Proceedings of the Robotics: Science and Systems X, 2014

Modeling High-Dimensional Humans for Activity Anticipation using Gaussian Process Latent CRFs.
Proceedings of the Robotics: Science and Systems X, 2014

Anticipatory Planning for Human-Robot Teams.
Proceedings of the Experimental Robotics, 2014

Synthesizing manipulation sequences for under-specified tasks using unrolled Markov Random Fields.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

Learning haptic representation for manipulating deformable food objects.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

A robust scheme on proof of data retrievability in cloud.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Physically Grounded Spatio-temporal Object Affordances.
Proceedings of the Computer Vision - ECCV 2014, 2014

2013
A Digital Signature Architecture for Web Apps.
IT Prof., 2013

A Green Software Development Life Cycle for Cloud Computing.
IT Prof., 2013

Learning human activities and object affordances from RGB-D videos.
Int. J. Robotics Res., 2013

Contextually guided semantic labeling and search for three-dimensional point clouds.
Int. J. Robotics Res., 2013

Deep Learning for Detecting Robotic Grasps
Proceedings of the 1st International Conference on Learning Representations, 2013

Learning Sequences of Controllers for Complex Manipulation Tasks.
CoRR, 2013

Learning Trajectory Preferences for Manipulators via Iterative Improvement.
CoRR, 2013

Infinite Latent Conditional Random Fields for Modeling Environments through Humans.
Proceedings of the Robotics: Science and Systems IX, Technische Universität Berlin, Berlin, Germany, June 24, 2013

Learning Trajectory Preferences for Manipulators via Iterative Improvement.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013

Beyond Geometric Path Planning: Learning Context-Driven Trajectory Preferences via Sub-optimal Feedback.
Proceedings of the Robotics Research, 2013

Tangled: Learning to untangle ropes with RGB-D perception.
Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2013

Anticipating human activities for reactive robotic response.
Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2013

Discovering Different Types of Topics: Factored Topic Models.
Proceedings of the IJCAI 2013, 2013

Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation.
Proceedings of the 30th International Conference on Machine Learning, 2013

Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Infinite Latent Conditional Random Fields.
Proceedings of the 2013 IEEE International Conference on Computer Vision Workshops, 2013

Hallucinated Humans as the Hidden Context for Labeling 3D Scenes.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

3D-Based Reasoning with Blocks, Support, and Stability.
Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition, 2013

An integrated framework for enhancing privacy in online social networks.
Proceedings of the 6th ACM India Computing Convention, 2013

<i>AtDRM</i>: a DRM architecture with rights transfer and revocation capability.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
Toward Holistic Scene Understanding: Feedback Enabled Cascaded Classification Models.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Learning to place new objects in a scene.
Int. J. Robotics Res., 2012

Human Activity Learning using Object Affordances from RGB-D Videos
CoRR, 2012

Multidimensional Membership Mixture Models
CoRR, 2012

Hallucinating Humans for Learning Robotic Placement of Objects.
Proceedings of the Experimental Robotics, 2012

Low-power parallel algorithms for single image based obstacle avoidance in aerial robots.
Proceedings of the 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012

Unstructured human activity detection from RGBD images.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

Learning to place new objects.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

Learning hardware agnostic grasps for a universal jamming gripper.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

Learning to place objects: Organizing a room.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

Learning Object Arrangements in 3D Scenes using Human Context.
Proceedings of the 29th International Conference on Machine Learning, 2012

Co-evolutionary predictors for kinematic pose inference from RGBD images.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

Learning the right model: Efficient max-margin learning in Laplacian CRFs.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

2011
A neural network approach for data masking.
Neurocomputing, 2011

Contextually Guided Semantic Labeling and Search for 3D Point Clouds
CoRR, 2011

Labeling 3D scenes for Personal Assistant Robots
CoRR, 2011

Pose Estimation from a Single Depth Image for Arbitrary Kinematic Skeletons
CoRR, 2011

Inferring 3D Articulated Models for Box Packaging Robot
CoRR, 2011

$\theta$-MRF: Capturing Spatial and Semantic Structure in the Parameters for Scene Understanding.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Semantic Labeling of 3D Point Clouds for Indoor Scenes.
Proceedings of the Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, 2011

Robotic Object Detection: Learning to Improve the Classifiers Using Sparse Graphs for Path Planning.
Proceedings of the IJCAI 2011, 2011

FeCCM for scene understanding: Helping the robot to learn multiple tasks.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

Efficient grasping from RGBD images: Learning using a new rectangle representation.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

Autonomous MAV flight in indoor environments using single image perspective cues.
Proceedings of the IEEE International Conference on Robotics and Automation, 2011

Data integrity proofs in cloud storage.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Human Activity Detection from RGBD Images.
Proceedings of the Plan, Activity, and Intent Recognition, 2011

A DRM framework towards preventing digital piracy.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

A security analysis of smartphone data flow and feasible solutions for lawful interception.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Personalized Data Set for Analysis
CoRR, 2010

MDPs with Unawareness.
Proceedings of the UAI 2010, 2010

Towards Holistic Scene Understanding: Feedback Enabled Cascaded Classification Models.
Proceedings of the Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, 2010

Learning to open new doors.
Proceedings of the 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2010

A Generic Model to Compose Vision Modules for Holistic Scene Understanding.
Proceedings of the Trends and Topics in Computer Vision, 2010

A cryptography based privacy preserving solution to mine cloud data.
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, 2010

Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Privacy Layer for Business Intelligence.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2009
Make3D: Learning 3D Scene Structure from a Single Still Image.
IEEE Trans. Pattern Anal. Mach. Intell., 2009

Algorithms and Approaches of Proxy Signature: A Survey.
Int. J. Netw. Secur., 2009

Application security code analysis: a step towards software assurance.
Int. J. Inf. Comput. Secur., 2009

An improved bilinear pairing based remote user authentication scheme.
Comput. Stand. Interfaces, 2009

i23 - Rapid Interactive 3D Reconstruction from a Single Image.
Proceedings of the 14th International Workshop on Vision, Modeling, and Visualization, 2009

An efficient and secure protocol for DTV broadcasts.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Danger theory based SYN flood attack detection in autonomic network.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Autonomous indoor helicopter flight using a single onboard camera.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

Learning sound location from a single microphone.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Learning 3-D object orientation from images.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Reactive grasping using optical proximity sensors.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

2008
Robotic Grasping of Novel Objects using Vision.
Int. J. Robotics Res., 2008

Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach.
Int. J. Netw. Secur., 2008

3-D Depth Reconstruction from a Single Still Image.
Int. J. Comput. Vis., 2008

Cascaded Classification Models: Combining Models for Holistic Scene Understanding.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

HEMIN: A Cryptographic Approach for Private k-NN Classification.
Proceedings of The 2008 International Conference on Data Mining, 2008

Dynamic authentication: Need than a choice.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Learning Grasp Strategies with Partial Shape Information.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Make3D: Depth Perception from a Single Still Image.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

A Fast Data Collection and Augmentation Procedure for Object Recognition.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings.
Int. J. Netw. Secur., 2007

Threshold key issuing in identity-based cryptosystems.
Comput. Stand. Interfaces, 2007

Secure computation for data privacy.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Vision-Based System for Grasping Novel Objects in Cluttered Environments.
Proceedings of the Robotics Research - The 13th International Symposium, 2007

A model to secure data warehouse.
Proceedings of the 2007 International Conference on Information & Knowledge Engineering, 2007

Depth Estimation Using Monocular and Stereo Cues.
Proceedings of the IJCAI 2007, 2007

3-D Reconstruction from Sparse Views using Monocular Vision.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Learning 3-D Scene Structure from a Single Still Image.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Synthetic Data for Privacy Preserving Data Mining.
Proceedings of the 2007 International Conference on Data Mining, 2007

An Efficient Authentication Protocol for GSM.
Proceedings of the 2007 International Conference on Security & Management, 2007

Threshold SKI Protocol for ID-based Cryptosystems.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Identity Based Multisignatures.
Informatica, 2006

Pairing based Mutual Authentication Scheme Using Smart Cards.
IACR Cryptol. ePrint Arch., 2006

Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

Identity Based Strong Designated Verifier Signature Scheme.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of recently proposed Remote User Authentication Schemes.
IACR Cryptol. ePrint Arch., 2006

Verifiably Encrypted Signature Scheme with Threshold Adjudication.
IACR Cryptol. ePrint Arch., 2006

A novel remote user authentication scheme using bilinear pairings.
Comput. Secur., 2006

Robotic Grasping of Novel Objects.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Learning to Grasp Novel Objects Using Vision.
Proceedings of the Experimental Robotics, 2006

Mutual Authentication and Key Agreement for GSM.
Proceedings of the 2006 International Conference on Mobile Business (ICMB 2006), 2006

A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

Universal Designated Multi Verifier Signature without Random Oracles.
Proceedings of the 9th International Conference in Information Technology, 2006

2005
Hierarchical key management scheme using polynomial interpolation.
ACM SIGOPS Oper. Syst. Rev., 2005

Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing.
J. Univers. Comput. Sci., 2005

A Survey on ID-Based Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
CoRR, 2005

An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

ID-based Serial Multisignature Scheme using Bilinear Pairings.
Proceedings of the Security in Information Systems, 2005

Learning Depth from Single Monocular Images.
Proceedings of the Advances in Neural Information Processing Systems 18 [Neural Information Processing Systems, 2005

In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Cryptanalysis and Improvement of a Multisignature Scheme.
Proceedings of the Distributed Computing, 2005

An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

High speed obstacle avoidance using monocular vision and reinforcement learning.
Proceedings of the Machine Learning, 2005

MMPS: A Versatile Mobile-to-Mobile Payment System.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

SPAM: Secure Protocol for Authentication in Mobile-Communications.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Verifiably Encrypted Signature Scheme Without Random Oracles.
Proceedings of the Distributed Computing and Internet Technology, 2005

An Efficient Certificateless Signature Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A dynamic ID-based remote user authentication scheme.
IEEE Trans. Consumer Electron., 2004

An Efficient Proxy Signature Scheme with Revocation.
Informatica, 2004

A Novel Remote User Authentication Scheme Through Dynamic Login Identity.
Proceedings of the Distributed Computing, 2004

On Gossip Codes and Traceability Schemes.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Non-linear Dimensionality Reduction by Locally Linear Isomaps.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

On Reduction of Bootstrapping Information Using Digital Multisignature.
Proceedings of the Intelligent Information Technology, 2004

2003
Security Analysis of Lal and Awasthi's Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2003

2002
Towards Logically and Physically Secure Public-Key Infrastructures.
Proceedings of the Progress in Cryptology, 2002

Reed Solomon Codes for Digital Fingerprinting.
Proceedings of the Progress in Cryptology, 2002

1998
Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network.
Int. J. Artif. Intell. Tools, 1998


  Loading...