Mayank Agarwal

According to our database1, Mayank Agarwal authored at least 38 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




NeurIPS 2020 NLC2CMD Competition: Translating Natural Language to Bash Commands.
CoRR, 2021

Perfection Not Required? Human-AI Partnerships in Code Translation.
Proceedings of the IUI '21: 26th International Conference on Intelligent User Interfaces, 2021

Quality Estimation & Interpretability for Code Translation.
CoRR, 2020

Online Semi-Supervised Learning with Bandit Feedback.
CoRR, 2020

IBM Federated Learning: an Enterprise Framework White Paper V0.1.
CoRR, 2020

CLAI: A Platform for AI Skills on the Command Line.
CoRR, 2020

TraceHub - A Platform to Bridge the Gap between State-of-the-Art Time-Series Analytics and Datasets.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack.
IEEE CAA J. Autom. Sinica, 2019

A Bandit Approach to Posterior Dialog Orchestration Under a Budget.
CoRR, 2019

Machine Translation: A Literature Review.
CoRR, 2019

Rogue Twin Attack Detection: A Discrete Event System Paradigm Approach.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Statistical Model Aggregation via Parameter Matching.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Bayesian Nonparametric Federated Learning of Neural Networks.
Proceedings of the 36th International Conference on Machine Learning, 2019

CAPNet: Continuous Approximation Projection for 3D Point Cloud Reconstruction Using 2D Supervision.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks.
Int. J. Wirel. Inf. Networks, 2018

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

3D-LMNet: Latent Embedding Matching for Accurate and Diverse 3D Point Cloud Reconstruction from a Single Image.
Proceedings of the British Machine Vision Conference 2018, 2018

Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system.
IEEE CAA J. Autom. Sinica, 2017

Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization.
Int. J. Mach. Learn. Cybern., 2016

Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks.
IEEE Commun. Lett., 2015

Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

I<sup>2</sup>-diagnosability framework for detection of Advanced Stealth Man in the Middle attack in Wi-Fi networks.
Proceedings of the 23rd Mediterranean Conference on Control and Automation, 2015

Compact Planar Monopole Antenna with Dual Band Notched Characteristics Using T-Shaped Stub and Rectangular Mushroom Type Electromagnetic Band Gap Structure for UWB and Bluetooth Applications.
Wirel. Pers. Commun., 2014

Cohort Selection through Content-Based Image Retrieval: vfM A Case Study.
Proceedings of the 2012 IEEE Second International Conference on Healthcare Informatics, 2012

Convexity and convex approximations of discrete-time stochastic control problems with constraints.
Autom., 2011

Mitigating denial of service attack using CAPTCHA mechanism.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

Secure authentication using dynamic virtual keyboard layout.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

Content-based image retrieval for Alzheimer's disease detection.
Proceedings of the 9th International Workshop on Content-Based Multimedia Indexing, 2011

Face Recognition Using Principle Component Analysis, Eigenface and Neural Network.
Proceedings of the 2010 International Conference on Signal Acquisition and Processing, 2010

Protecting Global SOA from DoS and Other Security Threats.
Proceedings of the Advances in Information Security and Assurance, 2009

Image Retrieval for Alzheimer's Disease Detection.
Proceedings of the Medical Content-Based Retrieval for Clinical Decision Support, 2009

On convexity of stochastic optimization problems with constraints.
Proceedings of the 10th European Control Conference, 2009

BlogWall: Social and Cultural Interaction for Children.
Adv. Hum. Comput. Interact., 2008

Fetch-Criticality Reduction through Control Independence.
Proceedings of the 35th International Symposium on Computer Architecture (ISCA 2008), 2008

Branch-mispredict level parallelism (BLP) for control independence.
Proceedings of the 14th International Conference on High-Performance Computer Architecture (HPCA-14 2008), 2008

PaCo: Probability-based path confidence prediction.
Proceedings of the 14th International Conference on High-Performance Computer Architecture (HPCA-14 2008), 2008

Exploiting Postdominance for Speculative Parallelization.
Proceedings of the 13st International Conference on High-Performance Computer Architecture (HPCA-13 2007), 2007

SMPS: an FPGA-based prototyping environment for multiprocessor embedded systems (abstract only).
Proceedings of the ACM/SIGDA 13th International Symposium on Field Programmable Gate Arrays, 2005