Sachin Lodha

Orcid: 0000-0001-5771-4977

According to our database1, Sachin Lodha authored at least 78 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Robust Cross-Silo Federated Fraudulent Transaction Detection in Banks Using Epsilon Cluster Selection.
SN Comput. Sci., July, 2023

Design and Execution Challenges for Cybersecurity Serious Games: An Overview.
CoRR, 2023

FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Myochain: A Blockchain Protocol for Delay Bounded Transaction Confirmation.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Reducing Communication Overhead in Federated Learning for Pre-trained Language Models Using Parameter-Efficient Finetuning.
Proceedings of the Conference on Lifelong Learning Agents, 2023

Web Services Relocation and Reallocation for Data Residency Compliance.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Privacy Regulations-Aware Storage Service Selection in Multi-Cloud.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Privacy of Personal Information: Going incog in a goldfish bowl.
ACM Queue, 2022

Cloud Storage and Processing Service Selection considering Tiered Pricing and Data Regulations.
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022

Investigating Users' Perception, Security Awareness and Cyber-Hygiene Behaviour Concerning QR Code as an Attack Vector.
Proceedings of the HCI International 2022 Posters, 2022

Influence Based Defense Against Data Poisoning Attacks in Online Learning.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

People to People (P2P) Privacy in Mobile Devices.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Secure Scheduling of Scientific Workflows in Cloud.
Proceedings of the 12th International Conference on Cloud Computing and Services Science, 2022

Housie: A Multiplayer Game for Cybersecurity Training and Evaluation.
Proceedings of the Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play, 2022

2021
PhishMatch: A Layered Approach for Effective Detection of Phishing URLs.
CoRR, 2021

Gradient-based Data Subversion Attack Against Binary Classifiers.
CoRR, 2021

ThValRec: threshold value recommendation approach for ontology matching.
Proceedings of the 16th International Workshop on Ontology Matching co-located with the 20th International Semantic Web Conference (ISWC 2021), 2021

Visuals Triumph in a Curious Case of Privacy Policy.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

GOVID: Repurposing Serious Game for Enterprise COVID-19 Awareness.
Proceedings of the IndiaHCI 2021: 12th Indian Conference on Human-Computer Interaction, 2021

Robust Collaborative Fraudulent Transaction Detection using Federated Learning.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE.
Proceedings of the Information Systems Security - 17th International Conference, 2021

A divide and conquer approach for web services location allocation problem.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

Privacy-Preserving Password Strength Meters with FHE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Multi-objective Optimization for Virtual Machine Allocation in Computational Scientific Workflow under Uncertainty.
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021

2020
Passwords: Divided they Stand, United they Fall.
CoRR, 2020

A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications.
CoRR, 2020

Privacy Guidelines for Contact Tracing Applications.
CoRR, 2020

Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

A Framework to Generate Reference Sets for Ontology Matching Algorithms.
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020

PassO - New Circular Patter Lock Scheme Evaluation.
Proceedings of the MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services: Expanding the Horizon of Mobile Interaction, 2020

Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage.
Proceedings of the Financial Cryptography and Data Security, 2020

rProfiler - Assessing Insider Influence on Enterprise Assets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Selection of Cloud Service Providers for Hosting Web Applications in a Multi-cloud Environment.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

PETA: Privacy Enabled Task Allocation.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Multi-objective stable matching and distributional constraints.
Soft Comput., 2019

Extended- Force vs Nudge : Comparing Users' Pattern Choices on SysPal and TinPal.
CoRR, 2019

Everything Is in the Name - A URL Based Approach for Phishing Detection.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

pFilter: Retrofitting Legacy Applications for Data Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
GAP: A Game for Improving Awareness About Passwords.
Proceedings of the Serious Games - 4th Joint International Conference, 2018

PHISHY - A Serious Game to Train Enterprise Users on Phishing Awareness.
Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, 2018

2017
Scatter search for trainees to software project requirements stable allocation.
J. Heuristics, 2017

Privacy Aware Temporal Profiling of Emails in Distributed Setup.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Stamp processing with examplar features.
CoRR, 2016

On Employing a Highly Mismatched Crowd for Speech Transcription.
Proceedings of the Interspeech 2016, 2016

Unsupervised Word Clustering Using Deep Features.
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016

POSTER: Improved Markov Strength Meters for Passwords.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Assignment of trainees to software project requirements: A stable matching based approach.
Comput. Ind. Eng., 2015

Multi-view image inpainting with sparse representations.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

POSTER: WinOver Enterprise Dark Data.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2013
Tight Analysis of Shortest Path Convergecast in Wireless Sensor Networks.
Int. J. Found. Comput. Sci., 2013

English to Hindi Translation Protocols for an Enterprise Crowd.
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013

On the real-time masking of the sound of credit cards using hot patching.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Negotiation-based privacy preservation scheme in internet of things platform.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Data Privacy Using MASKETEERTM.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2012, 2012

Excel Solvers for the Traveling Salesman Problem.
Proceedings of the 18th International Conference on Management of Data, 2012

2010
Approximation algorithms for shortest descending paths in terrains.
J. Discrete Algorithms, 2010

Minimizing Testing Overheads in Database Migration Lifecycle.
Proceedings of the 16th International Conference on Management of Data, 2010

2009
Energy-Efficient Shortest Path Algorithms for Convergecast in Sensor Networks
CoRR, 2009

2007
Probabilistic Anonymity.
Proceedings of the Privacy, 2007

Approximate Shortest Descent Path on a Terrain.
Proceedings of the 19th Annual Canadian Conference on Computational Geometry, 2007

2006
A randomized on-line algorithm for the <i>k</i>-server problem on a line.
Random Struct. Algorithms, 2006

The Graham-Knowlton Problem Revisited.
Theory Comput. Syst., 2006

The Average Transmission Overhead of Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2006

Covering Codes for Hats-on-a-line.
Electron. J. Comb., 2006

2005
Search locally to arrange cyclically.
Electron. Notes Discret. Math., 2005

An Optimal Subset Cover for Broadcast Encryption.
Proceedings of the Progress in Cryptology, 2005

2004
On Minimum Circular Arrangement.
Proceedings of the STACS 2004, 2004

2002
Tight bound for the density of sequence of integers the sum of no two of which is a perfect square.
Discret. Math., 2002

Efficient proper 2-coloring of almost disjoint hypergraphs.
Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2002

2001
Algorithms for Efficient Filtering in Content-Based Multicast.
Proceedings of the Algorithms, 2001

1998
Fast Digital Identity Revocation (Extended Abstract).
Proceedings of the Advances in Cryptology, 1998


  Loading...