Supriyo Chakraborty

Orcid: 0000-0003-3697-0044

According to our database1, Supriyo Chakraborty authored at least 72 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AYDIV: Adaptable Yielding 3D Object Detection via Integrated Contextual Vision Transformer.
CoRR, 2024

2023
Knowledge from Uncertainty in Evidential Deep Learning.
CoRR, 2023

On Distributed Training of Foundation Models: Challenges and Observations.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023

2022
On the amplification of security and privacy risks by post-hoc explanations in machine learning models.
CoRR, 2022

Identification of Thin Layer Via Source Wave-Field Dictionary Learning.
Proceedings of the IECON 2022, 2022

SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Adversarial training in communication constrained federated learning.
CoRR, 2021

Silencing lung cancer genes using miRNAs identified by 7mer-seed matching.
Comput. Biol. Chem., 2021

SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

WristPrint: Characterizing User Re-identification Risks from Wrist-worn Accelerometry Data.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On Exploring Attention-based Explanation for Transformer Models in Text Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Rapid Trust Calibration through Interpretable and Uncertainty-Aware AI.
Patterns, 2020

IBM Federated Learning: an Enterprise Framework White Paper V0.1.
CoRR, 2020

Explaining Motion Relevance for Activity Recognition in Video Deep Learning Models.
CoRR, 2020

Improving Adversarial Robustness Through Progressive Hardening.
CoRR, 2020

Multi-trace Inversion with Selective Wedge to Increase Thin Layer Resolution in Horizontal Layer.
Proceedings of the 11th International Conference on Computing, 2020

Sanity Checks for Saliency Metrics.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Compositional features and codon usage pattern of <i>TP63</i> gene.
Comput. Biol. Chem., 2019

Analyzing Federated Learning through an Adversarial Lens.
Proceedings of the 36th International Conference on Machine Learning, 2019

GenAttack: practical black-box attacks with gradient-free optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

Fair Transfer Learning with Missing Protected Attributes.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

2018
Achieving Pareto-Optimal MI-Based Privacy-Utility Tradeoffs Under Full Data.
IEEE J. Sel. Top. Signal Process., 2018

Stakeholders in Explainable AI.
CoRR, 2018

Interpretable to Whom? A Role-based Model for Analyzing Interpretable Machine Learning Systems.
CoRR, 2018

GenAttack: Practical Black-box Attacks with Gradient-Free Optimization.
CoRR, 2018

Self-Generation of Access Control Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Enabling Edge Devices that Learn from Each Other: Cross Modal Training for Activity Recognition.
Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, 2018

Why the Failure? How Adversarial Examples Can Provide Insights for Interpretable Machine Learning.
Proceedings of the 21st International Conference on Information Fusion, 2018

Learning and Reasoning in Complex Coalition Information Environments: A Critical Analysis.
Proceedings of the 21st International Conference on Information Fusion, 2018

Secure Model Fusion for Distributed Learning Using Partial Homomorphic Encryption.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Learning Light-Weight Edge-Deployable Privacy Models.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications.
CoRR, 2017

Codon usage bias and its influencing factors for Y-linked genes in human.
Comput. Biol. Chem., 2017

PrIA: A Private Intelligent Assistant.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017

Generative policy model for autonomic management.
Proceedings of the 2017 IEEE SmartWorld, 2017

Cognitive computing for coalition situational understanding.
Proceedings of the 2017 IEEE SmartWorld, 2017

Distributed opportunistic sensing and fusion for traffic congestion detection.
Proceedings of the 2017 IEEE SmartWorld, 2017


SenseGen: A deep learning architecture for synthetic sensor data generation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Computing messages that reveal selected inferences while protecting others.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

PrOLoc: resilient localization with private observers using partial homomorphic encryption.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

Deep learning for situational understanding.
Proceedings of the 20th International Conference on Information Fusion, 2017

LightSpy: Optical eavesdropping on displays using light sensors on mobile devices.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Eavesdropping and obfuscation techniques for smartphones.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

mSieve: differential behavioral privacy in time series of mobile sensor data.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

2015
Partial observable update for subjective logic and its application for trust estimation.
Inf. Fusion, 2015

Get More With Less: Near Real-Time Image Clustering on Mobile Phones.
CoRR, 2015

AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

2014
Balancing Behavioral Privacy and Information Utility in Sensory Data Flows.
PhD thesis, 2014

Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments.
Pervasive Mob. Comput., 2014

Multitiered inference management architecture for participatory sensing.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

ipShield: A Framework For Enforcing Context-Aware Privacy.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Towards a rich sensing stack for IoT devices.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2014

2013
A framework for context-aware privacy of sensor data on mobile systems.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

Exploiting processor heterogeneity for energy efficient context inference on mobile phones.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

Protecting data against unwanted inferences.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Reasoning under uncertainty: Variations of subjective logic deduction.
Proceedings of the 16th International Conference on Information Fusion, 2013

2012
Balancing behavioral privacy and information utility in sensory data flows.
Pervasive Mob. Comput., 2012

Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An obfuscation framework for controlling value of information during sharing.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Subjective logic with uncertain partial observations.
Proceedings of the 15th International Conference on Information Fusion, 2012

Balancing value and risk in information sharing through obfuscation.
Proceedings of the 15th International Conference on Information Fusion, 2012

Model-based context privacy for personal data streams.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Estimating network link characteristics using packet-pair dispersion: A discrete-time queueing theoretic analysis.
Comput. Networks, 2011

Neighborhood based fast graph search in large networks.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Distributed coordination for fast iterative optimization in wireless sensor/actuator networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

SensorSafe: A Framework for Privacy-Preserving Management of Personal Sensory Information.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Demystifying privacy in sensory data: A QoI based approach.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

2010
Compressive Oversampling for Robust Data Transmission in Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Estimating Network Link Characteristics using Packet-Pair Dispersion: A Discrete Time Queueing Theoretic View
CoRR, 2009


  Loading...