Vikram Goyal

Orcid: 0000-0003-0769-6381

According to our database1, Vikram Goyal authored at least 74 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

Probing Critical Learning Dynamics of PLMs for Hate Speech Detection.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2024, 2024

2023
DiVA: A Scalable, Interactive and Customizable Visual Analytics Platform for Information Diffusion on Large Networks.
ACM Trans. Knowl. Discov. Data, May, 2023

Efficiently Mining Colocation Patterns for Range Query.
Big Data Res., February, 2023

Multi-Document Summarization Using Selective Attention Span and Reinforcement Learning.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Exploiting Representation Bias for Data Distillation in Abstractive Text Summarization.
CoRR, 2023

Coherence and Diversity through Noise: Self-Supervised Paraphrase Generation via Structure-Aware Denoising.
CoRR, 2023

Unsupervised Question Duplicate and Related Questions Detection in e-learning platforms.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023

MWPRanker: An Expression Similarity Based Math Word Problem Retriever.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

Revisiting Hate Speech Benchmarks: From Data Curation to System Deployment.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Fusing Multimodal Signals on Hyper-complex Space for Extreme Abstractive Text Summarization (TL;DR) of Scientific Contents.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Promoting Topic Coherence and Inter-Document Consorts in Multi-Document Summarization via Simplicial Complex and Sheaf Graph.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

James ate 5 oranges = Steve bought 5 pencils: Structure-Aware Denoising for Paraphrasing Word Problems.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
TagRec++: Hierarchical Label Aware Attention Network for Question Categorization.
CoRR, 2022

'John Ate 5 Apples' != 'John Ate Some Apples': Self-supervised Paraphrase Quality Detection for Algebraic Word Problems.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Multi-Relational Graph Transformer for Automatic Short Answer Grading.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

A Matching Based Spatial Crowdsourcing Framework for Egalitarian Task Assignment.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Topic Aware Contextualized Embeddings for High Quality Phrase Extraction.
Proceedings of the Advances in Information Retrieval, 2022

Auxiliary Task Guided Interactive Attention Model for Question Difficulty Prediction.
Proceedings of the Artificial Intelligence in Education - 23rd International Conference, 2022

2021
See, hear, read: Leveraging multimodality with guided attention for abstractive text summarization.
Knowl. Based Syst., 2021

Finding the most navigable path in road networks.
GeoInformatica, 2021

DiVA: A Scalable, Interactive and Customizable Visual Analytics Platform for Information Diffusion on Large Networks.
CoRR, 2021

THUE: Discovering Top-K High Utility Episodes.
CoRR, 2021

High-utility and diverse itemset mining.
Appl. Intell., 2021

TagRec: Automated Tagging of Questions with Hierarchical Learning Taxonomy.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

A Navigation System for Safe Routing.
Proceedings of the 22nd IEEE International Conference on Mobile Data Management, 2021

Hate is the New Infodemic: A Topic-aware Modeling of Hate Speech Diffusion on Twitter.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

SMIM Framework to Generalize High-Utility Itemset Mining.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021

2020
Interpretability of Blackbox Machine Learning Models through Dataview Extraction and Shadow Model creation.
CoRR, 2020

Interpretability of Black Box Models Through Data-View Extraction and Shadow Model Creation.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

STHAL: Location-mention Identification in Tweets of Indian-context.
Proceedings of the 17th International Conference on Natural Language Processing, 2020

2019
DiffQue: Estimating Relative Difficulty of Questions in Community Question Answering Services.
ACM Trans. Intell. Syst. Technol., 2019

Modeling location obfuscation for continuous query.
J. Inf. Secur. Appl., 2019

Mining Top-k Trajectory-Patterns from Anonymized Data.
CoRR, 2019

A one-phase tree-based algorithm for mining high-utility itemsets from a transaction database.
CoRR, 2019

2018
High-utility itemset mining for subadditive monotone utility functions.
CoRR, 2018

Extracting Fairness Policies from Legal Documents.
CoRR, 2018

Finding the Most Navigable Path in Road Networks: A Summary of Results.
Proceedings of the Database and Expert Systems Applications, 2018

2017
Mining top-k high-utility itemsets from a data stream under sliding window model.
Appl. Intell., 2017

A hybrid framework for mining high-utility itemsets in a sparse transaction database.
Appl. Intell., 2017

Distributed Algorithm for High-Utility Subgraph Pattern Mining Over Big Data Platforms.
Proceedings of the 24th IEEE International Conference on High Performance Computing, 2017

Automatic Retrieval of Actionable Information from Disaster-related Microblogs.
Proceedings of the Working notes of FIRE 2017, 2017

2016
Mintra: Mining anonymized trajectories with annotations.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

A More Efficient Algorithm to Mine Skyline Frequent-Utility Patterns.
Proceedings of the Genetic and Evolutionary Computing, 2016

Top-K High Utility Episode Mining from a Complex Event Sequence.
Proceedings of the 21st International Conference on Management of Data, 2016

2015
Efficient Reverse k Nearest Neighbor evaluation for hierarchical index.
CoRR, 2015

UP-Hist Tree: An Efficient Data Structure for Mining High Utility Patterns from Transaction Databases.
Proceedings of the 19th International Database Engineering & Applications Symposium, 2015

Finding RkNN Set in Directed Graphs.
Proceedings of the Distributed Computing and Internet Technology, 2015

High Utility Rare Itemset Mining over Transaction Databases.
Proceedings of the Databases in Networked Information Systems, 2015

TiDE: Template-Independent Discourse Data Extraction.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Mining Frequent Spatial-Textual Sequence Patterns.
Proceedings of the Database Systems for Advanced Applications, 2015

Spatio-textual similarity joins using variable prefix filtering.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015

Efficient Skyline Itemsets Mining.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

An Efficient Algorithm for Mining High-Utility Itemsets with Discount Notion.
Proceedings of the Big Data Analytics - 4th International Conference, 2015

Open Source Social Media Analytics for Intelligence and Security Informatics Applications.
Proceedings of the Big Data Analytics - 4th International Conference, 2015

2013
Efficient Enforcement of Privacy for Moving Object Trajectories.
Proceedings of the Information Systems Security - 9th International Conference, 2013

A ranking measure for top-k moving object trajectories search.
Proceedings of the 7th Workshop on Geographic Information Retrieval, 2013

2011
Preserving Location Privacy for Continuous Queries on Known Route.
Proceedings of the Information Systems Security - 7th International Conference, 2011

EcoTop: An Economic Model for Dynamic Processing of Top-<i>k</i> Queries in Mobile-P2P Networks.
Proceedings of the Database Systems for Advanced Applications, 2011

2010
Opaqueness Characteristic of a Context Honeypot System.
Inf. Secur. J. A Glob. Perspect., 2010

AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS.
Proceedings of the Databases in Networked Information Systems, 6th International Workshop, 2010

2009
Polarity Classification of Subjective Words Using Common-Sense Knowledge-Base.
Proceedings of the Rough Sets, 2009

2008
Auditing Inference Based Disclosures in Dynamic Databases.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Precomputation of privacy policy parameters for auditing SQL queries.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Context Honeypot: A Framework for Anticipatory Privacy Violation.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

A Unified Audit Expression Model for Auditing SQL Queries.
Proceedings of the Data and Applications Security XXII, 2008

2007
PRINDA: Architecture and design of non-disclosure agreements in privacy policy framework.
Data Knowl. Eng., 2007

2006
Query rewriting for detection of privacy violation through inferencing.
Proceedings of the 2006 International Conference on Privacy, 2006

Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report).
Proceedings of the Information Systems Security, Second International Conference, 2006

Malafide Intension Based Detection of Privacy Violation in Information System.
Proceedings of the Information Systems Security, Second International Conference, 2006

A System to test malafide intension based on privacy violation detection.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

Preserving Obliviousness Characteristic of Honeypot database.
Proceedings of the 13th International Conference on Management of Data, 2006

OCHD: Preserving Obliviousness Characteristic of Honeypot Database.
Proceedings of the 13th International Conference on Management of Data, 2006


  Loading...