Skip to main content

Showing 1–49 of 49 results for author: Goel, D

.
  1. arXiv:2506.13434  [pdf, ps, other

    cs.CR

    From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs

    Authors: Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings

    Abstract: Large Language Models (LLMs) are set to reshape cybersecurity by augmenting red and blue team operations. Red teams can exploit LLMs to plan attacks, craft phishing content, simulate adversaries, and generate exploit code. Conversely, blue teams may deploy them for threat intelligence synthesis, root cause analysis, and streamlined documentation. This dual capability introduces both transformative… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

    Comments: 10 pages

  2. arXiv:2505.11710  [pdf, other

    cs.CR

    Co-Evolutionary Defence of Active Directory Attack Graphs via GNN-Approximated Dynamic Programming

    Authors: Diksha Goel, Hussain Ahmad, Kristen Moore, Mingyu Guo

    Abstract: Modern enterprise networks increasingly rely on Active Directory (AD) for identity and access management. However, this centralization exposes a single point of failure, allowing adversaries to compromise high-value assets. Existing AD defense approaches often assume static attacker behavior, but real-world adversaries adapt dynamically, rendering such methods brittle. To address this, we model at… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

  3. arXiv:2505.11708  [pdf, ps, other

    cs.CR cs.LG

    Unveiling the Black Box: A Multi-Layer Framework for Explaining Reinforcement Learning-Based Cyber Agents

    Authors: Diksha Goel, Kristen Moore, Jeff Wang, Minjune Kim, Thanh Thi Nguyen

    Abstract: Reinforcement Learning (RL) agents are increasingly used to simulate sophisticated cyberattacks, but their decision-making processes remain opaque, hindering trust, debugging, and defensive preparedness. In high-stakes cybersecurity contexts, explainability is essential for understanding how adversarial strategies are formed and evolve over time. In this paper, we propose a unified, multi-layer ex… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

  4. arXiv:2504.11505  [pdf, other

    cs.SE

    eARCO: Efficient Automated Root Cause Analysis with Prompt Optimization

    Authors: Drishti Goel, Raghav Magazine, Supriyo Ghosh, Akshay Nambi, Prathamesh Deshpande, Xuchao Zhang, Chetan Bansal, Saravan Rajmohan

    Abstract: Root cause analysis (RCA) for incidents in large-scale cloud systems is a complex, knowledge-intensive task that often requires significant manual effort from on-call engineers (OCEs). Improving RCA is vital for accelerating the incident resolution process and reducing service downtime and manual efforts. Recent advancements in Large-Language Models (LLMs) have proven to be effective in solving di… ▽ More

    Submitted 15 April, 2025; originally announced April 2025.

  5. arXiv:2504.07457  [pdf, other

    cs.CR

    CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders

    Authors: Minjune Kim, Jeff Wang, Kristen Moore, Diksha Goel, Derui Wang, Ahmad Mohsin, Ahmed Ibrahim, Robin Doss, Seyit Camtepe, Helge Janicke

    Abstract: The increasing frequency and sophistication of cyberattacks demand innovative approaches to strengthen defense capabilities. Training on live infrastructure poses significant risks to organizations, making secure, isolated cyber ranges an essential tool for conducting Red vs. Blue Team training events. These events enable security teams to refine their skills without impacting operational environm… ▽ More

    Submitted 10 April, 2025; originally announced April 2025.

    Comments: The manuscript has been accepted by WWW Companion 2025 Demo Track

  6. arXiv:2502.18533  [pdf, other

    cs.CV cs.LG eess.IV

    Convolutional neural networks for mineral prospecting through alteration mapping with remote sensing data

    Authors: Ehsan Farahbakhsh, Dakshi Goel, Dhiraj Pimparkar, R. Dietmar Muller, Rohitash Chandra

    Abstract: Traditional geological mapping, based on field observations and rock sample analysis, is inefficient for continuous spatial mapping of features like alteration zones. Deep learning models, such as convolutional neural networks (CNNs), have revolutionised remote sensing data analysis by automatically extracting features for classification and regression tasks. CNNs can detect specific mineralogical… ▽ More

    Submitted 24 February, 2025; originally announced February 2025.

  7. arXiv:2502.15287  [pdf, other

    cs.SE cs.AI cs.HC

    Time Warp: The Gap Between Developers' Ideal vs Actual Workweeks in an AI-Driven Era

    Authors: Sukrit Kumar, Drishti Goel, Thomas Zimmermann, Brian Houck, B. Ashok, Chetan Bansal

    Abstract: Software developers balance a variety of different tasks in a workweek, yet the allocation of time often differs from what they consider ideal. Identifying and addressing these deviations is crucial for organizations aiming to enhance the productivity and well-being of the developers. In this paper, we present the findings from a survey of 484 software developers at Microsoft, which aims to identi… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

    Comments: ICSE SEIP 2025

  8. Maintenance of Structural Hole Spanners in Dynamic Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: Structural Hole (SH) spanners are the set of users who bridge different groups of users and are vital in numerous applications. Despite their importance, existing work for identifying SH spanners focuses only on static networks. However, real-world networks are highly dynamic where the underlying structure of the network evolves continuously. Consequently, we study SH spanner problem for dynamic n… ▽ More

    Submitted 16 February, 2025; originally announced February 2025.

    Comments: 6 pages, 5 figures, published in 2021 IEEE 46th Conference on Local Computer Networks (LCN). arXiv admin note: substantial text overlap with arXiv:2302.13292, arXiv:2310.10667

    MSC Class: 68R10 (Graph Theory)

    Journal ref: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pages 339-342

  9. arXiv:2501.17667  [pdf, other

    cs.LG cs.CR

    CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization

    Authors: Derui Wang, Kristen Moore, Diksha Goel, Minjune Kim, Gang Li, Yang Li, Robin Doss, Minhui Xue, Bo Li, Seyit Camtepe, Liming Zhu

    Abstract: Deep reinforcement learning (DRL) has gained widespread adoption in control and decision-making tasks due to its strong performance in dynamic environments. However, DRL agents are vulnerable to noisy observations and adversarial attacks, and concerns about the adversarial robustness of DRL systems have emerged. Recent efforts have focused on addressing these robustness issues by establishing rigo… ▽ More

    Submitted 29 March, 2025; v1 submitted 29 January, 2025; originally announced January 2025.

    Comments: Accepted to USENIX Security Symposium 2025, Seattle, WA, USA. Source code is available at Github (https://github.com/NeuralSec/camp-robust-rl) and Zenodo (https://zenodo.org/records/14729675)

  10. arXiv:2501.05487  [pdf, other

    cs.CL

    The Future of AI: Exploring the Potential of Large Concept Models

    Authors: Hussain Ahmad, Diksha Goel

    Abstract: The field of Artificial Intelligence (AI) continues to drive transformative innovations, with significant progress in conversational interfaces, autonomous vehicles, and intelligent content creation. Since the launch of ChatGPT in late 2022, the rise of Generative AI has marked a pivotal era, with the term Large Language Models (LLMs) becoming a ubiquitous part of daily life. LLMs have demonstrate… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

  11. arXiv:2501.00260  [pdf

    cs.CR cs.SI

    Detection and Prevention of Smishing Attacks

    Authors: Diksha Goel

    Abstract: Phishing is an online identity theft technique where attackers steal users personal information, leading to financial losses for individuals and organizations. With the increasing adoption of smartphones, which provide functionalities similar to desktop computers, attackers are targeting mobile users. Smishing, a phishing attack carried out through Short Messaging Service (SMS), has become prevale… ▽ More

    Submitted 30 December, 2024; originally announced January 2025.

    Comments: Masters Thesis

  12. arXiv:2412.09641  [pdf, other

    cs.CR cs.LG

    Machine Learning Driven Smishing Detection Framework for Mobile Security

    Authors: Diksha Goel, Hussain Ahmad, Ankit Kumar Jain, Nikhil Kumar Goel

    Abstract: The increasing reliance on smartphones for communication, financial transactions, and personal data management has made them prime targets for cyberattacks, particularly smishing, a sophisticated variant of phishing conducted via SMS. Despite the growing threat, traditional detection methods often struggle with the informal and evolving nature of SMS language, which includes abbreviations, slang,… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

  13. arXiv:2412.06722  [pdf, ps, other

    math.AP

    Normalized Solutions to the Kirchhoff-Choquard Equations with Combined Growth

    Authors: Divya Goel, Shilpa Gupta

    Abstract: This paper is devoted to the study of the following nonlocal equation: \begin{equation*} -\left(a+b\|\nabla u\|_{2}^{2(θ-1)}\right) Δu =λu+α(I_μ\ast|u|^{q})|u|^{q-2}u+(I_μ\ast|u|^{p})|u|^{p-2}u \ \hbox{in} \ \mathbb{R}^{N}, \end{equation*} with the prescribed norm $ \int_{\mathbb{R}^{N}} |u|^{2}= c^2,$ where $N\geq 3$, $0<μ<N$, $a,b,c>0$, $1<θ<\frac{2N-μ}{N-2}$,… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    MSC Class: 35A15; 35J20; 35J60

  14. arXiv:2412.04756  [pdf, other

    cs.CR cs.CL

    ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models

    Authors: Shivansh Chopra, Hussain Ahmad, Diksha Goel, Claudia Szabo

    Abstract: The increasing frequency and sophistication of cybersecurity vulnerabilities in software systems underscores the need for more robust and effective vulnerability assessment methods. However, existing approaches often rely on highly technical and abstract frameworks, which hinder understanding and increase the likelihood of exploitation, resulting in severe cyberattacks. In this paper, we introduce… ▽ More

    Submitted 19 May, 2025; v1 submitted 5 December, 2024; originally announced December 2024.

  15. arXiv:2411.15416  [pdf, other

    cs.CR

    Least Privilege Access for Persistent Storage Mechanisms in Web Browsers

    Authors: Gayatri Priyadarsini Kancherla, Dishank Goel, Abhishek Bichhawat

    Abstract: Web applications often include third-party content and scripts to personalize a user's online experience. These scripts have unrestricted access to a user's private data stored in the browser's persistent storage like cookies, localstorage and IndexedDB, associated with the host page. Various mechanisms have been implemented to restrict access to these storage objects, e.g., content security polic… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

  16. arXiv:2410.02967  [pdf, other

    cs.HC cs.AI cs.LG

    Label-Free Subjective Player Experience Modelling via Let's Play Videos

    Authors: Dave Goel, Athar Mahmoudi-Nejad, Matthew Guzdial

    Abstract: Player Experience Modelling (PEM) is the study of AI techniques applied to modelling a player's experience within a video game. PEM development can be labour-intensive, requiring expert hand-authoring or specialized data collection. In this work, we propose a novel PEM development approach, approximating player experience from gameplay video. We evaluate this approach predicting affect in the game… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

    Comments: 9 pages, 3 figures, AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment

  17. arXiv:2408.06727  [pdf, other

    eess.IV

    Machine Learning Interventions for Weed Detection using Multispectral Imagery and Unmanned Aerial Vehicles -- A Systematic Review

    Authors: Drishti Goel, Bhavya Kapur, Prem Prakash Vuppuluri

    Abstract: The growth of weeds poses a significant challenge to agricultural productivity, necessitating efficient and accurate weed detection and management strategies. The combination of multispectral imaging and drone technology has emerged as a promising approach to tackle this issue, enabling rapid and cost-effective monitoring of large agricultural fields. This systematic review surveys and evaluates t… ▽ More

    Submitted 13 August, 2024; originally announced August 2024.

  18. arXiv:2408.05754  [pdf, other

    cs.CV

    PRECISe : Prototype-Reservation for Explainable Classification under Imbalanced and Scarce-Data Settings

    Authors: Vaibhav Ganatra, Drishti Goel

    Abstract: Deep learning models used for medical image classification tasks are often constrained by the limited amount of training data along with severe class imbalance. Despite these problems, models should be explainable to enable human trust in the models' decisions to ensure wider adoption in high-risk situations. In this paper, we propose PRECISe, an explainable-by-design model meticulously constructe… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

  19. arXiv:2408.03960  [pdf, other

    cs.CR cs.SE

    Microservice Vulnerability Analysis: A Literature Review with Empirical Insights

    Authors: Raveen Kanishka Jayalath, Hussain Ahmad, Diksha Goel, Muhammad Shuja Syed, Faheem Ullah

    Abstract: Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduc… ▽ More

    Submitted 31 July, 2024; originally announced August 2024.

  20. arXiv:2406.19596  [pdf, other

    cs.CR cs.AI cs.LG

    Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

    Authors: Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe

    Abstract: This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: The manuscript has been accepted as full paper at European Symposium on Research in Computer Security (ESORICS) 2024

  21. arXiv:2404.03662  [pdf, other

    cs.NI cs.AI

    X-lifecycle Learning for Cloud Incident Management using LLMs

    Authors: Drishti Goel, Fiza Husain, Aditya Singh, Supriyo Ghosh, Anjaly Parayil, Chetan Bansal, Xuchao Zhang, Saravan Rajmohan

    Abstract: Incident management for large cloud services is a complex and tedious process and requires significant amount of manual efforts from on-call engineers (OCEs). OCEs typically leverage data from different stages of the software development lifecycle [SDLC] (e.g., codes, configuration, monitor data, service properties, service dependencies, trouble-shooting documents, etc.) to generate insights for d… ▽ More

    Submitted 15 February, 2024; originally announced April 2024.

  22. arXiv:2403.15169  [pdf, other

    cs.SE

    Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures

    Authors: Majid Abdulsatar, Hussain Ahmad, Diksha Goel, Faheem Ullah

    Abstract: The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address software security challenges such as software security risk assessment. However, existing approaches prove inefficient in accurately evaluating the security r… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  23. arXiv:2310.18571  [pdf, ps, other

    math.AG

    The Chow Ring Classes of $\mathrm{PGL}_3$ Orbit Closures in $\mathbb{G}(1, 5)$

    Authors: Gaurav Dhruv Goel

    Abstract: The space of all pencils of conics in the plane $\mathbb{P} V$ (where $\dim V = 3$) is a projective Grassmannian $\mathbb{G} (1, \mathbb{P} \mathrm{Sym}^2 V^*)$ and admits a natural $\mathrm{PGL}(V)$ action. It is a classical theorem that this action has exactly eight orbits, and in fact that the orbit of a pencil $\ell \subset \mathbb{P} \mathrm{Sym}^2 V^*$ is determined completely by its positio… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: 26 pages, 2 figures, 1 table

  24. arXiv:2310.10667  [pdf, other

    cs.CR cs.LG

    Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

    Authors: Diksha Goel

    Abstract: With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly complex. Due to the increased complexity, networks are more prone to hardware faults and highly susceptible to cyber-attacks. Therefore, for rapidly growing network-centric applications, network resilience is essential to minimize… ▽ More

    Submitted 21 September, 2023; originally announced October 2023.

    Comments: PhD Thesis

  25. arXiv:2306.10618  [pdf, ps, other

    math.AP

    High energy solutions for $p$-Kirchhoff elliptic problems with Hardy-Littlewood-Sobolev nonlinearity

    Authors: Divya Goel, Sushmita Rawat, K. Sreenadh

    Abstract: This article deals with the study of the following Kirchhoff-Choquard problem: \begin{equation*} \begin{array}{cc} \displaystyle M\left(\, \int\limits_{\mathbb{R}^N}|\nabla u|^p\right) (-Δ_p) u + V(x)|u|^{p-2}u = \left(\, \int\limits_{\mathbb{R}^N}\frac{F(u)(y)}{|x-y|^μ}\,dy \right) f(u), \;\;\text{in} \; \mathbb{R}^N, u > 0, \;\; \text{in} \; \mathbb{R}^N, \end{array} \end{equation*}… ▽ More

    Submitted 18 June, 2023; originally announced June 2023.

  26. arXiv:2305.11657  [pdf, other

    cs.GT

    Cost Sharing Public Project with Minimum Release Delay

    Authors: Mingyu Guo, Diksha Goel, Guanhua Wang, Yong Yang, Muhammad Ali Babar

    Abstract: We study the excludable public project model where the decision is binary (build or not build). In a classic excludable and binary public project model, an agent either consumes the project in its whole or is completely excluded. We study a setting where the mechanism can set different project release time for different agents, in the sense that high-paying agents can consume the project earlier t… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.07315

  27. arXiv:2304.03998  [pdf, other

    cs.NE

    Evolving Reinforcement Learning Environment to Minimize Learner's Achievable Reward: An Application on Hardening Active Directory Systems

    Authors: Diksha Goel, Aneta Neumann, Frank Neumann, Hung Nguyen, Mingyu Guo

    Abstract: We study a Stackelberg game between one attacker and one defender in a configurable environment. The defender picks a specific environment configuration. The attacker observes the configuration and attacks via Reinforcement Learning (RL trained against the observed environment). The defender's goal is to find the environment with minimum achievable reward for the attacker. We apply Evolutionary Di… ▽ More

    Submitted 8 April, 2023; originally announced April 2023.

  28. arXiv:2302.13292  [pdf, other

    cs.SI

    Discovering Top-k Structural Hole Spanners in Dynamic Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). Numerous solutions are proposed to discover SHSs; however, most of the solutions are only applicable to static networks. Since real-world networks are dynamic networks; consequentl… ▽ More

    Submitted 16 December, 2024; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2212.08239t I have updates significant portions of the draft and corrected a few mistakes in the paper

  29. arXiv:2302.12442  [pdf, other

    cs.SI

    Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: A Structural Hole Spanner (SHS) is a set of nodes in a network that act as a bridge among different otherwise disconnected communities. Numerous solutions have been proposed to discover SHSs that generally require high run time on large-scale networks. Another challenge is discovering SHSs across different types of networks for which the traditional one-model-fit-all approach fails to capture the… ▽ More

    Submitted 17 February, 2025; v1 submitted 23 February, 2023; originally announced February 2023.

  30. arXiv:2212.08239  [pdf, other

    cs.SI

    Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks

    Authors: Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo

    Abstract: Structural Hole (SH) theory states that the node which acts as a connecting link among otherwise disconnected communities gets positional advantages in the network. These nodes are called Structural Hole Spanners (SHS). SHSs have many applications, including viral marketing, information dissemination, community detection, etc. Numerous solutions are proposed to discover SHSs; however, most of the… ▽ More

    Submitted 16 February, 2025; v1 submitted 15 December, 2022; originally announced December 2022.

  31. arXiv:2210.09962  [pdf, other

    cs.CV

    Nighttime Dehaze-Enhancement

    Authors: Harshan Baskar, Anirudh S Chakravarthy, Prateek Garg, Divyam Goel, Abhijith S Raj, Kshitij Kumar, Lakshya, Ravichandra Parvatham, V Sushant, Bijay Kumar Rout

    Abstract: In this paper, we introduce a new computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing -- our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

  32. arXiv:2209.01346  [pdf, other

    cs.DC cs.AI cs.AR cs.NI cs.PF

    HammingMesh: A Network Topology for Large-Scale Deep Learning

    Authors: Torsten Hoefler, Tommaso Bonato, Daniele De Sensi, Salvatore Di Girolamo, Shigang Li, Marco Heddes, Jon Belk, Deepak Goel, Miguel Castro, Steve Scott

    Abstract: Numerous microarchitectural optimizations unlocked tremendous processing power for deep neural networks that in turn fueled the AI revolution. With the exhaustion of such optimizations, the growth of modern AI is now gated by the performance of training systems, especially their data movement. Instead of focusing on single accelerators, we investigate data-movement characteristics of large-scale t… ▽ More

    Submitted 21 October, 2022; v1 submitted 3 September, 2022; originally announced September 2022.

    Comments: published at ACM/IEEE Supercomputing (SC22)

  33. arXiv:2205.13164  [pdf, other

    cs.CL cs.LG

    Leveraging Dependency Grammar for Fine-Grained Offensive Language Detection using Graph Convolutional Networks

    Authors: Divyam Goel, Raksha Sharma

    Abstract: The last few years have witnessed an exponential rise in the propagation of offensive text on social media. Identification of this text with high precision is crucial for the well-being of society. Most of the existing approaches tend to give high toxicity scores to innocuous statements (e.g., "I am a gay man"). These false positives result from over-generalization on the training data where speci… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Comments: 10 pages, 2 figures, accepted as a long paper at The 10th International Workshop on Natural Language Processing for Social Media (SocialNLP @ NAACL 2022)

  34. arXiv:2204.08653  [pdf, other

    cs.SE cs.CL cs.LG

    On The Cross-Modal Transfer from Natural Language to Code through Adapter Modules

    Authors: Divyam Goel, Ramansh Grover, Fatemeh H. Fard

    Abstract: Pre-trained neural Language Models (PTLM), such as CodeBERT, are recently used in software engineering as models pre-trained on large source code corpora. Their knowledge is transferred to downstream tasks (e.g. code clone detection) via fine-tuning. In natural language processing (NLP), other alternatives for transferring the knowledge of PTLMs are explored through using adapters, compact, parame… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: 11 pages, 6 figures, ICPC 2022. 30th International Conference on Program Comprehension (ICPC '22), May 16--17, 2022, Virtual Event, USA}

  35. Defending Active Directory by Combining Neural Network based Dynamic Program and Evolutionary Diversity Optimisation

    Authors: Diksha Goel, Max Ward, Aneta Neumann, Frank Neumann, Hung Nguyen, Mingyu Guo

    Abstract: Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on an AD attack graph. The attacker initially has access to a set of entry nodes. The attacker can expand this set by strategically exploring edges. Every edge has a detection rate and a failure rate. The attacker aims to maximize thei… ▽ More

    Submitted 4 January, 2023; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Added reference [12] on page 3 and 4. Corrected spelling EVC to VEC on page 10

    Journal ref: Proceedings of the Genetic and Evolutionary Computation Conference, 2022, Pages 1191 to 1199

  36. arXiv:2203.06471  [pdf, ps, other

    math.AP

    Critical growth fractional Kirchhoff elliptic problems

    Authors: Divya Goel, Sushmita Rawat, K. Sreenadh

    Abstract: This article is concerned with the existence and multiplicity of positive weak solutions for the following fractional Kirchhoff-Choquard problem: \begin{equation*} \begin{array}{cc} \displaystyle M\left( \|u\|^2\right) (-Δ)^s u = \dsλf(x)|u|^{q-2}u + \left( \int\limits_Ω \frac{|u(y)|^{2^{*}_{μ,s}}}{|x-y|^ μ}\, dy\right) |u|^{2^{*}_{μ,s}-2}u \;\text{in} \; Ω, u > 0\quad \text{in} \; Ω, \,\,… ▽ More

    Submitted 11 December, 2022; v1 submitted 12 March, 2022; originally announced March 2022.

    Comments: 30 pages

    Journal ref: Advances in Differential Equations, 2023

  37. arXiv:2012.15602  [pdf, ps, other

    math.AP math.FA

    Variational framework and Lewy-Stampacchia type estimates for nonlocal operators on Heisenberg group

    Authors: Divya Goel, Vicentiu D. Radulescu, K. Sreenadh

    Abstract: The aim of this article is to derive some Lewy-Stampacchia estimates and existence of solutions for equations driven by a nonlocal integro-differential operator on the Heisenberg group.

    Submitted 31 December, 2020; originally announced December 2020.

    MSC Class: 35R03; 35R11; 49J40; 35H20

  38. arXiv:2012.12860  [pdf, ps, other

    math.AP

    On weighted $L^p$-Hardy inequality on domains in $\mathbb{R}^n$

    Authors: Divya Goel, Yehuda Pinchover, Georgios Psaradakis

    Abstract: We consider weighted $L^p$-Hardy inequalities involving the distance to the boundary of a domain in the $n$-dimensional Euclidean space with nonempty boundary. Using criticality theory, we give an alternative proof of the following result of F.~G.~Avkhadiev (2006) Theorem: Let $Ω\subsetneqq \mathbb{R}^n$, $n\geq 2$, be an arbitrary domain, $1<p<\infty$ and $α+ p>n$. Let… ▽ More

    Submitted 20 January, 2021; v1 submitted 23 December, 2020; originally announced December 2020.

    MSC Class: 49R05; 35B09; 35J92

  39. arXiv:2002.02937  [pdf, ps, other

    math.AP

    Singular doubly nonlocal elliptic problems with Choquard type critical growth nonlinearities

    Authors: Jacques Giacomoni, Divya Goel, K. Sreenadh

    Abstract: The theory of elliptic equations involving singular nonlinearities is well studied topic but the interaction of singular type nonlinearity with nonlocal nonlinearity in elliptic problems has not been investigated so far. In this article, we study the very singular and doubly nonlocal singular problem $(P_λ)$(See below). Firstly, we establish a very weak comparison principle and the optimal Sobolev… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    MSC Class: 49J35; 35A15; 35S15; 46E35; 49J52

  40. arXiv:1909.10648  [pdf, ps, other

    math.AP

    Regularity results on a class of doubly nonlocal problems

    Authors: Jacques Giacomoni, Divya Goel, K. Sreenadh

    Abstract: The purpose of this article is twofold. First, an issue of regularity of weak solution to the problem $(P)$ (See below) is addressed. Secondly, we investigate the question of $H^s$ versus $C^0$- weighted minimizers of the functional associated to problem $(P)$ and then give applications to existence and multiplicity results.

    Submitted 23 September, 2019; originally announced September 2019.

    MSC Class: 35B45; 35R09; 35B65; 35B33

  41. arXiv:1906.10628  [pdf, ps, other

    math.AP math.FA

    Brezis-Nirenberg type result for Kohn Laplacian with critical Choquard Nonlinearity

    Authors: Divya Goel, K. Sreenadh

    Abstract: In this article, we are study the following Dirichlet problem with Choquard type non linearity \[ -Δ_{\mathbb{H}} u = a u+ \left(\int_Ω\frac{|u(η)|^{Q^*_λ}}{|η^{-1}ξ|^λ}dη\right)|u|^{Q^*_λ-2}u \; \text{in}\; Ω,\quad u = 0 \; \text{ on } \partial Ω, \] where $Ω$ is a smooth bounded subset of the Heisenberg group $\mathbb{H}^N, N\in \mathbb N$ with $C^2$ boundary and $Δ_{\mathbb{H}}$ is the Kohn… ▽ More

    Submitted 1 July, 2019; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: 32 pages

  42. arXiv:1903.03450  [pdf, ps, other

    math.AP

    Critical growth elliptic problems involving Hardy-Littlewood-Sobolev critical exponent in non-contractible domains

    Authors: Divya Goel, K. Sreenadh

    Abstract: The paper is concerned with the existence and multiplicity of positive solutions of the nonhomogeneous Choquard equation over an annular type bounded domain. Precisely, we consider the following equation \[ -\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u+f \; \text{in}\; \Om,\quad u = 0 \; \text{ on } \pa \Om , \] where $\Om$ is a smooth bounded annular d… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

    Comments: 39 pages

    Journal ref: Advances in nonlinear analysis (2019)

  43. arXiv:1902.07437  [pdf, ps, other

    math.AP

    The effect of topology on the number of positive solutions of elliptic equation involving Hardy-Littlewood-Sobolev critical exponent

    Authors: Divya Goel

    Abstract: In this article we are concern for the following Choquard equation \[ -Δu = λ|u|^{q-2}u +\left(\int_Ω\frac{|u(y)|^{2^*_μ}}{|x-y|^μ} dy \right)|u|^{2^*_μ-2} u \; \text{in}\; Ω,\quad u = 0 \; \text{ on } \partial Ω, \] where $Ω$ is an open bounded set with continuous boundary in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$ and $q \in [2,2^*)$ where $2^*=\frac{2N}{N-2}$. Using Lusternik-Schni… ▽ More

    Submitted 20 February, 2019; originally announced February 2019.

    Comments: 21 pages

    MSC Class: 49J35; 35A15; 35J60

    Journal ref: Topological Methods in Nonlinear Analysis, 2019

  44. arXiv:1902.00395  [pdf, ps, other

    math.AP

    Regularity and multiplicity results for fractional $(p,q)$-Laplacian equations

    Authors: Divya Goel, Deepak Kumar, K. Sreenadh

    Abstract: This article deals with the study of the following nonlinear doubly nonlocal equation: \begin{equation*} (-Δ)^{s_1}_{p}u+\ba(-Δ)^{s_2}_{q}u = \la a(x)|u|^{δ-2}u+ b(x)|u|^{r-2} u,\; \text{ in }\; \Om, \; u=0 \text{ on } \mathbb{R}^n\setminus \Om, \end{equation*} where $\Om$ is a bounded domain in $\mathbb{R}^n$ with smooth boundary, $1< \de \le q\leq p<r \leq p^{*}_{s_1}$, with… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

    Comments: 36p

  45. arXiv:1901.11310  [pdf, ps, other

    math.AP

    Kirchhoff equations with Hardy-Littlewood-Sobolev critical nonlinearity

    Authors: Divya Goel, K. Sreenadh

    Abstract: We consider the following Kirchhoff - Choquard equation \[ -M(\|\na u\|_{L^2}^{2})\De u = \la f(x)|u|^{q-2}u+ \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u \; \text{in}\; \Om,\quad u = 0 \; \text{ on } \pa \Om , \] where $\Om$ is a bounded domain in $\mathbb{R}^N( N\geq 3)$ with $C^2$ boundary, $2^*_μ=\frac{2N-μ}{N-2}$, $1<q\leq 2$, and $f$ is a continuous real valued s… ▽ More

    Submitted 31 January, 2019; originally announced January 2019.

    Comments: 33 pages

    Journal ref: Nonlinear Analysis, 2019

  46. arXiv:1901.03444  [pdf, ps, other

    math.AP

    On the Second Eigenvalue of Combination Between Local and Nonlocal $p$-Laplacian

    Authors: Divya Goel, K. Sreenadh

    Abstract: In this paper, we study Mountain Pass Characterization of the second eigenvalue of the operator $-\De_p u -\De_{J,p}u$ and study shape optimization problems related to these eigenvalues.

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 15 pages

  47. arXiv:1804.08084  [pdf, ps, other

    math.AP

    Coron problem for nonlocal equations invloving Choquard nonlinearity

    Authors: Divya Goel, Vicentiu D. Radulescu, K. Sreenadh

    Abstract: We study the problem \[ -\De u = \left(\int_{\Om}\frac{|u(y)|^{2^*_μ}}{|x-y|^μ}dy\right)|u|^{2^*_μ-2}u, \; \text{in}\; \Om,\quad u = 0 \; \text{ on } \pa \Om , \] where $\Om$ is a smooth bounded domain in $\mathbb{R}^N( N\geq 3)$, $2^*_μ=\frac{2N-μ}{N-2}$. we prove the existence of a positive solution of the above problem in an annular type domain when the inner hole is sufficiently small.

    Submitted 17 May, 2019; v1 submitted 22 April, 2018; originally announced April 2018.

    Comments: 26pages

  48. arXiv:1710.07217  [pdf, ps, other

    math.AP

    On the first curve of Fučik Spectrum Of $p$-fractional Laplacian Operator with nonlocal normal boundary conditions

    Authors: Divya Goel, Sarika Goyal, K. Sreenadh

    Abstract: In this article, we study the Fučik spectrum of the $p$-fractional Laplace operator with nonlocal normal derivative conditions which is defined as the set of all $(a,b)\in \mb R^2$ such that… ▽ More

    Submitted 17 October, 2017; originally announced October 2017.

    Comments: arXiv admin note: text overlap with arXiv:1306.4761

  49. Light bending and perihelion precession: A unified approach

    Authors: Dieter R. Brill, Deepak Goel

    Abstract: The standard General Relativity results for precession of particle orbits and for bending of null rays are derived as special cases of perturbation of a quantity that is conserved in Newtonian physics, the Runge-Lenz vector. First this method is applied to give a derivation of these General Relativity effects for the case of the spherically symmetric Schwarzschild geometry. Then the lowest order… ▽ More

    Submitted 19 December, 1997; originally announced December 1997.

    Comments: 9 pages, LaTeX (Revtex). Submitted to Am. J. Phys

    Report number: PP98-70

    Journal ref: Am.J.Phys. 67 (1999) 316