Skip to main content

Showing 1–12 of 12 results for author: Sarkar, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.04043  [pdf, other

    cs.CL cs.CY cs.LG

    The Harvard USPTO Patent Dataset: A Large-Scale, Well-Structured, and Multi-Purpose Corpus of Patent Applications

    Authors: Mirac Suzgun, Luke Melas-Kyriazi, Suproteem K. Sarkar, Scott Duke Kominers, Stuart M. Shieber

    Abstract: Innovation is a major driver of economic and social development, and information about many kinds of innovation is embedded in semi-structured data from patents and patent applications. Although the impact and novelty of innovations expressed in patent data are difficult to measure through traditional means, ML offers a promising set of techniques for evaluating novelty, summarizing contributions,… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

    Comments: Website: https://patentdataset.org/, GitHub Repository: https://github.com/suzgunmirac/hupd, Hugging Face Datasets: https://huggingface.co/datasets/HUPD/hupd

  2. arXiv:2011.11554   

    cs.LG

    ML4H Abstract Track 2020

    Authors: Emily Alsentzer, Matthew B. A. McDermott, Fabian Falck, Suproteem K. Sarkar, Subhrajit Roy, Stephanie L. Hyland

    Abstract: A collection of the accepted abstracts for the Machine Learning for Health (ML4H) workshop at NeurIPS 2020. This index is not complete, as some accepted abstracts chose to opt-out of inclusion.

    Submitted 19 November, 2020; originally announced November 2020.

  3. arXiv:1811.11079  [pdf, other

    stat.ML cs.CR cs.LG q-fin.RM

    Robust Classification of Financial Risk

    Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer

    Abstract: Algorithms are increasingly common components of high-impact decision-making, and a growing body of literature on adversarial examples in laboratory settings indicates that standard machine learning models are not robust. This suggests that real-world systems are also susceptible to manipulation or misclassification, which especially poses a challenge to machine learning models used in financial s… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: NIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services

  4. arXiv:1207.2701  [pdf

    cs.CR

    Spread Spectrum based Robust Image Watermark Authentication

    Authors: T. S. Das, V. H. Mankar, S. K. Sarkar

    Abstract: In this paper, a new approach to Spread Spectrum (SS) watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications like internet when copyright protection of digital image is required. The approach exploits two-predecessor single attractor (TPSA) cellular automata (CA) suitability to work as efficient authentication function in wavel… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: ICACC 2007 International Conference, Madurai, India, 9-10 Feb, 2007

  5. Robust Image Watermarking Under Pixel Wise Masking Framework

    Authors: V. H. Mankar, T. S. Das, S. Saha, S. K. Sarkar

    Abstract: The current paper presents a robust watermarking method for still images, which uses the similarity of discrete wavelet transform and human visual system (HVS). The proposed scheme makes the use of pixel wise masking in order to make binary watermark imperceptible to the HVS. The watermark is embedded in the perceptually significant, spatially selected detail coefficients using sub band adaptive t… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: First International Conference on Emerging Trends in Engineering and Technology ICETET 2008

  6. arXiv:1207.2694  [pdf

    cs.DM nlin.CD

    Discrete Chaotic Sequence based on Logistic Map in Digital Communications

    Authors: V. H. Mankar, T. S. Das, S. K. Sarkar

    Abstract: The chaotic systems have been found applications in diverse fields such as pseudo random number generator, coding, cryptography, spread spectrum (SS) communications etc. The inherent capability of generating a large space of PN sequences due to sensitive dependence on initial conditions has been the main reason for exploiting chaos in spread spectrum communication systems. This behaviour suggests… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: National Conference on "Emerging Trends in Electronics Engineering & Computing" (E3C 2010)

    Journal ref: National Conference on "Emerging Trends in Electronics Engineering & Computing" (E3C 2010)

  7. arXiv:1207.2687  [pdf

    cs.CR

    Performance Evaluation of Spread Spectrum Watermarking using Error Control Coding

    Authors: T. S. Das, V. H. Mankar, S. K. Sarkar

    Abstract: This paper proposes an oblivious watermarking algorithm with blind detection approach for high volume data hiding in image signals. We present a detection reliable signal adaptive embedding scheme for multiple messages in selective sub-bands of wavelet (DWT) coefficients using direct sequence spread spectrum (DS-SS) modulation technique. Here the impact of volumetric distortion sources is analyzed… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp. 708-711

    Journal ref: IET-UK International Conference on Information and Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp. 708-711

  8. arXiv:1207.2675  [pdf

    cs.CR

    Multimedia Steganographic Scheme using Multiresolution Analysis

    Authors: Tirtha sankar Das, Ayan K. Sau, V. H. Mankar, Subir K. Sarkar

    Abstract: Digital steganography or data hiding has emerged as a new area of research in connection to the communication in secured channel as well as intellectual property protection for multimedia signals. The redundancy in image representation can be exploited successfully to embed specified characteristic information with a good quality of imperceptibility. The hidden multimedia information will be commu… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: 3rd International Conference on Computers and Devices for Communication (CODEC-06) Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006

    Journal ref: 3rd International Conference on Computers and Devices for Communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta, December 18-20, 2006

  9. arXiv:1105.0377  [pdf

    cs.IT

    WiMAX Based 60 GHz Millimeter-Wave Communication for Intelligent Transport System Applications

    Authors: Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar, Soumyasree Bera

    Abstract: With the successful worldwide deployment of 3rd generation mobile communication, security aspects are ensured partly. Researchers are now looking for 4G mobile for its deployment with high data rate, enhanced security and reliability so that world should look for CALM, Continuous Air interface for Long and Medium range communication. This CALM will be a reliable high data rate secured mobile commu… ▽ More

    Submitted 2 May, 2011; originally announced May 2011.

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2, April 2011, 214-223

  10. Hybrid Scenario Based Performance Analysis of DSDV and DSR

    Authors: Koushik Majumder, Subir Kumar Sarkar

    Abstract: The area of mobile ad hoc networking has received considerable attention of the research community in recent years. These networks have gained immense popularity primarily due to their infrastructure-less mode of operation which makes them a suitable candidate for deployment in emergency scenarios like relief operation, battlefield etc., where either the pre-existing infrastructure is totally dama… ▽ More

    Submitted 11 June, 2010; v1 submitted 7 June, 2010; originally announced June 2010.

    Comments: 15 Pages

    Journal ref: International Journal of Computer Science and Information Technology 2.3 (2010) 56-70

  11. arXiv:0911.0402  [pdf

    cs.CR

    A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy

    Authors: Sudip Dogra, Ritwik Ray, Saustav Ghosh, Debharshi Bhattacharya, Subir Kr. Sarkar

    Abstract: Software piracy has been a very perilous adversary of the software based industry, from the very beginning of the development of the latter into a significant business. There has been no developed foolproof system that has been developed to appropriately tackle this vile issue. We have in our scheme tried to develop a way to embark upon this problem using a very recently developed technology of… ▽ More

    Submitted 2 November, 2009; originally announced November 2009.

    Comments: 5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 034-039, October 2009, USA

  12. arXiv:0903.1506  [pdf

    cs.NI

    Wi-Fi, WiMax and WCDMA A comparative study based on Channel Impairments and Equalization method used

    Authors: Rabindranath Bera, Sanjib Sil, Sourav Dhar, Subir K. Sarkar

    Abstract: In this paper we describe the channel impairments and equalization methods currently used in WiFi, WiMax and WCDMA. After a review of channel model for Intelligent Transportation System (ITS), we proposed an equalization method which will be useful for the estimation of strong multipath channel at a high velocity.

    Submitted 9 March, 2009; originally announced March 2009.

    Comments: 5 pages, 15 fig.,published in ISM-08, Bangalore, India