Gupta, Neha
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Change detection using multispectral satellite images: a systematic review of literature Vasantrao, Chafle Pratiksha; Gupta, Neha; Mishra, Anoop Kumar; Bhavekar, Girish S.; Gupta, Madhav Kumar
Bulletin of Electrical Engineering and Informatics Vol 13, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i4.5966

Abstract

Change detection (CD) provides information about the changes on earth’s surface over a period of time. Many algorithms have been proposed over the years for effective CD of satellite imagery. This paper presents the steps to preprocess the captured satellite images, which can be used to perform predictive analysis of earth’s surface by CD techniques. To design a highly effective system for CD, it is recommended that algorithm designers select efficient algorithms from any given application. Thus, this paper presents and investigates the review of most appropriate literature on CD, where CD techniques have been presented into three groups; i) thresholding, ii) clustering, and iii) deep learning. The first two categories mainly rely on the traditional machine learning, whereas the last one exploits the state-of-the-art deep learning models. At the end, the standard methods are summarized based on advantages, limitation, and research gap.
A novel boundary adaptive oversampling approach for intrusion detection Kaur, Ritinder; Gupta, Neha
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp518-529

Abstract

Managing unbalanced datasets is a significant challenge in intrusion detection, since uncommon assaults are often obscured by the bulk of regular network traffic. In order to mitigate the effects of class imbalance and improve intrusion detection system (IDS) performance, it is necessary to use a variety of imbalanced learning algorithms. Methods of data augmentation such as adaptive synthetic sampling (ADASYN) and synthetic minority oversampling technique (SMOTE) are useful in addressing class imbalance. This paper introduces a novel technique to data resampling where decision tree-generated decision boundaries are used to conduct ADASYN on complicated and unusual samples. When this method’s efficacy was evaluated using the standard NSL-KDD dataset, the accuracy of the unusual class u2r was increased to 42% and, for r2l it was improved to 83%, respectively. The UNSW-NB 15 dataset has been used for further validation of the method, and its statistical significance has been asserted by comparing the suggested method to other oversampling techniques.
Performance analysis of the proxy-based and collusion-resistant revocable CPABE framework Chawla, Shobha; Gupta, Neha
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 1: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i1.pp378-387

Abstract

An efficient revocation of access rights in ciphertext policy attribute-based encryption (CPABE) schemes has multiple challenges, particularly for lightweight devices. Thus, extensive research on the existing studies enforcing and governing access control has been conducted. The methodologies used in the existing CPABE (bilinear pairing cryptography based) schemes to revoke users at the system and attribute levels have been focused on in the current study. The existing studies have been examined on the basis of the following parameters for revocation: type of revocation addressed, level of collusion resistance, dynamicity achieved, scalability of revocation, and computational cost incurred. It has been observed in the study that no single scheme achieves all the revocation properties and addresses both types of revocation. The module proposed in proxy-based and collusion-resistant multi-authority revocable CPABE (PCMR-CPABE) efficiently addresses both types of revocation and is fully collusion-resistant, dynamic, and scalable. The present paper extends the study on PCMRCPABE and presents a performance analysis of the module in terms of functional specifications and computational cost. The presented analysis has compared the performance of the existing cutting-edge schemes with the PCMR-CPABE module and has proved that the proposed module is better in terms of functionality and is computationally inexpensive.