default search action
Sachin Lodha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c62]Shubham Malaviya, Manish Shukla, Saurabh Anand, Sachin Lodha:
Poster: Unmasking Label Errors: A need for Robust Cybersecurity Benchmarks. CCS 2024: 5018-5020 - [c61]Manish Shukla, Shubham Malaviya, Sachin Lodha:
Poster: Context-Based Effective Password Detection in Plaintext. CCS 2024: 5066-5068 - [c60]Surabhi Garg, Maithri Suresh, Meena Singh Dilip Thakur, M. A. Rajan, Pankaj Sahu, Mangesh S. Gharote, Manju Ramesh, Sachin Lodha:
TrapShield: Enhancing Security and Privacy in Serverless Workflows using Honeypots by Robust Adversary Penalization. IC2E 2024: 245-246 - [c59]Aditya Ahuja, Siddhasagar Pani, Srujana Kanchanapalli, R. Vigneswaran, M. A. Rajan, Sachin Lodha:
LIMBOCOIN: On the Denial-of-Service of Token based Retail CBDCs. ICBC 2024: 325-333 - [c58]Saurabh Anand, Shubham Malaviya, Manish Shukla, Sachin Lodha:
DroPacter : Compacter-based Tuning with Layer Freezing in Pre-Trained Language Model. SAC 2024: 1043-1044 - 2023
- [j13]Delton Myalil, M. A. Rajan, Manoj Apte, Sachin Lodha:
Robust Cross-Silo Federated Fraudulent Transaction Detection in Banks Using Epsilon Cluster Selection. SN Comput. Sci. 4(4): 422 (2023) - [c57]Pankaj Sahu, Shubhro Roy, Mangesh S. Gharote, Sachin Lodha:
Web Services Relocation and Reallocation for Data Residency Compliance. CCGridW 2023: 125-132 - [c56]Rishabh Kumar, Pankaj Sahu, Shubhro Roy, Sutapa Mondal, Mangesh S. Gharote, Sachin Lodha:
Privacy Regulations-Aware Storage Service Selection in Multi-Cloud. CCGridW 2023: 266-268 - [c55]Shubham Malaviya, Manish Shukla, Sachin Lodha:
Reducing Communication Overhead in Federated Learning for Pre-trained Language Models Using Parameter-Efficient Finetuning. CoLLAs 2023: 456-469 - [c54]Aditya Ahuja, R. Vigneswaran, M. A. Rajan, Sachin Lodha:
Myochain: A Blockchain Protocol for Delay Bounded Transaction Confirmation. COMSNETS 2023: 114-118 - [c53]Saurabh Anand, Manish Shukla, Sachin Lodha:
Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment. COMSNETS 2023: 159-164 - [c52]Shubham Malaviya, Manish Shukla, Pratik Korat, Sachin Lodha:
FedFAME: A Data Augmentation Free Framework based on Model Contrastive Learning for Federated Semi-Supervised Learning. SAC 2023: 1114-1121 - [i12]Gokul Chettoor Jayakrishnan, Vijayanand Banahatti, Sachin Lodha:
Design and Execution Challenges for Cybersecurity Serious Games: An Overview. CoRR abs/2307.09401 (2023) - 2022
- [j12]Sutapa Mondal, Mangesh S. Gharote, Sachin Premsukh Lodha:
Privacy of Personal Information: Going incog in a goldfish bowl. ACM Queue 20(3): 41-87 (2022) - [c51]Gokul Chettoor Jayakrishnan, Vijayanand Banahatti, Sachin Lodha, Gangadhara Reddy Sirigireddy, Shree Nivas:
Housie: A Multiplayer Game for Cybersecurity Training and Evaluation. CHI PLAY 2022: 17-23 - [c50]Shubhro Roy, Arun Ramamurthy, Anand Pawar, Mangesh S. Gharote, Sachin Lodha:
Secure Scheduling of Scientific Workflows in Cloud. CLOSER 2022: 170-177 - [c49]Arun Kumar Jindal, Vijayanand Banahatti, Sachin Lodha:
People to People (P2P) Privacy in Mobile Devices. COMSNETS 2022: 1-6 - [c48]Sanjay Seetharaman, Shubham Malaviya, Rosni K. Vasu, Manish Shukla, Sachin Lodha:
Influence Based Defense Against Data Poisoning Attacks in Online Learning. COMSNETS 2022: 1-6 - [c47]Neeraj Kumar, Sparsh Jain, Manish Shukla, Sachin Lodha:
Investigating Users' Perception, Security Awareness and Cyber-Hygiene Behaviour Concerning QR Code as an Attack Vector. HCI (40) 2022: 506-513 - [c46]Pankaj Sahu, Shubhro Roy, Mangesh S. Gharote, Sutapa Mondal, Sachin Lodha:
Cloud Storage and Processing Service Selection considering Tiered Pricing and Data Regulations. UCC 2022: 92-101 - 2021
- [c45]Arun Ramamurthy, Priyanka Devi Pantula, Mangesh S. Gharote, Kishalay Mitra, Sachin Lodha:
Multi-objective Optimization for Virtual Machine Allocation in Computational Scientific Workflow under Uncertainty. CLOSER 2021: 240-247 - [c44]Nitesh Emmadi, Imtiyazuddin Shaik, Harshal Tupsamudre, Harika Narumanchi, Rajan Mindigal Alasingara Bhattachar, Sachin Premsukh Lodha:
Privacy-Preserving Password Strength Meters with FHE. CSCML 2021: 94-103 - [c43]Neeraj Kumar, Sukhada Ghewari, Harshal Tupsamudre, Manish Shukla, Sachin Lodha:
When Diversity Meets Hostility: A Study of Domain Squatting Abuse in Online Banking. eCrime 2021: 1-15 - [c42]Harshal Tupsamudre, Saket Saurabh, Arun Ramamurthy, Mangesh S. Gharote, Sachin Lodha:
A divide and conquer approach for web services location allocation problem. GECCO Companion 2021: 1346-1354 - [c41]Imtiyazuddin Shaik, Raj Chaudhari, M. A. Rajan, Jay Gubbi, P. Balamuralidhar, Sachin Lodha:
WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE. ICISS 2021: 198-211 - [c40]Delton Myalil, M. A. Rajan, Manoj Apte, Sachin Lodha:
Robust Collaborative Fraudulent Transaction Detection using Federated Learning. ICMLA 2021: 373-378 - [c39]Gokul Chettoor Jayakrishnan, Vijayanand Banahatti, Sachin Lodha:
GOVID: Repurposing Serious Game for Enterprise COVID-19 Awareness. IndiaHCI 2021: 11-18 - [c38]Shree Nivas, C. J. Gokul, Vijayanand Banahatti, Sachin Lodha:
Visuals Triumph in a Curious Case of Privacy Policy. INTERACT (4) 2021: 732-741 - [c37]Kumar Vidhani, Gurpriya Bhatia, Mangesh S. Gharote, Sachin Lodha:
ThValRec: threshold value recommendation approach for ontology matching. OM@ISWC 2021: 217-218 - [i11]Sanjay Seetharaman, Shubham Malaviya, Rosni K. Vasu, Manish Shukla, Sachin Lodha:
Influence Based Defense Against Data Poisoning Attacks in Online Learning. CoRR abs/2104.13230 (2021) - [i10]Rosni K. Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha:
Gradient-based Data Subversion Attack Against Binary Classifiers. CoRR abs/2105.14803 (2021) - [i9]Harshal Tupsamudre, Sparsh Jain, Sachin Lodha:
PhishMatch: A Layered Approach for Effective Detection of Phishing URLs. CoRR abs/2112.02226 (2021) - 2020
- [c36]Arun Ramamurthy, Saket Saurabh, Mangesh S. Gharote, Sachin Lodha:
Selection of Cloud Service Providers for Hosting Web Applications in a Multi-cloud Environment. SCC 2020: 202-209 - [c35]Nitin Phuke, Saket Saurabh, Mangesh S. Gharote, Sachin Lodha:
PETA: Privacy Enabled Task Allocation. SCC 2020: 226-233 - [c34]Manish Shukla, Sachin Lodha:
rProfiler - Assessing Insider Influence on Enterprise Assets. CCS 2020: 2129-2131 - [c33]Harshal Tupsamudre, Monika Sahu, Kumar Vidhani, Sachin Lodha:
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage. Financial Cryptography Workshops 2020: 192-206 - [c32]Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha:
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. ICISS 2020: 97-116 - [c31]Sukanya Vaddepalli, Shree Nivas, Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
PassO - New Circular Patter Lock Scheme Evaluation. MobileHCI (Extended Abstracts) 2020: 19:1-19:5 - [c30]Gurpriya Bhatia, Kumar Vidhani, Mangesh S. Gharote, Sachin Lodha:
A Framework to Generate Reference Sets for Ontology Matching Algorithms. ISWC (Demos/Industry) 2020: 339-344 - [c29]Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha, Sankalp Pandit:
Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise. SOUPS @ USENIX Security Symposium 2020: 1-18 - [c28]Arun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan M. A, Sachin Lodha:
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption. TrustCom 2020: 1127-1134 - [e4]Shlomi Dolev, Vladimir Kolesnikov, Sachin Lodha, Gera Weiss:
Cyber Security Cryptography and Machine Learning - Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings. Lecture Notes in Computer Science 12161, Springer 2020, ISBN 978-3-030-49784-2 [contents] - [i8]Manish Shukla, Rajan M. A, Sachin Lodha, Gautam Shroff, Ramesh Raskar:
Privacy Guidelines for Contact Tracing Applications. CoRR abs/2004.13328 (2020) - [i7]Rajan M. A, Manish Shukla, Sachin Lodha:
A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications. CoRR abs/2005.10634 (2020) - [i6]Harshal Tupsamudre, Sachin Lodha:
Passwords: Divided they Stand, United they Fall. CoRR abs/2009.03062 (2020)
2010 – 2019
- 2019
- [j11]Mangesh S. Gharote, Nitin Phuke, Rahul Patil, Sachin Lodha:
Multi-objective stable matching and distributional constraints. Soft Comput. 23(9): 2995-3011 (2019) - [c27]Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha:
Force vs. Nudge: Comparing Users' Pattern Choices on SysPal and TinPal. CCS 2019: 2537-2539 - [c26]Manish Shukla, Kumar Vidhani, Gangadhara Reddy Sirigireddy, Vijayanand Banahatti, Sachin Lodha:
pFilter: Retrofitting Legacy Applications for Data Privacy. CCS 2019: 2573-2575 - [c25]Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha:
Everything Is in the Name - A URL Based Approach for Phishing Detection. CSCML 2019: 231-248 - [e3]Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung:
Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings. Lecture Notes in Computer Science 11527, Springer 2019, ISBN 978-3-030-20950-6 [contents] - [i5]Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha:
Extended- Force vs Nudge : Comparing Users' Pattern Choices on SysPal and TinPal. CoRR abs/1912.04231 (2019) - 2018
- [c24]Gokul CJ, Sankalp Pandit, Sukanya Vaddepalli, Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha:
PHISHY - A Serious Game to Train Enterprise Users on Phishing Awareness. CHI PLAY (Companion) 2018: 169-181 - [c23]Harshal Tupsamudre, Rahul Wasnik, Shubhankar Biswas, Sankalp Pandit, Sukanya Vaddepalli, Aishwarya Shinde, C. J. Gokul, Vijayanand Banahatti, Sachin Lodha:
GAP: A Game for Improving Awareness About Passwords. JCSG 2018: 66-78 - [e2]Itai Dinur, Shlomi Dolev, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. Lecture Notes in Computer Science 10879, Springer 2018, ISBN 978-3-319-94146-2 [contents] - 2017
- [j10]Mangesh S. Gharote, Rahul Patil, Sachin Lodha:
Scatter search for trainees to software project requirements stable allocation. J. Heuristics 23(4): 257-283 (2017) - [c22]Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas:
Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. AsiaCCS 2017: 400-407 - [c21]Sutapa Mondal, Manish Shukla, Sachin Lodha:
Privacy Aware Temporal Profiling of Emails in Distributed Setup. CIKM 2017: 1229-1238 - [e1]Shlomi Dolev, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings. Lecture Notes in Computer Science 10332, Springer 2017, ISBN 978-3-319-60079-6 [contents] - 2016
- [c20]Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha:
POSTER: Improved Markov Strength Meters for Passwords. CCS 2016: 1775-1777 - [c19]Manish Shukla, Sutapa Mondal, Sachin Lodha:
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat. CCS 2016: 1784-1786 - [c18]Mandar Kulkarni, Shirish Subhash Karande, Sachin Lodha:
Unsupervised Word Clustering Using Deep Features. DAS 2016: 263-268 - [c17]Purushotam G. Radadia, Rahul Kumar, Kanika Kalra, Shirish Karande, Sachin Lodha:
On Employing a Highly Mismatched Crowd for Speech Transcription. INTERSPEECH 2016: 3017-3021 - [i4]Yash Bhalgat, Mandar Kulkarni, Shirish Karande, Sachin Lodha:
Stamp processing with examplar features. CoRR abs/1609.05001 (2016) - 2015
- [j9]Mangesh S. Gharote, Rahul Patil, Sachin Lodha, Rajiv Raman:
Assignment of trainees to software project requirements: A stable matching based approach. Comput. Ind. Eng. 87: 228-237 (2015) - [c16]Manish Shukla, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha:
POSTER: WinOver Enterprise Dark Data. CCS 2015: 1674-1676 - [c15]Sandhya Thaskani, Shirish Karande, Sachin Lodha:
Multi-view image inpainting with sparse representations. ICIP 2015: 1414-1418 - 2013
- [j8]John Augustine, Qi Han, Philip Loden, Sachin Lodha, Sasanka Roy:
Tight Analysis of Shortest Path Convergecast in Wireless Sensor Networks. Int. J. Found. Comput. Sci. 24(1): 31-50 (2013) - [c14]Manish Shukla, Purushotam G. Radadia, Shirish Karande, Sachin Lodha:
On the real-time masking of the sound of credit cards using hot patching. CCS 2013: 1351-1354 - [c13]Srinivasan Iyengar, Shirish Karande, Sachin Lodha:
English to Hindi Translation Protocols for an Enterprise Crowd. HCOMP (Works in Progress / Demos) 2013 - 2012
- [c12]Mangesh S. Gharote, Dilys Thomas, Sachin Lodha:
Excel Solvers for the Traveling Salesman Problem. COMAD 2012: 103-107 - [c11]Sachin Lodha, Nikhil Patwardhan, Ashim Roy, Sharada Sundaram, Dilys Thomas:
Data Privacy Using MASKETEERTM. ICTAC 2012: 151-158 - [c10]Arijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha:
Negotiation-based privacy preservation scheme in internet of things platform. SECURIT 2012: 75-84 - 2011
- [c9]John Augustine, Qi Han, Philip Loden, Sachin Lodha, Sasanka Roy:
Tight Analysis of Shortest Path Convergecast in Wireless Sensor Networks. CATS 2011: 31-40 - 2010
- [j7]Mustaq Ahmed, Sandip Das, Sachin Lodha, Anna Lubiw, Anil Maheshwari, Sasanka Roy:
Approximation algorithms for shortest descending paths in terrains. J. Discrete Algorithms 8(2): 214-230 (2010) - [c8]Sangameshwar Patil, Sasanka Roy, John Augustine, Amanda Redlich, Sachin Lodha, Harrick M. Vin, Anand Deshpande, Mangesh S. Gharote, Ankit Mehrotra:
Minimizing Testing Overheads in Database Migration Lifecycle. COMAD 2010: 191
2000 – 2009
- 2009
- [i3]John Augustine, Qi Han, Philip Loden, Sachin Lodha, Sasanka Roy:
Energy-Efficient Shortest Path Algorithms for Convergecast in Sensor Networks. CoRR abs/0902.3517 (2009) - 2008
- [i2]Mustaq Ahmed, Sandip Das, Sachin Lodha, Anna Lubiw, Anil Maheshwari, Sasanka Roy:
Approximation Algorithms for Shortest Descending Paths in Terrains. CoRR abs/0805.1401 (2008) - 2007
- [j6]Sarang Aravamuthan, Sachin Lodha:
The average transmission overhead for broadcast encryption. J. Math. Cryptol. 1(4): 373 (2007) - [c7]Sasanka Roy, Sachin Lodha, Sandip Das, Anil Maheshwari:
Approximate Shortest Descent Path on a Terrain. CCCG 2007: 189-192 - [c6]Sachin Lodha, Dilys Thomas:
Probabilistic Anonymity. PinKDD 2007: 56-79 - 2006
- [j5]Sarang Aravamuthan, Sachin Lodha:
Covering Codes for Hats-on-a-line. Electron. J. Comb. 13(1) (2006) - [j4]Navin Goyal, Sachin Lodha, S. Muthukrishnan:
The Graham-Knowlton Problem Revisited. Theory Comput. Syst. 39(3): 399-412 (2006) - [j3]Béla Csaba, Sachin Lodha:
A randomized on-line algorithm for the k-server problem on a line. Random Struct. Algorithms 29(1): 82-104 (2006) - [i1]Sarang Aravamuthan, Sachin Lodha:
The Average Transmission Overhead of Broadcast Encryption. IACR Cryptol. ePrint Arch. 2006: 324 (2006) - 2005
- [j2]Murali K. Ganapathy, Sachin Lodha:
Search locally to arrange cyclically. Electron. Notes Discret. Math. 19: 187-193 (2005) - [c5]Sarang Aravamuthan, Sachin Lodha:
An Optimal Subset Cover for Broadcast Encryption. INDOCRYPT 2005: 221-231 - 2004
- [c4]Murali K. Ganapathy, Sachin Lodha:
On Minimum Circular Arrangement. STACS 2004: 394-405 - 2002
- [j1]Ayman Khalfalah, Sachin Lodha, Endre Szemerédi:
Tight bound for the density of sequence of integers the sum of no two of which is a perfect square. Discret. Math. 256(1-2): 243-255 (2002) - [c3]József Beck, Sachin Lodha:
Efficient proper 2-coloring of almost disjoint hypergraphs. SODA 2002: 598-605 - 2001
- [c2]Stefan Langerman, Sachin Lodha, Rahul Shah:
Algorithms for Efficient Filtering in Content-Based Multicast. ESA 2001: 428-439
1990 – 1999
- 1998
- [c1]William Aiello, Sachin Lodha, Rafail Ostrovsky:
Fast Digital Identity Revocation (Extended Abstract). CRYPTO 1998: 137-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint