Upasna Singh | DIAT Pune (original) (raw)

Uploads

Papers by Upasna Singh

Research paper thumbnail of Evolution of Optimal MLFFNN Design: A Novel VLC-GA Approach

Lecture Notes in Electrical Engineering, 2020

Research paper thumbnail of Generative Adversarial Networks : A Survey

Generative Modelling has been a very extensive area of research since it finds immense use cases ... more Generative Modelling has been a very extensive area of research since it finds immense use cases across multiple domains. Various models have been proposed in the recent past including Fully Visible Belief Nets, NADE, MADE, Pixel RNN Variational Auto Encoders, Markov Chain, and Generative Adversarial Networks. Amongst all the models, Generative Adversarial Networks have been consistently showing huge potential and developments in the area of Art, Music, SemiSupervised learning, Handling Missing data, Drug Discovery, and unsupervised learning. This emerging technology has reshaped the research landscape in the field of generative modeling. The research in the area of Generative Adversarial Networks (GANs) was introduced by Ian J. Goodfellow et al in 2014 [1]. However, since its inception, various models have been proposed over the years and are considered state-of-the-art models in generative modeling. In this survey, we provide a comprehensive review of the original GAN model and it...

Research paper thumbnail of Derecho privado y modernización. América Latina y Europa en la primera mitad del siglo XX

Global Perspectives on Legal History, 2015

Research paper thumbnail of Forensic Implications of Cortana Application in Windows 10

Advances in Intelligent Systems and Computing, 2018

Research paper thumbnail of Acquisition and Analysis of Forensic Artifacts from Raspberry Pi an Internet of Things Prototype Platform

Advances in Intelligent Systems and Computing

The emergence of novel devices with admissible computational and communication capabilities has r... more The emergence of novel devices with admissible computational and communication capabilities has resulted in fabrication of portable and customizable Internet of Things (IoT) products like Raspberry Pi (RPi). The rapid proliferation of such devices has created new opportunities for offensive users and offers considerable challenges to digital investigators. It is necessary for investigators to diligently understand the implicit data formats and the types of evidence present in such devices. In this chapter, we present trade-off triangle which highlights the importance of digital forensics process towards the scenario of IoT enabled services. This chapter also proposes a common methodology for investigating forensic artifacts on IoT prototyping hardware platform. Based on the proposed methodology, a proof-of-concept tool called as RIFT has been developed as an outcome of research that aims the acquisition and preservation of forensically relevant static as well as volatile artifacts from RPi-IoT platform. Several experiments were carried out on the considered platform to reveal the vital evidence that can noticeably assist in forensic investigation. Finally, the preserved evidences are evaluated and presented to illustrate their usefulness and significances in digital forensic.

Research paper thumbnail of C Tree based Air Target Classification Using Kinematics

International Journal of Computer and Communication Technology

Since the improvement in Anti Radar Material technology and stealth technology grows, there are i... more Since the improvement in Anti Radar Material technology and stealth technology grows, there are immense counter measures that have opened to deny such technologies for classification to the adversary. At the same time it is observed that radar is continuously tracking the air target. This track data represents the kinematics which can be efficiently manipulated for effective classification without being deceived. The present study uses decision tree based classifier, specifically Classification and Regression Tree (CRT) algorithm over certain significant feature vectors. It classifies the data set of an air target into a target class where feature vectors are derived from the Radar Track Data using Matlab code. The work presented here aims to assess the performance of CRT. Although the methods and results presented here are for Air Target Classification, they may give insight for other applications.

Research paper thumbnail of Efficiently searching target data traces in storage devices with region based random sector sampling approach

Research paper thumbnail of Significant data region identification and analysis using k -means in large storage drive forensics

Research paper thumbnail of Ranking Terrorist Nodes of 9/11 Network Using Analytical Hierarchy Process with Social Network Analysis

Research paper thumbnail of An intelligent approach for examining and detecting target data fragments in suspected large storage drives

Research paper thumbnail of Social Network Analysis (SNA): A Vision for Counter-Terrorism Approach in Modern Indian Defence Sector

Research paper thumbnail of Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment

International Journal of Computer Sciences and Engineering

Research paper thumbnail of Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability

Research paper thumbnail of Leveraging the Windows Amcache.hve File in Forensic Investigations

Journal of Digital Forensics, Security and Law

Research paper thumbnail of Differential Evolution Based Significant Data Region Identification on Large Storage Drives

Studies in Computational Intelligence, 2017

Research paper thumbnail of A forensic insight into windows 10 cortana search

Computers & Security, 2017

Research paper thumbnail of A Survey on Social Network Analysis for Counter-Terrorism

International Journal of Computer Applications, Feb 18, 2015

Research paper thumbnail of A forensic insight into Windows 10 Jump Lists

Digital Investigation, 2016

Research paper thumbnail of A Survey on Multimedia File Carving

International Journal of Computer Science & Engineering Survey, 2015

Research paper thumbnail of Detection of data theft using fuzzy inference system

2013 3rd Ieee International Advance Computing Conference, 2013

Research paper thumbnail of Evolution of Optimal MLFFNN Design: A Novel VLC-GA Approach

Lecture Notes in Electrical Engineering, 2020

Research paper thumbnail of Generative Adversarial Networks : A Survey

Generative Modelling has been a very extensive area of research since it finds immense use cases ... more Generative Modelling has been a very extensive area of research since it finds immense use cases across multiple domains. Various models have been proposed in the recent past including Fully Visible Belief Nets, NADE, MADE, Pixel RNN Variational Auto Encoders, Markov Chain, and Generative Adversarial Networks. Amongst all the models, Generative Adversarial Networks have been consistently showing huge potential and developments in the area of Art, Music, SemiSupervised learning, Handling Missing data, Drug Discovery, and unsupervised learning. This emerging technology has reshaped the research landscape in the field of generative modeling. The research in the area of Generative Adversarial Networks (GANs) was introduced by Ian J. Goodfellow et al in 2014 [1]. However, since its inception, various models have been proposed over the years and are considered state-of-the-art models in generative modeling. In this survey, we provide a comprehensive review of the original GAN model and it...

Research paper thumbnail of Derecho privado y modernización. América Latina y Europa en la primera mitad del siglo XX

Global Perspectives on Legal History, 2015

Research paper thumbnail of Forensic Implications of Cortana Application in Windows 10

Advances in Intelligent Systems and Computing, 2018

Research paper thumbnail of Acquisition and Analysis of Forensic Artifacts from Raspberry Pi an Internet of Things Prototype Platform

Advances in Intelligent Systems and Computing

The emergence of novel devices with admissible computational and communication capabilities has r... more The emergence of novel devices with admissible computational and communication capabilities has resulted in fabrication of portable and customizable Internet of Things (IoT) products like Raspberry Pi (RPi). The rapid proliferation of such devices has created new opportunities for offensive users and offers considerable challenges to digital investigators. It is necessary for investigators to diligently understand the implicit data formats and the types of evidence present in such devices. In this chapter, we present trade-off triangle which highlights the importance of digital forensics process towards the scenario of IoT enabled services. This chapter also proposes a common methodology for investigating forensic artifacts on IoT prototyping hardware platform. Based on the proposed methodology, a proof-of-concept tool called as RIFT has been developed as an outcome of research that aims the acquisition and preservation of forensically relevant static as well as volatile artifacts from RPi-IoT platform. Several experiments were carried out on the considered platform to reveal the vital evidence that can noticeably assist in forensic investigation. Finally, the preserved evidences are evaluated and presented to illustrate their usefulness and significances in digital forensic.

Research paper thumbnail of C Tree based Air Target Classification Using Kinematics

International Journal of Computer and Communication Technology

Since the improvement in Anti Radar Material technology and stealth technology grows, there are i... more Since the improvement in Anti Radar Material technology and stealth technology grows, there are immense counter measures that have opened to deny such technologies for classification to the adversary. At the same time it is observed that radar is continuously tracking the air target. This track data represents the kinematics which can be efficiently manipulated for effective classification without being deceived. The present study uses decision tree based classifier, specifically Classification and Regression Tree (CRT) algorithm over certain significant feature vectors. It classifies the data set of an air target into a target class where feature vectors are derived from the Radar Track Data using Matlab code. The work presented here aims to assess the performance of CRT. Although the methods and results presented here are for Air Target Classification, they may give insight for other applications.

Research paper thumbnail of Efficiently searching target data traces in storage devices with region based random sector sampling approach

Research paper thumbnail of Significant data region identification and analysis using k -means in large storage drive forensics

Research paper thumbnail of Ranking Terrorist Nodes of 9/11 Network Using Analytical Hierarchy Process with Social Network Analysis

Research paper thumbnail of An intelligent approach for examining and detecting target data fragments in suspected large storage drives

Research paper thumbnail of Social Network Analysis (SNA): A Vision for Counter-Terrorism Approach in Modern Indian Defence Sector

Research paper thumbnail of Survey on User Group Revocation and Integrity Auditing of Shared Data in Cloud Environment

International Journal of Computer Sciences and Engineering

Research paper thumbnail of Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability

Research paper thumbnail of Leveraging the Windows Amcache.hve File in Forensic Investigations

Journal of Digital Forensics, Security and Law

Research paper thumbnail of Differential Evolution Based Significant Data Region Identification on Large Storage Drives

Studies in Computational Intelligence, 2017

Research paper thumbnail of A forensic insight into windows 10 cortana search

Computers & Security, 2017

Research paper thumbnail of A Survey on Social Network Analysis for Counter-Terrorism

International Journal of Computer Applications, Feb 18, 2015

Research paper thumbnail of A forensic insight into Windows 10 Jump Lists

Digital Investigation, 2016

Research paper thumbnail of A Survey on Multimedia File Carving

International Journal of Computer Science & Engineering Survey, 2015

Research paper thumbnail of Detection of data theft using fuzzy inference system

2013 3rd Ieee International Advance Computing Conference, 2013

Log In