Publications
2025
-
AAAIHigher Order Structures For Graph ExplanationsIn The 39th Annual AAAI Conference on Artificial Intelligence, 2025
2024
-
UniReps @ NeurIPSEmergence of Text Semantics in CLIP Image EncodersIn UniReps: 2nd Edition of the Workshop on Unifying Representations in Neural Models, 2024
-
TMLRCorrective Machine UnlearningTransactions on Machine Learning Research, 2024
-
MLC @ NeurIPSLLM Vocabulary Compression for Low-Compute EnvironmentsIn Workshop on Machine Learning and Compression, NeurIPS 2024, 2024
-
NeurIPSRandom Representations Outperform Online Continually Learned RepresentationsIn The Thirty-eighth Annual Conference on Neural Information Processing Systems, 2024
-
MathAI @ NeurIPSWu’s Method Boosts Symbolic AI to Rival Silver Medalists and AlphaGeometry to Outperform Gold Medalists at IMO GeometryIn The 4th Workshop on Mathematical Reasoning and AI at NeurIPS’24, 2024
-
ICMLRepresentation Surgery: Theory and Practice of Affine SteeringIn Forty-first International Conference on Machine Learning, 2024
-
ICMLThe WMDP Benchmark: Measuring and Reducing Malicious Use with UnlearningIn Forty-first International Conference on Machine Learning, 2024
-
CoLLAs-WSanity Checks for Evaluating Graph UnlearningIn Third Conference on Lifelong Learning Agents - Workshop Track, 2024
-
KIL @ KDDTowards Infusing Auxiliary Knowledge for Distracted Driver DetectionIn Fourth Workshop on Knowledge-infused Learning co-located with 30th ACM KDD Conference, Barcelona, Spain, 2024
-
ICWSMTight Sampling in Unbounded NetworksProceedings of the International AAAI Conference on Web and Social Media, 2024
2023
-
repl4nlp @ ACLProbing Negation in Language Models2023
2022
-
Towards adversarial evaluations for inexact machine unlearningarXiv preprint arXiv:2201.06640, 2022
2021
-
GermEvalPrecog-LTRC-IIITH at GermEval 2021: Ensembling Pre-Trained Language Models with Feature EngineeringIn Proceedings of the GermEval 2021 Shared Task on the Identification of Toxic, Engaging, and Fact-Claiming Comments, 2021
2012
-
LBSNWe Know Where You Live: Privacy Characterization of Foursquare Behavior4th International Workshop on Location-Based Social Networks (LBSN 2012), 2012
-
Tring! Tring! - An Exploration and Analysis of Interactive Voice Response SystemsIndiaHCI, 2012
-
Credibility Ranking of Tweets during High Impact EventsWorkshop on Privacy and Security in Online Social Media, Co-located with WWW, 2012
2011
-
HotMobile
-
IEEE SOLIEnhancing the Rural Self Help Group – Bank Linkage ProgramIEEE International Conference on Service Operations and Logistics, and Informatics, 2011
-
Phi.sh/$oCiaL: The Phishing Landscape through Short URLs8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS, 2011
-
Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasksaccepted at Information Integration on the Web (IIWeb), Co-located workshop at WWW, 2011
-
\@Twitter Credibility Ranking of Tweets on Events #breakingnews2011
-
Twitter Explodes with Activity in Mumbai Blasts! A Lifeline or an Unmonitored Daemon in the Lurking?2011precog.iiitd.edu.in/Publications_files/AG_PK_TR_2011.pdf
-
Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud StorageIn Symposium on Usable Privacy and Security (SOUPS), 2011
-
Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social NetworksAccepted at Third International Conference on Social Computing (Short paper), 2011
-
Marasim: A Novel Jigsaw Based Authentication Scheme using TaggingTo appear In Proceedings of the 29th ACM International Conference on Human Factors in Computing Systems. CHI., 2011
-
SMSAssassin : Crowdsourcing Driven Mobile-based System for SMS Spam FilteringAccepted at HotMobile, 2011
2010
-
Cue : A Framework for Generating Meaningful Feedback in XACML3rd ACM Workshop on Assurable and Usable Security Configuration (in conjunction with CCS 2010), 2010
-
The Unique Identification Number Project: Challenges and RecommendationsThe Third International Conference on Ethics and Policy of Biometrics and International Data Sharing (ICEB), 2010
-
Anti - Terrorism in IndiaTerrorism and New Media: Building a Research Network, 2010
2009
-
Policy framework for security and privacy managementIBM J. Res. Dev., 2009
-
Anti-phishing landing page: Turning a 404 into a teachable moment for end usersConference on Email and Anti-Spam, 2009
-
School of phish: a real-world evaluation of anti-phishing trainingIn Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, California, 2009
-
PhishGuru: A System for Educating Users about Semantic AttacksSchool of Computer Science, Carnegie Mellon University, 2009http://reports-archive.adm.cs.cmu.edu/anon/isr2009/abstracts/09-106.html
2008
-
A Contextual Method for Evaluating Privacy PreferencesIn Policies and Research in Identity Management (IDMAN), 2008
-
Lessons From a Real World Evaluation of Anti-Phishing Traininge-Crime Researchers Summit, Anti-Phishing Working Group, 2008
2007
-
A Survey of Privacy Policy LanguagesWorkshop on Usable IT Security Management (USM ’07) at Symposium On Usable Privacy and Security ’07, 2007
-
Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfere-Crime Researchers Summit, Anti-Phishing Working Group, 2007
-
Protecting people from phishing: the design and evaluation of an embedded training email systemIn CHI ’07: Proceedings of the SIGCHI conference on Human factors in computing systems, San Jose, California, USA, 2007
2005
-
Privacy in India: Attitudes and AwarenessIn Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET2005), Dubrovnik, Croatia, 2005