Content Posted in 2025
Advanced Techniques in Symmetric Key Cryptanalysis, Debasmita Chakraborty
Adversarial Attack on Neural Machine Translation System, Abijith K. P.
Contributions to Analysis of Consumer Expenditure, Sreenivasa N. Iyengar
Contribution to the Linear Complementarity Problem and Completely Mixed Games, Sunil Kumar
Crystallization of the quantized function algebras of SUq(n + 1), Manabendra Giri
Essays in Industrial Organization, Nilesh Kumar Jain
Graph Neural Networks for Homogeneous and Heterogeneous Graphs: Algorithms and Applications, Sucheta Dawn
Leveraging software engineering frameworks, methods and tools to automate CRM pre-sales in real estate applications, Parthasarathi Ray
Making Cloud Storages Secure and Efficient, Avishek Majumder
Multiple Hypothesis Testing Under Dependence, Nabaneet Das
On Zero-Shot Recognition of Unseen State-Object Composition, Aditya Panda
Provable Security in Idealised Models, Chandranan Dhar
Self-Supervised Learning and its Applications in Medical Image Analysis, Siladittya Manna
Some Studies On Information Set Decoding Algorithms and Universal Hash Functions, Sreyosi Bhattacharyya
Using Eye-Gaze to Evaluate Neural Attention, Shahansha Salim