About
307
Publications
103,500
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,451
Citations
Introduction
Punam Bedi is a Senior Professor in the Department of Computer Science, University of Delhi since July 2018. She was the Head of Department of Computer Science, University of Delhi during Oct. 2005 - Oct 2008. Before joining the Department of Computer Science, University of Delhi in January 2002, she worked as a Lecturer/ Reader in the Deshbandhu College, University of Delhi from January 1987.
She is mainly working in the area of designing and developing intelligent systems. She is using multi
Current institution
Additional affiliations
March 2007 - present
Publications
Publications (307)
Large Language Models (LLMs) are making a big impact in Artificial Intelligence due to their ability to perform tasks as humans. However, using LLMs in many domain-specific tasks is a relatively unexplored area, specifically in disease diagnosis. This is due to challenges such as multiple modalities in patient clinical information and LLM's high me...
Artificial Intelligence (AI) can play a significant role by assisting healthcare professionals in disease diagnosis, which is a critical step towards a patient’s treatment. Most of the research work in disease diagnosis systems predicts the presence or absence of a given single disease in a patient. However, there are only a few studies on multiple...
Wargames play a critical role in training of military officers/commanders for operations planning and execution. A typical training wargame may involve a large number of players as part of more than one competing forces. It is often desirable to reduce number of players to improve playability of wargames, which is in conflict with the requirements...
Wargames play a critical role in training of military officers/commanders for operations planning and execution. A typical training wargame may involve a large number of players as part of more than one competing forces. It is often desirable to reduce number of players to improve playability of wargames, which is in conflict with the requirements...
Internet Protocol version 4 (IPv4) is the most used Network Layer protocol, thus, ensuring the security aspect of this protocol is a vital concern. One such aspect includes identifying the possibility of Network Covert Channels (NCCs) over IPv4. NCCs facilitate information hiding in network protocols by hiding secret data in network traffic flows w...
Session-aware recommender systems analyze the sequential patterns of user actions to uncover the shifting preferences across sessions. User reviews enriched with sentiments can act as a guiding tool for session-aware systems. Existing methods for session-aware recommendations based on deep learning models do not consider the user’s sentiment granul...
With the advancement of Artificial Intelligence (AI) techniques, intelligent healthcare applications, such as early disease diagnosis, treatment of rare diseases, diagnosis using images, and clinical decision support systems, have become more ever-demanding. Disease Diagnosis (DD) is the most crucial area which needs early detection. In countries h...
This study carries out a comprehensive comparison of fine-tuned GPT models (GPT-2, GPT-3, GPT-3.5) and LLaMA-2 models (LLaMA-2 7B, LLaMA-2 13B, LLaMA-2 70B) in text classification, addressing dataset sizes, model scales, and task diversity. Since its inception in 2018, the GPT series has been pivotal in advancing NLP, with each iteration introducin...
Brain Tumor is a life-threatening disease, and its early diagnosis can save human life. Computer-Aided Brain Tumor Segmentation or Localization in Magnetic Resonance Imaging (MRI) images have emerged as pivotal approaches for expediting the disease diagnosis process. In the past few decades, various researchers combined the strengths of Convolution...
With the advent of microblogging platforms like Twitter, there has been a substantial shift toward digital media for getting acquainted with ongoing global issues. Although Twitter is an incredible source of information for real-time news, the information is widely scattered, opinionated, and unorganized, making it tedious for users to apprise them...
In recent years, there has been a rise in work which focuses on various issues of recommender systems other than accuracy. Popularity bias is one factor that causes the list of recommendations to deviate from the user’s expectation and causes biased list to generate. This paper proposed an approach that handles the popularity bias in trust aware gr...
Plant disease diagnosis with estimation of disease severity at early stages still remains a significant research challenge in agriculture. It is helpful in diagnosing plant diseases at the earliest so that timely action can be taken for curing the disease. Existing studies often rely on labor-intensive manually annotated large datasets for disease...
Steganalysis plays a vital role in cybersecurity in today’s digital era where exchange of malicious information can be done easily across web pages. Steganography techniques are used to hide data in an object where the existence of hidden information is also obscured. Steganalysis is the process for detection of steganography within an object and c...
Session-aware recommender systems capture user-specific preferences that emerge within multiple user sessions by leveraging the sequential nature of user interactions. Existing session-aware recommendation methods face challenges in finding the right balance between exploration and exploitation leading to less diverse recommendations and also suffe...
Brain tumor is one of the deadliest diseases diagnosed in human beings. Doctors can identify the tumor with the Magnetic Resonance Imaging (MRI) technique which uses the magnetic field and computer-generated waves to create Brain images. With the advancement in the domain of Computer Vision, various researchers have come up with different state-of-...
Plant disease infestation causes severe crop damage and adversely affects crop yield. This damage can be reduced if diseases are identified in the early stages. Initially, farmers and agricultural scientists used to diagnose plant diseases with their naked eyes. With the dawn of different advanced computer vision techniques, various researchers hav...
Information hiding in network traffic is generally done through network covert channels (NCCs). As Internet Protocol version 6 (IPv6) is replacing Internet Protocol version 4 (IPv4) rapidly, a lot of research is being done on the security aspect of IPv6. Information hiding used with the intention to ensure the privacy of data is a way of assuring i...
Constructive simulations are the applications used by the military for the training of their commanders in planning and analysis of various threats and Courses of Action. In the ‘analysis wargames’, there are need to automate many of the tasks of the commander which are carried out by subunit commanders on the ground. Deployment of defence units is...
In the agricultural sector, identifying plant diseases at their earliest possible stage of infestation still remains a huge challenge with respect to the maximization of crop production and farmers’ income. In recent years, advanced computer vision techniques like Vision Transformers (ViTs) are being successfully applied to identify plant diseases...
In the digital world, malicious activities that violate the confidentiality, integrity, or availability of data and devices are known as intrusions. An intrusion detection system (IDS) analyses the activities of a single system or a network to identify intrusions. It alerts the system administrators about the detected intrusions and makes them resp...
Reciprocal Recommender Systems (RRS) aim to recommend relevant matches to users based on the mutual agreement of their preferences. Explainability of reciprocal recommendations is important for developing a persuasive reciprocal recommender system, since it can improve the effectiveness and credibility of the reciprocal recommendation results. Expl...
Reciprocal Recommender Systems (RRS) use bilateral preferences to satisfy the needs of both the parties involved. Popularity bias is a critical problem in RRS, which arises when the RRS tend to prefer few popular users over others and thus exhibit biased behavior towards popular users. It can have adverse effect on both the parties involved. Popula...
Electronic health records (EHR) contain patients’ health information in varied formats such as clinical reports written in natural language, X-rays, MRI, case/discharge-summary, etc. One of its essential constituents is clinical narratives which contain significant clinical findings of a patient. Since the clinical narratives are stored in natural...
Advancement in the utilization of IPv6 protocol has led to an increase in research related to its security. In recent times, researchers proposed the possibility of the existence of covert channels over networks termed Network Covert Channels (NCCs) which may exploit IPv6. NCC is a serious threat that provides a hidden avenue for the transfer of in...
Stegomalware uses Information hiding techniques within Network protocols to leak out sensitive data and/or to exchange hidden commands between secretly communicating parties. Internet Protocol version 6 (IPv6) is a network layer protocol that is rapidly replacing Internet Protocol version 4 (IPv4). This has resulted in an increase in the availabili...
Unlike conventional Recommender Systems (RS) techniques where items are recommended to users, in Reciprocal Recommender Systems users become the items that are recommended to other users. Hence the generated recommendations should be accepted by both the service user (receiver of the recommendation) and the recommended user. In this paper, we propo...
Recommender Systems (RS) provide an effective way to deal with the problem of information overload by suggesting relevant items to users that the users may prefer. However, many online social platforms such as online dating and online recruitment recommend users to each other where both the users have preferences that should be considered for gener...
Twitter is one of the topmost microblogging social media networks that bridge the gap between users in various communities across the globe. People worldwide have taken to Twitter to express their opinions and general emotions regarding current issues and events in the past. These emotions and opinions have been extensively analyzed in various stud...
A robust collaborative system of active products (a product is called active when its ownership does not get transferred from provider to requestor at the time of its usage) should have an in-built mechanism which can make entities (service provider(s) and requestor(s)) to decide with whom to collaborate. In the absence of such a mechanism, the sys...
With the increase in digital communication, images have become indispensable media for carrying obscured communication these days. Unraveling the presence or details of obscured transmission also known as steganography is termed as steganalysis. Passive steganalysis focuses only on classification of object as clean or adulterated. Finding the lengt...
Session based Recommender systems consider change in preferences by focusing on user’s short term interests that may change over a period of time. This paper proposes FS-CNN-LSTM-SR, a hybrid technique that uses CNN (Convolutional Neural Networks) and LSTM (Long Short Term Memory) deep learning techniques with fuzzy time series to recommend product...
Timely and holistic recommendations in disease diagnosis process may prove a great assistance to a medical practitioner. However, the amount of structured or unstructured data generated in medicinal domain are voluminous and thus imposes challenges. In order to make machines understand the data semantically and infer useful insights from patient’s...
Increased usage of the Internet has risen the demand for more IP addresses across the globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become a vital area of research. One of the serious threats to Internet security is the presence of Network Covert Channels (NCCs) that provide substantial aid for performing cove...
In recent times, Network-based Intrusion Detection Systems (NIDSs) have become very popular for detecting intrusions in computer networks. Existing NIDSs can easily identify those intrusions that have been frequently witnessed in the network (majority attacks), but they cannot identify new and infrequent intrusions (minority attacks) accurately. Mo...
Goal driven Requirements Analysis captures the stakeholder's expectations thoroughly and analyzes the requirements in a more comprehensive manner. The goal driven approaches have been popular in the last decade and hence incorporating them in web requirements engineering becomes crucial. Web applications have specific functional and non-functional...
Plants are susceptive to various diseases in their growing phases. Early detection of diseases in plants is one of the most challenging problems in agriculture. If the diseases are not identified in the early stages, then they may adversely affect the total yield, resulting in a decrease in the farmers' profits. To overcome this problem, many resea...
Since the beginning of COVID-19 (corona virus disease 2019), the Indian government implemented several policies and restrictions to curtail its spread. The timely decisions taken by the government helped in decelerating the spread of COVID-19 to a large extent. Despite these decisions, the pandemic continues to spread. Future predictions about the...
Recommender System (RS) is an information filtering approach that helps the overburdened user with information in his decision making process and suggests items which might be interesting to him. While presenting recommendation to the user, accuracy of the presented list is always a concern for the researchers. However, in recent years, the focus h...
Camouflaged communication using a media is known as Steganography. It is different than encryption as the presence of message is also concealed in case of steganography. The message however can be encrypted before hiding in a media. Detection of concealed exchange being carried out or unraveling the details of such transmission is known as Steganal...
Network-based Intrusion Detection Systems (NIDSs) are deployed in computer networks to identify intrusions. NIDSs analyse network traffic to detect malicious content generated from different types of cyber-attacks. Though NIDSs can classify frequent attacks correctly, their performance declines on infrequent network intrusions. This paper proposes...
A recommender system (RS) provides assistance for users to filter out items of their interest in the presence of millions of available items. The reason is to find out the likewise user with the assumption that if users have shared similar interest in the past then they may share the same in future. Collaborative filtering (CF) is the widely used r...
Food is one of the basic needs of human life. The demand for food is in-creasing due to an exponential increase in the world’s population. To overcomesuch a massive demand for food, agricultural practitioners suggested the use of dif-ferent insecticides and pesticides to increase the yield of the crops. The use of theseinsecticides and pesticides i...
Network-based Intrusion Detection Systems (NIDSs) identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for th...
Health care is an important aspect of human life in which medical data plays an important role. The medical data present in pathology reports, diagnosis, prescription, and clinical articles however is normally available in an unstructured textual format. Such data can be processed using Clinical Natural Language Processing (NLP) to unearth the impo...
The novel Coronavirus (COVID-19) has claimed the lives of almost a million people across the globe and this trend continues to rise rapidly day by day. The fear of getting infected by Corona virus is affecting the people emotionally, psychologically and mentally. They are not able to work to their full capacity and are also worried about the well b...
With the advent of technology, data security over the networks has become a crucial responsibility of organizations these days. One of the techniques to secure data over the networks is through information hiding. The art of hiding data in media files to make it secure from interception is termed as Steganography. Image, Audio, Video, Document, Net...
Vehicular Ad-hoc NETworks (VANETs) are developing at a very fast pace to enable smart transportation in urban cities, by designing some mechanisms for decreasing travel time for commuters by reducing congestion. Inefficient Traffic signals and routing mechanisms are the major factors that contribute to the increase of road congestion. For smoother...
NIDSs identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for the normal traffic as well as for recurrent in...
The last leg of the year 2019 gave rise to a virus named COVID-19 (Corona Virus Disease 2019). Since the beginning of this infection in India, the government implemented several policies and restrictions to curtail its spread among the population. As the time passed, these restrictions were relaxed and people were advised to follow precautionary me...
Covered communication is termed as steganography. And unveiling details about this camouflaged communication is steganalysis. In the current era, steganalysis helps forensics examiners to analyze and detect malicious communication. Feature extraction, training phase and testing phase are three steps used by traditional machine learning algorithms f...
With an exponential growth in the number of vehicles plying on roads in metropolitan cities, there is an urgent need of means for controlling the traffic congestion. This congestion results in increase of travel cost, travel time and pollution that have a substantial impact on both the health of people and the economy of the nation. For the reducti...
Group recommender system provides suggestions for a group of users by exploring the choices of individual users of the group. Popularity of group recommender systems is increasing because many activities such as listening to music, watching movies, traveling, etc. are normally performed in groups rather individually. Group recommender systems like...
The present age of the Internet has brought people closer to each other and the world around them.
Today, people have access to different forms of information that is made available by the World
Wide Web (or simply the Web). The contents of the Web are crawled and indexed by search engines
so that they can be displayed as a result of users’ search...
Education plays a vital role in human life. To encourage higher education, the Indian government has taken many initiatives. These include the disbursement of scholarships to financially help the students belonging to low-income families. Central Sector Scheme of Scholarship for College and University Students (CSS) is one such scheme that financia...
Steganography is a technique of hiding secret data inside a cover. The most popularly used cover media include images, videos, audios, documents and network protocols. Network Steganography is a technique that uses common network protocols (the header field, the payload field or both) to hide a secret message. TCP/IP protocol suite has been a poten...
To tackle new and complex attacks, modern Intrusion Detection Systems (IDSs) are developed using Deep Learning (DL) techniques and are trained on intrusion detection datasets such as KDD and NSL-KDD. These two datasets have a large number of samples in Denial of Service and Probe attack classes besides the Normal class, but the number of samples in...
To tackle new and complex attacks, modern Intrusion Detection Systems (IDSs) are developed using Deep Learning (DL) techniques and are trained on intrusion detection datasets such as KDD and NSL-KDD. These two datasets have a large number of samples in Denial of Service and Probe attack classes besides the Normal class, but the number of samples in...
Nowadays, we receive, send and click a number of images frequently. Multimedia messages especially images can be easily transferred to anyone in no time and no cost just like text messages. There are many software easily available that can modify an image. With such a wide usage of images in communication networks it becomes difficult to conclude i...
Increased capability and complexity of present-day networks is a product of advancements in technology which has strengthened inter-human connectivity like never before. But technological advancements empower both the developer as well as the attacker. As a result, the severity of network-based attacks have also escalated immensely. The need of the...
Sentiment Analysis also termed as opinion mining is a classification process which is used to determine the polarity associated with user reviews in the form of text or images or speech. Due to the rapid growth in usage of social media such as forums, social networks, micro blogs etc., the need for sentiment analysis has simultaneously increased. S...
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper aims to provide the parameter tuning in the existing Modified...
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper aims to provide the parameter tuning in the existing Modified...
With an exponential growth in the number of vehicles plying on roads in metropolitan cities, there is an urgent need of means for controlling the traffic congestion. This congestion leads to increase in travel time, travel cost and pollution that have a significant impact on both the health of people and the economy of the nation. For the reduction...
At early requirements analysis, resolving conflicts and evaluating design alternatives saves time and effort in the
forthcoming phases. Goal oriented approaches are preferred over other requirements engineering approaches for their capability
to reason about the requirements and evaluate different solutions. We have enhanced and customized the goal...
With the tremendous growth of the automobile industry, there is an urgent need of means for controlling the traffic congestion. Due to this congestion, there is an increase in total travel time along with the increase in both travel cost and pollution that have a remarkable impact on both economy of the nation and health of the people. For the redu...
Recommender systems (RS) suffer from cold start and data sparsity problem. Researchers have proposed various solutions to this problem in which cross domain recommendation is an effective approach. Cross domain recommender system (CDRS) utilizes user data from multiple domains to generate prediction for the target user. This paper proposes a proact...
The microblogging service Twitter has witnessed a rapid increase in its adopters ever since it’s discovery in October 2006. Today it has become a medium of communication as well as spread of information. Hashtags are created in twitter by users whenever an event of significant importance occurs and hence they become trending on twitter network. Onc...
Recommender systems are widely used intelligent applications which assist users in a decision-making process to select one product from a huge set of alternative products or services. Recent research focus has been on developing methods for generating recommendations. We note lack of coherent research in the field of visual depictions of recommenda...
Over the years many techniques have been used by the decision makers to test their theories in a near real world simulated situation. Military war games are one such platform where these theories can be tested and the outcome is recorded. War gaming has evolved from its starting as a board game to now widely played as a computer game. This paper fo...
Collaborative filtering technique is widely adopted by researchers to generate quality recommendations. Constant efforts are being made by the researchers to generate quality recommendations thus satisfying and retaining the user. This work is an effort to generate quality recommendations by proposing a collaborative filtering approach. The propose...
Nowadays, with the invention of CUDA, a parallel computing platform and programming model, there is a dramatic increase in computing performance by harnessing the power of the GPU. GPU computing with CUDA can be utilised to find efficient solutions for many real world complex problems. One such problem is traffic signal control problem, which takes...
User profile modelling for the domain of tourism is different compared with most of the other domains, such as books or movies. The structure of a tourist product is more complex than a movie or a book. Moreover, the frequency of activities and ratings in tourism domain is also smaller than the other domains. To address these challenges, this study...
p class="p1">In the war, military conflicts have many aspects that are consistent with complexity theory e.g., the higher commander’s decision is directed at animate entity that react under hierarchical and self-organised structure in decentralised command and control for the collectivist dynamism of decomposed elements due to nonlinear complexity...
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper proposes a novel Improved Hybrid Ant Particle Optimization (IH...
Developed cities are facing a serious problem of
traffic congestion that leads to the wastage of both fuel and time
of the commuters. To alleviate this problem, a preemptive
HAPO (HAPO-P) algorithm has been presented in the literature
to reduce the trip time by combining HAPO algorithm with
preemptive traffic control. The HAPO-P algorithm is able t...