Rishabh Kaushal

Rishabh Kaushal
Indira Gandhi Delhi Technical University for Women | IGIT · Department of Information Technology

PhD (Comp Sc) from IIIT Delhi MS (Research) from IIIT Hyderabad, BTech(CSE) from GGSIPU, Delhi.

About

47
Publications
36,752
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
472
Citations
Citations since 2017
27 Research Items
453 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Currently working on following research. + Security and Privacy Aspects in Social Networks. + Machine Learning + Optimization + e-Learning
Additional affiliations
January 2011 - present
Indira Gandhi Institute of Technology (now IGDTUW)
Position
  • Professor (Assistant)

Publications

Publications (47)
Article
Full-text available
Social media have a significant impact on opinion building in public. Vaccination in India started in January 2021. We have seen many opinions towards vaccination of the people, as vaccination is one of the most crucial steps toward the fight against COVID-19. In this paper, we have compared the public’s sentiments towards COVID vaccination in Indi...
Article
Full-text available
Social Media Platforms (SMPs) in general and messaging platforms, namely WhatsApp, have changed how people connect. Unfortunately, SMPs are often used to spread fake information. We focus on images shared on the WhatsApp platform; our goal is to detect whether the image is fake. Our main contribution is in terms of feature engineering. Given an ima...
Article
Full-text available
Online Social Media platforms (OSMs) have become an essential source of information. The high speed at which OSM users submit data makes moderation extremely hard. Consequently, besides offering online networking to users, the OSMs have also become carriers for spreading fake news. Knowingly or unknowingly, users circulate fake news on OSMs, advers...
Chapter
Full-text available
The account registration steps in Online Social Networks (OSNs) are simple to facilitate users to join the OSN sites. Alongside, Personally Identifiable Information (PII) of users is readily available online. Therefore, it becomes trivial for a malicious user (attacker) to create a spoofed identity of a real user (victim), which we refer to as clon...
Preprint
Full-text available
The COVID-19 pandemic presents a significant challenge to wellbeing for people around the world. Here, we examine which individual and societal factors can predict the extent to which individuals suffer or thrive during the COVID-19 outbreak, with survey data collected from 26,684 participants in 51 countries from 17 April to 15 May 2020. We show t...
Article
Full-text available
Users have their accounts on multiple Online Social Networks (OSNs) to access a variety of content and connect to their friends. Consequently, user behaviors get distributed across many OSNs. Collection of comprehensive user information referred to as user profiling; an essential first step is to link user accounts (identities) belonging to the sam...
Chapter
Users create accounts on multiple social networks to get connected to their friends across these networks. We refer to these user accounts as user identities. Since users join multiple social networks, therefore, there will be cases where a pair of user identities across two different social networks belong to the same individual. We refer to such...
Conference Paper
Increasingly more and more videos are being uploaded on video sharing platforms, and a significant number of viewers on these platforms are children. At times, these videos have violent or sexually explicit scenes (referred as child unsafe) to catch children's attention. To evade moderation, malicious video uploaders typically limit the child unsaf...
Conference Paper
Full-text available
In recent times, Online Social Networks (OSNs) have gained immense popularity among users of all age groups, particularly the young. Due to their widespread popularity and engagement, we are observing a rapid rise in the number of OSNs and the wide variety of services (or ecosystem) that they offer. However, at the same time, there are growing conc...
Conference Paper
Existing travel related systems and commonly used websites have some major limitations which cause efforts to be made by the traveler before going out on vacation. Some of these sites allow users to write their personal experiences about visited places but don’t produce a proper itinerary, and those which do, focus only on minimizing the travel tim...
Conference Paper
Full-text available
Cloud computing is the latest buzz in most of the IT organizations which are witnessing a a trend of migration from traditional computing to cloud computing, thereby reducing their infrastructure cost and improving efficiency and performance. Cloud computing provides services through virtualization layer, which helps to execute more than one operat...
Conference Paper
Full-text available
Today, the use of Online Social Media (OSM) is not restricted to merely networking and socializing. Recent events all around the globe attest to the prevalence of use of OSM sites for bringing about dramatic and drastic reforms in real world, phenomenon being referred as Cyber Activism. The real world is marred with various turmoils and people hold...
Conference Paper
Full-text available
The last decade has witnessed a boom in social networking platforms; each new platform is unique in its own ways, and offers a different set of features and services. In order to avail these services, users end up creating multiple virtual identities across these platforms. Researchers have proposed numerous techniques to resolve multiple such iden...
Conference Paper
Twitter is increasingly being used by anti-social elements to connect to more people who sympathise with their cause. The aim of our work is to leverage Twitter data to identify the areas in India affected by Maoists, Naxalites and Jihadists. We attempt to identify people who are actively involved in such activities. For ground truth, we use manual...
Conference Paper
With the growing use of online social media and presence of users on many such platforms, their interaction with social networks is huge. They are free to spread wrong information without any accuracy, integrity and authenticity checkpoints masquerading as legitimate content. All these wrong, unrelated, unwanted, manipulated information are distrib...
Conference Paper
Bots refer to automated software that have the capability to execute commands on receiving instructions from BotMaster. SocialBots are the bots present in Online Social Network (OSN) which mimic the activities of the real users. They have the capability to automatically perform the basic functionalities offered by the OSN platforms. These socialbot...
Conference Paper
Nowadays mobile phone users download lots of applications for various purposes like learning, entertainment, businesses, etc. For a naive user, it is very difficult to identify whether the permissions provided to the application at the time of installation are being used properly or not. There are tools available for the detection of android malwar...
Article
Full-text available
YouTube draws large number of users who contribute actively by uploading videos or commenting on existing videos. However, being a crowd sourced and large content pushed onto it, there is limited control over the content. This makes malicious users push content (videos and comments) which is inappropriate (unsafe), particularly when such content is...
Conference Paper
Full-text available
Android, one of the most popular open source mobile operating system, is facing a lot of security issues. Being used by users with varying degrees of awareness complicates the problem further. Most of the security problems are due to maliciousness of android applications. The malwares get installed in mobile phones through various popular applicati...
Conference Paper
Spam is an unsolicited message, usually sent in thebulk. It is an unwanted activity that is performed to deceivepeople, to theft their personal information, to inject virus in theirsystem, to redirect them on malicious sites. On OSN, spammersshare malicious link looking like genuine one, place discountmessages on their wall, develop malicious apps...
Conference Paper
Full-text available
Network administrators ensure that all the users within network get fair share of bandwidth, any bandwidth limit violations is identified and provide some additional controls like denied access to particular websites, etc. To achieve this, network administrators monitor all the traffic between the LAN in campus-wide network and the outside Internet...
Conference Paper
Full-text available
Twitter is fast becoming the most popular platform for spread of information in general and pertaining to political views in particular. Like any other social networking site, Twitter is a medium to socialize with people and particularly in political space, it is pertinent to gauge the public opinion from time to time. One of the key requirements i...
Conference Paper
Full-text available
Online social media websites like Twitter has become one of the most popular platforms for people to obtain or spread information. However, in absence of any moderation and use of crowd sourcing, there is no guarantee that the information shared is credible or not. This makes online social media highly susceptible to the spread of rumors. As part o...
Article
Full-text available
Online Social Networks (OSNs) are deemed to be the most sought-after societal tool used by the masses world over to communicate and transmit information. Our dependence on these platforms for seeking opinions, news, updates, etc. is increasing. While it is true that OSNs have become a new medium for dissemination of information, at the same time, t...
Conference Paper
Full-text available
BitTorrent is one of the most popular peer to peer (P2P) protocols used for downloading large sized files over internet. Success of BitTorrent relies heavily upon the peers contributing to the protocol by uploading the partially (or fully) downloaded files to other peers. However, it is matter of common observation that very often a peer is found o...
Conference Paper
Full-text available
BitTorrent protocol has been quite successful in capturing majority of Internet traffic since its inception due to its various mechanisms to improve the download performance of the network. The mechanisms like tit-for-tat, optimistic unchoking, anti-snubbing and various piece selection strategy, etc. have been working very well. This work is an att...
Conference Paper
Full-text available
This paper presents the design and implementation of a system of automatic evaluation of programming assignments at an undergraduate level. Evaluation is done primarily from two standpoints - plagiarism detection and program testing. Proposed algorithm for plagiarism detection detects all the most common forms of plagiarism done by students. Progra...

Network

Cited By

Projects

Projects (10)
Project
The Ramayana is a epic poem which was first written from memory (smriti) by sage Valmiki in Sanskrit language. Many years later Goswami Tulsidas, born in 16th century, wrote Shri Ramcharitmanas, a different version of the Ramayana written in Avadhi Hindi. Through Asia, the Ramayana has served not only as poetry, but as the basis for festivals, plays and rituals as the foundation for religion and as an eternal tale of love and duty. Shri Ramcharitmanas is broken up in to stanzas called chaupais, passages of which are interposed with dohas or couplets. It is filled with exquisite poetry and consists of seven chapters : Bal Kand, Ayodhya Kand, Aranya Kand, Kishkindha Kand, Sundar Kand, Lanka Kand, and Uttar Kand. According to authors whole Ramcharitmanas is like a Banyan Tree. All chapters are the parts of that tree : Bal Kand – Root, Ayodhya Kand – Trunk, Aranya Kand – Branches, Kishkindha Kand – Leaves, Sundar Kand – Flower, Lanka Kand – Fruit, Uttar Kand – Juice of that Fruit. A strategy is a set of decisions and actions by which desired goal will be achieved. Strategy is also a direction and scope of an organization over the long term. The whole story of Ramayana teaches us the strategic management and ethical behaviour. This paper fills the gap by applying the teachings of Ramcharitmanas or Ramayana to the modern strategic management discipline