(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–29 of 29 results for author: Shukla, S K

.
  1. arXiv:2406.12343  [pdf, ps, other

    math.NA math.FA

    A note on improvement by iteration for the approximate solutions of second kind Fredholm integral equations with Green's kernels

    Authors: Gobinda Rakshit, Shashank K. Shukla, Akshay S. Rane

    Abstract: Consider a linear operator equation $x - Kx = f$, where $f$ is given and $K$ is a Fredholm integral operator with a Green's function type kernel defined on $C[0, 1]$. For $r \geq 1$, we employ the interpolatory projection at $2r + 1$ collocation points (not necessarily Gauss points) onto a space of piecewise polynomials of degree $\leq 2r$ with respect to a uniform partition of $[0, 1]$. Previous… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    MSC Class: 41A35; 45B05; 45L05; 65R20

  2. arXiv:2403.14331  [pdf, other

    hep-ph hep-th

    Constraining scalars of $16_H$ through proton decays in non-renormalisable $SO(10)$ models

    Authors: Saurabh K. Shukla

    Abstract: Non-renormalisable versions of $SO(10)$ based on irreducible representations with lesser degrees of freedom, are free of running into the catastrophe of non-perturbativity of standard model gauge couplings in contrast to the renormalisable versions having tensors with many degrees of freedom. $16_H$ is the smallest representation, participates in Yukawa Lagrangian at the non-renormalisable level,… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 28 Pages, 1 figure and 3 tables

  3. arXiv:2403.03267  [pdf, other

    cs.CR

    TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports

    Authors: Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: Understanding the modus operandi of adversaries aids organizations in employing efficient defensive strategies and sharing intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A translation tool is needed to interpret the modus operandi explained in the sentences of the threat report and translate it into a structured… ▽ More

    Submitted 21 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Under Review

  4. Quantum corrections and the minimal Yukawa sector of $SU(5)$

    Authors: Ketan M. Patel, Saurabh K. Shukla

    Abstract: It is well-known that the $SU(5)$ grand unified theory, with the standard model quarks and leptons unified in $\overline{5}$ and $10$ and the electroweak Higgs doublet residing in $5$ dimensional representations, leads to relation, $Y_d=Y_e^T$, between the Yukawa couplings of the down-type quarks and the charged leptons. We show that this degeneracy can be lifted in a phenomenologically viable way… ▽ More

    Submitted 10 January, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: V2: 9 Pages, 2 Captioned Figures and 1 Table, version published in Phys. Rev. D

  5. arXiv:2305.15336  [pdf, other

    cs.CR

    From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads

    Authors: P. V. Sai Charan, Hrushikesh Chunduri, P. Mohan Anand, Sandeep K Shukla

    Abstract: This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  6. arXiv:2304.07598  [pdf, other

    cs.CR

    Understanding Rug Pulls: An In-Depth Behavioral Analysis of Fraudulent NFT Creators

    Authors: Trishie Sharma, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The explosive growth of non-fungible tokens (NFTs) on Web3 has created a new frontier for digital art and collectibles, but also an emerging space for fraudulent activities. This study provides an in-depth analysis of NFT rug pulls, which are fraudulent schemes aimed at stealing investors' funds. Using data from 758 rug pulls across 10 NFT marketplaces, we examine the structural and behavioral pro… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

  7. Spectrum of colour sextet scalars in realistic SO(10) GUT

    Authors: Ketan M. Patel, Saurabh K. Shukla

    Abstract: Incorporation of the standard model Yukawa interactions in a grand unified theory (GUT) often predicts varieties of new scalars that couple to the fermions and lead to some novel observational effects. We assess such a possibility for the colour sextet diquark scalars within the realistic renormalizable models based on $SO(10)$ GUT. The spectrum consists of five sextets:… ▽ More

    Submitted 9 March, 2023; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: 25 Pages, 7 Captioned Figures, 1 Table, V2: published in PRD

    Journal ref: Phy. Rev. D 107(2023)

  8. arXiv:2205.04685  [pdf, other

    cs.CR cs.LG

    DNS based In-Browser Cryptojacking Detection

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking. Thus, we are motivated to study different temporal and behavioral aspects of DNs involved in cryptojacking. We use temporal features such as query frequency and query burst along with graph-based features such as degree and diameter, and non-temporal… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: Submitted

  9. arXiv:2204.04154  [pdf, other

    cs.CR cs.LG

    EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

    Authors: Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep Kumar Shukla

    Abstract: Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks numerous times. Researchers have been develo… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: Submitted

  10. Anatomy of scalar mediated proton decays in $SO(10)$ models

    Authors: Ketan M. Patel, Saurabh K. Shukla

    Abstract: Realistic models based on the renormalizable grand unified theories have varieties of scalars, many of which are capable of mediating baryon ($B$) and lepton ($L$) number non-conserving processes. We identify all such scalar fields residing in ${\bf 10}$, $\overline{\bf 126}$ and ${\bf 120}$ dimensional irreps of $SO(10)$ which can induce baryon and lepton number violating interactions through the… ▽ More

    Submitted 4 August, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: 34 pages, 4 tables, 3 captioned figures. Version published in JHEP

    Journal ref: JHEP 08 (2022) 042

  11. arXiv:2112.11721  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Towards Malicious address identification in Bitcoin

    Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The temporal aspect of blockchain transactions enables us to study the address's behavior and detect if it is involved in any illicit activity. However, due to the concept of change addresses (used to thwart replay attacks), temporal aspects are not directly applicable in the Bitcoin blockchain. Several pre-processing steps should be performed before such temporal aspects are utilized. We are moti… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  12. arXiv:2112.11024  [pdf, other

    cs.CR cs.CY cs.DC

    Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma

    Abstract: In cryptocurrency-based permissionless blockchain networks, the decentralized structure enables any user to join and operate across different regions. The criminal entities exploit it by using cryptocurrency transactions on the blockchain to facilitate activities such as money laundering, gambling, and ransomware attacks. In recent times, different machine learning-based techniques can detect such… ▽ More

    Submitted 25 August, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  13. arXiv:2108.11818  [pdf, other

    cs.CR cs.SI

    Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain

    Authors: Banwari Lal, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The decentralization, redundancy, and pseudo-anonymity features have made permission-less public blockchain platforms attractive for adoption as technology platforms for cryptocurrencies. However, such adoption has enabled cybercriminals to exploit vulnerabilities in blockchain platforms and target the users through social engineering to carry out malicious activities. Most of the state-of-the-art… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

    Comments: Submitted

  14. arXiv:2106.13422  [pdf, other

    cs.CR cs.DC cs.LG

    Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep Kumar Shukla

    Abstract: Smart Contracts (SCs) in Ethereum can automate tasks and provide different functionalities to a user. Such automation is enabled by the `Turing-complete' nature of the programming language (Solidity) in which SCs are written. This also opens up different vulnerabilities and bugs in SCs that malicious actors exploit to carry out malicious or illegal activities on the cryptocurrency platform. In thi… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a conf

  15. arXiv:2106.13420  [pdf, other

    cs.CR cs.LG

    Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

    Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla

    Abstract: The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars. Many machine learning algorithms are applied to detect such illegal behavior. These algorithms are often trained on the transaction behavior and, in some cases, trained on the vulnerabilities that exist in the system. In our approach, we study the feasibility of… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

    Comments: Submitted to a journal

  16. arXiv:2103.12326  [pdf

    cs.CR

    Security of Healthcare Data Using Blockchains: A Survey

    Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma

    Abstract: The advancement in the healthcare sector is entering into a new era in the form of Health 4.0. The integration of innovative technologies like Cyber-Physical Systems (CPS), Big Data, Cloud Computing, Machine Learning, and Blockchain with Healthcare services has led to improved performance and efficiency through data-based learning and interconnection of systems. On the other hand, it has also incr… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: Submitted as a book chapter

  17. arXiv:2101.11915  [pdf, other

    cs.CR cs.LG

    Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

    Authors: Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla

    Abstract: Different types of malicious activities have been flagged in multiple permissionless blockchains such as bitcoin, Ethereum etc. While some malicious activities exploit vulnerabilities in the infrastructure of the blockchain, some target its users through social engineering techniques. To address these problems, we aim at automatically flagging blockchain accounts that originate such malicious expl… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Comments: Submitted

  18. arXiv:2009.02930  [pdf, other

    cs.CR

    Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix

    Authors: Aneet K. Dutta, Bhaskar Mukhoty, Sandeep K. Shukla

    Abstract: Regular and uninterrupted operation of critical infrastructures such as power, transport, communication etc. are essential for proper functioning of a country. Cyber-attacks causing disruption in critical infrastructure service in the past, are considered as a significant threat. With the advancement in technology and the progress of the critical infrastructures towards IP based communication, cyb… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

    Comments: 9pages, 14 figures

  19. arXiv:2007.11905  [pdf, other

    cond-mat.stat-mech math-ph quant-ph

    Fermionic quantum cellular automata and generalized matrix product unitaries

    Authors: Lorenzo Piroli, Alex Turzillo, Sujeet K. Shukla, J. Ignacio Cirac

    Abstract: We study matrix product unitary operators (MPUs) for fermionic one-dimensional (1D) chains. In stark contrast with the case of 1D qudit systems, we show that (i) fermionic MPUs do not necessarily feature a strict causal cone and (ii) not all fermionic Quantum Cellular Automata (QCA) can be represented as fermionic MPUs. We then introduce a natural generalization of the latter, obtained by allowing… ▽ More

    Submitted 9 December, 2020; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: 35 pages, no figures; v2: minor revision

    Journal ref: J. Stat. Mech. (2021) 013107

  20. arXiv:2007.05169  [pdf, other

    cs.LG cs.SI stat.ML

    Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

    Authors: Rachit Agarwal, Shikhar Barve, Sandeep K. Shukla

    Abstract: The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal feat… ▽ More

    Submitted 28 January, 2021; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: Submitted to Springer Applied Network Science Journal

  21. A tensor network approach to 2D bosonization

    Authors: Sujeet K. Shukla, Tyler D. Ellison, Lukasz Fidkowski

    Abstract: We present a 2D bosonization duality using the language of tensor networks. Specifically, we construct a tensor network operator (TNO) that implements an exact 2D bosonization duality. The primary benefit of the TNO is that it allows for bosonization at the level of quantum states. Thus, we use the TNO to provide an explicit algorithm for bosonizing fermionic projected entangled pair states (fPEPs… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 21 pages

    Journal ref: Phys. Rev. B 101, 155105 (2020)

  22. arXiv:1904.13081  [pdf, other

    cs.LG stat.ML

    Sequence to sequence deep learning models for solar irradiation forecasting

    Authors: Bhaskar Pratim Mukhoty, Vikas Maurya, Sandeep Kumar Shukla

    Abstract: The energy output a photo voltaic(PV) panel is a function of solar irradiation and weather parameters like temperature and wind speed etc. A general measure for solar irradiation called Global Horizontal Irradiance (GHI), customarily reported in Watt/meter$^2$, is a generic indicator for this intermittent energy resource. An accurate prediction of GHI is necessary for reliable grid integration of… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

  23. arXiv:1901.07902  [pdf

    physics.class-ph

    Determination of Power of Groove fields belonging to the wedge regions adjacent to a convex triangular obstacle associated with Dirichlet conditions subject to axially independent EM fields

    Authors: Sanjay Kumar, Suresh K. Shukla

    Abstract: A convex triangular obstacle forms a vital part of a periodic echellete grating. A triangular grating is characterized by three parameters like period, depth and flare angle. Knowledge of groove field is essential for precise designing of triangular corrugated structures for studying the blazing effect of propagating EM wave. In the present paper, an attempt has been made to determine the power of… ▽ More

    Submitted 23 January, 2019; originally announced January 2019.

    Comments: 12 pages, 3 figures

  24. arXiv:1901.00228  [pdf, ps, other

    cs.DB cs.DC

    Verity: Blockchains to Detect Insider Attacks in DBMS

    Authors: Shubham S. Srivastava, Medha Atre, Shubham Sharma, Rahul Gupta, Sandeep K. Shukla

    Abstract: Integrity and security of the data in database systems are typically maintained with access control policies and firewalls. However, insider attacks -- where someone with an intimate knowledge of the system and administrative privileges tampers with the data -- pose a unique challenge. Measures like append only logging prove to be insufficient because an attacker with administrative privileges can… ▽ More

    Submitted 1 January, 2019; originally announced January 2019.

    ACM Class: H.2.7

  25. arXiv:1704.01943  [pdf, other

    quant-ph cond-mat.str-el

    Matrix Product Representation of Locality Preserving Unitaries

    Authors: M. Burak Şahinoğlu, Sujeet K. Shukla, Feng Bi, Xie Chen

    Abstract: The matrix product representation provides a useful formalism to study not only entangled states, but also entangled operators in one dimension. In this paper, we focus on unitary transformations and show that matrix product operators that are unitary provides a necessary and sufficient representation of 1D unitaries that preserve locality. That is, we show that matrix product operators that are u… ▽ More

    Submitted 6 April, 2017; originally announced April 2017.

    Comments: 14 pages

    Journal ref: Phys. Rev. B 98, 245122 (2018)

  26. Boson condensation and instability in the tensor network representation of string-net states

    Authors: Sujeet K. Shukla, M. Burak Şahinoğlu, Frank Pollmann, Xie Chen

    Abstract: The tensor network representation of many-body quantum states, given by local tensors, provides a promising numerical tool for the study of strongly correlated topological phases in two dimension. However, tensor network representations may be vulnerable to instabilities caused by small perturbations of the local tensor, especially when the local tensor is not injective. For example, the topologic… ▽ More

    Submitted 13 March, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: 44 pages, 85 figures, comments welcome

    Journal ref: Phys. Rev. B 98, 125112 (2018)

  27. arXiv:1404.6121  [pdf, ps, other

    math.DG

    Killing Correspondence in Finsler Spaces

    Authors: Suresh K. Shukla, M. K. Gupta

    Abstract: The present paper deals with the Killing correspondence between some Finsler spaces. We consider a Finsler space equipped with a $βべーた$-change of metric and study the Killing correspondence between the original Finsler space and the Finsler space equipped with $βべーた$-change of metric. We obtain necessary and sufficient condition for a vector field Killing in the original Finsler space to be Killing in t… ▽ More

    Submitted 24 April, 2014; originally announced April 2014.

    MSC Class: 53B40

  28. arXiv:0911.2034  [pdf, ps, other

    cs.LO cs.SE

    Expressing the Behavior of Three Very Different Concurrent Systems by Using Natural Extensions of Separation Logic

    Authors: Edgar G. Daylight, Sandeep K. Shukla, Davide Sergio

    Abstract: Separation Logic is a non-classical logic used to verify pointer-intensive code. In this paper, however, we show that Separation Logic, along with its natural extensions, can also be used as a specification language for concurrent-system design. To do so, we express the behavior of three very different concurrent systems: a Subway, a Stopwatch, and a 2x2 Switch. The Subway is originally implemen… ▽ More

    Submitted 10 November, 2009; originally announced November 2009.

    Journal ref: EPTCS 8, 2009, pp. 26-40

  29. arXiv:0905.1607  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Electron transport across electrically switchable magnetic molecules

    Authors: Sujeet K. Shukla, Stefano Sanvito

    Abstract: We investigate the electron transport properties of a model magnetic molecule formed by two magnetic centers whose exchange coupling can be altered with a longitudinal electric field. In general we find a negative differential conductance at low temperatures originating from the different scattering amplitudes of the singlet and triplet states. More interestingly, when the molecule is strongly c… ▽ More

    Submitted 11 May, 2009; originally announced May 2009.