<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/123456789/50" />
  <subtitle />
  <id>http://dspace.dtu.ac.in:8080/jspui/handle/123456789/50</id>
  <updated>2026-04-28T05:27:44Z</updated>
  <dc:date>2026-04-28T05:27:44Z</dc:date>
  <entry>
    <title>CORS VULNERABILITY TESTER FOR WEB APPLICATION</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22652" />
    <author>
      <name>DUBEY, MRITYUNJAY</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22652</id>
    <updated>2026-02-10T04:47:38Z</updated>
    <published>2022-05-01T00:00:00Z</published>
    <summary type="text">Title: CORS VULNERABILITY TESTER FOR WEB APPLICATION
Authors: DUBEY, MRITYUNJAY
Abstract: The problems that were caused by the same-origin policy and the incorrect setup&#xD;
of it led to the development of a protocol known as cross-origin resource sharing&#xD;
(CORS). This protocol was designed to solve these problems. Current versions of&#xD;
web browsers come equipped with a feature known as the same-origin policy..&#xD;
Scripts that are housed on one domain are unable to make calls to scripts that are&#xD;
placed on another website as a result of this functionality. This security policy&#xD;
may ban certain legitimate use cases that pose no security risky. Utilizing CORS&#xD;
is the optimal option for ensuring that those valid situations are able to work&#xD;
correctly.During the process of designing, implementing, and deploying CORS,&#xD;
we discovered a number of additional security problems, including the&#xD;
following:&#xD;
1) CORS diminishes cross-origin "write" privilege in practical ways.&#xD;
2) CORS introduces additional trust requirements the web of different&#xD;
interactions.&#xD;
3) CORS is something which isn’t well understood for being developers, most&#xD;
likely as a result of its.&#xD;
opaque policy and complicated and complex linkages with other web protocols,&#xD;
which results in a variety of misconfigurations. This is the case since CORS is&#xD;
notoriously difficult to understand.&#xD;
In conclusion, we provide simplified and clarified versions of the protocol in&#xD;
order to solve the security problems that were uncovered by our study. Both the&#xD;
CORS standard and the most common web browsers have taken some of our&#xD;
suggestions and implemented them in a variety of different ways.</summary>
    <dc:date>2022-05-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>REVIEW ON LARGE LANGUAGE MODELS</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22649" />
    <author>
      <name>SINGH, HARSHIT</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22649</id>
    <updated>2026-02-10T04:47:14Z</updated>
    <published>2025-12-01T00:00:00Z</published>
    <summary type="text">Title: REVIEW ON LARGE LANGUAGE MODELS
Authors: SINGH, HARSHIT
Abstract: Recently there has been a paradigm shift in a machine’s ability to solve various natural&#xD;
language processing(NLP) tasks from generating coherent sentences to in-context learning.&#xD;
This shift has been enabled by pre-trained transform models on large amounts of data; the&#xD;
research community aptly called these models as Large Language Models(LLM). In this&#xD;
review we will go over a brief overview ofthe technology as well as the ethical and social&#xD;
implications of such models and conclude with the future potential avenues for further&#xD;
research.</summary>
    <dc:date>2025-12-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>EMOTION-AWARE MULTIMODAL SARCASM DETECTION USING DEEP LEARNING TECHNIQUES</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22644" />
    <author>
      <name>KHERA, SHIVANSH</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22644</id>
    <updated>2026-02-10T04:46:50Z</updated>
    <published>2025-05-01T00:00:00Z</published>
    <summary type="text">Title: EMOTION-AWARE MULTIMODAL SARCASM DETECTION USING DEEP LEARNING TECHNIQUES
Authors: KHERA, SHIVANSH
Abstract: Sarcasm detection in digital communication has become increasingly challenging as&#xD;
users employ sophisticated combinations of textual and visual elements to convey ironic&#xD;
meaning. Traditional text-based approaches and existing multimodal methods struggle&#xD;
to capture the emotional incongruity that is fundamental to sarcastic expressions, repre-&#xD;
senting a significant gap in current multimodal sarcasm detection research.&#xD;
This thesis proposes an emotion-aware multimodal framework for sarcasm detection&#xD;
that systematically integrates emotional features from both textual and visual modal-&#xD;
ities. The approach enhances existing deep learning architectures, specifically Bidirec-&#xD;
tional Long Short-Term Memory (BiLSTM) networks and Graph Convolutional Networks&#xD;
(GCNs), with emotion recognition capabilities utilizing DistilRoBERTa for textual emo-&#xD;
tion analysis and computer vision techniques for visual emotion recognition. The frame-&#xD;
work was primarily developed and optimized using the MMSD2.0 dataset, followed by&#xD;
comprehensive cross-dataset evaluation on MMSD Original and MEMOTION datasets to&#xD;
assess generalization capabilities.&#xD;
Experimental results demonstrate that systematic integration of emotional features&#xD;
from both modalities significantly improves sarcasm detection performance. The BiLSTM-&#xD;
based emotion-aware architecture achieves the best overall performance on MMSD2.0&#xD;
with 83.12% accuracy, 81.10% precision, 85.07% recall, and 83.04% F1-score, while the&#xD;
GCN-based approach achieves competitive results with 81.29% accuracy and 81.97% F1-&#xD;
score. Cross-dataset evaluation reveals robust generalization capabilities, with the BiL-&#xD;
STM model maintaining 79.86% accuracy on MMSD Original and 80.45% accuracy on&#xD;
MEMOTION, demonstrating effective transferability of emotion-aware features across dif-&#xD;
ferent data distributions and even different domains. These findings establish the first em-&#xD;
pirical evidence for the effectiveness of dual-modality emotion integration in multimodal&#xD;
sarcasm detection, providing a robust foundation for future research in emotion-aware&#xD;
approaches to understanding digital communication nuances.</summary>
    <dc:date>2025-05-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>SECURE LIGHTWEIGHT AUTHENTICATION FOR INTERNET OF THINGS</title>
    <link rel="alternate" href="http://dspace.dtu.ac.in:8080/jspui/handle/repository/22521" />
    <author>
      <name>TYAGI, HARSHIT</name>
    </author>
    <id>http://dspace.dtu.ac.in:8080/jspui/handle/repository/22521</id>
    <updated>2025-12-29T08:45:40Z</updated>
    <published>2025-06-01T00:00:00Z</published>
    <summary type="text">Title: SECURE LIGHTWEIGHT AUTHENTICATION FOR INTERNET OF THINGS
Authors: TYAGI, HARSHIT
Abstract: The proliferation of Internet of Things (IoT) devices across various domains has in-&#xD;
troduced new challenges in ensuring secure and efficient communication over inherently&#xD;
insecure networks. Authentication protocols in such environments must balance robust-&#xD;
ness, lightweight execution, and resilience against evolving attack vectors. Given the&#xD;
limitations of conventional schemes in resource-constrained and high-risk settings, this&#xD;
thesis report presents two novel contributions designed to enhance authentication security&#xD;
in IoT ecosystems through cryptographic and architectural innovations.&#xD;
As part of this effort, the first contribution targets security enhancement in Internet-&#xD;
of-Medical-Things (IoMT) scenarios. Robust schemes are particularly critical in such&#xD;
settings due to the transmitted data’s sensitivity and resource-constrained device limi-&#xD;
tations. While Masud et al. proposed a protocol for securing data in IoMT networks,&#xD;
their approach remains vulnerable to offline password-guessing and privileged insider at-&#xD;
tacks, posing serious privacy and patient safety risks. To address these issues, this report&#xD;
proposes a novel protocol, P-MASFEP (security-enhanced PUF (Physically Unclonable&#xD;
Functions)-based Mutual Authentication &amp; Session key establishment using Fuzzy Ex-&#xD;
tractor &amp; PKI (Public Key Infrastructure)). P-MASFEP integrates PUFs with fuzzy&#xD;
extractors to actively derive stable cryptographic keys from biometric input, mitigating&#xD;
password-guessing risks. It also employs PKI to distribute session keys securely and&#xD;
ensures protection against insider threats through mutual authentication.&#xD;
The second contribution focuses on overcoming the inherent limitations of a traditional&#xD;
authentication framework, Kerberos. Its traditional design faces challenges in resource-&#xD;
constrained IoT environments, including computational inefficiencies, lack of clock syn-&#xD;
chronization, and limited scalability. In addition to these limitations, Kerberos remains&#xD;
vulnerable to several modern attacks such as password-guessing, Kerberoasting, Golden&#xD;
Ticket, and Silver Ticket attacks. Prapty et al.’s KESIC, adapts Kerberos for IoT by&#xD;
introducing optimizations. However, it relies on symmetric cryptography for authentica-&#xD;
tion and key exchange. Additionally, it remains susceptible to password-based attacks,&#xD;
necessitating a more secure approach. This work proposes two novel protocols to address&#xD;
these issues: (1) Kerberos with FIDO (Fast Identity Online) Integration (KFI), which&#xD;
integrates FIDO’s passwordless authentication to eliminate password-derived vulnerabil-&#xD;
ities; and (2) Kerberos with FIDO and Lightweight extension for IoT (KFLIT), which&#xD;
extends KFI by incorporating lightweight HMAC and XOR operations to reduce compu-&#xD;
tational overhead, counter-based synchronization to eliminate dependency on real-time&#xD;
clocks, and an attestation mechanism to verify IoT device integrity before granting access.&#xD;
Together, the proposed solutions address critical gaps in current authentication mech-&#xD;
anisms for constrained environments. By tackling domain-specific (IoMT) and general-&#xD;
purpose (IoT) challenges, this report contributes to building a secure and scalable au-&#xD;
thentication foundation for next-generation connected systems.</summary>
    <dc:date>2025-06-01T00:00:00Z</dc:date>
  </entry>
</feed>

