Login / Signup
Arushi Arora
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 11
Top Topics
Error Back Propagation
Identity Authentication
Geographic Regions
Multiple Layers
Top Venues
CoRR
SIGCOMM
TrustCom/BigDataSE
Multim. Tools Appl.
</>
Publications
</>
Saaketh Koundinya Gundavarapu
,
Arushi Arora
,
Shreya Agarwal
Zero Shot Context-Based Object Segmentation using SLIP (SAM+CLIP).
CoRR
(2024)
Saaketh Koundinya Gundavarapu
,
Shreya Agarwal
,
Arushi Arora
,
Chandana Thimmalapura Jagadeeshaiah
Machine Unlearning in Large Language Models.
CoRR
(2024)
Michael Luu
,
Matthew Ferland
,
Varun Nagaraj Rao
,
Arushi Arora
,
Randy Huynh
,
Frederick Reiber
,
Jennifer Wong-Ma
,
Michael Shindler
What is an Algorithms Course?: Survey Results of Introductory Undergraduate Algorithms Courses in the U.S.
SIGCSE (1)
(2023)
Arushi Arora
,
Raj Karra
,
Dave Levin
,
Christina Garman
Provably Avoiding Geographic Regions for Tor's Onion Services.
FC (1)
(2023)
Sumit Kumar Yadav
,
Kavita Sharma
,
Chanchal Kumar
,
Arushi Arora
Blockchain-based synergistic solution to current cybersecurity frameworks.
Multim. Tools Appl.
81 (25) (2022)
Michael Reininger
,
Arushi Arora
,
Stephen Herwig
,
Nicholas Francino
,
Jayson Hurst
,
Christina Garman
,
Dave Levin
Bento: safely bringing network function virtualization to Tor.
SIGCOMM
(2021)
Michael Reininger
,
Arushi Arora
,
Stephen Herwig
,
Nicholas Francino
,
Christina Garman
,
Dave Levin
Bento: Bringing Network Function Virtualization to Tor.
CCS
(2020)
Danish Syed
,
Naman Gandhi
,
Arushi Arora
,
Nilesh Kadam
DeepGamble: Towards unlocking real-time player intelligence using multi-layer instance segmentation and attribute detection.
CoRR
(2020)
Danish Syed
,
Naman Gandhi
,
Arushi Arora
,
Nilesh Kadam
DeepGamble: Towards unlocking real-time player intelligence using multi-layer instance segmentation and attribute detection.
ICMLA
(2020)
Nisha Malik
,
Priyadarsi Nanda
,
Arushi Arora
,
Xiangjian He
,
Deepak Puthal
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
TrustCom/BigDataSE
(2018)
Sumit Kumar Yadav
,
Kavita Sharma
,
Arushi Arora
Security Integration in DDoS Attack Mitigation Using Access Control Lists.
Int. J. Inf. Syst. Model. Des.
9 (1) (2018)