DA323 & Multi-modal Data Processing & Learning - II
L-T-P-C: 3-0-0-6 Pre-Requisite: Course Content/ Syllabus: Multi-modal data synchronization and fusion: Data understanding and quality estimation, meta data filtering, amount of data estimation for multimodal design, data synchronization and fusion, imbalance data analysis for multimodal design. Multi-modal learning and associated challenges: Applications and challenges from fusing two or more modalities such as vision, language, audio, graphs, biomedical signals; Development of shallow and deep networks for multimodal learning. Multi-modal processing and learning with applications: Image captioning, visual questioning answering system, automatic commentary generation, cognitive state estimation, recommendation system. Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. A But, A Miasnikov, G Ortolani, Multimodal Deep Learning with Tensorflow: Translate mathematics into robust TensorFlow applications with Python, Packt Publishing Limited, 2019 2. M Yang, B Rosenhahn, V Murino, Multimodal Scene Understanding: Algorithms, Applications and Deep Learning, Academic Press Inc, 2019 3. J-P Thiran, F Marqués and H Bourlard, Multimodal Signal Processing: Theory and applications for human-computer interaction, Academic Press, 2009 References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. T. Baltrušaitis, C. Ahuja and L. Morency, Multimodal Machine Learning: A Survey and Taxonomy in IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(2), 423-443, 2019 2. Y. Bengio, A. Courville, P. Vincent, Representation Learning: A Review and New Perspectives, IEEE Transactions on Pattern Analysis and Machine Intelligence,35(8),1798-1828, 2013
Course Number & Title: DA324 & Data Mining L-T-P-C: 3-0-0-6 Pre-Requisite: Course Content/ Syllabus: Introduction: Definition, Recap of Basics of Data Analysis; Introduction to Data warehousing; Finding Similar Items: Similarity search methods, KNN, Shingling, Locality sensitive hashing; Frequent Pattern Mining: Itemset mining, Substring mining, Sequence mining, Pattern assessment; Graph Mining: Link Analysis, Graph pattern mining, Mining Social-Network Graph, Graph clustering; Mining Data Streams. Books (In case UG compulsory courses, please give it as “Text books” and “Reference books”. Otherwise give it as “References”. Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Mohammed J. Zaki and Wagner Meira, Jr, Data Mining and Machine Learning: Fundamental Concepts and Algorithms, 2nd Edition, Cambridge University Press, 2020 2. Jure Leskovec, Anand Rajaraman and Jeffrey David Ullman, Mining of Massive Datasets, 3rd Edition, Cambridge University Press, 2020 References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar, Introduction to Data Mining, 2nd Edition, Pearson Publication, 2018.
L-T-P-C: 3-0-0-6 Pre-Requisite: Course Content/ Syllabus: Course Overview: Introduction to Deep Learning and its Applications, Computational Graph; Convolutional Neural Networks: Convolution, pooling, Activation Functions, Back propagation of CNN, Weights as templates, Translation invariance, Training with shared parameters; CNN Architecture Design and Discussion: AlexNet, VGG, GoogLeNet, ResNet, Deep vs Shallow Networks, Transfer Learning and Its types; Loss Functions and Optimization: Optimization, stochastic gradient descent, dropout, batch normalization; Sequential Modelling: Recurrent and Recursive Nets, RNN, LSTM, GRU; Visualization and Understanding: Visualizing intermediate features and outputs, Saliency maps, Visualizing neurons; Generative Models: Auto encoders, Generative Adversarial Networks; Deep Learning Applications: Conventional and Aerial view; Adversarial Attacks on CNN; Recent trends in deep learning. Books (In case UG compulsory courses, please give it as “Text books” and “Reference books”. Otherwise give it as “References”. Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, MIT Press, 2016, https://www.deeplearningbook.org/. 2. Michael A. Nielsen, Neural Networks and Deep Learning, Determination Press, 2015, http://neuralnetworksanddeeplearning.com/. References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Yoshua Bengio, Learning Deep Architectures for AI, Now Publishers Inc., 2009
DA352 & Privacy & Information Security
L-T-P-C: 3-0-0-6 Pre-Requisite: Course Content/ Syllabus: Overview: vulnerabilities, risk assessment, incidents; Basic terminology: Confidentiality, integrity, availability, non-repudiation, authentication, access control, passive and active attacker, interception, modification, fabrication, social engineering; Cryptography basics: Classical cryptography, block ciphers, symmetric cryptography, hash function, public key, digital signatures; System security: Exploiting bugs in programs. Buffer overflows, fuzzing, Certification, secure socket layer (SSL), Kerberos, SQL injection, concepts of vulnerability, risk management, worm, virus, malware, anti-viruses; Network security: Host IDS, network IDS, firewall, ARP poisoning, IP spoofing, DoS attacks; Data Privacy: Mathematical definitions of privacy, attacks on privacy and anonymity, social media privacy K-anonymity, Differential privacy, Private information retrieval, basics of multiparty computation and relationship to privacy; Mobile Application Security. Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. William Stallings, Network Security Essentials (Applications and Standards), 6th Edition, Pearson, 2018. References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Ross J. Anderson, Security Engineering, 3rd Edition, Wiley, Nov 2020. 2. Anco Hundepool, Statistical Disclosure Control, 1st Edition, Wiley, 2012. 3. Nataraj Venkataramanan and Ashwin Shriram, Data Privacy: Principles and Practice, 1st Edition, Taylor Francis, 2016. 4. George T. Duncan, et al., Statistical Confidentiality: Principle and Practice, Springer, 2011. 5. Cynthia Dwork and Aaron Roth, The Algorithmic Foundations of Differential Privacy, Found. Trends Theor. Comput. Sci. 9, 2014.
DA312 & Advanced Machine Learning Laboratory
L-T-P-C: 0-0-3-3 Pre-Requisite: Course Content/ Syllabus: Familiarization with TensorFlow/PyTorch; Implementation of MLP: Training Issues with Deep Networks, Applications; Autoencoders: Practical Applications; CNN: Constructing small networks to classify MNIST/CIFAR10, training issues; CNN: Realizing popular architectures, experiments with ImageNet scale data; Object/Face detection and localization; RNN and LSTM: training on sequences; Application in NLP: sentence representation using LSTM; Multimodal applications: vision and language Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Zhang, Aston, Zachary C. Lipton, Mu Li, and Alexander J. Smola. Dive into deep learning, arXiv preprint arXiv:2106.11342, 2021, https://d2l.ai/ (Online Book) 2. Ian Goodfellow and Yoshua Bengio and Aaron Courville, Deep Learning, MIT Press, 2016, https://www.deeplearningbook.org/. 3. Michael A. Nielsen, Neural Networks and Deep Learning, Determination Press, 2015, http://neuralnetworksanddeeplearning.com/. References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics), 2nd Edition, Springer, 2011. 2. S. O. Haykin, Neural Networks and Learning Machines, 3rd Edition, Pearson Education (India), 2016.
L-T-P-C: 2-0-2-6 Pre-Requisite: Course Content/ Syllabus: Internet of Thing (IoT) and its evolution; IoT layered architecture and devices: Sensors, microcontroller and connectivity, communication types and technologies: Short, mid and long-range communication; IoT messaging protocols: MQTT, CoAP, AMQP and HTTP; Overview of edge computing and cloud computing for IoT; IoT Security, IoT application examples, Artificial Intelligence (AI)-enabled IoT for real-world applications. Texts: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Simone Cirani, Gianluigi Ferrari, Marco Picone and Luca Veltri, Internet of Things Architectures, Protocols and Standards, 1st Edition, John Wiley & Sons Ltd, 2019. 2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, 1st Edition, Pearson India Pvt. Ltd, 2018. 3. Peter Marwedel, Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things, 1st Edition, Springer Nature, 2021. References: (Format: Authors, Book Title in Italics font, Volume/Series, Edition Number, Publisher, Year.) 1. Pallavi Sethi and Smruti R. Sarangi, Internet of Things: Architectures, Protocols, and Applications, Hindawi Journal of Electrical and Computer Engineering, 2017. 2. Qusay F Hassan, Internet of things A to Z: technologies and applications, 1st Edition, John Wiley & Sons, 2018. 3. Arshdeep Bahga and Vijay Madisetti, Internet of Things: A Hands-on Approach, 1st Edition, Universities Press (India) Pvt. Ltd., 2015.