Bijeeta Pal
Cited by
Cited by
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
To transfer or not to transfer: Misclassification attacks against transfer learned text classifiers
B Pal, S Tople
arXiv preprint arXiv:2001.02438, 2020
Pre-launch Survey Report of Insurance Awareness Campaign
A Sinha, R Jaiswal, BD Pal, K Shuk
Delhi, India: National Council of Applied Economic Research, 127, 2011
A stochastic greedy heuristic algorithm for the orienteering problem
M Verma, M Gupta, B Pal, KK Shukla
2014 International Conference on Computer and Communication Technology …, 2014
Might I Get Pwned: A Second Generation Password Breach Alerting Service
B Pal, M Islam, T Ristenpart, R Chatterjee
arXiv preprint arXiv:2109.14490, 2021
Roulette Wheel Selection based Heuristic Algorithm for the Orienteering Problem
M Verma, M Gupta, B Pal, KK Shukla
The system can't perform the operation now. Try again later.
Articles 1–7