Natasha Sharma

@cuchd.in

Assistant Professor CSE
Chandigarh University



                    

https://researchid.co/natasha

RESEARCH, TEACHING, or OTHER INTERESTS

Artificial Intelligence, Computer Engineering, Computer Science, Computer Vision and Pattern Recognition

2

Scopus Publications

Scopus Publications

  • A Comparative Analysis of Machine Learning Models for Fake News Detection
    Dhuriya Ankit Subhash, Natasha Sharma, Anoop Kumar, Sudhanshu Kumar Jha, Ishica, and Rajneesh Pandey

    IEEE
    The rapid increase in the sharing of fake news poses a major threat in this modern digital world to information integrity. This issue can be addressed by using the Machine Learning (ML) models. This research is based on comparative study of four such ML models- Random Forest Classifier, Logistic Regression, Decision Tree, and Gradient Boosting Classifier. Various performance metrics such as precision, accuracy, recall, Fl-score are employed for model evaluation. The dataset is being used to train the features based on textual content and metadata. This particular analysis produces the results like Random Forest Classifier, which exhibits highest accuracy and provides reliable outcomes in differentiating fake news and actual news. Additionally, the research underscores the importance of data preprocessing, feature selection, and model hyper-parameter tuning in optimising the efficiency in fake news detection. This study provides valuable insights to combat the spreading of fake news in this digital age.

  • Modified authentication protocol and evaluation tool: Kerberos and BAN logic
    Randhir Bhandari*, , Digvijay Puri, Natasha Sharma, , and

    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    In today’s world the computer network communication increases the efficiency most of the organizations. Hence threats have been increased due to these online transactions/communications. These threats necessitate the researchers to improve the existing security protocols and /or develop the new ones. Authentication Protocols are one of the same which can provide the authentication, confidentiality & integrity. For checking the authenticity of messages exchange process in authentication protocols BAN logic is used. The Kerberos encrypt the information for authentications. Many organizations use it and it has five versions and versions 4 and 5 are latest. In one of over previous paper we have generalized the ticket exchange process of version 5. In this paper to make it more authenticated some modifications are proposed to both BAN and Kerberos and we defined them as R- Kerberos & R- BAN. To achieve this, we have added participant’s physical address (MAC Address) as it is unique to every network adapter and can be used as our secret key.

RECENT SCHOLAR PUBLICATIONS