I am a machine learning engineer dedicated to tackling challenges using data. I'm currently pursuing my Master's (Thesis) Degree in Information Technology Engineering, with research focusing on privacy-preserving technologies at the Trustworthy Information Systems Lab, ÉTS Montréal. I enjoy working on creative projects and am always on the lookout for new ways to apply my skills. I am also a Machine Learning Freelancer at TopTal with a focus on Natural Language Processing projects
Currently, I research in the area of private data publication. My research focuses on developing private and anonymous system for handling collective complaints. The aim is to allow group complaints to be filed without revealing the identity of the complainant, while still providing authorities a proof of integrity, validity and legitimacy of the complaints.
- Mastodon: @aspiringcat@mastodon.social
- Twitter: @_aspiringcat
- Resume and Freelancing: Toptal
- Google Scholar: Meghana Bhange
- Personal Website: Meghana Bhange
- Personal Blog: blog.meghana.blog
Song that’s stuck in my head today!
Name | 🎯 Reading Bibliography | Citation | URL | Key Takeaway | AI summary |
---|---|---|---|---|---|
Camenisch, J., Dubovitskaya, M., Enderlein, R. R., Lehmann, A., Neven, G., Paquin, C., & Preiss, F.-S. (2014). Concepts and languages for privacy-preserving attribute-based authentication. Journal of Information Security and Applications, 19(1), 25–44. https://doi.org/10.1016/j.jisa.2014.03.004 | This document discusses the concepts and languages for privacy-preserving attribute-based authentication. It highlights the importance of cryptographic protocols in addressing issues such as revocation, de-anonymization, and tracking of user activities. The document introduces the Privacy ABC mechanism, which involves obtaining credentials, deriving unlinkable tokens, and validating tokens. It also mentions the use of pseudonyms, credentials, presentation tokens, and revocation mechanisms. The document emphasizes the need for accountability through inspection and describes the cryptographic techniques used in the authentication process. | ||||
Rosulek, M. (n.d.). So You're Starting a PhD? School of EECS, Oregon State University. Retrieved October 25, 2023, from https://web.engr.oregonstate.edu/~rosulekm/advising.html | • Key Concepts:
◦ Academic Writing as Communication Tool:
▪ Writing serves as a medium for organizing one's thoughts. It’s not just a chore, but a puzzle for the most eloquent articulation of ideas. It also aids debugging process and a sanity check measure.
▪ Immediate measures can be instituted, such as encapsulating the outcomes of a meeting in an academic manner. Sustaining a working document, crafting summaries of the papers, videos, and blogs perused, as well as maintaining a personal annotated bibliography are proactive steps.
• An Annotated Bibliography of Practical Secure Computation
◦ Optimally Reading Research Papers
▪ A methodical approach can be employed to delve into literature, particularly when aiming to understand key findings. Initially, one might seek lecture notes that expand upon the material, especially if it pertains to fundamental concepts. This can be achieved by incorporating the term "lecture notes" within the search queries. In the absence of good lecture notes, one might opt for video recordings of conference presentations, which often provide a digestible overview of the material. This step could be particularly beneficial for recent findings, with videos from conferences such as those organized by the International Association for Cryptologic Research (IACR) being readily available on Youtube. This tiered approach not only prepares an individual with a foundational understanding but also enhances the appreciation of the nuances articulated in the paper.
◦ Maintaining Productivity In Adversities
▪ “Treat the relationship between present-you and future-you as adversarial. Design your life accounting for the fact that future-you is selfish, short-sighted, lazy, unreliable, uncooperative, and pretty dumb.”
▪ “Mold your life so that the path of least resistance is the path of maximum productivity.”
▪ “Set small, achievable milestones, with a slow gradient towards a long-term goal. Never try to re-invent yourself overnight;”
▪ When adopting a new productivity system, ensure it's simple and usable for your future self, focusing on practicality over sophistication to effectively reduce cognitive load.
▪ Utilize a commitment contract through platforms like Beeminder to set, track, and ensure adherence to personal quantitative goals, with escalating financial penalties as a motivation to stay on task.
▪ Focus on measuring inputs like dedicating specific hours to projects, rather than output-oriented goals such as publication acceptances, aligning with SMART criteria to track and visualize progress effectively.
▪ Allocate time for deep work, structuring routines to enable sustained, undistracted attention, as emphasized by Cal Newport, to optimize the efficacy of your PhD research endeavors. | This blog post by Mike Rosulek provides valuable insights for starting a PhD. It covers topics such as academic writing as a communication tool, optimal reading of research papers, and maintaining productivity. The post suggests practical actions like summarizing meetings, writing paper and conference talk summaries, and maintaining a personal annotated bibliography. It also offers tips for maintaining clarity in academic writing, reading research papers effectively, and staying productive. The post recommends resources like Steven Pinker's book on clear writing, lecture notes and conference presentation videos for understanding research papers, and productivity tools like Beeminder. Overall, it provides a comprehensive guide for PhD students. |
Publications
Blog
Name | Tags | Summary |
---|---|---|
Research-Database | This page consists of all the paper that I want to read about attribute based signatures and a short summary. |