Department of Computer Science and Engineering : [839] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 500 of 839
Issue DateTitleAuthor(s)
2025Emotion-aware dual cross-attentive neural network with label fusion for stance detection in misinformative social media contentPangtey, Lata; Rehman, Mohammad Zia Ur; Chaudhari, Prasad; Bansal, Shubhi; Kumar, Nagendra
2025Securing Identities through Biometric Template SecurityBaghel, Vivek Singh; Prakash, Surya
2025A scalable method for extracting features using a complex network from SNP sequences and clustering using the scalable Max of Min algorithmKansal, Achint Kumar; Tiwari, Aruna; Dwivedi, Rajesh
2025High Level Synthesis Based Forensic Watermarking of Hardware IPs using IP Vendor’s DNA SignatureSengupta, Anirban; Bhui, Nabendu; Anshul, Aditya
2024LLMs as Master Forgers: Generating Synthetic Time Series Data for ManufacturingShah, Vineet
2025Scalable alignment-free feature extraction approach for genome data and their cluster analysisTripathi, Abhishek; Tiwari, Aruna; Chaudhari, Narendra S.; Ratnaparkhe, Milind Balkrishna; Dwivedi, Rajesh
2025Intra-modal Relation and Emotional Incongruity Learning using Graph Attention Networks for Multimodal Sarcasm DetectionBansal, Shubhi; Kumar, Nagendra
2025VISIONARY: Novel Spatial-Spectral Attention Mechanism for Hyperspectral Image DenoisingHosamani, Nischit; Gupta, Puneet
2025ARRQP: Anomaly Resilient Real-time QoS Prediction Framework with Graph ConvolutionKumar, Suraj; Chattopadhyay, Soumi
2025Toward Faster and Accurate Detection of CratersNath, Anirban
2025Hardware IP protection by exploiting IP vendor’s proteogenomic BioMarker as digital watermark during behavioral synthesisSengupta, Anirban; Bhui, Nabendu; Chourasia, Vishal
2025Benchmarking Hindi-to-English direct speech-to-speech translation with synthetic dataMaurya, Chandresh Kumar
2024HLS driven Hybrid GA-PSO for Design Space Exploration of Optimal Palmprint Biometric based IP Watermark and Loop Unrolling FactorSengupta, Anirban; Chourasia, Vishal; Kumar, Nitish Sai
2024SWIFT: Swarm Intelligence Driven ESL Synthesis for Functional Trojan FortificationSengupta, Anirban
2024Gen-Sign: HLS Based Watermarking Using IP Vendor's Feistel Cipher Encrypted Genomic Signature for Protecting CNN and Image Processing Filter Cores Against PiracySengupta, Anirban; Chourasia, Vishal; Singh, Ayush Kumar
2025EVADE: A novel method to detect adversarial and OOD samples in Medical Image SegmentationShukla, Sneha; Gupta, Puneet
2025RISE: Modular Blockchain-Integrated Enhancements for Reducing Food Waste and Boosting Retail AccountabilitySharma, Rishika; Banda, Gourinath
2024HLS Based Rapid Pareto Front Search of Watermarked Convolutional Layer IP DesignSengupta, Anirban; Chourasia, Vishal;
2024HLS Based Hardware Watermarking Using IP Seller's Superimposed Facial Anthropometric FeaturesSengupta, Anirban; Anshul, Aditya; Chourasia, Vishal
2025Demonstration of an Application Layer Omni-frequency IoT ProtocolGupta, Nayancy; Peddamalla, Lokesh; Mendu, Veman Sai Prabhath; Banda, Gourinath
2024HClass: Fast hybrid network traffic classification with bit and keyword level signaturesKhandait, Pratibha; Hubballi, Neminath
2024Secure Accelerated Computing: High-Level Synthesis Based Hardware Accelerator Design for CNN ApplicationsChaurasia, Rahul; Sengupta, Anirban
2025Delay-Aware Dynamic Resource Orchestration for IoT-Enabled Software-Defined Edge NetworksAgrawal, Lalita; Mondal, Ayan
2024SecureHD: Designing Low-Cost Reliable and Security Aware Hardware Accelerators During High-Level Synthesis for Computationally Intensive Application FrameworksChaurasia, Rahul; Sengupta, Anirban
2025Advancing Software-Defined Vehicles: An End-to-End Framework with Digital Twin Based Attestation for OTA UpdatesAgrawal, Krish; Rohan, Jha; Luthra, Nishkarsh; Sekhar, Pilla Venkata; Sharma, Hrishesh; Banda, Gourinath
2024Efficient Machine Learning Systems in Edge Cloud EnvironmentsShrivastava, Abhishek
2024Implication of Cyber Attacks in Smart-Grid Auction: A Performance Evaluation Case StudyShrivastava, Pragya; Hubballi, Neminath
2025On construction of data preprocessing for real-life SoyLeaf dataset & disease identification using Deep Learning ModelsGudge, Sujata; Tiwari, Aruna
2024A Framework for Future Net Zero and Sustainable Network ArchitectureHubballi, Neminath
2025Unsupervised continual learning by cross-level, instance-group and pseudo-group discrimination with hard attentionMalviya, Ankit; Dhole, Sayak; Maurya, Chandresh Kumar
2025Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction ParadigmSharmila, S. P.; Tiwari, Aruna; Chaudhari, Narendra S.
2025A novel chemical property-based, alignment-free scalable feature extraction method for genomic data clusteringDwivedi, Rajesh; Tiwari, Aruna; Singh, Saurabh Kumar; Tripathi, Abhishek
2025AVENUE: A Novel Deepfake Detection Method Based on Temporal Convolutional Network and rPPG InformationBirla, Lokendra; Saikia, Trishna; Gupta, Puneet
2024Enhancing Traffic Sign Recognition: A Deep Learning Approach for Occluded EnvironmentsChattopadhyay, Soumi
2024Securing Lightning Channels against Rational MinersMazumdar, Subhra
2025AI algorithm for predicting and optimizing trajectory of massive UAV swarmRaj, Amit; Ahuja, Kapil
2025Hierarchical Attention-enhanced Contextual CapsuleNet for Multilingual Hope Speech DetectionRehman, Mohammad Zia Ur; Pachar, Harshit; Raghaw, Chandravardhan Singh; Kumar, Nagendra
2025Secure Edge Intelligence in the 6G EraAgrawal, Lalita; Mondal, Ayan
2016Network planning using scheduling and splitting in elastic optical networksVyas, Upama; Bhatia, Vimal
2024Enhancing K-means Clustering Performance with a Two-Stage Hybrid Preprocessing StrategyTripathi, Abhishek; Tiwari, Aruna; Chaudhari, Narendra S.; Dwivedi, Rajesh
2025SANGAM: Synergizing Local and Global Analysis for Simultaneous WBC Classification and SegmentationSrivastava, Adit; Ramagiri, Aravind; Gupta, Puneet
2022Handling Data Scarcity Through Data Augmentation in Training of Deep Neural Networks for 3D Data ProcessingSrivastava, Akhilesh Mohan; Rotte, Priyanka; Jain, Arushi; Prakash, Surya
2015Big Data Analysis in Cyber-Physical SystemsSwarnkar, Mayank; Bhadoria, Robin Singh
2013Integrated load balancing approach for fault tolerance in MPLS networksChaudhari, Narendra S.
2019DDoS prevention using third party auditor in cloud computingSaxena, Rajat; Dey, Somnath
2020Design Space Exploration of DSP Hardware Using Adaptive PSO and Bacterial Foraging for Power/Area-Delay Trade-OffSengupta, Anirban; Rathor, Mahendra
2025An Ensemble Technique for Classification of Oral Cancer by Using Histopathological ImagingSaikia, Trishna; Dhamaniya, Ashutosh; Gupta, Puneet
2024ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment SystemReddy, Annapureddy Venkata Sai Kumar; Banda, Gourinath
2024Securing Reusable IP Cores Using Voice Biometric Based WatermarkAnshul, Aditya; Sengupta, Anirban
2024PrefaceMondal, Ayan
2025MNet-SAt: A Multiscale Network with Spatial-enhanced Attention for segmentation of polyps in colonoscopyRaghaw, Chandravardhan Singh; Yadav, Aryan; Sanjotra, Jasmer Singh; Dangi, Shalini; Kumar, Nagendra
2024Polynomial Calculus Sizes Over the Boolean and Fourier Bases are IncomparableMouli, Sasank
2021Advance security schemes for smart societiesJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2022Estimation of speaker age and height from speech signal using bi-encoder transformer mixture modelGupta, Tarun Kumar
2015Analysis for Security Attacks in Cyber-Physical SystemsDorbala, Sri Yogesh; Bhadoria, Robin Singh
2019Multi-resolution Local Descriptor for 3D Ear RecognitionGanapathi, Iyyakutti Iyappan; Ali, Syed Sadaf; Prakash, Surya
2025Security Analysis of ASCON Cipher Under Persistent Faults: Official Work-in-Progress PaperDas, Madhurima; Mazumdar, Bodhisatwa
2023A Survey of 3D Ear Recognition TechniquesPrakash, Surya
2022System Network Analytics: Evolution and Stable Rules of a State SeriesTiwari, Aruna
2015Architectural Analysis of Cyber-Physical SystemsYadav, Radhakishan
2025PeNCache: Popularity based cooperative caching in Named Data NetworksChaudhary, Pankaj; Hubballi, Neminath
2024High-level synthesis-based watermarking using multimodal biometricSengupta, Anirban; Anshul, Aditya
2024Hardware obfuscation-high level synthesis-based structural obfuscation for hardware security and trustSengupta, Anirban; Chaurasia, Rahul
2024HLS-based mathematical watermarks for hardware security and trustSengupta, Anirban; Anshul, Aditya
2024Introduction to hardware security and trust and high-level synthesisSengupta, Anirban; Chaurasia, Rahul
2024Fundamentals on HLS-based hardware TrojanSengupta, Anirban
2024High-level synthesis-based watermarking using protein molecular biometric with facial biometric encryptionSengupta, Anirban; Chaurasia, Rahul
2024High-level synthesis-based watermarking using retinal biometricsSengupta, Anirban; Chaurasia, Rahul
2024High-level synthesis-based watermarking using crypto-chain signature frameworkSengupta, Anirban; Anshul, Aditya
2024HLS-based fingerprintingSengupta, Anirban; Anshul, Aditya
2024Hardware Trojans-detective countermeasure against HLS-based hardware Trojan attackSengupta, Anirban
2024Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesisSengupta, Anirban; Chaurasia, Rahul
2024ConclusionSengupta, Anirban
2024High-Level Synthesis based Methodologies for Hardware Security, Trust and IP ProtectionSengupta, Anirban
2025HR-TRACK: An rPPG Method for Heartrate Monitoring Using Temporal Convolution NetworksBirla, Lokendra; Shukla, Sneha; Saikia, Trishna; Gupta, Puneet
2025Comparative and evolutionary analyses of cyclophilins in Cucumis sativus, Phaseolus vulgaris, and Vitis viniferaBharill, Neha; Tiwari, Aruna
2024Sentiment and hashtag-aware attentive deep neural network for multimodal post popularity predictionBansal, Shubhi; Kumar, Mohit; Raghaw, Chandravardhan Singh; Kumar, Nagendra
2023Obfuscated Malware Detection using Multi-class ClassificationSharmila, S. P.; Tiwari, Aruna; Chaudhari, Narendra S.
2025P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streamsSharma, Sidharth
2024A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data CentersSharma, Sidharth
2025End-to-End Speech-to-Text Translation: A SurveySethiya, Nivedita; Maurya, Chandresh Kumar
2025Hardware security against IP piracy using secure fingerprint encrypted fused amino-acid biometric with facial anthropometric signatureSengupta, Anirban; Anshul, Aditya; Singh, Ayush Kumar
2024Demystifying Visual Features of Movie Posters for Multilabel Genre IdentificationChattopadhyay, Soumi
2025Cross-Lingual Summarization of Speech-to-Speech Translation: A BaselineKarande, Pranav; Sarkar, Balaram; Maurya, Chandresh Kumar
2024RADIANCE: Reliable and interpretable depression detection from speech using transformerGupta, Anup Kumar; Dhamaniya, Ashutosh; Gupta, Puneet
2024A novel IoT-device management platform for on-the-fly generation of user interface via manifest-file addressing heterogeneityGupta, Nayancy; Banda, Gourinath
2024HLS based Hardware Watermarking of Blur, Embossment and Sharpening Filters Using Fused Ocular Biometrics and Digital SignatureChourasia, Vishal; Sengupta, Anirban; Chaurasia, Rahul
2024Event-Triggered Sliding Mode Controller for Cognitive Internet of ThingsMondal, Ayan
2024Halide-Assisted Electrophilic C-H Activation in Aqueous Acid and Salt Solutions for the Synthesis of Ru(III)-Abnormal NHC ComplexesShahid, Nida; Budhija, Vishal; Singh, Amrendra Kumar
2024Hardware Security of Image Processing Cores Against IP Piracy Using PSO-Based HLS-Driven Multi-Stage Encryption Fused with Fingerprint SignatureSengupta, Anirban; Anshul, Aditya
2024Robust Watermarking of Loop Unrolled Convolution Layer IP Design for CNN using 4-variable Encoded Register AllocationSengupta, Anirban; Chourasia, Vishal; Anshul, Aditya; Kumar, Nitish
2024Designing Optimal Secure Hardware IPs for Consumer Electronics using Fingerprint Watermark and Evolutionary Algorithm FrameworkSengupta, Anirban; Chourasia, Vishal; Kumar, Nilesh; Dawar, Praveen
2024HLS Scheduling Driven Encoded Watermarking for Secure Convolutional Layer IP Design in CNNSengupta, Anirban; Chourasia, Vishal; Anshul, Aditya
2024Weibull Distribution based False Data Injection Attack DetectionKukadiya, Purna; Jain, Trapti; Hubballi, Neminath
2024Exploiting Retina Biometric Fused with Encoded Hash for Designing Watermarked Convolutional Hardware IP Against PiracySengupta, Anirban
2024A hybrid filtering for micro-video hashtag recommendation using graph-based deep neural networkBansal, Shubhi; Rehman, Mohammad Zia Ur; Raghaw, Chandravardhan Singh; Kumar, Nagendra
2024Masked Autoencoders for Spatial-Temporal Relationship in Video-Based Group Activity RecognitionBanda, Gourinath
2024SIRD-YOLO: an enhanced deep learning model for weapon detection using spatial interactions and diverse receptive fieldsBanda, Gourinath
2024Detecting rumors in social media using emotion based deep learning approachSharma, Drishti; Shrivastava, Abhishek
2023Traffic Sign Detection and Recognition Using Dense Connections in YOLOv4Saxena, Swastik; Dey, Somnath
2024Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracySengupta, Anirban; Bhui, Nabendu; Anshul, Aditya; Chourasia, Vishal
2024Enhancing skeleton-based action recognition using a knowledge-driven shift graph convolutional networkRoy, Ananya; Tiwari, Aruna
2025A context-aware attention and graph neural network-based multimodal framework for misogyny detectionRehman, Mohammad Zia Ur; Kumar, Nagendra
2024An Explainable Contrastive-based Dilated Convolutional Network with Transformer for Pediatric Pneumonia DetectionRaghaw, Chandravardhan Singh; Bhore, Parth Shirish; Rehman, Mohammad Zia Ur; Kumar, Nagendra
2025MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detectionRai, Anuj; Dey, Somnath; Patidar, Pradeep; Rai, Prakhar
2025A social context-aware graph-based multimodal attentive learning framework for disaster content classification during emergenciesDar, Shahid Shafi; Rehman, Mohammad Zia Ur; Kumar, Nagendra
2024Lightweight human activity recognition system for resource constrained environmentsKarandikar, Mihir Kanchan; Jain, Ankit; Shrivastava, Abhishek
2024A contrastive topic-aware attentive framework with label encodings for post-disaster resource classificationDar, Shahid Shafi; Karandikar, Mihir Kanchan; Rehman, Mohammad Zia Ur; Bansal, Shubhi; Kumar, Nagendra
2024New Lower Bounds for Polynomial Calculus over Non-Boolean BasesMouli, Sasank
2024FINDINGS OF THE IWSLT 2024 EVALUATION CAMPAIGNMaurya, Chandresh Kumar; Sethiya, Nivedita; Sarkar, Balaram
2024SliAvailRAN: Availability-Aware Slicing and Adaptive Function Placement in Virtualized RANsAhmed, Saad; Ramnani, Mayank; Sharma, Sidharth
2024One Shot Learning to Select Data Augmentations for Skin Lesion ClassificationKanhegaonkar, Prasad; Prakash, Surya
2024MAAD-GAN: Memory-Augmented Attention-Based Discriminator GAN for Video Anomaly DetectionSethi, Anikeit; Saini, Krishanu; Singh, Rituraj K.; Tiwari, Aruna
2024A Survey of High Level Synthesis based Hardware (IP) Watermarking ApproachesSengupta, Anirban; Anshul, Aditya
2024An Explainable Deep Learning Model for Fingerprint Presentation Attack DetectionRai, Anuj; Dey, Somnath
2024Unsupervised Continual Learning using Cross-Level Discrimination and Evidential Pseudo Out-of-Distribution Detection along with Gradient Projected Hard AttentionMalviya, Ankit; Maurya, Chandresh Kumar
2024Automatic Signboard Recognition in Low Quality Night ImagesKagde, Manas; Choudhary, Priyanka; Dey, Somnath
2024Semi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphersJoshi, Priyanka; Mazumdar, Bodhisatwa
2024An Efficient Anomaly Detection Approach Using Cube Sampling with Streaming DataJain, Seemandhar; Jain, Prarthi; Shrivastava, Abhishek
2024CPCache: Cooperative Popularity based Caching for Named Data NetworksHubballi, Neminath; Chaudhary, Pankaj
2024Dynamic Cluster Head Selection in WSNHada, Rupendra Pratap Singh; Shrivastava, Abhishek
2024A taxonomy of unsupervised feature selection methods including their pros, cons, and challengesDwivedi, Rajesh; Tiwari, Aruna
2024An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack DetectionAnshul, Ashutosh; Jha, Ashwini; Jain, Prayag; Rai, Anuj; Dey, Somnath
2024Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detectorSengupta, Anirban; Anshul, Aditya
2024Detecting severity of Diabetic Retinopathy from fundus images: A transformer network-based reviewChattopadhyay, Soumi
2024M-HLS: Malevolent High-Level Synthesis for Watermarked Hardware IPsSengupta, Anirban; Anshul, Aditya; Chourasia, Vishal; Kumar, Nitish
2024Reducing the Impact of DoS Attack on Static and Dynamic SE Using a Deep Learning-Based ModelKukadiya, Purna; Jain, Trapti; Hubballi, Neminath
2024Indic-TEDST: Datasets and Baselines for Low-Resource Speech to Text TranslationSethiya, Nivedita; Maurya, Chandresh Kumar
2024Deep Learning Forecasting: An LSTM Neural Architecture based Approach to Rainfall and Flood Impact Predictions in BiharKumar, Guru Dayal; Pradhan, Kalandi C; Tyagi, Shekhar
2024CoTCoNet: An optimized coupled transformer-convolutional network with an adaptive graph reconstruction for leukemia detectionRaghaw, Chandravardhan Singh; Bansal, Shubhi; Rehman, Mohammad Zia Ur; Kumar, Nagendra
2024Deep learning approaches for breast cancer detection using breast MRISahu, Tanisha
2024A note on graphs with purely imaginary per-spectrumSingh, Ranveer; Wankhede, Hitesh
2024Secure FFT IP using C way Partitioning based Obfuscation and FingerprintSengupta, Anirban; Chaurasia, Rahul
2024TPMCF: Temporal QoS Prediction Using Multi-Source Collaborative FeaturesKumar, Suraj; Chattopadhyay, Soumi
2024Federated learning in healthcare applicationsKanhegaonkar, Prasad; Prakash, Surya
2024Cancelable biometrics for fingerprint template protectionBaghel, Vivek Singh; Prakash, Surya
2024T-RESIN: Throughput-aware dynamic resource orchestration for Internet of Everything-enabled software-defined edge networksAgrawal, Lalita; Mondal, Ayan
2023Securing Fault-Detectable CNN Hardware Accelerator Against False Claim of IP Ownership Using Embedded Fingerprint as CountermeasureSengupta, Anirban; Chaurasia, Rahul
2023Key-Driven Multi-Layered Structural Obfuscation of IP cores using Reconfigurable Obfuscator based Network Challenge and Switch Control LogicSengupta, Anirban; Anshul, Aditya
2023Artificial Intelligence Based Real Time Surveillance and Object localization SystemKapoor, Aarchishya
2024A Comprehensive Framework for Detecting Behavioural Anomalies in the ElderlyJain, Ankit; Shrivastava, Abhishek
2023Designing Optimized and Secured Reusable Convolutional Hardware Accelerator Against IP Piracy Using Retina BiometricsChaurasia, Rahul; Sengupta, Anirban
2023Low-Cost Hardware Security of Laplace Edge Detection and Embossment Filter Using HLS Based Encryption and PSOAnshul, Aditya; Sengupta, Anirban
2023Blockchain Based Pharmaceutical Supply Chain and its Challenges: A Review and Proposed SolutionChaurasia, Rahul
2024Watermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security FrameworkSengupta, Anirban; Anshul, Aditya
2024PePC: Popularity Based Early Predictive Caching in Named Data NetworksHubballi, Neminath; Chaudhary, Pankaj
2024Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEINJoshi, Priyanka; Mazumdar, Bodhisatwa
2024Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution ComparisonBarsha, Nisha Kumari; Hubballi, Neminath
2024CVAD-GAN: Constrained video anomaly detection via generative adversarial networkSingh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna
2024Scheduling of Safety-Critical Tasks on Edge Devices via Reinforcement LearningChattopadhyay, Soumi
2023Hardware Security of Digital Image Filter IP Cores against Piracy using IP Seller's Fingerprint Encrypted Amino Acid Biometric SampleSengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya
2024<italic>DefScan</italic>: Provably Defeating Scan Attack on AES-Like CiphersMazumdar, Bodhisatwa
2024ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game TheoryMondal, Ayan
2023A Study on the Effect of 2-Approximate Shortest-Path Integration in Extracting Context-Sensitive Dense StructuresMandal, Subhrangsu
2024B3D-EAR: Binarized 3D descriptors for ear-based human recognitionPrakash, Surya
2024Anomaly Detection in SCADA Systems: A State Transition ModelingBarsha, Nisha Kumari; Hubballi, Neminath
2023Fusing IP vendor Palmprint Biometric with Encoded Hash for Hardware IP Core Protection of Image Processing FiltersSengupta, Anirban; Anshul, Aditya; Thakur, Sumer; Kothari, Chirag
2023Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based ExplorationSengupta, Anirban; Anshul, Aditya; Kothari, Chirag; Thakur, Sumer
2024SAHA: An SDN Enabled Fog Architecture for Healthcare ApplicationsMondal, Ayan
2023Video Anomaly Latent Training GAN (VALT GAN): Enhancing Anomaly Detection Through Latent Space MiningSethi, Anikeit; Saini, Krishanu; Singh, Rituraj K.; Tiwari, Aruna
2024PrefaceMazumdar, Bodhisatwa
2023Scalable Kernelized Deep Fuzzy Clustering Algorithms for Big DataJha, Preeti; Tiwari, Aruna; Gupta, Anjali; Sukhija, Deepali; Sukhija, Deepika; Dwivedi, Rajesh
2023A Novel Feature Extraction Approach for the Clustering and Classification of Genome SequencesDwivedi, Rajesh; Tiwari, Aruna; Tripathi, Abhishek
2023Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan AttackSengupta, Anirban
2023Efficient AI Applications in Edge-Cloud EnvironmentsShrivastava, Abhishek
2023Priority Based Scheduler for Asymmetric Multi-core Edge ComputingHada, Rupendra Pratap Singh; Shrivastava, Abhishek
2024A Novel Priority Based Scheduler for Asymmetric Multi-core Edge ComputingHada, Rupendra Pratap Singh; Shrivastava, Abhishek
2024TiME: Time-Sensitive Multihop Data Transmission in Software-Defined Edge Networks for IoTMondal, Ayan
2024Attention-guided generator with dual discriminator GAN for real-time video anomaly detectionSingh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna
2024MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devicesMondal, Ayan
2023A Survey of High Level Synthesis Based Hardware Security Approaches for Reusable IP Cores [Feature]Anshul, Aditya; Sengupta, Anirban
20243sXcsNet: A framework for face presentation attack detection using deep learningBiswas, Aparna Santra; Dey, Somnath; Ahirwar, Akash Kumar
2024Multi-cut based architectural obfuscation and handprint biometric signature for securing transient fault detectable IP cores during HLSChaurasia, Rahul; Sengupta, Anirban
2023Fault Secured JPEG-Codec Hardware Accelerator with Piracy Detective Control using Secure Fingerprint TemplateChaurasia, Rahul; Reddy Asireddy, Abhinav; Sengupta, Anirban
2023Securing hardware coprocessors against piracy using biometrics for secured IoT systemsAnshul, Aditya; Chaurasia, Rahul; Sengupta, Anirban
2023Differential evolution with nearest better clustering for multimodal multiobjective optimizationAgrawal, Suchitra; Tiwari, Aruna; Yaduvanshi, Bhaskar; Rajak, Prashant
2023VALD-GAN: video anomaly detection using latent discriminator augmented GANSingh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna
2023Privacy-Preserving Human Activity Recognition System for Assisted Living EnvironmentsJain, Ankit; Shrivastava, Abhishek
2023Recent advances in the discipline of text based affect recognitionKapoor, Aarchishya
2023Predicting the spatiotemporal characteristics of atmospheric rivers: A novel data-driven approachSingh, Shivam; Kumar, Nagendra; Goyal, Manish Kumar
2023UNFOLD: 3-D U-Net, 3-D CNN, and 3-D Transformer-Based Hyperspectral Image DenoisingDixit, Aditya; Gupta, Anup Kumar; Gupta, Puneet
2023HREADAI: Heart rate estimation from face mask videos by consolidating Eulerian and Lagrangian approachesSaikia, Trishna; Birla, Lokendra; Gupta, Anup Kumar; Gupta, Puneet
2023Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesisSengupta, Anirban; Anshul, Aditya; Chaurasia, Rahul
2023eNCache: Improving content delivery with cooperative caching in Named Data NetworkingChaudhary, Pankaj; Hubballi, Neminath
2023STemGAN: spatio-temporal generative adversarial network for video anomaly detectionSingh, Rituraj K.; Saini, Krishanu; Sethi, Anikeit; Tiwari, Aruna
2023Introduction: Secured co-processors for machine learning and DSP applications using biometricsSengupta, Anirban; Chaurasia, Rahul; Bharath, K. K.
2023Biometrics for Hardware Security and Trust: Discussion and AnalysisSengupta, Anirban; Chaurasia, Rahul
2023Exploring unified biometrics with encoded dictionary for hardware security of fault secured IP core designsSengupta, Anirban; Chaurasia, Rahul; Bharath, K. K.
2023Secured convolutional layer hardware co-processor in convolutional neural network (CNN) using facial biometricSengupta, Anirban; Chaurasia, Rahul
2023Handling symmetrical IP core protection and IP protection (IPP) of Trojan-secured designs in HLS using physical biometricsSengupta, Anirban; Chaurasia, Rahul
2023Methodology for exploration of security-design cost trade-off for signature-based security algorithmsSengupta, Anirban; Chaurasia, Rahul
2023Facial signature-based biometrics for hardware security and IP core protectionSengupta, Anirban; Chaurasia, Rahul
2023Physical biometrics for hardware security of DSP and machine learning coprocessorsSengupta, Anirban
2023Integrated defense using structural obfuscation and encrypted DNA-based biometric for hardware securitySengupta, Anirban; Chaurasia, Rahul
2023Taxonomy of hardware security methodologies: IP core protection and obfuscationSengupta, Anirban; Anshul, Aditya
2023Palmprint biometrics vs. fingerprint biometrics vs. digital signature using encrypted hash: Qualitative and quantitative comparison for security of DSP coprocessorsSengupta, Anirban; Anshul, Aditya
2023Secured design flow using palmprint biometrics, steganography, and PSO for DSP coprocessorsSengupta, Anirban; Anshul, Aditya
2024Traffic sign detection in unconstrained environment using improved YOLOv4Saxena, S. P.; Dey, Somnath; Shah, Miten; Gupta, Sundesh
2023KisanQRS: A deep learning-based automated query-response system for agricultural decision-makingRehman, Mohammad Zia Ur; Kumar, Nagendra
2023An open patch generator based fingerprint presentation attack detection using generative adversarial networkRai, Anuj; Anshul, Aditya; Jha, Ashwini; Jain, Prayag; Dey, Somnath
2023PAVeDS: A Synthetic Dataset for Developing Autonomous Personal Aerial VehiclesPrasad, Deepak; Thanmai, Kondru; Banda, Gourinath
2023Efficient live exploration of a dynamic ring with mobile robotsMandal, Subhrangsu
2024A novel minutiae-oriented approach for partial fingerprint-based MasterPrint mitigationJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2023LS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environmentChaudhari, Narendra S.
2023An incremental clustering method based on multiple objectives for dynamic data analysisDwivedi, Rajesh; Tiwari, Aruna; Soni, Rishabh; Mahbubani, Rahul; Kumar, S. Ganesh
2023A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics dataDwivedi, Rajesh; Tiwari, Aruna; Ratnaparkhe, Milind Balkrishna; Mogre, Parul; Gadge, Pranjal; Jagadeesh, Kethavath
2023MahaEmoSen: Towards Emotion-aware Multimodal Marathi Sentiment AnalysisChaudhari, Prasad; Nandeshwar, Pankaj; Bansal, Shubhi; Kumar, Nagendra
2023Impact of Existing Deep CNN and Image Descriptors Empowered SVM Models on Fingerprint Presentation Attacks DetectionBaishya, Jyotishna; Tiwari, Prasheel Kumar; Rai, Anuj; Dey, Somnath
2024Multilingual personalized hashtag recommendation for low resource Indic languages using graph-based deep neural networkBansal, Shubhi; Gowda, Kushaan; Kumar, Nagendra
2023Exploration of optimal crypto-chain signature embedded secure JPEG-CODEC hardware IP during high level synthesisAnshul, Aditya; Sengupta, Anirban
2023A Multimodal Framework for Depression Detection During COVID-19 via Harvesting Social MediaAnshul, Aditya; Pranav, Gumpili Sai; Rehman, Mohammad Zia Ur; Kumar, Nagendra
2023Challenges of Facial Micro-Expression Detection and Recognition: A SurveyDwivedi, Rajesh
2023A Hybrid Feature Selection Approach for Data Clustering Based on Ant Colony OptimizationDwivedi, Rajesh; Tiwari, Aruna
2023HPC Based Scalable Logarithmic Kernelized Fuzzy Clustering Algorithms for Handling Big DataJha, Preeti; Tiwari, Aruna; Saloni, Sawarkar; Sreeharsh, Namani
2023An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack DetectionAnshul, Aditya; Jha, Ashwini; Jain, Prayag; Rai, Anuj; Dey, Somnath
2022PrefaceBansal, Shubhi
2022Promoting consumer engagement through emotional branding and sensory marketingBansal, Shubhi
2022Towards using artificial intelligence in neuromarketingBansal, Shubhi
2023Deep Analysis of Visual Product ReviewsChattopadhyay, Soumi
2023NOVEL APPROACH TO HIDE SENSITIVE ASSOCIATION RULES BY INTRODUCING TRANSACTION AFFINITYChaudhari, Narendra S.
2023Exploring the feasibility of adversarial attacks on medical image segmentationShukla, Sneha; Gupta, Anup Kumar; Gupta, Puneet
2023Towards resolving privacy and security issues in iot-based cloud computing platforms for smart city applicationsMazumdar, Bodhisatwa
2023User-aware multilingual abusive content detection in social mediaZia Ur Rehman, Mohammad; Mehta, Somya; Singh, Kuldeep; Kumar, Nagendra
2023Generating Automated Layout Design using a Multi-population Genetic AlgorithmKumar, Arun M.; Shrivastava, Abhishek
2023Reliable and Scalable Big-Data Applications in Edge Cloud EnvironmentsShrivastava, Abhishek
2023A Study and Analysis of a New Hybrid Approach for Localization in Wireless Sensor NetworksHada, Rupendra Pratap Singh; Aggarwal, Uttkarsh; Shrivastava, Abhishek
2023SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parametersSood, Shaurya; Hubballi, Neminath
2023Trustworthy Medical Image Segmentation with improved performance for in-distribution samplesShukla, Sneha; Gupta, Puneet
2022Hardware (IP) Watermarking During Behavioral SynthesisSengupta, Anirban; Rathor, Mahendra
2023Robust Security of Hardware Accelerators Using Protein Molecular Biometric Signature and Facial Biometric Encryption KeySengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya
2023CBP: Coalitional Game-Based Broadcast Proxy Re-encryption in IoTMondal, Ayan
2023Retinal Biometric for Securing JPEG Codec Hardware IP core for CE systemsChaurasia, Rahul; Sengupta, Anirban
2023Near-Real-Time Detection of Craters: A YOLO v5 Based ApproachNath, Anirban
2023PSO based exploration of multi-phase encryption based secured image processing filter hardware IP core datapath during high level synthesisAnshul, Aditya; Sengupta, Anirban
2023Robust face recognition using multimodal data and transfer learningSrivastava, Akhilesh Mohan; Chintaginjala, Sai Dinesh; Bhogavalli, Samhit Chowdary; Prakash, Surya
2022A Distinguished Method for Network Intrusion Detection using Random Initialized Viterbi Algorithm in Hidden Markov ModelSharmila, S. P.; Chaudhari, Narendra S.
2023CoviIS: A Real-Time Covid Help Information System Using Digital MediaGanji, Niharika; Bansal, Shubhi; Kumar, Nagendra
2023Investigating the impact of thresholding and thinning methods on the performance of partial fingerprint identification systems: a reviewJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2023A Novel Clustering-Based Hybrid Feature Selection Approach Using Ant Colony OptimizationDwivedi, Rajesh; Tiwari, Aruna
20234H-Pyrido[1,2-a]pyrimidin-4-one, biologically important fused heterocyclic scaffold: Synthesis and functionalizationBhawale, Rajesh T.; Chillal, Abhinay S.; Kshirsagar, Umesh Achyutrao
2023A Deep Learning Based Approach to Perform Fingerprint MatchingBaghel, Vivek Singh; Patel, Smit; Prakash, Surya; Srivastava, Akhilesh Mohan
2023A Novel Hybrid Approach for Localization in Wireless Sensor NetworksAgrawal, Uttkarsh; Shrivastava, Abhishek
2023XSSMitigate: Deep Packet Inspection based XSS Attack Quarantine in Software Defined NetworksHubballi, Neminath; Singh, Yogendra; Garg, Dipin
2022Protecting Trojan Secured DSP cores against IP piracy using Facial BiometricsChaurasia, Rahul; Sengupta, Anirban
2022Crypto-Genome Signature for Securing Hardware AcceleratorsChaurasia, Rahul; Sengupta, Anirban
2023RADIANT: Better rPPG estimation using signal embeddings and TransformerGupta, Anup Kumar; Kumar, Rupesh; Birla, Lokendra; Gupta, Puneet
2022NCache: Neighborhood Cooperative Caching in Named Data NetworkingChaudhary, Pankaj; Hubballi, Neminath
2023ALPINE: Improving Remote Heart Rate Estimation using Contrastive LearningBirla, Lokendra; Shukla, Sneha; Gupta, Anup Kumar; Gupta, Puneet
2022High-Performance Computing based Scalable Online Fuzzy Clustering Algorithms for Big DataJha, Preeti; Tiwari, Aruna; Pulakitha, Rapolu; Chauhan, Aditi
2023Feature subset selection using multimodal multiobjective differential evolutionAgrawal, Suchitra; Tiwari, Aruna; Yaduvanshi, Bhaskar; Rajak, Prashant
2022SABMIS: sparse approximation based blind multi-image steganography schemeAgrawal, Rohit; Ahuja, Kapil
2023Logics for Temporal Information Systems in Rough Set TheoryKhan, Md. Aquil; Panda, Sibsankar
2022Security Vs Design Cost of Signature Driven Security Methodologies for Reusable Hardware IP CoreChaurasia, Rahul; Sengupta, Anirban
2022Symmetrical Protection of Ownership Right's for IP Buyer and IP Vendor using Facial Biometric PairingChaurasia, Rahul; Sengupta, Anirban
2022IP Core Protection of Image Processing Filters with Multi-Level Encryption and Covert Steganographic Security ConstraintsAnshul, Aditya; Sengupta, Anirban
2022Designing Low Cost Secured DSP Core using Steganography and PSO for CE systemsAnshul, Aditya; Bharath, K. K.; Sengupta, Anirban
2022WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and DetectionSood, Shaurya; Palod, Pritesh; Hubballi, Neminath
2022WiP: EventTracker-Event Driven Evidence Collection for Digital ForensicsSangwan, Aniket; Jain, Sarthak; Hubballi, Neminath
2023Apache Spark-based scalable feature extraction approaches for protein sequence and their clustering performance analysisJha, Preeti; Tiwari, Aruna; Mounika, Mukkamalla; Nagendra, Neha
2022WiP: Control Plane Saturation Attack Mitigation in Software Defined NetworksHubballi, Neminath; Patel, Kanishk
2023Topological and Dimensional constraints based optimal placement of Layout Entities using Clustering and Genetic Algorithm57307633000; Shrivastava, Abhishek
2023Quadruple phase watermarking during high level synthesis for securing reusable hardware intellectual property coresAnshul, Aditya; Bharath, K. K.; Chaurasia, Rahul; Sengupta, Anirban
2022A novel technique for fingerprint template security in biometric authentication systemsAli, Afeeza; Baghel, Vivek Singh; Prakash, Surya
2021Email Validation & Arbitration Framework and Platform based on Blockchain for Legal MattersReddy, Bheemarjuna Rushya Sree; Sravya, Atche; Banda, Gourinath
2022Exploring Handwritten Signature Image Features for Hardware SecuritySengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya
2022Generation of Secure Fingerprint Template using DFT for Consumer Electronics DevicesBaghel, Vivek Singh; Prakash, Surya
2022Design and Implementation of Closed Loop Control of PSFB Topology Using Artificial IntelligenceGupta, Yatharth
2022SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBoxJoshi, Priyanka; Mazumdar, Bodhisatwa
2022PrefaceChaudhari, Narendra S.
2022An Energy Efficient Health Monitoring Approach with Wireless Body Area NetworksJain, Seemandhar; Jain, Prarthi; Upadhyay, Prabhat Kumar; Shrivastava, Abhishek
2022Secure Socket Shell Bruteforce Attack Detection with Petri Net ModelingTiwari, Namrata;Hubballi, Neminath;
2022Self-supervised learning for macromolecular structure classification based on cryo-electron tomogramsGupta, Tarun
2022Solving multimodal optimization problems using adaptive differential evolution with archiveAgrawal, Suchitra;Tiwari, Aruna;
2022HPC enabled a Novel Deep Fuzzy Scalable Clustering Algorithm and its Application for Protein DataJha, Preeti;Tiwari, Aruna;Anand, Vaibhav K.Arya, Sudhanshu S.Singh, Tanmay P.
2022Tackling over-smoothing in multi-label image classification using graphical convolution neural networkChauhan, Vikas;Tiwari, Aruna;Venkata, BoppudiNaik, Vislavath
2022Conceptual Study of Prevalent Methods for Cyber-Attack PredictionChaudhari, Narendra S.;
2022Neuromarketing: An Emerging Domain in the Formal Education SystemBansal, Shubhi
2022Adaptation of Pair-Polar Structures to Compute a Secure and Alignment-free Fingerprint TemplateBaghel, Vivek Singh;Prakash, Surya;
2022A robust and singular point independent fingerprint shellBaghel, Vivek Singh;Ali, Afeeza;Prakash, Surya;
2022Comparative Study of Supervised Machine Learning Methods for Prediction of Heart DiseaseUr Rehman, Mohammad Zia
2022SRF: Random Expanders for Designing Scalable Robust and Fast Communication NetworksSingh, Ranveer;
2022On the Prospects of Latent MasterPrintsJoshi, Mahesh;Mazumdar, Bodhisatwa;Dey, Somnath;
2022Secured Convolutional Layer IP Core in Convolutional Neural Network Using Facial BiometricSengupta, Anirban;Chaurasia, Rahul;
2022Workshop on AI/ML for Edge/Fog Networks (A4E)Mondal, Ayan;
2022TRIESTE: translation based defense for text classifiersGupta, Anup Kumar; Paliwal, Vardhan; Rastogi, Aryan; Gupta, Puneet
2022D-NEXUS: Defending text networks using summarizationGupta, Anup Kumar; Rastogi, Aryan; Paliwal, Vardhan; Gupta, Puneet
2021Secure Multimodal Access with 2D and 3D EarsGanapathi, Iyyakutti Iyappan; Prakash, Surya; Ali, Syed Sadaf
2022System Neural Network: Evolution and Change Based Structure LearningTiwari, Aruna
2022Pairnorm based Graphical Convolution Network for zero-shot multi-label classificationChauhan, Vikas; Tiwari, Aruna
2022Brain tumor segmentation using a hybrid multi resolution U-Net with residual dual attention and deep supervision on MR imagesPrakash, Surya
2022An Alignment-Free Fingerprint Template Protection Technique Based on Minutiae TripletsAli, Afeeza; Baghel, Vivek Singh; Prakash, Surya
2022HarSaRK_multi_rs: A Hard Real-time Kernel for Multi-core Microcontrollers in Rust LanguageVishnunaryan, K. I.; Banda, Gourinath
2022Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA ImpressionSengupta, Anirban; Chaurasia, Rahul
2022PERSIST: Improving micro-expression spotting using better feature encodings and multi-scale Gaussian TCNGupta, Puneet
2022Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP CoresRathor, Mahendra; Sengupta, Anirban
2022Multigoal-oriented error estimation and mesh adaptivity for fluid–structure interactionAhuja, Kapil
2022SUNRISE: Improving 3D mask Face Anti-spoofing for Short Videos using Pre-emptive Split and MergeBirla, Lokendra; Gupta, Puneet; Kumar, Shravan
2022Blockchain-Based Medical Records SystemSoni, Nisarg; Tayal, Saurav; Singh, Tarun Kumar; Banda, Gourinath
2021Contextual Emotion Learning ChallengeGupta, Puneet; Gupta, Anup Kumar
2022An Intelligent Recommendation-cum-Reminder SystemMaurya, Chandresh Kumar
2022Machine learning methods for hardware securityMazumdar, Bodhisatwa
2021Signature Biometric based Authentication of IP Cores for Secure Electronic SystemsRathor, Mahendra; Sengupta, Anirban
2022Wheat Disease Severity Estimation: A Deep Learning ApproachPrakash, Surya
2021Predictive Analytics for Recognizing Human Activities Using Residual Network and Fine-TuningChaudhari, Narendra S.
2021Large-Scale Contact Tracing, Hotspot Detection, and Safe Route RecommendationMaurya, Chandresh Kumar; Jain, Seemandhar; Thakre, Vishal
2021Scalable and Dynamic Big Data Processing and Service Provision in Edge Cloud EnvironmentsShrivastava, Abhishek
2022Mitigating MasterPrint vulnerability by employing minutiae geometryJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2022A Novel Scalable Feature Extraction Approach for COVID-19 Protein Sequences and their Cluster Analysis with Kernelized Fuzzy AlgorithmJha, Preeti; Tiwari, Aruna
2021Cube Sampled K-Prototype Clustering for Featured DataJain, Seemandhar; Ahuja, Kapil
2022KeyClass: Efficient keyword matching for network traffic classificationHubballi, Neminath; Khandait, Pratibha
2021Graph Classification with Minimum DFS Code: Improving Graph Neural Network ExpressivityGupta, Jhalak
2021Securing Reusable Hardware IP cores using Palmprint BiometricChaurasia, Rahul; Sengupta, Anirban
2022Palmprint Biometric vs Encrypted Hash based Digital Signature for Securing DSP Cores Used in CE systemsChaurasia, Rahul; Anshul, Aditya; Sengupta, Anirban; Gupta, Shikha
2015A novel technique of feature extraction with dual similarity measures for protein sequence classificationBharill, Neha; Tiwari, Aruna; Rawat, Anshul
2012Performance evaluation of Ad hoc network under Black hole attackSahu, Rakesh Kumar; Chaudhari, Narendra S.
2020System Network Complexity: Network Evolution Subgraphs of System State SeriesChaturvedi, Animesh; Tiwari, Aruna
2017Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesisRoy, Dipanjan; Sengupta, Anirban
2016Rangegram: A novel payload based anomaly detection technique against web trafficSwarnkar, Mayank; Hubballi, Neminath
2011A reduction of 3-Sat problem from optimal sanitization in association rule hidingTiwari, Aruna; Chaudhari, Narendra S.
2015Design space exploration of datapath (architecture) in high-level synthesis for computation intensive applicationsSengupta, Anirban
2013D-logic exploration: Rapid search of Pareto fronts during architectural synthesis of custom processorsSengupta, Anirban; Mishra, Vipul Kumar
2017DSP design protection in CE through algorithmic transformation based structural obfuscationSengupta, Anirban; Roy, Dipanjan
2010Binary neural network classifier and it's bound for the number of hidden layer neuronsChaudhari, Narendra S.; Tiwari, Aruna
2018Addressing EMI in Electric Cars with Radio Tuner Architecture [Future Directions]Racherla, Kishore
2012A new 3-clustering algorithm for minimum sum of diameter using bit representationJain, Rajkumar C.; Chaudhari, Narendra S.
2018An Efficient Algorithmic 3-SAT Formulation for Sudoku Puzzle using Graph ColoringChaudhari, Narendra S.
2018Comprehensive operation chaining based schedule delay estimation during high level synthesisMishra, Vipul Kumar; Sengupta, Anirban
2016An integrated genetic algorithm approach to 1D-cutting stock problemThomas, Jaya; Chaudhari, Narendra S.
2018Analyzing the role of interfaces in enterprise service bus: A middleware epitome for service-oriented systemsBhadoria, Robin Singh; Chaudhari, Narendra S.
2014Integrated particle swarm optimization (i-PSO): An adaptive design space exploration framework for power-performance tradeoff in architectural synthesisSengupta, Anirban; Mishra, Vipul Kumar
2017A Framework for Hardware Efficient Reusable IP Core for Grayscale Image CODECSengupta, Anirban; Roy, Dipanjan
2018Correlation power analysis on KASUMI: Attack and countermeasureMazumdar, Bodhisatwa
2018A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystemChaudhari, Narendra S.
2017The internet of things: Foundation for smart cities, ehealth, and ubiquitous computingBhadoria, Robin Singh
2018An efficient handover AKA protocol for wireless network using Chameleon Hash functionChaudhari, Narendra S.
2017Low-cost security aware HLS methodologySengupta, Anirban
2020Security of functionally obfuscated DSP coresSengupta, Anirban; Rathor, Mahendra
2018BitCoding : Network traffic classification through encoded bit level signaturesHubballi, Neminath; Swarnkar, Mayank
2020POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of CharactersKhandait, Pratibha; Hubballi, Neminath
2016An IoT Protocol and Framework for OEMs to Make IoT-Enabled Devices forward CompatibleBanda, Gourinath; Mohan, Harsh
2018Analyzing crowdsourcing to teach mobile crowdsensing a few lessonsShrivastava, Abhishek
2021Graph-Embedded Multi-Layer Kernel Ridge Regression for One-Class ClassificationGautam, Chandan; Tiwari, Aruna; Mishra, Pratik K.; Tanveer, M.
2012Classification of HIV-1 sequences using profile Hidden Markov ModelsDwivedi, Sanjiv Kumar
2021Contact-less palmprint biometric for securing DSP coprocessors used in CE systemsSengupta, Anirban; Chaurasia, Rahul; Reddy, Tarun
2013Hybrid approach for 2D strip packing problem using genetic algorithmThomas, Jaya; Chaudhari, Narendra S.
2021Multi-label classifier for protein sequence using heuristic-based deep convolution neural networkChauhan, Vikas; Tiwari, Aruna; Joshi, Niranjan; Khandelwal, Sahaj
2018Enhancing Saliency of an Object Using Genetic AlgorithmRoy, Dipanjan
2014False alarm minimization techniques in signature-based intrusion detection systems: A surveyHubballi, Neminath
2017Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security Against Trojans [Hardware Matters]Sengupta, Anirban
2018Architectural building protocols for Li-Fi (light fidelity)Swarnkar, Mayank; Bhadoria, Robin Singh
2015Big data parallelism: Challenges in different computational paradigmsMondal, Koushik
2020Introduction to hardware (IP) security: Forensic detective control and obfuscation of digital signal processing (DSP) coresSengupta, Anirban
2014MO-PSE: Adaptive multi-objective particle swarm optimization based design space exploration in architectural synthesis for application specific processor designMishra, Vipul Kumar; Sengupta, Anirban
2020Image enhancement with naturalness preservationJoshi, Piyush; Prakash, Surya
2018Shielding CE Hardware Against Reverse-Engineering Attacks Through Functional Locking [Hardware Matters]Kachave, Deepak; Sengupta, Anirban
2013Performance Enhancement of NUMA Multiprocessor Systems with On-Demand Memory MigrationMishra, Vipul Kumar
2017An automated approach to estimate human interestShrivastava, Abhishek
2020Geometric statistics-based descriptor for 3D ear recognitionPrakash, Surya
2017Coprime mapping transformation for protected and revocable fingerprint template generationDey, Somnath
2016Supportive architectural analysis for big dataBhadoria, Robin Singh
20183D Ear Biometrics: Acquisition and RecognitionDave, Ishan R.; Prakash, Surya; Mohan Srivastava, Akhilesh
2019Combining humans and machines for the future: A novel procedure to predict human interestShrivastava, Abhishek
2016VoIP profiler: Profiling voice over IP user communication behaviorBatthalla, Sainath; Swarnkar, Mayank; Hubballi, Neminath
2019Formation of stable and efficient social storage cloudMane, Pramod C.; Ahuja, Kapil
2017N-gram approach for a URL similarity measureChaudhari, Narendra S.
2018Earprint based mobile user authentication using convolutional neural network and SIFTMaheshwari, Mudit; Srivastava, Akhilesh Mohan; Agrawal, Aditi; Garg, Mahak L.; Prakash, Surya
2011An intelligent network for handwritten Devnagri digit recognition using Structural featuresChaudhari, Narendra S.
2014A data-centric and machine based approach towards fixing the cold start problem in web service recommendationShrivastava, Abhishek
2019Real-time BigData and Predictive Analytical Architecture for healthcare applicationChauhan, Vikas; Tiwari, Aruna
2019Data integrity verification: a novel approach for cloud computingSaxena, Rajat; Dey, Somnath
2019Low cost dual-phase watermark for protecting CE devices in IoT frameworkSengupta, Anirban; Roy, Dipanjan
2014Fingerprint indexing using minutiae-based invariable set of multidimensional featuresDey, Somnath
2019Cloud Security Service Level Agreements: Representation and MeasurementHubballi, Neminath; Patel, Amey Kiran; Meena, Amit Kumar
2019Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CESengupta, Anirban; Kumar, E. Ranjith; Chandra, N. Prajwal
2014Enhanced cluster validity index for the evaluation of optimal number of clusters for Fuzzy C-Means algorithmBharill, Neha; Tiwari, Aruna
2016Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attackHubballi, Neminath
2018A novel cuckoo search technique for solving discrete optimization problemsChaudhari, Narendra S.
2016A genetically optimized neural network model for multi-class classificationTiwari, Aruna; Bhardwaj, Aditi
2010A constructive approach for classification of Semi-Labeled data by extending the BLTA algorithmTiwari, Aruna; Chaudhari, Narendra S.
2020A comprehensive security analysis of match-in-database fingerprint biometric systemJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2017Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflowShrivastava, Abhishek
2018ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networksChaudhari, Narendra S.
2019A Computational Analysis of Protein Sequences for Cyclophilin Superfamily using Feature ExtractionMehra, Neha; Tiwari, Aruna; Bharill, Neha
2021A novel technique for fingerprint based secure user authenticationBaghel, Vivek Singh; Prakash, Surya
2021PrefaceSengupta, Anirban
2019Breast Cancer Diagnosis using Simultaneous Feature Selection and Classification: A Genetic Programming ApproachTiwari, Aruna
2020Fuzzy knowledge based performance analysis on big dataBharill, Neha; Tiwari, Aruna
2019A fast adaptive classification approach using kernel ridge regression and clustering for non-stationary data streamGautam, Chandan; Bansal, Raman; Garg, Ruchir; Agarwalla, Vedaanta; Tiwari, Aruna
2016Embedding low cost optimal watermark during high level synthesis for reusable IP core protectionSengupta, Anirban
2015Swarm-inspired exploration of architecture and unrolling factors for nested-loop-based application in architectural synthesisMishra, Vipul Kumar; Sengupta, Anirban
2012Fault tolerant reliable multipath routing protocol for ad hoc networkSahu, Rakesh Kumar; Chaudhari, Narendra S.
20183D ear recognition using global and local featuresPrakash, Surya
2011Formulation of 3-clustering as a 3-SAT problemJain, Rajkumar C.; Chaudhari, Narendra S.
2015Cloud Brokering Architecture for Dynamic Placement of Virtual MachinesRane, Dheeraj; Shrivastava, Abhishek
2017Aspect of ESB with wireless sensor networkBhadoria, Robin Singh
2018A dynamic service description for mobile environmentsVerma, Rohit; Shrivastava, Abhishek
2019Quality Analysis of Fingerprint Images Using Local Phase QuantizationDey, Somnath
2020Genetically Optimized Deep Neural Learning for Breast Cancer PredictionAgrawal, Suchitra; Tiwari, Aruna; Goel, Ishan
2012Information extraction from semi-structured and un-structured documents using probabilistic context free grammar inferenceChaudhari, Narendra S.
2017Secure algorithms for SAKA protocol in the GSM networkChaudhari, Narendra S.
2018SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A NetworkChaudhari, Narendra S.
2020Network Security Systems Log Analysis for Trends and Insights: A Case StudyMeena, Amit Kumar; Hubballi, Neminath; Singh, Yogendra; Bhatia, Vimal
2021Learning similarity and dissimilarity in 3D faces with triplet networkBhople, Anagha R.; Prakash, Surya
2021MERASTC: Micro-expression Recognition using Effective Feature Encodings and 2D Convolutional Neural networkGupta, Puneet
2021A Novel Scalable Kernelized Fuzzy Clustering Algorithms Based on In-Memory Computation for Handling Big DataJha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla
2018A firefly algorithm driven approach for high level synthesisSengupta, Anirban; Rathlavat, Santosh
2012Enhanced traffic aware LSP selection method in MPLS networksChaudhari, Narendra S.
2020Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprintingSengupta, Anirban
2019An improved genetic algorithm and a new discrete cuckoo algorithm for solving the classical substitution cipherChaudhari, Narendra S.
2019Enhancing saliency of a target object through color modification of every object using genetic algorithmRoy, Dipanjan
2020BitProb: Probabilistic Bit Signatures for Accurate Application IdentificationHubballi, Neminath; Swarnkar, Mayank
2021Structural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP coresSengupta, Anirban; Rathor, Mahendra
2014Time varying vs. fixed acceleration coefficient PSO driven exploration during high level synthesis: Performance and quality assessmentSengupta, Anirban; Mishra, Vipul Kumar
2013Swarm intelligence driven Design Space Exploration: An integrated framework for power-performance trade-off in architectural synthesisMishra, Vipul Kumar; Sengupta, Anirban
2019Scaled and Projected Spectral Clustering with Vector Quantization for Handling Big DataNemade, Vishal; Shastri, Aditya A.; Ahuja, Kapil; Tiwari, Aruna
2018A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A NetworksChaudhari, Narendra S.
2017A forward compatible IoT protocol and framework addressing concerns due to internet-outageBanda, Gourinath; Mohan, Harsh; Saini, Manish Singh
2019PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networksChaudhari, Narendra S.
2019Two-stage quality adaptive fingerprint image enhancement using Fuzzy C-means clustering based fingerprint quality analysisDey, Somnath
2021Cryptography-driven IP steganography for DSP hardware acceleratorsSengupta, Anirban
2017Protecting IP core during architectural synthesis using HLT-based obfuscationSengupta, Anirban; Roy, Dipanjan
2016Evolution of the IP Design Process in the Semiconductor/EDA Industry Hardware MattersSengupta, Anirban
2020Parameterized complexity of determinant and permanentSingh, Ranveer
2014Extended support for visualizing requirements: Filtering and tracing requirements in ReBlockPoothiyot, Ashok Pancily
2016Integrating physical level design and high level synthesis for simultaneous multi-cycle transient and multiple transient fault resiliency of application specific datapath processorsKachave, Deepak; Sengupta, Anirban
2014Differential reward mechanism based online learning algorithm for url-based topic classificationChaudhari, Narendra S.
2019Identifying Anomalous HTTP Traffic with Association Rule MiningHubballi, Neminath
2020Securing Hardware Accelerators for CE Systems Using Biometric FingerprintingSengupta, Anirban; Rathor, Mahendra
2018Functional obfuscation of DSP cores using robust logic locking and encryptionSengupta, Anirban
2018Mathematical validation of HWT based lossless image compressionSengupta, Anirban; Roy, Dipanjan
2015An analysis of integration of hill climbing in crossover and mutation operation for EEG signal classificationBhardwaj, Arpit; Tiwari, Aruna; Varma, M. Vishaal; Krishna, M. Ramesh
2014Automated exploration of datapath in high level synthesis using temperature dependent bacterial foraging optimization algorithmSengupta, Anirban
2019Localized multiple kernel support vector data descriptionGautam, Chandan; Tiwari, Aruna
2020NViZ: An Interactive Visualization of Network Security Systems LogsMeena, Amit Kumar; Hubballi, Neminath
2016IEEE Access Special Section Editorial: Security and Reliability Aware System Design for Mobile Computing DevicesSengupta, Anirban
2018Guest Editorial: Hardware-Assisted Techniques for Security and Protection of Consumer ElectronicsSengupta, Anirban
2016False mapped feature removal in spin images based 3D ear recognitionIyyakutti Iyappan, G.; Prakash, Surya
2020Efficient Keyword Matching for Deep Packet Inspection based Network Traffic ClassificationKhandait, Pratibha; Hubballi, Neminath; Mazumdar, Bodhisatwa
2016Novel quantum inspired binary neural network algorithmTiwari, Aruna
2018DNS spoofing in local networks made easySwarnkar, Mayank; Hubballi, Neminath
2021Scalable Fuzzy Clustering-based Regression to Predict the Isoelectric Points of the Plant Protein Sequences using Apache SparkChoudhary, Ajay K.; Jha, Preeti; Tiwari, Aruna; Bharill, Neha
2022An Algorithm for the Sequence Alignment with Gap Penalty Problem using Multiway Divide-and-Conquer and Matrix TranspositionShubham; Prakash, Surya; Ganapathi, Pramod
2020Minimum variance-embedded deep kernel regularized least squares method for one-class classification and its applications to biomedical dataGautam, Chandan; Mishra, Pratik K.; Tiwari, Aruna; Richhariya, Bharat; Tanveer, M.
2022PATRON: Exploring respiratory signal derived from non-contact face videos for face anti-spoofingBirla, Lokendra; Gupta, Puneet
2020EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groupsChaudhari, Narendra S.
2018Message from the technical program chairsSengupta, Anirban
2021Entropy Reduction Model for Pinpointing Differential Fault Analysis on SIMON and SIMECK CiphersSinghal, Naman; Joshi, Priyanka; Mazumdar, Bodhisatwa
2015An efficient technique for image contrast enhancement using artificial bee colonyJoshi, Piyush; Prakash, Surya
2019Reduction of time for speech recognition system by shrinking adaptive layers of ADAG for real time system using ADAT SVMChaudhari, Narendra S.
2020AEKOC+: Kernel Ridge Regression-Based Auto-Encoder for One-Class Classification Using Privileged InformationGautam, Chandan; Tiwari, Aruna; Tanveer, M.
2021A Robotic Software Framework for Autonomous Navigation in Unknown EnvironmentBanda, Gourinath
2015Cloud Shield: Effective solution for DDoS in cloudSaxena, Rajat; Dey, Somnath
2015Cloud partner selection algorithm for dynamic cloud collaborationMane, Pramod C.
2021Introduction: Secured and optimized hardware accelerators for DSP and image processing applicationsSengupta, Anirban
2019SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networksChaudhari, Narendra S.
2020Stability, efficiency, and contentedness of social storage networksMane, Pramod C.; Ahuja, Kapil
2020Multi-Label classifier based on Kernel Random Vector Functional Link NetworkChauhan, Vikas; Tiwari, Aruna
2019Localized Multiple Kernel learning for Anomaly Detection: One-class ClassificationGautam, Chandan; Sudharsan, K.; Tiwari, Aruna; Ahuja, Kapil
2012Placement strategy for trim minimization in one-dimensional cutting stockThomas, Jaya; Chaudhari, Narendra S.
2021WiP: Slow Rate HTTP Attack Detection with Behavioral ParametersSood, Shaurya; Hubballi, Neminath
2016If-what analysis to manage batch systemsBatthalla, Sainath; Hubballi, Neminath
2019Linear approximation and differential attacks on logic locking techniquesBairwa, Ghanshyam; Mandal, Souvik; Nikhil, Tatavarthy Venkat; Mazumdar, Bodhisatwa
2020Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks (Journal of Network and Systems Management, (2020), 10.1007/s10922-020-09514-3)Tayal, Anuja; Sharma, Neha; Hubballi, Neminath
2020Multi-phase obfuscation for fault-secured DSP circuitsSengupta, Anirban
2018PASE-AKA: Performance and Security Enhanced AKA Protocol for UMTS NetworkChaudhari, Narendra S.
2015GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesisSengupta, Anirban
20173D ear based human recognition using gauss map clusteringPrakash, Surya
2017Fingerprint shell construction with prominent minutiae pointsPrakash, Surya
2018Communication recurrence and similarity detection in network flowsTayal, Anuja; Hubballi, Neminath
2013Efficient human recognition system using ear and profile facePrakash, Surya
2012A performance analysis of network under SYN-flooding attackSahu, Rakesh Kumar; Chaudhari, Narendra S.
2017Designing Low-Cost Hardware Accelerators for CE Devices [Hardware Matters]Sengupta, Anirban; Rathlavat, Santosh
2012A secure approach for SMS in GSM networkChaudhari, Narendra S.
2021Multimodal hardware accelerators for image processing filtersSengupta, Anirban
2018Slow rate denial of service attacks against HTTP/2 and detectionHubballi, Neminath
2012An analytical approach for column generation for One-Dimensional cutting stock problemThomas, Jaya; Chaudhari, Narendra S.
2019Robust Logic locking for Securing Reusable DSP CoresRathor, Mahendra; Sengupta, Anirban
2020ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation Based Ciphers with a Case Study on GIFTJoshi, Priyanka; Mazumdar, Bodhisatwa
2018Quantum-Inspired Stacked Auto-encoder-Based Deep Neural Network Algorithm (Q-DNN)Tiwari, Aruna; Bagade, Vinay
2014A novel web service directory framework for mobile environmentsVerma, Rohit; Shrivastava, Abhishek
2010Semi-supervised classification for intrusion detection system in networksChaudhari, Narendra S.; Tiwari, Aruna; Thomas, Jaya
2015A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphersChaudhari, Narendra S.
2019Minimum Variance-Embedded Multi-layer Kernel Ridge Regression for One-class ClassificationGautam, Chandan; Tiwari, Aruna
2017Retina inspired no-reference image quality assessment for blur and noiseJoshi, Piyush; Prakash, Surya
2014Handling big data with fuzzy based classification approachBharill, Neha; Tiwari, Aruna
2015Online and semi-online sentiment classificationGautam, Chandan
2016Cloud Audit: A Data Integrity Verification Approach for Cloud ComputingSaxena, Rajat; Dey, Somnath
2019PrefaceSengupta, Anirban; Vishvakarma, Santosh Kumar
2021A comparative study of handcrafted local texture descriptors for fingerprint liveness detection under real world scenariosDey, Somnath
2016How Secure are Web Servers? An empirical study of Slow HTTP DoS attacks and detectionHubballi, Neminath; Singh, Yogendra
2014An experimental evaluation of feature selection based classifier ensemble for handwritten numeral recognitionChaudhari, Narendra S.
2018Security architecture for cloud computingBhadoria, Robin Singh
2020A Cooperative Algorithm for Lane Sorting of Autonomous VehiclesChouhan, Aaditya Prakash; Banda, Gourinath; Jothibasu, Kanishkar
2018Fuzzy LogicHybrid model with semantic filtering approach for pseudo relevance feedback-based query expansionBharill, Neha
2016A novel access control model for cloud computingSaxena, Rajat; Dey, Somnath
2020Obfuscating DSP Hardware Accelerators in CE Systems Using Pseudo Operations MixingRathor, Mahendra; Sengupta, Anirban
2017Fingerprint image quality assessment and scoringDey, Somnath
2015ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS NetworksThomas, Jaya; Chaudhari, Narendra S.
2010Intelligent systems and polynomial solvability of NP-complete problemsChaudhari, Narendra S.
2014Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimizationChaudhari, Narendra S.
Collection's Items (Sorted by Submit Date in Descending order): 1 to 500 of 839