Collection's Items (Sorted by Submit Date in Descending order): 501 to 839 of 839
Issue Date | Title | Author(s) |
2019 | Toward efficient architecture-independent algorithms for dynamic programs | Ganapathr, Pramod |
2019 | Protecting DSP Kernels Using Robust Hologram-Based Obfuscation | Sengupta, Anirban; Rathor, Mahendra |
2021 | Apache Spark based kernelized fuzzy clustering framework for single nucleotide polymorphism sequence analysis | Jha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla |
2015 | Bacterial foraging driven exploration of multi cycle fault tolerant datapath based on power-performance tradeoff in high level synthesis | Sengupta, Anirban |
2020 | Hand Down, Face Up: Innovative Mobile Attendance System Using Face Recognition Deep Learning | Agrawal, Aditi; Garg, Mahak L.; Prakash, Surya; Joshi, Piyush; Srivastava, Akhilesh Mohan |
2019 | Hardware Steganography for IP Core Protection of Fault Secured DSP Cores | Sengupta, Anirban; Gupta, Gargi; Jalan, Harshit |
2020 | Forensic detective control using a digital signature-based watermark for IP core protection | Sengupta, Anirban |
2012 | Learning alignment profiles for structural similarity measure | Chaudhari, Narendra S. |
2016 | Analysis for cognitive radio sensor network architecture and its role in dynamic spectrum management | Bhadoria, Robin Singh |
2014 | Security architecture for cloud computing | Bhadoria, Robin Singh |
2014 | Detection of replication origin sites in herpesvirus genomes by clustering and scoring of palindromes with quadratic entropy measures | Rizvi, Ahsan Z. |
2020 | Logic locking with provable security against power analysis attacks | Mazumdar, Bodhisatwa |
2020 | Investigating Fingerprint Quality Features for Liveness Detection | Anshul, Ashutosh; Jha, Ashwini; Dey, Somnath |
2020 | IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems | Rathor, Mahendra; Sengupta, Anirban |
2015 | A novel technique of feature extraction with dual similarity measures for protein sequence classification | Bharilla, Neha; Tiwarib, Aruna; Rawat, Anshul |
2019 | Local Contrast Phase Descriptor for Quality Assessment of Fingerprint Images | Dey, Somnath |
2020 | MOMBAT: Heart rate monitoring from face video using pulse modeling and Bayesian tracking | Gupta, Puneet |
2018 | Multi-phase watermark for IP core protection | Sengupta, Anirban; Roy, Dipanjan |
2019 | Improved Delay Estimation Model for Loop based DSP cores | Sengupta, Anirban; Rathor, Mahendra |
2015 | Quantum based learning with binary neural network | Tiwari, Aruna |
2019 | Classical Cryptanalysis Attacks on Logic Locking Techniques | Mazumdar, Bodhisatwa; Bairwa, Ghanshyam; Mandal, Souvik; Nikhil, Tatavarthy Venkat |
2017 | Message from the technical program chairs: ICIT 2016 | Sengupta, Anirban |
2011 | An efficient method for the Devnagri handwritten vowel recognition | Chaudhari, Narendra S. |
2015 | Towards Service Description for Mobile Environments | Verma, Rohit; Shrivastava, Abhishek |
2021 | Minimum variance embedded auto-associative kernel extreme learning machine for one-class classification | Mishra, Pratik K.; Gautam, Chandan; Tiwari, Aruna |
2015 | Image Analysis-Based Automatic Utility Pole Detection for Remote Surveillance | Dutta, Tanima |
2018 | Obfuscated JPEG Image Decompression IP Core for Protecting Against Reverse Engineering [Hardware Matter] | Roy, Dipanjan; Sengupta, Anirban |
2019 | System Evolution Analytics: Evolution and Change Pattern Mining of Inter-Connected Entities | Chaturvedi, Animesh; Tiwari, Aruna |
2015 | User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis | Sengupta, Anirban |
2018 | Triple-phase watermarking for reusable IP core protection during architecture synthesis | Sengupta, Anirban; Roy, Dipanjan |
2017 | Low cost optimized Trojan secured schedule at behavioral level for single & Nested loop control data flow graphs (Invited Paper) | Sengupta, Anirban; Roy, Dipanjan |
2014 | Human recognition using 3D ear images | Prakash, Surya |
2018 | Perceptual filling-in of blind-spot for surrounding color gradient stimuli | Roy, Rajarshi |
2018 | Congestion-aware probe selection for fault detection in networks | Tayal, Anuja; Hubballi, Neminath |
2013 | Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary | Ruj, Sushmita |
2015 | Application workload pattern and its implications for resource provisioning in cloud: An early experience | Hubballi, Neminath |
2018 | Effect of NBTI stress on DSP cores used in CE devices: Threat model and performance estimation | Kachave, Deepak; Sengupta, Anirban; Neema, Shubha; Harsha, Panugothu Sri |
2015 | Big data parallelism: Issues in different X-information paradigms | Mondal, Koushik |
2018 | Quantum-inspired evolutionary approach for selection of optimal parameters of fuzzy clustering | Bharill, Neha; Tiwari, Aruna |
2020 | A Prototype Model to Predict Human Interest: Data Based Design to Combine Humans and Machines | Shrivastava, Abhishek |
2019 | Enhanced Functional Obfuscation of DSP core using Flip-Flops and Combinational logic | Rathor, Mahendra; Sengupta, Anirban |
2013 | Solution to an attack on digital signature in SMS security | Chaudhari, Narendra S.; Thomas, Jaya |
2020 | Multi-level watermark for IP protection | Sengupta, Anirban |
2013 | Performance improvement in genetic programming using modified crossover and node mutation | Tiwari, Aruna |
2014 | Service choreography: Present and future | Shrivastava, Abhishek |
2019 | Crypto based Multi-Variable Fingerprinting for Protecting DSP cores | Sengupta, Anirban; Singh, Utkarsh Kumar; Premchand, Piyush Kalkute |
2020 | BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users | Chaudhari, Narendra S. |
2019 | On the Construction of Hierarchical Broad Learning Neural Network: An Alternative Way of Deep Learning | Chauhan, Vikas; Tiwari, Aruna |
2011 | Removing code bloating in crossover operation in Genetic Programming | Tiwari, Aruna; Chaudhari, Narendra S. |
2012 | Channel assignment problem in cellular network and its reduction to satisfiability using graph k-colorability | Chaudhari, Narendra S. |
2012 | Secure encryption with digital signature approach for Short Message Service | Chaudhari, Narendra S. |
2021 | Secure Communication System Implementation for Robot-based Surveillance Applications | Banda, Gourinath |
2020 | Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging Systems | Sengupta, Anirban; Rathor, Mahendra |
2017 | Data processing in IoT using an enterprise service bus | Prasad, Siddharth S.; Bhadoria, Robin Singh |
2020 | Formal verification of heuristic autonomous intersection management using statistical model checking | Chouhan, Aaditya Prakash; Banda, Gourinath |
2020 | POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation | Hubballi, Neminath; Tiwari, Namrata; Khandait, Pratibha |
2018 | SRCPR: SignReCrypting proxy re-signature in secure VANET groups | Chaudhari, Narendra S. |
2015 | Liver disease diagnosis using quantum-based binary neural network learning algorithm | Tiwari, Aruna |
2019 | Vector quantized spectral clustering applied to whole genome sequences of plants | Shastri, Aditya A.; Ahuja, Kapil; Shah, Aditya; Gagrani, Aishwary; Lal, Anant |
2021 | DARE: Deceiving Audio–Visual speech Recognition model | Mishra, Saumya; Gupta, Anup Kumar; Gupta, Puneet |
2021 | Fuzzy-Based Kernelized Clustering Algorithms for Handling Big Data Using Apache Spark | Jha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla |
2020 | Securing IP Cores in CE Systems using Key-driven Hash-chaining based Steganography | Rathor, Mahendra; Mishra, Vipul Kumar; Sengupta, Anirban |
2018 | DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks | Chaudhari, Narendra S. |
2020 | Enhanced Security of DSP Circuits Using Multi-Key Based Structural Obfuscation and Physical-Level Watermarking for Consumer Electronics Systems | Sengupta, Anirban; Rathor, Mahendra |
2019 | NR-IQA for noise-affected images using singular value decomposition | Joshi, Piyush; Prakash, Surya |
2011 | A graph coloring approach for channel assignment in cellular network via propositional satisfiability | Chaudhari, Narendra S. |
2018 | Integrating compiler driven transformation and simulated annealing based floorplan for optimized transient fault tolerant DSP cores | Sengupta, Anirban; Kachave, Deepak |
2015 | A real-time framework for detection of long linear infrastructural objects in aerial imagery | Dutta, Tanima |
2010 | A Novel SVM based approach for noisy data elemination | Chaudhari, Narendra S.; Tiwari, Aruna; Thomas, Jaya |
2019 | System Evolution Analytics: Deep Evolution and Change Learning of Inter-Connected Entities | Chaturvedi, Animesh; Tiwari, Aruna |
2020 | Hologram-based structural obfuscation for DSP cores | Sengupta, Anirban; Rathor, Mahendra |
2015 | Enhanced fingerprint shell | Prakash, Surya |
2015 | Swarm intelligence driven design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis based on user power-delay budget | Sengupta, Anirban |
2011 | Combinatorial approach of association rule mining in software engineering | Chaudhari, Narendra S. |
2021 | A non-invertible transformation based technique to protect a fingerprint template | Baghel, Vivek Singh; Prakash, Surya |
2017 | The Performance Metric for Enterprise Service Bus (ESB) in SOA system: Theoretical underpinnings and empirical illustrations for information processing | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2019 | A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance | Bharill, Neha |
2021 | Polynomial vault: A secure and robust fingerprint based authentication | Prakash, Surya |
2021 | MinStab: Stable network evolution rule mining for system changeability analysis | Chaturvedi, Animesh; Tiwari, Aruna |
2019 | Pragmatic sensory data semantics with service-oriented computing | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2021 | IoTHunter: IoT network traffic classification using device specific keywords | Khandait, Pratibha; Hubballi, Neminath; Mazumdar, Bodhisatwa |
2018 | Autonomous intersection management: A heuristic approach | Chouhan, Aaditya Prakash; Banda, Gourinath |
2016 | Exploring Low Cost Optimal Watermark for Reusable IP Cores during High Level Synthesis | Sengupta, Anirban |
2014 | Choreographing services over mobile devices | Shrivastava, Abhishek |
2020 | Securing biometric user template using modified minutiae attributes | Prakash, Surya |
2014 | Automated exploration of datapath and unrolling factor during power-performance tradeoff in architectural synthesis using multi-dimensional PSO algorithm | Sengupta, Anirban; Mishra, Vipul Kumar |
2013 | A novel fuzzy rule guided intelligent technique for gray image extraction and segmentation | Mondal, Koushik |
2019 | Low-cost robust anti-removal logic for protecting functionally obfuscated DSP core against removal attack | Rathor, Mahendra; Sengupta, Anirban |
2022 | AND-rPPG: A novel denoising-rPPG network for improving remote heart rate estimation | Birla, Lokendra; Gupta, Puneet |
2018 | Reliability and threat analysis of NBTI stress on DSP cores | Sengupta, Anirban; Kachave, Deepak; Neema, Shubha; Panugothu, Sri Harsha |
2020 | DDoS attack prevention using collaborative approach for cloud computing | Saxena, Rajat; Dey, Somnath |
2014 | SecureSMS: A secure SMS protocol for VAS and other applications | Chaudhari, Narendra S. |
2011 | Performance analysis of flexible zone based features to classify Hindi numerals | Chaudhari, Narendra S. |
2011 | Handling the problem of code bloating to enhance the performance of classifier designed using genetic programming | Tiwari, Aruna; Chaudhari, Narendra S. |
2019 | KOC+: Kernel ridge regression based one-class classification using privileged information | Gautam, Chandan; Tiwari, Aruna; Tanveer, M. |
2019 | A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification | Dey, Somnath |
2018 | Obfuscation of fault secured DSP design through hybrid transformation | Sengupta, Anirban; Neema, Shubha; Harsha, Sri |
2021 | Lightweight Security Protocols for Securing IoT Devices in Smart Cities | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2017 | Guest Editorial Securing IoT Hardware: Threat Models and Reliable, Low-Power Design Solutions | Sengupta, Anirban |
2021 | Modelling Trust to Preserve End-User Privacy in Location Based Services | Chaudhari, Narendra S. |
2015 | Advance quantum based binary neural network learning algorithm | Patel, Om Prakash; Tiwari, Aruna |
2014 | Design of efficient packing system using genetic algorithm based on hyper heuristic approach | Thomas, Jaya; Chaudhari, Narendra S. |
2019 | Signcrypting the group signature with non-transitive proxy re-encryption in vanet | Chaudhari, Narendra S. |
2013 | Genetic based effective column generation for 1-D Cutting Stock problem | Thomas, Jaya; Chaudhari, Narendra S. |
2014 | Error masking of transient faults: Exploration of a fault tolerant datapath based on user specified power and delay budget | Sengupta, Anirban |
2013 | A decentralized security framework for data aggregation and access control in smart grids | Ruj, Sushmita |
2020 | Protection of fault-secured IP cores using digital signature-based watermarks | Sengupta, Anirban |
2015 | Exploration of optimal multi-cycle transient fault secured datapath during high level synthesis based on user area-delay budget | Sengupta, Anirban |
2013 | Selection of efficient crossover operator in Metaheuristic approach for 2D strip packing | Thomas, Jaya; Chaudhari, Narendra S. |
2020 | Quality Assessment of Fingerprint Images Using Local Texture Descriptors | Dey, Somnath |
2017 | Antipiracy-Aware IP Chipset Design for CE Devices: A Robust Watermarking Approach [Hardware Matters] | Sengupta, Anirban; Roy, Dipanjan |
2021 | CSIS: Compressed sensing-based enhanced-embedding capacity image steganography scheme | Agrawal, Rohit; Ahuja, Kapil |
2014 | Security services using crowdsourcing | Verma, Rohit; Ruj, Sushmita |
2017 | Protecting ownership of reusable IP core generated during high level synthesis | Kachave, Deepak; Sengupta, Anirban |
2015 | Recycling bicgstab with an application to parametric model order reduction | Ahuja, Kapil |
2018 | A Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless Networks | Chaudhari, Narendra S. |
2019 | Advanced quantum based neural network classifier and its application for objectionable web content filtering | Bharill, Neha; Tiwari, Aruna |
2021 | Compression of XML and JSON API Responses | Tiwary, Gyan Prakash; Shrivastava, Abhishek |
2016 | Construction of multi-class classifiers by Extreme Learning Machine based one-class classifiers | Gautam, Chandan; Tiwari, Aruna; Ravindran, Sriram |
2018 | Robust technique for fingerprint template protection | Prakash, Surya |
2019 | Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning | Sengupta, Anirban; Prajwal Chandra, N.; Ranjith Kumar, E. |
2012 | An extended approach for SMS security using authentication functions | Chaudhari, Narendra S. |
2017 | An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator | Chaudhari, Narendra S. |
2012 | A novel fuzzy rule guided intelligent technique for gray image extraction and segmentation | Mondal, Koushik |
2018 | ESMGB: Efficient and secure modified group-based AKA protocol for maritime communication networks | Chaudhari, Narendra S. |
2014 | Exploration of multi-objective tradeoff during high level synthesis using bacterial chemotaxis and dispersal | Sengupta, Anirban |
2020 | Frontiers in securing IP cores | Sengupta, Anirban |
2021 | SSFA: Subset fault analysis of ASCON-128 authenticated cipher | Joshi, Priyanka; Mazumdar, Bodhisatwa |
2018 | High Level Synthesis Methodology for Exploring Loop Unrolling Factor and Functional Datapath | Sengupta, Anirban |
2014 | A genetically optimized neural network for classification of breast cancer disease | Tiwari, Aruna; Babel, Darshil |
2021 | Toe prints: An application study for biometric verification in adults | Baghel, Vivek Singh; Prakash, Surya |
2016 | Intellectual Property Cores: Protection designs for CE products | Sengupta, Anirban |
2017 | Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling | Golait, Diksha; Hubballi, Neminath |
2020 | ALigN: A Highly Accurate Adaptive Layerwise Log_2_Lead Quantization of Pre-Trained Neural Networks | Gupta, Siddharth; Ahuja, Kapil; Tiwari, Aruna; Kumar, Akash |
2016 | Quality based classification of images for illumination invariant face recognition | Subramanyam, Bharath; Joshi, Piyush; Meena, Manoj Kumar; Prakash, Surya |
2018 | Density-wise two stage mammogram classification using texture exploiting descriptors | Shastri, Aditya A.; Ahuja, Kapil |
2021 | Anomaly Detection in Resource Constrained Environments With Streaming Data | Jain, Prarthi; Jain, Seemandhar; Shrivastava, Abhishek |
2021 | Secured hardware accelerators for DSP and image processing applications | Sengupta, Anirban |
2019 | Low Cost Functional Obfuscation of Reusable IP Ores Used in CE Hardware Through Robust Locking | Sengupta, Anirban; Kachave, Deepak; Roy, Dipanjan |
2020 | Obfuscated Hardware Accelerators for Image Processing Filters - Application Specific and Functionally Reconfigurable Processors | Sengupta, Anirban; Rathor, Mahendra |
2017 | Preface | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2016 | Intellectual property core protection of control data flow graphs using robust watermarking during behavioural synthesis based on user resource constraint and loop unrolling factor | Sengupta, Anirban |
2019 | Classification of electroencephalogram signal for the detection of epilepsy using Innovative Genetic Programming | Tiwari, Aruna |
2014 | Classification of EEG signals using a novel genetic programming approach | Bhardwaj, Arpit; Tiwari, Aruna; Krishna, M. Ramesh; Varma, M. Vishaal |
2017 | A probabilistic anomaly detection scheme to detect DHCP starvation attacks | Hubballi, Neminath |
2012 | Analysis of El-Gamal with Diffie-Hellman scheme using Hash-function for message security | Chaudhari, Narendra S. |
2021 | Fingerprint biometric for securing hardware accelerators | Sengupta, Anirban |
2017 | Query processing techniques in probabilistic databases | Chaudhari, Narendra S. |
2018 | Uncertainty in sensor data acquisition for SOA system | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2011 | Polynomial solvability of satisfiability and its implication to hybrid cryptosystem security | Thomas, Jaya; Chaudhari, Narendra S. |
2021 | Video Classification using SlowFast Network via Fuzzy rule | Rituraj; Tiwari, Aruna |
2020 | Preconditioned linear solves for parametric model order reduction | Ahuja, Kapil |
2014 | Image quality assessment based on noise detection | Joshi, Piyush; Prakash, Surya |
2018 | Data backup network formation with heterogeneous agents: (Extended abstract) | Jain, Harshit; Teja, Guduru Sai; Mane, Pramod C.; Ahuja, Kapil |
2018 | Security Vulnerabilities in Handover Authentication Mechanism of 5G Network | Chaudhari, Narendra S. |
2017 | Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANET | Chaudhari, Narendra S. |
2012 | Performance evaluation of classifiers applying directional features for Devnagri numeral recognition | Chaudhari, Narendra S. |
2019 | Inexact Linear Solves in Model Reduction of Bilinear Dynamical Systems | Choudhary, Rajendra; Ahuja, Kapil |
2021 | Point cloud based deep convolutional neural network for 3D face recognition | Bhople, Anagha R.; Srivastava, Akhilesh Mohan; Prakash, Surya |
2019 | Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit | Chaudhari, Narendra S. |
2011 | Integration testing for component-based system with UML and OCL | Chaudhari, Narendra S. |
2019 | Business forecasting in the light of statistical approaches and machine learning classifiers | Chaudhuri, Narendra S. |
2015 | Breast cancer diagnosis using Genetically Optimized Neural Network model | Tiwari, Aruna |
2013 | Rapid search of Pareto fronts using D-logic exploration during multi-objective tradeoff of computation intensive applications | Sengupta, Anirban; Mishra, Vipul Kumar |
2017 | Featured analysis of enterprise service bus | Bhadoria, Robin Singh |
2021 | Service Evolution Analytics: Change and Evolution Mining of a Distributed System | Chaturvedi, Animesh; Tiwari, Aruna |
2014 | Building trusted ICs using split fabrication | Das, Bishnu P. |
2021 | Grape Disease Detection Network Based on Multi-Task Learning and Attention Features | Dey, Somnath |
2017 | Low cost fault tolerance against kc-cycle and km-unit transient for loop based control data flow graphs during physically aware high level synthesis | Sengupta, Anirban; Kachave, Deepak |
2021 | Integrating multi-key-based structural obfuscation and low-level watermarking for double line of defence of DSP hardware accelerators | Sengupta, Anirban |
2019 | IP Core Steganography for Protecting DSP Kernels Used in CE Systems | Sengupta, Anirban; Rathor, Mahendra |
2014 | A novel physics inspired approach for web service composition | Shrivastava, Abhishek |
2015 | Exploration of kc-cycle transient faultsecured datapath and loop unrolling factor for control data flow graphs during highlevel synthesis | Sengupta, Anirban |
2021 | Probabilistically sampled and spectrally clustered plant species using phenotypic characteristics | Shastri, Aditya A.; Ahuja, Kapil |
2021 | Preventing time synchronization in NTP broadcast mode | Hubballi, Neminath |
2016 | High-level synthesis of digital integrated circuits in the nanoscale mobile electronics era | Sengupta, Anirban |
2018 | A dynamic web service registry framework for mobile environments | Verma, Rohit; Shrivastava, Abhishek |
2014 | Swarm intelligence driven simultaneous adaptive exploration of datapath and loop unrolling factor during area-performance tradeoff | Sengupta, Anirban; Mishra, Vipul Kumar |
2012 | Phase transition in reduction between 3-SAT and graph colorability for channel assignment in cellular network | Chaudhari, Narendra S. |
2017 | BitCoding: Protocol type agnostic robust bit level signatures for traffic classification | Hubballi, Neminath; Swarnkar, Mayank |
2018 | Detecting TCP ACK storm attack: A state transition modelling approach | Hubballi, Neminath |
2011 | Infinite decision agent ensemble learning system for credit risk analysis | Chaudhari, Narendra S. |
2021 | Improving Privacy in Data Service Composition | Tiwary, Gyan Prakash; Shrivastava, Abhishek |
2014 | A new metaheuristic genetic-based placement algorithm for 2D strip packing | Thomas, Jaya; Chaudhari, Narendra S. |
2020 | Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks | Tayal, Anuja; Sharma, Neha; Hubballi, Neminath |
2018 | Spatial and Temporal Redundancy for Transient Fault-Tolerant Datapath | Sengupta, Anirban; Kachave, Deepak |
2015 | Recycling Krylov subspaces for CFD applications and a new hybrid recycling solver | Ahuja, Kapil |
2018 | Continuous wavelet transform-based no-reference quality assessment of deblocked images | Joshi, Piyush; Prakash, Surya |
2021 | mMIG: Inversion optimization in majority inverter graph with minority operations | Aalam, Umar; Mazumdar, Bodhisatwa; Hubballi, Neminath |
2015 | Evolving highly nonlinear balanced boolean functions with improved resistance to DPA attacks | Chaudhari, Narendra S. |
2020 | Robust biometric authentication system with a secure user template | Baghel, Vivek Singh; Prakash, Surya |
2016 | Analysis of costing issues in big data | Yadav, Radhakishan |
2016 | Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints | Sengupta, Anirban |
2020 | Unconstrained ear detection using ensemble-based convolutional neural network model | Prakash, Surya; Dave, Ishan R. |
2020 | BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices | Chaudhari, Narendra S. |
2016 | Cognizance on intellectual property: A high-level perspective [hardware matters] | Sengupta, Anirban |
2020 | A Tree Based Novel Approach for Graph Coloring Problem Using Maximal Independent Set | Chaudhari, Narendra S. |
2019 | Fault-Tolerant DSP Core Datapath Against Omnidirectional Spatial Impact of SET | Kachave, Deepak; Sengupta, Anirban |
2021 | An enhanced fuzzy vault to secure the fingerprint templates | Baghel, Vivek Singh; Prakash, Surya; Agrawal, Ity |
2018 | RDClass: On using relative distance of keywords for accurate network traffic classification | Swarnkar, Mayank; Hubballi, Neminath |
2011 | 3-CNF-satisfiability in polynomial time | Chaudhari, Narendra S. |
2018 | Continuous Wavelet Transform Based No-Reference Image Quality Assessment for Blur and Noise Distortions | Joshi, Piyush; Prakash, Surya |
2019 | Fingerprint image quality assessment and scoring using minutiae centered local patches | Dey, Somnath |
2019 | Design Pruning of DSP Kernel for Multi Objective IP Core Architecture | Sengupta, Anirban |
2021 | Privacy-Preserving Efficient Fire Detection System for Indoor Surveillance | Shrivastava, Abhishek |
2018 | Multi-Phase Obfuscation of Fault Secured DSP Designs with Enhanced Security Feature | Sengupta, Anirban |
2022 | Randomized neural networks for multilabel classification | Chauhan, Vikas; Tiwari, Aruna |
2019 | PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network | Chaudhari, Narendra S. |
2015 | Automated design space exploration of multi-cycle transient fault detectable datapath based on multi-objective user constraints for application specific computing | Sengupta, Anirban |
2014 | Big data architecture: Storage and computation | Duggirala, Siddhartha |
2021 | Double line of defence to secure JPEG codec hardware for medical imaging systems | Sengupta, Anirban |
2012 | Relevance vector machine based infinite decision agent ensemble learning for credit risk analysis | Chaudhari, Narendra S. |
2019 | MLAttack: Fooling Semantic Segmentation Networks by Multi-layer Attacks | Gupta, Puneet |
2015 | Adaptive bacterial foraging driven datapath optimization: Exploring power-performance tradeoff in high level synthesis | Sengupta, Anirban |
2019 | Image haze removal by adaptive cycleGAN | Patel, Amey Kiran |
2017 | A review of clustering techniques and developments | Bharill, Neha; Tiwari, Aruna |
2020 | SysEvoRecomd: Network Reconstruction by Graph Evolution and Change Learning | Chaturvedi, Animesh; Tiwari, Aruna |
2021 | Application layer denial-of-service attacks and defense mechanisms: A survey | Hubballi, Neminath |
2017 | A closer look into DHCP starvation attack in wireless networks | Hubballi, Neminath |
2017 | An event based technique for detecting spoofed IP packets | Hubballi, Neminath |
2017 | Efficient and secure modified cocktail-AKA protocol for UMTS network | Chaudhari, Narendra S. |
2020 | Externalities in endogenous sharing economy networks | Mane, Pramod C.; Ahuja, Kapil |
2021 | Hashtag recommendation for short social media texts using word-embeddings and external knowledge | Kumar, Nagendra |
2021 | Designing a secured N-point DFT hardware accelerator using obfuscation and steganography | Sengupta, Anirban; Rathor, Mahendra |
2021 | SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network | Chaudhari, Narendra S. |
2021 | Facial Biometric for Securing Hardware Accelerators | Sengupta, Anirban; Rathor, Mahendra |
2011 | Identification & generation of constraints in social network | Jain, Rajkumar C.; Chaudhari, Narendra S. |
2021 | Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware accelerators | Sengupta, Anirban |
2018 | Security service level agreement measurement in cloud: A proof of concept implementation | Dogra, Himanshu; Verma, Sudhakar; Hubballi, Neminath; Swarnkar, Mayank |
2017 | Information Handling and Processing Using Enterprise Service Bus in Service-Oriented Architecture System | Bhadoria, Robin Singh; Prasad, Siddharth S. |
2021 | A technique to match highly similar 3D objects with an application to biomedical security | Srivastava, Akhilesh Mohan; Jain, Arushi; Rotte, Priyanka; Prakash, Surya |
2017 | On the construction of extreme learning machine for online and offline one-class classification—An expanded toolbox | Gautam, Chandan; Tiwari, Aruna |
2019 | Toward efficient architecture-independent algorithms for dynamic programs | Ganapathi, Pramod |
2019 | ParaLarPD: Parallel FPGA router using primal-dual sub-gradient method | Agrawal, Rohit; Ahuja, Kapil; Kumar, Akash |
2014 | Rain4Service: An approach towards decentralized web service composition | Shrivastava, Abhishek |
2019 | Enhanced quantum-based neural network learning and its application to signature verification | Tiwari, Aruna; Bharill, Neha |
2019 | Fingerprint shell with impregnable features | Prakash, Surya |
2020 | A fingerprint based crypto-biometric system for secure communication | Dey, Somnath; Sharma, Mukul Anand; Goel, Apurv |
2015 | An experience report on scalable implementation of DDoS attack detection | Dorbala, Sri Yogesh; Kishore, R.; Hubballi, Neminath |
2013 | Minimizing waiting time for service composition: A frictional approach | Shrivastava, Abhishek |
2018 | AppHunter: Mobile Application Traffic Classification | Swarnkar, Mayank; Hubballi, Neminath |
2014 | Facial expression recognition using local binary patterns with different distance measures | Chaudhari, Narendra S. |
2016 | OCPAD: One class Naive Bayes classifier for payload based anomaly detection | Swarnkar, Mayank; Hubballi, Neminath |
2020 | L2L: A Highly Accurate Log-2-Lead Quantization of Pre-trained Neural Networks | Gupta, Siddharth; Ahuja, Kapil; Tiwari, Aruna; Kumar, Akash |
2017 | Securing cloud data | Ruj, Sushmita; Saxena, Rajat |
2017 | Automated low cost scheduling driven watermarking methodology for modern CAD high-level synthesis tools | Sengupta, Anirban; Roy, Dipanjan |
2019 | SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groups | Chaudhari, Narendra S. |
2018 | Securing fingerprint template using noninvertible ridge feature transformation | Dey, Somnath |
2019 | Digital Processing Core Performance Degradation Due to Hardware Stress Attacks | Kachave, Deepak; Sengupta, Anirban |
2021 | Adaptive Online Learning with Regularized Kernel for One-Class Classification | Gautam, Chandan; Tiwari, Aruna; Ahuja, Kapil |
2015 | Automated design space exploration of transient fault detectable datapath based on user specified power and delay constraints | Sengupta, Anirban |
2015 | Performance analysis for android runtime environment | Yadav, Radhakishan; Bhadoria, Robin Singh |
2021 | Secure and location privacy in geographical data with electronic codebook mode-advanced encryption standard | Chaudhari, Narendra S. |
2014 | Externalities and stability in social cloud | Mane, Pramod C.; Ahuja, Kapil |
2019 | Score-level fusion for cancelable multi-biometric verification | Dey, Somnath |
2016 | The Human element of big data: Issues, analytics, and performance | Chaudhari, Narendra S.; Bhadoria, Robin Singh |
2019 | Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption Hardware | Sengupta, Anirban; Rathor, Mahendra |
2020 | Reusing Preconditioners in Projection Based Model Order Reduction Algorithms | Ahuja, Kapil |
2021 | An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools | Sengupta, Anirban |
2019 | Multilevel Watermark for Protecting DSP Kernel in CE Systems [Hardware Matters] | Roy, Dipanjan; Sengupta, Anirban |
2019 | Fingerprint liveness detection using local quality features | Dey, Somnath |
2015 | CSLAT: An SLA template for cloud service management | Rane, Dheeraj |
2014 | MagEl: A magneto-electric effect-inspired approach for web service composition | Shrivastava, Abhishek |
2009 | Constructive semi-supervised classification algorithm and its implement in data mining | Tiwari, Aruna; Chaudhari, Narendra S. |
2014 | Improved constructive semi-supervised classification algorithm for handling the overlapping of hyperspheres | Tiwari, Aruna |
2020 | Preface | Sengupta, Anirban |
2018 | Optimizing DSP Cores Using Design Transformation [Hardware Matters] | Roy, Dipanjan; Sengupta, Anirban |
2012 | Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks | Ruj, Sushmita |
2018 | Intellectual Property-Based Lossless Image Compression for Camera Systems [Hardware Matters] | Sengupta, Anirban; Roy, Dipanjan |
2015 | PSDSE: Particle Swarm Driven Design Space Exploration of Architecture and Unrolling Factors for Nested Loops in High Level Synthesis | Mishra, Vipul Kumar; Sengupta, Anirban |
2019 | IP core protection and hardware-assisted security for consumer electronics | Sengupta, Anirban |
2019 | CIIdefence: Defeating adversarial attacks by fusing class-specific image inpainting and image denoising | Gupta, Puneet |
2015 | Analysis of the improved knapsack cipher | Chaudhari, Narendra S. |
2021 | SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems | Chaudhari, Narendra S. |
2021 | FATALRead - Fooling visual speech recognition models: Put words on Lips | Gupta, Anup Kumar; Gupta, Puneet |
2017 | TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling with Optimal Loop Unrolling Factor during High Level Synthesis | Sengupta, Anirban |
2018 | Detecting stealth DHCP starvation attack using machine learning approach | Hubballi, Neminath |
2021 | A novel quantum-inspired fuzzy based neural network for data classification | Bharill, Neha; Tiwari, Aruna |
2015 | Simultaneous exploration of optimal datapath and loop based high level transformation during area-delay tradeoff in architectural synthesis using swarm intelligence | Sengupta, Anirban; Mishra, Vipul Kumar |
2015 | Network traffic classification in encrypted environment: A case study of Google Hangout | Datta, Jayeeta; Kataria, Neha; Hubballi, Neminath |
2017 | Preface | Bhadoria, Robin Singh |
2017 | A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping | Dey, Somnath |
2017 | Exploring enterprise service bus in the service-oriented architecture paradigm | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2018 | Ear recognition in 3D using 2D curvilinear features | Prakash, Surya; Dave, Ishan R.; Joshi, Piyush; Srivastava, Akhilesh Mohan |
2017 | Everything You Want to Know about Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. | Sengupta, Anirban |
2014 | Secure-AKA: An efficient AKA protocol for UMTS networks | Chaudhari, Narendra S. |
2018 | Low-Cost Obfuscated JPEG CODEC IP Core for Secure CE Hardware | Sengupta, Anirban; Roy, Dipanjan |
2010 | Construction of classifier with feature selection based on genetic programming | Chaudhari, Narendra S.; Tiwari, Aruna |
2015 | A novel technique of feature extraction based on local and global similarity measure for protein classification | Bharill, Neha; Tiwari, Aruna |
2019 | Transient fault secured/tolerant architecture for DSP core | Kachave, Deepak; Sengupta, Anirban |
2016 | One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible | Banda, Gourinath; Bommakanti, Chaitanya Krishna; Mohan, Harsh |
2014 | Collaborative Approach for Data Integrity Verification in Cloud Computing | Saxena, Rajat; Dey, Somnath |
2021 | Scalable incremental fuzzy consensus clustering algorithm for handling big data | Jha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla |
2014 | EasySMS: A protocol for end-to-end secure transmission of SMS | Chaudhari, Narendra S. |
2018 | Reusable intellectual property core protection for both buyer and seller | Sengupta, Anirban; Roy, Dipanjan |
2021 | Fast Average-Consensus on Networks Using Heterogeneous Diffusion | Singh, Ranveer |
2020 | Removal Attacks on Logic Locking and Camouflaging Techniques | Mazumdar, Bodhisatwa |
2016 | VoIPFD: Voice over IP flooding detection | Golait, Diksha; Hubballi, Neminath |
2019 | Low-Overhead Robust RTL Signature for DSP Core Protection: New Paradigm for Smart CE Design | Sengupta, Anirban; Roy, Dipanjan |
2015 | Cancelable iris template generation using look-up table mapping | Dey, Somnath |
2021 | Improved differential evolution based on multi-armed bandit for multimodal optimization problems | Agrawal, Suchitra; Tiwari, Aruna; Naik, Prathamesh; Srivastava, Arjun Vaibhav |
2016 | A Review on Costing Issues in Big Data Analytics | Bhadoria, Robin Singh |
2019 | On construction of multi-class binary neural network using fuzzy inter-cluster overlap for face recognition | Bharill, Neha; Tiwari, Aruna |
2019 | SysEvoRecomd: Graph evolution and change learning based system evolution recommender | Chaturvedi, Animesh; Tiwari, Aruna |
2016 | A novel genetic programming approach for epileptic seizure detection | Bhardwaj, Arpit; Tiwari, Aruna; Krishna, M. Ramesh; Varma, M. Vishaal |
2013 | A methodology for self correction scheme based fast multi criterion exploration and architectual synthesis of data dominated applications | Sengupta, Anirban |
2014 | Membrane computing inspired approach for executing scientific workflow in the cloud | Verma, Rohit; Bakshi, Miroojin; Shrivastava, Abhishek |
2021 | Web Service Slicing: Intra and Inter-Operational Analysis to Test Changes | Chaturvedi, Animesh |
2012 | Genetic algorithm for optimizing network load balance in MPLS network | Chaudhari, Narendra S. |
2016 | Authentication protocol for an iot-enabled LTE network | Chaudhari, Narendra S. |
2011 | Two approaches for hamiltonian circuit problem using satisfiability | Thomas, Jaya; Chaudhari, Narendra S. |
2021 | Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks | Khandait, Pratibha; Tiwari, Namrata; Hubballi, Neminath |
2021 | Minutiae Points Extraction Using Faster R-CNN | Baghel, Vivek Singh; Srivastava, Akhilesh Mohan; Prakash, Surya |
2019 | 3-Dimensional Secured Fingerprint Shell | Prakash, Surya |
2016 | Algorithms and their design | Prakash, Surya |
2015 | A quality aware technique for biometric recognition | Joshi, Piyush; Prakash, Surya |
2020 | Forensic detective control using hardware steganography for IP core protection | Sengupta, Anirban |
2012 | Privacy preserving association rule mining by introducing concept of impact factor | Chaudhari, Narendra S.; Tiwari, Aruna |
2019 | A generic approach for integrity verification of big data | Saxena, Rajat; Dey, Somnath |
2022 | Preface | Shrivastava, Abhishek |
2018 | Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesis | Sengupta, Anirban; Kachave, Deepak |
2016 | Generating multi-cycle and multiple transient fault resilient design during physically aware high level synthesis | Sengupta, Anirban; Kachave, Deepak |
2018 | Energy reduction multipath routing protocol for MANET using recoil technique | Sahu, Rakesh Kumar; Chaudhari, Narendra S. |
2018 | Stability analysis of Bilinear Iterative Rational Krylov Algorithm | Choudhary, Rajendra; Ahuja, Kapil |
2016 | Detecting packed executable file: Supervised or anomaly detection method? | Hubballi, Neminath; Dogra, Himanshu |
2015 | Design flow from algorithm to RTL using evolutionary exploration approach | Sengupta, Anirban |
2013 | VAS-AKA: An efficient batch verification protocol for value added services | Chaudhari, Narendra S. |
2021 | Controlling Probe Frequency with Network Traffic Dynamics: An Experience Report | Hubballi, Neminath |
2013 | A novel genetic programming based classifier design using a new constructive crossover operator with a local search technique | Tiwari, Aruna |
2020 | Frontiers in securing IP cores : Forensic detective control and obfuscation techniques | Sengupta, Anirban. |
2019 | VLSI design and test : 23rd International Symposium, VDAT 2019, Indore, India, July 4-6, 2019 : revised selected papers | Sengupta, Anirban |
2014 | Quantum inspired binary neural network algorithm | Patel, Om Prakash; Tiwari, Aruna |
2015 | A quantum-inspired fuzzy based evolutionary algorithm for data clustering | Patel, Om Prakash; Bharill, Neha; Tiwari, Aruna |
2015 | Keystroke user recognition through extreme learning machine and evolving cluster method | Ravindran, Sriram; Gautam, Chandan; Tiwari, Aruna |
2015 | An enhanced quantum-inspired evolutionary fuzzy clustering | Bharill, Neha; Patel, Om Prakash; Tiwari, Aruna |
2015 | Quantum based neural network classifier and its application for firewall to detect malicious web request | Patel, Om Prakash; Tiwari, Aruna |
2016 | Fuzzy based clustering algorithms to handle big data with implementation on apache spark | Bharill, Neha; Tiwari, Aruna |
2011 | IT infrastructure and its management | Surya Prakash |
2015 | Ear biometrics in 2D and 3D : localization and recognition | Surya Prakash |
Collection's Items (Sorted by Submit Date in Descending order): 501 to 839 of 839