Department of Computer Science and Engineering : [839] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 501 to 839 of 839
Issue DateTitleAuthor(s)
2019Toward efficient architecture-independent algorithms for dynamic programsGanapathr, Pramod
2019Protecting DSP Kernels Using Robust Hologram-Based ObfuscationSengupta, Anirban; Rathor, Mahendra
2021Apache Spark based kernelized fuzzy clustering framework for single nucleotide polymorphism sequence analysisJha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla
2015Bacterial foraging driven exploration of multi cycle fault tolerant datapath based on power-performance tradeoff in high level synthesisSengupta, Anirban
2020Hand Down, Face Up: Innovative Mobile Attendance System Using Face Recognition Deep LearningAgrawal, Aditi; Garg, Mahak L.; Prakash, Surya; Joshi, Piyush; Srivastava, Akhilesh Mohan
2019Hardware Steganography for IP Core Protection of Fault Secured DSP CoresSengupta, Anirban; Gupta, Gargi; Jalan, Harshit
2020Forensic detective control using a digital signature-based watermark for IP core protectionSengupta, Anirban
2012Learning alignment profiles for structural similarity measureChaudhari, Narendra S.
2016Analysis for cognitive radio sensor network architecture and its role in dynamic spectrum managementBhadoria, Robin Singh
2014Security architecture for cloud computingBhadoria, Robin Singh
2014Detection of replication origin sites in herpesvirus genomes by clustering and scoring of palindromes with quadratic entropy measuresRizvi, Ahsan Z.
2020Logic locking with provable security against power analysis attacksMazumdar, Bodhisatwa
2020Investigating Fingerprint Quality Features for Liveness DetectionAnshul, Ashutosh; Jha, Ashwini; Dey, Somnath
2020IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE SystemsRathor, Mahendra; Sengupta, Anirban
2015A novel technique of feature extraction with dual similarity measures for protein sequence classificationBharilla, Neha; Tiwarib, Aruna; Rawat, Anshul
2019Local Contrast Phase Descriptor for Quality Assessment of Fingerprint ImagesDey, Somnath
2020MOMBAT: Heart rate monitoring from face video using pulse modeling and Bayesian trackingGupta, Puneet
2018Multi-phase watermark for IP core protectionSengupta, Anirban; Roy, Dipanjan
2019Improved Delay Estimation Model for Loop based DSP coresSengupta, Anirban; Rathor, Mahendra
2015Quantum based learning with binary neural networkTiwari, Aruna
2019Classical Cryptanalysis Attacks on Logic Locking TechniquesMazumdar, Bodhisatwa; Bairwa, Ghanshyam; Mandal, Souvik; Nikhil, Tatavarthy Venkat
2017Message from the technical program chairs: ICIT 2016Sengupta, Anirban
2011An efficient method for the Devnagri handwritten vowel recognitionChaudhari, Narendra S.
2015Towards Service Description for Mobile EnvironmentsVerma, Rohit; Shrivastava, Abhishek
2021Minimum variance embedded auto-associative kernel extreme learning machine for one-class classificationMishra, Pratik K.; Gautam, Chandan; Tiwari, Aruna
2015Image Analysis-Based Automatic Utility Pole Detection for Remote SurveillanceDutta, Tanima
2018Obfuscated JPEG Image Decompression IP Core for Protecting Against Reverse Engineering [Hardware Matter]Roy, Dipanjan; Sengupta, Anirban
2019System Evolution Analytics: Evolution and Change Pattern Mining of Inter-Connected EntitiesChaturvedi, Animesh; Tiwari, Aruna
2015User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesisSengupta, Anirban
2018Triple-phase watermarking for reusable IP core protection during architecture synthesisSengupta, Anirban; Roy, Dipanjan
2017Low cost optimized Trojan secured schedule at behavioral level for single & Nested loop control data flow graphs (Invited Paper)Sengupta, Anirban; Roy, Dipanjan
2014Human recognition using 3D ear imagesPrakash, Surya
2018Perceptual filling-in of blind-spot for surrounding color gradient stimuliRoy, Rajarshi
2018Congestion-aware probe selection for fault detection in networksTayal, Anuja; Hubballi, Neminath
2013Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversaryRuj, Sushmita
2015Application workload pattern and its implications for resource provisioning in cloud: An early experienceHubballi, Neminath
2018Effect of NBTI stress on DSP cores used in CE devices: Threat model and performance estimationKachave, Deepak; Sengupta, Anirban; Neema, Shubha; Harsha, Panugothu Sri
2015Big data parallelism: Issues in different X-information paradigmsMondal, Koushik
2018Quantum-inspired evolutionary approach for selection of optimal parameters of fuzzy clusteringBharill, Neha; Tiwari, Aruna
2020A Prototype Model to Predict Human Interest: Data Based Design to Combine Humans and MachinesShrivastava, Abhishek
2019Enhanced Functional Obfuscation of DSP core using Flip-Flops and Combinational logicRathor, Mahendra; Sengupta, Anirban
2013Solution to an attack on digital signature in SMS securityChaudhari, Narendra S.; Thomas, Jaya
2020Multi-level watermark for IP protectionSengupta, Anirban
2013Performance improvement in genetic programming using modified crossover and node mutationTiwari, Aruna
2014Service choreography: Present and futureShrivastava, Abhishek
2019Crypto based Multi-Variable Fingerprinting for Protecting DSP coresSengupta, Anirban; Singh, Utkarsh Kumar; Premchand, Piyush Kalkute
2020BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile UsersChaudhari, Narendra S.
2019On the Construction of Hierarchical Broad Learning Neural Network: An Alternative Way of Deep LearningChauhan, Vikas; Tiwari, Aruna
2011Removing code bloating in crossover operation in Genetic ProgrammingTiwari, Aruna; Chaudhari, Narendra S.
2012Channel assignment problem in cellular network and its reduction to satisfiability using graph k-colorabilityChaudhari, Narendra S.
2012Secure encryption with digital signature approach for Short Message ServiceChaudhari, Narendra S.
2021Secure Communication System Implementation for Robot-based Surveillance ApplicationsBanda, Gourinath
2020Structural Obfuscation and Crypto-Steganography-Based Secured JPEG Compression Hardware for Medical Imaging SystemsSengupta, Anirban; Rathor, Mahendra
2017Data processing in IoT using an enterprise service busPrasad, Siddharth S.; Bhadoria, Robin Singh
2020Formal verification of heuristic autonomous intersection management using statistical model checkingChouhan, Aaditya Prakash; Banda, Gourinath
2020POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure ReputationHubballi, Neminath; Tiwari, Namrata; Khandait, Pratibha
2018SRCPR: SignReCrypting proxy re-signature in secure VANET groupsChaudhari, Narendra S.
2015Liver disease diagnosis using quantum-based binary neural network learning algorithmTiwari, Aruna
2019Vector quantized spectral clustering applied to whole genome sequences of plantsShastri, Aditya A.; Ahuja, Kapil; Shah, Aditya; Gagrani, Aishwary; Lal, Anant
2021DARE: Deceiving Audio–Visual speech Recognition modelMishra, Saumya; Gupta, Anup Kumar; Gupta, Puneet
2021Fuzzy-Based Kernelized Clustering Algorithms for Handling Big Data Using Apache SparkJha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla
2020Securing IP Cores in CE Systems using Key-driven Hash-chaining based SteganographyRathor, Mahendra; Mishra, Vipul Kumar; Sengupta, Anirban
2018DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A NetworksChaudhari, Narendra S.
2020Enhanced Security of DSP Circuits Using Multi-Key Based Structural Obfuscation and Physical-Level Watermarking for Consumer Electronics SystemsSengupta, Anirban; Rathor, Mahendra
2019NR-IQA for noise-affected images using singular value decompositionJoshi, Piyush; Prakash, Surya
2011A graph coloring approach for channel assignment in cellular network via propositional satisfiabilityChaudhari, Narendra S.
2018Integrating compiler driven transformation and simulated annealing based floorplan for optimized transient fault tolerant DSP coresSengupta, Anirban; Kachave, Deepak
2015A real-time framework for detection of long linear infrastructural objects in aerial imageryDutta, Tanima
2010A Novel SVM based approach for noisy data eleminationChaudhari, Narendra S.; Tiwari, Aruna; Thomas, Jaya
2019System Evolution Analytics: Deep Evolution and Change Learning of Inter-Connected EntitiesChaturvedi, Animesh; Tiwari, Aruna
2020Hologram-based structural obfuscation for DSP coresSengupta, Anirban; Rathor, Mahendra
2015Enhanced fingerprint shellPrakash, Surya
2015Swarm intelligence driven design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis based on user power-delay budgetSengupta, Anirban
2011Combinatorial approach of association rule mining in software engineeringChaudhari, Narendra S.
2021A non-invertible transformation based technique to protect a fingerprint templateBaghel, Vivek Singh; Prakash, Surya
2017The Performance Metric for Enterprise Service Bus (ESB) in SOA system: Theoretical underpinnings and empirical illustrations for information processingBhadoria, Robin Singh; Chaudhari, Narendra S.
2019A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceBharill, Neha
2021Polynomial vault: A secure and robust fingerprint based authenticationPrakash, Surya
2021MinStab: Stable network evolution rule mining for system changeability analysisChaturvedi, Animesh; Tiwari, Aruna
2019Pragmatic sensory data semantics with service-oriented computingBhadoria, Robin Singh; Chaudhari, Narendra S.
2021IoTHunter: IoT network traffic classification using device specific keywordsKhandait, Pratibha; Hubballi, Neminath; Mazumdar, Bodhisatwa
2018Autonomous intersection management: A heuristic approachChouhan, Aaditya Prakash; Banda, Gourinath
2016Exploring Low Cost Optimal Watermark for Reusable IP Cores during High Level SynthesisSengupta, Anirban
2014Choreographing services over mobile devicesShrivastava, Abhishek
2020Securing biometric user template using modified minutiae attributesPrakash, Surya
2014Automated exploration of datapath and unrolling factor during power-performance tradeoff in architectural synthesis using multi-dimensional PSO algorithmSengupta, Anirban; Mishra, Vipul Kumar
2013A novel fuzzy rule guided intelligent technique for gray image extraction and segmentationMondal, Koushik
2019Low-cost robust anti-removal logic for protecting functionally obfuscated DSP core against removal attackRathor, Mahendra; Sengupta, Anirban
2022AND-rPPG: A novel denoising-rPPG network for improving remote heart rate estimationBirla, Lokendra; Gupta, Puneet
2018Reliability and threat analysis of NBTI stress on DSP coresSengupta, Anirban; Kachave, Deepak; Neema, Shubha; Panugothu, Sri Harsha
2020DDoS attack prevention using collaborative approach for cloud computingSaxena, Rajat; Dey, Somnath
2014SecureSMS: A secure SMS protocol for VAS and other applicationsChaudhari, Narendra S.
2011Performance analysis of flexible zone based features to classify Hindi numeralsChaudhari, Narendra S.
2011Handling the problem of code bloating to enhance the performance of classifier designed using genetic programmingTiwari, Aruna; Chaudhari, Narendra S.
2019KOC+: Kernel ridge regression based one-class classification using privileged informationGautam, Chandan; Tiwari, Aruna; Tanveer, M.
2019A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verificationDey, Somnath
2018Obfuscation of fault secured DSP design through hybrid transformationSengupta, Anirban; Neema, Shubha; Harsha, Sri
2021Lightweight Security Protocols for Securing IoT Devices in Smart CitiesJoshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath
2017Guest Editorial Securing IoT Hardware: Threat Models and Reliable, Low-Power Design SolutionsSengupta, Anirban
2021Modelling Trust to Preserve End-User Privacy in Location Based ServicesChaudhari, Narendra S.
2015Advance quantum based binary neural network learning algorithmPatel, Om Prakash; Tiwari, Aruna
2014Design of efficient packing system using genetic algorithm based on hyper heuristic approachThomas, Jaya; Chaudhari, Narendra S.
2019Signcrypting the group signature with non-transitive proxy re-encryption in vanetChaudhari, Narendra S.
2013Genetic based effective column generation for 1-D Cutting Stock problemThomas, Jaya; Chaudhari, Narendra S.
2014Error masking of transient faults: Exploration of a fault tolerant datapath based on user specified power and delay budgetSengupta, Anirban
2013A decentralized security framework for data aggregation and access control in smart gridsRuj, Sushmita
2020Protection of fault-secured IP cores using digital signature-based watermarksSengupta, Anirban
2015Exploration of optimal multi-cycle transient fault secured datapath during high level synthesis based on user area-delay budgetSengupta, Anirban
2013Selection of efficient crossover operator in Metaheuristic approach for 2D strip packingThomas, Jaya; Chaudhari, Narendra S.
2020Quality Assessment of Fingerprint Images Using Local Texture DescriptorsDey, Somnath
2017Antipiracy-Aware IP Chipset Design for CE Devices: A Robust Watermarking Approach [Hardware Matters]Sengupta, Anirban; Roy, Dipanjan
2021CSIS: Compressed sensing-based enhanced-embedding capacity image steganography schemeAgrawal, Rohit; Ahuja, Kapil
2014Security services using crowdsourcingVerma, Rohit; Ruj, Sushmita
2017Protecting ownership of reusable IP core generated during high level synthesisKachave, Deepak; Sengupta, Anirban
2015Recycling bicgstab with an application to parametric model order reductionAhuja, Kapil
2018A Lightweight Handover Authentication Protocol based on Proxy Signature for Wireless NetworksChaudhari, Narendra S.
2019Advanced quantum based neural network classifier and its application for objectionable web content filteringBharill, Neha; Tiwari, Aruna
2021Compression of XML and JSON API ResponsesTiwary, Gyan Prakash; Shrivastava, Abhishek
2016Construction of multi-class classifiers by Extreme Learning Machine based one-class classifiersGautam, Chandan; Tiwari, Aruna; Ravindran, Sriram
2018Robust technique for fingerprint template protectionPrakash, Surya
2019Robust Digital Signature to Protect IP Core against Fraudulent Ownership and CloningSengupta, Anirban; Prajwal Chandra, N.; Ranjith Kumar, E.
2012An extended approach for SMS security using authentication functionsChaudhari, Narendra S.
2017An Improved Genetic Algorithm for Developing Deterministic OTP Key GeneratorChaudhari, Narendra S.
2012A novel fuzzy rule guided intelligent technique for gray image extraction and segmentationMondal, Koushik
2018ESMGB: Efficient and secure modified group-based AKA protocol for maritime communication networksChaudhari, Narendra S.
2014Exploration of multi-objective tradeoff during high level synthesis using bacterial chemotaxis and dispersalSengupta, Anirban
2020Frontiers in securing IP coresSengupta, Anirban
2021SSFA: Subset fault analysis of ASCON-128 authenticated cipherJoshi, Priyanka; Mazumdar, Bodhisatwa
2018High Level Synthesis Methodology for Exploring Loop Unrolling Factor and Functional DatapathSengupta, Anirban
2014A genetically optimized neural network for classification of breast cancer diseaseTiwari, Aruna; Babel, Darshil
2021Toe prints: An application study for biometric verification in adultsBaghel, Vivek Singh; Prakash, Surya
2016Intellectual Property Cores: Protection designs for CE productsSengupta, Anirban
2017Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System ModelingGolait, Diksha; Hubballi, Neminath
2020ALigN: A Highly Accurate Adaptive Layerwise Log_2_Lead Quantization of Pre-Trained Neural NetworksGupta, Siddharth; Ahuja, Kapil; Tiwari, Aruna; Kumar, Akash
2016Quality based classification of images for illumination invariant face recognitionSubramanyam, Bharath; Joshi, Piyush; Meena, Manoj Kumar; Prakash, Surya
2018Density-wise two stage mammogram classification using texture exploiting descriptorsShastri, Aditya A.; Ahuja, Kapil
2021Anomaly Detection in Resource Constrained Environments With Streaming DataJain, Prarthi; Jain, Seemandhar; Shrivastava, Abhishek
2021Secured hardware accelerators for DSP and image processing applicationsSengupta, Anirban
2019Low Cost Functional Obfuscation of Reusable IP Ores Used in CE Hardware Through Robust LockingSengupta, Anirban; Kachave, Deepak; Roy, Dipanjan
2020Obfuscated Hardware Accelerators for Image Processing Filters - Application Specific and Functionally Reconfigurable ProcessorsSengupta, Anirban; Rathor, Mahendra
2017PrefaceBhadoria, Robin Singh; Chaudhari, Narendra S.
2016Intellectual property core protection of control data flow graphs using robust watermarking during behavioural synthesis based on user resource constraint and loop unrolling factorSengupta, Anirban
2019Classification of electroencephalogram signal for the detection of epilepsy using Innovative Genetic ProgrammingTiwari, Aruna
2014Classification of EEG signals using a novel genetic programming approachBhardwaj, Arpit; Tiwari, Aruna; Krishna, M. Ramesh; Varma, M. Vishaal
2017A probabilistic anomaly detection scheme to detect DHCP starvation attacksHubballi, Neminath
2012Analysis of El-Gamal with Diffie-Hellman scheme using Hash-function for message securityChaudhari, Narendra S.
2021Fingerprint biometric for securing hardware acceleratorsSengupta, Anirban
2017Query processing techniques in probabilistic databasesChaudhari, Narendra S.
2018Uncertainty in sensor data acquisition for SOA systemBhadoria, Robin Singh; Chaudhari, Narendra S.
2011Polynomial solvability of satisfiability and its implication to hybrid cryptosystem securityThomas, Jaya; Chaudhari, Narendra S.
2021Video Classification using SlowFast Network via Fuzzy ruleRituraj; Tiwari, Aruna
2020Preconditioned linear solves for parametric model order reductionAhuja, Kapil
2014Image quality assessment based on noise detectionJoshi, Piyush; Prakash, Surya
2018Data backup network formation with heterogeneous agents: (Extended abstract)Jain, Harshit; Teja, Guduru Sai; Mane, Pramod C.; Ahuja, Kapil
2018Security Vulnerabilities in Handover Authentication Mechanism of 5G NetworkChaudhari, Narendra S.
2017Integrating group signature scheme with Non-transitive Proxy Re-encryption in VANETChaudhari, Narendra S.
2012Performance evaluation of classifiers applying directional features for Devnagri numeral recognitionChaudhari, Narendra S.
2019Inexact Linear Solves in Model Reduction of Bilinear Dynamical SystemsChoudhary, Rajendra; Ahuja, Kapil
2021Point cloud based deep convolutional neural network for 3D face recognitionBhople, Anagha R.; Srivastava, Akhilesh Mohan; Prakash, Surya
2019Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limitChaudhari, Narendra S.
2011Integration testing for component-based system with UML and OCLChaudhari, Narendra S.
2019Business forecasting in the light of statistical approaches and machine learning classifiersChaudhuri, Narendra S.
2015Breast cancer diagnosis using Genetically Optimized Neural Network modelTiwari, Aruna
2013Rapid search of Pareto fronts using D-logic exploration during multi-objective tradeoff of computation intensive applicationsSengupta, Anirban; Mishra, Vipul Kumar
2017Featured analysis of enterprise service busBhadoria, Robin Singh
2021Service Evolution Analytics: Change and Evolution Mining of a Distributed SystemChaturvedi, Animesh; Tiwari, Aruna
2014Building trusted ICs using split fabricationDas, Bishnu P.
2021Grape Disease Detection Network Based on Multi-Task Learning and Attention FeaturesDey, Somnath
2017Low cost fault tolerance against kc-cycle and km-unit transient for loop based control data flow graphs during physically aware high level synthesisSengupta, Anirban; Kachave, Deepak
2021Integrating multi-key-based structural obfuscation and low-level watermarking for double line of defence of DSP hardware acceleratorsSengupta, Anirban
2019IP Core Steganography for Protecting DSP Kernels Used in CE SystemsSengupta, Anirban; Rathor, Mahendra
2014A novel physics inspired approach for web service compositionShrivastava, Abhishek
2015Exploration of kc-cycle transient faultsecured datapath and loop unrolling factor for control data flow graphs during highlevel synthesisSengupta, Anirban
2021Probabilistically sampled and spectrally clustered plant species using phenotypic characteristicsShastri, Aditya A.; Ahuja, Kapil
2021Preventing time synchronization in NTP broadcast modeHubballi, Neminath
2016High-level synthesis of digital integrated circuits in the nanoscale mobile electronics eraSengupta, Anirban
2018A dynamic web service registry framework for mobile environmentsVerma, Rohit; Shrivastava, Abhishek
2014Swarm intelligence driven simultaneous adaptive exploration of datapath and loop unrolling factor during area-performance tradeoffSengupta, Anirban; Mishra, Vipul Kumar
2012Phase transition in reduction between 3-SAT and graph colorability for channel assignment in cellular networkChaudhari, Narendra S.
2017BitCoding: Protocol type agnostic robust bit level signatures for traffic classificationHubballi, Neminath; Swarnkar, Mayank
2018Detecting TCP ACK storm attack: A state transition modelling approachHubballi, Neminath
2011Infinite decision agent ensemble learning system for credit risk analysisChaudhari, Narendra S.
2021Improving Privacy in Data Service CompositionTiwary, Gyan Prakash; Shrivastava, Abhishek
2014A new metaheuristic genetic-based placement algorithm for 2D strip packingThomas, Jaya; Chaudhari, Narendra S.
2020Traffic Dynamics-Aware Probe Selection for Fault Detection in NetworksTayal, Anuja; Sharma, Neha; Hubballi, Neminath
2018Spatial and Temporal Redundancy for Transient Fault-Tolerant DatapathSengupta, Anirban; Kachave, Deepak
2015Recycling Krylov subspaces for CFD applications and a new hybrid recycling solverAhuja, Kapil
2018Continuous wavelet transform-based no-reference quality assessment of deblocked imagesJoshi, Piyush; Prakash, Surya
2021mMIG: Inversion optimization in majority inverter graph with minority operationsAalam, Umar; Mazumdar, Bodhisatwa; Hubballi, Neminath
2015Evolving highly nonlinear balanced boolean functions with improved resistance to DPA attacksChaudhari, Narendra S.
2020Robust biometric authentication system with a secure user templateBaghel, Vivek Singh; Prakash, Surya
2016Analysis of costing issues in big dataYadav, Radhakishan
2016Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User ConstraintsSengupta, Anirban
2020Unconstrained ear detection using ensemble-based convolutional neural network modelPrakash, Surya; Dave, Ishan R.
2020BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile DevicesChaudhari, Narendra S.
2016Cognizance on intellectual property: A high-level perspective [hardware matters]Sengupta, Anirban
2020A Tree Based Novel Approach for Graph Coloring Problem Using Maximal Independent SetChaudhari, Narendra S.
2019Fault-Tolerant DSP Core Datapath Against Omnidirectional Spatial Impact of SETKachave, Deepak; Sengupta, Anirban
2021An enhanced fuzzy vault to secure the fingerprint templatesBaghel, Vivek Singh; Prakash, Surya; Agrawal, Ity
2018RDClass: On using relative distance of keywords for accurate network traffic classificationSwarnkar, Mayank; Hubballi, Neminath
20113-CNF-satisfiability in polynomial timeChaudhari, Narendra S.
2018Continuous Wavelet Transform Based No-Reference Image Quality Assessment for Blur and Noise DistortionsJoshi, Piyush; Prakash, Surya
2019Fingerprint image quality assessment and scoring using minutiae centered local patchesDey, Somnath
2019Design Pruning of DSP Kernel for Multi Objective IP Core ArchitectureSengupta, Anirban
2021Privacy-Preserving Efficient Fire Detection System for Indoor SurveillanceShrivastava, Abhishek
2018Multi-Phase Obfuscation of Fault Secured DSP Designs with Enhanced Security FeatureSengupta, Anirban
2022Randomized neural networks for multilabel classificationChauhan, Vikas; Tiwari, Aruna
2019PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A networkChaudhari, Narendra S.
2015Automated design space exploration of multi-cycle transient fault detectable datapath based on multi-objective user constraints for application specific computingSengupta, Anirban
2014Big data architecture: Storage and computationDuggirala, Siddhartha
2021Double line of defence to secure JPEG codec hardware for medical imaging systemsSengupta, Anirban
2012Relevance vector machine based infinite decision agent ensemble learning for credit risk analysisChaudhari, Narendra S.
2019MLAttack: Fooling Semantic Segmentation Networks by Multi-layer AttacksGupta, Puneet
2015Adaptive bacterial foraging driven datapath optimization: Exploring power-performance tradeoff in high level synthesisSengupta, Anirban
2019Image haze removal by adaptive cycleGANPatel, Amey Kiran
2017A review of clustering techniques and developmentsBharill, Neha; Tiwari, Aruna
2020SysEvoRecomd: Network Reconstruction by Graph Evolution and Change LearningChaturvedi, Animesh; Tiwari, Aruna
2021Application layer denial-of-service attacks and defense mechanisms: A surveyHubballi, Neminath
2017A closer look into DHCP starvation attack in wireless networksHubballi, Neminath
2017An event based technique for detecting spoofed IP packetsHubballi, Neminath
2017Efficient and secure modified cocktail-AKA protocol for UMTS networkChaudhari, Narendra S.
2020Externalities in endogenous sharing economy networksMane, Pramod C.; Ahuja, Kapil
2021Hashtag recommendation for short social media texts using word-embeddings and external knowledgeKumar, Nagendra
2021Designing a secured N-point DFT hardware accelerator using obfuscation and steganographySengupta, Anirban; Rathor, Mahendra
2021SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication NetworkChaudhari, Narendra S.
2021Facial Biometric for Securing Hardware AcceleratorsSengupta, Anirban; Rathor, Mahendra
2011Identification & generation of constraints in social networkJain, Rajkumar C.; Chaudhari, Narendra S.
2021Key-triggered hash-chaining-based encoded hardware steganography for securing DSP hardware acceleratorsSengupta, Anirban
2018Security service level agreement measurement in cloud: A proof of concept implementationDogra, Himanshu; Verma, Sudhakar; Hubballi, Neminath; Swarnkar, Mayank
2017Information Handling and Processing Using Enterprise Service Bus in Service-Oriented Architecture SystemBhadoria, Robin Singh; Prasad, Siddharth S.
2021A technique to match highly similar 3D objects with an application to biomedical securitySrivastava, Akhilesh Mohan; Jain, Arushi; Rotte, Priyanka; Prakash, Surya
2017On the construction of extreme learning machine for online and offline one-class classification—An expanded toolboxGautam, Chandan; Tiwari, Aruna
2019Toward efficient architecture-independent algorithms for dynamic programsGanapathi, Pramod
2019ParaLarPD: Parallel FPGA router using primal-dual sub-gradient methodAgrawal, Rohit; Ahuja, Kapil; Kumar, Akash
2014Rain4Service: An approach towards decentralized web service compositionShrivastava, Abhishek
2019Enhanced quantum-based neural network learning and its application to signature verificationTiwari, Aruna; Bharill, Neha
2019Fingerprint shell with impregnable featuresPrakash, Surya
2020A fingerprint based crypto-biometric system for secure communicationDey, Somnath; Sharma, Mukul Anand; Goel, Apurv
2015An experience report on scalable implementation of DDoS attack detectionDorbala, Sri Yogesh; Kishore, R.; Hubballi, Neminath
2013Minimizing waiting time for service composition: A frictional approachShrivastava, Abhishek
2018AppHunter: Mobile Application Traffic ClassificationSwarnkar, Mayank; Hubballi, Neminath
2014Facial expression recognition using local binary patterns with different distance measuresChaudhari, Narendra S.
2016OCPAD: One class Naive Bayes classifier for payload based anomaly detectionSwarnkar, Mayank; Hubballi, Neminath
2020L2L: A Highly Accurate Log-2-Lead Quantization of Pre-trained Neural NetworksGupta, Siddharth; Ahuja, Kapil; Tiwari, Aruna; Kumar, Akash
2017Securing cloud dataRuj, Sushmita; Saxena, Rajat
2017Automated low cost scheduling driven watermarking methodology for modern CAD high-level synthesis toolsSengupta, Anirban; Roy, Dipanjan
2019SAPSC: SignRecrypting authentication protocol using shareable clouds in VANET groupsChaudhari, Narendra S.
2018Securing fingerprint template using noninvertible ridge feature transformationDey, Somnath
2019Digital Processing Core Performance Degradation Due to Hardware Stress AttacksKachave, Deepak; Sengupta, Anirban
2021Adaptive Online Learning with Regularized Kernel for One-Class ClassificationGautam, Chandan; Tiwari, Aruna; Ahuja, Kapil
2015Automated design space exploration of transient fault detectable datapath based on user specified power and delay constraintsSengupta, Anirban
2015Performance analysis for android runtime environmentYadav, Radhakishan; Bhadoria, Robin Singh
2021Secure and location privacy in geographical data with electronic codebook mode-advanced encryption standardChaudhari, Narendra S.
2014Externalities and stability in social cloudMane, Pramod C.; Ahuja, Kapil
2019Score-level fusion for cancelable multi-biometric verificationDey, Somnath
2016The Human element of big data: Issues, analytics, and performanceChaudhari, Narendra S.; Bhadoria, Robin Singh
2019Security of Functionally Obfuscated DSP Core Against Removal Attack Using SHA-512 Based Key Encryption HardwareSengupta, Anirban; Rathor, Mahendra
2020Reusing Preconditioners in Projection Based Model Order Reduction AlgorithmsAhuja, Kapil
2021An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design ToolsSengupta, Anirban
2019Multilevel Watermark for Protecting DSP Kernel in CE Systems [Hardware Matters]Roy, Dipanjan; Sengupta, Anirban
2019Fingerprint liveness detection using local quality featuresDey, Somnath
2015CSLAT: An SLA template for cloud service managementRane, Dheeraj
2014MagEl: A magneto-electric effect-inspired approach for web service compositionShrivastava, Abhishek
2009Constructive semi-supervised classification algorithm and its implement in data miningTiwari, Aruna; Chaudhari, Narendra S.
2014Improved constructive semi-supervised classification algorithm for handling the overlapping of hyperspheresTiwari, Aruna
2020PrefaceSengupta, Anirban
2018Optimizing DSP Cores Using Design Transformation [Hardware Matters]Roy, Dipanjan; Sengupta, Anirban
2012Distributed data survivability schemes in mobile Unattended Wireless Sensor NetworksRuj, Sushmita
2018Intellectual Property-Based Lossless Image Compression for Camera Systems [Hardware Matters]Sengupta, Anirban; Roy, Dipanjan
2015PSDSE: Particle Swarm Driven Design Space Exploration of Architecture and Unrolling Factors for Nested Loops in High Level SynthesisMishra, Vipul Kumar; Sengupta, Anirban
2019IP core protection and hardware-assisted security for consumer electronicsSengupta, Anirban
2019CIIdefence: Defeating adversarial attacks by fusing class-specific image inpainting and image denoisingGupta, Puneet
2015Analysis of the improved knapsack cipherChaudhari, Narendra S.
2021SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systemsChaudhari, Narendra S.
2021FATALRead - Fooling visual speech recognition models: Put words on LipsGupta, Anup Kumar; Gupta, Puneet
2017TL-HLS: Methodology for Low Cost Hardware Trojan Security Aware Scheduling with Optimal Loop Unrolling Factor during High Level SynthesisSengupta, Anirban
2018Detecting stealth DHCP starvation attack using machine learning approachHubballi, Neminath
2021A novel quantum-inspired fuzzy based neural network for data classificationBharill, Neha; Tiwari, Aruna
2015Simultaneous exploration of optimal datapath and loop based high level transformation during area-delay tradeoff in architectural synthesis using swarm intelligenceSengupta, Anirban; Mishra, Vipul Kumar
2015Network traffic classification in encrypted environment: A case study of Google HangoutDatta, Jayeeta; Kataria, Neha; Hubballi, Neminath
2017PrefaceBhadoria, Robin Singh
2017A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mappingDey, Somnath
2017Exploring enterprise service bus in the service-oriented architecture paradigmBhadoria, Robin Singh; Chaudhari, Narendra S.
2018Ear recognition in 3D using 2D curvilinear featuresPrakash, Surya; Dave, Ishan R.; Joshi, Piyush; Srivastava, Akhilesh Mohan
2017Everything You Want to Know about Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection.Sengupta, Anirban
2014Secure-AKA: An efficient AKA protocol for UMTS networksChaudhari, Narendra S.
2018Low-Cost Obfuscated JPEG CODEC IP Core for Secure CE HardwareSengupta, Anirban; Roy, Dipanjan
2010Construction of classifier with feature selection based on genetic programmingChaudhari, Narendra S.; Tiwari, Aruna
2015A novel technique of feature extraction based on local and global similarity measure for protein classificationBharill, Neha; Tiwari, Aruna
2019Transient fault secured/tolerant architecture for DSP coreKachave, Deepak; Sengupta, Anirban
2016One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatibleBanda, Gourinath; Bommakanti, Chaitanya Krishna; Mohan, Harsh
2014Collaborative Approach for Data Integrity Verification in Cloud ComputingSaxena, Rajat; Dey, Somnath
2021Scalable incremental fuzzy consensus clustering algorithm for handling big dataJha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla
2014EasySMS: A protocol for end-to-end secure transmission of SMSChaudhari, Narendra S.
2018Reusable intellectual property core protection for both buyer and sellerSengupta, Anirban; Roy, Dipanjan
2021Fast Average-Consensus on Networks Using Heterogeneous DiffusionSingh, Ranveer
2020Removal Attacks on Logic Locking and Camouflaging TechniquesMazumdar, Bodhisatwa
2016VoIPFD: Voice over IP flooding detectionGolait, Diksha; Hubballi, Neminath
2019Low-Overhead Robust RTL Signature for DSP Core Protection: New Paradigm for Smart CE DesignSengupta, Anirban; Roy, Dipanjan
2015Cancelable iris template generation using look-up table mappingDey, Somnath
2021Improved differential evolution based on multi-armed bandit for multimodal optimization problemsAgrawal, Suchitra; Tiwari, Aruna; Naik, Prathamesh; Srivastava, Arjun Vaibhav
2016A Review on Costing Issues in Big Data AnalyticsBhadoria, Robin Singh
2019On construction of multi-class binary neural network using fuzzy inter-cluster overlap for face recognitionBharill, Neha; Tiwari, Aruna
2019SysEvoRecomd: Graph evolution and change learning based system evolution recommenderChaturvedi, Animesh; Tiwari, Aruna
2016A novel genetic programming approach for epileptic seizure detectionBhardwaj, Arpit; Tiwari, Aruna; Krishna, M. Ramesh; Varma, M. Vishaal
2013A methodology for self correction scheme based fast multi criterion exploration and architectual synthesis of data dominated applicationsSengupta, Anirban
2014Membrane computing inspired approach for executing scientific workflow in the cloudVerma, Rohit; Bakshi, Miroojin; Shrivastava, Abhishek
2021Web Service Slicing: Intra and Inter-Operational Analysis to Test ChangesChaturvedi, Animesh
2012Genetic algorithm for optimizing network load balance in MPLS networkChaudhari, Narendra S.
2016Authentication protocol for an iot-enabled LTE networkChaudhari, Narendra S.
2011Two approaches for hamiltonian circuit problem using satisfiabilityThomas, Jaya; Chaudhari, Narendra S.
2021Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce AttacksKhandait, Pratibha; Tiwari, Namrata; Hubballi, Neminath
2021Minutiae Points Extraction Using Faster R-CNNBaghel, Vivek Singh; Srivastava, Akhilesh Mohan; Prakash, Surya
20193-Dimensional Secured Fingerprint ShellPrakash, Surya
2016Algorithms and their designPrakash, Surya
2015A quality aware technique for biometric recognitionJoshi, Piyush; Prakash, Surya
2020Forensic detective control using hardware steganography for IP core protectionSengupta, Anirban
2012Privacy preserving association rule mining by introducing concept of impact factorChaudhari, Narendra S.; Tiwari, Aruna
2019A generic approach for integrity verification of big dataSaxena, Rajat; Dey, Somnath
2022PrefaceShrivastava, Abhishek
2018Forensic engineering for resolving ownership problem of reusable IP core generated during high level synthesisSengupta, Anirban; Kachave, Deepak
2016Generating multi-cycle and multiple transient fault resilient design during physically aware high level synthesisSengupta, Anirban; Kachave, Deepak
2018Energy reduction multipath routing protocol for MANET using recoil techniqueSahu, Rakesh Kumar; Chaudhari, Narendra S.
2018Stability analysis of Bilinear Iterative Rational Krylov AlgorithmChoudhary, Rajendra; Ahuja, Kapil
2016Detecting packed executable file: Supervised or anomaly detection method?Hubballi, Neminath; Dogra, Himanshu
2015Design flow from algorithm to RTL using evolutionary exploration approachSengupta, Anirban
2013VAS-AKA: An efficient batch verification protocol for value added servicesChaudhari, Narendra S.
2021Controlling Probe Frequency with Network Traffic Dynamics: An Experience ReportHubballi, Neminath
2013A novel genetic programming based classifier design using a new constructive crossover operator with a local search techniqueTiwari, Aruna
2020Frontiers in securing IP cores : Forensic detective control and obfuscation techniquesSengupta, Anirban.
2019VLSI design and test : 23rd International Symposium, VDAT 2019, Indore, India, July 4-6, 2019 : revised selected papersSengupta, Anirban
2014Quantum inspired binary neural network algorithmPatel, Om Prakash; Tiwari, Aruna
2015A quantum-inspired fuzzy based evolutionary algorithm for data clusteringPatel, Om Prakash; Bharill, Neha; Tiwari, Aruna
2015Keystroke user recognition through extreme learning machine and evolving cluster methodRavindran, Sriram; Gautam, Chandan; Tiwari, Aruna
2015An enhanced quantum-inspired evolutionary fuzzy clusteringBharill, Neha; Patel, Om Prakash; Tiwari, Aruna
2015Quantum based neural network classifier and its application for firewall to detect malicious web requestPatel, Om Prakash; Tiwari, Aruna
2016Fuzzy based clustering algorithms to handle big data with implementation on apache sparkBharill, Neha; Tiwari, Aruna
2011IT infrastructure and its managementSurya Prakash
2015Ear biometrics in 2D and 3D : localization and recognitionSurya Prakash
Collection's Items (Sorted by Submit Date in Descending order): 501 to 839 of 839