


default search action
13th ATIS 2022: Manipal, India
- Srikanth Prabhu
, Shiva Raj Pokhrel
, Gang Li
:
Applications and Techniques in Information Security - 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1804, Springer 2023, ISBN 978-981-99-2263-5
Privacy and Security
- Sharath Yaji
, Bayyapu Neelima
:
Reinforcement Technique for Classifying Quasi and Non-quasi Attributes for Privacy Preservation and Data Protection. 3-17 - Anit Kumar Ghosal
, Dipanwita Roychowdhury
:
Non-malleable Codes from Authenticated Encryption in Split-State Model. 18-33 - Anit Kumar Ghosal
, Dipanwita Roychowdhury
:
Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State Model. 34-45 - Debranjan Pal
, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning Based Differential Classifier of PRIDE and RC5. 46-58 - Anit Kumar Ghosal
:
A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack. 59-70 - P. Mercy Praise, S. Basil Xavier, Anoop Jose, G. Jaspher W. Kathrine
, J. Andrew
:
Variants of Crypto-Jacking Attacks and Their Detection Techniques. 71-87 - Keshav Kapur, Rajitha Harikrishnan, S. Raghavendra:
Comparative Study of Sentiment Analysis on Cyber Security Related Multi-sourced Data in Social Media Platforms. 88-97 - S. Divya
, K. V. Prema
, Balachandra Muniyal
:
Modified Blowfish Encryption Algorithm for Wireless Body Area Network. 98-108 - Govardhan Hegde
, Shourya Gupta
, Gautham Manuru Prabhu
, Sulatha V. Bhandary
:
EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation. 109-120 - C. Tripti, R. Manoj, P. B. Rinsha, Megha Suresh, Niya Jain, Tanya Sunish:
Cosine Similarity Based Group Movie Recommendation Scheme Considering Privacy of Users. 121-129 - Pranav Virmani, Srikanth Prabhu, Ramya S.:
Enhancing Face Recognition Accuracy Using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security. 130-142 - G. K. Sudhina Kumar
, K. Krishna Prakasha
, Balachandra Muniyal
:
Intrusion Detection Using Federated Learning. 143-151
Advances in Machine Learning
- U. Sumalatha
, K. Krishna Prakasha
, Srikanth Prabhu
, Vinod C. Nayak
:
Analysis of Classification Algorithms for Predicting Parkinson's Disease and Applications in the Field of Cybersecurity. 155-163 - Shivanand C. Hiremath
, Jayashree D. Mallapur:
Optimization of Secured Cluster Based Charging Dynamics and Scheduling of EV Using Deep RNN. 164-177 - Yash Bijalwan
, Pranav Chaudhari, Om Sharma, S. Raghavendra:
Analysis and Prognosis of Water Quality for River Ganga Using Water Quality Index. 178-190 - Anoop Jose, C. Priyadharsini, P. Mercy Praise, G. Jaspher W. Kathrine
, J. Andrew
:
Detection of Android Ransomware Using Machine Learning Approach. 191-203 - Anmol Garg
, Jay Singhvi, Saurav Sabu, Rushikesh Sahu, Srikanth Prabhu, Arti Pawar:
Cyber Security and Layering of Medical Data Using Machine Learning Algorithms. 204-226 - Sai Prashanth Duddela, Senthil Kumaran, Priya R. Kamath:
Analysis on Classification of Handwritten Devanagari Characters Using Deep Learning Models. 227-240
Cloud, IoT and Computing Technologies
- Suryaansh Rathinam
:
Analysis and Comparison of Different Frontend Frameworks. 243-257 - S. Deepthi
, Shrey Khandwekar:
Lightweight Capability-Based Access Control for Internet of Things (IoT). 258-266 - S. Deepthi
, Apoorva:
Securing IoT Using Blockchain. 267-278 - Gautham Manuru Prabhu
, Tanay Gupta
, Metta Venkata Srujan
, A. R. Soumya
, Anshita Palorkar
, Anurag Chowdhury
:
VIKAS: A Multimodal Framework to Aid in Effective Disaster Management. 279-289 - Goutham Yadavalli, Shwetha Rai
:
Discovery of Rare Itemsets Using Hyper-Linked Data Structure: A Parallel Approach. 290-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.