


default search action
Sanjay Kumar Jena
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Sanjay Kumar Jena
, Ram Chandra Barik
, Rojalina Priyadarshini
:
A systematic state-of-art review on digital identity challenges with solutions using conjugation of IOT and blockchain in healthcare. Internet Things 25: 101111 (2024)
2010 – 2019
- 2018
- [j23]Jitendra Kumar Rout, Kim-Kwang Raymond Choo
, Amiya Kumar Dash, Sambit Bakshi
, Sanjay Kumar Jena, Karen L. Williams:
A model for sentiment and emotion analysis of unstructured social media text. Electron. Commer. Res. 18(1): 181-199 (2018) - [j22]Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo
, Sanjay Kumar Jena, Mohammad S. Obaidat
:
An adaptive task allocation technique for green cloud computing. J. Supercomput. 74(1): 370-385 (2018) - 2017
- [j21]Jitendra Kumar Rout, Anmol Dalmia, Kim-Kwang Raymond Choo
, Sambit Bakshi
, Sanjay Kumar Jena:
Revisiting Semi-Supervised Learning for Online Deceptive Review Detection. IEEE Access 5: 1319-1327 (2017) - [j20]Ramesh Kumar Mohapatra, Banshidhar Majhi, Sanjay Kumar Jena:
Two-stage classification approach for the recognition of handwritten atomic Odia character. Int. J. Appl. Pattern Recognit. 4(1): 44-63 (2017) - [j19]Santosh Kumar Sahu
, Sanjay Kumar Jena, Manish Verma:
K-NN Based Outlier Detection Technique on Intrusion Dataset. Int. J. Knowl. Discov. Bioinform. 7(1): 58-70 (2017) - [j18]Santosh Kumar Bharti, Ramkrushna Pradhan, Korra Sathya Babu, Sanjay Kumar Jena:
Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data. Int. J. Semantic Web Inf. Syst. 13(4): 89-108 (2017) - [j17]Jitendra Kumar Rout, Smriti Singh, Sanjay Kumar Jena, Sambit Bakshi
:
Deceptive review detection using labeled and unlabeled data. Multim. Tools Appl. 76(3): 3187-3211 (2017) - [j16]Asish Kumar Dalai
, Sanjay Kumar Jena:
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. Secur. Commun. Networks 2017: 3825373:1-3825373:12 (2017) - [j15]Suraj Sharma
, Deepak Puthal, Sanjay Kumar Jena, Albert Y. Zomaya
, Rajiv Ranjan
:
Rendezvous based routing protocol for wireless sensor networks with mobile sink. J. Supercomput. 73(3): 1168-1188 (2017) - [j14]Suraj Sharma
, Deepak Puthal, Sanjay Kumar Jena, Albert Y. Zomaya
, Rajiv Ranjan
:
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink. J. Supercomput. 73(3): 1189-1191 (2017) - [j13]Asish Kumar Dalai, Sanjay Kumar Jena:
WDTF: A Technique for Wireless Device Type Fingerprinting. Wirel. Pers. Commun. 97(2): 1911-1928 (2017) - [c17]Santosh Kumar Bharti
, Korra Sathya Babu
, Sanjay Kumar Jena
:
Harnessing Online News for Sarcasm Detection in Hindi Tweets. PReMI 2017: 679-686 - 2016
- [j12]Santosh Kumar Bharti, B. Vachha, Ramkrushna Pradhan, Korra Sathya Babu, Sanjay Kumar Jena:
Sarcastic sentiment detection in tweets streamed in real time: a big data approach. Digit. Commun. Networks 2(3): 108-121 (2016) - [j11]Suraj Sharma
, Pratik Agarwal, Sanjay Kumar Jena:
EAMRP: energy aware multipath routing protocol for wireless sensor networks. Int. J. Inf. Commun. Technol. 8(2/3): 235-248 (2016) - [c16]Nikunja Bihari Kar, Korra Sathya Babu
, Sanjay Kumar Jena:
Face Expression Recognition Using Histograms of Oriented Gradients with Reduced Features. CVIP (2) 2016: 209-219 - [c15]Santosh Kumar Sahu
, Sanjay Kumar Jena:
A Multiclass SVM Classification Approach for Intrusion Detection. ICDCIT 2016: 175-181 - 2015
- [j10]Suraj Sharma
, Sanjay Kumar Jena:
Cluster Based Multipath Routing Protocol for Wireless Sensor Networks. Comput. Commun. Rev. 45(2): 14-20 (2015) - [j9]Ramesh Kumar Mohapatra, Banshidhar Majhi, Sanjay Kumar Jena:
Classification of handwritten Odia basic character using Stockwell transform. Int. J. Appl. Pattern Recognit. 2(3): 235-254 (2015) - [j8]Sanjay Kumar Jena, Ashok K. Turuk, Manmath Narayan Sahoo, Sambit Bakshi
:
Introduction to special issue on 'Advances in Information Systems and Network Systems Security'. Innov. Syst. Softw. Eng. 11(3): 153-154 (2015) - [c14]Santosh Kumar Bharti
, Korra Sathya Babu
, Sanjay Kumar Jena:
Parsing-based Sarcasm Sentiment Recognition in Twitter Data. ASONAM 2015: 1373-1380 - [c13]Sidharth Sharma, Santosh Kumar Sahu
, Sanjay Kumar Jena:
On selection of attributes for entropy based detection of DDoS. ICACCI 2015: 1096-1100 - 2014
- [j7]Korra Sathya Babu
, Jhalaka Hota
, Sanjay Kumar Jena:
Privacy preserving social networking. Int. J. Comput. Sci. Eng. 9(3): 165-176 (2014) - [j6]Suraj Sharma, Sanjay Kumar Jena:
Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks. J. Comput. Eng. 2014: 560675:1-560675:10 (2014) - 2013
- [j5]Korra Sathya Babu
, Sanjay Kumar Jena, Jhalaka Hota
, Bijayinee Moharana:
Anonymizing social networks: A generalization approach. Comput. Electr. Eng. 39(7): 1947-1961 (2013) - [j4]Korra Sathya Babu
, Rajesh Pillelli, Sanjay Kumar Jena:
Enhanced t-closeness for balancing utility and privacy. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 230-242 (2013) - [j3]Korra Sathya Babu, Nithin Reddy, Nitesh Kumar, Mark Elliot, Sanjay Kumar Jena:
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases. Trans. Data Priv. 6(1): 1-17 (2013) - 2011
- [j2]Debasish Jena
, Sanjay Kumar Jena:
A novel and efficient cryptosystem for large message encryption. Int. J. Inf. Commun. Technol. 3(1): 32-39 (2011) - [c12]Korra Sathya Babu
, Sanjay Kumar Jena:
Balancing between Utility and Privacy for k-Anonymity. ACC (2) 2011: 1-8 - [c11]Suraj Sharma
, Sanjay Kumar Jena:
A survey on secure hierarchical routing protocols in wireless sensor networks. ICCCS 2011: 146-151 - [c10]Asish Kumar Dalai, Sanjay Kumar Jena:
Evaluation of web application security risks and secure design patterns. ICCCS 2011: 565-568 - [c9]Saroj Kumar Panigrahy
, Sanjay Kumar Jena, Ashok Kumar Turuk:
Security in Bluetooth, RFID and wireless sensor networks. ICCCS 2011: 628-633 - [e1]Sanjay Kumar Jena, Rajeev Kumar, Ashok Kumar Turuk, Manoranjan Dash:
Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011. ACM 2011, ISBN 978-1-4503-0464-1 [contents] - 2010
- [c8]Saroj Kumar Panigrahy
, Debasish Jena, Sanjay Kumar Jena:
A Secure e-Shopping Using Voice Ordering. BAIP 2010: 233-237
2000 – 2009
- 2009
- [c7]Pranav Khaitan, Korra Sathya Babu
, Sanjay Kumar Jena, Banshidhar Majhi:
Approximation Algorithms for Optimizing Privacy and Utility. CSA 2009: 1-6 - [c6]Pranav Khaitan, Satish Kumar M, Korra Sathya Babu
, Sanjay Kumar Jena:
Improved Query Plans for Unnesting Nested SQL Queries. CSA 2009: 1-6 - [c5]Saroj Kumar Panigrahy
, Debasish Jena
, Korra Sathya Babu
, Sanjay Kumar Jena:
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature. IC3 2009: 182-193 - 2008
- [c4]Debasish Jena
, Banshidhar Majhi, Saroj Kumar Panigrahy
, Sanjay Kumar Jena:
Improved offline signature verification scheme using feature point extraction method. IEEE ICCI 2008: 475-480 - [c3]Debasish Jena
, Saroj Kumar Panigrahy
, Pradip Kumar Biswal, Sanjay Kumar Jena:
A Novel Protocol for Smart Card Using ECDLP. ICETET 2008: 838-843 - [c2]Bibhudatta Sahoo, Sudipta Mohapatra, Sanjay Kumar Jena:
A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems. PDPTA 2008: 499-505 - 2007
- [j1]Sanjay Kumar Jena, G. V. V. Krishna:
Blind Steganalysis: Estimation of Hidden Message Length. Int. J. Comput. Commun. Control 2(2): 149-158 (2007) - [c1]Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi:
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash. ICIT 2007: 19-22
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint