default search action
Chittaranjan Hota
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota:
Secure peer-to-peer learning using feature embeddings. Clust. Comput. 27(3): 3471-3479 (2024) - [c50]Kartikeya Dubey, Chittaranjan Hota:
Anomaly Detection in WBANs Using CNN-Autoencoders and LSTMs. AINA (3) 2024: 187-197 - [c49]Manan Popat, Divyan Goyal, Vibhum Raj, Nirmal Jayabalan, Chittaranjan Hota:
Eye Movement Tracking for Computer Vision Syndrome using Deep Learning Techniques. ICAIIC 2024: 317-322 - 2023
- [j17]S. Saibharath, Sudeepta Mishra, Chittaranjan Hota:
Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing. Comput. Commun. 202: 110-123 (2023) - [j16]Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta, Chittaranjan Hota:
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure. Future Internet 15(4): 146 (2023) - [j15]Anirudh Kasturi, Chittaranjan Hota:
OSGAN: One-shot distributed learning using generative adversarial networks. J. Supercomput. 79(12): 13620-13640 (2023) - [c48]Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota:
Distributed Learning of Pure Non-IID data using Latent Codes. IMCOM 2023: 1-6 - [c47]S. Saibharath, Sudeepta Mishra, Gazal Arora, Anamika Sharma, Chittaranjan Hota:
Selfish Users in Listen-Before-Talk Co-existence of Cellular-Wi-Fi Networks: Counteraction Methods. WiOpt 2023: 524-531 - 2022
- [j14]Gokul Kannan Sadasivam, Chittaranjan Hota, Anand Bhojan:
Detection of stealthy single-source SSH password guessing attacks. Evol. Syst. 13(1): 1-15 (2022) - [j13]Rajesh Kumar Shrivastava, Varun Natu, Chittaranjan Hota:
Code integrity verification using cache memory monitoring. Inf. Secur. J. A Glob. Perspect. 31(2): 226-236 (2022) - [c46]Bhavesh Gawri, Anirudh Kasturi, Lalita Bhanu Murthy Neti, Chittaranjan Hota:
An efficient approach to kNN algorithm for IoT devices. COMSNETS 2022: 734-738 - [c45]Anirudh Kasturi, S. Vishwamithra, Chittaranjan Hota:
Communication Efficient Distributed Learning Using Variational Auto Encoders. COMSNETS 2022: 744-748 - [c44]Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota:
Secure Peer to Peer Learning Using Auto Encoders. iSES 2022: 236-241 - 2021
- [j12]Rajesh Kumar Shrivastava, Chittaranjan Hota:
UnderTracker: Generating Robust Binaries Using Execution Flow Traces. Inf. Syst. Frontiers 23(4): 915-930 (2021) - [j11]S. Saibharath, Sudeepta Mishra, Chittaranjan Hota:
Swap-Based Load Balancing for Fairness in Radio Access Networks. IEEE Wirel. Commun. Lett. 10(11): 2412-2416 (2021) - [c43]S. Saibharath, Sudeepta Mishra, Chittaranjan Hota:
QoS Driven Task Offloading and Resource Allocation at Edge Servers in RAN Slicing. CCNC 2021: 1-4 - [c42]Sanket Mishra, Rohit Dwivedula, Varad Kshirsagar, Chittaranjan Hota:
Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks. COMAD/CODS 2021: 233-237 - [c41]Anirudh Kasturi, Atharva Sune, Chittaranjan Hota:
Decentralized Learning with GANs. COMAD/CODS 2021: 414 - [c40]Sanket Mishra, Varad Kshirsagar, Rohit Dwivedula, Chittaranjan Hota:
Attention-Based Bi-LSTM for Anomaly Detection on Time-Series Data. ICANN (1) 2021: 129-140 - 2020
- [j10]Vijayalakshmi Anand, Chittaranjan Hota:
Motivation of Participants in Crowdsourcing Platforms using Intelligent Agents. Int. J. Comput. 19: 78-87 (2020) - [c39]Rajesh Kumar Shrivastava, Chittaranjan Hota:
Code-Tampering Defense for Internet of Things Using System Call Traces. I4CS 2020: 158-170 - [c38]Anirudh Kasturi, Anish Reddy Ellore, Chittaranjan Hota:
Fusion Learning: A One Shot Federated Learning. ICCS (3) 2020: 424-436 - [c37]Sanket Mishra, Raghunathan Balan, Ankit Shibu, Chittaranjan Hota:
Real-Time Probabilistic Approach for Traffic Prediction on IoT Data Streams. ICONIP (5) 2020: 633-641 - [c36]Anish Reddy Ellore, Sanket Mishra, Chittaranjan Hota:
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay. NSS 2020: 245-260 - [c35]S. Saibharath, Sudeepta Mishra, Chittaranjan Hota:
Quality of Service Driven Resource Allocation in Network Slicing. VTC Spring 2020: 1-5
2010 – 2019
- 2019
- [j9]Rajesh Kumar Shrivastava, Chittaranjan Hota:
Profile-guided code identification and hardening using return oriented programming. J. Inf. Secur. Appl. 48 (2019) - [j8]Abhishek Thakur, R. Sathiyanarayanan, Chittaranjan Hota:
STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks. Wirel. Networks 25(6): 3275-3296 (2019) - [c34]Rajesh Kumar Shrivastava, Sanket Mishra, V. E. Archana, Chittaranjan Hota:
Preventing data tampering in IoT networks. ANTS 2019: 1-6 - [c33]Rajesh Kumar Shrivastava, Kevin Jude Concessao, Chittaranjan Hota:
Code Tamper-Proofing using Dynamic Canaries. APCC 2019: 238-243 - [c32]Rajesh Kumar Shrivastava, Bazila Bashir, Chittaranjan Hota:
Attack Detection and Forensics Using Honeypot in IoT Environment. ICDCIT 2019: 402-409 - [c31]Rajesh Kumar Shrivastava, Chittaranjan Hota, Govind Mittal, Zahid Akhtar:
UnderTracker: Binary Hardening Through Execution Flow Verification. SKM 2019: 3-20 - 2018
- [c30]Sanket Mishra, Mohit Jain, B. Siva Naga Sasank, Chittaranjan Hota:
An Ingestion Based Analytics Framework for Complex Event Processing Engine in Internet of Things. BDA 2018: 266-281 - 2017
- [c29]Chittaranjan Hota, Rajesh Kumar Shrivastava, Shivangi Shipra:
Tamper-resistant code using optimal ROP gadgets for IoT devices. IWCMC 2017: 570-575 - [c28]Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota:
Resilient complex event processing in IoT using side-channel information. SIN 2017: 80-87 - 2016
- [j7]Pratik Narang, Chittaranjan Hota, Husrev Taha Sencar:
Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets. Comput. Commun. 96: 29-42 (2016) - [j6]V. Balaji, S. Anand, Chittaranjan Hota, G. Raghurama:
Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning. EAI Endorsed Trans. Wirel. Spectr. 2(7): e3 (2016) - [c27]Gokul Kannan Sadasivam, Chittaranjan Hota, Bhojan Anand:
Classification of SSH Attacks Using Machine Learning Algorithms. ICITCS 2016: 1-6 - 2015
- [j5]Chittaranjan Hota, Shambhu J. Upadhyaya, Jamal Nazzal Al-Karaki:
Advances in secure knowledge management in the big data era. Inf. Syst. Frontiers 17(5): 983-986 (2015) - [j4]Pratik Narang, Chittaranjan Hota:
Game-theoretic strategies for IDS deployment in peer-to-peer networks. Inf. Syst. Frontiers 17(5): 1017-1028 (2015) - [c26]K. Haribabu, Chittaranjan Hota:
Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation. ICDCN 2015: 31:1-31:9 - [i2]K. Haribabu, Dayakar Reddy, Chittaranjan Hota, Antti Ylä-Jääski, Sasu Tarkoma:
Adaptive Lookup for Unstructured Peer-to-Peer Overlays. CoRR abs/1509.04417 (2015) - 2014
- [j3]Pratik Narang, Chittaranjan Hota, V. N. Venkatakrishnan:
PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP J. Inf. Secur. 2014: 15 (2014) - [j2]Kamaldeep Singh, Sharath Chandra Guntuku, Abhishek Thakur, Chittaranjan Hota:
Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests. Inf. Sci. 278: 488-497 (2014) - [c25]Pratik Narang, Abhishek Thakur, Chittaranjan Hota:
HaDeS: A Hadoop-based Framework for Detection of Peer-to-Peer Botnets. COMAD 2014: 121-124 - [c24]Pratik Narang, Vansh Khurana, Chittaranjan Hota:
Machine-learning approaches for P2P botnet detection using signal-processing techniques. DEBS 2014: 338-341 - [c23]Abhishek Thakur, Chittaranjan Hota:
Designing an extensible communication platform for rural area. ICACCI 2014: 1348-1355 - [c22]Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan:
PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations. IEEE Symposium on Security and Privacy Workshops 2014: 108-115 - 2013
- [c21]Pratik Narang, Jagan Mohan Reddy, Chittaranjan Hota:
Feature selection for detection of peer-to-peer botnet traffic. COMPUTE 2013: 16:1-16:9 - [c20]Chittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, Antti Ylä-Jääski:
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks. GPC 2013: 270-279 - [c19]Abhishek Thakur, Chittaranjan Hota:
Sustainable wireless internet connectivity for rural areas. ICACCI 2013: 1335-1340 - [c18]Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota, Muttukrishnan Rajarajan:
Adaptive Task Scheduling in Service Oriented Crowd Using SLURM. ICDCIT 2013: 373-385 - [c17]Murali Parameswaran, Chittaranjan Hota:
Arbitration-based reliable distributed mutual exclusion for Mobile Ad-hoc Networks. WiOpt 2013: 380-387 - [e1]Chittaranjan Hota, Pradip K. Srimani:
Distributed Computing and Internet Technology, 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings. Lecture Notes in Computer Science 7753, Springer 2013, ISBN 978-3-642-36070-1 [contents] - [i1]Sharath Chandra Guntuku, Pratik Narang, Chittaranjan Hota:
Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian Regularized Neural Network. CoRR abs/1307.7464 (2013) - 2012
- [j1]K. Haribabu, Chittaranjan Hota, Arindam Paul:
GAUR: a method to detect Sybil groups in peer-to-peer overlays. Int. J. Grid Util. Comput. 3(2/3): 145-156 (2012) - 2011
- [c16]K. Haribabu, Arindam Paul, Chittaranjan Hota:
Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods. AINA Workshops 2011: 114-119 - [c15]Rusheel Jain, Murali Parameswaran, Chittaranjan Hota:
An efficient on-demand routing protocol for MANETs using Bayesian approach. COMSNETS 2011: 1-4 - [c14]Chittaranjan Hota, Filippo Ledda, Giuliano Armano:
A Resilient Voting Scheme for Improving Secondary Structure Prediction. MIWAI 2011: 339-350 - [c13]Sunita Bansal, Chittaranjan Hota:
Efficient Algorithm on heterogeneous computing system. ReTIS 2011: 57-61 - 2010
- [c12]Sirish Kumar Balaga, K. Haribabu, Chittaranjan Hota:
Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic. ICDCIT 2010: 188-193 - [c11]Vakul Mohanty, Dhaval Moliya, Chittaranjan Hota, Muttukrishnan Rajarajan:
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection. PAISI 2010: 65-72 - [c10]Murali Parameswaran, Chittaranjan Hota:
A novel permission-based reliable distributed mutual exclusion algorithm for MANETs. WOCN 2010: 1-6
2000 – 2009
- 2009
- [c9]Sunita Bansal, Chittaranjan Hota:
Priority-Based Job Scheduling in Distributed Systems. ICISTM 2009: 110-118 - [c8]K. Haribabu, Chittaranjan Hota, Saravana:
Detecting Sybils in Peer-to-Peer File Replication Systems. ISDF 2009: 123-134 - 2008
- [c7]K. Haribabu, Chittaranjan Hota, Antti Ylä-Jääski:
Indexing through Querying in Unstructured Peer-to-Peer Overlay Networks. APNOMS 2008: 102-111 - [c6]K. Haribabu, Dayakar Reddy, Chittaranjan Hota, Antti Ylä-Jääski, Sasu Tarkoma:
Adaptive lookup for unstructured peer-to-peer overlays. COMSWARE 2008: 776-782 - [c5]Murali Parameswaran, K. Rakesh, Chittaranjan Hota, Antti Ylä-Jääski:
Energy-aware routing in Mobile Ad-Hoc Networks. Wireless Days 2008: 1-5 - 2007
- [c4]Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan:
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. IEEE NAS 2007: 122-132 - 2004
- [c3]Chittaranjan Hota, G. Raghurama:
Design and Deployment of IP Virtual Private Networks: A Case Study. CIT 2004: 76-86 - [c2]Chittaranjan Hota, Sanjay Kumar Jha, G. Raghurama:
Distributed dynamic resource management in IPVPNs to guarantee quality of service. ICON 2004: 414-419 - [c1]Chittaranjan Hota, Sanjay Kumar Jha, G. Raghurama:
Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model. IWDC 2004: 289-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint