default search action
Prosenjit Chatterjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i8]Prosenjit Chatterjee, ANK Zaman:
Thermal Face Image Classification using Deep Learning Techniques. CoRR abs/2311.02314 (2023) - [i7]Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. CoRR abs/2311.14195 (2023) - [i6]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net. CoRR abs/2312.00040 (2023) - [i5]Justin Spencer, Deborah Lawrence, Prosenjit Chatterjee, Kaushik Roy, Albert C. Esterline, Jung-Hee Kim:
Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns. CoRR abs/2312.00041 (2023) - [i4]Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy:
Continuous Authentication Using Mouse Clickstream Data Analysis. CoRR abs/2312.00802 (2023) - [i3]Ujwal Sasikumar, ANK Zaman, Abdul-Rahman Mawlood-Yunis, Prosenjit Chatterjee:
Sentiment Analysis of Twitter Posts on Global Conflicts. CoRR abs/2312.03715 (2023) - 2022
- [c15]Jared Mathews, Prosenjit Chatterjee, Shankar Banik:
CoAP-DoS: An IoT Network Intrusion Data Set. CSP 2022: 91-95 - [c14]Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance:
A Deep Learning Approach to Create DNS Amplification Attacks. MSIE 2022: 429-435 - [i2]Jared Mathews, Prosenjit Chatterjee, Shankar Banik:
CoAP-DoS: An IoT Network Intrusion Dataset. CoRR abs/2206.14341 (2022) - [i1]Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance:
A Deep Learning Approach to Create DNS Amplification Attacks. CoRR abs/2206.14346 (2022) - 2021
- [c13]Sandeep Shah, Pramita Sree Muhuri, Xiaohong Yuan, Kaushik Roy, Prosenjit Chatterjee:
Implementing a network intrusion detection system using semi-supervised support vector machine and random forest. ACM Southeast Conference 2021: 180-184 - [c12]Joseph O'Neill, Jenario Johnson, Rutledge Detyens, Roberto Williams Batista, Sorinel Oprisan, Prosenjit Chatterjee, Ryan Integlia:
Ethical implications of brain-computer interfaces with emotion, motor imagery, and subvocal speech classification. ISTAS 2021: 1-5 - 2020
- [j3]Janelle C. Mason, Rushit Dave, Prosenjit Chatterjee, Ieschecia Graham-Allen, Albert C. Esterline, Kaushik Roy:
An Investigation of Biometric Authentication in the Healthcare Environment. Array 8: 100042 (2020) - [j2]Pramita Sree Muhuri, Prosenjit Chatterjee, Xiaohong Yuan, Kaushik Roy, Albert C. Esterline:
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks. Inf. 11(5): 243 (2020) - [c11]Daniel Xie, Prosenjit Chatterjee, Zhipeng Liu, Kaushik Roy, Kossi D. Edoh:
DeepFake Detection on Publicly Available Datasets using Modified AlexNet. SSCI 2020: 1866-1871
2010 – 2019
- 2019
- [c10]Janelle C. Mason, Prosenjit Chatterjee, Kaushik Roy, Albert C. Esterline:
A Framework to Identify People in Unstructured Environments Incorporating Biometrics. SpaCCS Workshops 2019: 65-75 - [c9]Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy:
Continuous Authentication Using Mouse Clickstream Data Analysis. SpaCCS Workshops 2019: 76-85 - [c8]Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh:
Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net. SpaCCS Workshops 2019: 86-94 - [c7]Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy:
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data. SpaCCS 2019: 147-156 - 2018
- [c6]Prosenjit Chatterjee, Kaushik Roy:
Anti-spoofing Approach Using Deep Convolutional Neural Network. IEA/AIE 2018: 745-750 - 2013
- [c5]Bin Xue, Prosenjit Chatterjee, Sandeep K. Shukla:
Simplification of C-RTL equivalent checking for fused multiply add unit using intermediate models. ASP-DAC 2013: 723-728
2000 – 2009
- 2005
- [c4]Prosenjit Chatterjee:
Streamline verification process with formal property verification to meet highly compressed design cycle. DAC 2005: 674-677 - 2002
- [c3]Prosenjit Chatterjee, Hemanthkumar Sivaraj, Ganesh Gopalakrishnan:
Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking. CAV 2002: 123-136 - [c2]Prosenjit Chatterjee, Ganesh Gopalakrishnan:
A Specification and Verification Framework for Developing Weak Shared Memory Consistency Protocols. FMCAD 2002: 292-309 - 2001
- [c1]Prosenjit Chatterjee, Ganesh Gopalakrishnan:
towards A formal Model of Shared Memory Consistency for Intel ItaniumTM. ICCD 2001: 515-518 - 2000
- [j1]Diganta Goswami, Rajib Mall, Prosenjit Chatterjee:
Static slicing in Unix process environment. Softw. Pract. Exp. 30(1): 17-36 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint