Amar Kumar Mohapatra
Orcid: 0000-0002-8025-6879
According to our database1,
Amar Kumar Mohapatra
authored at least 20 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
1
3
3
2
4
2
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ConFERNet: a low trainable parameters based novel light-weight convolutive feature extraction recurrent network for high accuracy suspect identification.
Signal Image Video Process., January, 2025
2024
IEEE Internet Things J., November, 2024
Optimizing facial feature extraction and localization using YOLOv5: An empirical analysis of backbone architectures with data augmentation for precise facial region detection.
Multim. Tools Appl., September, 2024
Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges.
Int. J. Commun. Syst., 2024
2023
A face recognition taxonomy and review framework towards dimensionality, modality and feature quality.
Eng. Appl. Artif. Intell., November, 2023
BPADTA: Blockchain-based privacy-preserving authentication scheme for digital twin empowered aerospace industry.
Comput. Electr. Eng., October, 2023
PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones.
Comput. Electr. Eng., May, 2023
VSMAS2HN: Verifiably Secure Mutual Authentication Scheme for Smart Healthcare Network.
Proceedings of the Advances in Computing and Data Sciences - 7th International Conference, 2023
2021
J. Syst. Archit., 2021
RC-DBSCAN: redundancy controlled DBSCAN algorithm for densely deployed wireless sensor network to prolong the network lifespan.
Int. J. Comput. Appl. Technol., 2021
2020
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks.
Wirel. Pers. Commun., 2020
Inf. Secur. J. A Glob. Perspect., 2020
DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications.
Int. J. Inf. Secur. Priv., 2020
Int. J. Inf. Commun. Technol., 2020
2019
Energy Efficient Model for Recovery from Multiple Nodes Failure in Wireless Sensor Networks.
Wirel. Pers. Commun., 2019
Analysis of software vulnerability classification based on different technical parameters.
Inf. Secur. J. A Glob. Perspect., 2019
2013
Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, 2013
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
2008
Proceedings of the 16th International Conference on Networks, 2008