Amitabha Das

According to our database1, Amitabha Das authored at least 59 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing ASL Recognition with GCNs and Successive Residual Connections.
CoRR, 2024

2012
A proxy based approach for pre-authentication in media independent vertical handover.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

2011
Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA.
IEEE Trans. Dependable Secur. Comput., 2011

Spectrum MRI: Towards diagnosis of multi-radio interference in the unlicensed band.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

2010
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS.
Comput. Networks, 2010

Watermarking video content using visual cryptography and scene averaged image.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

A framework for security quantification of networked machines.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
Security Threats in Ad Hoc Routing Protocols.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

A survey on MAC protocols in OSA networks.
Comput. Networks, 2009

Secure multimedia content delivery with multiparty multilevel DRM architecture.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

A CRT based watermark for multiparty multilevel DRM architecture.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Privacy Preserving Multiparty Multilevel DRM Architecture.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Variable-length signatures for intrusion detection.
Comput. Syst. Sci. Eng., 2008

Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks.
Comput. Commun., 2008

CRADS: Integrated Cross Layer Approach for Detecting Routing Attacks in MANETs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Generalized Self-healing Key Distribution Using Vector Space Access Structure.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

2007
Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures.
Proceedings of the Trust, 2007

Evaluating the Effects of Model Generalization on Intrusion Detection Performance.
Proceedings of the New Approaches for Security, 2007

Cross Layer versus Single Layer Approaches for Intrusion Detection in MANETs.
Proceedings of the 15th IEEE International Conference on Networks, 2007

A Reservation-Based TDMA MAC Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Analyzing and evaluating dynamics in stide performance for intrusion detection.
Knowl. Based Syst., 2006

A Flow Control Framework for Improving Throughput and Energy Efficiency in CSMA/CA based Wireless Multihop Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

2005
The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection.
Int. J. Netw. Secur., 2005

Neural-Network-Based Smart Sensor Framework Operating in a Harsh Environment.
EURASIP J. Adv. Signal Process., 2005

A post nonlinear geometric algorithm for independent component analysis.
Digit. Signal Process., 2005

Improving the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Flicker correction using a simplified flicker parameter model.
Proceedings of the Signal and Image Processing (SIP 2005), 2005

USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Model Redundancy vs. Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2005

A Reversible Watermarking Scheme for JPEG-2000 Compressed Images.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

M of N Features vs. Intrusion Detection.
Proceedings of the Computational Science and Its Applications, 2005

Efficient multi-rate relaying (EMR) MAC protocol for ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2005

Correcting Flicker in Color Motion Pictures.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2005

Model Generalization and Its Implications on Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Synchronized and Concurrent Enabling of Neighborhood Transmission (scent) - a MAC Protocol for Concurrent Transmission in Wireless <i>Ad-Hoc</i> Networks.
Int. J. Wirel. Opt. Commun., 2004

Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
CoRR, 2004

Primary channel assignment based MAC (PCAM) - a multi-channel MAC protocol for multi-hop wireless networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

An improvement to the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Channel assignment for ifying the critically exposed node problem in ad hoc wireless networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Improved flicker removal through motion vectors compensation.
Proceedings of the Third International Conference on Image and Graphics, 2004

Visualizing and Identifying Intrusion Context from System Calls Trace.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Utilizing Statistical Characteristics of N-grams for Intrusion Detection.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003

2002
Estimation of Occlusion and Dense Motion Fields in a Bidirectional Bayesian Framework.
IEEE Trans. Pattern Anal. Mach. Intell., 2002

2001
Low-bit-rate video coding using dense motion field and uncovered background prediction.
IEEE Trans. Image Process., 2001

Fast Online Dynamic Association Rule Mining.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001

A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment.
Proceedings of the Topics in Electronic Commerce, Second International Symposium, 2001

Tradeoff between Client and Server Transaction Validation in Mobile Environment.
Proceedings of the International Database Engineering & Applications Symposium, 2001

Models and Protocol Structures for Software Agent Based Complex E-Commerce Transactions.
Proceedings of the Electronic Commerce and Web Technologies, 2001

An Agent System Architecture for E-Commerce.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

Rapid Association Rule Mining.
Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management, 2001

1997
Linear Recursive Networks and Their Applications in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 1997

Minimizing cell delay variation in CRMA/ATM interworking.
Comput. Commun., 1997

A New MRF Model for Robust Estimate of Occlusion and Motion Vectors Fields.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1995
A Parallel Processing Paradigm for Irregular Applications.
Proceedings of the Parallel Algorithms for Irregularly Structured Problems, 1995

1994
An adaptive switching architecture for multiprocessor networks.
Microprocess. Microsystems, 1994

A novel efficient parallel algorithm for RNS to binary conversion for arbitrary moduli set.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Linear Recursive Networks and Their Applications in Topological Design and Data Routing.
Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, 1993

1992
PAL: A Language for Parallel Asynchronous Computation.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

1991
A parallel sorting algorithm for a novel model of computation.
Int. J. Parallel Program., 1991


  Loading...