Dipankar Dasgupta
Orcid: 0000-0002-3097-061X
According to our database1,
Dipankar Dasgupta
authored at least 158 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2015, "For contributions to immunological computation and bio-inspired cyber security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Distributed Conditional Wasserstein Deep Convolutional Relativistic Loss Generative Adversarial Network With Improved Convergence.
IEEE Trans. Artif. Intell., September, 2024
Proceedings of the 15th IEEE Annual Ubiquitous Computing, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024
2023
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023
2022
IEEE Trans. Artif. Intell., 2022
CoRR, 2022
A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks.
SN Comput. Sci., 2021
Ransomware Detection Using Deep Learning in the SCADA System of Electric Vehicle Charging Station.
CoRR, 2021
IEEE Access, 2021
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021
Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
J. Medical Syst., 2020
IET Biom., 2020
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the Evolution in Computational Intelligence, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
IEEE Trans. Big Data, 2019
Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
2018
Proceedings of the Applied Computer Sciences in Engineering, 2018
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018
Proceedings of the Big Data - BigData 2018, 2018
2017
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
2016
Comput. Secur., 2016
Apache Hama: An Emerging Bulk Synchronous Parallel Computing Framework for Big Data Applications.
IEEE Access, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
2014
Int. J. Inf. Priv. Secur. Integr., 2014
Steps toward Developing an Artificial Cell Signaling Model Applied to Distributed Fault Detection.
Proceedings of the Unconventional Computation and Natural Computation, 2014
An adaptive approach for continuous multi-factor authentication in an identity eco-system.
Proceedings of the Cyber and Information Security Research Conference, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence and Data Mining, 2014
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Cyber Security, 2014
2013
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
Deriving behavior primitives from aggregate network features using support vector machines.
Proceedings of the 5th International Conference on Cyber Conflict, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013
2012
On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments.
Proceedings of the 2012 Spring Simulation Multiconference, 2012
Proceedings of the Critical Infrastructure Protection VI, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the IEEE Congress on Evolutionary Computation, 2012
Proceedings of the Variants of Evolutionary Algorithms for Real-World Applications, 2012
2011
Int. J. Inf. Secur. Priv., 2011
Appl. Soft Comput., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Multi-objective Evolutionary Algorithms to Solve Coverage and Lifetime Optimization Problem in Wireless Sensor Networks.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010
Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the 2010 International Conference on Emerging Security Technologies, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the IEEE Congress on Evolutionary Computation, 2010
2009
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage.
Inf. Sci., 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
An Empirical Study of Conserved Self Pattern Recognition Algorithm: Comparing to other One-class Classifiers and Evaluating with Random Number Generators.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009
A multiobjective evolutionary algorithm for the task based sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
An empirical comparison of memetic algorithm strategies on the multiobjective quadratic assignment problem.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009
On the use of informed initialization and extreme solutions sub-population in multi-objective evolutionary algorithms.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
IEEE Comput. Intell. Mag., 2008
IEEE Comput. Intell. Mag., 2008
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008
A comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
2007
Applying Hybrid Multiobjective Evolutionary Algorithms to the Sailor Assignment Problem.
Proceedings of the Advances in Evolutionary Computing for System Design, 2007
Proceedings of the Learning and Intelligent Optimization, Second International Conference, 2007
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007
2006
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Data Mining, 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
Analyzing the Performance of Hybrid Evolutionary Algorithms for the Multiobjective Quadratic Assignment Problem.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
MILA - multilevel immune learning algorithm and its application to anomaly detection.
Soft Comput., 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Genetic and Evolutionary Computation Conference, 2005
Proceedings of the Data Mining, 2005
2004
Proceedings of the Genetic and Evolutionary Computation, 2004
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
On geometric and statistical properties of the attractors of a generic evolutionary algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Genet. Program. Evolvable Mach., 2003
Proceedings of the Third SIAM International Conference on Data Mining, 2003
Proceedings of the Artificial Immune Systems, Second International Conference, 2003
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures.
Proceedings of the IEEE Systems, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Proceedings of the Genetic and Evolutionary Computation, 2003
Soft multiple expression and genetic redundancy: preliminary results for non-stationary function optimization.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
2002
IEEE Trans. Evol. Comput., 2002
IEEE Trans. Evol. Comput., 2002
An Novel Artificial Immune System Approach to Robust Data Mining.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002
Modeling Convection Coefficients With Genetic Algorithms.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002
An Imunogenetic Technique To Detect Anomalies In Network Traffic.
Proceedings of the GECCO 2002: Proceedings of the Genetic and Evolutionary Computation Conference, 2002
Using Competitive Operators and a Local Selection Scheme in Genetic Search.
Proceedings of the Late Breaking papers at the Genetic and Evolutionary Computation Conference (GECCO-2002), 2002
The fuzzy artificial immune system: motivations, basic concepts, and application to clustering and Web profiling.
Proceedings of the 2002 IEEE International Conference on Fuzzy Systems, 2002
Proceedings of the 4th NASA / DoD Workshop on Evolvable Hardware (EH 2002), 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
Tool to Generate a Local Internet Weather Report.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
2000
IEEE Trans. Evol. Comput., 2000
A comparison of negative and positive selection algorithms in novel pattern detection.
Proceedings of the IEEE International Conference on Systems, 2000
An Evolutionary Approach for Job Assignment.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000
1999
An Immunogenetic Approach to Spectra Recognition.
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 1999), 1999
Proceedings of the 1999 Congress on Evolutionary Computation, 1999
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999
1998
Appl. Intell., 1998
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998
1997
Evolutionary algorithms in engineering applications.
Springer, ISBN: 978-3-540-62021-1, 1997
1994
Proceedings of the First IEEE Conference on Evolutionary Computation, 1994
1993
Proceedings of the Fifth International Conference on Tools with Artificial Intelligence, 1993
1992
Nonstationary Function Optimization using the Structured Genetic Algorithm.
Proceedings of the Parallel Problem Solving from Nature 2, 1992
Engineering Optimizations Using the Structured Genetic Aigorithm.
Proceedings of the 10th European Conference on Artificial Intelligence, 1992