Jaydip Sen

Orcid: 0000-0002-4120-8700

According to our database1, Jaydip Sen authored at least 125 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comparative Study of Hyperparameter Tuning Methods.
CoRR, 2024

Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks.
CoRR, 2024

Privacy in Federated Learning.
CoRR, 2024

Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective.
CoRR, 2024

Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent.
CoRR, 2024

Exploring Sectoral Profitability in the Indian Stock Market Using Deep Learning.
CoRR, 2024

Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation.
CoRR, 2024

Boosting Digital Safeguards: Blending Cryptography and Steganography.
CoRR, 2024

Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods.
CoRR, 2024

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism.
CoRR, 2024

Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model.
CoRR, 2024

Information Security and Privacy in the Digital World: Some Selected Topics.
CoRR, 2024

A Modified Word Saliency-Based Adversarial Attack on Text Classification Models.
CoRR, 2024

2023
Adversarial Attacks on Image Classification Models: Analysis and Defense.
CoRR, 2023

A Comparative Study of Portfolio Optimization Methods for the Indian Stock Market.
CoRR, 2023

A Portfolio Rebalancing Approach for the Indian Stock Market.
CoRR, 2023

Performance Evaluation of Equal-Weight Portfolio and Optimum Risk Portfolio on Indian Stocks.
CoRR, 2023

Portfolio Optimization: A Comparative Study.
CoRR, 2023

Adversarial Attacks on Image Classification Models: FGSM and Patch Attacks and their Impact.
CoRR, 2023

Cryptography and Key Management Schemes for Wireless Sensor Networks.
CoRR, 2023

A Comparative Analysis of Portfolio Optimization Using Mean-Variance, Hierarchical Risk Parity, and Reinforcement Learning Approaches on the Indian Stock Market.
CoRR, 2023

Data Privacy Preservation on the Internet of Things.
CoRR, 2023

2022
Designing Efficient Pair-Trading Strategies Using Cointegration for the Indian Stock Market.
CoRR, 2022

Stock Volatility Prediction using Time Series and Deep Learning Approach.
CoRR, 2022

A Comparative Study of Hierarchical Risk Parity Portfolio and Eigen Portfolio on the NIFTY 50 Stocks.
CoRR, 2022

Stock Performance Evaluation for Portfolio Design from Different Sectors of the Indian Stock Market.
CoRR, 2022

Robust Portfolio Design and Stock Price Prediction Using an Optimized LSTM Model.
CoRR, 2022

Hierarchical Risk Parity and Minimum Variance Portfolio Design on NIFTY 50 Stocks.
CoRR, 2022

Portfolio Optimization on NIFTY Thematic Sector Stocks Using an LSTM Model.
CoRR, 2022

Precise Stock Price Prediction for Robust Portfolio Design from Selected Sectors of the Indian Stock Market.
CoRR, 2022

Machine Learning: Algorithms, Models, and Applications.
CoRR, 2022

Optimum Pair-Trading Strategies for Stocks Using Cointegration-Based Approach.
Proceedings of the OITS International Conference on Information Technology, 2022

A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach.
Proceedings of the OITS International Conference on Information Technology, 2022

2021
Comprehensive Movie Recommendation System.
CoRR, 2021

Analysis of Sectoral Profitability of the Indian Stock Market Using an LSTM Regression Model.
CoRR, 2021

Stock Portfolio Optimization Using a Deep Learning LSTM Model.
CoRR, 2021

Stock Price Prediction Using Time Series, Econometric, Machine Learning, and Deep Learning Models.
CoRR, 2021

Machine Learning in Finance-Emerging Trends and Challenges.
CoRR, 2021

Optimum Risk Portfolio and Eigen Portfolio: A Comparative Analysis Using Selected Stocks from the Indian Stock Market.
CoRR, 2021

Design and Analysis of Robust Deep Learning Models for Stock Price Prediction.
CoRR, 2021

Volatility Modeling of Stocks from Selected Sectors of the Indian Economy Using GARCH.
CoRR, 2021

An Algorithm for Recommending Groceries Based on an Item Ranking Method.
CoRR, 2021

Profitability Analysis in Stock Investment Using an LSTM-Based Deep Learning Model.
CoRR, 2021

Accurate Stock Price Forecasting Using Robust and Optimized Deep Learning Models.
CoRR, 2021

Precise Stock Price Prediction for Optimized Portfolio Design Using an LSTM Model.
Proceedings of the 19th OITS International Conference on Information Technology, 2021

2020
Analysis and Forecasting of Financial Time Series Using CNN and LSTM-Based Deep Learning Models.
CoRR, 2020

Stock Price Prediction Using CNN and LSTM-Based Deep Learning Models.
CoRR, 2020

Stock Price Prediction Using Machine Learning and LSTM-Based Deep Learning Models.
CoRR, 2020

Machine Learning Applications in Misuse and Anomaly Detection.
CoRR, 2020

Computer and Network Security.
CoRR, 2020

A Time Series Analysis-Based Stock Price Prediction Using Machine Learning and Deep Learning Models.
CoRR, 2020

Stock Price Prediction Using Convolutional Neural Networks on a Multivariate Timeseries.
CoRR, 2020

2019
A Robust Predictive Model for Stock Price Prediction Using Deep Learning and Natural Language Processing.
CoRR, 2019

2018
Internet of Things: Technology, Applications and Standardardization.
CoRR, 2018

2017
Cloud Computing - Architecture and Applications.
CoRR, 2017

Advances in Security in Computing and Communications.
CoRR, 2017

A Proposed Architecture for Big Data Driven Supply Chain Analytics.
CoRR, 2017

A Framework of Predictive Analysis of Tourist Inflow in the Beaches of West Bengal: A Study of Digha-Mandarmoni Beach.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017

2016
Decomposition of Time Series Data of Stock Markets and its Implications for Prediction: An Application for the Indian Auto Sector.
CoRR, 2016

An Alternative Framework for Time Series Decomposition and Forecasting and its Relevance for Portfolio Choice: A Comparative Study of the Indian Consumer Durable and Small Cap Sectors.
CoRR, 2016

A Framework for Predictive Analysis of Stock Market Indices : A Study of the Indian Auto Sector.
CoRR, 2016

2013
An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks.
Proceedings of the Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, 2013

Secure and user privacy-preserving searching in peer-to-peer networks.
Log. J. IGPL, 2013

Homomorphic Encryption: Theory & Applications
CoRR, 2013

Security and Privacy Issues in Cloud Computing
CoRR, 2013

Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
CoRR, 2013

Security and Privacy Challenges in Cognitive Wireless Sensor Networks
CoRR, 2013

Security and Privacy Issues in Wireless Mesh Networks: A Survey
CoRR, 2013

Security in Wireless Sensor Networks
CoRR, 2013

A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks.
CoRR, 2013

Security and Privacy Issues in Wireless Mesh Networks: A Survey.
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013

2012
A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks.
Int. J. Commun. Networks Inf. Secur., 2012

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
CoRR, 2012

Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks
CoRR, 2012

Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks
CoRR, 2012

A Multi-Path Certification Protocol for Mobile Ad Hoc Networks
CoRR, 2012

2011
Internet of Things: Applications and Challenges in Technology and Standardization.
Wirel. Pers. Commun., 2011

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks
CoRR, 2011

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks
CoRR, 2011

A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks
CoRR, 2011

A Distributed Intrusion Detection System Using Cooperating Agents
CoRR, 2011

Dynamic OFDMA Resource Allocation for QoS Guarantee and System Optimization of Best Effort and Non Real-time Traffic
CoRR, 2011

Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation Algorithm in Dynamic OFDMA Systems
CoRR, 2011

A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers
CoRR, 2011

Secure Routing in Wireless Mesh Networks
CoRR, 2011

Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses
CoRR, 2011

A Novel Mechanism for Detection of Distributed Denial of Service Attacks
CoRR, 2011

An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks
CoRR, 2011

A Robust and Fault-Tolerant Distributed Intrusion Detection System
CoRR, 2011

A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks
CoRR, 2011

An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Technology for Applications, 2011

A Secure Privacy Preserved Data Aggregation Scheme in Non Hierarchical Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Secure and Privacy-Aware Searching in Peer-to-Peer Networks.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

A Robust and Secure Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011

A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks.
Proceedings of the Advances in Computing and Communications, 2011

2010
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks.
Scalable Comput. Pract. Exp., 2010

An Agent-Based Intrusion Detection System for Local Area Networks.
Int. J. Commun. Networks Inf. Secur., 2010

An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network.
Int. J. Adv. Comp. Techn., 2010

A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks
CoRR, 2010

A Secure Aggregation Protocol for Wireless Sensor Networks
CoRR, 2010

Convergence and Next Generation Networks
CoRR, 2010

A Survey on Cross-Layer Design Frameworks for Multimedia Applications over Wireless Networks
CoRR, 2010

An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
CoRR, 2010

Context Aware End-to-End Connectivity Management
CoRR, 2010

A Robust and Efficient Trust Management Scheme for Peer-to-Peer Networks
CoRR, 2010

Mobility and Handoff Management in Wireless Networks
CoRR, 2010

An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
CoRR, 2010

A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
CoRR, 2010

A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

A Secure Routing Protocol for Wireless Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2010

An Efficient and Reliable Routing Protocol for Wireless Mesh Networks.
Proceedings of the Computational Science and Its Applications, 2010

A Throughput Optimizing Routing Protocol for Wireless Mesh Networks.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A QoS-aware end-to-end connectivity management algorithm for mobile applications.
Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, 2010

A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010

A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network.
Proceedings of the Recent Trends in Network Security and Applications, 2010

An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks.
Proceedings of the Second International Conference on Computational Intelligence, 2010

2009
A Survey on Wireless Sensor Network Security.
Int. J. Commun. Networks Inf. Secur., 2009

2008
A distributed intrusion detection system for wireless ad hoc networks.
Proceedings of the 16th International Conference on Networks, 2008

2007
An Efficient Certificate Authority for Ad Hoc Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007

A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007

A Scheme of Certificate Authority for Ad Hoc Networks.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

2005
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System.
Proceedings of the Distributed Computing and Internet Technology, 2005


  Loading...