Pinaki Mitra

Orcid: 0000-0002-8254-8234

According to our database1, Pinaki Mitra authored at least 45 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-contextual design of convolutional neural network for steganalysis.
Multim. Tools Appl., September, 2024

Information Security and Privacy in the Digital World: Some Selected Topics.
CoRR, 2024

2023
A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher.
CoRR, 2023

A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling.
IEEE Access, 2023

2022
StegGAN: hiding image within image using conditional generative adversarial networks.
Multim. Tools Appl., 2022

Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks.
IEEE Access, 2022

2021
Steganalysis of Digital Images Using Deep Fractal Network.
IEEE Trans. Comput. Soc. Syst., 2021

KAGO: an approximate adaptive grid-based outlier detection approach using kernel density estimate.
Pattern Anal. Appl., 2021

Steganalysis using learned denoising kernels.
Multim. Tools Appl., 2021

iMass: an approximate adaptive clustering algorithm for dynamic data using probability based dissimilarity.
Frontiers Comput. Sci., 2021

A survey of density based clustering algorithms.
Frontiers Comput. Sci., 2021

Content Delivery Networks: State of the Art, Trends, and Future Roadmap.
ACM Comput. Surv., 2021

A comparison of different metaheuristics for the quadratic assignment problem in accelerated systems.
Appl. Soft Comput., 2021

DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing.
Proceedings of the IEEE Region 10 Conference, 2021

2020
BISDBx: towards batch-incremental clustering for dynamic datasets using SNN-DBSCAN.
Pattern Anal. Appl., 2020

Steganalysis for clustering modification directions steganography.
Multim. Tools Appl., 2020

{The application of σ-LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers.
CoRR, 2020

Solving Quadratic Assignment Problem Using Crow Search Algorithm in Accelerated Systems.
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020

ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Energy efficient heuristic application mapping for 2-D mesh-based network-on-chip.
Microprocess. Microsystems, 2019

A New Steganalysis Method Using Densely Connected ConvNets.
Proceedings of the Pattern Recognition and Machine Intelligence, 2019

2016
Short circuit capacity estimation for HVDC control application.
Proceedings of the Power Systems Computation Conference, 2016

2013
Just In Time Indexing.
CoRR, 2013

Application Behavior Enforcement Based On Network Characteristics.
CoRR, 2013

Privatizing user credential information of Web services in a shared user environment.
CoRR, 2013

System and Methods for Converting Speech to SQL.
CoRR, 2013

2012
Dynamic performance study of a HVDC grid using real-time digital simulator.
Proceedings of the Complexity in Engineering, 2012

2011
SmartPark as a Virtual STATCOM.
IEEE Trans. Smart Grid, 2011

2010
Generation of Targeted Advertisements for Online Social Networks.
Int. J. Web Appl., 2010

Intelligent Coordinated Control of a Wind Farm and Distributed Smartparks.
Proceedings of the Annual Meeting of the IEEE Industry Applications Society, 2010

2009
Comparison of a spiking neural network and an MLP for robust identification of generator dynamics in a multimachine power system.
Neural Networks, 2009

Online identification of generator dynamics in a multimachine power system with a spiking neural network.
Proceedings of the International Joint Conference on Neural Networks, 2009

Implementation of an Intelligent Reconfiguration Algorithm for an Electric Ship Power System.
Proceedings of the Annual Meeting of the IEEE Industry Applications Society, 2009

2008
Empirical study of a hybrid algorithm based on Clonal Selection and Small Population Based PSO.
Proceedings of the 2008 IEEE Swarm Intelligence Symposium, 2008

Real Time Implementation of an Artificial Immune System Based Controller for a DSTATCOM in an Electric Ship Power System.
Proceedings of the Industry Applications Society Annual Meeting, 2008

DSP-Based PSO Implementation for Online Optimization of Power System Stabilizers.
Proceedings of the NASA/ESA Conference on Adaptive Hardware and Systems, 2008

2006
Efficient Algorithm for the Extraction of Association Rules in Data Mining.
Proceedings of the Computational Science and Its Applications, 2006

Upper Bound on Dilation of Triangulations of Cyclic Polygons.
Proceedings of the Computational Science and Its Applications, 2006

2003
Computing a Closest Point to a Query Hyperplane in Three and Higher Dimensions.
Proceedings of the Computational Science and Its Applications, 2003

Computing the Closest Point to a Circle.
Proceedings of the 15th Canadian Conference on Computational Geometry, 2003

1998
Efficient Computation of Rectilinear Geodesic Voronoi Neighbor in the Presence of Obstacles.
J. Algorithms, 1998

1994
Orthogonal shortest route queries among axis parallel rectangular obstacles.
Int. J. Comput. Geom. Appl., 1994

1993
Efficient Approximate Shortest-Path Queries Among Isothetic Rectangular Obstacles.
Proceedings of the Algorithms and Data Structures, Third Workshop, 1993

1992
Answering Gabriel neighbour queries.
Pattern Recognit. Lett., 1992

Efficient Parallel Shortest Path Algorithms for K-Chordal Graphs.
Proceedings of the 6th International Parallel Processing Symposium, 1992


  Loading...