Samiran Chattopadhyay
Orcid: 0000-0002-8929-9605
According to our database1,
Samiran Chattopadhyay
authored at least 169 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Clust. Comput., November, 2024
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment.
SN Comput. Sci., March, 2024
A cross-layer fragmentation approach to video streaming over mobile ad-hoc network using BATMAN-Adv.
Multim. Tools Appl., March, 2024
Toward design a secure protocol for updating remotely stored credentials of a crypto-biometric framework for multi-server environment.
Secur. Priv., 2024
CoRR, 2024
CoRR, 2024
Coalition Formation for Task Allocation Using Multiple Distance Metrics (Student Abstract).
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Dec-Safe: Dynamic Decision Generation Mechanism for Delivering Safety Services in Vehicular Networks.
IEEE Trans. Veh. Technol., December, 2023
Mobility Management in 5G and Beyond: A Novel Smart Handover With Adaptive Time-to-Trigger and Hysteresis Margin.
IEEE Trans. Mob. Comput., October, 2023
Achieving Energy Efficiency and Impact of SAR in a WBAN Through Optimal Placement of the Relay Node.
Wirel. Pers. Commun., June, 2023
Wirel. Pers. Commun., May, 2023
Scalable Comput. Pract. Exp., April, 2023
ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks.
IEEE Syst. J., March, 2023
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023
Generative AI for Software Metadata: Overview of the Information Retrieval in Software Engineering Track at FIRE 2023.
CoRR, 2023
An Evaluation of Non-Contrastive Self-Supervised Learning for Federated Medical Image Analysis.
CoRR, 2023
Generation of Highlights From Research Papers Using Pointer-Generator Networks and SciBERT Embeddings.
IEEE Access, 2023
A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023
Exploring Self-Supervised Representation Learning for Low-Resource Medical Image Analysis.
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 15th Annual Meeting of the Forum for Information Retrieval Evaluation, 2023
Efficiency of Large Language Models to scale up Ground Truth: Overview of the IRSE Track at Forum for Information Retrieval 2023.
Proceedings of the 15th Annual Meeting of the Forum for Information Retrieval Evaluation, 2023
Generative AI for Software Metadata: Overview of the Information Retrieval in Software Engineering Track at FIRE 2023.
Proceedings of the Working Notes of FIRE 2023, 2023
ExpresSense: Exploring a Standalone Smartphone to Sense Engagement of Users from Facial Expressions Using Acoustic Sensing.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy.
J. Supercomput., 2022
SmartCon: Deep Probabilistic Learning-Based Intelligent Link-Configuration in Narrowband-IoT Toward 5G and B5G.
IEEE Trans. Cogn. Commun. Netw., 2022
A blockchain-based approach to secure electronic health records using fuzzy commitment scheme.
Secur. Priv., 2022
Bifurcating Cognitive Attention from Visual Concentration: Utilizing Cooperative Audiovisual Sensing for Demarcating Inattentive Online Meeting Participants.
Proc. ACM Hum. Comput. Interact., 2022
Reliable routing in Wireless Body Area Network using optimum number of relay nodes for enhancing network lifetime.
J. Ambient Intell. Smart Environ., 2022
Intra WBAN routing using Zipf's law and intelligent transmission power switching approach (ZITA).
J. Ambient Intell. Humaniz. Comput., 2022
DDoS attack resisting authentication protocol for mobile based online social network applications.
J. Inf. Secur. Appl., 2022
A framework for neighbourhood configuration to improve the KNN based imputation algorithms on microarray gene expression data.
Int. J. Bioinform. Res. Appl., 2022
Int. J. Appl. Metaheuristic Comput., 2022
ConvAE-LSTM: Convolutional Autoencoder Long Short-Term Memory Network for Smartphone-Based Human Activity Recognition.
IEEE Access, 2022
A Survey of VANET/V2X Routing From the Perspective of Non-Learning- and Learning-Based Approaches.
IEEE Access, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Improving Performance of High Throughput Wireless Access Networks - An Experience in Learning.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022
Can we predict useful comments in source codes? - Analysis of findings from Information Retrieval in Software Engineering Track @ FIRE 2022.
Proceedings of the 14th Annual Meeting of the Forum for Information Retrieval Evaluation, 2022
Overview of the IRSE track at FIRE 2022: Information Retrieval in Software Engineering.
Proceedings of the Working Notes of FIRE 2022, 2022
Proceedings of the Third Workshop on Scholarly Document Processing, 2022
2021
SN Comput. Sci., 2021
An ensemble machine learning model based on multiple filtering and supervised attribute clustering algorithm for classifying cancer samples.
PeerJ Comput. Sci., 2021
Development of Energy Efficient and Optimized Coverage Area Network Configuration to Achieve Reliable WSN Network Using Meta-Heuristic Approaches.
Int. J. Appl. Metaheuristic Comput., 2021
SmartCon: Deep Probabilistic Learning Based Intelligent Link-Configuration in Narrowband-IoT Towards 5G and B5G.
CoRR, 2021
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT.
Comput. Commun., 2021
An efficient clustering with robust outlier mitigation for Wi-Fi fingerprint based indoor positioning.
Appl. Soft Comput., 2021
Optimization and estimation of reliability indices and cost of Power Distribution System of an urban area by a noble fuzzy-hybrid algorithm.
Appl. Soft Comput., 2021
Identification of Abnormal Movements in Infants: A Deep Neural Network for Body Part-Based Prediction of Cerebral Palsy.
IEEE Access, 2021
Exploratory Analysis of Nose-gesture for Smartphone Aided Typing for Users with Clinical Conditions.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Nosype: A Novel Nose-tip Tracking-based Text Entry System for Smartphone Users with Clinical Disabilities for Touch-based Typing.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021
Proceedings of the 2nd Workshop on Extraction and Evaluation of Knowledge Entities from Scientific Documents (EEKE 2021) co-located with JCDL 2021, 2021
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2021
2020
A Deep Probabilistic Control Machinery for Auto-Configuration of WiFi Link Parameters.
IEEE Trans. Wirel. Commun., 2020
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020
Gestatten: Estimation of User's Attention in Mobile MOOCs From Eye Gaze and Gaze Gesture Tracking.
Proc. ACM Hum. Comput. Interact., 2020
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020
Performance analysis of an efficient object-based schema oriented data storage system handling health data.
Innov. Syst. Softw. Eng., 2020
An online learning approach for auto link-Configuration in IEEE 802.11ac wireless networks.
Comput. Networks, 2020
Novel AP association and fair channel access in high throughput WLAN for energy efficiency.
Ad Hoc Networks, 2020
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications.
IEEE Access, 2020
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020
Segmenting Scientific Abstracts into Discourse Categories: A Deep Learning-Based Approach for Sparse Labeled Data.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020
SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11ac.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks.
Proceedings of the Advanced Computing and Systems for Security, 2020
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020
2019
Wirel. Pers. Commun., 2019
IEEE Trans. Wirel. Commun., 2019
Steady-State Analysis of Buffer Occupancy for Different Forwarding Strategies in Mobile Opportunistic Network.
IEEE Trans. Veh. Technol., 2019
Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019
Minimization of reliability indices and cost of power distribution systems in urban areas using an efficient hybrid meta-heuristic algorithm.
Soft Comput., 2019
Scientometrics, 2019
Innov. Syst. Softw. Eng., 2019
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019
Int. J. Ambient Comput. Intell., 2019
A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme.
IEEE Access, 2019
Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019
2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018
A scattering and repulsive swarm intelligence algorithm for solving global optimization problems.
Knowl. Based Syst., 2018
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018
Int. J. Electron. Gov. Res., 2018
On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud.
Int. J. Cloud Appl. Comput., 2018
An efficient fine-grained access control scheme for hierarchical wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018
IEEE Access, 2018
Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018
Proceedings of the Maturity and Innovation in Digital Libraries, 2018
A learning-based dynamic clustering for coordinated multi-point (CoMP) operation with carrier aggregation in LTE-advanced.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
Proceedings of the International Conference on Information Technology, 2018
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018
2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
Two Phased Routing Protocol Incorporating Distributed Genetic Algorithm and Gradient Based Heuristic in Clustered WSN.
Wirel. Pers. Commun., 2017
A cost-efficient one time password-based authentication in cloud environment using equal length cellular automata.
J. Ind. Inf. Integr., 2017
Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements over Transport/Application Layer Protocols - A Survey.
CoRR, 2017
Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements on Transport and Application Protocols - A Survey.
IEEE Commun. Surv. Tutorials, 2017
A Survey of Topology-Transparent Scheduling Schemes in Multi-Hop Packet Radio Networks.
IEEE Commun. Surv. Tutorials, 2017
SmartLA: Reinforcement learning-based link adaptation for high throughput wireless access networks.
Comput. Commun., 2017
A lightweight QRS detector for single lead ECG signals using a max-min difference algorithm.
Comput. Methods Programs Biomed., 2017
Comput. Electr. Eng., 2017
On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017
On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017
Proceedings of the 11th International Conference on Software, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Supporting Throughput Fairness in IEEE 802.11ac Dynamic Bandwidth Channel Access: A Hybrid Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
A Novel Intelligent Modeling of Storage and Bandwidth Constraints in Distributed Storage Allocation.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
2016
J. Comput. Networks Commun., 2016
A novel distance-based iterative sequential KNN algorithm for estimation of missing values in microarray gene expression data.
Int. J. Bioinform. Res. Appl., 2016
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016
Channel Access Fairness in IEEE 802.11ac: A Retrospective Analysis and Protocol Enhancement.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 12th International Conference on Natural Computation, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
CrowdAP: Crowdsourcing driven AP coordination for improving energy efficiency in wireless access networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
A biometrics-based robust and secure user authentication protocol for e-healthcare service.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Performance modeling and analysis of high throughput wireless media access with QoS in noisy channel for different traffic conditions.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016
2015
An Analysis of Equal Length Cellular Automata (ELCA) Generating Linear Rules for Applications in Distributed Computing.
J. Cell. Autom., 2015
Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model.
Int. J. Distributed Sens. Networks, 2015
Int. J. Biom., 2015
EURASIP J. Inf. Secur., 2015
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015
2014
An efficient GA-PSO approach for solving mixed-integer nonlinear programming problem in reliability optimization.
Swarm Evol. Comput., 2014
IET Wirel. Sens. Syst., 2014
Understanding the Mechanics of Some Localized Protocols by Theory of Complex Networks.
CoRR, 2014
Proceedings of the Security in Computing and Communications, 2014
An approach to cryptographic key distribution through fingerprint based key distribution center.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity.
Proceedings of the 2014 International Conference on Information Technology, 2014
2013
Telecommun. Syst., 2013
A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems.
J. Netw. Syst. Manag., 2013
CoRR, 2013
A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2013
A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
2012
Proceedings of the Computer Information Systems and Industrial Management, 2012
Effectiveness of Different Partition Based Clustering Algorithms for Estimation of Missing Values in Microarray Gene Expression Data.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks.
J. Comput. Networks Commun., 2011
2010
Int. J. Distributed Sens. Networks, 2010
Int. J. Ad Hoc Ubiquitous Comput., 2010
Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks
CoRR, 2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
2008
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008
Energy-Efficient Broadcasting in Wireless Ad Hoc Networks Using Directional Antennas.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008
Game-Theoretic Modeling and Optimization of Contention-Prone Medium Access Phase in IEEE 802.16/WiMAX Networks.
Proceedings of the 2008 Third International Conference on Broadband Communications, 2008
2007
Energy-Aware Virtual Backbone Tree for Efficient Routing in Wireless Sensor Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007
2005
A Novel Approach for an Extendible Middleware Satisfying Adaptability & Interoperability Needs of Multimedia Applications in Mobile Environments.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005
2004
A Wrapper-based Object Caching in CORBA.
Proceedings of the 2nd International Conference Computing, 2004
An Approach Towards a Wrapper-based Architecture for Mapping COM Servers in MOF Framework.
Proceedings of the 2nd International Conference Computing, 2004
2002
Proceedings of the Distributed Computing, 2002
1994
1992
Estimation of the original length of a straight line segment from its digitization in three dimensions.
Pattern Recognit., 1992
CVGIP Graph. Model. Image Process., 1992
1991
Pattern Recognit. Lett., 1991
1990