Samrat Mondal
Orcid: 0000-0002-2159-3410
According to our database1,
Samrat Mondal
authored at least 91 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Charging Station Siting and Sizing Considering Uncertainty in Electric Vehicle Charging Demand Distribution.
IEEE Trans. Intell. Transp. Syst., September, 2024
Intelligent Real-Time Utilization of Hybrid Energy Resources for Cost Optimization in Smart Microgrids.
IEEE Syst. J., March, 2024
Subdomain adaptation via correlation alignment with entropy minimization for unsupervised domain adaptation.
Pattern Anal. Appl., March, 2024
A Multi-stage framework for COVID-19 detection and severity assessment from chest radiography images using advanced fuzzy ensemble technique.
Expert Syst. Appl., March, 2024
Contextual attribute-based access control scheme for cloud storage using blockchain technology.
Softw. Pract. Exp., 2024
Kernelized Bures metric: A framework for effective domain adaptation in sensor data analysis.
Expert Syst. Appl., 2024
CoRR, 2024
A Systematic Survey of Prompt Engineering in Large Language Models: Techniques and Applications.
CoRR, 2024
FedMRL: Data Heterogeneity Aware Federated Multi-agent Deep Reinforcement Learning for Medical Imaging.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024
Enhancing Adverse Drug Event Detection with Multimodal Dataset: Corpus Creation and Model Development.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Int. J. Inf. Sec., October, 2023
A Multi-Objective Optimization Framework for Electric Vehicle Charge Scheduling With Adaptable Charging Ports.
IEEE Trans. Veh. Technol., May, 2023
J. Vis. Commun. Image Represent., 2023
ACM Comput. Surv., 2023
Enhancing Computer-Aided Cervical Cancer Detection Using a Novel Fuzzy Rank-Based Fusion.
IEEE Access, 2023
RDAOT: Robust Unsupervised Deep Sub-Domain Adaptation Through Optimal Transport for Image Classification.
IEEE Access, 2023
A Federated Multi-stage Light-Weight Vision Transformer for Respiratory Disease Detection.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
An Automated Policy Verification and Enforcement Framework for Ethereum Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
2022
Exploiting Higher Order Multi-dimensional Relationships with Self-attention for Author Name Disambiguation.
ACM Trans. Knowl. Discov. Data, 2022
Optimal Sizing and Efficient Routing of Electric Vehicles for a Vehicle-on-Demand System.
IEEE Trans. Ind. Informatics, 2022
Towards achieving efficient access control of medical data with both forward and backward secrecy.
Comput. Commun., 2022
SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0.
Comput. Electr. Eng., 2022
Computer-Aided COVID-19 Screening from Chest CT-Scan using a Fuzzy Ensemble-based Technique.
Proceedings of the International Joint Conference on Neural Networks, 2022
COVID-19 Detection from Lung Ultrasound Images using a Fuzzy Ensemble-based Transfer Learning Technique.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Vision Transformer-Based Federated Learning for COVID-19 Detection Using Chest X-Ray.
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics, 2022
2021
Scientometrics, 2021
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries.
Frontiers Comput. Sci., 2021
2020
J. Assoc. Inf. Sci. Technol., 2020
Routing of Delivery Trucks in a Battery Swapping System with Partial Delivery Option.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
A Fast and Efficient Way to Obtain the Optimal Number of Ports in Electric Vehicle Charging Stations.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
2019
Swarm Evol. Comput., 2019
Swarm Evol. Comput., 2019
Multiobjective Optimal Scheduling Framework for HVAC Devices in Energy-Efficient Buildings.
IEEE Syst. J., 2019
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services.
IET Inf. Secur., 2019
Expert Syst. Appl., 2019
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services.
Comput. Secur., 2019
IEEE Access, 2019
Intelligent Scheduling of Smart Appliances in Energy Efficient Buildings: A Practical Approach.
Proceedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems, 2019
A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database.
Proceedings of the TENCON 2019, 2019
Coordinated Scheduling of Residential Appliances and Heterogeneous Energy Sources in a Smart Microgrid.
Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, 2019
2018
Efficient Scheduling of Nonpreemptive Appliances for Peak Load Optimization in Smart Grid.
IEEE Trans. Ind. Informatics, 2018
Swarm Evol. Comput., 2018
Towards Obtaining Upper Bound on Sensitivity Computation Process for Cluster Validity Measures.
Fundam. Informaticae, 2018
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones.
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
An Approach to Obtain the Upper Bound on the Number of Non-dominated Fronts in a Population.
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Towards optimal scheduling of thermal comfortability and smoothening of load profile in energy efficient buildings: work-in-progress.
Proceedings of the International Conference on Embedded Software, 2018
Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
2017
Intelligent Scheduling of Thermostatic Devices for Efficient Energy Management in Smart Grid.
IEEE Trans. Ind. Informatics, 2017
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness.
CoRR, 2017
On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms.
CoRR, 2017
Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit.
CoRR, 2017
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations.
Comput. Secur., 2017
Appl. Soft Comput., 2017
GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases.
Appl. Intell., 2017
Unsupervised method to ensemble results of multiple clustering solutions for bibliographic data.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017
2016
Sensitivity - An Important Facet of Cluster Validation Process for Entity Matching Technique.
Trans. Large Scale Data Knowl. Centered Syst., 2016
A multiobjective optimization based entity matching technique for bibliographic databases.
Expert Syst. Appl., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack.
Proceedings of the Intelligent Human Computer Interaction - 8th International Conference, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Proceedings of the IEEE Congress on Evolutionary Computation, 2016
Proceedings of the 16th IEEE International Conference on Bioinformatics and Bioengineering, 2016
2015
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack.
Int. J. Trust. Manag. Comput. Commun., 2015
CoRR, 2015
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability.
CoRR, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
2014
Int. J. Trust. Manag. Comput. Commun., 2014
Proceedings of the Security in Computing and Communications, 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack.
Proceedings of the Information Systems Security - 10th International Conference, 2014
2013
Proceedings of the Database and Expert Systems Applications, 2013
2011
Comput. Secur., 2011
2009
Trans. Comput. Sci., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the First International Conference on Networks and Communications, 2009
2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008