Sanjeev Sofat

According to our database1, Sanjeev Sofat authored at least 48 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Large-Scale Debris Cover Glacier Mapping Using Multisource Object-Based Image Analysis Approach.
Remote. Sens., 2022

Hybrid framework for identifying partial latent fingerprints using minutiae points and pores.
Multim. Tools Appl., 2022

Automated measurement of sulcus angle on axial knee magnetic resonance images.
Int. J. Imaging Syst. Technol., 2022

Automated Sulcus Depth Measurement on Axial Knee MR Images.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

2021
Privacy Preservation in Cloud Computing Using Randomized Encoding.
Wirel. Pers. Commun., 2021

Optimised K-anonymisation technique to deal with mutual friends and degree attacks.
Int. J. Inf. Comput. Secur., 2021

A hybrid approach for preserving privacy for real estate data.
Int. J. Inf. Comput. Secur., 2021

Review of automated segmentation approaches for knee images.
IET Image Process., 2021

2020
A Novel Ensemble Method for PTB Classification in CXRs.
Wirel. Pers. Commun., 2020

2019
Automated TB classification using ensemble of deep architectures.
Multim. Tools Appl., 2019

Malware intelligence: beyond malware analysis.
Int. J. Adv. Intell. Paradigms, 2019

An Analytical Model for Identifying Suspected Users on Twitter.
Cybern. Syst., 2019

2018
LF-SegNet: A Fully Convolutional Encoder-Decoder Network for Segmenting Lung Fields from Chest Radiographs.
Wirel. Pers. Commun., 2018

An Efficient Variant of Fully-Convolutional Network for Segmenting Lung Fields from Chest Radiographs.
Wirel. Pers. Commun., 2018

Real-time chaff generation for a biometric fuzzy vault.
Turkish J. Electr. Eng. Comput. Sci., 2018

What about Privacy of My OSN Data?
Cybern. Syst., 2018

Who is Who on Twitter-Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time.
Cybern. Syst., 2018

BotScoop: Scalable Detection of DGA Based Botnets Using DNS Traffic.
Proceedings of the 9th International Conference on Computing, 2018

2017
A Framework for Generating Malware Threat Intelligence.
Scalable Comput. Pract. Exp., 2017

Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing.
Pervasive Mob. Comput., 2017

A smartphone based technique to monitor driving behavior using DTW and crowdsensing.
Pervasive Mob. Comput., 2017

Lung field segmentation in chest radiographs: a historical review, current status, and expectations from deep learning.
IET Image Process., 2017

Neoteric chaff generation method of fingerprint fuzzy vault.
Turkish J. Electr. Eng. Comput. Sci., 2017

Malware Threat Assessment Using Fuzzy Logic Paradigm.
Cybern. Syst., 2017

Deep-learning: A potential method for tuberculosis detection using chest radiography.
Proceedings of the 2017 IEEE International Conference on Signal and Image Processing Applications, 2017

2016
Behavioral analysis and classification of spammers distributing pornographic content in social media.
Soc. Netw. Anal. Min., 2016

Tools & Techniques for Malware Analysis and Classification.
Int. J. Next Gener. Comput., 2016

Preventing Identity Disclosure in Social Networks Using Intersected Node.
Int. J. Inf. Secur. Priv., 2016

Followers or Fradulents? An Analysis and Classification of Twitter Followers Market Merchants.
Cybern. Syst., 2016

Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack.
Proceedings of the Sixth International Symposium on Embedded Computing and System Design, 2016

Zero-day malware detection.
Proceedings of the Sixth International Symposium on Embedded Computing and System Design, 2016

A Novel Approach to Evade Attacks in Online Social Networks.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A Novel Technique to Characterize Social Network Users: Comparative Study.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

2015
Data collection model for energy-efficient wireless sensor networks.
Ann. des Télécommunications, 2015

Fingerprint fuzzy vault using hadamard transformation.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Detecting Malicious Users in Twitter using Classifiers.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

An Approach of Privacy Preserving based Publishing in Twitter.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Classification of PE Files using Static Analysis.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Integrated Framework for Classification of Malwares.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
An Ant Voronoi Based Clustering Approach for Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks - 5th International ICST Conference, 2013

2012
A Statistical Operator for Detecting Weak Edges in Low Contrast Images.
Proceedings of the Image Analysis and Recognition - 9th International Conference, 2012

An Efficient Scheme for Color Edge Detection in Uniform Color Space.
Proceedings of the Autonomous and Intelligent Systems - Third International Conference, 2012

Detection of Edges in Color Images: A Review and Evaluative Comparison of State-of-the-Art Techniques.
Proceedings of the Autonomous and Intelligent Systems - Third International Conference, 2012

2010
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment.
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, 2010

2009
Web hypermedia content management system effort estimation model.
ACM SIGSOFT Softw. Eng. Notes, 2009

2008
Detecting camera movements & production effects in digital videos.
Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, 2008

Content Management System Effort Estimation Using Bagging Predictors.
Proceedings of the Technological Developments in Education and Automation, 2008


  Loading...