Shamik Sural
Orcid: 0000-0002-4315-7329Affiliations:
- Indian Institute of Technology Kharagpur, India
According to our database1,
Shamik Sural
authored at least 229 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., April, 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
IEEE Trans. Emerg. Top. Comput., 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Poster: APETEEt - Secure Enforcement of ABAC Policies using Trusted Execution Environment.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Cross-chain Transfer of Snapshot Archives for Low-overhead Peer Management in Web 3.0.
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the IEEE International Conference on Digital Health, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Ontology-based Evaluation of ABAC Policies for Inter-Organizational Resource Sharing.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Trusted Sharing of Autonomous Vehicle Crash Data using Enterprise Blockchain and IPFS.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
A Graph Theoretic Approach for Multi-Objective Budget Constrained Capsule Wardrobe Recommendation.
ACM Trans. Inf. Syst., 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the IEEE International Conference on Services Computing, 2022
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022
2021
An Integrated Approach for Improving Brand Consistency of Web Content: Modeling, Analysis, and Recommendation.
ACM Trans. Web, 2021
ACM Trans. Manag. Inf. Syst., 2021
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Towards Efficient Evaluation of ABAC Policies using High-Dimensional Indexing Techniques.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the Blockchain - ICBC 2021, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
ACM Trans. Intell. Syst. Technol., 2020
Soc. Netw. Anal. Min., 2020
Tabular Structure Detection from Document Images for Resource Constrained Devices Using A Row Based Similarity Measure.
CoRR, 2020
2019
ACM Trans. Internet Techn., 2019
IEEE Trans. Comput. Soc. Syst., 2019
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the 11th ACM Conference on Web Science, 2019
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018
Efficient computation of cross-sections from human brain model by geometric processing.
J. Real Time Image Process., 2018
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Proceedings of the IEEE International Conference on Data Mining, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the Heritage Preservation - A Computational Approach, 2018
2017
ACM Trans. Manag. Inf. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images.
Proceedings of the 1st International Workshop on Open Services and Tools for Document Analysis, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Optimal Rule Mining for Dynamic Authorization Management in Collaborating Clouds Using Attribute-Based Access Control.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Int. J. Document Anal. Recognit., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Authorization Management in Multi-cloud Collaboration Using Attribute-Based Access Control.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016
SPODS: A Dataset of Color-Official Documents and Detection of Logo, Stamp, and Signature.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
ACM Trans. Manag. Inf. Syst., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Information fusion from multiple cameras for gait-based re-identification and recognition.
IET Image Process., 2015
IET Comput. Vis., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 2015 Fifth National Conference on Computer Vision, 2015
Proceedings of the 2015 Fifth National Conference on Computer Vision, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Text-graphics separation to detect logo and stamp from color document images: A spectral approach.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Video analysis of Hammersmith lateral tilting examination using Kalman filter guided multi-path tracking.
Medical Biol. Eng. Comput., 2014
J. Vis. Commun. Image Represent., 2014
User Friendly Implementation for Efficiently Conducting Hammersmith Infant Neurological Examination.
CoRR, 2014
Comput. Secur., 2014
Proceedings of the 2014 Indian Conference on Computer Vision, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Computer Vision - ECCV 2014 Workshops, 2014
2013
Two-stage database intrusion detection by combining multiple evidence and belief update.
Inf. Syst. Frontiers, 2013
Int. J. Pattern Recognit. Artif. Intell., 2013
Towards using covariance matrix pyramids as salient point descriptors in 3D point clouds.
Neurocomputing, 2013
Comput. Secur., 2013
Proceedings of the Pattern Recognition and Machine Intelligence, 2013
Proceedings of the Pattern Recognition and Machine Intelligence, 2013
Removal of hand-drawn annotation lines from document images by digital-geometric analysis and inpainting.
Proceedings of the Fourth National Conference on Computer Vision, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 4th International Workshop on Multilingual OCR, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
A hierarchical method combining gait and phase of motion with spatiotemporal model for person re-identification.
Pattern Recognit. Lett., 2012
Evaluation of segmentation techniques using region area and boundary matching information.
J. Vis. Commun. Image Represent., 2012
A Robust Method for Ventriculomegaly Detection from Neonatal Brain Ultrasound Images.
J. Medical Syst., 2012
Analysis of adductors angle measurement in Hammersmith infant neurological examinations using mean shift segmentation and feature point based object tracking.
Comput. Biol. Medicine, 2012
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Minimum user requirement in Role Based Access Control with Separation of Duty constraints.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012
Detection and removal of hand-drawn underlines in a document image using approximate digital straightness.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
Signal Process. Image Commun., 2011
Signal Image Video Process., 2011
Int. J. E Health Medical Commun., 2011
Comput. Secur., 2011
Proceedings of the Pattern Recognition and Machine Intelligence, 2011
Automatic Adductors Angle Measurement for Neurological Assessment of Post-neonatal Infants during Follow Up.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011
A hierarchical approach for content-based echocardiogram video indexing and retrieval.
Proceedings of the 2011 International Conference on Communication, 2011
2010
A column dependency-based approach for static and dynamic recovery of databases from malicious transactions.
Int. J. Inf. Sec., 2010
Int. J. Comput. Intell. Appl., 2010
Tracking of Facial Feature Points by Combining Singular Tracking Results with a 3D Active Shape Model.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the International Conference on Image Processing, 2010
2009
IEEE Trans. Dependable Secur. Comput., 2009
Trans. Comput. Sci., 2009
IEEE Trans. Consumer Electron., 2009
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Inf. Fusion, 2009
Int. J. Data Min. Model. Manag., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Pattern Recognition and Machine Intelligence, 2009
Proceedings of the First International Conference on Networks and Communications, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009
Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
2008
IEEE Trans. Multim., 2008
IEEE Trans. Inf. Technol. Biomed., 2008
IEEE Trans. Dependable Secur. Comput., 2008
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008
Signal Process. Image Commun., 2008
Pattern Recognit. Lett., 2008
J. Vis. Commun. Image Represent., 2008
Int. J. Inf. Comput. Secur., 2008
Int. J. Artif. Intell. Soft Comput., 2008
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy.
Proceedings of the Trust, 2008
Security analysis and implementation of web-based telemedicine services with a four-tier architecture.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Bottom-Up Construction of Bluetooth Topology under a Traffic-Aware Scheduling Scheme.
IEEE Trans. Mob. Comput., 2007
IEEE Trans. Consumer Electron., 2007
Pattern Recognit. Lett., 2007
Int. J. Inf. Secur. Priv., 2007
Int. J. Ad Hoc Ubiquitous Comput., 2007
Proceedings of the Pattern Recognition and Machine Intelligence, 2007
Proceedings of the Pattern Recognition and Machine Intelligence, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the 2007 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), 2007
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
A Wide-Band Lumped Element Compact CAD Model of Si-Based Planar Spiral Inductor for RFIC Design.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006
Proceedings of the Computer Vision, Graphics and Image Processing, 5th Indian Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Computer Vision, 2006
Proceedings of the Computer Vision, 2006
2005
Eur. Trans. Telecommun., 2005
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005
Proceedings of the Pattern Recognition and Machine Intelligence, 2005
Proceedings of the Pattern Recognition and Machine Intelligence, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
A simple wide-band compact model and parameter extraction using particle swarm optimization of on-chip spiral inductors for silicon RFICs.
Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, 2005
Human color perception in the HSV space and its application in histogram generation for image retrieval.
Proceedings of the Color Imaging X: Processing, Hardcopy, and Applications, San Jose, 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
A Color-texture Histogram from the HSV Color Space for Video Shot Detection.
Proceedings of the ICVGIP 2004, 2004
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004
Segmentation Using Saturation Thresholding and Its Application in Content-Based Retrieval of Images.
Proceedings of the Image Analysis and Recognition: International Conference, 2004
Proceedings of the High Performance Computing, 2004
2002
A Histogramm with Perceptually Smooth Color Transition for Image Retrieval.
Proceedings of the 6th Joint Conference on Information Science, 2002
Proceedings of the 2002 International Conference on Image Processing, 2002
Proceedings of the 2002 International Conference on Image Processing, 2002
2001
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001
1999
An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition.
Pattern Recognit. Lett., 1999
Fuzzy Sets Syst., 1999
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999
A Two-step Algorithm and its Parallelization for the Generation of Minimum Containing Rectangles for Document Image Segmentation.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999
1997
Proceedings of the Fourth International on High-Performance Computing, 1997
1994
Proceedings of the Seventh International Conference on VLSI Design, 1994