Shamik Sural

Orcid: 0000-0002-4315-7329

Affiliations:
  • Indian Institute of Technology Kharagpur, India


According to our database1, Shamik Sural authored at least 229 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Progress Tracking and Responding to Online Public Shaming Events on Twitter.
IEEE Trans. Comput. Soc. Syst., April, 2024

Efficiently Supporting Attribute-Based Access Control in Linux.
IEEE Trans. Dependable Secur. Comput., 2024

Heterogeneous Graph Generation: A Hierarchical Approach using Node Feature Pooling.
CoRR, 2024

Ciphertext Policy Attribute Based Encryption with Intel SGX.
CoRR, 2024

Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Unlocking Efficiency: Adaptive Masking for Gene Transformer Models.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

A Graph-Based Framework for ABAC Policy Enforcement and Analysis.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

Towards Accurate and Stronger Local Differential Privacy for Federated Learning with Staircase Randomized Response.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2023
Enabling Attribute-Based Access Control in NoSQL Databases.
IEEE Trans. Emerg. Top. Comput., 2023

Guest editors' introduction.
J. Comput. Secur., 2023

Efficiently Supporting Attribute-Based Access Control in Relational Databases.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Poster: APETEEt - Secure Enforcement of ABAC Policies using Trusted Execution Environment.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Cross-chain Transfer of Snapshot Archives for Low-overhead Peer Management in Web 3.0.
Proceedings of the IEEE International Conference on Web Services, 2023

Interpretable Clinical Trial Search using Pubmed Citation Network.
Proceedings of the IEEE International Conference on Digital Health, 2023

Tool/Dataset Paper: Realistic ABAC Data Generation using Conditional Tabular GAN.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Ontology-based Evaluation of ABAC Policies for Inter-Organizational Resource Sharing.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

RanSAM: Randomized Search for ABAC Policy Mining.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Trusted Sharing of Autonomous Vehicle Crash Data using Enterprise Blockchain and IPFS.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
A Graph Theoretic Approach for Multi-Objective Budget Constrained Capsule Wardrobe Recommendation.
ACM Trans. Inf. Syst., 2022

Efficient Blockchain Enabled Attribute-based Access Control as a Service.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Adversarially Robust Deepfake Video Detection.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Contemporaneous Update and Enforcement of ABAC Policies.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Poster: ASQL - Attribute Based Access Control Extension for SQL.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Identifying Channel Related Vulnerabilities in Zephyr Firmware.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Credit-based Peer-to-Peer Ride Sharing using Smart Contracts.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Securing Smart Home IoT Systems with Attribute-Based Access Control.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

Mitigating Frontrunning Attacks in Ethereum.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Decentralized Authorization using Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2022

Enabling Attribute-Based Access Control in Linux Kernel.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

BELDaaS: Blockchain Enabled Lucky Draw as a Service.
Proceedings of the IEEE International Conference on Services Computing, 2022

Data Leakage Free ABAC Policy Construction in Multi-Cloud Collaboration.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
An Integrated Approach for Improving Brand Consistency of Web Content: Modeling, Analysis, and Recommendation.
ACM Trans. Web, 2021

Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.
ACM Trans. Manag. Inf. Syst., 2021

Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021

Towards Efficient Evaluation of ABAC Policies using High-Dimensional Indexing Techniques.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Decentralized Authorization in Web Services Using Public Blockchain.
Proceedings of the Blockchain - ICBC 2021, 2021

Attribute-Based Access Control for NoSQL Databases.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Incremental Maintenance of ABAC Policies.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Knowledge-Aware Neural Networks for Medical Forum Question Classification.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
BOXREC: Recommending a Box of Preferred Outfits in Online Shopping.
ACM Trans. Intell. Syst. Technol., 2020

Influence modeling of opinion switching by Twitter users in public shaming events.
Soc. Netw. Anal. Min., 2020

Tabular Structure Detection from Document Images for Resource Constrained Devices Using A Row Based Similarity Measure.
CoRR, 2020

2019
Policy Adaptation in Hierarchical Attribute-based Access Control Systems.
ACM Trans. Internet Techn., 2019

Online Public Shaming on Twitter: Detection, Analysis, and Mitigation.
IEEE Trans. Comput. Soc. Syst., 2019

Deploying ABAC policies using RBAC systems.
J. Comput. Secur., 2019

Security analysis of ABAC under an administrative model.
IET Inf. Secur., 2019

Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019

Concept to Code: Deep Learning for Fashion Recommendation.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Understanding Brand Consistency from Web Content.
Proceedings of the 11th ACM Conference on Web Science, 2019

Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019

Security Analysis of Unified Access Control Policies.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

VisMAP: Visual Mining of Attribute-Based Access Control Policies.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Policy Reconciliation and Migration in Attribute Based Access Control.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Towards an Aspect-Based Ranking Model for Clinical Trial Search.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

Personalised Fashion Recommendation using Deep Learning.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Editorial.
IEEE Trans. Serv. Comput., 2018

Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient computation of cross-sections from human brain model by geometric processing.
J. Real Time Image Process., 2018

Towards designing robust CAPTCHAs.
J. Comput. Secur., 2018

A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018

Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

One for the Road: Recommending Male Street Attire.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Predicted Edit Distance Based Clustering of Gene Sequences.
Proceedings of the IEEE International Conference on Data Mining, 2018

Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

Ontology-Driven Content-Based Retrieval of Heritage Images.
Proceedings of the Heritage Preservation - A Computational Approach, 2018

2017
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Manag. Inf. Syst., 2017

Migrating from RBAC to temporal RBAC.
IET Inf. Secur., 2017

Attribute-based access control management for multicloud collaboration.
Concurr. Comput. Pract. Exp., 2017

EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

RESTRAC: REference Sequence Based Space TRAnsformation for Clustering.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images.
Proceedings of the 1st International Workshop on Open Services and Tools for Document Analysis, 2017

Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Optimal Rule Mining for Dynamic Authorization Management in Collaborating Clouds Using Attribute-Based Access Control.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Consensus-based clustering for document image segmentation.
Int. J. Document Anal. Recognit., 2016

A Survey of Role Mining.
ACM Comput. Surv., 2016

Mining temporal roles using many-valued concepts.
Comput. Secur., 2016

Look Before You Shame: A Study on Shaming Activities on Twitter.
Proceedings of the 25th International Conference on World Wide Web, 2016

Authorization Management in Multi-cloud Collaboration Using Attribute-Based Access Control.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Text and Non-text Separation in Scanned Color-Official Documents.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

SPODS: A Dataset of Color-Official Documents and Detection of Logo, Stamp, and Signature.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

Anveshak - A Groundtruth Generation Tool for Foreground Regions of Document Images.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Removal of Gray Rubber Stamps.
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Manag. Inf. Syst., 2015

Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Secur. Comput., 2015

Frontal gait recognition from occluded scenes.
Pattern Recognit. Lett., 2015

The generalized temporal role mining problem.
J. Comput. Secur., 2015

Information fusion from multiple cameras for gait-based re-identification and recognition.
IET Image Process., 2015

Modelling, synthesis and characterisation of occlusion in videos.
IET Comput. Vis., 2015

Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015

A spectral filtering based deep learning for detection of logo and stamp.
Proceedings of the 2015 Fifth National Conference on Computer Vision, 2015

Stamp and logo detection from document images by finding outliers.
Proceedings of the 2015 Fifth National Conference on Computer Vision, 2015

Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Text-graphics separation to detect logo and stamp from color document images: A spectral approach.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015

Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera.
IEEE Trans. Inf. Forensics Secur., 2014

Video analysis of Hammersmith lateral tilting examination using Kalman filter guided multi-path tracking.
Medical Biol. Eng. Comput., 2014

Pose Depth Volume extraction from RGB-D streams for frontal gait recognition.
J. Vis. Commun. Image Represent., 2014

Clustering Non-Ordered Discrete Data.
J. Inf. Sci. Eng., 2014

Security analysis for temporal role based access control.
J. Comput. Secur., 2014

User Friendly Implementation for Efficiently Conducting Hammersmith Infant Neurological Examination.
CoRR, 2014

Security analysis of temporal RBAC under an administrative model.
Comput. Secur., 2014

Anatomical Model-Guided Segmentation of Brain MR Image Sequences.
Proceedings of the 2014 Indian Conference on Computer Vision, 2014

Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Exploiting Pose Information for Gait Recognition from Depth Streams.
Proceedings of the Computer Vision - ECCV 2014 Workshops, 2014

2013
Two-stage database intrusion detection by combining multiple evidence and belief update.
Inf. Syst. Frontiers, 2013

Skew Correction of Document Images by Rank Analysis in Farey sequence.
Int. J. Pattern Recognit. Artif. Intell., 2013

Towards using covariance matrix pyramids as salient point descriptors in 3D point clouds.
Neurocomputing, 2013

AMTRAC: An administrative model for temporal role-based access control.
Comput. Secur., 2013

Colored Rubber Stamp Removal from Document Images.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

Gait Recognition from Front and Back View Sequences Captured Using Kinect.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

Removal of hand-drawn annotation lines from document images by digital-geometric analysis and inpainting.
Proceedings of the Fourth National Conference on Computer Vision, 2013

An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Re-targeting of multi-script document images for handheld devices.
Proceedings of the 4th International Workshop on Multilingual OCR, 2013

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Gait recognition using Pose Kinematics and Pose Energy Image.
Signal Process., 2012

A hierarchical method combining gait and phase of motion with spatiotemporal model for person re-identification.
Pattern Recognit. Lett., 2012

Evaluation of segmentation techniques using region area and boundary matching information.
J. Vis. Commun. Image Represent., 2012

A Robust Method for Ventriculomegaly Detection from Neonatal Brain Ultrasound Images.
J. Medical Syst., 2012

Analysis of adductors angle measurement in Hammersmith infant neurological examinations using mean shift segmentation and feature point based object tracking.
Comput. Biol. Medicine, 2012

An efficient model-guided framework for alignment of brain MR image sequences.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Minimum user requirement in Role Based Access Control with Separation of Duty constraints.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Detection and removal of hand-drawn underlines in a document image using approximate digital straightness.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

High resolution 3-D MR image reconstruction from multiple views.
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012

Margin noise removal from printed document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
A neighborhood elimination approach for block matching in motion estimation.
Signal Process. Image Commun., 2011

Occlusion detection and gait silhouette reconstruction from degraded scenes.
Signal Image Video Process., 2011

A Tool for Automatic Hammersmith Infant Neurological Examination.
Int. J. E Health Medical Commun., 2011

Hybrid index-based image search from the web.
Int. J. Data Min. Model. Manag., 2011

Security analysis of GTRBAC and its variants using model checking.
Comput. Secur., 2011

Classification and Quantification of Occlusion Using Hidden Markov Model.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

Automatic Adductors Angle Measurement for Neurological Assessment of Post-neonatal Infants during Follow Up.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

A hierarchical approach for content-based echocardiogram video indexing and retrieval.
Proceedings of the 2011 International Conference on Communication, 2011

2010
Database intrusion detection using sequence alignment.
Int. J. Inf. Sec., 2010

A column dependency-based approach for static and dynamic recovery of databases from malicious transactions.
Int. J. Inf. Sec., 2010

Toward Analyzing the Impact of Advertisement Billboards on Soccer Telecast Viewers.
Int. J. Comput. Intell. Appl., 2010

Tracking of Facial Feature Points by Combining Singular Tracking Results with a 3D Active Shape Model.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

Mining RBAC Roles under Cardinality Constraint.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Robust tracking of facial feature points with 3D Active Shape Models.
Proceedings of the International Conference on Image Processing, 2010

2009
BLAST-SSAHA Hybridization for Credit Card Fraud Detection.
IEEE Trans. Dependable Secur. Comput., 2009

Role Based Access Control with Spatiotemporal Context for Mobile Applications.
Trans. Comput. Sci., 2009

A probabilistic adaptive algorithm for constructing hierarchical meshes.
IEEE Trans. Consumer Electron., 2009

Resistance Estimation for Lateral Power Arrays Through Accurate Netlist Generation.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009

Image retrieval from the web using multiple features.
Online Inf. Rev., 2009

Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Inf. Fusion, 2009

CNODE: clustering of set-valued non-ordered discrete data.
Int. J. Data Min. Model. Manag., 2009

XML-based policy specification framework for spatiotemporal access control.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Towards formal security analysis of GTRBAC using timed automata.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Evaluation of Segmentation Techniques Using Region Size and Boundary Information.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

Supporting Negative Authorization in Spatiotemporal Role Based Access Control.
Proceedings of the First International Conference on Networks and Communications, 2009

Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Proceedings of the Information Security, 12th International Conference, 2009

A Fuzzy System for Impact Analysis of Advertisement Billboards in Soccer Telecast.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009

Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Graph-Based Multiplayer Detection and Tracking in Broadcast Soccer Videos.
IEEE Trans. Multim., 2008

State-Based Modeling and Object Extraction From Echocardiogram Video.
IEEE Trans. Inf. Technol. Biomed., 2008

Credit Card Fraud Detection Using Hidden Markov Model.
IEEE Trans. Dependable Secur. Comput., 2008

ANN- and PSO-Based Synthesis of On-Chip Spiral Inductors for RF ICs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008

New pixel-decimation patterns for block matching in motion estimation.
Signal Process. Image Commun., 2008

Soccer video processing for the detection of advertisement billboards.
Pattern Recognit. Lett., 2008

Ball detection from broadcast soccer videos using static and dynamic features.
J. Vis. Commun. Image Represent., 2008

Attack recovery from malicious transactions in distributed database systems.
Int. J. Inf. Comput. Secur., 2008

Detection of hard cuts and gradual transitions from video using fuzzy logic.
Int. J. Artif. Intell. Soft Comput., 2008

Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy.
Proceedings of the Trust, 2008

Security analysis and implementation of web-based telemedicine services with a four-tier architecture.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

Security Analysis of Temporal-RBAC Using Timed Automata.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Bottom-Up Construction of Bluetooth Topology under a Traffic-Aware Scheduling Scheme.
IEEE Trans. Mob. Comput., 2007

SKIP Prediction for Fast Rate Distortion Optimization in H.264.
IEEE Trans. Consumer Electron., 2007

An Integrated Color and Intensity Co-occurrence Matrix.
Pattern Recognit. Lett., 2007

A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection.
Int. J. Inf. Secur. Priv., 2007

A power-aware master and bridge scheduling scheme for bluetooth scatternets.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Automatic Detection of Human Fall in Video.
Proceedings of the Pattern Recognition and Machine Intelligence, 2007

Human Gait Recognition Using Temporal Slices.
Proceedings of the Pattern Recognition and Machine Intelligence, 2007

STARBAC: Spatio temporal Role Based Access C ontrol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Toward Memory-efficient Design of Video Encoders for Multimedia Applications.
Proceedings of the 2007 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), 2007

Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Access Control Model for Web Services with Attribute Disclosure Restriction.
Proceedings of the The Second International Conference on Availability, 2007

2006
Database Intrusion Detection using Weighted Sequence Mining.
J. Comput., 2006

A Wide-Band Lumped Element Compact CAD Model of Si-Based Planar Spiral Inductor for RFIC Design.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006

Weighted Intra-transactional Rule Mining for Database Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Online Recovery of a Distributed Database from Malicious Attack.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Modeling of Echocardiogram Video Based on Views and States.
Proceedings of the Computer Vision, Graphics and Image Processing, 5th Indian Conference, 2006

Two-Stage Credit Card Fraud Detection Using Sequence Alignment.
Proceedings of the Information Systems Security, Second International Conference, 2006

Content Based Image and Video Retrieval Using Embedded Text.
Proceedings of the Computer Vision, 2006

Object Tracking Using Background Subtraction and Motion Estimation in MPEG Videos.
Proceedings of the Computer Vision, 2006

2005
A self-organising protocol for Bluetooth scatternet formation.
Eur. Trans. Telecommun., 2005

Object Level Frame Comparison for Video Shot Detection.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

Integration of Keyword and Feature Based Search for Image Retrieval Applications.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

Speeding Up Web Access Using Weighted Association Rules.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

A Game-Theoretic Approach to Credit Card Fraud Detection.
Proceedings of the Information Systems Security, First International Conference, 2005

A simple wide-band compact model and parameter extraction using particle swarm optimization of on-chip spiral inductors for silicon RFICs.
Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, 2005

Human color perception in the HSV space and its application in histogram generation for image retrieval.
Proceedings of the Color Imaging X: Processing, Hardcopy, and Applications, San Jose, 2005

Histogram Generation from the HSV Color Space.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Similarity between Euclidean and cosine angle distance for nearest neighbor queries.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A Color-texture Histogram from the HSV Color Space for Video Shot Detection.
Proceedings of the ICVGIP 2004, 2004

P<sup>3</sup> - A Power-Aware Polling Scheme with Priority for Bluetooth.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Segmentation Using Saturation Thresholding and Its Application in Content-Based Retrieval of Images.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

Dynamic Topology Construction in Bluetooth Scatternets.
Proceedings of the High Performance Computing, 2004

2002
A Histogramm with Perceptually Smooth Color Transition for Image Retrieval.
Proceedings of the 6th Joint Conference on Information Science, 2002

Segmentation and histogram generation using the HSV color space for image retrieval.
Proceedings of the 2002 International Conference on Image Processing, 2002

A comparative analysis of two distance measures in color image databases.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

A Genetic Algorithm for Feature Selection in a Neuro-Fuzzy OCR System.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

1999
An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition.
Pattern Recognit. Lett., 1999

Fuzzy Hough transform and an MLP with fuzzy input/output for character recognition.
Fuzzy Sets Syst., 1999

A Two-state Markov Chain Model of Degraded Document Images.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

A Two-step Algorithm and its Parallelization for the Generation of Minimum Containing Rectangles for Document Image Segmentation.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1997
A document image analysis system on parallel processors.
Proceedings of the Fourth International on High-Performance Computing, 1997

1994
A 600MHz Half-Bit Level Pipelined Multiplier Macrocell.
Proceedings of the Seventh International Conference on VLSI Design, 1994


  Loading...