Somanath Tripathy
Orcid: 0000-0002-6964-2648
According to our database1,
Somanath Tripathy
authored at least 111 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
CAGCL: Predicting Short- and Long-Term Breast Cancer Survival With Cross-Modal Attention and Graph Contrastive Learning.
IEEE J. Biomed. Health Informatics, December, 2024
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack.
ACM Trans. Priv. Secur., November, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Clust. Comput., July, 2024
An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest.
IEEE Syst. J., March, 2024
Privacy-preserving and Byzantine-robust Federated Learning Framework using Permissioned Blockchain.
Expert Syst. Appl., March, 2024
Int. J. Inf. Sec., February, 2024
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024
Towards optimal edge resource utilization: Predictive analytics and reinforcement learning for task offloading.
Internet Things, 2024
Comput. Secur., 2024
Integrative prognostic modeling for breast cancer: Unveiling optimal multimodal combinations using graph convolutional networks and calibrated random forest.
Appl. Soft Comput., 2024
Proceedings of the Information Systems Security - 20th International Conference, 2024
2023
An Efficient Blockchain Assisted Reputation Aware Decentralized Federated Learning Framework.
IEEE Trans. Netw. Serv. Manag., September, 2023
Multi-objective optimization with majority voting ensemble of classifiers for prediction of HIV-1 protease cleavage site.
Soft Comput., 2023
Int. J. Inf. Sec., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Proceedings of the Information Security Practice and Experience, 2023
Integrating Multi-view Feature Extraction and Fuzzy Rank-Based Ensemble for Accurate HIV-1 Protease Cleavage Site Prediction.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
2022
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage.
J. Supercomput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
J. Netw. Syst. Manag., 2022
HIV-1 Protease Cleavage Site Prediction using Stacked Autoencoder with Ensemble of Classifiers.
Proceedings of the International Joint Conference on Neural Networks, 2022
A Multi-modal Graph Convolutional Network for Predicting Human Breast Cancer Prognosis.
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle.
Proceedings of the IEEE Global Communications Conference, 2022
Delay Aware Fault-Tolerant Concurrent Data Collection Trees in Shared IIoT Applications.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
2021
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage.
IEEE Trans. Serv. Comput., 2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Comput. Soc. Syst., 2021
J. Hardw. Syst. Secur., 2021
J. Inf. Secur. Appl., 2021
MARPUF: physical unclonable function with improved machine learning attack resistance.
IET Circuits Devices Syst., 2021
n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks.
Comput. Secur., 2021
CCF Trans. Pervasive Comput. Interact., 2021
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021
Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
DNet: An Efficient Privacy-Preserving Distributed Learning Framework for Healthcare Systems.
Proceedings of the Distributed Computing and Internet Technology, 2021
Proceedings of the BSCI '21: Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021
2020
Soc. Netw. Anal. Min., 2020
Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes.
J. Hardw. Syst. Secur., 2020
Int. J. Inf. Sec., 2020
Enhancing quality of experience using peer-to-peer overlay on device-to-device communications.
Int. J. Commun. Syst., 2020
Proceedings of the ECML PKDD 2020 Workshops, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Secur. Priv., 2019
Correlation power analysis and effective defense approach on light encryption device block cipher.
Secur. Priv., 2019
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework.
CoRR, 2019
Enhancing Quality of Experience using DHT Overlay on Device-to-Device Communications in LTE-A Networks.
CoRR, 2019
Proceedings of the TENCON 2019, 2019
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019
Proceedings of the International Conference on Data Science and Engineering, 2019
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018
Proceedings of the Distributed Computing and Internet Technology, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
A trust-based collaborative access control model with policy aggregation for online social networks.
Soc. Netw. Anal. Min., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
2016
J. Comput. Networks Commun., 2016
Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Distributed Computing and Internet Technology, 2016
2015
Proceedings of the Distributed Computing and Internet Technology, 2015
Predicting User Visibility in Online Social Networks Using Local Connectivity Properties.
Proceedings of the Distributed Computing and Internet Technology, 2015
2014
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Int. J. Netw. Secur., 2014
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Information Technology, 2014
2013
Wirel. Networks, 2013
Int. J. Commun. Networks Distributed Syst., 2013
EURASIP J. Wirel. Commun. Netw., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
Proceedings of the 2011 International Conference on Communication, 2011
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011
2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Int. J. Netw. Secur., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
2008
Int. J. Secur. Networks, 2008
2007
Proceedings of the Distributed Computing and Internet Technology, 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the 10th International Conference on Information Technology, 2007
2006
Efficient Remote User Authentication and Key Establishment for Multi-server Environment.
Proceedings of the Distributed Computing and Internet Technology, 2006
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
Proceedings of the 9th International Conference in Information Technology, 2006