Tanmoy Kanti Das

Orcid: 0000-0002-0650-0247

According to our database1, Tanmoy Kanti Das authored at least 27 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SRI: A Simple Rule Induction Method for improving resiliency of DNN based IDS against adversarial and zero-day attacks.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
CAVIDS: Real time intrusion detection system for connected autonomous vehicles using logical analysis of data.
Veh. Commun., October, 2023

Detection of cyber-attacks for sensor measurement data using supervised machine learning models for modern power grid system.
Int. J. Crit. Comput. Based Syst., 2023

2022
jForge: An adversarial method to deceive JPEG forgery localization schemes.
Multim. Tools Appl., 2022

Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features.
Int. J. Crit. Infrastructure Prot., 2022

2021
Prevention and detection of FDIA on power-network protection scheme using multiple support set.
J. Inf. Secur. Appl., 2021

2020
SSIDS: Semi-Supervised Intrusion Detection System by Extending the Logical Analysis of Data.
CoRR, 2020

Anomaly detection in Industrial Control Systems using Logical Analysis of Data.
Comput. Secur., 2020

2019
Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients.
Multim. Tools Appl., 2018

2015
A Secure Image Hashing Technique for Forgery Detection.
Proceedings of the Distributed Computing and Internet Technology, 2015

2008
An Asynchronous Node Replication Attack in Wireless Sensor Networks.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2006
Cryptanalysis of Chu's DCT based watermarking scheme.
IEEE Trans. Multim., 2006

Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme.
Multim. Syst., 2006

Diverging Keys in Wireless Sensor Networks.
Proceedings of the Information Security, 9th International Conference, 2006

2005
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme.
IEEE Trans. Signal Process., 2005

An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Cryptanalysis of Barni et al. Watermarking Scheme.
Proceedings of the Progress in Cryptology, 2005

2004
Cryptanalysis of correlation-based watermarking schemes using single watermarked copy.
IEEE Signal Process. Lett., 2004

Cryptanalysis of a Wavelet Based Watermarking Scheme.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme.
Proceedings of the Distributed Computing, 2004

2003
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes.
Proceedings of the Progress in Cryptology, 2003

2002
Cryptanalysis of correlation based watermark using single copy.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme.
Proceedings of the Progress in Cryptology, 2002

A Robust Block Oriented Watermarking Scheme in Spatial Domain.
Proceedings of the Information and Communications Security, 4th International Conference, 2002


  Loading...