default search action
BibTeX records: Jaydip Sen
@article{DBLP:journals/corr/abs-2403-11297, author = {Hetvi Waghela and Sneha Rakshit and Jaydip Sen}, title = {A Modified Word Saliency-Based Adversarial Attack on Text Classification Models}, journal = {CoRR}, volume = {abs/2403.11297}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.11297}, doi = {10.48550/ARXIV.2403.11297}, eprinttype = {arXiv}, eprint = {2403.11297}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-11297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-00235, author = {Jaydip Sen and Joceli Mayer and Subhasis Dasgupta and Subrata Nandi and Srinivasan Krishnaswamy and Pinaki Mitra and Mahendra Pratap Singh and Naga Prasanthi Kundeti and Chandra Sekhara Rao MVP and Sudha Sree Chekuri and Seshu Babu Pallapothu and Preethi Nanjundan and Jossy P. George and Abdelhadi El Allahi and Ilham Morino and Salma AIT Oussous and Siham Beloualid and Ahmed Tamtaoui and Abderrahim Bajit}, title = {Information Security and Privacy in the Digital World: Some Selected Topics}, journal = {CoRR}, volume = {abs/2404.00235}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.00235}, doi = {10.48550/ARXIV.2404.00235}, eprinttype = {arXiv}, eprint = {2404.00235}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-00235.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-01786, author = {Rohit Pandey and Hetvi Waghela and Sneha Rakshit and Aparna Rangari and Anjali Singh and Rahul Kumar and Ratnadeep Ghosal and Jaydip Sen}, title = {Generative AI-Based Text Generation Methods Using Pre-Trained {GPT-2} Model}, journal = {CoRR}, volume = {abs/2404.01786}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.01786}, doi = {10.48550/ARXIV.2404.01786}, eprinttype = {arXiv}, eprint = {2404.01786}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-01786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-04245, author = {Trilokesh Ranjan Sarkar and Nilanjan Das and Pralay Sankar Maitra and Bijoy Some and Ritwik Saha and Orijita Adhikary and Bishal Bose and Jaydip Sen}, title = {Evaluating Adversarial Robustness: {A} Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism}, journal = {CoRR}, volume = {abs/2404.04245}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.04245}, doi = {10.48550/ARXIV.2404.04245}, eprinttype = {arXiv}, eprint = {2404.04245}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-04245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-05159, author = {Roopkatha Dey and Aivy Debnath and Sayak Kumar Dutta and Kaustav Ghosh and Arijit Mitra and Arghya Roy Chowdhury and Jaydip Sen}, title = {Semantic Stealth: Adversarial Text Attacks on {NLP} Using Several Methods}, journal = {CoRR}, volume = {abs/2404.05159}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.05159}, doi = {10.48550/ARXIV.2404.05159}, eprinttype = {arXiv}, eprint = {2404.05159}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-05159.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-05985, author = {Anamitra Maiti and Subham Laha and Rishav Upadhaya and Soumyajit Biswas and Vikas Chaudhary and Biplab Kar and Nikhil Kumar and Jaydip Sen}, title = {Boosting Digital Safeguards: Blending Cryptography and Steganography}, journal = {CoRR}, volume = {abs/2404.05985}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.05985}, doi = {10.48550/ARXIV.2404.05985}, eprinttype = {arXiv}, eprint = {2404.05985}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-05985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-19413, author = {Hetvi Waghela and Jaydip Sen and Sneha Rakshit}, title = {Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation}, journal = {CoRR}, volume = {abs/2406.19413}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.19413}, doi = {10.48550/ARXIV.2406.19413}, eprinttype = {arXiv}, eprint = {2406.19413}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-19413.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-01572, author = {Jaydip Sen and Hetvi Waghela and Sneha Rakshit}, title = {Exploring Sectoral Profitability in the Indian Stock Market Using Deep Learning}, journal = {CoRR}, volume = {abs/2407.01572}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.01572}, doi = {10.48550/ARXIV.2407.01572}, eprinttype = {arXiv}, eprint = {2407.01572}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-01572.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-21073, author = {Hetvi Waghela and Jaydip Sen and Sneha Rakshit}, title = {Enhancing Adversarial Text Attacks on {BERT} Models with Projected Gradient Descent}, journal = {CoRR}, volume = {abs/2407.21073}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.21073}, doi = {10.48550/ARXIV.2407.21073}, eprinttype = {arXiv}, eprint = {2407.21073}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-21073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-04369, author = {Subhasis Dasgupta and Soumya Roy and Jaydip Sen}, title = {Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective}, journal = {CoRR}, volume = {abs/2408.04369}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.04369}, doi = {10.48550/ARXIV.2408.04369}, eprinttype = {arXiv}, eprint = {2408.04369}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-04369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-00258, author = {Jaydip Sen and Subhasis Dasgupta}, title = {Data Privacy Preservation on the Internet of Things}, journal = {CoRR}, volume = {abs/2304.00258}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.00258}, doi = {10.48550/ARXIV.2304.00258}, eprinttype = {arXiv}, eprint = {2304.00258}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-00258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-17523, author = {Jaydip Sen and Aditya Jaiswal and Anshuman Pathak and Atish Kumar Majee and Kushagra Kumar and Manas Kumar Sarkar and Soubhik Maji}, title = {A Comparative Analysis of Portfolio Optimization Using Mean-Variance, Hierarchical Risk Parity, and Reinforcement Learning Approaches on the Indian Stock Market}, journal = {CoRR}, volume = {abs/2305.17523}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.17523}, doi = {10.48550/ARXIV.2305.17523}, eprinttype = {arXiv}, eprint = {2305.17523}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-17523.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-00872, author = {Jaydip Sen}, title = {Cryptography and Key Management Schemes for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/2307.00872}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.00872}, doi = {10.48550/ARXIV.2307.00872}, eprinttype = {arXiv}, eprint = {2307.00872}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-00872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-02055, author = {Jaydip Sen and Subhasis Dasgupta}, title = {Adversarial Attacks on Image Classification Models: {FGSM} and Patch Attacks and their Impact}, journal = {CoRR}, volume = {abs/2307.02055}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.02055}, doi = {10.48550/ARXIV.2307.02055}, eprinttype = {arXiv}, eprint = {2307.02055}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-02055.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-05048, author = {Jaydip Sen and Subhasis Dasgupta}, title = {Portfolio Optimization: {A} Comparative Study}, journal = {CoRR}, volume = {abs/2307.05048}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.05048}, doi = {10.48550/ARXIV.2307.05048}, eprinttype = {arXiv}, eprint = {2307.05048}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-05048.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-13696, author = {Abhiraj Sen and Jaydip Sen}, title = {Performance Evaluation of Equal-Weight Portfolio and Optimum Risk Portfolio on Indian Stocks}, journal = {CoRR}, volume = {abs/2309.13696}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.13696}, doi = {10.48550/ARXIV.2309.13696}, eprinttype = {arXiv}, eprint = {2309.13696}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-13696.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09770, author = {Jaydip Sen and Arup Dasgupta and Subhasis Dasgupta and Sayantani Roy Choudhury}, title = {A Portfolio Rebalancing Approach for the Indian Stock Market}, journal = {CoRR}, volume = {abs/2310.09770}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09770}, doi = {10.48550/ARXIV.2310.09770}, eprinttype = {arXiv}, eprint = {2310.09770}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09770.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-14748, author = {Jaydip Sen and Arup Dasgupta and Partha Pratim Sengupta and Sayantani Roy Choudhury}, title = {A Comparative Study of Portfolio Optimization Methods for the Indian Stock Market}, journal = {CoRR}, volume = {abs/2310.14748}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.14748}, doi = {10.48550/ARXIV.2310.14748}, eprinttype = {arXiv}, eprint = {2310.14748}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-14748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-16880, author = {Jaydip Sen and Abhiraj Sen and Ananda Chatterjee}, title = {Adversarial Attacks on Image Classification Models: Analysis and Defense}, journal = {CoRR}, volume = {abs/2312.16880}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.16880}, doi = {10.48550/ARXIV.2312.16880}, eprinttype = {arXiv}, eprint = {2312.16880}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-16880.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/DasguptaS22, author = {Subhasis Dasgupta and Jaydip Sen}, title = {A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach}, booktitle = {{OITS} International Conference on Information Technology, {OCIT} 2022, Bhubaneswar, India, December 14-16, 2022}, pages = {233--237}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/OCIT56763.2022.00052}, doi = {10.1109/OCIT56763.2022.00052}, timestamp = {Fri, 10 Mar 2023 12:02:44 +0100}, biburl = {https://dblp.org/rec/conf/cit/DasguptaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/Sen22, author = {Jaydip Sen}, title = {Optimum Pair-Trading Strategies for Stocks Using Cointegration-Based Approach}, booktitle = {{OITS} International Conference on Information Technology, {OCIT} 2022, Bhubaneswar, India, December 14-16, 2022}, pages = {371--375}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/OCIT56763.2022.00076}, doi = {10.1109/OCIT56763.2022.00076}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cit/Sen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-01943, author = {Jaydip Sen and Sidra Mehtab and Rajdeep Sen and Abhishek Dutta and Pooja Kherwa and Saheel Ahmed and Pranay Berry and Sahil Khurana and Sonali Singh and David W. W. Cadotte and David W. Anderson and Kalum J. Ost and Racheal S. Akinbo and Oladunni A. Daramola and Bongs Lainjo}, title = {Machine Learning: Algorithms, Models, and Applications}, journal = {CoRR}, volume = {abs/2201.01943}, year = {2022}, url = {https://arxiv.org/abs/2201.01943}, eprinttype = {arXiv}, eprint = {2201.01943}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-01943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-05570, author = {Jaydip Sen and Ashwin Kumar R. S and Geetha Joseph and Kaushik Muthukrishnan and Koushik Tulasi and Praveen Varukolu}, title = {Precise Stock Price Prediction for Robust Portfolio Design from Selected Sectors of the Indian Stock Market}, journal = {CoRR}, volume = {abs/2201.05570}, year = {2022}, url = {https://arxiv.org/abs/2201.05570}, eprinttype = {arXiv}, eprint = {2201.05570}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-05570.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-02723, author = {Jaydip Sen and Saikat Mondal and Sidra Mehtab}, title = {Portfolio Optimization on {NIFTY} Thematic Sector Stocks Using an {LSTM} Model}, journal = {CoRR}, volume = {abs/2202.02723}, year = {2022}, url = {https://arxiv.org/abs/2202.02723}, eprinttype = {arXiv}, eprint = {2202.02723}, timestamp = {Thu, 10 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-02723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-02728, author = {Jaydip Sen and Sidra Mehtab and Abhishek Dutta and Saikat Mondal}, title = {Hierarchical Risk Parity and Minimum Variance Portfolio Design on {NIFTY} 50 Stocks}, journal = {CoRR}, volume = {abs/2202.02728}, year = {2022}, url = {https://arxiv.org/abs/2202.02728}, eprinttype = {arXiv}, eprint = {2202.02728}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-02728.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-01326, author = {Jaydip Sen and Sidra Mehtab and Abhishek Dutta and Saikat Mondal}, title = {Precise Stock Price Prediction for Optimized Portfolio Design Using an {LSTM} Model}, journal = {CoRR}, volume = {abs/2203.01326}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.01326}, doi = {10.48550/ARXIV.2203.01326}, eprinttype = {arXiv}, eprint = {2203.01326}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-01326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-01850, author = {Jaydip Sen and Saikat Mondal and Gourab Nath}, title = {Robust Portfolio Design and Stock Price Prediction Using an Optimized {LSTM} Model}, journal = {CoRR}, volume = {abs/2204.01850}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.01850}, doi = {10.48550/ARXIV.2204.01850}, eprinttype = {arXiv}, eprint = {2204.01850}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-01850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07166, author = {Jaydip Sen and Arpit Awad and Aaditya Raj and Gourav Ray and Pusparna Chakraborty and Sanket Das and Subhasmita Mishra}, title = {Stock Performance Evaluation for Portfolio Design from Different Sectors of the Indian Stock Market}, journal = {CoRR}, volume = {abs/2208.07166}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07166}, doi = {10.48550/ARXIV.2208.07166}, eprinttype = {arXiv}, eprint = {2208.07166}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-00984, author = {Jaydip Sen and Abhishek Dutta}, title = {A Comparative Study of Hierarchical Risk Parity Portfolio and Eigen Portfolio on the {NIFTY} 50 Stocks}, journal = {CoRR}, volume = {abs/2210.00984}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.00984}, doi = {10.48550/ARXIV.2210.00984}, eprinttype = {arXiv}, eprint = {2210.00984}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-00984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-02126, author = {Ananda Chatterjee and Hrisav Bhowmick and Jaydip Sen}, title = {Stock Volatility Prediction using Time Series and Deep Learning Approach}, journal = {CoRR}, volume = {abs/2210.02126}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.02126}, doi = {10.48550/ARXIV.2210.02126}, eprinttype = {arXiv}, eprint = {2210.02126}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-02126.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-07080, author = {Jaydip Sen}, title = {Designing Efficient Pair-Trading Strategies Using Cointegration for the Indian Stock Market}, journal = {CoRR}, volume = {abs/2211.07080}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.07080}, doi = {10.48550/ARXIV.2211.07080}, eprinttype = {arXiv}, eprint = {2211.07080}, timestamp = {Wed, 16 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-07080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-10051, author = {Subhasis Dasgupta and Jaydip Sen}, title = {A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach}, journal = {CoRR}, volume = {abs/2212.10051}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.10051}, doi = {10.48550/ARXIV.2212.10051}, eprinttype = {arXiv}, eprint = {2212.10051}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-10051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/SenMDM21, author = {Jaydip Sen and Sidra Mehtab and Abhishek Dutta and Saikat Mondal}, title = {Precise Stock Price Prediction for Optimized Portfolio Design Using an {LSTM} Model}, booktitle = {19th {OITS} International Conference on Information Technology, {OCIT} 2019, Bhubaneswar, India, December 16-18, 2021}, pages = {210--215}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/OCIT53463.2021.00050}, doi = {10.1109/OCIT53463.2021.00050}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cit/SenMDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-15096, author = {Jaydip Sen and Sidra Mehtab}, title = {Accurate Stock Price Forecasting Using Robust and Optimized Deep Learning Models}, journal = {CoRR}, volume = {abs/2103.15096}, year = {2021}, url = {https://arxiv.org/abs/2103.15096}, eprinttype = {arXiv}, eprint = {2103.15096}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-15096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-06259, author = {Jaydip Sen and Abhishek Dutta and Sidra Mehtab}, title = {Profitability Analysis in Stock Investment Using an LSTM-Based Deep Learning Model}, journal = {CoRR}, volume = {abs/2104.06259}, year = {2021}, url = {https://arxiv.org/abs/2104.06259}, eprinttype = {arXiv}, eprint = {2104.06259}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-06259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00650, author = {Gourab Nath and Jaydip Sen}, title = {An Algorithm for Recommending Groceries Based on an Item Ranking Method}, journal = {CoRR}, volume = {abs/2105.00650}, year = {2021}, url = {https://arxiv.org/abs/2105.00650}, eprinttype = {arXiv}, eprint = {2105.00650}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00650.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13898, author = {Jaydip Sen and Sidra Mehtab and Abhishek Dutta}, title = {Volatility Modeling of Stocks from Selected Sectors of the Indian Economy Using {GARCH}}, journal = {CoRR}, volume = {abs/2105.13898}, year = {2021}, url = {https://arxiv.org/abs/2105.13898}, eprinttype = {arXiv}, eprint = {2105.13898}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13898.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-09664, author = {Jaydip Sen and Sidra Mehtab}, title = {Design and Analysis of Robust Deep Learning Models for Stock Price Prediction}, journal = {CoRR}, volume = {abs/2106.09664}, year = {2021}, url = {https://arxiv.org/abs/2106.09664}, eprinttype = {arXiv}, eprint = {2106.09664}, timestamp = {Thu, 01 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-09664.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-11371, author = {Jaydip Sen and Sidra Mehtab}, title = {Optimum Risk Portfolio and Eigen Portfolio: {A} Comparative Analysis Using Selected Stocks from the Indian Stock Market}, journal = {CoRR}, volume = {abs/2107.11371}, year = {2021}, url = {https://arxiv.org/abs/2107.11371}, eprinttype = {arXiv}, eprint = {2107.11371}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-11371.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11999, author = {Jaydip Sen and Rajdeep Sen and Abhishek Dutta}, title = {Machine Learning in Finance-Emerging Trends and Challenges}, journal = {CoRR}, volume = {abs/2110.11999}, year = {2021}, url = {https://arxiv.org/abs/2110.11999}, eprinttype = {arXiv}, eprint = {2110.11999}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-01137, author = {Ananda Chatterjee and Hrisav Bhowmick and Jaydip Sen}, title = {Stock Price Prediction Using Time Series, Econometric, Machine Learning, and Deep Learning Models}, journal = {CoRR}, volume = {abs/2111.01137}, year = {2021}, url = {https://arxiv.org/abs/2111.01137}, eprinttype = {arXiv}, eprint = {2111.01137}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-01137.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04709, author = {Jaydip Sen and Abhishek Dutta and Sidra Mehtab}, title = {Stock Portfolio Optimization Using a Deep Learning {LSTM} Model}, journal = {CoRR}, volume = {abs/2111.04709}, year = {2021}, url = {https://arxiv.org/abs/2111.04709}, eprinttype = {arXiv}, eprint = {2111.04709}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04709.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04976, author = {Jaydip Sen and Saikat Mondal and Sidra Mehtab}, title = {Analysis of Sectoral Profitability of the Indian Stock Market Using an {LSTM} Regression Model}, journal = {CoRR}, volume = {abs/2111.04976}, year = {2021}, url = {https://arxiv.org/abs/2111.04976}, eprinttype = {arXiv}, eprint = {2111.04976}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04976.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12463, author = {Hrisav Bhowmick and Ananda Chatterjee and Jaydip Sen}, title = {Comprehensive Movie Recommendation System}, journal = {CoRR}, volume = {abs/2112.12463}, year = {2021}, url = {https://arxiv.org/abs/2112.12463}, eprinttype = {arXiv}, eprint = {2112.12463}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12463.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-09769, author = {Sidra Mehtab and Jaydip Sen}, title = {Stock Price Prediction Using Convolutional Neural Networks on a Multivariate Timeseries}, journal = {CoRR}, volume = {abs/2001.09769}, year = {2020}, url = {https://arxiv.org/abs/2001.09769}, eprinttype = {arXiv}, eprint = {2001.09769}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-09769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-11697, author = {Sidra Mehtab and Jaydip Sen}, title = {A Time Series Analysis-Based Stock Price Prediction Using Machine Learning and Deep Learning Models}, journal = {CoRR}, volume = {abs/2004.11697}, year = {2020}, url = {https://arxiv.org/abs/2004.11697}, eprinttype = {arXiv}, eprint = {2004.11697}, timestamp = {Wed, 29 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-11697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-16147, author = {Jaydip Sen and Sidra Mehtab and Michael Ekonde Sone and Jyothsna Veeramreddy and Koneti Munivara Prasad and Rajeev Singh and Teek Parval Sharma and Anton Noskov and Ignacio Vel{\'{a}}squez and Ang{\'{e}}lica Caro and Alfonco Rodriguez and Tamer S. A. Fatayer and Altaf O. Mulani and Pradeep B. Mane and Roshan Chitrakar and Roshan Bhusal and Prajwol Maharjan}, title = {Computer and Network Security}, journal = {CoRR}, volume = {abs/2007.16147}, year = {2020}, url = {https://arxiv.org/abs/2007.16147}, eprinttype = {arXiv}, eprint = {2007.16147}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-16147.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-06709, author = {Jaydip Sen and Sidra Mehtab}, title = {Machine Learning Applications in Misuse and Anomaly Detection}, journal = {CoRR}, volume = {abs/2009.06709}, year = {2020}, url = {https://arxiv.org/abs/2009.06709}, eprinttype = {arXiv}, eprint = {2009.06709}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-06709.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-10819, author = {Sidra Mehtab and Jaydip Sen and Abhishek Dutta}, title = {Stock Price Prediction Using Machine Learning and LSTM-Based Deep Learning Models}, journal = {CoRR}, volume = {abs/2009.10819}, year = {2020}, url = {https://arxiv.org/abs/2009.10819}, eprinttype = {arXiv}, eprint = {2009.10819}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-10819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13891, author = {Sidra Mehtab and Jaydip Sen}, title = {Stock Price Prediction Using {CNN} and LSTM-Based Deep Learning Models}, journal = {CoRR}, volume = {abs/2010.13891}, year = {2020}, url = {https://arxiv.org/abs/2010.13891}, eprinttype = {arXiv}, eprint = {2010.13891}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13891.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-08011, author = {Sidra Mehtab and Jaydip Sen and Subhasis Dasgupta}, title = {Analysis and Forecasting of Financial Time Series Using {CNN} and LSTM-Based Deep Learning Models}, journal = {CoRR}, volume = {abs/2011.08011}, year = {2020}, url = {https://arxiv.org/abs/2011.08011}, eprinttype = {arXiv}, eprint = {2011.08011}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-08011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07700, author = {Sidra Mehtab and Jaydip Sen}, title = {A Robust Predictive Model for Stock Price Prediction Using Deep Learning and Natural Language Processing}, journal = {CoRR}, volume = {abs/1912.07700}, year = {2019}, url = {http://arxiv.org/abs/1912.07700}, eprinttype = {arXiv}, eprint = {1912.07700}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07700.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-09390, author = {Jaydip Sen and Moonkun Lee and Sunghyeon Lee and Yeongbok Choe and Menachem Domb and Arpan Pal and Hemant Kumar Rath and Samar Shailendra and Abhijan Bhattacharyya and Albena Mihovska and Mahasweta Sarkar and Hyun Jung Lee and Myungho Kim and Alexandru Averian}, title = {Internet of Things: Technology, Applications and Standardardization}, journal = {CoRR}, volume = {abs/1808.09390}, year = {2018}, url = {http://arxiv.org/abs/1808.09390}, eprinttype = {arXiv}, eprint = {1808.09390}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-09390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicba/MondalS17, author = {Sanjana Mondal and Jaydip Sen}, editor = {Jyotsna Kumar Mandal and Paramartha Dutta and Somnath Mukhopadhyay}, title = {A Framework of Predictive Analysis of Tourist Inflow in the Beaches of West Bengal: {A} Study of Digha-Mandarmoni Beach}, booktitle = {Computational Intelligence, Communications, and Business Analytics - First International Conference, {CICBA} 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part {I}}, series = {Communications in Computer and Information Science}, volume = {775}, pages = {161--176}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-6427-2\_14}, doi = {10.1007/978-981-10-6427-2\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cicba/MondalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BiswasS17, author = {Sanjib Biswas and Jaydip Sen}, title = {A Proposed Architecture for Big Data Driven Supply Chain Analytics}, journal = {CoRR}, volume = {abs/1705.04958}, year = {2017}, url = {http://arxiv.org/abs/1705.04958}, eprinttype = {arXiv}, eprint = {1705.04958}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BiswasS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenZWZYWLAFOSKA17, author = {Jaydip Sen and Shanrong Zhao and Xiaoying Wang and Guojing Zhang and Mengqin Yang and Jian Wang and Yun Long and Sergey Andreev and Roman Florea and Aleksandr Ometov and Adam Surak and Yevgeni Koucheryavy and Muhammad A. Ashraf and Waleed Tariq Sethi and Abdullah Alfakhri and Saleh A. Alshebeili and Amr Alasaad}, title = {Cloud Computing - Architecture and Applications}, journal = {CoRR}, volume = {abs/1707.09488}, year = {2017}, url = {http://arxiv.org/abs/1707.09488}, eprinttype = {arXiv}, eprint = {1707.09488}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenZWZYWLAFOSKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenFCSZJDBHLLEF17, author = {Jaydip Sen and Javier Franco{-}Contreras and Gouenou Coatrieux and Nilay K. Sangani and Haroot Zarger and Faouzi Ja{\"{\i}}di and Bob Duncan and Alfred Bratterud and Andreas Happe and Chin{-}Feng Lin and Che{-}Wei Liu and Walid Elgenaidi and Muftah Fraifer and Thomas Newe and Eoin O'Connell and Avijit Mathur and Ruolin Zhang and Eric Filiol}, title = {Advances in Security in Computing and Communications}, journal = {CoRR}, volume = {abs/1707.09526}, year = {2017}, url = {http://arxiv.org/abs/1707.09526}, eprinttype = {arXiv}, eprint = {1707.09526}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenFCSZJDBHLLEF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1601-02407, author = {Jaydip Sen and Tamal Datta Chaudhuri}, title = {Decomposition of Time Series Data of Stock Markets and its Implications for Prediction: An Application for the Indian Auto Sector}, journal = {CoRR}, volume = {abs/1601.02407}, year = {2016}, url = {https://doi.org/10.48550/arXiv.1601.02407}, doi = {10.48550/ARXIV.1601.02407}, eprinttype = {arXiv}, eprint = {1601.02407}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1601-02407.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenC16, author = {Jaydip Sen and Tamal Datta Chaudhuri}, title = {A Framework for Predictive Analysis of Stock Market Indices : {A} Study of the Indian Auto Sector}, journal = {CoRR}, volume = {abs/1604.04044}, year = {2016}, url = {http://arxiv.org/abs/1604.04044}, eprinttype = {arXiv}, eprint = {1604.04044}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenC16a, author = {Jaydip Sen and Tamal Datta Chaudhuri}, title = {An Alternative Framework for Time Series Decomposition and Forecasting and its Relevance for Portfolio Choice: {A} Comparative Study of the Indian Consumer Durable and Small Cap Sectors}, journal = {CoRR}, volume = {abs/1605.03930}, year = {2016}, url = {http://arxiv.org/abs/1605.03930}, eprinttype = {arXiv}, eprint = {1605.03930}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenC16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/Sen13, author = {Jaydip Sen}, title = {Secure and user privacy-preserving searching in peer-to-peer networks}, journal = {Log. J. {IGPL}}, volume = {21}, number = {4}, pages = {603--629}, year = {2013}, url = {https://doi.org/10.1093/jigpal/jzs036}, doi = {10.1093/JIGPAL/JZS036}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igpl/Sen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/13/Sen13, author = {Jaydip Sen}, editor = {Shafiullah Khan and Al{-}Sakib Khan Pathan}, title = {Security and Privacy Issues in Wireless Mesh Networks: {A} Survey}, booktitle = {Wireless Networks and Security, Issues, Challenges and Research Trends}, pages = {189--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36169-2\_7}, doi = {10.1007/978-3-642-36169-2\_7}, timestamp = {Thu, 14 Oct 2021 08:45:59 +0200}, biburl = {https://dblp.org/rec/books/sp/13/Sen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/Sen13, author = {Jaydip Sen}, editor = {Nik Bessis and Fatos Xhafa and Dora Varvarigou and Richard Hill and Maozhen Li}, title = {An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks}, booktitle = {Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence}, series = {Studies in Computational Intelligence}, volume = {460}, pages = {279--320}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-34952-2\_12}, doi = {10.1007/978-3-642-34952-2\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/Sen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-5065, author = {Jaydip Sen}, title = {Security in Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1301.5065}, year = {2013}, url = {http://arxiv.org/abs/1301.5065}, eprinttype = {arXiv}, eprint = {1301.5065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-5065.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-0939, author = {Jaydip Sen}, title = {Security and Privacy Issues in Wireless Mesh Networks: {A} Survey}, journal = {CoRR}, volume = {abs/1302.0939}, year = {2013}, url = {http://arxiv.org/abs/1302.0939}, eprinttype = {arXiv}, eprint = {1302.0939}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-0939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-2253, author = {Jaydip Sen}, title = {Security and Privacy Challenges in Cognitive Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1302.2253}, year = {2013}, url = {http://arxiv.org/abs/1302.2253}, eprinttype = {arXiv}, eprint = {1302.2253}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-2253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4882, author = {Jaydip Sen}, title = {Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1302.4882}, year = {2013}, url = {http://arxiv.org/abs/1302.4882}, eprinttype = {arXiv}, eprint = {1302.4882}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-4814, author = {Jaydip Sen}, title = {Security and Privacy Issues in Cloud Computing}, journal = {CoRR}, volume = {abs/1303.4814}, year = {2013}, url = {http://arxiv.org/abs/1303.4814}, eprinttype = {arXiv}, eprint = {1303.4814}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-4814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-5886, author = {Jaydip Sen}, title = {Homomorphic Encryption: Theory {\&} Applications}, journal = {CoRR}, volume = {abs/1305.5886}, year = {2013}, url = {http://arxiv.org/abs/1305.5886}, eprinttype = {arXiv}, eprint = {1305.5886}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-5886.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Sen13, author = {Jaydip Sen}, title = {A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1308.0682}, year = {2013}, url = {http://arxiv.org/abs/1308.0682}, eprinttype = {arXiv}, eprint = {1308.0682}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Sen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen12, author = {Jaydip Sen}, title = {A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {4}, number = {1}, year = {2012}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/139}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-4536, author = {Jaydip Sen}, title = {A Multi-Path Certification Protocol for Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1201.4536}, year = {2012}, url = {http://arxiv.org/abs/1201.4536}, eprinttype = {arXiv}, eprint = {1201.4536}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-4536.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-0732, author = {Jaydip Sen}, title = {Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1203.0732}, year = {2012}, url = {http://arxiv.org/abs/1203.0732}, eprinttype = {arXiv}, eprint = {1203.0732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-0732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-1175, author = {Jaydip Sen}, title = {Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1203.1175}, year = {2012}, url = {http://arxiv.org/abs/1203.1175}, eprinttype = {arXiv}, eprint = {1203.1175}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-1175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-1803, author = {Jaydip Sen}, title = {Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks}, journal = {CoRR}, volume = {abs/1209.1803}, year = {2012}, url = {http://arxiv.org/abs/1209.1803}, eprinttype = {arXiv}, eprint = {1209.1803}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-1803.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BandyopadhyayS11, author = {Debasis Bandyopadhyay and Jaydip Sen}, title = {Internet of Things: Applications and Challenges in Technology and Standardization}, journal = {Wirel. Pers. Commun.}, volume = {58}, number = {1}, pages = {49--69}, year = {2011}, url = {https://doi.org/10.1007/s11277-011-0288-5}, doi = {10.1007/S11277-011-0288-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BandyopadhyayS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acc/Sen11, author = {Jaydip Sen}, editor = {Ajith Abraham and Jaime Lloret Mauri and John F. Buford and Junichi Suzuki and Sabu M. Thampi}, title = {An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks}, booktitle = {Advances in Computing and Communications - First International Conference, {ACC} 2011, Kochi, India, July 22-24, 2011, Proceedings, Part {IV}}, series = {Communications in Computer and Information Science}, volume = {193}, pages = {580--592}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22726-4\_60}, doi = {10.1007/978-3-642-22726-4\_60}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acc/Sen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/Sen11, author = {Jaydip Sen}, editor = {{\'{A}}lvaro Herrero and Emilio Corchado}, title = {A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network}, booktitle = {Computational Intelligence in Security for Information Systems - 4th International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga, Spain, June 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6694}, pages = {100--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21323-6\_13}, doi = {10.1007/978-3-642-21323-6\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/Sen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/Sen11, author = {Jaydip Sen}, title = {A Robust and Secure Aggregation Protocol for Wireless Sensor Networks}, booktitle = {Sixth {IEEE} International Symposium on Electronic Design, Test and Application, {DELTA} 2011, Queenstown, New Zealand, 17-19 January, 2011}, pages = {222--227}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DELTA.2011.59}, doi = {10.1109/DELTA.2011.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/delta/Sen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Sen11, author = {Jaydip Sen}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Secure and Privacy-Aware Searching in Peer-to-Peer Networks}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {72--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_6}, doi = {10.1007/978-3-642-28879-1\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Sen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/UkilS11, author = {Arijit Ukil and Jaydip Sen}, editor = {Beniamino Murgante and Osvaldo Gervasi and Andr{\'{e}}s Iglesias and David Taniar and Bernady O. Apduhan}, title = {A Secure Privacy Preserved Data Aggregation Scheme in Non Hierarchical Networks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2011 - International Conference, Santander, Spain, June 20-23, 2011. Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {6785}, pages = {436--451}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21898-9\_37}, doi = {10.1007/978-3-642-21898-9\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/UkilS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SenM11, author = {Jaydip Sen and Subhamoy Maitra}, editor = {Peeter Laud}, title = {An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks}, booktitle = {Information Security Technology for Applications - 16th Nordic Conference on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7161}, pages = {205--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29615-4\_15}, doi = {10.1007/978-3-642-29615-4\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/SenM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0241, author = {Jaydip Sen}, title = {An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1101.0241}, year = {2011}, url = {http://arxiv.org/abs/1101.0241}, eprinttype = {arXiv}, eprint = {1101.0241}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0241.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0244, author = {Jaydip Sen}, title = {A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1101.0244}, year = {2011}, url = {http://arxiv.org/abs/1101.0244}, eprinttype = {arXiv}, eprint = {1101.0244}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0244.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0248, author = {Jaydip Sen}, title = {A Robust and Fault-Tolerant Distributed Intrusion Detection System}, journal = {CoRR}, volume = {abs/1101.0248}, year = {2011}, url = {http://arxiv.org/abs/1101.0248}, eprinttype = {arXiv}, eprint = {1101.0248}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-0250, author = {Jaydip Sen}, title = {An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1101.0250}, year = {2011}, url = {http://arxiv.org/abs/1101.0250}, eprinttype = {arXiv}, eprint = {1101.0250}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-0250.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-2715, author = {Jaydip Sen}, title = {A Novel Mechanism for Detection of Distributed Denial of Service Attacks}, journal = {CoRR}, volume = {abs/1101.2715}, year = {2011}, url = {http://arxiv.org/abs/1101.2715}, eprinttype = {arXiv}, eprint = {1101.2715}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-2715.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-2753, author = {Jaydip Sen}, title = {An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks}, journal = {CoRR}, volume = {abs/1101.2753}, year = {2011}, url = {http://arxiv.org/abs/1101.2753}, eprinttype = {arXiv}, eprint = {1101.2753}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-2753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-2759, author = {Jaydip Sen}, title = {Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses}, journal = {CoRR}, volume = {abs/1101.2759}, year = {2011}, url = {http://arxiv.org/abs/1101.2759}, eprinttype = {arXiv}, eprint = {1101.2759}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-2759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-3076, author = {Jaydip Sen}, title = {A Robust and Secure Aggregation Protocol for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1101.3076}, year = {2011}, url = {http://arxiv.org/abs/1101.3076}, eprinttype = {arXiv}, eprint = {1101.3076}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-3076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-1226, author = {Jaydip Sen}, title = {Secure Routing in Wireless Mesh Networks}, journal = {CoRR}, volume = {abs/1102.1226}, year = {2011}, url = {http://arxiv.org/abs/1102.1226}, eprinttype = {arXiv}, eprint = {1102.1226}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-1226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1103-3333, author = {Jaydip Sen}, title = {A Robust Mechanism for Defending Distributed Denial {OF} Service Attacks on Web Servers}, journal = {CoRR}, volume = {abs/1103.3333}, year = {2011}, url = {http://arxiv.org/abs/1103.3333}, eprinttype = {arXiv}, eprint = {1103.3333}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1103-3333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-1693, author = {Debasis Bandyopadhyay and Jaydip Sen}, title = {Internet of Things: Applications and Challenges in Technology and Standardization}, journal = {CoRR}, volume = {abs/1105.1693}, year = {2011}, url = {http://arxiv.org/abs/1105.1693}, eprinttype = {arXiv}, eprint = {1105.1693}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-1693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-0969, author = {Arijit Ukil and Jaydip Sen and Debasish Bera}, title = {Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation Algorithm in Dynamic {OFDMA} Systems}, journal = {CoRR}, volume = {abs/1106.0969}, year = {2011}, url = {http://arxiv.org/abs/1106.0969}, eprinttype = {arXiv}, eprint = {1106.0969}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-0969.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-1038, author = {Arijit Ukil and Jaydip Sen and Debasish Bera}, title = {Dynamic {OFDMA} Resource Allocation for QoS Guarantee and System Optimization of Best Effort and Non Real-time Traffic}, journal = {CoRR}, volume = {abs/1107.1038}, year = {2011}, url = {http://arxiv.org/abs/1107.1038}, eprinttype = {arXiv}, eprint = {1107.1038}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-1038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-5538, author = {Jaydip Sen}, title = {An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks}, journal = {CoRR}, volume = {abs/1107.5538}, year = {2011}, url = {http://arxiv.org/abs/1107.5538}, eprinttype = {arXiv}, eprint = {1107.5538}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-5538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-0150, author = {Jaydip Sen}, title = {Secure and Privacy- Aware Searching in Peer-to-Peer Networks}, journal = {CoRR}, volume = {abs/1110.0150}, year = {2011}, url = {http://arxiv.org/abs/1110.0150}, eprinttype = {arXiv}, eprint = {1110.0150}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-0150.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-0382, author = {Jaydip Sen}, title = {A Distributed Intrusion Detection System Using Cooperating Agents}, journal = {CoRR}, volume = {abs/1111.0382}, year = {2011}, url = {http://arxiv.org/abs/1111.0382}, eprinttype = {arXiv}, eprint = {1111.0382}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-0382.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-0385, author = {Jaydip Sen and M. Girish Chandra and P. Balamuralidhar and Harihara S. G. and Harish Reddy}, title = {A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1111.0385}, year = {2011}, url = {http://arxiv.org/abs/1111.0385}, eprinttype = {arXiv}, eprint = {1111.0385}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-0385.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-0386, author = {Jaydip Sen and M. Girish Chandra and Harihara S. G. and Harish Reddy and P. Balamuralidhar}, title = {A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1111.0386}, year = {2011}, url = {http://arxiv.org/abs/1111.0386}, eprinttype = {arXiv}, eprint = {1111.0386}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-0386.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-0387, author = {Jaydip Sen and Sripad Koilakonda and Arijit Ukil}, title = {A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1111.0387}, year = {2011}, url = {http://arxiv.org/abs/1111.0387}, eprinttype = {arXiv}, eprint = {1111.0387}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-0387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact-aicit/Sen10, author = {Jaydip Sen}, title = {An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network}, journal = {Int. J. Adv. Comp. Techn.}, volume = {2}, number = {4}, pages = {57--66}, year = {2010}, url = {http://www.aicit.org/ijact/ppl/6-IJACT1-136044JE.pdf}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact-aicit/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen10, author = {Jaydip Sen}, title = {An Agent-Based Intrusion Detection System for Local Area Networks}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {2}, number = {2}, year = {2010}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/44}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Sen10, author = {Jaydip Sen}, title = {An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks}, journal = {Scalable Comput. Pract. Exp.}, volume = {11}, number = {4}, year = {2010}, url = {http://www.scpe.org/index.php/scpe/article/view/666}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicsyn/Sen10, author = {Jaydip Sen}, editor = {David Al{-}Dabass and Athanasios A. Pantelous and Alessandra Orsoni and Ajith Abraham}, title = {An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks}, booktitle = {Second International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2010, Liverpool, UK, 28-30 July, 2010}, pages = {202--207}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CICSyN.2010.51}, doi = {10.1109/CICSYN.2010.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cicsyn/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/Sen10, author = {Jaydip Sen}, title = {An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks}, booktitle = {2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010}, pages = {283--288}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CISIM.2010.5643647}, doi = {10.1109/CISIM.2010.5643647}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisim/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Sen10, author = {Jaydip Sen}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {528--537}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_53}, doi = {10.1007/978-3-642-14478-3\_53}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Sen10a, author = {Jaydip Sen}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {538--547}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_54}, doi = {10.1007/978-3-642-14478-3\_54}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Sen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compute/SenU10, author = {Jaydip Sen and Arijit Ukil}, editor = {R. K. Shyamasundar and Prasad Deshpande}, title = {A QoS-aware end-to-end connectivity management algorithm for mobile applications}, booktitle = {Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010}, pages = {4:1--4:9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1754288.1754292}, doi = {10.1145/1754288.1754292}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compute/SenU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/Sen10, author = {Jaydip Sen}, title = {A Throughput Optimizing Routing Protocol for Wireless Mesh Networks}, booktitle = {12th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2010, 1-3 September 2010, Melbourne, Australia}, pages = {665--670}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/HPCC.2010.33}, doi = {10.1109/HPCC.2010.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Sen10, author = {Jaydip Sen}, editor = {David Taniar and Osvaldo Gervasi and Beniamino Murgante and Eric Pardede and Bernady O. Apduhan}, title = {An Efficient and Reliable Routing Protocol for Wireless Mesh Networks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {6018}, pages = {246--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12179-1\_22}, doi = {10.1007/978-3-642-12179-1\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/SenU10, author = {Jaydip Sen and Arijit Ukil}, editor = {David Taniar and Osvaldo Gervasi and Beniamino Murgante and Eric Pardede and Bernady O. Apduhan}, title = {A Secure Routing Protocol for Wireless Sensor Networks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {6018}, pages = {277--290}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12179-1\_25}, doi = {10.1007/978-3-642-12179-1\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/SenU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Sen10, author = {Jaydip Sen}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {77--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_7}, doi = {10.1007/978-3-642-17650-0\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-5176, author = {Jaydip Sen}, title = {A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network}, journal = {CoRR}, volume = {abs/1010.5176}, year = {2010}, url = {http://arxiv.org/abs/1010.5176}, eprinttype = {arXiv}, eprint = {1010.5176}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-5176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-1529, author = {Jaydip Sen}, title = {A Survey on Wireless Sensor Network Security}, journal = {CoRR}, volume = {abs/1011.1529}, year = {2010}, url = {http://arxiv.org/abs/1011.1529}, eprinttype = {arXiv}, eprint = {1011.1529}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-1529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-1531, author = {Jaydip Sen}, title = {An Agent-Based Intrusion Detection System for Local Area Networks}, journal = {CoRR}, volume = {abs/1011.1531}, year = {2010}, url = {http://arxiv.org/abs/1011.1531}, eprinttype = {arXiv}, eprint = {1011.1531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-1531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-1793, author = {Jaydip Sen and Kaustav Goswami}, title = {An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks}, journal = {CoRR}, volume = {abs/1011.1793}, year = {2010}, url = {http://arxiv.org/abs/1011.1793}, eprinttype = {arXiv}, eprint = {1011.1793}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-1793.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1011-1956, author = {Jaydip Sen}, title = {Mobility and Handoff Management in Wireless Networks}, journal = {CoRR}, volume = {abs/1011.1956}, year = {2010}, url = {http://arxiv.org/abs/1011.1956}, eprinttype = {arXiv}, eprint = {1011.1956}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-1956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2171, author = {Jaydip Sen}, title = {A Robust and Efficient Trust Management Scheme for Peer-to-Peer Networks}, journal = {CoRR}, volume = {abs/1012.2171}, year = {2010}, url = {http://arxiv.org/abs/1012.2171}, eprinttype = {arXiv}, eprint = {1012.2171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2514, author = {Jaydip Sen and P. Balamuralidhar and M. Girish Chandra and Harihara S. G. and Harish Reddy}, title = {Context Aware End-to-End Connectivity Management}, journal = {CoRR}, volume = {abs/1012.2514}, year = {2010}, url = {http://arxiv.org/abs/1012.2514}, eprinttype = {arXiv}, eprint = {1012.2514}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2516, author = {Jaydip Sen}, title = {An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1012.2516}, year = {2010}, url = {http://arxiv.org/abs/1012.2516}, eprinttype = {arXiv}, eprint = {1012.2516}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2518, author = {Jaydip Sen and Shomik Bhattacharya}, title = {A Survey on Cross-Layer Design Frameworks for Multimedia Applications over Wireless Networks}, journal = {CoRR}, volume = {abs/1012.2518}, year = {2010}, url = {http://arxiv.org/abs/1012.2518}, eprinttype = {arXiv}, eprint = {1012.2518}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2519, author = {Jaydip Sen}, title = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks}, journal = {CoRR}, volume = {abs/1012.2519}, year = {2010}, url = {http://arxiv.org/abs/1012.2519}, eprinttype = {arXiv}, eprint = {1012.2519}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2519.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2520, author = {Jaydip Sen}, title = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network}, journal = {CoRR}, volume = {abs/1012.2520}, year = {2010}, url = {http://arxiv.org/abs/1012.2520}, eprinttype = {arXiv}, eprint = {1012.2520}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2524, author = {Jaydip Sen and Munir Sayyad and Basavaraj Hooli}, title = {Convergence and Next Generation Networks}, journal = {CoRR}, volume = {abs/1012.2524}, year = {2010}, url = {http://arxiv.org/abs/1012.2524}, eprinttype = {arXiv}, eprint = {1012.2524}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2528, author = {Jaydip Sen}, title = {A Secure Aggregation Protocol for Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1012.2528}, year = {2010}, url = {http://arxiv.org/abs/1012.2528}, eprinttype = {arXiv}, eprint = {1012.2528}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2529, author = {Jaydip Sen}, title = {A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks}, journal = {CoRR}, volume = {abs/1012.2529}, year = {2010}, url = {http://arxiv.org/abs/1012.2529}, eprinttype = {arXiv}, eprint = {1012.2529}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/Sen09, author = {Jaydip Sen}, title = {A Survey on Wireless Sensor Network Security}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {1}, number = {2}, year = {2009}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/16}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/Sen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/SenUBP08, author = {Jaydip Sen and Arijit Ukil and Debasish Bera and Arpan Pal}, title = {A distributed intrusion detection system for wireless ad hoc networks}, booktitle = {Proceedings of the 16th International Conference on Networks, {ICON} 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India}, pages = {1--6}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICON.2008.4772624}, doi = {10.1109/ICON.2008.4772624}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/SenUBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/SenCBGR07, author = {Jaydip Sen and M. Girish Chandra and P. Balamuralidhar and Harihara S. G. and Harish Reddy}, title = {A Scheme of Certificate Authority for Ad Hoc Networks}, booktitle = {18th International Workshop on Database and Expert Systems Applications {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany}, pages = {615--619}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DEXA.2007.90}, doi = {10.1109/DEXA.2007.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/SenCBGR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccta/SenCS07, author = {Jaydip Sen and Piyali Roy Chowdhury and Indranil Sengupta}, title = {A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks}, booktitle = {2007 International Conference on Computing: Theory and Applications {(ICCTA} 2007), 5-7 March 2007, Kolkata, India}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICCTA.2007.3}, doi = {10.1109/ICCTA.2007.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccta/SenCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/SenS07, author = {Jaydip Sen and Harihara Subramanyam}, editor = {Tomasz Janowski and Hrushikesha Mohanty}, title = {An Efficient Certificate Authority for Ad Hoc Networks}, booktitle = {Distributed Computing and Internet Technology, 4th International Conference, {ICDCIT} 2007, Bangalore, India, December 17-20, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4882}, pages = {97--109}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77115-9\_10}, doi = {10.1007/978-3-540-77115-9\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/SenS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/SenCS06, author = {Jaydip Sen and Piyali Roy Chowdhury and Indranil Sengupta}, editor = {Soma Chaudhuri and Samir R. Das and Himadri S. Paul and Srikanta Tirthapura}, title = {A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks}, booktitle = {Distributed Computing and Networking, 8th International Conference, {ICDCN} 2006, Guwahati, India, December 27-30, 2006}, series = {Lecture Notes in Computer Science}, volume = {4308}, pages = {139--144}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11947950\_16}, doi = {10.1007/11947950\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/SenCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/SenS05, author = {Jaydip Sen and Indranil Sengupta}, editor = {Goutam Chakraborty}, title = {Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System}, booktitle = {Distributed Computing and Internet Technology, Second International Conference, {ICDCIT} 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3816}, pages = {125--131}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604655\_16}, doi = {10.1007/11604655\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/SenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.