BibTeX records: Jaydip Sen

download as .bib file

@article{DBLP:journals/corr/abs-2403-11297,
  author       = {Hetvi Waghela and
                  Sneha Rakshit and
                  Jaydip Sen},
  title        = {A Modified Word Saliency-Based Adversarial Attack on Text Classification
                  Models},
  journal      = {CoRR},
  volume       = {abs/2403.11297},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.11297},
  doi          = {10.48550/ARXIV.2403.11297},
  eprinttype    = {arXiv},
  eprint       = {2403.11297},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-11297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-00235,
  author       = {Jaydip Sen and
                  Joceli Mayer and
                  Subhasis Dasgupta and
                  Subrata Nandi and
                  Srinivasan Krishnaswamy and
                  Pinaki Mitra and
                  Mahendra Pratap Singh and
                  Naga Prasanthi Kundeti and
                  Chandra Sekhara Rao MVP and
                  Sudha Sree Chekuri and
                  Seshu Babu Pallapothu and
                  Preethi Nanjundan and
                  Jossy P. George and
                  Abdelhadi El Allahi and
                  Ilham Morino and
                  Salma AIT Oussous and
                  Siham Beloualid and
                  Ahmed Tamtaoui and
                  Abderrahim Bajit},
  title        = {Information Security and Privacy in the Digital World: Some Selected
                  Topics},
  journal      = {CoRR},
  volume       = {abs/2404.00235},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.00235},
  doi          = {10.48550/ARXIV.2404.00235},
  eprinttype    = {arXiv},
  eprint       = {2404.00235},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-00235.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-01786,
  author       = {Rohit Pandey and
                  Hetvi Waghela and
                  Sneha Rakshit and
                  Aparna Rangari and
                  Anjali Singh and
                  Rahul Kumar and
                  Ratnadeep Ghosal and
                  Jaydip Sen},
  title        = {Generative AI-Based Text Generation Methods Using Pre-Trained {GPT-2}
                  Model},
  journal      = {CoRR},
  volume       = {abs/2404.01786},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.01786},
  doi          = {10.48550/ARXIV.2404.01786},
  eprinttype    = {arXiv},
  eprint       = {2404.01786},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-01786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-04245,
  author       = {Trilokesh Ranjan Sarkar and
                  Nilanjan Das and
                  Pralay Sankar Maitra and
                  Bijoy Some and
                  Ritwik Saha and
                  Orijita Adhikary and
                  Bishal Bose and
                  Jaydip Sen},
  title        = {Evaluating Adversarial Robustness: {A} Comparison Of FGSM, Carlini-Wagner
                  Attacks, And The Role of Distillation as Defense Mechanism},
  journal      = {CoRR},
  volume       = {abs/2404.04245},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.04245},
  doi          = {10.48550/ARXIV.2404.04245},
  eprinttype    = {arXiv},
  eprint       = {2404.04245},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-04245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-05159,
  author       = {Roopkatha Dey and
                  Aivy Debnath and
                  Sayak Kumar Dutta and
                  Kaustav Ghosh and
                  Arijit Mitra and
                  Arghya Roy Chowdhury and
                  Jaydip Sen},
  title        = {Semantic Stealth: Adversarial Text Attacks on {NLP} Using Several
                  Methods},
  journal      = {CoRR},
  volume       = {abs/2404.05159},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.05159},
  doi          = {10.48550/ARXIV.2404.05159},
  eprinttype    = {arXiv},
  eprint       = {2404.05159},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-05159.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-05985,
  author       = {Anamitra Maiti and
                  Subham Laha and
                  Rishav Upadhaya and
                  Soumyajit Biswas and
                  Vikas Chaudhary and
                  Biplab Kar and
                  Nikhil Kumar and
                  Jaydip Sen},
  title        = {Boosting Digital Safeguards: Blending Cryptography and Steganography},
  journal      = {CoRR},
  volume       = {abs/2404.05985},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.05985},
  doi          = {10.48550/ARXIV.2404.05985},
  eprinttype    = {arXiv},
  eprint       = {2404.05985},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-05985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-19413,
  author       = {Hetvi Waghela and
                  Jaydip Sen and
                  Sneha Rakshit},
  title        = {Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation},
  journal      = {CoRR},
  volume       = {abs/2406.19413},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.19413},
  doi          = {10.48550/ARXIV.2406.19413},
  eprinttype    = {arXiv},
  eprint       = {2406.19413},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-19413.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-01572,
  author       = {Jaydip Sen and
                  Hetvi Waghela and
                  Sneha Rakshit},
  title        = {Exploring Sectoral Profitability in the Indian Stock Market Using
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2407.01572},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.01572},
  doi          = {10.48550/ARXIV.2407.01572},
  eprinttype    = {arXiv},
  eprint       = {2407.01572},
  timestamp    = {Sat, 24 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-01572.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-21073,
  author       = {Hetvi Waghela and
                  Jaydip Sen and
                  Sneha Rakshit},
  title        = {Enhancing Adversarial Text Attacks on {BERT} Models with Projected
                  Gradient Descent},
  journal      = {CoRR},
  volume       = {abs/2407.21073},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.21073},
  doi          = {10.48550/ARXIV.2407.21073},
  eprinttype    = {arXiv},
  eprint       = {2407.21073},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-21073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2408-04369,
  author       = {Subhasis Dasgupta and
                  Soumya Roy and
                  Jaydip Sen},
  title        = {Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings:
                  An Indian Perspective},
  journal      = {CoRR},
  volume       = {abs/2408.04369},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2408.04369},
  doi          = {10.48550/ARXIV.2408.04369},
  eprinttype    = {arXiv},
  eprint       = {2408.04369},
  timestamp    = {Fri, 13 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2408-04369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-00258,
  author       = {Jaydip Sen and
                  Subhasis Dasgupta},
  title        = {Data Privacy Preservation on the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/2304.00258},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.00258},
  doi          = {10.48550/ARXIV.2304.00258},
  eprinttype    = {arXiv},
  eprint       = {2304.00258},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-00258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-17523,
  author       = {Jaydip Sen and
                  Aditya Jaiswal and
                  Anshuman Pathak and
                  Atish Kumar Majee and
                  Kushagra Kumar and
                  Manas Kumar Sarkar and
                  Soubhik Maji},
  title        = {A Comparative Analysis of Portfolio Optimization Using Mean-Variance,
                  Hierarchical Risk Parity, and Reinforcement Learning Approaches on
                  the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2305.17523},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.17523},
  doi          = {10.48550/ARXIV.2305.17523},
  eprinttype    = {arXiv},
  eprint       = {2305.17523},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-17523.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-00872,
  author       = {Jaydip Sen},
  title        = {Cryptography and Key Management Schemes for Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/2307.00872},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.00872},
  doi          = {10.48550/ARXIV.2307.00872},
  eprinttype    = {arXiv},
  eprint       = {2307.00872},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-00872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-02055,
  author       = {Jaydip Sen and
                  Subhasis Dasgupta},
  title        = {Adversarial Attacks on Image Classification Models: {FGSM} and Patch
                  Attacks and their Impact},
  journal      = {CoRR},
  volume       = {abs/2307.02055},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.02055},
  doi          = {10.48550/ARXIV.2307.02055},
  eprinttype    = {arXiv},
  eprint       = {2307.02055},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-02055.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-05048,
  author       = {Jaydip Sen and
                  Subhasis Dasgupta},
  title        = {Portfolio Optimization: {A} Comparative Study},
  journal      = {CoRR},
  volume       = {abs/2307.05048},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.05048},
  doi          = {10.48550/ARXIV.2307.05048},
  eprinttype    = {arXiv},
  eprint       = {2307.05048},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-05048.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-13696,
  author       = {Abhiraj Sen and
                  Jaydip Sen},
  title        = {Performance Evaluation of Equal-Weight Portfolio and Optimum Risk
                  Portfolio on Indian Stocks},
  journal      = {CoRR},
  volume       = {abs/2309.13696},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.13696},
  doi          = {10.48550/ARXIV.2309.13696},
  eprinttype    = {arXiv},
  eprint       = {2309.13696},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-13696.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-09770,
  author       = {Jaydip Sen and
                  Arup Dasgupta and
                  Subhasis Dasgupta and
                  Sayantani Roy Choudhury},
  title        = {A Portfolio Rebalancing Approach for the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2310.09770},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.09770},
  doi          = {10.48550/ARXIV.2310.09770},
  eprinttype    = {arXiv},
  eprint       = {2310.09770},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-09770.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-14748,
  author       = {Jaydip Sen and
                  Arup Dasgupta and
                  Partha Pratim Sengupta and
                  Sayantani Roy Choudhury},
  title        = {A Comparative Study of Portfolio Optimization Methods for the Indian
                  Stock Market},
  journal      = {CoRR},
  volume       = {abs/2310.14748},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.14748},
  doi          = {10.48550/ARXIV.2310.14748},
  eprinttype    = {arXiv},
  eprint       = {2310.14748},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-14748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-16880,
  author       = {Jaydip Sen and
                  Abhiraj Sen and
                  Ananda Chatterjee},
  title        = {Adversarial Attacks on Image Classification Models: Analysis and Defense},
  journal      = {CoRR},
  volume       = {abs/2312.16880},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.16880},
  doi          = {10.48550/ARXIV.2312.16880},
  eprinttype    = {arXiv},
  eprint       = {2312.16880},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-16880.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/DasguptaS22,
  author       = {Subhasis Dasgupta and
                  Jaydip Sen},
  title        = {A Framework of Customer Review Analysis Using the Aspect-Based Opinion
                  Mining Approach},
  booktitle    = {{OITS} International Conference on Information Technology, {OCIT}
                  2022, Bhubaneswar, India, December 14-16, 2022},
  pages        = {233--237},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/OCIT56763.2022.00052},
  doi          = {10.1109/OCIT56763.2022.00052},
  timestamp    = {Fri, 10 Mar 2023 12:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/cit/DasguptaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/Sen22,
  author       = {Jaydip Sen},
  title        = {Optimum Pair-Trading Strategies for Stocks Using Cointegration-Based
                  Approach},
  booktitle    = {{OITS} International Conference on Information Technology, {OCIT}
                  2022, Bhubaneswar, India, December 14-16, 2022},
  pages        = {371--375},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/OCIT56763.2022.00076},
  doi          = {10.1109/OCIT56763.2022.00076},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cit/Sen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-01943,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Rajdeep Sen and
                  Abhishek Dutta and
                  Pooja Kherwa and
                  Saheel Ahmed and
                  Pranay Berry and
                  Sahil Khurana and
                  Sonali Singh and
                  David W. W. Cadotte and
                  David W. Anderson and
                  Kalum J. Ost and
                  Racheal S. Akinbo and
                  Oladunni A. Daramola and
                  Bongs Lainjo},
  title        = {Machine Learning: Algorithms, Models, and Applications},
  journal      = {CoRR},
  volume       = {abs/2201.01943},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.01943},
  eprinttype    = {arXiv},
  eprint       = {2201.01943},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-01943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-05570,
  author       = {Jaydip Sen and
                  Ashwin Kumar R. S and
                  Geetha Joseph and
                  Kaushik Muthukrishnan and
                  Koushik Tulasi and
                  Praveen Varukolu},
  title        = {Precise Stock Price Prediction for Robust Portfolio Design from Selected
                  Sectors of the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2201.05570},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.05570},
  eprinttype    = {arXiv},
  eprint       = {2201.05570},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-05570.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-02723,
  author       = {Jaydip Sen and
                  Saikat Mondal and
                  Sidra Mehtab},
  title        = {Portfolio Optimization on {NIFTY} Thematic Sector Stocks Using an
                  {LSTM} Model},
  journal      = {CoRR},
  volume       = {abs/2202.02723},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.02723},
  eprinttype    = {arXiv},
  eprint       = {2202.02723},
  timestamp    = {Thu, 10 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-02723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-02728,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Abhishek Dutta and
                  Saikat Mondal},
  title        = {Hierarchical Risk Parity and Minimum Variance Portfolio Design on
                  {NIFTY} 50 Stocks},
  journal      = {CoRR},
  volume       = {abs/2202.02728},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.02728},
  eprinttype    = {arXiv},
  eprint       = {2202.02728},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-02728.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-01326,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Abhishek Dutta and
                  Saikat Mondal},
  title        = {Precise Stock Price Prediction for Optimized Portfolio Design Using
                  an {LSTM} Model},
  journal      = {CoRR},
  volume       = {abs/2203.01326},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.01326},
  doi          = {10.48550/ARXIV.2203.01326},
  eprinttype    = {arXiv},
  eprint       = {2203.01326},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-01326.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-01850,
  author       = {Jaydip Sen and
                  Saikat Mondal and
                  Gourab Nath},
  title        = {Robust Portfolio Design and Stock Price Prediction Using an Optimized
                  {LSTM} Model},
  journal      = {CoRR},
  volume       = {abs/2204.01850},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.01850},
  doi          = {10.48550/ARXIV.2204.01850},
  eprinttype    = {arXiv},
  eprint       = {2204.01850},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-01850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-07166,
  author       = {Jaydip Sen and
                  Arpit Awad and
                  Aaditya Raj and
                  Gourav Ray and
                  Pusparna Chakraborty and
                  Sanket Das and
                  Subhasmita Mishra},
  title        = {Stock Performance Evaluation for Portfolio Design from Different Sectors
                  of the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2208.07166},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.07166},
  doi          = {10.48550/ARXIV.2208.07166},
  eprinttype    = {arXiv},
  eprint       = {2208.07166},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-07166.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-00984,
  author       = {Jaydip Sen and
                  Abhishek Dutta},
  title        = {A Comparative Study of Hierarchical Risk Parity Portfolio and Eigen
                  Portfolio on the {NIFTY} 50 Stocks},
  journal      = {CoRR},
  volume       = {abs/2210.00984},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.00984},
  doi          = {10.48550/ARXIV.2210.00984},
  eprinttype    = {arXiv},
  eprint       = {2210.00984},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-00984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-02126,
  author       = {Ananda Chatterjee and
                  Hrisav Bhowmick and
                  Jaydip Sen},
  title        = {Stock Volatility Prediction using Time Series and Deep Learning Approach},
  journal      = {CoRR},
  volume       = {abs/2210.02126},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.02126},
  doi          = {10.48550/ARXIV.2210.02126},
  eprinttype    = {arXiv},
  eprint       = {2210.02126},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-02126.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-07080,
  author       = {Jaydip Sen},
  title        = {Designing Efficient Pair-Trading Strategies Using Cointegration for
                  the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2211.07080},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.07080},
  doi          = {10.48550/ARXIV.2211.07080},
  eprinttype    = {arXiv},
  eprint       = {2211.07080},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-07080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-10051,
  author       = {Subhasis Dasgupta and
                  Jaydip Sen},
  title        = {A Framework of Customer Review Analysis Using the Aspect-Based Opinion
                  Mining Approach},
  journal      = {CoRR},
  volume       = {abs/2212.10051},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.10051},
  doi          = {10.48550/ARXIV.2212.10051},
  eprinttype    = {arXiv},
  eprint       = {2212.10051},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-10051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/SenMDM21,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Abhishek Dutta and
                  Saikat Mondal},
  title        = {Precise Stock Price Prediction for Optimized Portfolio Design Using
                  an {LSTM} Model},
  booktitle    = {19th {OITS} International Conference on Information Technology, {OCIT}
                  2019, Bhubaneswar, India, December 16-18, 2021},
  pages        = {210--215},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/OCIT53463.2021.00050},
  doi          = {10.1109/OCIT53463.2021.00050},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/SenMDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-15096,
  author       = {Jaydip Sen and
                  Sidra Mehtab},
  title        = {Accurate Stock Price Forecasting Using Robust and Optimized Deep Learning
                  Models},
  journal      = {CoRR},
  volume       = {abs/2103.15096},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.15096},
  eprinttype    = {arXiv},
  eprint       = {2103.15096},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-15096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-06259,
  author       = {Jaydip Sen and
                  Abhishek Dutta and
                  Sidra Mehtab},
  title        = {Profitability Analysis in Stock Investment Using an LSTM-Based Deep
                  Learning Model},
  journal      = {CoRR},
  volume       = {abs/2104.06259},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.06259},
  eprinttype    = {arXiv},
  eprint       = {2104.06259},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-06259.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00650,
  author       = {Gourab Nath and
                  Jaydip Sen},
  title        = {An Algorithm for Recommending Groceries Based on an Item Ranking Method},
  journal      = {CoRR},
  volume       = {abs/2105.00650},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00650},
  eprinttype    = {arXiv},
  eprint       = {2105.00650},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00650.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13898,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Abhishek Dutta},
  title        = {Volatility Modeling of Stocks from Selected Sectors of the Indian
                  Economy Using {GARCH}},
  journal      = {CoRR},
  volume       = {abs/2105.13898},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13898},
  eprinttype    = {arXiv},
  eprint       = {2105.13898},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13898.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-09664,
  author       = {Jaydip Sen and
                  Sidra Mehtab},
  title        = {Design and Analysis of Robust Deep Learning Models for Stock Price
                  Prediction},
  journal      = {CoRR},
  volume       = {abs/2106.09664},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.09664},
  eprinttype    = {arXiv},
  eprint       = {2106.09664},
  timestamp    = {Thu, 01 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-09664.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-11371,
  author       = {Jaydip Sen and
                  Sidra Mehtab},
  title        = {Optimum Risk Portfolio and Eigen Portfolio: {A} Comparative Analysis
                  Using Selected Stocks from the Indian Stock Market},
  journal      = {CoRR},
  volume       = {abs/2107.11371},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.11371},
  eprinttype    = {arXiv},
  eprint       = {2107.11371},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-11371.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11999,
  author       = {Jaydip Sen and
                  Rajdeep Sen and
                  Abhishek Dutta},
  title        = {Machine Learning in Finance-Emerging Trends and Challenges},
  journal      = {CoRR},
  volume       = {abs/2110.11999},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11999},
  eprinttype    = {arXiv},
  eprint       = {2110.11999},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-01137,
  author       = {Ananda Chatterjee and
                  Hrisav Bhowmick and
                  Jaydip Sen},
  title        = {Stock Price Prediction Using Time Series, Econometric, Machine Learning,
                  and Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2111.01137},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.01137},
  eprinttype    = {arXiv},
  eprint       = {2111.01137},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-01137.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04709,
  author       = {Jaydip Sen and
                  Abhishek Dutta and
                  Sidra Mehtab},
  title        = {Stock Portfolio Optimization Using a Deep Learning {LSTM} Model},
  journal      = {CoRR},
  volume       = {abs/2111.04709},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04709},
  eprinttype    = {arXiv},
  eprint       = {2111.04709},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04709.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04976,
  author       = {Jaydip Sen and
                  Saikat Mondal and
                  Sidra Mehtab},
  title        = {Analysis of Sectoral Profitability of the Indian Stock Market Using
                  an {LSTM} Regression Model},
  journal      = {CoRR},
  volume       = {abs/2111.04976},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04976},
  eprinttype    = {arXiv},
  eprint       = {2111.04976},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04976.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12463,
  author       = {Hrisav Bhowmick and
                  Ananda Chatterjee and
                  Jaydip Sen},
  title        = {Comprehensive Movie Recommendation System},
  journal      = {CoRR},
  volume       = {abs/2112.12463},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12463},
  eprinttype    = {arXiv},
  eprint       = {2112.12463},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12463.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-09769,
  author       = {Sidra Mehtab and
                  Jaydip Sen},
  title        = {Stock Price Prediction Using Convolutional Neural Networks on a Multivariate
                  Timeseries},
  journal      = {CoRR},
  volume       = {abs/2001.09769},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.09769},
  eprinttype    = {arXiv},
  eprint       = {2001.09769},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-09769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-11697,
  author       = {Sidra Mehtab and
                  Jaydip Sen},
  title        = {A Time Series Analysis-Based Stock Price Prediction Using Machine
                  Learning and Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2004.11697},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.11697},
  eprinttype    = {arXiv},
  eprint       = {2004.11697},
  timestamp    = {Wed, 29 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-11697.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-16147,
  author       = {Jaydip Sen and
                  Sidra Mehtab and
                  Michael Ekonde Sone and
                  Jyothsna Veeramreddy and
                  Koneti Munivara Prasad and
                  Rajeev Singh and
                  Teek Parval Sharma and
                  Anton Noskov and
                  Ignacio Vel{\'{a}}squez and
                  Ang{\'{e}}lica Caro and
                  Alfonco Rodriguez and
                  Tamer S. A. Fatayer and
                  Altaf O. Mulani and
                  Pradeep B. Mane and
                  Roshan Chitrakar and
                  Roshan Bhusal and
                  Prajwol Maharjan},
  title        = {Computer and Network Security},
  journal      = {CoRR},
  volume       = {abs/2007.16147},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.16147},
  eprinttype    = {arXiv},
  eprint       = {2007.16147},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-16147.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-06709,
  author       = {Jaydip Sen and
                  Sidra Mehtab},
  title        = {Machine Learning Applications in Misuse and Anomaly Detection},
  journal      = {CoRR},
  volume       = {abs/2009.06709},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.06709},
  eprinttype    = {arXiv},
  eprint       = {2009.06709},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-06709.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-10819,
  author       = {Sidra Mehtab and
                  Jaydip Sen and
                  Abhishek Dutta},
  title        = {Stock Price Prediction Using Machine Learning and LSTM-Based Deep
                  Learning Models},
  journal      = {CoRR},
  volume       = {abs/2009.10819},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.10819},
  eprinttype    = {arXiv},
  eprint       = {2009.10819},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-10819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13891,
  author       = {Sidra Mehtab and
                  Jaydip Sen},
  title        = {Stock Price Prediction Using {CNN} and LSTM-Based Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2010.13891},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13891},
  eprinttype    = {arXiv},
  eprint       = {2010.13891},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13891.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-08011,
  author       = {Sidra Mehtab and
                  Jaydip Sen and
                  Subhasis Dasgupta},
  title        = {Analysis and Forecasting of Financial Time Series Using {CNN} and
                  LSTM-Based Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2011.08011},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.08011},
  eprinttype    = {arXiv},
  eprint       = {2011.08011},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-08011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-07700,
  author       = {Sidra Mehtab and
                  Jaydip Sen},
  title        = {A Robust Predictive Model for Stock Price Prediction Using Deep Learning
                  and Natural Language Processing},
  journal      = {CoRR},
  volume       = {abs/1912.07700},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.07700},
  eprinttype    = {arXiv},
  eprint       = {1912.07700},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-07700.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09390,
  author       = {Jaydip Sen and
                  Moonkun Lee and
                  Sunghyeon Lee and
                  Yeongbok Choe and
                  Menachem Domb and
                  Arpan Pal and
                  Hemant Kumar Rath and
                  Samar Shailendra and
                  Abhijan Bhattacharyya and
                  Albena Mihovska and
                  Mahasweta Sarkar and
                  Hyun Jung Lee and
                  Myungho Kim and
                  Alexandru Averian},
  title        = {Internet of Things: Technology, Applications and Standardardization},
  journal      = {CoRR},
  volume       = {abs/1808.09390},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.09390},
  eprinttype    = {arXiv},
  eprint       = {1808.09390},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-09390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicba/MondalS17,
  author       = {Sanjana Mondal and
                  Jaydip Sen},
  editor       = {Jyotsna Kumar Mandal and
                  Paramartha Dutta and
                  Somnath Mukhopadhyay},
  title        = {A Framework of Predictive Analysis of Tourist Inflow in the Beaches
                  of West Bengal: {A} Study of Digha-Mandarmoni Beach},
  booktitle    = {Computational Intelligence, Communications, and Business Analytics
                  - First International Conference, {CICBA} 2017, Kolkata, India, March
                  24-25, 2017, Revised Selected Papers, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {775},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-6427-2\_14},
  doi          = {10.1007/978-981-10-6427-2\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cicba/MondalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BiswasS17,
  author       = {Sanjib Biswas and
                  Jaydip Sen},
  title        = {A Proposed Architecture for Big Data Driven Supply Chain Analytics},
  journal      = {CoRR},
  volume       = {abs/1705.04958},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.04958},
  eprinttype    = {arXiv},
  eprint       = {1705.04958},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BiswasS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenZWZYWLAFOSKA17,
  author       = {Jaydip Sen and
                  Shanrong Zhao and
                  Xiaoying Wang and
                  Guojing Zhang and
                  Mengqin Yang and
                  Jian Wang and
                  Yun Long and
                  Sergey Andreev and
                  Roman Florea and
                  Aleksandr Ometov and
                  Adam Surak and
                  Yevgeni Koucheryavy and
                  Muhammad A. Ashraf and
                  Waleed Tariq Sethi and
                  Abdullah Alfakhri and
                  Saleh A. Alshebeili and
                  Amr Alasaad},
  title        = {Cloud Computing - Architecture and Applications},
  journal      = {CoRR},
  volume       = {abs/1707.09488},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.09488},
  eprinttype    = {arXiv},
  eprint       = {1707.09488},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenZWZYWLAFOSKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenFCSZJDBHLLEF17,
  author       = {Jaydip Sen and
                  Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nilay K. Sangani and
                  Haroot Zarger and
                  Faouzi Ja{\"{\i}}di and
                  Bob Duncan and
                  Alfred Bratterud and
                  Andreas Happe and
                  Chin{-}Feng Lin and
                  Che{-}Wei Liu and
                  Walid Elgenaidi and
                  Muftah Fraifer and
                  Thomas Newe and
                  Eoin O'Connell and
                  Avijit Mathur and
                  Ruolin Zhang and
                  Eric Filiol},
  title        = {Advances in Security in Computing and Communications},
  journal      = {CoRR},
  volume       = {abs/1707.09526},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.09526},
  eprinttype    = {arXiv},
  eprint       = {1707.09526},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenFCSZJDBHLLEF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1601-02407,
  author       = {Jaydip Sen and
                  Tamal Datta Chaudhuri},
  title        = {Decomposition of Time Series Data of Stock Markets and its Implications
                  for Prediction: An Application for the Indian Auto Sector},
  journal      = {CoRR},
  volume       = {abs/1601.02407},
  year         = {2016},
  url          = {https://doi.org/10.48550/arXiv.1601.02407},
  doi          = {10.48550/ARXIV.1601.02407},
  eprinttype    = {arXiv},
  eprint       = {1601.02407},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1601-02407.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenC16,
  author       = {Jaydip Sen and
                  Tamal Datta Chaudhuri},
  title        = {A Framework for Predictive Analysis of Stock Market Indices : {A}
                  Study of the Indian Auto Sector},
  journal      = {CoRR},
  volume       = {abs/1604.04044},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.04044},
  eprinttype    = {arXiv},
  eprint       = {1604.04044},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenC16a,
  author       = {Jaydip Sen and
                  Tamal Datta Chaudhuri},
  title        = {An Alternative Framework for Time Series Decomposition and Forecasting
                  and its Relevance for Portfolio Choice: {A} Comparative Study of the
                  Indian Consumer Durable and Small Cap Sectors},
  journal      = {CoRR},
  volume       = {abs/1605.03930},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.03930},
  eprinttype    = {arXiv},
  eprint       = {1605.03930},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenC16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/Sen13,
  author       = {Jaydip Sen},
  title        = {Secure and user privacy-preserving searching in peer-to-peer networks},
  journal      = {Log. J. {IGPL}},
  volume       = {21},
  number       = {4},
  pages        = {603--629},
  year         = {2013},
  url          = {https://doi.org/10.1093/jigpal/jzs036},
  doi          = {10.1093/JIGPAL/JZS036},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igpl/Sen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/13/Sen13,
  author       = {Jaydip Sen},
  editor       = {Shafiullah Khan and
                  Al{-}Sakib Khan Pathan},
  title        = {Security and Privacy Issues in Wireless Mesh Networks: {A} Survey},
  booktitle    = {Wireless Networks and Security, Issues, Challenges and Research Trends},
  pages        = {189--272},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36169-2\_7},
  doi          = {10.1007/978-3-642-36169-2\_7},
  timestamp    = {Thu, 14 Oct 2021 08:45:59 +0200},
  biburl       = {https://dblp.org/rec/books/sp/13/Sen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/Sen13,
  author       = {Jaydip Sen},
  editor       = {Nik Bessis and
                  Fatos Xhafa and
                  Dora Varvarigou and
                  Richard Hill and
                  Maozhen Li},
  title        = {An Efficient, Secure and User Privacy-Preserving Search Protocol for
                  Peer-to-Peer Networks},
  booktitle    = {Internet of Things and Inter-cooperative Computational Technologies
                  for Collective Intelligence},
  series       = {Studies in Computational Intelligence},
  volume       = {460},
  pages        = {279--320},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-34952-2\_12},
  doi          = {10.1007/978-3-642-34952-2\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/Sen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-5065,
  author       = {Jaydip Sen},
  title        = {Security in Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1301.5065},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.5065},
  eprinttype    = {arXiv},
  eprint       = {1301.5065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-5065.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-0939,
  author       = {Jaydip Sen},
  title        = {Security and Privacy Issues in Wireless Mesh Networks: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/1302.0939},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.0939},
  eprinttype    = {arXiv},
  eprint       = {1302.0939},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-0939.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-2253,
  author       = {Jaydip Sen},
  title        = {Security and Privacy Challenges in Cognitive Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1302.2253},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.2253},
  eprinttype    = {arXiv},
  eprint       = {1302.2253},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-2253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4882,
  author       = {Jaydip Sen},
  title        = {Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1302.4882},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4882},
  eprinttype    = {arXiv},
  eprint       = {1302.4882},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4882.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-4814,
  author       = {Jaydip Sen},
  title        = {Security and Privacy Issues in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1303.4814},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.4814},
  eprinttype    = {arXiv},
  eprint       = {1303.4814},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-4814.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-5886,
  author       = {Jaydip Sen},
  title        = {Homomorphic Encryption: Theory {\&} Applications},
  journal      = {CoRR},
  volume       = {abs/1305.5886},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.5886},
  eprinttype    = {arXiv},
  eprint       = {1305.5886},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-5886.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Sen13,
  author       = {Jaydip Sen},
  title        = {A Survey on Security and Privacy Protocols for Cognitive Wireless
                  Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1308.0682},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.0682},
  eprinttype    = {arXiv},
  eprint       = {1308.0682},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Sen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen12,
  author       = {Jaydip Sen},
  title        = {A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer
                  Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/139},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-4536,
  author       = {Jaydip Sen},
  title        = {A Multi-Path Certification Protocol for Mobile Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1201.4536},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.4536},
  eprinttype    = {arXiv},
  eprint       = {1201.4536},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-4536.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-0732,
  author       = {Jaydip Sen},
  title        = {Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1203.0732},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.0732},
  eprinttype    = {arXiv},
  eprint       = {1203.0732},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-0732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-1175,
  author       = {Jaydip Sen},
  title        = {Secure and Privacy-Preserving Data Aggregation Protocols for Wireless
                  Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1203.1175},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.1175},
  eprinttype    = {arXiv},
  eprint       = {1203.1175},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-1175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-1803,
  author       = {Jaydip Sen},
  title        = {Secure and Privacy-Preserving Authentication Protocols for Wireless
                  Mesh Networks},
  journal      = {CoRR},
  volume       = {abs/1209.1803},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.1803},
  eprinttype    = {arXiv},
  eprint       = {1209.1803},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-1803.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/BandyopadhyayS11,
  author       = {Debasis Bandyopadhyay and
                  Jaydip Sen},
  title        = {Internet of Things: Applications and Challenges in Technology and
                  Standardization},
  journal      = {Wirel. Pers. Commun.},
  volume       = {58},
  number       = {1},
  pages        = {49--69},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11277-011-0288-5},
  doi          = {10.1007/S11277-011-0288-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/BandyopadhyayS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acc/Sen11,
  author       = {Jaydip Sen},
  editor       = {Ajith Abraham and
                  Jaime Lloret Mauri and
                  John F. Buford and
                  Junichi Suzuki and
                  Sabu M. Thampi},
  title        = {An Anonymous Authentication and Communication Protocol for Wireless
                  Mesh Networks},
  booktitle    = {Advances in Computing and Communications - First International Conference,
                  {ACC} 2011, Kochi, India, July 22-24, 2011, Proceedings, Part {IV}},
  series       = {Communications in Computer and Information Science},
  volume       = {193},
  pages        = {580--592},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22726-4\_60},
  doi          = {10.1007/978-3-642-22726-4\_60},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acc/Sen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/Sen11,
  author       = {Jaydip Sen},
  editor       = {{\'{A}}lvaro Herrero and
                  Emilio Corchado},
  title        = {A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer
                  Network},
  booktitle    = {Computational Intelligence in Security for Information Systems - 4th
                  International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga,
                  Spain, June 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6694},
  pages        = {100--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21323-6\_13},
  doi          = {10.1007/978-3-642-21323-6\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/Sen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/delta/Sen11,
  author       = {Jaydip Sen},
  title        = {A Robust and Secure Aggregation Protocol for Wireless Sensor Networks},
  booktitle    = {Sixth {IEEE} International Symposium on Electronic Design, Test and
                  Application, {DELTA} 2011, Queenstown, New Zealand, 17-19 January,
                  2011},
  pages        = {222--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DELTA.2011.59},
  doi          = {10.1109/DELTA.2011.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/delta/Sen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Sen11,
  author       = {Jaydip Sen},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure and Privacy-Aware Searching in Peer-to-Peer Networks},
  booktitle    = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
                  Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
                  Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7122},
  pages        = {72--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28879-1\_6},
  doi          = {10.1007/978-3-642-28879-1\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Sen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/UkilS11,
  author       = {Arijit Ukil and
                  Jaydip Sen},
  editor       = {Beniamino Murgante and
                  Osvaldo Gervasi and
                  Andr{\'{e}}s Iglesias and
                  David Taniar and
                  Bernady O. Apduhan},
  title        = {A Secure Privacy Preserved Data Aggregation Scheme in Non Hierarchical
                  Networks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2011 - International
                  Conference, Santander, Spain, June 20-23, 2011. Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6785},
  pages        = {436--451},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21898-9\_37},
  doi          = {10.1007/978-3-642-21898-9\_37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/UkilS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/SenM11,
  author       = {Jaydip Sen and
                  Subhamoy Maitra},
  editor       = {Peeter Laud},
  title        = {An Attack on Privacy Preserving Data Aggregation Protocol for Wireless
                  Sensor Networks},
  booktitle    = {Information Security Technology for Applications - 16th Nordic Conference
                  on Secure {IT} Systems, NordSec 2011, Tallinn, Estonia, October 26-28,
                  2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7161},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29615-4\_15},
  doi          = {10.1007/978-3-642-29615-4\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/SenM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0241,
  author       = {Jaydip Sen},
  title        = {An Intrusion Detection Architecture for Clustered Wireless Ad Hoc
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1101.0241},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0241},
  eprinttype    = {arXiv},
  eprint       = {1101.0241},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0241.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0244,
  author       = {Jaydip Sen},
  title        = {A Robust and Efficient Node Authentication Protocol for Mobile Ad
                  Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1101.0244},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0244},
  eprinttype    = {arXiv},
  eprint       = {1101.0244},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0244.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0248,
  author       = {Jaydip Sen},
  title        = {A Robust and Fault-Tolerant Distributed Intrusion Detection System},
  journal      = {CoRR},
  volume       = {abs/1101.0248},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0248},
  eprinttype    = {arXiv},
  eprint       = {1101.0248},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-0250,
  author       = {Jaydip Sen},
  title        = {An Adaptive and Multi-Service Routing Protocol for Wireless Sensor
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1101.0250},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.0250},
  eprinttype    = {arXiv},
  eprint       = {1101.0250},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-0250.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2715,
  author       = {Jaydip Sen},
  title        = {A Novel Mechanism for Detection of Distributed Denial of Service Attacks},
  journal      = {CoRR},
  volume       = {abs/1101.2715},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.2715},
  eprinttype    = {arXiv},
  eprint       = {1101.2715},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-2715.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2753,
  author       = {Jaydip Sen},
  title        = {An Efficient and User Privacy-Preserving Routing Protocol for Wireless
                  Mesh Networks},
  journal      = {CoRR},
  volume       = {abs/1101.2753},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.2753},
  eprinttype    = {arXiv},
  eprint       = {1101.2753},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-2753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-2759,
  author       = {Jaydip Sen},
  title        = {Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses},
  journal      = {CoRR},
  volume       = {abs/1101.2759},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.2759},
  eprinttype    = {arXiv},
  eprint       = {1101.2759},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-2759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-3076,
  author       = {Jaydip Sen},
  title        = {A Robust and Secure Aggregation Protocol for Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1101.3076},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.3076},
  eprinttype    = {arXiv},
  eprint       = {1101.3076},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-3076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-1226,
  author       = {Jaydip Sen},
  title        = {Secure Routing in Wireless Mesh Networks},
  journal      = {CoRR},
  volume       = {abs/1102.1226},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.1226},
  eprinttype    = {arXiv},
  eprint       = {1102.1226},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-1226.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1103-3333,
  author       = {Jaydip Sen},
  title        = {A Robust Mechanism for Defending Distributed Denial {OF} Service Attacks
                  on Web Servers},
  journal      = {CoRR},
  volume       = {abs/1103.3333},
  year         = {2011},
  url          = {http://arxiv.org/abs/1103.3333},
  eprinttype    = {arXiv},
  eprint       = {1103.3333},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1103-3333.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-1693,
  author       = {Debasis Bandyopadhyay and
                  Jaydip Sen},
  title        = {Internet of Things: Applications and Challenges in Technology and
                  Standardization},
  journal      = {CoRR},
  volume       = {abs/1105.1693},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.1693},
  eprinttype    = {arXiv},
  eprint       = {1105.1693},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-1693.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-0969,
  author       = {Arijit Ukil and
                  Jaydip Sen and
                  Debasish Bera},
  title        = {Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation
                  Algorithm in Dynamic {OFDMA} Systems},
  journal      = {CoRR},
  volume       = {abs/1106.0969},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.0969},
  eprinttype    = {arXiv},
  eprint       = {1106.0969},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-0969.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-1038,
  author       = {Arijit Ukil and
                  Jaydip Sen and
                  Debasish Bera},
  title        = {Dynamic {OFDMA} Resource Allocation for QoS Guarantee and System Optimization
                  of Best Effort and Non Real-time Traffic},
  journal      = {CoRR},
  volume       = {abs/1107.1038},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.1038},
  eprinttype    = {arXiv},
  eprint       = {1107.1038},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-1038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-5538,
  author       = {Jaydip Sen},
  title        = {An Anonymous Authentication and Communication Protocol for Wireless
                  Mesh Networks},
  journal      = {CoRR},
  volume       = {abs/1107.5538},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.5538},
  eprinttype    = {arXiv},
  eprint       = {1107.5538},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-5538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-0150,
  author       = {Jaydip Sen},
  title        = {Secure and Privacy- Aware Searching in Peer-to-Peer Networks},
  journal      = {CoRR},
  volume       = {abs/1110.0150},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.0150},
  eprinttype    = {arXiv},
  eprint       = {1110.0150},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-0150.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0382,
  author       = {Jaydip Sen},
  title        = {A Distributed Intrusion Detection System Using Cooperating Agents},
  journal      = {CoRR},
  volume       = {abs/1111.0382},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.0382},
  eprinttype    = {arXiv},
  eprint       = {1111.0382},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-0382.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0385,
  author       = {Jaydip Sen and
                  M. Girish Chandra and
                  P. Balamuralidhar and
                  Harihara S. G. and
                  Harish Reddy},
  title        = {A Distributed Protocol for Detection of Packet Dropping Attack in
                  Mobile Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1111.0385},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.0385},
  eprinttype    = {arXiv},
  eprint       = {1111.0385},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-0385.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0386,
  author       = {Jaydip Sen and
                  M. Girish Chandra and
                  Harihara S. G. and
                  Harish Reddy and
                  P. Balamuralidhar},
  title        = {A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1111.0386},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.0386},
  eprinttype    = {arXiv},
  eprint       = {1111.0386},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-0386.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0387,
  author       = {Jaydip Sen and
                  Sripad Koilakonda and
                  Arijit Ukil},
  title        = {A Mechanism for Detection of Cooperative Black Hole Attack in Mobile
                  Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1111.0387},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.0387},
  eprinttype    = {arXiv},
  eprint       = {1111.0387},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-0387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact-aicit/Sen10,
  author       = {Jaydip Sen},
  title        = {An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network},
  journal      = {Int. J. Adv. Comp. Techn.},
  volume       = {2},
  number       = {4},
  pages        = {57--66},
  year         = {2010},
  url          = {http://www.aicit.org/ijact/ppl/6-IJACT1-136044JE.pdf},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact-aicit/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen10,
  author       = {Jaydip Sen},
  title        = {An Agent-Based Intrusion Detection System for Local Area Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {2},
  number       = {2},
  year         = {2010},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/44},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Sen10,
  author       = {Jaydip Sen},
  title        = {An Efficient and User Privacy-Preserving Routing Protocol for Wireless
                  Mesh Networks},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {11},
  number       = {4},
  year         = {2010},
  url          = {http://www.scpe.org/index.php/scpe/article/view/666},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicsyn/Sen10,
  author       = {Jaydip Sen},
  editor       = {David Al{-}Dabass and
                  Athanasios A. Pantelous and
                  Alessandra Orsoni and
                  Ajith Abraham},
  title        = {An Intrusion Detection Architecture for Clustered Wireless Ad Hoc
                  Networks},
  booktitle    = {Second International Conference on Computational Intelligence, Communication
                  Systems and Networks, CICSyN 2010, Liverpool, UK, 28-30 July, 2010},
  pages        = {202--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CICSyN.2010.51},
  doi          = {10.1109/CICSYN.2010.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cicsyn/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisim/Sen10,
  author       = {Jaydip Sen},
  title        = {An efficient algorithm for detection of selfish packet dropping nodes
                  in Wireless Mesh Networks},
  booktitle    = {2010 International Conference on Computer Information Systems and
                  Industrial Management Applications, CISIM, Krakow, Poland, October
                  8-10, 2010},
  pages        = {283--288},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISIM.2010.5643647},
  doi          = {10.1109/CISIM.2010.5643647},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisim/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Sen10,
  author       = {Jaydip Sen},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes
                  in a Peer-to-Peer Wireless Mesh Network},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {528--537},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_53},
  doi          = {10.1007/978-3-642-14478-3\_53},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Sen10a,
  author       = {Jaydip Sen},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {538--547},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_54},
  doi          = {10.1007/978-3-642-14478-3\_54},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Sen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compute/SenU10,
  author       = {Jaydip Sen and
                  Arijit Ukil},
  editor       = {R. K. Shyamasundar and
                  Prasad Deshpande},
  title        = {A QoS-aware end-to-end connectivity management algorithm for mobile
                  applications},
  booktitle    = {Proceedings of the 3rd Bangalore Annual Compute Conference, Compute
                  2010, Bangalore, India, January 22-23, 2010},
  pages        = {4:1--4:9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1754288.1754292},
  doi          = {10.1145/1754288.1754292},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compute/SenU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/Sen10,
  author       = {Jaydip Sen},
  title        = {A Throughput Optimizing Routing Protocol for Wireless Mesh Networks},
  booktitle    = {12th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2010, 1-3 September 2010, Melbourne, Australia},
  pages        = {665--670},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/HPCC.2010.33},
  doi          = {10.1109/HPCC.2010.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Sen10,
  author       = {Jaydip Sen},
  editor       = {David Taniar and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Eric Pardede and
                  Bernady O. Apduhan},
  title        = {An Efficient and Reliable Routing Protocol for Wireless Mesh Networks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2010, International
                  Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6018},
  pages        = {246--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12179-1\_22},
  doi          = {10.1007/978-3-642-12179-1\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/SenU10,
  author       = {Jaydip Sen and
                  Arijit Ukil},
  editor       = {David Taniar and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Eric Pardede and
                  Bernady O. Apduhan},
  title        = {A Secure Routing Protocol for Wireless Sensor Networks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2010, International
                  Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6018},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12179-1\_25},
  doi          = {10.1007/978-3-642-12179-1\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/SenU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Sen10,
  author       = {Jaydip Sen},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer
                  Networks},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_7},
  doi          = {10.1007/978-3-642-17650-0\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-5176,
  author       = {Jaydip Sen},
  title        = {A Distributed Trust Management Framework for Detecting Malicious Packet
                  Dropping Nodes in a Mobile Ad Hoc Network},
  journal      = {CoRR},
  volume       = {abs/1010.5176},
  year         = {2010},
  url          = {http://arxiv.org/abs/1010.5176},
  eprinttype    = {arXiv},
  eprint       = {1010.5176},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1010-5176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1011-1529,
  author       = {Jaydip Sen},
  title        = {A Survey on Wireless Sensor Network Security},
  journal      = {CoRR},
  volume       = {abs/1011.1529},
  year         = {2010},
  url          = {http://arxiv.org/abs/1011.1529},
  eprinttype    = {arXiv},
  eprint       = {1011.1529},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-1529.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1011-1531,
  author       = {Jaydip Sen},
  title        = {An Agent-Based Intrusion Detection System for Local Area Networks},
  journal      = {CoRR},
  volume       = {abs/1011.1531},
  year         = {2010},
  url          = {http://arxiv.org/abs/1011.1531},
  eprinttype    = {arXiv},
  eprint       = {1011.1531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-1531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1011-1793,
  author       = {Jaydip Sen and
                  Kaustav Goswami},
  title        = {An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks},
  journal      = {CoRR},
  volume       = {abs/1011.1793},
  year         = {2010},
  url          = {http://arxiv.org/abs/1011.1793},
  eprinttype    = {arXiv},
  eprint       = {1011.1793},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-1793.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1011-1956,
  author       = {Jaydip Sen},
  title        = {Mobility and Handoff Management in Wireless Networks},
  journal      = {CoRR},
  volume       = {abs/1011.1956},
  year         = {2010},
  url          = {http://arxiv.org/abs/1011.1956},
  eprinttype    = {arXiv},
  eprint       = {1011.1956},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-1956.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2171,
  author       = {Jaydip Sen},
  title        = {A Robust and Efficient Trust Management Scheme for Peer-to-Peer Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2171},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2171},
  eprinttype    = {arXiv},
  eprint       = {1012.2171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2171.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2514,
  author       = {Jaydip Sen and
                  P. Balamuralidhar and
                  M. Girish Chandra and
                  Harihara S. G. and
                  Harish Reddy},
  title        = {Context Aware End-to-End Connectivity Management},
  journal      = {CoRR},
  volume       = {abs/1012.2514},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2514},
  eprinttype    = {arXiv},
  eprint       = {1012.2514},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2516,
  author       = {Jaydip Sen},
  title        = {An Efficient Security Mechanism for High-Integrity Wireless Sensor
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2516},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2516},
  eprinttype    = {arXiv},
  eprint       = {1012.2516},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2518,
  author       = {Jaydip Sen and
                  Shomik Bhattacharya},
  title        = {A Survey on Cross-Layer Design Frameworks for Multimedia Applications
                  over Wireless Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2518},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2518},
  eprinttype    = {arXiv},
  eprint       = {1012.2518},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2519,
  author       = {Jaydip Sen},
  title        = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2519},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2519},
  eprinttype    = {arXiv},
  eprint       = {1012.2519},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2519.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2520,
  author       = {Jaydip Sen},
  title        = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes
                  in a Peer-to-Peer Wireless Mesh Network},
  journal      = {CoRR},
  volume       = {abs/1012.2520},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2520},
  eprinttype    = {arXiv},
  eprint       = {1012.2520},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2524,
  author       = {Jaydip Sen and
                  Munir Sayyad and
                  Basavaraj Hooli},
  title        = {Convergence and Next Generation Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2524},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2524},
  eprinttype    = {arXiv},
  eprint       = {1012.2524},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2528,
  author       = {Jaydip Sen},
  title        = {A Secure Aggregation Protocol for Wireless Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2528},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2528},
  eprinttype    = {arXiv},
  eprint       = {1012.2528},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2529,
  author       = {Jaydip Sen},
  title        = {A Survey on Reputation and Trust-Based Systems for Wireless Communication
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2529},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2529},
  eprinttype    = {arXiv},
  eprint       = {1012.2529},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2529.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Sen09,
  author       = {Jaydip Sen},
  title        = {A Survey on Wireless Sensor Network Security},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {1},
  number       = {2},
  year         = {2009},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/16},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Sen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/SenUBP08,
  author       = {Jaydip Sen and
                  Arijit Ukil and
                  Debasish Bera and
                  Arpan Pal},
  title        = {A distributed intrusion detection system for wireless ad hoc networks},
  booktitle    = {Proceedings of the 16th International Conference on Networks, {ICON}
                  2008, December 12-14, 2008, held at India Habitat Centre, New Delhi,
                  India},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICON.2008.4772624},
  doi          = {10.1109/ICON.2008.4772624},
  timestamp    = {Wed, 22 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/SenUBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/SenCBGR07,
  author       = {Jaydip Sen and
                  M. Girish Chandra and
                  P. Balamuralidhar and
                  Harihara S. G. and
                  Harish Reddy},
  title        = {A Scheme of Certificate Authority for Ad Hoc Networks},
  booktitle    = {18th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany},
  pages        = {615--619},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DEXA.2007.90},
  doi          = {10.1109/DEXA.2007.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/SenCBGR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccta/SenCS07,
  author       = {Jaydip Sen and
                  Piyali Roy Chowdhury and
                  Indranil Sengupta},
  title        = {A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks},
  booktitle    = {2007 International Conference on Computing: Theory and Applications
                  {(ICCTA} 2007), 5-7 March 2007, Kolkata, India},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICCTA.2007.3},
  doi          = {10.1109/ICCTA.2007.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccta/SenCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/SenS07,
  author       = {Jaydip Sen and
                  Harihara Subramanyam},
  editor       = {Tomasz Janowski and
                  Hrushikesha Mohanty},
  title        = {An Efficient Certificate Authority for Ad Hoc Networks},
  booktitle    = {Distributed Computing and Internet Technology, 4th International Conference,
                  {ICDCIT} 2007, Bangalore, India, December 17-20, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4882},
  pages        = {97--109},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77115-9\_10},
  doi          = {10.1007/978-3-540-77115-9\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/SenS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/SenCS06,
  author       = {Jaydip Sen and
                  Piyali Roy Chowdhury and
                  Indranil Sengupta},
  editor       = {Soma Chaudhuri and
                  Samir R. Das and
                  Himadri S. Paul and
                  Srikanta Tirthapura},
  title        = {A Mechanism for Detection and Prevention of Distributed Denial of
                  Service Attacks},
  booktitle    = {Distributed Computing and Networking, 8th International Conference,
                  {ICDCN} 2006, Guwahati, India, December 27-30, 2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4308},
  pages        = {139--144},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11947950\_16},
  doi          = {10.1007/11947950\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/SenCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/SenS05,
  author       = {Jaydip Sen and
                  Indranil Sengupta},
  editor       = {Goutam Chakraborty},
  title        = {Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection
                  System},
  booktitle    = {Distributed Computing and Internet Technology, Second International
                  Conference, {ICDCIT} 2005, Bhubaneswar, India, December 22-24, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3816},
  pages        = {125--131},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604655\_16},
  doi          = {10.1007/11604655\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/SenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}