default search action
Nilesh Chakraborty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Katrin Klug, Katharina Beckh, Dario Antweiler, Nilesh Chakraborty, Giulia Baldini, Katharina Laue, René Hosch, Felix Nensa, Martin Schuler, Sven Giesselbach:
From admission to discharge: a systematic review of clinical natural language processing along the patient journey. BMC Medical Informatics Decis. Mak. 24(1): 238 (2024) - [c16]Youssef Yamout, Shahrear Iqbal, Nilesh Chakraborty, Mohammad Zulkernine:
Gait-based Authentication in Smart Aging Care Systems. CCECE 2024: 174-175 - [c15]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Building Secure Software for Smart Aging Care Systems: An Agile Approach. QRS 2024: 562-571 - [c14]Anika Anwar, Nilesh Chakraborty, Mohammad Zulkernine:
Secure OTA Software Updates for Connected Vehicles Using LoRaWAN and Blockchain. QRS Companion 2024: 1067-1076 - 2023
- [j14]Nilesh Chakraborty, Jianqiang Li, Victor C. M. Leung, Samrat Mondal, Yi Pan, Chengwen Luo, Mithun Mukherjee:
Honeyword-based Authentication Techniques for Protecting Passwords: A Survey. ACM Comput. Surv. 55(8): 169:1-169:37 (2023) - [j13]Min Fang, Yingru Chen, Rui Xue, Huihui Wang, Nilesh Chakraborty, Ting Su, Yuyan Dai:
A hybrid machine learning approach for hypertension risk prediction. Neural Comput. Appl. 35(20): 14487-14497 (2023) - [c13]Nilesh Chakraborty, Youssef Yamout, Mohammad Zulkernine:
The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords. CNS 2023: 1-5 - [c12]Nilesh Chakraborty, Shahrear Iqbal, Mohammad Zulkernine:
Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective. ICDH 2023: 1-12 - 2022
- [j12]Nilesh Chakraborty, Mithun Mukherjee, Jianqiang Li, Mohammad Shojafar, Yi Pan:
Cryptanalysis of a Honeyword System in the IoT Platform. IEEE Internet Things J. 9(4): 2614-2626 (2022) - [j11]Nilesh Chakraborty, Yao Chao, Jianqiang Li, Sumit Mishra, Chengwen Luo, Ying He, Jie Chen, Yi Pan:
RTT-Based Rogue UAV Detection in IoV Networks. IEEE Internet Things J. 9(8): 5909-5919 (2022) - 2021
- [j10]Nilesh Chakraborty, Samrat Mondal:
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries. Frontiers Comput. Sci. 15(2): 152803 (2021) - [j9]Nilesh Chakraborty, Jian-Qiang Li, Samrat Mondal, Chengwen Luo, Huihui Wang, Mamoun Alazab, Fei Chen, Yi Pan:
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things. IEEE Internet Things J. 8(5): 3255-3267 (2021) - [j8]Nilesh Chakraborty, Denis Lukovnikov, Gaurav Maheshwari, Priyansh Trivedi, Jens Lehmann, Asja Fischer:
Introduction to neural network-based question answering over knowledge graphs. WIREs Data Mining Knowl. Discov. 11(3) (2021) - 2020
- [j7]Nilesh Chakraborty, Yao Chao, Chengwen Luo, Jianqiang Li, Ziying Pan, Jie Chen, Yi Pan:
On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs. IEEE Trans. Cogn. Commun. Netw. 6(4): 1218-1229 (2020)
2010 – 2019
- 2019
- [j6]Nilesh Chakraborty, Jianqiang Li, Samrat Mondal, Fei Chen, Yi Pan:
On Overcoming the Identified Limitations of a Usable PIN Entry Method. IEEE Access 7: 124366-124378 (2019) - [j5]Nilesh Chakraborty, S. Vijay Anand, Samrat Mondal:
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services. Comput. Secur. 84: 193-205 (2019) - [j4]Nilesh Chakraborty, Samrat Mondal:
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. IET Inf. Secur. 13(1): 7-18 (2019) - [c11]Gaurav Maheshwari, Priyansh Trivedi, Denis Lukovnikov, Nilesh Chakraborty, Asja Fischer, Jens Lehmann:
Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs. ISWC (1) 2019: 487-504 - [i7]Nilesh Chakraborty, Denis Lukovnikov, Gaurav Maheshwari, Priyansh Trivedi, Jens Lehmann, Asja Fischer:
Introduction to Neural Network based Approaches for Question Answering over Knowledge Graphs. CoRR abs/1907.09361 (2019) - 2018
- [c10]Nilesh Chakraborty, Shreya Singh, Samrat Mondal:
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness. TrustCom/BigDataSE 2018: 444-455 - [i6]Gaurav Maheshwari, Priyansh Trivedi, Denis Lukovnikov, Nilesh Chakraborty, Asja Fischer, Jens Lehmann:
Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs. CoRR abs/1811.01118 (2018) - [i5]Denis Lukovnikov, Nilesh Chakraborty, Jens Lehmann, Asja Fischer:
Translating Natural Language to SQL using Pointer-Generator Networks and How Decoding Order Matters. CoRR abs/1811.05303 (2018) - 2017
- [j3]Nilesh Chakraborty, Samrat Mondal:
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. Comput. Secur. 66: 155-168 (2017) - [c9]Ivan Ermilov, Jens Lehmann, Gezim Sejdiu, Lorenz Bühmann, Patrick Westphal, Claus Stadler, Simon Bin, Nilesh Chakraborty, Henning Petzka, Muhammad Saleem, Axel-Cyrille Ngonga Ngomo, Hajira Jabeen:
The Tale of Sansa Spark. ISWC (Posters, Demos & Industry Tracks) 2017 - [c8]Jens Lehmann, Gezim Sejdiu, Lorenz Bühmann, Patrick Westphal, Claus Stadler, Ivan Ermilov, Simon Bin, Nilesh Chakraborty, Muhammad Saleem, Axel-Cyrille Ngonga Ngomo, Hajira Jabeen:
Distributed Semantic Analytics Using the SANSA Stack. ISWC (2) 2017: 147-155 - [i4]Nilesh Chakraborty, Samrat Mondal:
Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit. CoRR abs/1705.10747 (2017) - [i3]Nilesh Chakraborty, Samrat Mondal:
On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms. CoRR abs/1705.10771 (2017) - [i2]Nilesh Chakraborty, Shreya Singh, Samrat Mondal:
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness. CoRR abs/1708.01295 (2017) - 2016
- [c7]Milan Dojchinovski, Felix Sasaki, Tatjana Gornostaja, Sebastian Hellmann, Erik Mannens, Frank Salliau, Michele Osella, Phil Ritchie, Giannis Stoitsis, Kevin Koidl, Markus Ackermann, Nilesh Chakraborty:
FREME: Multilingual Semantic Enrichment with Linked Data and Language Technologies. LREC 2016 - [c6]Nilesh Chakraborty, S. Vijay Anand, Gurpinder Singh Randhawa, Samrat Mondal:
On Designing Leakage-Resilient Vibration Based Authentication Techniques. Trustcom/BigDataSE/ISPA 2016: 1875-1881 - 2015
- [j2]Nilesh Chakraborty, Samrat Mondal:
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack. Int. J. Trust. Manag. Comput. Commun. 3(2): 93-114 (2015) - [c5]Nilesh Chakraborty, Samrat Mondal:
Few notes towards making honeyword system more secure and usable. SIN 2015: 237-245 - [c4]Rajdeep Kumar Nath, Bibhash Sen, Rachit Daga, Nilesh Chakraborty, Harsh Tibrewal, Biplab K. Sikdar:
Fault masking in Quantum-dot cellular automata using prohibitive logic circuit. VDAT 2015: 1-5 - [i1]Nilesh Chakraborty, Samrat Mondal:
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability. CoRR abs/1509.06094 (2015) - 2014
- [j1]Nilesh Chakraborty, Samrat Mondal:
I-SLASS: an improved login approach over SLASS. Int. J. Trust. Manag. Comput. Commun. 2(4): 309-329 (2014) - [c3]Nilesh Chakraborty, Samrat Mondal:
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack. ICISS 2014: 298-317 - [c2]Nilesh Chakraborty, Samrat Mondal:
SLASS: Secure Login against Shoulder Surfing. SNDS 2014: 346-357 - [c1]Nilesh Chakraborty, Samrat Mondal:
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. SSCC 2014: 101-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint