default search action
Sanjay K. Sahay
Person information
- affiliation: Goa Campus, BITS, Pilani, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j14]Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay, Mohit Sewak:
Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301511 (2023) - [j13]Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:
Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses. Inf. Syst. Frontiers 25(2): 567-587 (2023) - [j12]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. Inf. Syst. Frontiers 25(2): 589-611 (2023) - 2022
- [j11]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for malware detection and forensics. Digit. Investig. 43(Supplement): 301444 (2022) - [j10]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
GreenForensics: Deep hybrid edge-cloud detection and forensics system for battery-performance-balance conscious devices. Digit. Investig. 43(Supplement): 301445 (2022) - [j9]Trupil Limbasiya, Sanjay K. Sahay, Debasis Das:
SAMPARK: Secure and lightweight communication protocols for smart parking management. J. Inf. Secur. Appl. 71: 103381 (2022) - [j8]Hemant Rathore, Animesh Sasan, Sanjay K. Sahay, Mohit Sewak:
Defending malware detection models against evasion based adversarial attacks. Pattern Recognit. Lett. 164: 119-125 (2022) - [j7]Hemant Rathore, Sujay C. Sharma, Sanjay K. Sahay, Mohit Sewak:
Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks? EAI Endorsed Trans. Scalable Inf. Syst. 10(1): e6 (2022) - 2021
- [j6]Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:
Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses. Digit. Investig. 37 Supplement: 301183 (2021) - [j5]Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala, Shambhu J. Upadhyaya:
Advances in Secure Knowledge Management in the Artificial Intelligence Era. Inf. Syst. Frontiers 23(4): 807-810 (2021) - [j4]Trupil Limbasiya, Sanjay Kumar Sahay, Bharath Sridharan:
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. Inf. Syst. Frontiers 23(4): 835-848 (2021) - [j3]Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak:
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning. Inf. Syst. Frontiers 23(4): 867-882 (2021) - 2019
- [j2]Ashu Sharma, Sanjay Kumar Sahay:
Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy. Int. J. Netw. Secur. 21(3): 409-417 (2019) - 2016
- [j1]Aruna Govada, Sanjay Kumar Sahay:
A communication efficient and scalable distributed data mining for the astronomical data. Astron. Comput. 16: 166-173 (2016)
Conference and Workshop Papers
- 2023
- [c39]Adarsh Nandanwar, Hemant Rathore, Sanjay K. Sahay, Mohit Sewak:
RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries. ICCS (2) 2023: 77-92 - [c38]Hemant Rathore, Praneeth B, Sundaraja Sitharama Iyengar, Sanjay K. Sahay:
Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. ICCS (5) 2023: 535-550 - [c37]Lokesh Kumar, Sanjay K. Sahay, Hrishikesh Govindrao Kusneniwar:
An investigation of two-step cascaded CNN for the detection of gravitational wave signal from two different astronomical sources. INNS DLIA@IJCNN 2023: 676-684 - 2022
- [c36]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense Against Metamorphic Ransomware Swarm Attack. BROADNETS 2022: 31-50 - [c35]Hemant Rathore, Soham Chari, Nishant Verma, Sanjay K. Sahay, Mohit Sewak:
Android Malware Detection Based on Static Analysis and Data Mining Techniques: A Systematic Literature Review. BROADNETS 2022: 51-71 - [c34]Hemant Rathore, Ajay Kharat, Rashmi T, Adithya Manickavasakam, Sanjay K. Sahay, Mohit Sewak:
MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection. BROADNETS 2022: 72-92 - [c33]Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay, Mohit Sewak:
Are Malware Detection Models Adversarial Robust Against Evasion Attack? INFOCOM Workshops 2022: 1-2 - [c32]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation. PerCom Workshops 2022: 169-174 - 2021
- [c31]Jyotiprakash Mishra, Sanjay K. Sahay, Hemant Rathore, Lokesh Kumar:
Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models. APCC 2021: 161-165 - [c30]Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon, Mohit Sewak:
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. DSN (Supplements) 2021: 29-32 - [c29]Hemant Rathore, Piyush Nikam, Sanjay K. Sahay, Mohit Sewak:
Identification of Adversarial Android Intents using Reinforcement Learning. IJCNN 2021: 1-8 - [c28]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. IJCNN 2021: 1-9 - [c27]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator. IJCNN 2021: 1-9 - [c26]Hemant Rathore, Sanjay K. Sahay, Mohit Sewak:
Are Android Malware Detection Models Adversarially Robust?: Poster Abstract. IPSN 2021: 408-409 - [c25]Hemant Rathore, B. Raja Narasimhan, Sanjay K. Sahay, Mohit Sewak:
Image-based Android Malware Detection Models using Static and Dynamic Features. ISDA 2021: 1292-1305 - [c24]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DRo: A data-scarce mechanism to revolutionize the performance of DL-based Security Systems. LCN 2021: 581-588 - [c23]Hemant Rathore, Sanjay K. Sahay:
Towards Robust Android Malware Detection Models using Adversarial Learning. PerCom Workshops 2021: 424-425 - [c22]Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak:
Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense. SenSys 2021: 355-356 - [c21]Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak:
Adversarial Robustness of Image Based Android Malware Detection Models. SKM 2021: 3-22 - [c20]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. SKM 2021: 51-72 - 2020
- [c19]Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak:
Identification of Significant Permissions for Efficient Android Malware Detection. BROADNETS 2020: 33-52 - [c18]Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak:
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. BROADNETS 2020: 109-128 - [c17]Shriya T. P. Gupta, Sanjay K. Sahay:
A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery. EANN 2020: 227-239 - [c16]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS. UbiComp/ISWC Adjunct 2020: 131-134 - [c15]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture. PIMRC 2020: 1-6 - [c14]Hemant Rathore, Sanjay K. Sahay, Mohit Sewak:
How robust are malware detection models for Android smartphones against adversarial attacks?: poster abstract. SenSys 2020: 683-684 - [c13]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. TENCON 2020: 414-419 - 2019
- [c12]Trupil Limbasiya, Debasis Das, Sanjay K. Sahay:
Secure communication protocol for smart transportation based on vehicular cloud. UbiComp/ISWC Adjunct 2019: 372-376 - [c11]Trupil Limbasiya, Sanjay K. Sahay:
Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture. SKM 2019: 82-97 - 2018
- [c10]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
An investigation of a deep learning based malware detection system. ARES 2018: 26:1-26:5 - [c9]Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak:
Malware Detection Using Machine Learning and Deep Learning. BDA 2018: 402-411 - [c8]Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak:
Android Malicious Application Classification Using Clustering. ISDA (2) 2018: 659-667 - [c7]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. SNPD 2018: 293-296 - 2016
- [c6]Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay Kumar Sahay:
Distributed Multi-class Rule Based Classification Using RIPPER. CIT 2016: 303-309 - [c5]Rajendra Kumar Roul, Sanjay Kumar Sahay:
K-means and Wordnet Based Feature Selection Combined with Extreme Learning Machines for Text Classification. ICDCIT 2016: 103-112 - 2015
- [c4]Aruna Govada, Bhavul Gauri, Sanjay Kumar Sahay:
Centroid based Binary Tree Structured SVM for multi classification. ICACCI 2015: 258-262 - [c3]Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay Kumar Sahay:
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine. MLDM 2015: 199-213 - [c2]Rajendra Kumar Roul, Ashish Nanda, Viraj Patel, Sanjay Kumar Sahay:
Extreme learning machines in the field of text classification. SNPD 2015: 217-223 - [c1]Aruna Govada, Bhavul Gauri, Sanjay Kumar Sahay:
Distributed Multi Class SVM for Large Data Sets. WCI 2015: 54-58
Editorship
- 2022
- [e2]Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao:
Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings. Communications in Computer and Information Science 1549, Springer 2022, ISBN 978-3-030-97531-9 [contents] - 2020
- [e1]Sanjay K. Sahay, Nihita Goel, Vishwas Patil, Murtuza Jadliwala:
Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings. Communications in Computer and Information Science 1186, Springer 2020, ISBN 978-981-15-3816-2 [contents]
Informal and Other Publications
- 2022
- [i40]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. CoRR abs/2206.02733 (2022) - 2021
- [i39]Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak:
Robust Android Malware Detection System against Adversarial Attacks using Q-Learning. CoRR abs/2101.12031 (2021) - [i38]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware. CoRR abs/2102.00898 (2021) - [i37]Hemant Rathore, Sanjay K. Sahay, Shivin Thukral, Mohit Sewak:
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. CoRR abs/2103.00637 (2021) - [i36]Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak:
Identification of Significant Permissions for Efficient Android Malware Detection. CoRR abs/2103.00643 (2021) - [i35]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems. CoRR abs/2109.05470 (2021) - [i34]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. CoRR abs/2109.11500 (2021) - [i33]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator. CoRR abs/2109.11542 (2021) - [i32]Trupil Limbasiya, Sanjay K. Sahay, Bharath Sridharan:
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. CoRR abs/2110.09654 (2021) - 2020
- [i31]Trupil Limbasiya, Sanjay K. Sahay:
Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture. CoRR abs/2004.10010 (2020) - [i30]Shriya T. P. Gupta, Sanjay K. Sahay:
A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery. CoRR abs/2008.02797 (2020) - [i29]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture. CoRR abs/2010.08607 (2020) - [i28]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS. CoRR abs/2010.08608 (2020) - [i27]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. CoRR abs/2012.14427 (2020) - 2019
- [i26]Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay:
Detection of Advanced Malware by Machine Learning Techniques. CoRR abs/1903.02966 (2019) - [i25]Ashu Sharma, Sanjay Kumar Sahay:
Group-wise classification approach to improve Android malicious apps detection accuracy. CoRR abs/1904.02122 (2019) - [i24]Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak:
Malware Detection using Machine Learning and Deep Learning. CoRR abs/1904.02441 (2019) - [i23]Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak:
Android Malicious Application Classification Using Clustering. CoRR abs/1904.10142 (2019) - [i22]Sanjay K. Sahay, Mayank Chaudhari:
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU. CoRR abs/1905.13746 (2019) - [i21]Sanjay K. Sahay, Ashu Sharma:
A Survey on the Detection of Android Malicious Apps. CoRR abs/1905.13747 (2019) - [i20]Trupil Limbasiya, Debasis Das, Sanjay K. Sahay:
Secure Communication Protocol for Smart Transportation Based on VC]Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud. CoRR abs/1912.12884 (2019) - 2018
- [i19]Ashu Sharma, Sanjay Kumar Sahay:
An investigation of the classifiers to detect android malicious apps. CoRR abs/1802.08611 (2018) - [i18]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
An investigation of a deep learning based malware detection system. CoRR abs/1809.05888 (2018) - [i17]Mohit Sewak, Sanjay K. Sahay, Hemant Rathore:
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. CoRR abs/1809.05889 (2018) - 2016
- [i16]Ashu Sharma, Sanjay Kumar Sahay:
An effective approach for classification of advanced malware with high accuracy. CoRR abs/1606.06897 (2016) - [i15]Sanjay Kumar Sahay, Ashu Sharma:
Grouping the executables to detect malware with high accuracy. CoRR abs/1606.06908 (2016) - [i14]Ashu Sharma, Sanjay Kumar Sahay, Abhishek Kumar:
Improving the detection accuracy of unknown malware by partitioning the executables in groups. CoRR abs/1606.06909 (2016) - [i13]Aruna Govada, Sanjay Kumar Sahay:
Covariance estimation for vertically partitioned data in a distributed environment. CoRR abs/1606.07336 (2016) - [i12]Aruna Govada, Sanjay Kumar Sahay:
A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data. CoRR abs/1606.07345 (2016) - 2015
- [i11]Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra, Sanjay Kumar Sahay:
A Novel Modified Apriori Approach for Web Document Clustering. CoRR abs/1503.08463 (2015) - [i10]Rajendra Kumar Roul, Shubham Rohan Asthana, Sanjay Kumar Sahay:
Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach. CoRR abs/1504.00191 (2015) - [i9]Aruna Govada, Bhavul Gauri, Sanjay Kumar Sahay:
Centroid Based Binary Tree Structured SVM for Multi Classification. CoRR abs/1512.00659 (2015) - [i8]Aruna Govada, Bhavul Gauri, Sanjay Kumar Sahay:
Distributed Multi Class SVM for Large Data Sets. CoRR abs/1512.00664 (2015) - [i7]Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay Kumar Sahay:
Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine. CoRR abs/1512.01568 (2015) - [i6]Aruna Govada, Shree Ranjani, Aditi Viswanathan, Sanjay Kumar Sahay:
A Novel Approach to Distributed Multi-Class SVM. CoRR abs/1512.01993 (2015) - 2014
- [i5]Rajendra Kumar Roul, Sanjay Kumar Sahay:
An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining. CoRR abs/1406.5616 (2014) - [i4]Rajendra Kumar Roul, O. R. Devanand, Sanjay Kumar Sahay:
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach. CoRR abs/1406.5617 (2014) - [i3]Ashu Sharma, Sanjay Kumar Sahay:
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey. CoRR abs/1406.7061 (2014) - 2012
- [i2]Rajendra Kumar Roul, Sanjay Kumar Sahay:
An Effective Information Retrieval for Ambiguous Query. CoRR abs/1204.1406 (2012) - [i1]Rajendra Kumar Roul, Sanjay Kumar Sahay:
An effective web document clustering for information retrieval. CoRR abs/1211.1107 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint