default search action
Bharath K. Samanthula
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j8]Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari:
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services. Cryptogr. 4(4): 29 (2020) - [j7]Allen Yang, Boxiang Dong, Dawei Li, Weifeng Sun, Bharath K. Samanthula:
DeepICU: imbalanced classification by using deep neural networks for network intrusion detection. Int. J. Big Data Intell. 7(3): 137-147 (2020) - 2016
- [j6]Bharath K. Samanthula, Wei Jiang:
Secure Multiset Intersection Cardinality and its Application to Jaccard Coefficient. IEEE Trans. Dependable Secur. Comput. 13(5): 591-604 (2016) - 2015
- [j5]Bharath K. Samanthula, Yousef Elmehdwi, Gerry Howser, Sanjay Madria:
A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. 48: 196-212 (2015) - [j4]Bharath K. Samanthula, Wei Jiang:
Interest-driven private friend recommendation. Knowl. Inf. Syst. 42(3): 663-687 (2015) - [j3]Bharath K. Samanthula, Lei Cen, Wei Jiang, Luo Si:
Privacy-Preserving and Efficient Friend Recommendation in Online Social Networks. Trans. Data Priv. 8(2): 141-171 (2015) - [j2]Bharath K. Samanthula, Yousef Elmehdwi, Wei Jiang:
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data. IEEE Trans. Knowl. Data Eng. 27(5): 1261-1273 (2015) - 2014
- [j1]Bharath K. Samanthula, Chun Hu, Wei Jiang, Bruce M. McMillin:
Secure and threshold-based power usage control in smart grid environments. Int. J. Parallel Emergent Distributed Syst. 29(3): 264-289 (2014)
Conference and Workshop Papers
- 2023
- [c23]Smit Chandrakant Nayak, Vaibhavi Tiwari, Bharath K. Samanthula:
Review of Ransomware Attacks and a Data Recovery Framework using Autopsy Digital Forensics Platform. CCWC 2023: 605-611 - [c22]Bharath K. Samanthula, Hemadri Patel:
Privacy-Preserving and Outsourced Computation Framework for Power Usage Control in Smart Grids. SAT-CPS@CODASPY 2023: 1-7 - [c21]Smit Chandrakant Nayak, Bharath K. Samanthula, Vaibhavi Tiwari:
Investigating Drone Data Recovery Beyond the Obvious Using Digital Forensics. UEMCON 2023: 254-260 - 2021
- [c20]Andy Zhou, Kazi Zakia Sultana, Bharath K. Samanthula:
Investigating the Changes in Software Metrics after Vulnerability is Fixed. IEEE BigData 2021: 5658-5663 - 2020
- [c19]Michelle Zhu, Matthew Johnson, Aditya Dutta, Nicole Panorkou, Bharath K. Samanthula, Pankaj Lal, Weitian Wang:
Educational Simulation Design to Transform Learning in Earth and Environmental Sciences. FIE 2020: 1-6 - [c18]Vaibhav K. Anu, Kazi Zakia Sultana, Bharath K. Samanthula:
A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities. ISSRE Workshops 2020: 49-54 - 2019
- [c17]Mona Alkanhal, Bharath K. Samanthula:
A Privacy-Aware Framework for Friend Recommendations in Online Social Networks. CSE/EUC 2019: 182-187 - 2018
- [c16]Sam Forman, Bharath Kumar Samanthula:
Secure Similar Document Detection: Optimized Computation Using the Jaccard Coefficient. BigDataSecurity/HPSC/IDS 2018: 1-4 - [c15]Bharath Kumar Samanthula, James Liporace, Martin Issiov:
A Privacy-Aware and User-Centric Approach for Query Processing in Cloud. SmartCloud 2018: 54-59 - 2017
- [c14]Bharath K. Samanthula:
Privacy-preserving outsourced collaborative frequent itemset mining in the cloud. IEEE BigData 2017: 4827-4829 - [c13]Scott A. Thompson, Bharath K. Samanthula:
Optimized Secure Data Aggregation in Wireless Sensor Networks. PST 2017: 394-396 - 2015
- [c12]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c11]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi:
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data. IRI 2015: 427-434 - 2014
- [c10]Elisa Bertino, Bharath Kumar Samanthula:
Security with privacy - A research agenda. CollaborateCom 2014: 144-153 - [c9]Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. ESORICS (1) 2014: 400-418 - [c8]Yousef Elmehdwi, Bharath K. Samanthula, Wei Jiang:
Secure k-nearest neighbor query over encrypted data in outsourced environments. ICDE 2014: 664-675 - 2013
- [c7]Bharath K. Samanthula, Wei Jiang:
Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing. IEEE CLOUD 2013: 51-58 - [c6]Bharath K. Samanthula, Hu Chun, Wei Jiang:
An efficient and probabilistic secure bit-decomposition. AsiaCCS 2013: 541-546 - [c5]Bharath K. Samanthula, Wei Jiang, Sanjay Madria:
A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks. MDM (1) 2013: 77-86 - 2012
- [c4]Bharath K. Samanthula, Wei Jiang:
Structural and Message Based Private Friend Recommendation. ASONAM 2012: 684-690 - [c3]Bharath K. Samanthula, Gerry Howser, Yousef Elmehdwi, Sanjay Madria:
An efficient and secure data sharing framework using homomorphic encryption in the cloud. Cloud-I 2012: 8 - 2011
- [c2]Wei Jiang, Bharath K. Samanthula:
N-Gram Based Secure Similar Document Detection. DBSec 2011: 239-246 - [c1]Wei Jiang, Bharath K. Samanthula:
A Secure and Distributed Framework to Identify and Share Needed Information. SocialCom/PASSAT 2011: 1224-1230
Informal and Other Publications
- 2021
- [i5]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - 2014
- [i4]Bharath K. Samanthula, Wei Jiang, Elisa Bertino:
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases. CoRR abs/1401.3768 (2014) - [i3]Bharath K. Samanthula, Yousef Elmehdwi, Wei Jiang:
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data. CoRR abs/1403.5001 (2014) - [i2]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. CoRR abs/1412.4378 (2014) - 2013
- [i1]Yousef Elmehdwi, Bharath K. Samanthula, Wei Jiang:
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments. CoRR abs/1307.4824 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint