default search action
Biplob R. Ray
Person information
- affiliation: Central Queensland University, Cairns, QLD, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Mitchell D. Woodbright, Ahsan Morshed, Matthew Browne, Biplob Ray, Steven Moore:
Toward Transparent AI for Neurological Disorders: A Feature Extraction and Relevance Analysis Framework. IEEE Access 12: 37731-37743 (2024) - [j15]Kiran M., Biplob Ray, Jahan Hassan, Aman Kashyap, Varun Yarehalli Chandrappa:
Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things. Internet Things 25: 101002 (2024) - [j14]Shahed I. Khan, Biplob Ray, Nemai Karmakar:
Chipless RFID Physical-Layer Security With MIMO-Based Multidimensional Data Points for Internet of Things. IEEE Internet Things J. 11(15): 26384-26394 (2024) - 2023
- [j13]Varun Yarehalli Chandrappa, Biplob Ray, Nanjappa Ashwatha, Pramod Shrestha:
Spatiotemporal modeling to predict soil moisture for sustainable smart irrigation. Internet Things 21: 100671 (2023) - 2022
- [j12]Hanmin Sheng, Biplob Ray, Jinliang Shao, Dimuth Lasantha, Narottam Das:
Generalization of solar power yield modeling using knowledge transfer. Expert Syst. Appl. 201: 116992 (2022) - [j11]Grishma Khadka, Biplob Ray, Nemai Chandra Karmakar, Jinho Choi:
Physical-Layer Detection and Security of Printed Chipless RFID Tag for Internet of Things Applications. IEEE Internet Things J. 9(17): 15714-15724 (2022) - 2021
- [j10]Haftu Tasew Reda, Biplob Ray, Pejman Peidaee, Adnan Anwar, Abdun Mahmood, Akhtar Kalam, Nahina Islam:
Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid. Sensors 21(4): 1554 (2021) - [j9]Morshed U. Chowdhury, Biplob Ray, Sujan Chowdhury, Sutharshan Rajasegarar:
A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things. ACM Trans. Internet Things 2(4): 26:1-26:23 (2021) - 2020
- [j8]Biplob Ray, Rakibuzzaman Shah, Md. Rabiul Islam, Syed Mofizul Islam:
A New Data Driven Long-Term Solar Yield Analysis Model of Photovoltaic Power Plants. IEEE Access 8: 136223-136233 (2020) - [j7]Hanmin Sheng, Biplob Ray, Kai Chen, Yuhua Cheng:
Solar Power Forecasting Based on Domain Adaptive Learning. IEEE Access 8: 198580-198590 (2020) - 2018
- [j6]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - 2016
- [j5]Savitri Bevinakoppa, Biplob Ray, Fariza Sabrina:
Effectiveness of Problem-Based Learning Implementation. Int. J. Qual. Assur. Eng. Technol. Educ. 5(3): 46-58 (2016) - [j4]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Secure Object Tracking Protocol for the Internet of Things. IEEE Internet Things J. 3(4): 544-553 (2016) - 2015
- [j3]Gaith K. D. Al., Biplob Rakshit Ray, Morshed U. Chowdhury:
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System. Int. J. Networked Distributed Comput. 3(2): 128-136 (2015) - 2014
- [j2]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury:
Scalable RFID security framework and protocol supporting Internet of Things. Comput. Networks 67: 89-103 (2014) - 2013
- [j1]Biplob Rakshit Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag. Int. J. Networked Distributed Comput. 1(2): 79-88 (2013)
Conference and Workshop Papers
- 2024
- [c18]Mounika Baddula, Biplob Ray, Mahmoud Elkhodr, Adnan Anwar, Pushpika Hettiarachchi:
Vulnerability Assessment and Risk Modeling of IoT Smart Home Devices. AINA (5) 2024: 459-469 - [c17]Shahed I. Khan, Likitha Lasantha, Biplob Ray, Nemai Karmakar:
Evaluating Dynamic Wavelet Fingerprinting of Chipless RFID Tags in Detecting Counterfeits in Noiseless and Noisy Environments. RFID 2024: 1-6 - [c16]Likitha Lasantha, Shahed I. Khan, Biplob Ray, Nemai C. Karmakar:
Enhancing Quality Factor of Chipless RFID Sensors by Optimising the Substrate Properties and Resonator Geometry. RFID 2024: 125-130 - 2022
- [c15]Venkata Abhishek Kanthuru, Sutharshan Rajasegarar, Punit Rathore, Robin Ram Mohan Doss, Lei Pan, Biplob Ray, Morshed Chowdhury, Chandrasekaran Srimathi, M. A. Saleem Durai:
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. ADMA (1) 2022: 118-130 - 2020
- [c14]Nahina Islam, Biplob Ray, Faezeh Pasandideh:
IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication? SmartIoT 2020: 270-276 - [c13]Dimuth Lasantha, Biplob Ray:
Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019. TrustCom 2020: 1310-1317 - 2019
- [c12]Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. ATIS 2019: 77-91 - [c11]Ansa Iftikhar Ahmad, Biplob Ray, Morshed U. Chowdhury:
Performance Evaluation of LoRaWAN for Mission-Critical IoT Networks. FNSS 2019: 37-51 - [c10]Morshed U. Chowdhury, Robin Doss, Biplob Ray, Sutharshan Rajasegarar, Sujan Chowdhury:
IoT Insider Attack - Survey. SGIoT 2019: 28-41 - 2017
- [c9]Biplob R. Ray, Morshed U. Chowdhury, Usman Atif:
Is High Performance Computing (HPC) Ready to Handle Big Data? FNSS 2017: 97-112 - 2016
- [c8]Yufeng Lin, Biplob Ray, Dennis Jarvis, Jia Wang:
False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks. ATIS 2016: 142-153 - [c7]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury, Biplob R. Ray:
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. FNSS 2016: 126-141 - [c6]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. SecureComm 2016: 257-270 - 2015
- [c5]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. SNPD 2015: 135-141 - 2014
- [c4]Gaith K. D. Al., Biplob Rakshit Ray, Morshed U. Chowdhury:
RFID Tag Ownership Transfer Protocol for a Closed Loop System. IIAI-AAI 2014: 575-579 - 2013
- [c3]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Critical Analysis and Comparative Study of Security for Networked RFID Systems. SNPD 2013: 197-202 - 2011
- [c2]Biplob R. Ray, Md. Shamsul Huda, Morshed U. Chowdhury:
Smart RFID Reader Protocol for Malware Detection. SNPD 2011: 64-69 - 2010
- [c1]Biplob R. Ray, Morshed U. Chowdhury:
Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information. CAINE 2010: 208-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint