Amitava Nag

Orcid: 0000-0003-4408-7307

According to our database1, Amitava Nag authored at least 36 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Computational Risk Prediction Model of Heart Diseases Based on Dual-Stage Stacked Machine Learning Approaches.
IEEE Access, 2024

2023
Mobile app-based tomato disease identification with fine-tuned convolutional neural networks.
Comput. Electr. Eng., December, 2023

Fuzzy-logic-based IoMT framework for COVID19 patient monitoring.
Comput. Ind. Eng., February, 2023

An IoT-Based Deep Learning Framework for Real-Time Detection of COVID-19 through Chest X-ray Images.
Comput., January, 2023

Secure data authentication and access control protocol for industrial healthcare system.
J. Ambient Intell. Humaniz. Comput., 2023

NTRU and Secret Sharing Based Secure Group Communication for IoT Applications.
IEEE Access, 2023

Secret Image Sharing Schemes: A Comprehensive Survey.
IEEE Access, 2023

Lung Cancer Risk Prediction Features Influence Model Based on Machine Learning Techniques.
Proceedings of the IEEE Region 10 Conference, 2023

Deep Learning-Based Intelligent GUI Tool For Skin Disease Diagnosis System.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2023

2022
An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares.
Multim. Tools Appl., 2022

A buffer-aware dynamic UAV trajectory design for data collection in resource-constrained IoT frameworks.
Comput. Electr. Eng., 2022

Green Cloud Computing for IoT Based Smart Applications.
Proceedings of the Green Mobile Cloud Computing, 2022

2021
Cache-aware mobile data collection schedule for IoT enabled multi-rate data generator wireless sensor network.
Sustain. Comput. Informatics Syst., 2021

A verifiable multi-secret image sharing scheme using XOR operation and hash function.
Multim. Tools Appl., 2021

An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network.
J. Netw. Comput. Appl., 2021

Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT.
Comput. Electr. Eng., 2021

HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments.
Ad Hoc Networks, 2021

Neologism Related to COVID-19 Pandemic: A Corpus-Based Study for the Bengali Language.
Proceedings of the Evolution in Computational Intelligence, 2021

2020
An efficient Boolean based multi-secret image sharing scheme.
Multim. Tools Appl., 2020

DTLS based secure group communication scheme for Internet of Things.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

2019
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
Sentiment Analysis in the Light of LSTM Recurrent Neural Networks.
Int. J. Synth. Emot., 2018

A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Finding Active Expert Users for Question Routing in Community Question Answering Sites.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

A Comparative Study to the Bank Market Prediction.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

2017
Secure Data Outsourcing on Cloud Using Secret Sharing Scheme.
Int. J. Netw. Secur., 2017

A new (k, n) secret image sharing scheme (SISS).
Int. Arab J. Inf. Technol., 2017

2015
A Novel XOR-based Visual Secret Sharing Scheme with Random Grid.
Smart Comput. Rev., 2015

Incorporating Smart Software-defined Networks to Enhance Resilience and Survivability in the Cloud: Survey of Current Challenges and Future Research Scopes.
Smart Comput. Rev., 2015

Semi Random Position Based Steganography for Resisting Statistical Steganalysis.
Int. J. Netw. Secur., 2015

2014
Location-Based Image Steganography.
Smart Comput. Rev., 2014

A Huffman Code Based Image Steganography Technique.
Proceedings of the Applied Algorithms - First International Conference, 2014

2013
Image Secret Sharing in Stego-Images with Authentication.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2011
A Weighted Location Based LSB Image Steganography Technique.
Proceedings of the Advances in Computing and Communications, 2011

A Novel Copyright Protection Scheme Using Visual Cryptography.
Proceedings of the Advances in Computing and Communications, 2011

2010
A novel technique for image steganography based on Block-DCT and Huffman Encoding
CoRR, 2010


  Loading...