Aravind Ashok

Orcid: 0000-0002-0984-7051

According to our database1, Aravind Ashok authored at least 12 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Edge-Based Graph Neural Networks for Cell-Graph Modeling and Prediction.
Proceedings of the Information Processing in Medical Imaging, 2023

2022
A graph neural network framework for mapping histological topology in oral mucosal tissue.
BMC Bioinform., 2022

2020
funcGNN: A Graph Neural Network Approach to Program Similarity.
Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020

2019
Leveraging mutants for automatic prediction of metamorphic relations using machine learning.
Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, 2019

2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
J. Intell. Fuzzy Syst., 2017

2016
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
A lexical approach for classifying malicious URLs.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
Ensemble Learning Approach for Author Profiling.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

2012
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012


  Loading...