Chittaranjan Hota

Orcid: 0000-0002-6031-6408

According to our database1, Chittaranjan Hota authored at least 67 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Eye Movement Tracking for Computer Vision Syndrome using Deep Learning Techniques.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

Anomaly Detection in WBANs Using CNN-Autoencoders and LSTMs.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
OSGAN: One-shot distributed learning using generative adversarial networks.
J. Supercomput., August, 2023

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure.
Future Internet, April, 2023

Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing.
Comput. Commun., 2023

Selfish Users in Listen-Before-Talk Co-existence of Cellular-Wi-Fi Networks: Counteraction Methods.
Proceedings of the 21st International Symposium on Modeling and Optimization in Mobile, 2023

Distributed Learning of Pure Non-IID data using Latent Codes.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

2022
Code integrity verification using cache memory monitoring.
Inf. Secur. J. A Glob. Perspect., 2022

Detection of stealthy single-source SSH password guessing attacks.
Evol. Syst., 2022

Secure Peer to Peer Learning Using Auto Encoders.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022

Communication Efficient Distributed Learning Using Variational Auto Encoders.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

An efficient approach to kNN algorithm for IoT devices.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Swap-Based Load Balancing for Fairness in Radio Access Networks.
IEEE Wirel. Commun. Lett., 2021

UnderTracker: Generating Robust Binaries Using Execution Flow Traces.
Inf. Syst. Frontiers, 2021

Attention-Based Bi-LSTM for Anomaly Detection on Time-Series Data.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks.
Proceedings of the CODS-COMAD 2021: 8th ACM IKDD CODS and 26th COMAD, 2021

Decentralized Learning with GANs.
Proceedings of the CODS-COMAD 2021: 8th ACM IKDD CODS and 26th COMAD, 2021

QoS Driven Task Offloading and Resource Allocation at Edge Servers in RAN Slicing.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
Quality of Service Driven Resource Allocation in Network Slicing.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay.
Proceedings of the Network and System Security - 14th International Conference, 2020

Real-Time Probabilistic Approach for Traffic Prediction on IoT Data Streams.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Fusion Learning: A One Shot Federated Learning.
Proceedings of the Computational Science - ICCS 2020, 2020

Code-Tampering Defense for Internet of Things Using System Call Traces.
Proceedings of the Innovations for Community Services, 2020

2019
STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks.
Wirel. Networks, 2019

Profile-guided code identification and hardening using return oriented programming.
J. Inf. Secur. Appl., 2019

UnderTracker: Binary Hardening Through Execution Flow Verification.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

Attack Detection and Forensics Using Honeypot in IoT Environment.
Proceedings of the Distributed Computing and Internet Technology, 2019

Code Tamper-Proofing using Dynamic Canaries.
Proceedings of the 25th Asia-Pacific Conference on Communications, 2019

Preventing data tampering in IoT networks.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
An Ingestion Based Analytics Framework for Complex Event Processing Engine in Internet of Things.
Proceedings of the Big Data Analytics - 6th International Conference, 2018

2017
Resilient complex event processing in IoT using side-channel information.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Tamper-resistant code using optimal ROP gadgets for IoT devices.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning.
EAI Endorsed Trans. Wirel. Spectr., 2016

Noise-resistant mechanisms for the detection of stealthy peer-to-peer botnets.
Comput. Commun., 2016

Classification of SSH Attacks Using Machine Learning Algorithms.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
Game-theoretic strategies for IDS deployment in peer-to-peer networks.
Inf. Syst. Frontiers, 2015

Advances in secure knowledge management in the big data era.
Inf. Syst. Frontiers, 2015

Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

2014
Big Data Analytics framework for Peer-to-Peer Botnet detection using Random Forests.
Inf. Sci., 2014

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification.
EURASIP J. Inf. Secur., 2014

PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Designing an extensible communication platform for rural area.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Machine-learning approaches for P2P botnet detection using signal-processing techniques.
Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014

HaDeS: A Hadoop-based Framework for Detection of Peer-to-Peer Botnets.
Proceedings of the 20th International Conference on Management of Data, 2014

2013
Real-time Peer-to-Peer Botnet Detection Framework based on Bayesian Regularized Neural Network.
CoRR, 2013

Arbitration-based reliable distributed mutual exclusion for Mobile Ad-hoc Networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Adaptive Task Scheduling in Service Oriented Crowd Using SLURM.
Proceedings of the Distributed Computing and Internet Technology, 2013

Sustainable wireless internet connectivity for rural areas.
Proceedings of the International Conference on Advances in Computing, 2013

Enhanced Search in Unstructured Peer-to-Peer Overlay Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Feature selection for detection of peer-to-peer botnet traffic.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
GAUR: a method to detect Sybil groups in peer-to-peer overlays.
Int. J. Grid Util. Comput., 2012

2011
Efficient Algorithm on heterogeneous computing system.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011

A Resilient Voting Scheme for Improving Secondary Structure Prediction.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2011

An efficient on-demand routing protocol for MANETs using Bayesian approach.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A novel permission-based reliable distributed mutual exclusion algorithm for MANETs.
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010

Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Enhanced Search in Peer-to-Peer Networks Using Fuzzy Logic.
Proceedings of the Distributed Computing and Internet Technology, 2010

2009
Detecting Sybils in Peer-to-Peer File Replication Systems.
Proceedings of the Information Security and Digital Forensics, 2009

Priority-Based Job Scheduling in Distributed Systems.
Proceedings of the Information Systems, Technology and Management, 2009

2008
Energy-aware routing in Mobile Ad-Hoc Networks.
Proceedings of the 1st IFIP Wireless Days, 2008

Adaptive lookup for unstructured peer-to-peer overlays.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Indexing through Querying in Unstructured Peer-to-Peer Overlay Networks.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing.
Proceedings of the International Conference on Networking, 2007

2004
Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model.
Proceedings of the Distributed Computing, 2004

Distributed dynamic resource management in IPVPNs to guarantee quality of service.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Design and Deployment of IP Virtual Private Networks: A Case Study.
Proceedings of the Intelligent Information Technology, 2004


  Loading...