Debabrata Samanta

Orcid: 0000-0003-4118-2480

According to our database1, Debabrata Samanta authored at least 31 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Machine-Learning-Based Spam Mail Detector.
SN Comput. Sci., November, 2023

Design and Development of Artificial Intelligence Knowledge Processing System for Optimizing Security of Software System.
SN Comput. Sci., July, 2023

Computer Vision Based Automatic Margin Computation Model for Digital Document Images.
SN Comput. Sci., May, 2023

A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography.
J. Database Manag., 2023

LonXplain: Lonesomeness as a Consequence of Mental Disturbance in Reddit Posts.
Proceedings of the Natural Language Processing and Information Systems, 2023

Towards Pattern Recognition with Network Science and Natural Language Processing for Information Retrieval.
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023

2022
Green Computing Practice in ICT-Based Methods: Innovation in Web-Based Learning and Teaching Technologies.
Int. J. Web Based Learn. Teach. Technol., 2022

A Novel Approach for Semantic Web Application in Online Education Based on Steganography.
Int. J. Web Based Learn. Teach. Technol., 2022

Mining and Interpretation of Critical Aspects of Infant Health Status Using Multi-Objective Evolutionary Feature Selection Approaches.
IEEE Access, 2022

A Multi-Modal Approach to Digital Document Stream Segmentation for Title Insurance Domain.
IEEE Access, 2022

Automated Risk Management Based Software Security Vulnerabilities Management.
IEEE Access, 2022

Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting.
Proceedings of the International Conference on Computer, 2022

Data Classification and Incremental Clustering in Data Mining and Machine Learning
Springer, ISBN: 978-3-030-93087-5, 2022

2021
IoT-Based Smart Alert System for Drowsy Driver Detection.
Wirel. Commun. Mob. Comput., 2021

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
Secur. Commun. Networks, 2021

Approach for Collision Minimization and Enhancement of Power Allocation in WSNs.
J. Sensors, 2021

The realist approach for evaluation of computational intelligence in software engineering.
Innov. Syst. Softw. Eng., 2021

A New Combinational Technique in Image Steganography.
Int. J. Inf. Secur. Priv., 2021

Hybrid Approach to Document Anomaly Detection: An Application to Facilitate RPA in Title Insurance.
Int. J. Autom. Comput., 2021

An internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning.
Trans. Emerg. Telecommun. Technol., 2021

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture.
IEEE Access, 2021

PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications.
IEEE Access, 2021

Social Media and Steganography: Use, Risks and Current Status.
IEEE Access, 2021

A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks.
IEEE Access, 2021

A Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents.
IEEE Access, 2021

Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People.
Proceedings of the International Conference on Computer, 2021

Classification of Soil Images using Convolution Neural Networks.
Proceedings of the International Conference on Communications, 2021

Computationally Intensive Statistics for Intelligent IoT
Springer, ISBN: 978-981-16-5935-5, 2021

2020
A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities.
Wirel. Networks, 2020

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks.
J. Ambient Intell. Humaniz. Comput., 2020

2018
Admission control algorithm based on the effective bandwidth in vehicle-to-infrastructure communication.
IET Commun., 2018


  Loading...