Kishor Datta Gupta

Orcid: 0000-0001-6867-2653

According to our database1, Kishor Datta Gupta authored at least 44 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Survey on Machine Learning Biases and Mitigation Techniques.
Digit., March, 2024

Security threats on Data-Driven Approaches for Luggage Screening.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
An Online Unsupervised Streaming Features Selection Through Dynamic Feature Clustering.
IEEE Trans. Artif. Intell., October, 2023

Online learning for X-ray, CT or MRI.
CoRR, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
CoRR, 2023

Monkeypox Diagnosis With Interpretable Deep Learning.
IEEE Access, 2023

Cyber Security Issues in the Industrial Applications of Digital Twins.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Challenges and Opportunities of Computational Intelligence in Industrial Control System (ICS).
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Discriminative DeepLab Model (DDLM) for Surface Anomaly Detection and Localization.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Promise of AI in DeFi, a Systematic Review.
Digit., January, 2022

Negative Selection Algorithm Research and Applications in the Last Decade: A Review.
IEEE Trans. Artif. Intell., 2022

Adversarial Attacks and Defenses for Deployed AI Models.
IT Prof., 2022

Transfer learning and Local interpretable model agnostic based visual approach in Monkeypox Disease Detection and Classification: A Deep Learning insights.
CoRR, 2022

Mitigating shortage of labeled data using clustering-based active learning with diversity exploration.
CoRR, 2022

A clustering-based active learning method to query informative and representative samples.
Appl. Intell., 2022

A Modified Iterative Algorithm for Numerical Investigation of HIV Infection Dynamics.
Algorithms, 2022

Negative Selection Approach to support Formal Verification and Validation of BlackBox Models' Input Constraints.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

Interpretable Convolutional Learning Classifier System (C-LCS) for higher dimensional datasets.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

A Data-driven Approach for Travel Time Prediction and Analysis.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework.
Proceedings of the International Joint Conference on Neural Networks, 2022

HeteroGenius: An Improvised 'Intelligence' in Heterogeneous Graph Transformers.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

A Safer Approach to Build Recommendation Systems on Unidentifiable Data.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice Leaf.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Outlier Shapes.
Dataset, January, 2021

Determining Sequence of Image Processing Technique (IPT) to Detect Adversarial Attacks.
SN Comput. Sci., 2021

Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review.
IT Prof., 2021

Who is Responsible for Adversarial Defense?
CoRR, 2021

Using Negative Detectors for Identifying Adversarial Data Manipulation in Machine Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Recommend Speciality Doctor from Health Transcription: Ensemble Machine Learning Approach.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Understanding the Pandemic Through Mining Covid News Using Natural Language Processing.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
COVID-19 Symptoms Detection Based on NasNetMobile with Explainable AI Using Various Imaging Modalities.
Mach. Learn. Knowl. Extr., 2020

Study of Different Deep Learning Approach with Explainable AI for Screening Patients with COVID-19 Symptoms: Using CT Scan and Chest X-ray Image Dataset.
CoRR, 2020

Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review.
IEEE Access, 2020

Adversarial Input Detection Using Image Processing Techniques (IPT).
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Applicability issues of Evasion-Based Adversarial Attacks and Mitigation Techniques.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

An Empirical Study on Algorithmic Bias.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Shamir's Secret Sharing for Authentication without Reconstructing Password.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
A survey of blockchain from security perspective.
J. Bank. Financial Technol., 2019

Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack.
Proceedings of International Joint Conference on Computational Intelligence, 2018

Smart Crowdsourcing Based Content Review System (SCCRS): An Approach to Improve Trustworthiness of Online Contents.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018


  Loading...