Nilesh Chakraborty

Orcid: 0000-0002-3825-8838

According to our database1, Nilesh Chakraborty authored at least 33 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A hybrid machine learning approach for hypertension risk prediction.
Neural Comput. Appl., July, 2023

Honeyword-based Authentication Techniques for Protecting Passwords: A Survey.
ACM Comput. Surv., 2023

Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective.
Proceedings of the IEEE International Conference on Digital Health, 2023

The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Cryptanalysis of a Honeyword System in the IoT Platform.
IEEE Internet Things J., 2022

RTT-Based Rogue UAV Detection in IoV Networks.
IEEE Internet Things J., 2022

2021
Introduction to neural network-based question answering over knowledge graphs.
WIREs Data Mining Knowl. Discov., 2021

On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021

On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries.
Frontiers Comput. Sci., 2021

2020
On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs.
IEEE Trans. Cogn. Commun. Netw., 2020

2019
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services.
IET Inf. Secur., 2019

Introduction to Neural Network based Approaches for Question Answering over Knowledge Graphs.
CoRR, 2019

Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services.
Comput. Secur., 2019

On Overcoming the Identified Limitations of a Usable PIN Entry Method.
IEEE Access, 2019

Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs.
Proceedings of the Semantic Web - ISWC 2019, 2019

2018
Translating Natural Language to SQL using Pointer-Generator Networks and How Decoding Order Matters.
CoRR, 2018

On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness.
CoRR, 2017

On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms.
CoRR, 2017

Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit.
CoRR, 2017

On designing a modified-UI based honeyword generation approach for overcoming the existing limitations.
Comput. Secur., 2017

Distributed Semantic Analytics Using the SANSA Stack.
Proceedings of the Semantic Web - ISWC 2017, 2017

The Tale of Sansa Spark.
Proceedings of the ISWC 2017 Posters & Demonstrations and Industry Tracks co-located with 16th International Semantic Web Conference (ISWC 2017), Vienna, Austria, October 23rd - to, 2017

2016
On Designing Leakage-Resilient Vibration Based Authentication Techniques.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

FREME: Multilingual Semantic Enrichment with Linked Data and Language Technologies.
Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, 2016

2015
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack.
Int. J. Trust. Manag. Comput. Commun., 2015

A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability.
CoRR, 2015

Fault masking in Quantum-dot cellular automata using prohibitive logic circuit.
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015

Few notes towards making honeyword system more secure and usable.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
I-SLASS: an improved login approach over SLASS.
Int. J. Trust. Manag. Comput. Commun., 2014

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack.
Proceedings of the Security in Computing and Communications, 2014

SLASS: Secure Login against Shoulder Surfing.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack.
Proceedings of the Information Systems Security - 10th International Conference, 2014


  Loading...