P. Vinod
Orcid: 0000-0001-6078-2014Affiliations:
- Cochin University of Science and Technology, India
- SCMS School of Engineering, Ernakulam / Karukutty, Kerala, India (former)
- University of Padua, Italy (former)
- Malaviya National Institute of Technology, Jaipur, India (PhD)
According to our database1,
P. Vinod
authored at least 61 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A defensive attention mechanism to detect deepfake content across multiple modalities.
Multim. Syst., February, 2024
2023
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning.
SN Comput. Sci., November, 2023
Multim. Syst., October, 2023
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features.
Int. J. Inf. Sec., October, 2023
IEEE Syst. J., June, 2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023
Concurr. Comput. Pract. Exp., January, 2023
CoRR, 2023
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network.
J. Netw. Syst. Manag., 2022
J. Inf. Secur. Appl., 2022
Expert Syst. J. Knowl. Eng., 2022
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Comput. Secur., 2022
Clust. Comput., 2022
Performance evaluation of deep neural network on malware detection: visual feature approach.
Clust. Comput., 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022
2021
Comput. Secur., 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms.
Proceedings of the Italian Conference on Cybersecurity, 2021
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
Proceedings of the International Joint Conference on Neural Networks, 2021
Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021
2020
Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients.
IEEE Internet Things J., 2020
Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020
Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020
Clust. Comput., 2020
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
2019
A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
2018
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
2014
Int. J. Inf. Comput. Secur., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011