P. Vinod

Orcid: 0000-0001-6078-2014

Affiliations:
  • Cochin University of Science and Technology, India
  • SCMS School of Engineering, Ernakulam / Karukutty, Kerala, India (former)
  • University of Padua, Italy (former)
  • Malaviya National Institute of Technology, Jaipur, India (PhD)


According to our database1, P. Vinod authored at least 61 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A defensive attention mechanism to detect deepfake content across multiple modalities.
Multim. Syst., February, 2024

Privacy-Preserving in Blockchain-based Federated Learning Systems.
CoRR, 2024

2023
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning.
SN Comput. Sci., November, 2023

Affect sensing from smartphones through touch and motion contexts.
Multim. Syst., October, 2023

A defensive framework for deepfake detection under adversarial settings using temporal and spatial features.
Int. J. Inf. Sec., October, 2023

Evading Machine-Learning-Based Android Malware Detector for IoT Devices.
IEEE Syst. J., June, 2023

Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023

Sober: Explores for invasive behaviour of malware.
J. Inf. Secur. Appl., May, 2023

A smartphone authentication system based on touch gesture dynamics.
Concurr. Comput. Pract. Exp., January, 2023

NLP-Based Techniques for Cyber Threat Intelligence.
CoRR, 2023

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?
CoRR, 2023

MMDFD- A Multimodal Custom Dataset for Deepfake Detection.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

2022
Detection and robustness evaluation of android malware classifiers.
J. Comput. Virol. Hacking Tech., 2022

GANG-MAM: GAN based enGine for Modifying Android Malware.
SoftwareX, 2022

A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network.
J. Netw. Syst. Manag., 2022

Obfuscation detection in Android applications using deep learning.
J. Inf. Secur. Appl., 2022

Cognitive smart cities: Challenges and trending solutions.
Expert Syst. J. Knowl. Eng., 2022

A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Comput. Secur., 2022

Evaluation of adversarial machine learning tools for securing AI systems.
Clust. Comput., 2022

Performance evaluation of deep neural network on malware detection: visual feature approach.
Clust. Comput., 2022

On the Influence of Image Settings in Deep Learning-based Malware Detection.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
Malware detection employed by visualization and deep neural network.
Comput. Secur., 2021

Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms.
Proceedings of the Italian Conference on Cybersecurity, 2021

Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
Proceedings of the International Joint Conference on Neural Networks, 2021

Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Secure Static Content Delivery for CDN Using Blockchain Technology.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Downsampling Attack on Automatic Speaker Authentication System.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients.
IEEE Internet Things J., 2020

Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020

Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020

SysDroid: a dynamic ML-based android malware analyzer using system call traces.
Clust. Comput., 2020

Detection of Tor Traffic using Deep Learning.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019

Identification of Android malware using refined system calls.
Concurr. Comput. Pract. Exp., 2019

2018
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018

Malware Signature Generation Using Locality Sensitive Hashing.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

2017
Identification of malicious android app using manifest and opcode features.
J. Comput. Virol. Hacking Tech., 2017

2015
Information theoretic method for classification of packed and encoded files.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Hartley's test ranked opcodes for Android malware analysis.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Machine learning approach for filtering spam emails.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Heterogeneous feature space for Android malware detection.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

Pruned feature space for metamorphic malware detection using Markov Blanket.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
Detecting malicious files using non-signature-based methods.
Int. J. Inf. Comput. Secur., 2014

Android Malware Analysis Using Ensemble Features.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Linux Malware Detection Using eXtended-Symmetric Uncertainty.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Towards the Detection of Undetectable Metamorphic Malware.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Droid permission miner: Mining prominent permissions for Android malware analysis.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

Exploration of robust features for multiclass emotion classification.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Framework for design of Graybot in social network.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

X-ANOVA and X-Utest features for Android malware analysis.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Linux malware detection using non-parametric statistical methods.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Discriminant features for metamorphic malware detection.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
MCF: MultiComponent Features for Malware Analysis.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
ESCAPE: entropy score analysis of packed executable.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

SPADE: Signature based PAcker DEtection.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Behavioural detection with <i>API call-grams</i> to identify malicious PE files.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Scattered Feature Space for Malware Analysis.
Proceedings of the Advances in Computing and Communications, 2011

Metamorphic Malware Analysis and Detection Methods.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011


  Loading...