Priyanka Singh

Orcid: 0000-0001-5002-8800

According to our database1, Priyanka Singh authored at least 42 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models.
CoRR, July, 2025

Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models.
IEEE Access, 2025

2024
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications.
Computing, October, 2024

An Evaluation of Enigma Machine Online Emulators for Teaching and Learning.
Proceedings of the IEEE International Conference on Teaching, 2024

CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

IRIS-SAFE: Privacy-Preserving Biometric Authentication.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Guarding Against ChatGPT Threats: Identifying and Addressing Vulnerabilities.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Exploiting Correlation Between Facial Action Units for Detecting Deepfake Videos.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Privacy-Preserving Disease Prediction with Secure Data Deduplication on Untrusted Cloud Servers.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Towards Explainable Network Intrusion Detection using Large Language Models.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2024

2023
An image forensic technique based on JPEG ghosts.
Multim. Tools Appl., April, 2023

PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization.
J. Imaging, 2023

BATFL: Battling Backdoor Attacks in Federated Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

RAFT: Evaluating Federated Learning Resilience Against Threats.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Detection of AI Synthesized Hindi Speech.
CoRR, 2022

Targeted Clean-Label Poisoning Attacks on Federated Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

Data Poisoning Attack by Label Flipping on SplitFed Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

XAIForCOVID-19: A Comparative Analysis of Various Explainable AI Techniques for COVID-19 Diagnosis Using Chest X-Ray Images.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

2021
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Detection of AI-Synthesized Speech Using Cepstral & Bispectral Statistics.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

Robust Homomorphic Video Hashing.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Effect of Environmental Conditions on PRNU.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

2019
Recovering tampered regions in encrypted video using POB number system.
Signal Process. Image Commun., 2019

2018
Secure data deduplication using secret sharing schemes over cloud.
Future Gener. Comput. Syst., 2018

Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents.
Displays, 2018

Writer identification using texture features: A comparative study.
Comput. Electr. Eng., 2018

SecureCMerge: Secure PDF Merging over Untrusted Servers.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

GeoSClean: Secure Cleaning of GPS Trajectory Data Using Anomaly Detection.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

Client Side Secure Image Deduplication Using DICE Protocol.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

CARTOONNET: Caricature Recognition of Public Figures.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

2017
S3Email: A method for securing emails from service providers.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

DICE: A dual integrity convergent encryption protocol for client side secure data deduplication.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017

GeoSecure: Towards secure outsourcing of GPS data over cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017


  Loading...