Priyanka Singh

Orcid: 0000-0003-0841-1544

Affiliations:
  • University of Queensland, School of Electrical Engineering and Computer Science, Brisbane, QLD, Australia
  • Dartmouth College, Hanover, NH, USA (2017 - 2019)
  • State University of New York at Albany, NY, USA (2017)
  • Indian Institute of Technology Roorkee, India (2016 - 2017)
  • Motilal Nehru National Institute of Technology, Allahabad, India (PhD 2016)


According to our database1, Priyanka Singh authored at least 61 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models.
CoRR, July, 2025

Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models.
IEEE Access, 2025

2024
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications.
Computing, October, 2024

An Evaluation of Enigma Machine Online Emulators for Teaching and Learning.
Proceedings of the IEEE International Conference on Teaching, 2024

CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

IRIS-SAFE: Privacy-Preserving Biometric Authentication.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Guarding Against ChatGPT Threats: Identifying and Addressing Vulnerabilities.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Exploiting Correlation Between Facial Action Units for Detecting Deepfake Videos.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Privacy-Preserving Disease Prediction with Secure Data Deduplication on Untrusted Cloud Servers.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Towards Explainable Network Intrusion Detection using Large Language Models.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2024

2023
An image forensic technique based on JPEG ghosts.
Multim. Tools Appl., April, 2023

PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization.
J. Imaging, 2023

BATFL: Battling Backdoor Attacks in Federated Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

RAFT: Evaluating Federated Learning Resilience Against Threats.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
Detection of AI Synthesized Hindi Speech.
CoRR, 2022

Targeted Clean-Label Poisoning Attacks on Federated Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

Data Poisoning Attack by Label Flipping on SplitFed Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

XAIForCOVID-19: A Comparative Analysis of Various Explainable AI Techniques for COVID-19 Diagnosis Using Chest X-Ray Images.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

2021
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Detection of AI-Synthesized Speech Using Cepstral & Bispectral Statistics.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

Robust Homomorphic Video Hashing.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Effect of Environmental Conditions on PRNU.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

2019
Recovering tampered regions in encrypted video using POB number system.
Signal Process. Image Commun., 2019

2018
Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud.
IEEE Trans. Circuits Syst. Video Technol., 2018

A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares.
Signal Process., 2018

Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system.
Multim. Tools Appl., 2018

Reversible data hiding based on Shamir's secret sharing for color images over cloud.
Inf. Sci., 2018

Don't just sign use brain too: A novel multimodal approach for user identification and verification.
Inf. Sci., 2018

Secure data deduplication using secret sharing schemes over cloud.
Future Gener. Comput. Syst., 2018

Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents.
Displays, 2018

Writer identification using texture features: A comparative study.
Comput. Electr. Eng., 2018

SecureCMerge: Secure PDF Merging over Untrusted Servers.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

GeoSClean: Secure Cleaning of GPS Trajectory Data Using Anomaly Detection.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

Client Side Secure Image Deduplication Using DICE Protocol.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

CARTOONNET: Caricature Recognition of Public Figures.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

2017
Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System.
ACM Trans. Multim. Comput. Commun. Appl., 2017

A secure image sharing scheme based on SVD and Fractional Fourier Transform.
Signal Process. Image Commun., 2017

Prediction of advertisement preference by fusing EEG response and sentiment analysis.
Neural Networks, 2017

A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform.
Multim. Tools Appl., 2017

A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion.
Multim. Tools Appl., 2017

A self recoverable dual watermarking scheme for copyright protection and integrity verification.
Multim. Tools Appl., 2017

Rotation and script independent text detection from video frames using sub pixel mapping.
J. Vis. Commun. Image Represent., 2017

A Deep Learning Frame-Work for Recognizing Developmental Disorders.
Proceedings of the 2017 IEEE Winter Conference on Applications of Computer Vision, 2017

S3Email: A method for securing emails from service providers.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

DICE: A dual integrity convergent encryption protocol for client side secure data deduplication.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017

GeoSecure: Towards secure outsourcing of GPS data over cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection.
Multim. Tools Appl., 2016

Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system.
Proceedings of the Tenth Indian Conference on Computer Vision, 2016

2014
Comparative analysis of controllers designed for pure integral complex delayed process model.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Structural modeling and simulation studies of human cyclooxygenase (COX) isozymes with selected terpenes: Implications in drug designing and development.
Comput. Biol. Medicine, 2013

A hybrid DCT-SVD based robust watermarking scheme for copyright protection.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

2012
A region specific robust watermarking scheme based on singular value decomposition.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012


  Loading...