Prosenjit Chatterjee

According to our database1, Prosenjit Chatterjee authored at least 22 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Sentiment Analysis of Twitter Posts on Global Conflicts.
CoRR, 2023

Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns.
CoRR, 2023

Thermal Face Image Classification using Deep Learning Techniques.
CoRR, 2023

2022
CoAP-DoS: An IoT Network Intrusion Dataset.
CoRR, 2022

A Deep Learning Approach to Create DNS Amplification Attacks.
Proceedings of the MSIE 2022: 4th International Conference on Management Science and Industrial Engineering, Chiang Mai Thailand, April 28, 2022

CoAP-DoS: An IoT Network Intrusion Data Set.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
Ethical implications of brain-computer interfaces with emotion, motor imagery, and subvocal speech classification.
Proceedings of the IEEE International Symposium on Technology and Society, 2021

Implementing a network intrusion detection system using semi-supervised support vector machine and random forest.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

2020
Using a Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) to Classify Network Attacks.
Inf., 2020

An Investigation of Biometric Authentication in the Healthcare Environment.
Array, 2020

DeepFake Detection on Publicly Available Datasets using Modified AlexNet.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

2019
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Framework to Identify People in Unstructured Environments Incorporating Biometrics.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Presentation Attack Detection Using Wavelet Transform and Deep Residual Neural Net.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Continuous Authentication Using Mouse Clickstream Data Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

2018
Anti-spoofing Approach Using Deep Convolutional Neural Network.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

2013
Simplification of C-RTL equivalent checking for fused multiply add unit using intermediate models.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2005
Streamline verification process with formal property verification to meet highly compressed design cycle.
Proceedings of the 42nd Design Automation Conference, 2005

2002
A Specification and Verification Framework for Developing Weak Shared Memory Consistency Protocols.
Proceedings of the Formal Methods in Computer-Aided Design, 4th International Conference, 2002

Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
towards A formal Model of Shared Memory Consistency for Intel Itanium<sup>TM</sup>.
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001

2000
Static slicing in Unix process environment.
Softw. Pract. Exp., 2000


  Loading...