Samiran Chattopadhyay

According to our database1, Samiran Chattopadhyay authored at least 100 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments.
Sensors, 2020

Gestatten: Estimation of User's Attention in Mobile MOOCs From Eye Gaze and Gaze Gesture Tracking.
Proc. ACM Hum. Comput. Interact., 2020

Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment.
J. Inf. Secur. Appl., 2020

Performance analysis of an efficient object-based schema oriented data storage system handling health data.
Innov. Syst. Softw. Eng., 2020

An online learning approach for auto link-Configuration in IEEE 802.11ac wireless networks.
Comput. Networks, 2020

Novel AP association and fair channel access in high throughput WLAN for energy efficiency.
Ad Hoc Networks, 2020

Author Name Disambiguation in PubMed using Ensemble-Based Classification Algorithms.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020

Segmenting Scientific Abstracts into Discourse Categories: A Deep Learning-Based Approach for Sparse Labeled Data.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020

SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11ac.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks.
Proceedings of the Advanced Computing and Systems for Security, 2020

2019
Energy Efficient Routing Protocol for Ambient Assisted Living Environment.
Wirel. Pers. Commun., 2019

Intelligent MU-MIMO User Selection With Dynamic Link Adaptation in IEEE 802.11ax.
IEEE Trans. Wirel. Commun., 2019

Steady-State Analysis of Buffer Occupancy for Different Forwarding Strategies in Mobile Opportunistic Network.
IEEE Trans. Veh. Technol., 2019

Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications.
IEEE Trans. Ind. Informatics, 2019

Minimization of reliability indices and cost of power distribution systems in urban areas using an efficient hybrid meta-heuristic algorithm.
Soft Comput., 2019

Enhancing access to scholarly publications with surrogate resources.
Scientometrics, 2019

A survey of issues and solutions of health data management systems.
Innov. Syst. Softw. Eng., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

Storage and Bandwidth Optimized Reliable Distributed Data Allocation Algorithm.
Int. J. Ambient Comput. Intell., 2019

A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme.
IEEE Access, 2019

Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions.
IEEE Access, 2019

Learning Based Adaptive Fair QoS in IEEE 802.11ac Access Networks.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Performance of Random Access Games over an IEEE 802.11ac Testbed.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment.
IEEE Trans. Dependable Secur. Comput., 2018

A scattering and repulsive swarm intelligence algorithm for solving global optimization problems.
Knowl. Based Syst., 2018

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things.
IEEE Internet Things J., 2018

A Reference Architecture for Context-Aware Intelligent Traffic Management Platforms.
Int. J. Electron. Gov. Res., 2018

On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud.
Int. J. Cloud Appl. Comput., 2018

An efficient fine-grained access control scheme for hierarchical wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment.
IEEE Access, 2018

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks.
IEEE Access, 2018

A Metadata Extractor for Books in a Digital Library.
Proceedings of the Maturity and Innovation in Digital Libraries, 2018

A learning-based dynamic clustering for coordinated multi-point (CoMP) operation with carrier aggregation in LTE-advanced.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

An Intrusion Detection Approach Based On Analysis Of Cluster Heterogeneity.
Proceedings of the International Conference on Information Technology, 2018

DRSQ - A Dynamic Resource Service Quality Based Load Balancing Algorithm.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

Design and Implementation of an Improved Data Warehouse on Clinical Data.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

LDA Topic Modeling Based Dataset Dependency Matrix Prediction.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

2017
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017

Two Phased Routing Protocol Incorporating Distributed Genetic Algorithm and Gradient Based Heuristic in Clustered WSN.
Wirel. Pers. Commun., 2017

Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements over Transport/Application Layer Protocols - A Survey.
CoRR, 2017

Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements on Transport and Application Protocols - A Survey.
IEEE Commun. Surv. Tutorials, 2017

A Survey of Topology-Transparent Scheduling Schemes in Multi-Hop Packet Radio Networks.
IEEE Commun. Surv. Tutorials, 2017

SmartLA: Reinforcement learning-based link adaptation for high throughput wireless access networks.
Comput. Commun., 2017

A lightweight QRS detector for single lead ECG signals using a max-min difference algorithm.
Comput. Methods Programs Biomed., 2017

A novel secure key-exchange protocol using biometrics of the sender and receiver.
Comput. Electr. Eng., 2017

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services.
IEEE Access, 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems.
IEEE Access, 2017

Mobile enabled content adaptation system for PDF documents.
Proceedings of the 11th International Conference on Software, 2017

IEEE 802.11ac Link Adaptation Under Mobility.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Supporting Throughput Fairness in IEEE 802.11ac Dynamic Bandwidth Channel Access: A Hybrid Approach.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

IEEE 802.11ac DBCA: A Tug of War between Channel Utilization and Fairness.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network.
J. Comput. Networks Commun., 2016

A novel distance-based iterative sequential KNN algorithm for estimation of missing values in microarray gene expression data.
Int. J. Bioinform. Res. Appl., 2016

Multi-cloud scenario based QoS enhancing virtual resource brokering.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

Channel Access Fairness in IEEE 802.11ac: A Retrospective Analysis and Protocol Enhancement.
Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, 2016

Dynamic Link Adaptation in IEEE 802.11ac: A Distributed Learning Based Approach.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Game-theoretic wireless CSMA MAC protocols: Measurements from an indoor testbed.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Improved abnormality detection from raw ECG signals using feature enhancement.
Proceedings of the 12th International Conference on Natural Computation, 2016

A new routing protocol for WBAN to enhance energy consumption and network lifetime.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

CrowdAP: Crowdsourcing driven AP coordination for improving energy efficiency in wireless access networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A biometrics-based robust and secure user authentication protocol for e-healthcare service.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Object based schema oriented data storage system for supporting heterogeneous data.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Performance modeling and analysis of high throughput wireless media access with QoS in noisy channel for different traffic conditions.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
An Analysis of Equal Length Cellular Automata (ELCA) Generating Linear Rules for Applications in Distributed Computing.
J. Cell. Autom., 2015

Analysing Topology Control Protocols in Wireless Sensor Network Using Network Evolution Model.
Int. J. Distributed Sens. Networks, 2015

Approach to cryptographic key generation from fingerprint biometrics.
Int. J. Biom., 2015

Fingerprint-based crypto-biometric system for network security.
EURASIP J. Inf. Secur., 2015

A New Hybrid Mutual Exclusion Algorithm in the Absence of Majority Consensus.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

Dynamic link adaptation for High Throughput wireless access networks.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

Decision making in assessment of RRAP of WSN using fuzzy-hybrid approach.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
An efficient GA-PSO approach for solving mixed-integer nonlinear programming problem in reliability optimization.
Swarm Evol. Comput., 2014

Optimal gateway selection in sensor-cloud framework for health monitoring.
IET Wirel. Sens. Syst., 2014

Understanding the Mechanics of Some Localized Protocols by Theory of Complex Networks.
CoRR, 2014

An Approach to Cryptographic Key Exchange Using Fingerprint.
Proceedings of the Security in Computing and Communications, 2014

An approach to cryptographic key distribution through fingerprint based key distribution center.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

An Efficient Fingerprint Matching Approach Based on Minutiae to Minutiae Distance Using Indexing with Effectively Lower Time Complexity.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Recovering a game model from an optimal channel access scheme for WLANs.
Telecommun. Syst., 2013

A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems.
J. Netw. Syst. Manag., 2013

Designing an Efficient Delay Sensitive Routing Metric for IEEE 802.16 Mesh Networks.
CoRR, 2013

A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2013

A Modified Local Least Squares-Based Missing Value Estimation Method in Microarray Gene Expression Data.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix.
Proceedings of the Computer Information Systems and Industrial Management, 2012

Effectiveness of Different Partition Based Clustering Algorithms for Estimation of Missing Values in Microarray Gene Expression Data.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
A DiffServ Architecture for QoS-Aware Routing for Delay-Sensitive and Best-Effort Services in IEEE 802.16 Mesh Networks.
J. Comput. Networks Commun., 2011

2010
Designing Energy-Efficient Topologies for Wireless Sensor Network: Neural Approach.
Int. J. Distributed Sens. Networks, 2010

Maximum lifetime broadcasting in cooperative multi-hop wireless ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks
CoRR, 2010

Congestion Games in Wireless Channels with Multipacket Reception Capability.
Proceedings of the Information and Communication Technologies - International Conference, 2010

2008
Performance Improvement of Wireless MAC Using Non-Cooperative Games.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Energy-Efficient Broadcasting in Wireless Ad Hoc Networks Using Directional Antennas.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Game-Theoretic Modeling and Optimization of Contention-Prone Medium Access Phase in IEEE 802.16/WiMAX Networks.
Proceedings of the 2008 Third International Conference on Broadband Communications, 2008

2007
Energy-Aware Virtual Backbone Tree for Efficient Routing in Wireless Sensor Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

2005
A Novel Approach for an Extendible Middleware Satisfying Adaptability & Interoperability Needs of Multimedia Applications in Mobile Environments.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

2002
Expressing Constraint Models in Object Oriented Data Using UML and ODL.
Proceedings of the Distributed Computing, 2002

1994
Reconstruction of a digital circle.
Pattern Recognit., 1994

1992
Estimation of the original length of a straight line segment from its digitization in three dimensions.
Pattern Recognit., 1992

Parameter estimation and reconstruction of digital conics in normal positions.
CVGIP Graph. Model. Image Process., 1992

1991
A new method of analysis for discrete straight lines.
Pattern Recognit. Lett., 1991

Counting thin and bushy triangulations of convex polygons.
Pattern Recognit. Lett., 1991

1990
The K-dense corridor problems.
Pattern Recognit. Lett., 1990


  Loading...