Samrat Mondal

Orcid: 0000-0002-2159-3410

According to our database1, Samrat Mondal authored at least 85 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intelligent Real-Time Utilization of Hybrid Energy Resources for Cost Optimization in Smart Microgrids.
IEEE Syst. J., March, 2024

Subdomain adaptation via correlation alignment with entropy minimization for unsupervised domain adaptation.
Pattern Anal. Appl., March, 2024

A Multi-stage framework for COVID-19 detection and severity assessment from chest radiography images using advanced fuzzy ensemble technique.
Expert Syst. Appl., March, 2024

A Systematic Survey of Prompt Engineering in Large Language Models: Techniques and Applications.
CoRR, 2024

2023
Secure access privilege delegation using attribute-based encryption.
Int. J. Inf. Sec., October, 2023

A Multi-Objective Optimization Framework for Electric Vehicle Charge Scheduling With Adaptable Charging Ports.
IEEE Trans. Veh. Technol., May, 2023

Unsupervised sub-domain adaptation using optimal transport.
J. Vis. Commun. Image Represent., 2023

Honeyword-based Authentication Techniques for Protecting Passwords: A Survey.
ACM Comput. Surv., 2023

Enhancing Computer-Aided Cervical Cancer Detection Using a Novel Fuzzy Rank-Based Fusion.
IEEE Access, 2023

RDAOT: Robust Unsupervised Deep Sub-Domain Adaptation Through Optimal Transport for Image Classification.
IEEE Access, 2023

A Federated Multi-stage Light-Weight Vision Transformer for Respiratory Disease Detection.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

An Automated Policy Verification and Enforcement Framework for Ethereum Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

2022
Exploiting Higher Order Multi-dimensional Relationships with Self-attention for Author Name Disambiguation.
ACM Trans. Knowl. Discov. Data, 2022

Optimal Sizing and Efficient Routing of Electric Vehicles for a Vehicle-on-Demand System.
IEEE Trans. Ind. Informatics, 2022

Online author name disambiguation in evolving digital library.
Neurocomputing, 2022

Towards achieving efficient access control of medical data with both forward and backward secrecy.
Comput. Commun., 2022

SLAP: A Secure and Lightweight Authentication Protocol for machine-to-machine communication in industry 4.0.
Comput. Electr. Eng., 2022

Computer-Aided COVID-19 Screening from Chest CT-Scan using a Fuzzy Ensemble-based Technique.
Proceedings of the International Joint Conference on Neural Networks, 2022

COVID-19 Detection from Lung Ultrasound Images using a Fuzzy Ensemble-based Transfer Learning Technique.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Vision Transformer-Based Federated Learning for COVID-19 Detection Using Chest X-Ray.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Blockchain-Enabled Emergency Detection and Response in Mobile Healthcare System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Vision Transformer Based COVID-19 Detection Using Chest CT-scan images.
Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics, 2022

2021
Exploiting similarities across multiple dimensions for author name disambiguation.
Scientometrics, 2021

On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things.
IEEE Internet Things J., 2021

On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries.
Frontiers Comput. Sci., 2021

2020
A Graph Combination With Edge Pruning-Based Approach for Author Name Disambiguation.
J. Assoc. Inf. Sci. Technol., 2020

Routing of Delivery Trucks in a Battery Swapping System with Partial Delivery Option.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

Intelligent Scheduling of V2G, V2V, G2V Operations in a Smart Microgrid.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

A Fast and Efficient Way to Obtain the Optimal Number of Ports in Electric Vehicle Charging Stations.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

2019
Divide-and-conquer based non-dominated sorting with Reduced Comparisons.
Swarm Evol. Comput., 2019

A divide-and-conquer based efficient non-dominated sorting approach.
Swarm Evol. Comput., 2019

Multiobjective Optimal Scheduling Framework for HVAC Devices in Energy-Efficient Buildings.
IEEE Syst. J., 2019

Towards incorporating honeywords in n-session recording attack resilient unaided authentication services.
IET Inf. Secur., 2019

Dispersion Ratio based Decision Tree Model for Classification.
Expert Syst. Appl., 2019

Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services.
Comput. Secur., 2019

On Overcoming the Identified Limitations of a Usable PIN Entry Method.
IEEE Access, 2019

Intelligent Scheduling of Smart Appliances in Energy Efficient Buildings: A Practical Approach.
Proceedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems, 2019

A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database.
Proceedings of the TENCON 2019, 2019

Coordinated Scheduling of Residential Appliances and Heterogeneous Energy Sources in a Smart Microgrid.
Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, 2019

2018
Efficient Scheduling of Nonpreemptive Appliances for Peak Load Optimization in Smart Grid.
IEEE Trans. Ind. Informatics, 2018

GBOS: Generalized Best Order Sort algorithm for non-dominated sorting.
Swarm Evol. Comput., 2018

Towards Obtaining Upper Bound on Sensitivity Computation Process for Cluster Validity Measures.
Fundam. Informaticae, 2018

On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness.
Proceedings of the 17th IEEE International Conference On Trust, 2018

drPass: A Dynamic and Reusable Password Generator Protocol.
Proceedings of the Information Systems Security - 14th International Conference, 2018

SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones.
Proceedings of the Information Systems Security - 14th International Conference, 2018

On Evaluation of Entity Matching Techniques for Bibliographic Database.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

An Approach to Obtain the Upper Bound on the Number of Non-dominated Fronts in a Population.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Towards optimal scheduling of thermal comfortability and smoothening of load profile in energy efficient buildings: work-in-progress.
Proceedings of the International Conference on Embedded Software, 2018

Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

An unsupervised heuristic based approach for author name disambiguation.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

MBOS: Modified Best Order Sort Algorithm for Performing Non-Dominated Sorting.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Intelligent Scheduling of Thermostatic Devices for Efficient Energy Management in Smart Grid.
IEEE Trans. Ind. Informatics, 2017

On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness.
CoRR, 2017

On The Limitation of Some Fully Observable Multiple Session Resilient Shoulder Surfing Defense Mechanisms.
CoRR, 2017

Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit.
CoRR, 2017

On designing a modified-UI based honeyword generation approach for overcoming the existing limitations.
Comput. Secur., 2017

Improved solution to the non-domination level update problem.
Appl. Soft Comput., 2017

GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases.
Appl. Intell., 2017

Unsupervised method to ensemble results of multiple clustering solutions for bibliographic data.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Sensitivity - An Important Facet of Cluster Validation Process for Entity Matching Technique.
Trans. Large Scale Data Knowl. Centered Syst., 2016

A multiobjective optimization based entity matching technique for bibliographic databases.
Expert Syst. Appl., 2016

On Designing Leakage-Resilient Vibration Based Authentication Techniques.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack.
Proceedings of the Intelligent Human Computer Interaction - 8th International Conference, 2016

SPOSS: Secure Pin-Based-Authentication Obviating Shoulder Surfing.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Fast implementation of steady-state NSGA-II.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Divide and conquer based non-dominated sorting for parallel environment.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

An automatic framework for entity matching in bibliographic databases.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining.
Proceedings of the 16th IEEE International Conference on Bioinformatics and Bioengineering, 2016

2015
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack.
Int. J. Trust. Manag. Comput. Commun., 2015

CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining.
CoRR, 2015

A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability.
CoRR, 2015

Few notes towards making honeyword system more secure and usable.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
I-SLASS: an improved login approach over SLASS.
Int. J. Trust. Manag. Comput. Commun., 2014

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack.
Proceedings of the Security in Computing and Communications, 2014

SLASS: Secure Login against Shoulder Surfing.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

On Validation of Clustering Techniques for Bibliographic Databases.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Entity Matching Technique for Bibliographic Database.
Proceedings of the Database and Expert Systems Applications, 2013

2011
Security analysis of GTRBAC and its variants using model checking.
Comput. Secur., 2011

2009
Role Based Access Control with Spatiotemporal Context for Mobile Applications.
Trans. Comput. Sci., 2009

XML-based policy specification framework for spatiotemporal access control.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Towards formal security analysis of GTRBAC using timed automata.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Supporting Negative Authorization in Spatiotemporal Role Based Access Control.
Proceedings of the First International Conference on Networks and Communications, 2009

2008
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

Security Analysis of Temporal-RBAC Using Timed Automata.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008


  Loading...