Sanchita Ghosh

Orcid: 0000-0003-3040-7760

According to our database1, Sanchita Ghosh authored at least 25 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Detecting Switching Attacks On Traffic Flow Regulation For Changing Driving Patterns.
CoRR, May, 2025

Transfer Learning Assisted XgBoost For Adaptable Cyberattack Detection In Battery Packs.
CoRR, April, 2025

Secure Estimation of Battery Voltage Under Sensor Attacks: A Self-Learning Koopman Approach.
CoRR, April, 2025

Assessment of Cyberattack Detection-Isolation Algorithm for CAV Platoons Using SUMO.
CoRR, March, 2025

2024
A Cyberattack Detection-Isolation Algorithm for CAV Under Changing Driving Environment.
IEEE Trans. Intell. Transp. Syst., December, 2024

An innovative approach of selecting cloud provider through service level agreements.
Int. J. Bus. Inf. Syst., 2024

Analysing the cloud efficacy by fuzzy logic.
Int. J. Bus. Inf. Syst., 2024

Exponential Quantum Speedup for the Traveling Salesman Problem.
IACR Cryptol. ePrint Arch., 2024

Efficient Quantum Algorithm for SUBSET-SUM Problem.
IACR Cryptol. ePrint Arch., 2024

Koopman Mode-Based Detection of Internal Short Circuits in Lithium-ion Battery Pack.
CoRR, 2024

Simulated Annealing for Optimal Placement of Wireless Sensor Network Nodes.
Proceedings of the 27th International Symposium on Wireless Personal Multimedia Communications, 2024

Isolating Signatures of Cyberattacks under Stressed Grid Conditions.
Proceedings of the 50th Annual Conference of the IEEE Industrial Electronics Society, 2024

Koopman Operator-Based Detection-Isolation of Cyberattack: A Case Study on Electric Vehicle Charging.
Proceedings of the American Control Conference, 2024

2023
Robotics in Medical Domain: The Future of Surgery, Healthcare and Imaging.
Wirel. Pers. Commun., October, 2023

A Cyberattack Detection-Isolation Scheme For CAV Under Changing Driving Environment.
CoRR, 2023

Security Of Cyber-physical Systems Under Compromised Switching.
Proceedings of the IEEE Conference on Control Technology and Applications, 2023

2022
Exploring appropriate ERP framework towards Indian small and medium enterprises using decision tree.
Int. J. Bus. Intell. Data Min., 2022

Accuracy Enhancement of Epileptic Seizure Detection: A Deep Learning Approach with Hardware Realization of STFT.
Circuits Syst. Signal Process., 2022

2018
Implementing Fuzzy TOPSIS in Cloud Type and Service Provider Selection.
Adv. Fuzzy Syst., 2018

2017
Behaviour state analysis through brain computer interface using wearable EEG devices: a review.
Electron. Gov. an Int. J., 2017

2015
Call Admission Control Using Bio-Geography Based Optimization.
Int. J. Appl. Evol. Comput., 2015

2013
Call Admission Control in Mobile Cellular Networks
Studies in Computational Intelligence 437, Springer, ISBN: 978-3-642-30996-0, 2013

2012
Automatic call management in a cellular mobile network by fuzzy threshold logic.
Int. J. Knowl. Based Intell. Eng. Syst., 2012

2011
An evolutionary approach to velocity and traffic sensitive call admission control.
Intell. Decis. Technol., 2011

2008
Dynamic Channel Assignment Problem in Mobile Networks Using Particle Swarm Optimization.
Proceedings of the EMS 2008, 2008


  Loading...