Sanjay Kumar Jena

According to our database1, Sanjay Kumar Jena
  • authored at least 35 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
WDTF: A Technique for Wireless Device Type Fingerprinting.
Wireless Personal Communications, 2017

Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
The Journal of Supercomputing, 2017

Rendezvous based routing protocol for wireless sensor networks with mobile sink.
The Journal of Supercomputing, 2017

Deceptive review detection using labeled and unlabeled data.
Multimedia Tools Appl., 2017

Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data.
Int. J. Semantic Web Inf. Syst., 2017

K-NN Based Outlier Detection Technique on Intrusion Dataset.
IJKDB, 2017

Two-stage classification approach for the recognition of handwritten atomic Odia character.
IJAPR, 2017

Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.
IEEE Access, 2017

Harnessing Online News for Sarcasm Detection in Hindi Tweets.
Proceedings of the Pattern Recognition and Machine Intelligence, 2017

2016
EAMRP: energy aware multipath routing protocol for wireless sensor networks.
IJICT, 2016

A Multiclass SVM Classification Approach for Intrusion Detection.
Proceedings of the Distributed Computing and Internet Technology, 2016

Face Expression Recognition Using Histograms of Oriented Gradients with Reduced Features.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
Introduction to special issue on 'Advances in Information Systems and Network Systems Security'.
ISSE, 2015

Classification of handwritten Odia basic character using Stockwell transform.
IJAPR, 2015

Cluster Based Multipath Routing Protocol for Wireless Sensor Networks.
Computer Communication Review, 2015

On selection of attributes for entropy based detection of DDoS.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Parsing-based Sarcasm Sentiment Recognition in Twitter Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks.
J. Computational Engineering, 2014

Privacy preserving social networking.
IJCSE, 2014

2013
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases.
Trans. Data Privacy, 2013

Enhanced t-closeness for balancing utility and privacy.
IJTMCC, 2013

Anonymizing social networks: A generalization approach.
Computers & Electrical Engineering, 2013

2011
A novel and efficient cryptosystem for large message encryption.
IJICT, 2011

A survey on secure hierarchical routing protocols in wireless sensor networks.
Proceedings of the 2011 International Conference on Communication, 2011

Security in Bluetooth, RFID and wireless sensor networks.
Proceedings of the 2011 International Conference on Communication, 2011

Evaluation of web application security risks and secure design patterns.
Proceedings of the 2011 International Conference on Communication, 2011

Balancing between Utility and Privacy for k-Anonymity.
Proceedings of the Advances in Computing and Communications, 2011

2010
A Secure e-Shopping Using Voice Ordering.
Proceedings of the Information Processing and Management, 2010

2009
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.
Proceedings of the Contemporary Computing - Second International Conference, 2009

Improved Query Plans for Unnesting Nested SQL Queries.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

Approximation Algorithms for Optimizing Privacy and Utility.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

A Novel Protocol for Smart Card Using ECDLP.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Improved offline signature verification scheme using feature point extraction method.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2007
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash.
Proceedings of the 10th International Conference on Information Technology, 2007


  Loading...