Sanjay Kumar Jena

Orcid: 0000-0002-1619-8360

According to our database1, Sanjay Kumar Jena authored at least 41 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A systematic state-of-art review on digital identity challenges with solutions using conjugation of IOT and blockchain in healthcare.
Internet Things, April, 2024

2018
An adaptive task allocation technique for green cloud computing.
J. Supercomput., 2018

A model for sentiment and emotion analysis of unstructured social media text.
Electron. Commer. Res., 2018

2017
WDTF: A Technique for Wireless Device Type Fingerprinting.
Wirel. Pers. Commun., 2017

Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications.
Secur. Commun. Networks, 2017

Deceptive review detection using labeled and unlabeled data.
Multim. Tools Appl., 2017

Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data.
Int. J. Semantic Web Inf. Syst., 2017

K-NN Based Outlier Detection Technique on Intrusion Dataset.
Int. J. Knowl. Discov. Bioinform., 2017

Two-stage classification approach for the recognition of handwritten atomic Odia character.
Int. J. Appl. Pattern Recognit., 2017

Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.
IEEE Access, 2017

Harnessing Online News for Sarcasm Detection in Hindi Tweets.
Proceedings of the Pattern Recognition and Machine Intelligence, 2017

2016
EAMRP: energy aware multipath routing protocol for wireless sensor networks.
Int. J. Inf. Commun. Technol., 2016

Sarcastic sentiment detection in tweets streamed in real time: a big data approach.
Digit. Commun. Networks, 2016

A Multiclass SVM Classification Approach for Intrusion Detection.
Proceedings of the Distributed Computing and Internet Technology, 2016

Face Expression Recognition Using Histograms of Oriented Gradients with Reduced Features.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
Introduction to special issue on 'Advances in Information Systems and Network Systems Security'.
Innov. Syst. Softw. Eng., 2015

Classification of handwritten Odia basic character using Stockwell transform.
Int. J. Appl. Pattern Recognit., 2015

Cluster Based Multipath Routing Protocol for Wireless Sensor Networks.
Comput. Commun. Rev., 2015

On selection of attributes for entropy based detection of DDoS.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Parsing-based Sarcasm Sentiment Recognition in Twitter Data.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks.
J. Comput. Eng., 2014

Privacy preserving social networking.
Int. J. Comput. Sci. Eng., 2014

2013
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases.
Trans. Data Priv., 2013

Enhanced t-closeness for balancing utility and privacy.
Int. J. Trust. Manag. Comput. Commun., 2013

Anonymizing social networks: A generalization approach.
Comput. Electr. Eng., 2013

2011
A novel and efficient cryptosystem for large message encryption.
Int. J. Inf. Commun. Technol., 2011

A survey on secure hierarchical routing protocols in wireless sensor networks.
Proceedings of the 2011 International Conference on Communication, 2011

Security in Bluetooth, RFID and wireless sensor networks.
Proceedings of the 2011 International Conference on Communication, 2011

Evaluation of web application security risks and secure design patterns.
Proceedings of the 2011 International Conference on Communication, 2011

Balancing between Utility and Privacy for k-Anonymity.
Proceedings of the Advances in Computing and Communications, 2011

2010
A Secure e-Shopping Using Voice Ordering.
Proceedings of the Information Processing and Management, 2010

2009
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature.
Proceedings of the Contemporary Computing - Second International Conference, 2009

Improved Query Plans for Unnesting Nested SQL Queries.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

Approximation Algorithms for Optimizing Privacy and Utility.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

A Novel Protocol for Smart Card Using ECDLP.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Improved offline signature verification scheme using feature point extraction method.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2007
Blind Steganalysis: Estimation of Hidden Message Length.
Int. J. Comput. Commun. Control, 2007

A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash.
Proceedings of the 10th International Conference on Information Technology, 2007


  Loading...