Satrajit Ghosh
Orcid: 0000-0003-2657-5286
According to our database1,
Satrajit Ghosh
authored at least 21 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Standards in the Preparation of Biomedical Research Metadata: A Bridge2AI Perspective.
CoRR, September, 2025
Evaluating Contrast Localizer for Identifying Causal Units in Social & Mathematical Tasks in Language Models.
CoRR, August, 2025
The Bridge2AI-voice application: initial feasibility study of voice data acquisition through mobile health.
Frontiers Digit. Health, 2025
Frontiers Digit. Health, 2025
Proceedings of the Computer Security - ESORICS 2025, 2025
2024
Developing Multi-Disorder Voice Protocols: A team science approach involving clinical expertise, bioethics, standards, and DEI.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024
2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the Provable and Practical Security, 2022
2021
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2017
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Int. J. Inf. Coding Theory, 2014
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012
2011
Proceedings of the Security Aspects in Information Technology, 2011