Shamik Sural

According to our database1, Shamik Sural authored at least 172 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Online Public Shaming on Twitter: Detection, Analysis, and Mitigation.
IEEE Trans. Comput. Social Systems, 2019

Deploying ABAC policies using RBAC systems.
Journal of Computer Security, 2019

Security analysis of ABAC under an administrative model.
IET Information Security, 2019

Concept to Code: Deep Learning for Fashion Recommendation.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Understanding Brand Consistency from Web Content.
Proceedings of the 11th ACM Conference on Web Science, 2019

PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Personalised Fashion Recommendation using Deep Learning.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Editorial.
IEEE Trans. Services Computing, 2018

Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Information Forensics and Security, 2018

Efficient computation of cross-sections from human brain model by geometric processing.
J. Real-Time Image Processing, 2018

Towards designing robust CAPTCHAs.
Journal of Computer Security, 2018

A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
Journal of Computer Security, 2018

Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

One for the Road: Recommending Male Street Attire.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Predicted Edit Distance Based Clustering of Gene Sequences.
Proceedings of the IEEE International Conference on Data Mining, 2018

Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

Ontology-Driven Content-Based Retrieval of Heritage Images.
Proceedings of the Heritage Preservation - A Computational Approach, 2018

2017
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Management Inf. Syst., 2017

Migrating from RBAC to temporal RBAC.
IET Information Security, 2017

Attribute-based access control management for multicloud collaboration.
Concurrency and Computation: Practice and Experience, 2017

EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

RESTRAC: REference Sequence Based Space TRAnsformation for Clustering.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

A Comparative Study of Margin Noise Removal Algorithms on MarNR: A Margin Noise Dataset of Document Images.
Proceedings of the 1st International Workshop on Open Services and Tools for Document Analysis, 2017

Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Optimal Rule Mining for Dynamic Authorization Management in Collaborating Clouds Using Attribute-Based Access Control.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Consensus-based clustering for document image segmentation.
IJDAR, 2016

A Survey of Role Mining.
ACM Comput. Surv., 2016

Mining temporal roles using many-valued concepts.
Computers & Security, 2016

Look Before You Shame: A Study on Shaming Activities on Twitter.
Proceedings of the 25th International Conference on World Wide Web, 2016

Authorization Management in Multi-cloud Collaboration Using Attribute-Based Access Control.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

Text and Non-text Separation in Scanned Color-Official Documents.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

SPODS: A Dataset of Color-Official Documents and Detection of Logo, Stamp, and Signature.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

Anveshak - A Groundtruth Generation Tool for Foreground Regions of Document Images.
Proceedings of the Computer Vision, Graphics, and Image Processing, 2016

Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Removal of Gray Rubber Stamps.
Proceedings of the 12th IAPR Workshop on Document Analysis Systems, 2016

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Management Inf. Syst., 2015

Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Sec. Comput., 2015

Frontal gait recognition from occluded scenes.
Pattern Recognition Letters, 2015

The generalized temporal role mining problem.
Journal of Computer Security, 2015

Information fusion from multiple cameras for gait-based re-identification and recognition.
IET Image Processing, 2015

Modelling, synthesis and characterisation of occlusion in videos.
IET Computer Vision, 2015

Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015

Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Text-graphics separation to detect logo and stamp from color document images: A spectral approach.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015

Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera.
IEEE Trans. Information Forensics and Security, 2014

Video analysis of Hammersmith lateral tilting examination using Kalman filter guided multi-path tracking.
Med. Biol. Engineering and Computing, 2014

Pose Depth Volume extraction from RGB-D streams for frontal gait recognition.
J. Visual Communication and Image Representation, 2014

Clustering Non-Ordered Discrete Data.
J. Inf. Sci. Eng., 2014

Security analysis for temporal role based access control.
Journal of Computer Security, 2014

Security analysis of temporal RBAC under an administrative model.
Computers & Security, 2014

Anatomical Model-Guided Segmentation of Brain MR Image Sequences.
Proceedings of the 2014 Indian Conference on Computer Vision, 2014

Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBAC.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Exploiting Pose Information for Gait Recognition from Depth Streams.
Proceedings of the Computer Vision - ECCV 2014 Workshops, 2014

2013
Two-stage database intrusion detection by combining multiple evidence and belief update.
Information Systems Frontiers, 2013

Skew Correction of Document Images by Rank Analysis in Farey sequence.
IJPRAI, 2013

Towards using covariance matrix pyramids as salient point descriptors in 3D point clouds.
Neurocomputing, 2013

AMTRAC: An administrative model for temporal role-based access control.
Computers & Security, 2013

Colored Rubber Stamp Removal from Document Images.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

Gait Recognition from Front and Back View Sequences Captured Using Kinect.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Re-targeting of multi-script document images for handheld devices.
Proceedings of the 4th International Workshop on Multilingual OCR, 2013

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Gait recognition using Pose Kinematics and Pose Energy Image.
Signal Processing, 2012

A hierarchical method combining gait and phase of motion with spatiotemporal model for person re-identification.
Pattern Recognition Letters, 2012

Evaluation of segmentation techniques using region area and boundary matching information.
J. Visual Communication and Image Representation, 2012

A Robust Method for Ventriculomegaly Detection from Neonatal Brain Ultrasound Images.
J. Medical Systems, 2012

Analysis of adductors angle measurement in Hammersmith infant neurological examinations using mean shift segmentation and feature point based object tracking.
Comp. in Bio. and Med., 2012

An efficient model-guided framework for alignment of brain MR image sequences.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Minimum user requirement in Role Based Access Control with Separation of Duty constraints.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Detection and removal of hand-drawn underlines in a document image using approximate digital straightness.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

High resolution 3-D MR image reconstruction from multiple views.
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012

Margin noise removal from printed document images.
Proceedings of the Proceeding of the workshop on Document Analysis and Recognition, 2012

Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
A neighborhood elimination approach for block matching in motion estimation.
Sig. Proc.: Image Comm., 2011

Occlusion detection and gait silhouette reconstruction from degraded scenes.
Signal, Image and Video Processing, 2011

A Tool for Automatic Hammersmith Infant Neurological Examination.
IJEHMC, 2011

Hybrid index-based image search from the web.
IJDMMM, 2011

Security analysis of GTRBAC and its variants using model checking.
Computers & Security, 2011

Classification and Quantification of Occlusion Using Hidden Markov Model.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

Automatic Adductors Angle Measurement for Neurological Assessment of Post-neonatal Infants during Follow Up.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

A hierarchical approach for content-based echocardiogram video indexing and retrieval.
Proceedings of the 2011 International Conference on Communication, 2011

2010
Database intrusion detection using sequence alignment.
Int. J. Inf. Sec., 2010

A column dependency-based approach for static and dynamic recovery of databases from malicious transactions.
Int. J. Inf. Sec., 2010

Toward Analyzing the Impact of Advertisement Billboards on Soccer Telecast Viewers.
International Journal of Computational Intelligence and Applications, 2010

Tracking of Facial Feature Points by Combining Singular Tracking Results with a 3D Active Shape Model.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

Mining RBAC Roles under Cardinality Constraint.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Robust tracking of facial feature points with 3D Active Shape Models.
Proceedings of the International Conference on Image Processing, 2010

2009
BLAST-SSAHA Hybridization for Credit Card Fraud Detection.
IEEE Trans. Dependable Sec. Comput., 2009

Role Based Access Control with Spatiotemporal Context for Mobile Applications.
Trans. Computational Science, 2009

A probabilistic adaptive algorithm for constructing hierarchical meshes.
IEEE Trans. Consumer Electronics, 2009

Resistance Estimation for Lateral Power Arrays Through Accurate Netlist Generation.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2009

Image retrieval from the web using multiple features.
Online Information Review, 2009

Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning.
Information Fusion, 2009

CNODE: clustering of set-valued non-ordered discrete data.
IJDMMM, 2009

XML-based policy specification framework for spatiotemporal access control.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Towards formal security analysis of GTRBAC using timed automata.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Evaluation of Segmentation Techniques Using Region Size and Boundary Information.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

Supporting Negative Authorization in Spatiotemporal Role Based Access Control.
Proceedings of the First International Conference on Networks and Communications, 2009

Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Proceedings of the Information Security, 12th International Conference, 2009

A Fuzzy System for Impact Analysis of Advertisement Billboards in Soccer Telecast.
Proceedings of the Ninth International Conference on Intelligent Systems Design and Applications, 2009

Detection of intrusive activity in databases by combining multiple evidences and belief update.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Graph-Based Multiplayer Detection and Tracking in Broadcast Soccer Videos.
IEEE Trans. Multimedia, 2008

State-Based Modeling and Object Extraction From Echocardiogram Video.
IEEE Trans. Information Technology in Biomedicine, 2008

Credit Card Fraud Detection Using Hidden Markov Model.
IEEE Trans. Dependable Sec. Comput., 2008

ANN- and PSO-Based Synthesis of On-Chip Spiral Inductors for RF ICs.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2008

New pixel-decimation patterns for block matching in motion estimation.
Sig. Proc.: Image Comm., 2008

Soccer video processing for the detection of advertisement billboards.
Pattern Recognition Letters, 2008

Ball detection from broadcast soccer videos using static and dynamic features.
J. Visual Communication and Image Representation, 2008

Attack recovery from malicious transactions in distributed database systems.
IJICS, 2008

Detection of hard cuts and gradual transitions from video using fuzzy logic.
IJAISC, 2008

Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy.
Proceedings of the Trust, 2008

Security analysis and implementation of web-based telemedicine services with a four-tier architecture.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

Security Analysis of Temporal-RBAC Using Timed Automata.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Bottom-Up Construction of Bluetooth Topology under a Traffic-Aware Scheduling Scheme.
IEEE Trans. Mob. Comput., 2007

SKIP Prediction for Fast Rate Distortion Optimization in H.264.
IEEE Trans. Consumer Electronics, 2007

An Integrated Color and Intensity Co-occurrence Matrix.
Pattern Recognition Letters, 2007

A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection.
IJISP, 2007

A power-aware master and bridge scheduling scheme for bluetooth scatternets.
IJAHUC, 2007

Automatic Detection of Human Fall in Video.
Proceedings of the Pattern Recognition and Machine Intelligence, 2007

Human Gait Recognition Using Temporal Slices.
Proceedings of the Pattern Recognition and Machine Intelligence, 2007

STARBAC: Spatio temporal Role Based Access C ontrol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Toward Memory-efficient Design of Video Encoders for Multimedia Applications.
Proceedings of the 2007 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), 2007

Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Access Control Model for Web Services with Attribute Disclosure Restriction.
Proceedings of the The Second International Conference on Availability, 2007

2006
Database Intrusion Detection using Weighted Sequence Mining.
JCP, 2006

A Wide-Band Lumped Element Compact CAD Model of Si-Based Planar Spiral Inductor for RFIC Design.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006

Weighted Intra-transactional Rule Mining for Database Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Online Recovery of a Distributed Database from Malicious Attack.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Modeling of Echocardiogram Video Based on Views and States.
Proceedings of the Computer Vision, Graphics and Image Processing, 5th Indian Conference, 2006

Two-Stage Credit Card Fraud Detection Using Sequence Alignment.
Proceedings of the Information Systems Security, Second International Conference, 2006

Content Based Image and Video Retrieval Using Embedded Text.
Proceedings of the Computer Vision, 2006

Object Tracking Using Background Subtraction and Motion Estimation in MPEG Videos.
Proceedings of the Computer Vision, 2006

2005
A self-organising protocol for Bluetooth scatternet formation.
European Transactions on Telecommunications, 2005

Object Level Frame Comparison for Video Shot Detection.
Proceedings of the 7th IEEE Workshop on Applications of Computer Vision / IEEE Workshop on Motion and Video Computing (WACV/MOTION 2005), 2005

Integration of Keyword and Feature Based Search for Image Retrieval Applications.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

Speeding Up Web Access Using Weighted Association Rules.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

A Game-Theoretic Approach to Credit Card Fraud Detection.
Proceedings of the Information Systems Security, First International Conference, 2005

A simple wide-band compact model and parameter extraction using particle swarm optimization of on-chip spiral inductors for silicon RFICs.
Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, 2005

Human color perception in the HSV space and its application in histogram generation for image retrieval.
Proceedings of the Color Imaging X: Processing, Hardcopy, and Applications, San Jose, 2005

Histogram Generation from the HSV Color Space.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Similarity between Euclidean and cosine angle distance for nearest neighbor queries.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A Color-texture Histogram from the HSV Color Space for Video Shot Detection.
Proceedings of the ICVGIP 2004, 2004

P3 - A Power-Aware Polling Scheme with Priority for Bluetooth.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Segmentation Using Saturation Thresholding and Its Application in Content-Based Retrieval of Images.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

Dynamic Topology Construction in Bluetooth Scatternets.
Proceedings of the High Performance Computing, 2004

2002
A Histogramm with Perceptually Smooth Color Transition for Image Retrieval.
Proceedings of the 6th Joint Conference on Information Science, 2002

Segmentation and histogram generation using the HSV color space for image retrieval.
Proceedings of the 2002 International Conference on Image Processing, 2002

A comparative analysis of two distance measures in color image databases.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
Recognition of an Indian Script Using Multilayer Perceptrons and Fuzzy Features.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

A Genetic Algorithm for Feature Selection in a Neuro-Fuzzy OCR System.
Proceedings of the 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 2001

1999
An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition.
Pattern Recognition Letters, 1999

A Two-state Markov Chain Model of Degraded Document Images.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

A Two-step Algorithm and its Parallelization for the Generation of Minimum Containing Rectangles for Document Image Segmentation.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1997
A document image analysis system on parallel processors.
Proceedings of the Fourth International on High-Performance Computing, 1997

1994
A 600MHz Half-Bit Level Pipelined Multiplier Macrocell.
Proceedings of the Seventh International Conference on VLSI Design, 1994


  Loading...