Smita Das

Orcid: 0000-0002-3042-1522

According to our database1, Smita Das authored at least 21 papers between 2007 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
A CycleGAN Framework for Anime Style Image Synthesis based on U-Net and Self-Attention.
Computación y Sistemas (CyS), 2026

Automated Academic Cheating Detection Using Video Surveillance and Circumstantial Action Recognition.
Computación y Sistemas (CyS), 2026

Improved Related-Key Differential Attacks against AES-256.
IACR Commun. Cryptol., 2026

Advancements and challenges in deepfake medical imaging: generation and detection techniques.
Comput. Electr. Eng., 2026

ALERTIFY: An AI-Driven Multimodal Social Media Framework for Real-Time Disaster Monitoring and Response.
Proceedings of the Applied Algorithms - Third International Conference, 2026

2025
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response.
Clust. Comput., September, 2025

Enhancing object recognition: a comprehensive analysis of CNN based deep learning models considering lighting conditions and perspectives.
Evol. Intell., August, 2025

A Severe Vulnerability and an Effective Defense Against DFA on Ascon.
ACM Trans. Embed. Comput. Syst., 2025

SAVER: A Cost-Effective Drone-Based Object Detection and Thermal Mapping System for Enhanced Emergency Response.
Proceedings of the Computational Intelligence in Data Science, 2025

2024
A brief study of generative adversarial networks and their applications in image synthesis.
Multim. Tools Appl., 2024

Related-Key Cryptanalysis of FUTURE.
IACR Cryptol. ePrint Arch., 2024

FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
CHPT: an improved coverage-hole patching technique based on tree-center in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2023

Multiple Approaches Towards Authentication Using Keystroke Dynamics.
Proceedings of the International Conference on Machine Learning and Data Engineering, 2023

2022
A Coverage-Hole Boundary Detection Approach Based on Tree-Traversal in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2022

2020
A Review on Coverage-Hole Boundary Detection Algorithms in Wireless Sensor Networks.
Computación y Sistemas, 2020

2019
Node Position Estimation for Efficient Coverage Hole-Detection in Wireless Sensor Network.
Computación y Sistemas, 2019

2018
Computational geometry based coverage hole-detection and hole-area estimation in wireless sensor network.
J. High Speed Networks, 2018

2014
Improvisation of Biometrics Authentication and Identification through Keystrokes Pattern Analysis.
Proceedings of the Distributed Computing and Internet Technology, 2014

2013
SPARSHA: A Low Cost Refreshable Braille for Deaf-Blind People for Communication with Deaf-Blind and Non-disabled Persons.
Proceedings of the Distributed Computing and Internet Technology, 2013

2007
Reliability of self-report: paper versus online administration.
Comput. Hum. Behav., 2007


  Loading...