Subhash C. Kak

Orcid: 0000-0001-5426-9759

Affiliations:
  • Oklahoma State University, Stillwater, School of Electrical and Computer Engineering
  • Louisiana State University, Baton Rouge, Department of Electrical & Computer Engineering


According to our database1, Subhash C. Kak authored at least 149 papers between 1974 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fractal Dimensions in Circular and Spiral Phenomena.
Circuits Syst. Signal Process., January, 2024

2023
The Dimensionality of Genetic Information.
Parallel Process. Lett., December, 2023

Linear Fractals with Weights.
Parallel Process. Lett., December, 2023

Self-similarity and the maximum entropy principle in the genetic code.
Theory Biosci., September, 2023

No-Go Theorems on Machine Consciousness.
J. Artif. Intell. Conscious., September, 2023

An Information Principle Based on Partitions for Cognitive Data.
J. Artif. Intell. Conscious., March, 2023

2022
Number of Autonomous Cognitive Agents in a Neural Network.
J. Artif. Intell. Conscious., 2022

The Limits to Machine Consciousness.
J. Artif. Intell. Conscious., 2022

New Classes of Regular Symmetric Fractals.
Circuits Syst. Signal Process., 2022

2021
Fractals with Optimal Information Dimension.
Circuits Syst. Signal Process., 2021

The Intrinsic Dimensionality of Data.
Circuits Syst. Signal Process., 2021

The Base-e Representation of Numbers and the Power Law.
Circuits Syst. Signal Process., 2021

2018
On Ternary Coding and Three-Valued Logic.
CoRR, 2018

Order Effects for Queries in Intelligent Systems.
CoRR, 2018

On the Algebra in Boole's Laws of Thought.
CoRR, 2018

Reasoning in a Hierarchical System with Missing Group Size Information.
CoRR, 2018

2017
Power series models of self-similarity in social networks.
Inf. Sci., 2017

Learning Based on CC1 and CC4 Neural Networks.
CoRR, 2017

Reasoning in Systems with Elements that Randomly Switch Characteristics.
CoRR, 2017

Probability Reversal and the Disjunction Effect in Reasoning Systems.
CoRR, 2017

On Quantum Decision Trees.
CoRR, 2017

The Absent-Minded Driver Problem Redux.
CoRR, 2017

Binary Prime Tableau Sequences.
CoRR, 2017

An Investigation of Power Law Probability Distributions for Network Anomaly Detection.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Incomplete information and quantum decision trees.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Binary primes sequence for cryptography and secure communication.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Pseudorandom tableau sequences.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

Authentication of parties in piggy bank cryptography.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Generalized Unary Coding.
Circuits Syst. Signal Process., 2016

Simulating entanglement in classical computing for cryptographic applications.
Cryptologia, 2016

The binary primes sequence for computational hardening of pseudorandom sequences.
CoRR, 2016

The Narayana Universal Code.
CoRR, 2016

2015
Orthogonal Residue Sequences.
Circuits Syst. Signal Process., 2015

Connectivity in Social Networks.
CoRR, 2015

A Class of Random Sequences for Key Generation.
CoRR, 2015

Two Power Series Models of Self-Similarity in Social Networks.
CoRR, 2015

Multiparty Probability Computation and Verification.
CoRR, 2015

Oblivious Transfer Protocol with Verification.
CoRR, 2015

Extended Unary Coding.
CoRR, 2015

Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption.
CoRR, 2015

2014
Social Network Dynamics: An Attention Economics Perspective.
Proceedings of the Social Networks: A Framework of Computational Intelligence, 2014

The Number Theoretic Hilbert Transform.
Circuits Syst. Signal Process., 2014

Cryptographic Applications of Primitive Pythagorean Triples.
Cryptologia, 2014

Friendship Paradox and Attention Economics.
CoRR, 2014

Spread Unary Coding.
CoRR, 2014

Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography.
CoRR, 2014

Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array.
CoRR, 2014

DAWN: Defending against wormhole attacks in wireless network coding systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Residue Classes of the PPT Sequence
CoRR, 2013

Generalized Public Key Transformations with Side Information
CoRR, 2013

The Quartic Public Key Transformation
CoRR, 2013

The Piggy Bank Cryptographic Trope
CoRR, 2013

Neural Network Capacity for Multilevel Inputs.
CoRR, 2013

A Key Set Cipher for Wireless Sensor Networks.
CoRR, 2013

A Class of Orthogonal Sequences.
CoRR, 2013

Threshold Quantum Cryptography.
CoRR, 2013

Probability and the Classical/Quantum Divide.
CoRR, 2013

Multi-photon implementation of three-stage quantum cryptography protocol.
Proceedings of the International Conference on Information Networking 2013, 2013

Multi-photon tolerant secure quantum communication - From theory to practice.
Proceedings of IEEE International Conference on Communications, 2013

2012
Random Sequences from Primitive Pythagorean Triples
CoRR, 2012

An Alignment Algorithm for Sequences
CoRR, 2012

Random Sequences Based on the Divisor Pairs Function
CoRR, 2012

Goldbach Circles and Balloons and Their Cross Correlation
CoRR, 2012

Goldbach Triples and Key Distribution
CoRR, 2012

Implementation of Secure Quantum Protocol using Multiple Photons for Communication
CoRR, 2012

Goldbach Ellipse Sequences for Cryptographic Applications
CoRR, 2012

On Randomness of Goldbach Sequences
CoRR, 2012

iAQC: The Intensity-Aware Quantum Cryptography Protocol
CoRR, 2012

A Survey of Prediction Using Social Media
CoRR, 2012

Increasing Randomness Using Permutations on Blocks
CoRR, 2012

A Comprehensive Security Model for Networking Applications.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

An empirical study of how users adopt famous entities.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012

2011
Space efficient secret sharing for implicit data security.
Inf. Sci., 2011

The Algebra of Two Dimensional Patterns
CoRR, 2011

Information Centric Frameworks for Micro Assembly.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011 Workshops, 2011

A New Small World Lattice.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Matrix based key agreement algorithms for sensor networks.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
Hybrid Neural Network Architecture for On-Line Learning.
Intell. Inf. Manag., 2010

Internet Voting Protocol Based on Improved Implicit Security.
Cryptologia, 2010

The Use of Rapid Digital Game Creation to Learn Computational Thinking
CoRR, 2010

On the Mesh Array for Matrix Multiplication
CoRR, 2010

Unary Coding for Neural Network Learning
CoRR, 2010

Pythagorean Triples and Cryptographic Coding
CoRR, 2010

Aryabhata's Mathematics
CoRR, 2010

Recursive Secret Sharing for Distributed Storage and Information Hiding
CoRR, 2010

A Key Distribution Scheme for Sensor Networks Using Structured Graphs
CoRR, 2010

A Tree Based Recursive Information Hiding Scheme.
Proceedings of IEEE International Conference on Communications, 2010

Data Mining Using Surface and Deep Agents Based on Neural Networks.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
Multilevel Indexed Quasigroup Encryption for Data and Speech.
IEEE Trans. Broadcast., 2009

Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks.
Secur. Commun. Networks, 2009

Online data storage using implicit security.
Inf. Sci., 2009

Rapid digital game creation for broadening participation in computing and fostering crucial thinking skills.
Int. J. Soc. Humanist. Comput., 2009

A Tree Based Recursive Scheme for Space Efficient Secret Sharing.
IACR Cryptol. ePrint Arch., 2009

Space Efficient Secret Sharing: A Recursive Approach.
IACR Cryptol. ePrint Arch., 2009

Another Look at Quantum Neural Computing
CoRR, 2009

Recursive Random Number Generator Using Prime Reciprocals
CoRR, 2009

Single Neuron Memories and the Network's Proximity Matrix
CoRR, 2009

Memory Retrieved from Single Neurons
CoRR, 2009

Cryptography for Multi-Located Parties
CoRR, 2009

Space Efficient Secret Sharing.
CoRR, 2009

The Transactional Nature of Quantum Information.
CoRR, 2009

A Distributed Data Storage Scheme for Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Learning Computer Programming with Game Design.
Proceedings of the CSEDU 2009 - Proceedings of the First International Conference on Computer Supported Education, Lisboa, Portugal, March 23-26, 2009, 2009

2008
A Recursive Threshold Visual Cryptography Scheme.
IACR Cryptol. ePrint Arch., 2008

Stream Computing
CoRR, 2008

Internet Voting Protocol Based on Implicit Data Security.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
How to improve security in electronic voting?
Ubiquity, 2007

An Improved Method of Content Based Image Watermarking.
IEEE Trans. Broadcast., 2007

2006
On the realizability of quantum computers.
Ubiquity, 2006

Augmented Watermarking.
Cryptologia, 2006

The Cubic Public-Key Transformation
CoRR, 2006

Artificial and Biological Intelligence
CoRR, 2006

Quantum Information and Entropy.
CoRR, 2006

2005
Artificial and Biological Intelligence.
Ubiquity, 2005

Watermarking Using Decimal Sequences.
Cryptologia, 2005

A Three-Stage Quantum Cryptography Protocol.
CoRR, 2005

2003
General qubit errors cannot be corrected.
Inf. Sci., 2003

2002
A class of instantaneously trained neural networks.
Inf. Sci., 2002

Recursive Hiding of Secrets in Visual Cryptography.
Cryptologia, 2002

2000
Quantum computing and neural information processing.
Inf. Sci., 2000

Rotating a qubit.
Inf. Sci., 2000

Active agents, intelligence and quantum computing.
Inf. Sci., 2000

1999
Inverse Kinematics in Robotics using Neural Networks.
Inf. Sci., 1999

A Neural Network-based Intelligent Metasearch Engine.
Inf. Sci., 1999

1998
On Generalization by Neural Networks.
Inf. Sci., 1998

1996
An Indus-Sarasvatī Signboard.
Cryptologia, 1996

1995
On Quantum Neural Computing.
Inf. Sci., 1995

1994
New algorithms for training feedforward neural networks.
Pattern Recognit. Lett., 1994

1993
Neural networks and artificial intelligence.
Inf. Sci., 1993

1990
Indus and Brahmi Further Connections.
Cryptologia, 1990

The Vararuchi Cipher.
Cryptologia, 1990

Neural computing with structured information.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990

1989
A New Method for Coin Flipping by Telephone.
Cryptologia, 1989

1988
A two-layered mesh array for matrix multiplication.
Parallel Comput., 1988

Multilayered array computing.
Inf. Sci., 1988

A frequency Analysis of the Indus Script.
Cryptologia, 1988

The Aryabhata Cipher.
Cryptologia, 1988

1987
The Paninian approach to natural language processing.
Int. J. Approx. Reason., 1987

The Study of the Indus Script General Considerations.
Cryptologia, 1987

1985
Encryption and Error-Correction Coding Using <i>D</i> Sequences.
IEEE Trans. Computers, 1985

How to Detect Tampering of Data.
Inf. Process. Lett., 1985

1984
On the method of puzzles for key distribution.
Int. J. Parallel Program., 1984

1983
A Structural Redundancy in <i>d</i>-Sequences.
IEEE Trans. Computers, 1983

Exponentiation modulo a polynomial for data security.
Int. J. Parallel Program., 1983

Data Security in Computer Networks: Guest Editor's Introduction.
Computer, 1983

Joint Encryption and Error-Correction Coding.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1981
On decimal sequences.
IEEE Trans. Inf. Theory, 1981

Scrambling and Randomization.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981

1974
Binary Sequences and Redundancy.
IEEE Trans. Syst. Man Cybern., 1974


  Loading...