Vivek Balachandran

According to our database1, Vivek Balachandran authored at least 20 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Towards Robust Detection of PDF-based Malware.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Using Adversarial Defences Against Image Classification CAPTCHA.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Distributed ledger technology: Its evolutionary path and the road ahead.
Inf. Manag., 2021

Data Analysis for Curriculum Alteration in Information Communication Technology.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

ABC-Verify: AI-Blockchain Integrated Framework for Tweet Misinformation Detection.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Neutralizing Hostile Drones with Surveillance Drones.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Quantum Obfuscation: Quantum Predicates with Entangled qubits.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
GRAMAC: A Graph Based Android Malware Classification Mechanism.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

DRAT: A Drone Attack Tool for Vulnerability Assessment.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Incorporating Industry into the Curriculum: Applied Learning in Computer Science.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Anomaly Detection on DNS Traffic using Big Data and Machine Learning.
Proceedings of the 2nd International Conference on Big Data and Cyber-Security Intelligence, 2019

2018
AEON: Android Encryption based Obfuscation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Effectiveness of Android Obfuscation on Evading Anti-malware.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
Control flow obfuscation for Android applications.
Comput. Secur., 2016

2014
Obfuscation by code fragmentation to evade reverse engineering.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Function Level Control Flow Obfuscation for Software Security.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code.
IEEE Trans. Inf. Forensics Secur., 2013

Software Protection with Obfuscation and Encryption.
Proceedings of the Information Security Practice and Experience, 2013

2011
Software code obfuscation by hiding control flow information in stack.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011


  Loading...