default search action
Jaydip Sen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i105]Hetvi Waghela, Sneha Rakshit, Jaydip Sen:
A Modified Word Saliency-Based Adversarial Attack on Text Classification Models. CoRR abs/2403.11297 (2024) - [i104]Jaydip Sen, Joceli Mayer, Subhasis Dasgupta, Subrata Nandi, Srinivasan Krishnaswamy, Pinaki Mitra, Mahendra Pratap Singh, Naga Prasanthi Kundeti, Chandra Sekhara Rao MVP, Sudha Sree Chekuri, Seshu Babu Pallapothu, Preethi Nanjundan, Jossy P. George, Abdelhadi El Allahi, Ilham Morino, Salma AIT Oussous, Siham Beloualid, Ahmed Tamtaoui, Abderrahim Bajit:
Information Security and Privacy in the Digital World: Some Selected Topics. CoRR abs/2404.00235 (2024) - [i103]Rohit Pandey, Hetvi Waghela, Sneha Rakshit, Aparna Rangari, Anjali Singh, Rahul Kumar, Ratnadeep Ghosal, Jaydip Sen:
Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model. CoRR abs/2404.01786 (2024) - [i102]Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen:
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism. CoRR abs/2404.04245 (2024) - [i101]Roopkatha Dey, Aivy Debnath, Sayak Kumar Dutta, Kaustav Ghosh, Arijit Mitra, Arghya Roy Chowdhury, Jaydip Sen:
Semantic Stealth: Adversarial Text Attacks on NLP Using Several Methods. CoRR abs/2404.05159 (2024) - [i100]Anamitra Maiti, Subham Laha, Rishav Upadhaya, Soumyajit Biswas, Vikas Chaudhary, Biplab Kar, Nikhil Kumar, Jaydip Sen:
Boosting Digital Safeguards: Blending Cryptography and Steganography. CoRR abs/2404.05985 (2024) - [i99]Hetvi Waghela, Jaydip Sen, Sneha Rakshit:
Saliency Attention and Semantic Similarity-Driven Adversarial Perturbation. CoRR abs/2406.19413 (2024) - [i98]Jaydip Sen, Hetvi Waghela, Sneha Rakshit:
Exploring Sectoral Profitability in the Indian Stock Market Using Deep Learning. CoRR abs/2407.01572 (2024) - [i97]Hetvi Waghela, Jaydip Sen, Sneha Rakshit:
Enhancing Adversarial Text Attacks on BERT Models with Projected Gradient Descent. CoRR abs/2407.21073 (2024) - [i96]Subhasis Dasgupta, Soumya Roy, Jaydip Sen:
Analyzing Consumer Reviews for Understanding Drivers of Hotels Ratings: An Indian Perspective. CoRR abs/2408.04369 (2024) - [i95]Jaydip Sen, Hetvi Waghela, Sneha Rakshit:
Privacy in Federated Learning. CoRR abs/2408.08904 (2024) - [i94]Hetvi Waghela, Jaydip Sen, Sneha Rakshit:
Robust Image Classification: Defensive Strategies against FGSM and PGD Adversarial Attacks. CoRR abs/2408.13274 (2024) - [i93]Subhasis Dasgupta, Jaydip Sen:
A Comparative Study of Hyperparameter Tuning Methods. CoRR abs/2408.16425 (2024) - [i92]Subhasis Dasgupta, Pratik Satpati, Ishika Choudhary, Jaydip Sen:
Understanding the Impact of News Articles on the Movement of Market Index: A Case on Nifty 50. CoRR abs/2412.06794 (2024) - [i91]Hetvi Waghela, Jaydip Sen, Sneha Rakshit:
Adversarial Robustness through Dynamic Ensemble Learning. CoRR abs/2412.16254 (2024) - 2023
- [i90]Jaydip Sen, Subhasis Dasgupta:
Data Privacy Preservation on the Internet of Things. CoRR abs/2304.00258 (2023) - [i89]Jaydip Sen, Aditya Jaiswal, Anshuman Pathak, Atish Kumar Majee, Kushagra Kumar, Manas Kumar Sarkar, Soubhik Maji:
A Comparative Analysis of Portfolio Optimization Using Mean-Variance, Hierarchical Risk Parity, and Reinforcement Learning Approaches on the Indian Stock Market. CoRR abs/2305.17523 (2023) - [i88]Jaydip Sen:
Cryptography and Key Management Schemes for Wireless Sensor Networks. CoRR abs/2307.00872 (2023) - [i87]Jaydip Sen, Subhasis Dasgupta:
Adversarial Attacks on Image Classification Models: FGSM and Patch Attacks and their Impact. CoRR abs/2307.02055 (2023) - [i86]Jaydip Sen, Subhasis Dasgupta:
Portfolio Optimization: A Comparative Study. CoRR abs/2307.05048 (2023) - [i85]Abhiraj Sen, Jaydip Sen:
Performance Evaluation of Equal-Weight Portfolio and Optimum Risk Portfolio on Indian Stocks. CoRR abs/2309.13696 (2023) - [i84]Jaydip Sen, Arup Dasgupta, Subhasis Dasgupta, Sayantani Roy Choudhury:
A Portfolio Rebalancing Approach for the Indian Stock Market. CoRR abs/2310.09770 (2023) - [i83]Jaydip Sen, Arup Dasgupta, Partha Pratim Sengupta, Sayantani Roy Choudhury:
A Comparative Study of Portfolio Optimization Methods for the Indian Stock Market. CoRR abs/2310.14748 (2023) - [i82]Jaydip Sen, Abhiraj Sen, Ananda Chatterjee:
Adversarial Attacks on Image Classification Models: Analysis and Defense. CoRR abs/2312.16880 (2023) - 2022
- [c25]Subhasis Dasgupta, Jaydip Sen:
A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach. OCIT 2022: 233-237 - [c24]Jaydip Sen:
Optimum Pair-Trading Strategies for Stocks Using Cointegration-Based Approach. OCIT 2022: 371-375 - [i81]Jaydip Sen, Sidra Mehtab, Rajdeep Sen, Abhishek Dutta, Pooja Kherwa, Saheel Ahmed, Pranay Berry, Sahil Khurana, Sonali Singh, David W. W. Cadotte, David W. Anderson, Kalum J. Ost, Racheal S. Akinbo, Oladunni A. Daramola, Bongs Lainjo:
Machine Learning: Algorithms, Models, and Applications. CoRR abs/2201.01943 (2022) - [i80]Jaydip Sen, Ashwin Kumar R. S, Geetha Joseph, Kaushik Muthukrishnan, Koushik Tulasi, Praveen Varukolu:
Precise Stock Price Prediction for Robust Portfolio Design from Selected Sectors of the Indian Stock Market. CoRR abs/2201.05570 (2022) - [i79]Jaydip Sen, Saikat Mondal, Sidra Mehtab:
Portfolio Optimization on NIFTY Thematic Sector Stocks Using an LSTM Model. CoRR abs/2202.02723 (2022) - [i78]Jaydip Sen, Sidra Mehtab, Abhishek Dutta, Saikat Mondal:
Hierarchical Risk Parity and Minimum Variance Portfolio Design on NIFTY 50 Stocks. CoRR abs/2202.02728 (2022) - [i77]Jaydip Sen, Sidra Mehtab, Abhishek Dutta, Saikat Mondal:
Precise Stock Price Prediction for Optimized Portfolio Design Using an LSTM Model. CoRR abs/2203.01326 (2022) - [i76]Jaydip Sen, Saikat Mondal, Gourab Nath:
Robust Portfolio Design and Stock Price Prediction Using an Optimized LSTM Model. CoRR abs/2204.01850 (2022) - [i75]Jaydip Sen, Arpit Awad, Aaditya Raj, Gourav Ray, Pusparna Chakraborty, Sanket Das, Subhasmita Mishra:
Stock Performance Evaluation for Portfolio Design from Different Sectors of the Indian Stock Market. CoRR abs/2208.07166 (2022) - [i74]Jaydip Sen, Abhishek Dutta:
A Comparative Study of Hierarchical Risk Parity Portfolio and Eigen Portfolio on the NIFTY 50 Stocks. CoRR abs/2210.00984 (2022) - [i73]Ananda Chatterjee, Hrisav Bhowmick, Jaydip Sen:
Stock Volatility Prediction using Time Series and Deep Learning Approach. CoRR abs/2210.02126 (2022) - [i72]Jaydip Sen:
Designing Efficient Pair-Trading Strategies Using Cointegration for the Indian Stock Market. CoRR abs/2211.07080 (2022) - [i71]Subhasis Dasgupta, Jaydip Sen:
A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach. CoRR abs/2212.10051 (2022) - 2021
- [c23]Jaydip Sen, Sidra Mehtab, Abhishek Dutta, Saikat Mondal:
Precise Stock Price Prediction for Optimized Portfolio Design Using an LSTM Model. OCIT 2021: 210-215 - [i70]Jaydip Sen, Sidra Mehtab:
Accurate Stock Price Forecasting Using Robust and Optimized Deep Learning Models. CoRR abs/2103.15096 (2021) - [i69]Jaydip Sen, Abhishek Dutta, Sidra Mehtab:
Profitability Analysis in Stock Investment Using an LSTM-Based Deep Learning Model. CoRR abs/2104.06259 (2021) - [i68]Gourab Nath, Jaydip Sen:
An Algorithm for Recommending Groceries Based on an Item Ranking Method. CoRR abs/2105.00650 (2021) - [i67]Jaydip Sen, Sidra Mehtab, Abhishek Dutta:
Volatility Modeling of Stocks from Selected Sectors of the Indian Economy Using GARCH. CoRR abs/2105.13898 (2021) - [i66]Jaydip Sen, Sidra Mehtab:
Design and Analysis of Robust Deep Learning Models for Stock Price Prediction. CoRR abs/2106.09664 (2021) - [i65]Jaydip Sen, Sidra Mehtab:
Optimum Risk Portfolio and Eigen Portfolio: A Comparative Analysis Using Selected Stocks from the Indian Stock Market. CoRR abs/2107.11371 (2021) - [i64]Jaydip Sen, Rajdeep Sen, Abhishek Dutta:
Machine Learning in Finance-Emerging Trends and Challenges. CoRR abs/2110.11999 (2021) - [i63]Ananda Chatterjee, Hrisav Bhowmick, Jaydip Sen:
Stock Price Prediction Using Time Series, Econometric, Machine Learning, and Deep Learning Models. CoRR abs/2111.01137 (2021) - [i62]Jaydip Sen, Abhishek Dutta, Sidra Mehtab:
Stock Portfolio Optimization Using a Deep Learning LSTM Model. CoRR abs/2111.04709 (2021) - [i61]Jaydip Sen, Saikat Mondal, Sidra Mehtab:
Analysis of Sectoral Profitability of the Indian Stock Market Using an LSTM Regression Model. CoRR abs/2111.04976 (2021) - [i60]Hrisav Bhowmick, Ananda Chatterjee, Jaydip Sen:
Comprehensive Movie Recommendation System. CoRR abs/2112.12463 (2021) - 2020
- [i59]Sidra Mehtab, Jaydip Sen:
Stock Price Prediction Using Convolutional Neural Networks on a Multivariate Timeseries. CoRR abs/2001.09769 (2020) - [i58]Sidra Mehtab, Jaydip Sen:
A Time Series Analysis-Based Stock Price Prediction Using Machine Learning and Deep Learning Models. CoRR abs/2004.11697 (2020) - [i57]Jaydip Sen, Sidra Mehtab, Michael Ekonde Sone, Jyothsna Veeramreddy, Koneti Munivara Prasad, Rajeev Singh, Teek Parval Sharma, Anton Noskov, Ignacio Velásquez, Angélica Caro, Alfonco Rodriguez, Tamer S. A. Fatayer, Altaf O. Mulani, Pradeep B. Mane, Roshan Chitrakar, Roshan Bhusal, Prajwol Maharjan:
Computer and Network Security. CoRR abs/2007.16147 (2020) - [i56]Jaydip Sen, Sidra Mehtab:
Machine Learning Applications in Misuse and Anomaly Detection. CoRR abs/2009.06709 (2020) - [i55]Sidra Mehtab, Jaydip Sen, Abhishek Dutta:
Stock Price Prediction Using Machine Learning and LSTM-Based Deep Learning Models. CoRR abs/2009.10819 (2020) - [i54]Sidra Mehtab, Jaydip Sen:
Stock Price Prediction Using CNN and LSTM-Based Deep Learning Models. CoRR abs/2010.13891 (2020) - [i53]Sidra Mehtab, Jaydip Sen, Subhasis Dasgupta:
Analysis and Forecasting of Financial Time Series Using CNN and LSTM-Based Deep Learning Models. CoRR abs/2011.08011 (2020)
2010 – 2019
- 2019
- [i52]Sidra Mehtab, Jaydip Sen:
A Robust Predictive Model for Stock Price Prediction Using Deep Learning and Natural Language Processing. CoRR abs/1912.07700 (2019) - 2018
- [i51]Jaydip Sen, Moonkun Lee, Sunghyeon Lee, Yeongbok Choe, Menachem Domb, Arpan Pal, Hemant Kumar Rath, Samar Shailendra, Abhijan Bhattacharyya, Albena Mihovska, Mahasweta Sarkar, Hyun Jung Lee, Myungho Kim, Alexandru Averian:
Internet of Things: Technology, Applications and Standardardization. CoRR abs/1808.09390 (2018) - 2017
- [c22]Sanjana Mondal, Jaydip Sen:
A Framework of Predictive Analysis of Tourist Inflow in the Beaches of West Bengal: A Study of Digha-Mandarmoni Beach. CICBA (1) 2017: 161-176 - [i50]Sanjib Biswas, Jaydip Sen:
A Proposed Architecture for Big Data Driven Supply Chain Analytics. CoRR abs/1705.04958 (2017) - [i49]Jaydip Sen, Shanrong Zhao, Xiaoying Wang, Guojing Zhang, Mengqin Yang, Jian Wang, Yun Long, Sergey Andreev, Roman Florea, Aleksandr Ometov, Adam Surak, Yevgeni Koucheryavy, Muhammad A. Ashraf, Waleed Tariq Sethi, Abdullah Alfakhri, Saleh A. Alshebeili, Amr Alasaad:
Cloud Computing - Architecture and Applications. CoRR abs/1707.09488 (2017) - [i48]Jaydip Sen, Javier Franco-Contreras, Gouenou Coatrieux, Nilay K. Sangani, Haroot Zarger, Faouzi Jaïdi, Bob Duncan, Alfred Bratterud, Andreas Happe, Chin-Feng Lin, Che-Wei Liu, Walid Elgenaidi, Muftah Fraifer, Thomas Newe, Eoin O'Connell, Avijit Mathur, Ruolin Zhang, Eric Filiol:
Advances in Security in Computing and Communications. CoRR abs/1707.09526 (2017) - 2016
- [i47]Jaydip Sen, Tamal Datta Chaudhuri:
Decomposition of Time Series Data of Stock Markets and its Implications for Prediction: An Application for the Indian Auto Sector. CoRR abs/1601.02407 (2016) - [i46]Jaydip Sen, Tamal Datta Chaudhuri:
A Framework for Predictive Analysis of Stock Market Indices : A Study of the Indian Auto Sector. CoRR abs/1604.04044 (2016) - [i45]Jaydip Sen, Tamal Datta Chaudhuri:
An Alternative Framework for Time Series Decomposition and Forecasting and its Relevance for Portfolio Choice: A Comparative Study of the Indian Consumer Durable and Small Cap Sectors. CoRR abs/1605.03930 (2016) - 2013
- [j7]Jaydip Sen:
Secure and user privacy-preserving searching in peer-to-peer networks. Log. J. IGPL 21(4): 603-629 (2013) - [p2]Jaydip Sen:
Security and Privacy Issues in Wireless Mesh Networks: A Survey. Wireless Networks and Security 2013: 189-272 - [p1]Jaydip Sen:
An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks. Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence 2013: 279-320 - [i44]Jaydip Sen:
Security in Wireless Sensor Networks. CoRR abs/1301.5065 (2013) - [i43]Jaydip Sen:
Security and Privacy Issues in Wireless Mesh Networks: A Survey. CoRR abs/1302.0939 (2013) - [i42]Jaydip Sen:
Security and Privacy Challenges in Cognitive Wireless Sensor Networks. CoRR abs/1302.2253 (2013) - [i41]Jaydip Sen:
Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. CoRR abs/1302.4882 (2013) - [i40]Jaydip Sen:
Security and Privacy Issues in Cloud Computing. CoRR abs/1303.4814 (2013) - [i39]Jaydip Sen:
Homomorphic Encryption: Theory & Applications. CoRR abs/1305.5886 (2013) - [i38]Jaydip Sen:
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks. CoRR abs/1308.0682 (2013) - 2012
- [j6]Jaydip Sen:
A Secure and User Privacy-Preserving Searching Protocol for Peer-to-Peer Networks. Int. J. Commun. Networks Inf. Secur. 4(1) (2012) - [i37]Jaydip Sen:
A Multi-Path Certification Protocol for Mobile Ad Hoc Networks. CoRR abs/1201.4536 (2012) - [i36]Jaydip Sen:
Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks. CoRR abs/1203.0732 (2012) - [i35]Jaydip Sen:
Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks. CoRR abs/1203.1175 (2012) - [i34]Jaydip Sen:
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks. CoRR abs/1209.1803 (2012) - 2011
- [j5]Debasis Bandyopadhyay, Jaydip Sen:
Internet of Things: Applications and Challenges in Technology and Standardization. Wirel. Pers. Commun. 58(1): 49-69 (2011) - [c21]Jaydip Sen:
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks. ACC (4) 2011: 580-592 - [c20]Jaydip Sen:
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network. CISIS 2011: 100-108 - [c19]Jaydip Sen:
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks. DELTA 2011: 222-227 - [c18]Jaydip Sen:
Secure and Privacy-Aware Searching in Peer-to-Peer Networks. DPM/SETOP 2011: 72-89 - [c17]Arijit Ukil, Jaydip Sen:
A Secure Privacy Preserved Data Aggregation Scheme in Non Hierarchical Networks. ICCSA (4) 2011: 436-451 - [c16]Jaydip Sen, Subhamoy Maitra:
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks. NordSec 2011: 205-222 - [i33]Jaydip Sen:
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. CoRR abs/1101.0241 (2011) - [i32]Jaydip Sen:
A Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks. CoRR abs/1101.0244 (2011) - [i31]Jaydip Sen:
A Robust and Fault-Tolerant Distributed Intrusion Detection System. CoRR abs/1101.0248 (2011) - [i30]Jaydip Sen:
An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks. CoRR abs/1101.0250 (2011) - [i29]Jaydip Sen:
A Novel Mechanism for Detection of Distributed Denial of Service Attacks. CoRR abs/1101.2715 (2011) - [i28]Jaydip Sen:
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. CoRR abs/1101.2753 (2011) - [i27]Jaydip Sen:
Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses. CoRR abs/1101.2759 (2011) - [i26]Jaydip Sen:
A Robust and Secure Aggregation Protocol for Wireless Sensor Networks. CoRR abs/1101.3076 (2011) - [i25]Jaydip Sen:
Secure Routing in Wireless Mesh Networks. CoRR abs/1102.1226 (2011) - [i24]Jaydip Sen:
A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers. CoRR abs/1103.3333 (2011) - [i23]Debasis Bandyopadhyay, Jaydip Sen:
Internet of Things: Applications and Challenges in Technology and Standardization. CoRR abs/1105.1693 (2011) - [i22]Arijit Ukil, Jaydip Sen, Debasish Bera:
Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation Algorithm in Dynamic OFDMA Systems. CoRR abs/1106.0969 (2011) - [i21]Arijit Ukil, Jaydip Sen, Debasish Bera:
Dynamic OFDMA Resource Allocation for QoS Guarantee and System Optimization of Best Effort and Non Real-time Traffic. CoRR abs/1107.1038 (2011) - [i20]Jaydip Sen:
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks. CoRR abs/1107.5538 (2011) - [i19]Jaydip Sen:
Secure and Privacy- Aware Searching in Peer-to-Peer Networks. CoRR abs/1110.0150 (2011) - [i18]Jaydip Sen:
A Distributed Intrusion Detection System Using Cooperating Agents. CoRR abs/1111.0382 (2011) - [i17]Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy:
A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks. CoRR abs/1111.0385 (2011) - [i16]Jaydip Sen, M. Girish Chandra, Harihara S. G., Harish Reddy, P. Balamuralidhar:
A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks. CoRR abs/1111.0386 (2011) - [i15]Jaydip Sen, Sripad Koilakonda, Arijit Ukil:
A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks. CoRR abs/1111.0387 (2011) - 2010
- [j4]Jaydip Sen:
An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network. Int. J. Adv. Comp. Techn. 2(4): 57-66 (2010) - [j3]Jaydip Sen:
An Agent-Based Intrusion Detection System for Local Area Networks. Int. J. Commun. Networks Inf. Secur. 2(2) (2010) - [j2]Jaydip Sen:
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks. Scalable Comput. Pract. Exp. 11(4) (2010) - [c15]Jaydip Sen:
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks. CICSyN 2010: 202-207 - [c14]Jaydip Sen:
An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks. CISIM 2010: 283-288 - [c13]Jaydip Sen:
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. CNSA 2010: 528-537 - [c12]Jaydip Sen:
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. CNSA 2010: 538-547 - [c11]Jaydip Sen, Arijit Ukil:
A QoS-aware end-to-end connectivity management algorithm for mobile applications. Bangalore Compute Conf. 2010: 4:1-4:9 - [c10]Jaydip Sen:
A Throughput Optimizing Routing Protocol for Wireless Mesh Networks. HPCC 2010: 665-670 - [c9]Jaydip Sen:
An Efficient and Reliable Routing Protocol for Wireless Mesh Networks. ICCSA (3) 2010: 246-257 - [c8]Jaydip Sen, Arijit Ukil:
A Secure Routing Protocol for Wireless Sensor Networks. ICCSA (3) 2010: 277-290 - [c7]Jaydip Sen:
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. ICICS 2010: 77-91 - [i14]Jaydip Sen:
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network. CoRR abs/1010.5176 (2010) - [i13]Jaydip Sen:
A Survey on Wireless Sensor Network Security. CoRR abs/1011.1529 (2010) - [i12]Jaydip Sen:
An Agent-Based Intrusion Detection System for Local Area Networks. CoRR abs/1011.1531 (2010) - [i11]Jaydip Sen, Kaustav Goswami:
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks. CoRR abs/1011.1793 (2010) - [i10]Jaydip Sen:
Mobility and Handoff Management in Wireless Networks. CoRR abs/1011.1956 (2010) - [i9]Jaydip Sen:
A Robust and Efficient Trust Management Scheme for Peer-to-Peer Networks. CoRR abs/1012.2171 (2010) - [i8]Jaydip Sen, P. Balamuralidhar, M. Girish Chandra, Harihara S. G., Harish Reddy:
Context Aware End-to-End Connectivity Management. CoRR abs/1012.2514 (2010) - [i7]Jaydip Sen:
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks. CoRR abs/1012.2516 (2010) - [i6]Jaydip Sen, Shomik Bhattacharya:
A Survey on Cross-Layer Design Frameworks for Multimedia Applications over Wireless Networks. CoRR abs/1012.2518 (2010) - [i5]Jaydip Sen:
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. CoRR abs/1012.2519 (2010) - [i4]Jaydip Sen:
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. CoRR abs/1012.2520 (2010) - [i3]Jaydip Sen, Munir Sayyad, Basavaraj Hooli:
Convergence and Next Generation Networks. CoRR abs/1012.2524 (2010) - [i2]Jaydip Sen:
A Secure Aggregation Protocol for Wireless Sensor Networks. CoRR abs/1012.2528 (2010) - [i1]Jaydip Sen:
A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks. CoRR abs/1012.2529 (2010)
2000 – 2009
- 2009
- [j1]Jaydip Sen:
A Survey on Wireless Sensor Network Security. Int. J. Commun. Networks Inf. Secur. 1(2) (2009) - 2008
- [c6]Jaydip Sen, Arijit Ukil, Debasish Bera, Arpan Pal:
A distributed intrusion detection system for wireless ad hoc networks. ICON 2008: 1-6 - 2007
- [c5]Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy:
A Scheme of Certificate Authority for Ad Hoc Networks. DEXA Workshops 2007: 615-619 - [c4]Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta:
A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks. ICCTA 2007: 51-58 - [c3]Jaydip Sen, Harihara Subramanyam:
An Efficient Certificate Authority for Ad Hoc Networks. ICDCIT 2007: 97-109 - 2006
- [c2]Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta:
A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks. ICDCN 2006: 139-144 - 2005
- [c1]Jaydip Sen, Indranil Sengupta:
Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System. ICDCIT 2005: 125-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 17:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint