Find Research Outputs

Search concepts
Selected filters
2019

Symmetric key-based authenticated encryption protocol

Bhuva, M. J. & Singh, S., 04-03-2019, In : Information Security Journal. 28, 1-2, p. 35-45 11 p.

Research output: Contribution to journalArticle

Authentication
Cryptography
Encryption
Authenticity
Confidentiality

Meta-learner with sparsified backpropagation

Paithankar, R., Verma, A., Agnihotri, M. & Singh, S., 01-01-2019, Proceedings of the 9th International Conference On Cloud Computing, Data Science and Engineering, Confluence 2019. Institute of Electrical and Electronics Engineers Inc., p. 315-319 5 p. 8776608. (Proceedings of the 9th International Conference On Cloud Computing, Data Science and Engineering, Confluence 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Backpropagation
Speech recognition
Computer vision
Tuning
Scheduling
2016

Path independent real time points of interest detection in road networks

Rohella, A. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Institute of Electrical and Electronics Engineers Inc., p. 633-638 6 p. 7918040

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Road network
Experiments
Factors
Experiment
Direction compound
2013
1 Citation (Scopus)

Ownership authentication transfer protocol for ubiquitous computing devices

Pradeep, B. H. & Singh, S., 12-03-2013, 2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 6466133

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Authentication
Network protocols
Sales
Internet
2018
1 Citation (Scopus)

Face Detection and Tagging Using Deep Learning

Mehta, J., Ramnani, E. & Singh, S., 30-08-2018, 2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018. Institute of Electrical and Electronics Engineers Inc., 8452853. (2nd International Conference on Computer, Communication, and Signal Processing: Special Focus on Technology and Innovation for Smart Environment, ICCCSP 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Face recognition
learning
marking
Neural networks
boom
2013
8 Citations (Scopus)

Contextual information based recommender system using Singular Value Decomposition

Gupta, R., Jain, A., Rana, S. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 2084-2089 6 p. 6637502

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Singular value decomposition
Feature extraction
Classifiers
2019
1 Citation (Scopus)

Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case

Kamath, S., Singh, S. & Kumar, M. S., 08-05-2019, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2018. IEEE Computer Society, 8710089. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Switches
networking
performance
Network architecture
Software defined networking
2012
1 Citation (Scopus)

Differentiated QoS with Modified C/I based scheduling algorithm

Divya, A. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 835-840 6 p. 6409191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling algorithms
Quality of service
Scheduling
Mobile telecommunication systems
Internet telephony

Formal verification of the extensible authentication protocol using SPIN

Jnanamurthy, H. K., S.hegde, M. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 365-371 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Finite automata
Interoperability
Formal verification
5 Citations (Scopus)

Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

Hanumanthappa, P. & Singh, S., 13-07-2012, 2012 International Conference on Innovations in Information Technology, IIT 2012. p. 107-112 6 p. 6207712

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ubiquitous computing
Authentication
2018

Chroot Hardening Through System Calls Modification

Haque, A., Ayyar, A. & Singh, S., 20-08-2018, Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018. Institute of Electrical and Electronics Engineers Inc., p. 491-496 6 p. 8442709. (Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering, Confluence 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Directories
Hardening
Vulnerability
Computer operating systems
Mountings
2016
3 Citations (Scopus)

Intelligence analysis of Tay Twitter bot

Mathur, V., Stavrakas, Y. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Institute of Electrical and Electronics Engineers Inc., p. 231-236 6 p. 7917966

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligence
Processing
Natural Language Processing
Vocabulary
Twitter

Natural language image descriptor

Kishore, A. & Singh, S., 09-06-2016, 2015 IEEE Recent Advances in Intelligent Computational Systems, RAICS 2015. Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 7488398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer vision
Artificial intelligence
13 Citations (Scopus)

Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning

Jindal, S. & Singh, S., 10-06-2016, Proceedings - IEEE International Conference on Information Processing, ICIP 2015. Institute of Electrical and Electronics Engineers Inc., p. 447-451 5 p. 7489424

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image analysis
Tuning
Neural networks
Object recognition
Experiments
2015

Anti-scraping application development

Haque, A. & Singh, S., 01-01-2015, 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015. Institute of Electrical and Electronics Engineers Inc., p. 869-874 6 p. 7275720

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
2016
7 Citations (Scopus)

Detection of fake Twitter followers using graph centrality measures

Mehrotra, A., Sarreddy, M. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Institute of Electrical and Electronics Engineers Inc., p. 499-504 6 p. 7918016

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Networking
Social Support
Fans
Classifiers
Organizations
2019

Short Term Firm-Specific Stock Forecasting with BDI Framework

Ahmed, M., Sriram, A. & Singh, S., 01-01-2019, (Accepted/In press) In : Computational Economics.

Research output: Contribution to journalArticle

Decision support systems
Decision making
Vector quantization
Clustering algorithms
Stretching
2014
15 Citations (Scopus)

Differential private random forest

Patil, A. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 2623-2630 8 p. 6968348

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Mathematical operators
Classifiers
2013
1 Citation (Scopus)

Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)

Jnanamurthy, H. K., Warty, C. & Singh, S., 01-12-2013, 2013 Annual IEEE India Conference, INDICON 2013. 6726055

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems
Feedback
2 Citations (Scopus)

Aware-BDI: An extension of the BDI model incorporating situational awareness

Hegde, M. S. & Singh, S., 05-08-2013, p. 100-104. 5 p.

Research output: Contribution to conferencePaper

Communication
2012
2 Citations (Scopus)

Web opinion mining for social networking sites

Kaur, B., Saxena, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 598-605 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Clustering algorithms
Visualization
Topology
Internet
2017

Extracting quality relations from categorical data using modified Qube algorithm

Nanda, S., Gopakumar, R. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 651-655 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Derivatives

Word based thematic game on Indian mythology

Padiyar, S. S. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1619-1623 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
2011

Modeling and verification of server aided verification protocol using NuSMV

Saralaya, V., Kishore, J. K., Reddy, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 486-495 10 p. (Communications in Computer and Information Science; vol. 204 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Protocol Verification
Servers
Server
Network protocols
Computer simulation
2016
1 Citation (Scopus)

Mutual fund performance prediction

Qamar, H. & Singh, S., 01-01-2016, 2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 185-189 5 p. 7806257

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data envelopment analysis
Managers
2012

Modeling two way concurrent buffer system using timed automata in UPPAAL

Mishra, R., Zeeshaan, M. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 846-851 6 p. 6409193

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model checking
Electronic data interchange
Real time systems
Synchronization

Enhanced mining association rule algorithm with reduced time & space complexity

Mundra, P., Maurya, A. K. & Singh, S., 01-12-2012, 2012 Annual IEEE India Conference, INDICON 2012. p. 1105-1110 6 p. 6420782

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Association rules
Data mining
Association rule mining
2 Citations (Scopus)

Symbolic verification of web crawler functionality and its properties

Shetty, K. S., Bhat, S. & Singh, S., 27-03-2012, 2012 International Conference on Computer Communication and Informatics, ICCCI 2012. 6158649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Search engines
Websites
Specifications
Web crawler
2013
2 Citations (Scopus)

Alert-BDI: BDI model with adaptive alertness through situational awareness

Hegde, M. S. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 442-447 6 p. 6637212

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk management
Monitoring
2011
51 Citations (Scopus)

Formal verification of OAuth 2.0 using alloy framework

Pai, S., Sharma, Y., Kumar, S., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 655-659 5 p. 5966531

Research output: Chapter in Book/Report/Conference proceedingConference contribution

networking
Network protocols
Internet
consumer interest
internet community
2017
25 Citations (Scopus)

Chatbot for university related FAQs

Ranoliya, B. R., Raghuwanshi, N. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1525-1530 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Markup languages
Semantics
Thermostats
Students

Context based interesting tweet recommendation framework

Dang, M. & Singh, S., 31-01-2017, 2016 IEEE Annual India Conference, INDICON 2016. Institute of Electrical and Electronics Engineers Inc., 7838957

Research output: Chapter in Book/Report/Conference proceedingConference contribution

recommendations
Probability distributions
embedding
2011
4 Citations (Scopus)

Modeling and verification of kerberos protocol using symbolic model verifier

Mundra, P., Shukla, S., Sharma, M., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 651-654 4 p. 5966530

Research output: Chapter in Book/Report/Conference proceedingConference contribution

secrecy
integrity
Authentication
Network protocols
Security of data
2016
2 Citations (Scopus)

Identification of gene network motifs for cancer disease diagnosis

Gupta, R., Fayaz, S. M. & Singh, S., 01-01-2016, 2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 179-184 6 p. 7806253

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signal transduction
Genes
Computer networks
Fans
2013
4 Citations (Scopus)

Stock market prediction accuracy analysis using kappa measure

Gupta, R., Garg, N. & Singh, S., 05-08-2013, p. 635-639. 5 p.

Research output: Contribution to conferencePaper

Websites
Profitability
Sales
Financial markets
Industry
2019

Automated 3D sign language caption generation for video

Mehta, N., Pai, S. & Singh, S., 01-01-2019, (Accepted/In press) In : Universal Access in the Information Society.

Research output: Contribution to journalArticle

Audition
Students
Teaching
Education
Speech processing
2011

Modeling and verification of chess game using NuSMV

Saralaya, V., Kishore, J. K., Reddy, S., Pai, R. M. & Singh, S., 2011, Advances in Computing and Communications - First International Conference, ACC 2011, Proceedings. PART 2 ed. Vol. 191 CCIS. p. 460-470 11 p. (Communications in Computer and Information Science; vol. 191 CCIS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Temporal logic
Specifications
Formal methods
Model checking
Testing

Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier

Mundra, P., Sharma, M., Shukla, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 496-506 11 p. (Communications in Computer and Information Science; vol. 204 CCIS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Server
Modeling
User Authentication
2017

Safe buzz: Adaptive security for multi-agents through situational awareness

Hegde, M. S. & Singh, S., 01-01-2017, In : International Journal of Autonomous and Adaptive Communications Systems. 10, 2, p. 192-212 21 p.

Research output: Contribution to journalArticle

Multi agent systems
Risk assessment
Communication
Risk management
Monitoring
2014
Ubiquitous computing
Authentication
Network protocols
Electronic data interchange
Sales
2013
8 Citations (Scopus)

Optimal neural network architecture for stock market forecasting

Khirbat, G., Gupta, R. & Singh, S., 05-08-2013, p. 557-561. 5 p.

Research output: Contribution to conferencePaper

Network architecture
Neural networks
Time series
Backpropagation
Financial markets
2016
1 Citation (Scopus)

Unemployment rates forecasting using supervised neural networks

Sharma, S. & Singh, S., 08-07-2016, Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence 2016. Institute of Electrical and Electronics Engineers Inc., p. 28-33 6 p. 7508042

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unemployment
Learning Vector Quantization
Forecasting
Radial Basis Function Neural Network
Neural Networks
2015
2 Citations (Scopus)

Is that twitter hashtag worth reading

Anusha, A. & Singh, S., 10-08-2015, Proceeding of the 3rd International Symposium on Women in Computing and Informatics, WCI 2015. Association for Computing Machinery (ACM), Vol. 10-13-August-2015. p. 272-277 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Explosions
2018

IoT based driving risk assessment and warning system

Aithal, A. & Singh, S., 01-12-2018, Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 282-286 5 p. 8748704. (Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Alarm systems
Risk assessment
Accidents
Sensors
Highway accidents
2019

A meta data mining framework for botnet analysis

Haque, A., Ayyar, A. V. & Singh, S., 03-09-2019, In : International Journal of Computers and Applications. 41, 5, p. 392-399 8 p.

Research output: Contribution to journalArticle

Metadata
Data mining
Botnet
2017

Fitness function to find Game Equilibria using Genetic Algorithms

Gunturu, M., Shakarad, G. N. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 1531-1534 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Game theory
Multiobjective optimization
Evolutionary algorithms
Genetic algorithms
Polynomials
1 Citation (Scopus)

Neural network approach for vision-based track navigation using low-powered computers on MAVs

Brahmbhatt, K., Pai, A. R. & Singh, S., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 578-583 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Micro air vehicle (MAV)
Navigation
Neural networks
Computer vision
Facings
2013
1 Citation (Scopus)

Intrusion detection in zero knowledge system using model checking approach

Jacob, T., Raman, M. & Singh, S., 03-10-2013, Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. p. 453-465 13 p. (Lecture Notes in Electrical Engineering; vol. 131 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Model checking
Intrusion detection
Network protocols
Authentication
2014
1 Citation (Scopus)

Smart card based password authentication and user anonymity scheme using ECC and steganography

Singh, V., Dahiya, P. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 1614-1621 8 p. 6968403

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Smart cards
Authentication
Cryptography
Internet
2013
4 Citations (Scopus)

Detection and filtering of collaborative malicious users in reputation system using quality repository approach

Jnanamurthy, H. K. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 466-471 6 p. 6637216

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Online systems