Anomaly based network intrusion detection for IoT attacks using deep learning technique B Sharma, L Sharma, C Lal, S Roy Computers and Electrical Engineering 107, 108626, 2023 | 98 | 2023 |
A lightweight cellular automata based encryption technique for IoT applications S Roy, U Rawat, J Karjee IEEE Access 7, 39782-39793, 2019 | 61 | 2019 |
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach B Sharma, L Sharma, C Lal, S Roy Expert Systems with Applications 238, 121751, 2024 | 54 | 2024 |
IEHC: An efficient image encryption technique using hybrid chaotic map K Kumar, S Roy, U Rawat, S Malhotra Chaos, Solitons & Fractals 158, 111994, 2022 | 54 | 2022 |
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat Multimedia Tools and Applications 80, 31529-31567, 2021 | 49 | 2021 |
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata S Roy, U Rawat, HA Sareen, SK Nayak Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020 | 49 | 2020 |
Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks S Roy, J Karjee, US Rawat, N Dey Procedia Computer Science 78, 408-414, 2016 | 45 | 2016 |
IESCA: An efficient image encryption scheme using 2-D cellular automata S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak Journal of Information Security and Applications 61, 102919, 2021 | 41 | 2021 |
Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system S Nandi, S Roy, J Dansana, WBA Karaa, R Ray, SR Chowdhury, ... International Journal of Computer Network and Information Security 6 (11), 1, 2014 | 36 | 2014 |
Scrapnet: An efficient approach to trash classification A Masand, S Chauhan, M Jangid, R Kumar, S Roy IEEE access 9, 130947-130958, 2021 | 33 | 2021 |
Application of cellular automata in symmetric key cryptography S Roy, S Nandi, J Dansana, PK Pattnaik 2014 International Conference on Communication and Signal Processing, 572-576, 2014 | 33 | 2014 |
1-D group cellular automata based image encryption technique S Nandi, S Roy, S Nath, S Chakraborty, WBA Karaa, N Dey 2014 International Conference on Control, Instrumentation, Communication and …, 2014 | 26 | 2014 |
Symmetric key encryption technique: A cellular automata based approach D Parashar, S Roy, N Dey, V Jain, US Rawat Cyber Security: Proceedings of CSI 2015, 59-67, 2018 | 16 | 2018 |
IETD: a novel image encryption technique using Tinkerbell map and Duffing map for IoT applications TA Dhopavkar, SK Nayak, S Roy Multimedia Tools and Applications 81 (30), 43189-43228, 2022 | 12 | 2022 |
LICCA: a lightweight image cipher using 3-D cellular automata M Shrivastava, S Roy, K Kumar, CV Pandey, J Grover Nonlinear Dynamics 106, 2679-2702, 2021 | 12 | 2021 |
A novel cryptosystem using cellular automata S Roy, N Bhatia, US Rawat International Conference on Communication and Signal Processing, 1781-1785, 2018 | 8 | 2018 |
A novel symmetric key encryption technique using Cellular Automata D Parashar, S Roy, V Jain 2015 International Conference on Green Computing and Internet of Things …, 2015 | 8 | 2015 |
A siamese neural network-based face recognition from masked faces R Chatterjee, S Roy, S Roy International Conference on Advanced Network Technologies and Intelligent …, 2021 | 5 | 2021 |
An efficient image encryption technique using Logistic map and 2D-TCLM K Kumar, S Roy, U Rawat, I Mishra International Conference on Cyber Warfare, Security and Space Research, 87-96, 2021 | 5 | 2021 |
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems U Upadhyay, A Kumar, S Roy, U Rawat, S Chaurasia 2023 16th International Conference on Security of Information and Networks …, 2023 | 4 | 2023 |