Real time traffic congestion detection and management using Active RFID and GSM technology S Roy, S Bandyopadhyay, M Das, S Batabyal, S Pal ITSC, Kyoto, Japan 48, 2010 | 27 | 2010 |
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges M Bhattacharya, S Roy, S Chattopadhyay, AK Das, S Shetty Security and Privacy 6 (1), e275, 2023 | 10 | 2023 |
ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks M Bhattacharya, S Roy, S Chattopadhyay, AK Das, SS Jamal IEEE Systems Journal 17 (1), 234-245, 2022 | 7 | 2022 |
A privacy-preserving efficient location-sharing scheme for mobile online social network applications M Bhattacharya, S Roy, K Mistry, HPH Shum, S Chattopadhyay IEEE Access 8, 221330-221351, 2020 | 7 | 2020 |
Polynomial real roots finding using feed forward neural network: A simple approach M Das, P Seal 2012 National Conference on Computing and Communication Systems, 1-4, 2012 | 6 | 2012 |
DDoS attack resisting authentication protocol for mobile based online social network applications M Bhattacharya, S Roy, AK Das, S Chattopadhyay, S Banerjee, A Mitra Journal of Information Security and Applications 65, 103115, 2022 | 5 | 2022 |
An algorithm for predicting local trust based on trust propagation in online social networks M Bhattacharya, N Nesa International Journal of Computer Applications 156 (7), 0975-8887, 2016 | 5 | 2016 |
Preserving privacy in social network graph with K-anonymize degree sequence generation M Bhattacharya, P Mani 2015 9th International Conference on Software, Knowledge, Information …, 2015 | 5 | 2015 |
Cryptanalysis of a centralized location-sharing scheme for mobile online social networks M Bhattacharya, S Roy, S Banerjee, S Chattopadhyay Advanced Computing and Systems for Security: Volume Eleven, 17-30, 2021 | 3 | 2021 |
Prevention of walk based attack on social network graphs using ant colony optimization M Bhattacharya, S Roy 2015 international conference and workshop on computing and communication …, 2015 | 3 | 2015 |
Mobile enabled content adaptation system for pdf documents SR Chowdhury, P Kar, M Chattopadhyay, M Bhattacharya, ... 2017 11th International Conference on Software, Knowledge, Information …, 2017 | 2 | 2017 |
Securing social network graph against structural attack based on ant colony optimization M Bhattacharya, B Hui International Journal of Computer Applications 167 (9), 21-26, 2017 | 2 | 2017 |
A Brief Survey on Vertex and Label Anonymization Techniques of Online Social Network Data P Mani, M Bhattacharya International Journal of Engineering Research and Applications (IJERA) 5 (6), 2015 | 2 | 2015 |
A reliable two-tier energy-efficient topology building algorithm for Wireless Sensor Networks C Patra, M Chattopadhyay, P Bhaumik, M Bhattacharya, S Mukherjee 2014 Applications and Innovations in Mobile Computing (AIMoC), 146-150, 2014 | 1 | 2014 |
An Efficient Authentication Scheme for Mobile Online Social Networks M Bhattacharya, S Roy, S Chattopadhyay Advanced Computing and Systems for Security: Volume 14, 31-41, 2021 | | 2021 |
An Algorithm for Selecting Optimal Trust Path in Online Social Networks Using Particle Swarm Optimization M Bhattacharya, D Ghosh Computational Intelligence, Communications, and Business Analytics: Second …, 2019 | | 2019 |
Year of Publication: 2016 M Bhattacharya, N Nesa | | 2016 |
Network-coded broadcast incremental power algorithm for energy-efficient broadcasting in wireless ad-hoc network S Coondu, A Mitra, S Chattopadhyay, M Chattopadhyay, M Bhattacharya 2014 Applications and Innovations in Mobile Computing (AIMoC), 42-47, 2014 | | 2014 |
Design of authentication protocols for mobile online social networks M Bhattacharya Kolkata, 0 | | |
Study on Theoretical Aspects of Virtual Data Integration and its Applications MM Bhattacharya, N Nesa | | |