default search action
Sukumar Nandi
Person information
- affiliation: Indian Institute of Technology Guwahati, India
- affiliation (2002 - 2003): Nanyang Technological University, Singapore
- affiliation (PhD 1995): Indian Institute of Technology Kharagpur, West Bengal, India
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j97]Debanjan Roy Chowdhury, Sukumar Nandi, Diganta Goswami:
Cost-effective live video streaming for internet of connected vehicles using heterogeneous networks. Ad Hoc Networks 153: 103334 (2024) - [j96]Sanchita Saha, Ashlesha Hota, Arup Kumar Chattopadhyay, Amitava Nag, Sukumar Nandi:
A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities. Artif. Intell. Rev. 57(7): 184 (2024) - [j95]Manoj Das, Madhurima Buragohain, Sukumar Nandi:
Distributed neighbor discovery with mobility adaptive probing for beyond 5G D2D communications. Comput. Networks 250: 110574 (2024) - [j94]Vipin Kumar Pandey, Suddhasil De, Sukumar Nandi:
Automated aerial assessment for seamless adaptive adhoc restoration in partially collapsed network. Comput. Commun. 219: 153-172 (2024) - [j93]Arup Kumar Chattopadhyay, Sanchita Saha, Amitava Nag, Sukumar Nandi:
Secret sharing: A comprehensive survey, taxonomy and applications. Comput. Sci. Rev. 51: 100608 (2024) - [j92]Syam Sankar, Ruchika Gupta, John Jose, Sukumar Nandi:
Sec-NoC: A Lightweight Secure Communication System for On-Chip Interconnects. IEEE Embed. Syst. Lett. 16(2): 214-217 (2024) - [j91]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Int. J. Inf. Sec. 23(2): 915-934 (2024) - [j90]Pankaj Choudhury, Prithwijit Guha, Sukumar Nandi:
Impact of Language-Specific Training on Image Caption Synthesis: A Case Study on Low-Resource Assamese Language. Int. J. Asian Lang. Process. 34(1): 2450004:1-2450004:20 (2024) - [j89]Indu Kumari, Pranav Kumar Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, Danda B. Rawat:
RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV. Secur. Priv. 7(1) (2024) - [j88]Syam Sankar, Ruchika Gupta, John Jose, Sukumar Nandi:
TROP: TRust-aware OPportunistic Routing in NoC with Hardware Trojans. ACM Trans. Design Autom. Electr. Syst. 29(2): 34:1-34:25 (2024) - [c188]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
Evaluating Performance of Pre-trained Word Embeddings on Assamese, a Low-resource Language. LREC/COLING 2024: 6418-6425 - [c187]Saurabh Kumar, Sanasam Ranbir Sanasam, Sukumar Nandi:
IndiSentiment140: Sentiment Analysis Dataset for Indian Languages with Emphasis on Low-Resource Languages using Machine Translation. NAACL-HLT 2024: 7689-7698 - [c186]Poonam Namdeo Shelke, Saurav Gupta, Sukumar Nandi:
BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices. SECRYPT 2024: 838-843 - [c185]Md Raqib Khan, Priyanka Mishra, Nancy Mehta, Shruti S. Phutke, Santosh Kumar Vipparthi, Sukumar Nandi, Subrahmanyam Murala:
Spectroformer: Multi-Domain Query Cascaded Transformer Network For Underwater Image Enhancement. WACV 2024: 1443-1452 - [c184]Manoj Das, Keshav Parihar, Madhurima Buragohain, Sukumar Nandi:
Design and Implementation of a Neighbor Discovery Framework Through Base Station Coordination for 5G D2D Communications. WCNC 2024: 1-6 - [i11]Dhrubajyoti Pathak, Sanjib Narzary, Sukumar Nandi, Bidisha Som:
Part-of-Speech Tagger for Bodo Language using Deep Learning approach. CoRR abs/2401.03175 (2024) - 2023
- [j87]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Pinaki Mitra, Sukumar Nandi:
A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling. IEEE Access 11: 77267-77291 (2023) - [j86]Sanchita Saha, Arup Kumar Chattopadhyay, Anup Kumar Barman, Amitava Nag, Sukumar Nandi:
Secret Image Sharing Schemes: A Comprehensive Survey. IEEE Access 11: 98333-98361 (2023) - [j85]Sanchita Saha, Ashlesha Hota, Bikramjit Choudhury, Amitava Nag, Sukumar Nandi:
NTRU and Secret Sharing Based Secure Group Communication for IoT Applications. IEEE Access 11: 117341-117350 (2023) - [j84]Amitava Nag, Priya Raj Chanda, Sukumar Nandi:
Mobile app-based tomato disease identification with fine-tuned convolutional neural networks. Comput. Electr. Eng. 112: 108995 (2023) - [j83]Debdatta Kandar, Phidahunlang Chyne, Samarendra Nath Sur, Sukumar Nandi:
A study on the channel bonding in IoT networks: Requirements, applications, and challenges. Int. J. Commun. Syst. 36(6) (2023) - [j82]Pradeepkumar Bhale, Debanjan Roy Chowdhury, Santosh Biswas, Sukumar Nandi:
OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks. IEEE Internet Things J. 10(10): 8357-8370 (2023) - [j81]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing. Internet Technol. Lett. 6(4) (2023) - [j80]Biswanath Dey, Sivaji Bandyopadhyay, Sukumar Nandi:
Mobility Assisted Adaptive Clustering Hierarchy for IoT Based Sensor Networks in 5G and Beyond. J. Commun. 18(6): 346-356 (2023) - [j79]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
Part-of-speech Tagger for Assamese Using Ensembling Approach. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(10): 235:1-235:22 (2023) - [c183]Roshan Singh, Sukumar Nandi:
An Improved PBFT-Based Consensus Protocol for Industrial IoT. CCGridW 2023: 311-312 - [c182]Saurabh Kumar, Sanasam Ranbir Singh, Sukumar Nandi:
IndiSocialFT: Multilingual Word Representation for Indian languages in code-mixed environment. EMNLP (Findings) 2023: 3866-3871 - [c181]Pankaj Choudhury, Prithwijit Guha, Sukumar Nandi:
Relevance of Language-Specific Training on Image Caption Synthesis for Low Resource Assamese Language. IALP 2023: 13-18 - [c180]Syam Sankar, Lissiyas Antony, Ruchika Gupta, John Jose, Sukumar Nandi:
Exploring Trustable Paths in Network-on-Chip for Low-Slack Packets. ISOCC 2023: 85-86 - [c179]Syam Sankar, John Jose, Ruchika Gupta, Sukumar Nandi:
Enhancing Anonymity in NoC Communication to Counter Traffic Profiling by Hardware Trojans. MCSoC 2023: 560-567 - [c178]Roshan Singh, Debanjan Roy Chowdhury, Sukumar Nandi, Sunit Kumar Nandi:
ATOM : A Decentralized Task Offloading Framework for Mobile Edge Computing through Blockchain and Smart Contracts. MetaCom 2023: 408-412 - [c177]Roshan Singh, Sukumar Nandi, Sunit Kumar Nandi:
An Implementation and Analysis of Zero Knowledge Based E-Voting Solution With Proof of Vote on Public Ethereum Blockchain. MetaCom 2023: 423-427 - [c176]Pankaj Choudhury, Prithwijit Guha, Sukumar Nandi:
Image Caption Synthesis for Low Resource Assamese Language using Bi-LSTM with Bilinear Attention. PACLIC 2023: 743-752 - [c175]Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:
Protocol Aware Unsupervised Network Intrusion Detection System. TrustCom 2023: 1524-1531 - [c174]Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:
Network based Intrusion Detection using Time aware LSTM Autoencoder. TrustCom 2023: 2570-2578 - 2022
- [j78]Debanjan Roy Chowdhury, Sukumar Nandi, Diganta Goswami:
Video streaming over IoV using IP multicast. J. Netw. Comput. Appl. 197: 103259 (2022) - [j77]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
Reduplication in Assamese: Identification and Modeling. ACM Trans. Asian Low Resour. Lang. Inf. Process. 21(5): 90:1-90:18 (2022) - [j76]Debanjan Roy Chowdhury, Sukumar Nandi, Diganta Goswami:
Distributed Gateway Selection for Video Streaming in VANET Using IP Multicast. ACM Trans. Multim. Comput. Commun. Appl. 18(3): 81:1-81:24 (2022) - [c173]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach. AICCSA 2022: 1-8 - [c172]Ruchika Gupta, Vedika J. Kulkarni, John Jose, Sukumar Nandi:
Securing On-chip Interconnect against Delay Trojan using Dynamic Adaptive Caging. ACM Great Lakes Symposium on VLSI 2022: 411-416 - [c171]Debanjan Roy Chowdhury, Sukumar Nandi, Diganta Goswami:
Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network. LCN 2022: 227-232 - [c170]Sanjib Narzary, Maharaj Brahma, Mwnthai Narzary, Gwmsrang Muchahary, Pranav Kumar Singh, Apurbalal Senapati, Sukumar Nandi, Bidisha Som:
Generating Monolingual Dataset for Low Resource Language Bodo from old books using Google Keep. LREC 2022: 6563-6570 - [c169]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
AsNER - Annotated Dataset and Baseline for Assamese Named Entity recognition. LREC 2022: 6571-6577 - [c168]Mohammad Humam Khan, Ruchika Gupta, Vedika J. Kulkarni, John Jose, Sukumar Nandi:
Hardware Trojan Mitigation for Securing On-chip Networks from Dead Flit Attacks. VLSI-SoC 2022: 1-6 - [i10]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
AsNER - Annotated Dataset and Baseline for Assamese Named Entity recognition. CoRR abs/2207.03422 (2022) - [i9]Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach. CoRR abs/2212.07043 (2022) - 2021
- [j75]Nabajyoti Mazumdar, Amitava Nag, Sukumar Nandi:
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments. Ad Hoc Networks 111: 102348 (2021) - [j74]Pranav Kumar Singh, Sukumar Nandi, Kayhan Zrar Ghafoor, Uttam Ghosh, Danda B. Rawat:
Preventing COVID-19 Spread Using Information and Communication Technology. IEEE Consumer Electron. Mag. 10(4): 18-27 (2021) - [j73]Debdatta Kandar, V. Dhilip Kumar, Sukumar Nandi:
Smart inter-operable vehicular communication using hybrid IEEE 802.11p, IEEE 802.16d/e technology. Int. J. Commun. Syst. 34(11) (2021) - [j72]Debdatta Kandar, Samarendra Nath Sur, Arun Kumar Singh, Sukumar Nandi:
Performance analysis of lattice reduction-assisted precoder for multi-user millimeter wave MIMO system. Int. J. Commun. Syst. 34(11) (2021) - [j71]Nabajyoti Mazumdar, Saugata Roy, Amitava Nag, Sukumar Nandi:
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network. J. Netw. Comput. Appl. 186: 103097 (2021) - [j70]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
PGOpt: Multi-objective design space exploration framework for large-Scale on-chip power grid design in VLSI SoC using evolutionary computing technique. Microprocess. Microsystems 81: 103440 (2021) - [j69]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract. IEEE Trans. Intell. Transp. Syst. 22(6): 3616-3630 (2021) - [c167]Ritesh Ratti, Sukumar Nandi, Sanasam Ranbir Singh:
Online Network Attack Detection using Statistical Features. ANTS 2021: 125-130 - [c166]Madhurima Buragohain, Sukumar Nandi:
LPECN: Leveraging PIT placement and explicit marking for congestion control in NDN. ICN 2021: 20-29 - [c165]Roshan Singh, Pranav Kumar Singh, Sukumar Nandi:
A Blockchain-based Approach for Optimal Energy Dispatch and Fault Reporting in P2P Microgrid. GLOBECOM (Workshops) 2021: 1-6 - [c164]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture. I4CS 2021: 59-75 - [c163]Bhabesh Mali, Santanu Saha, Daimalu Brahma, Pranav Kumar Singh, Sukumar Nandi:
Alternate Crop Prediction using Artificial Intelligence: A Case Study in Assam. iSES 2021: 267-270 - [c162]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
Machine Learning for VLSI CAD: A Case Study in On-Chip Power Grid Design. ISVLSI 2021: 378-383 - [c161]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning. IWCMC 2021: 1477-1482 - [c160]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH QoE with MPTCP Under Different MPTCP Buffer Sizes and Path Latencies. MeditCom 2021: 197-202 - [c159]Mohammad Humam Khan, Ruchika Gupta, John Jose, Sukumar Nandi:
Dead flit attack on NoC by hardware trojan and its impact analysis. NoCArc@MICRO 2021: 10-15 - [c158]Vedika J. Kulkarni, Manju Rajan, Ruchika Gupta, John Jose, Sukumar Nandi:
Packet header attack by hardware trojan in NoC based TCMP and its impact analysis. NOCS 2021: 21-28 - [c157]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing. TENCON 2021: 941-946 - [i8]Pranav Kumar Singh, Sukumar Nandi, Sunit Kumar Nandi, Uttam Ghosh, Danda B. Rawat:
Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles. CoRR abs/2112.14078 (2021) - 2020
- [j68]Keshab Nath, Swarup Roy, Sukumar Nandi:
InOvIn: A fuzzy-rough approach for detecting overlapping communities with intrinsic structures in evolving networks. Appl. Soft Comput. 89: 106096 (2020) - [j67]Madhurima Buragohain, Sukumar Nandi:
Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy. Comput. Commun. 155: 166-183 (2020) - [j66]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
An efficient blockchain-based approach for cooperative decision making in swarm robotics. Internet Technol. Lett. 3(1) (2020) - [j65]Paromita Choudhury, K. R. Prasanna Kumar, Sukumar Nandi, G. Athithan:
An empirical approach towards characterization of encrypted and unencrypted VoIP traffic. Multim. Tools Appl. 79(1-2): 603-631 (2020) - [j64]Subhrendu Chattopadhyay, Soumyajit Chatterjee, Sukumar Nandi, Sandip Chakraborty:
Aloe: Fault-Tolerant Network Management and Orchestration Framework for IoT Applications. IEEE Trans. Netw. Serv. Manag. 17(4): 2396-2409 (2020) - [j63]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
Machine Learning Approach for Fast Electromigration Aware Aging Prediction in Incremental Design of Large Scale On-chip Power Grid Network. ACM Trans. Design Autom. Electr. Syst. 25(5): 42:1-42:29 (2020) - [j62]Debashis Naskar, Sanasam Ranbir Singh, Durgesh Kumar, Sukumar Nandi, Eva Onaindia de la Rivaherrera:
Emotion Dynamics of Public Opinions on Twitter. ACM Trans. Inf. Syst. 38(2): 18:1-18:24 (2020) - [j61]Pranav Kumar Singh, Anup Agarwal, Gaurav Nakum, Danda B. Rawat, Sukumar Nandi:
MPFSLP: Masqueraded Probabilistic Flooding for Source-Location Privacy in VANETs. IEEE Trans. Veh. Technol. 69(10): 11383-11393 (2020) - [c156]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack. IEEE ANTS 2020: 1-6 - [c155]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
PowerPlanningDL: Reliability-Aware Framework for On-Chip Power Grid Design using Deep Learning. DATE 2020: 1520-1525 - [c154]Sukanta Dey, Pradeepkumar Bhale, Sukumar Nandi:
ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems. I4CS 2020: 123-142 - [c153]Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas, Sukumar Nandi:
Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. I4CS 2020: 187-207 - [c152]Pradeepkumar Bhale, Satya Prakash, Santosh Biswas, Sukumar Nandi:
BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network. I4CS 2020: 208-223 - [c151]Amrita Bose Paul, Susmita Mondal, Santosh Biswas, Sukumar Nandi:
TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks. I4CS 2020: 227-244 - [c150]Amrita Bose Paul, Akhil GV, Santosh Biswas, Sukumar Nandi, Niladri Sett:
SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks. I4CS 2020: 245-265 - [c149]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Designing a Blockchain Based Framework for IoT Data Trade. I4CS 2020: 295-308 - [c148]Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:
Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique. ICCCNT 2020: 1-7 - [c147]Puneet Bakshi, Sukumar Nandi:
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption. ICETE (2) 2020: 541-546 - [c146]Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, Sunit Kumar Nandi, Sukumar Nandi:
SCAN: Smart Collaborative Attack in Named Data Networking. LCN 2020: 124-133 - [c145]Bikramjit Choudhury, Amitava Nag, Sukumar Nandi:
DTLS based secure group communication scheme for Internet of Things. MASS 2020: 156-164 - [c144]Subhrendu Chattopadhyay, Sukumar Nandi, Sandip Chakraborty, Abhinandan S. Prasad:
Amalgam: Distributed Network Control With Scalable Service Chaining. Networking 2020: 519-523 - [p1]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution. Intelligent Computing Paradigm 2020: 69-84 - [i7]Sukanta Dey, Sukumar Nandi, Gaurav Trivedi:
PowerPlanningDL: Reliability-Aware Framework for On-Chip Power Grid Design using Deep Learning. CoRR abs/2005.01386 (2020) - [i6]Pranav Kumar Singh, Roshan Singh, Sukumar Nandi:
V-CARE: A Blockchain Based Framework for Secure Vehicle Health Record System. CoRR abs/2007.13647 (2020) - [i5]Puneet Bakshi, Sukumar Nandi:
Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption. CoRR abs/2012.10049 (2020)
2010 – 2019
- 2019
- [j60]Pinaki Sarkar, Sukumar Nandi:
A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs. Comput. Networks 164 (2019) - [j59]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack. IEEE CAA J. Autom. Sinica 6(3): 789-806 (2019) - [j58]Sunil Dutt, Satyabrata Dash, Sukumar Nandi, Gaurav Trivedi:
Analysis, Modeling and Optimization of Equal Segment Based Approximate Adders. IEEE Trans. Computers 68(3): 314-330 (2019) - [j57]Pranav Kumar Singh, Sahil Sharma, Sunit Kumar Nandi, Sukumar Nandi:
Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Veh. Commun. 15: 1-15 (2019) - [j56]Pranav Kumar Singh, Sunit Kumar Nandi, Sukumar Nandi:
A tutorial survey on vehicular communication state of the art, and future research directions. Veh. Commun. 18 (2019) - [j55]Pranav Kumar Singh, Shivram N. Gowtham, Tamilselvan S, Sukumar Nandi:
CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs. Veh. Commun. 20 (2019) - [c143]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem. ANTS 2019: 1-6 - [c142]Nidhi Gupta, Manik Lal Das, Sukumar Nandi:
LandLedger: Blockchain-powered Land Property Administration System. ANTS 2019: 1-6 - [c141]Saurabh, Satya Prakash, Pranav Kumar Singh, Sunit Kumar Nandi, Sukumar Nandi:
Is QUIC Quicker Than TCP? - A Performance Evaluation. AINA Workshops 2019: 129-138 - [c140]Pranav Kumar Singh, Rahul Raj Gupta, Sunit Kumar Nandi, Sukumar Nandi:
Machine Learning Based Approach to Detect Wormhole Attack in VANETs. AINA Workshops 2019: 651-661 - [c139]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss. AINA 2019: 821-833 - [c138]Madhurima Buragohain, Prashant Gudipudi, Md. Zaki Anwer, Sukumar Nandi:
EQPR: Enhancing QoS in Named Data Networking using Priority and RTT Driven PIT Replacement Policy. ICC 2019: 1-7 - [c137]Pranav Kumar Singh, Anish V. Monsy, Rajan Garg, Sukanta Dey, Sukumar Nandi:
JSpongeGen: A Pseudo Random Generator for Low Resource Devices. ICDCIT 2019: 410-421 - [c136]Pranav Kumar Singh, Prateek Vij, Arpan Vyas, Sunit Kumar Nandi, Sukumar Nandi:
Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity. ICDCIT 2019: 422-439 - [c135]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Smart Contract Based Decentralized Parking Management in ITS. I4CS 2019: 66-77 - [c134]Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Sukumar Nandi:
Managing Smart Home Appliances with Proof of Authority and Blockchain. I4CS 2019: 221-232 - [c133]Subhrendu Chattopadhyay, Soumyajit Chatterjee, Sukumar Nandi, Sandip Chakraborty:
Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications. INFOCOM 2019: 802-810 - [c132]Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of a Shared Bottleneck Link. PIMRC 2019: 1-6 - [c131]Pranav Kumar Singh, Roshan Singh, Gwmsrang Muchahary, Mridutpal Lahon, Sukumar Nandi:
A Blockchain-Based Approach for Usage Based Insurance and Incentive in ITS. TENCON 2019: 1202-1207 - [c130]Pranav Kumar Singh, Dharmesh Chourasiya, Ayush Singh, Sunit Kumar Nandi, Sukumar Nandi:
CCAPS: Cooperative Context Aware Privacy Scheme for VANETs. VTC Fall 2019: 1-5 - [e1]Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6 [contents] - 2018
- [j54]Sunil Dutt, Sukumar Nandi, Gaurav Trivedi:
Accuracy enhancement of equal segment based approximate adders. IET Comput. Digit. Tech. 12(5): 206-215 (2018) - [j53]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks. Int. J. Wirel. Inf. Networks 25(2): 130-145 (2018) - [j52]Amrita Bose Paul, Santosh Biswas, Sukumar Nandi, Sandip Chakraborty:
MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing. J. Netw. Comput. Appl. 104: 1-20 (2018) - [j51]Niladri Sett, Devesh, Sanasam Ranbir Singh, Sukumar Nandi:
Exploiting reciprocity toward link prediction. Knowl. Inf. Syst. 55(1): 1-13 (2018) - [j50]Mamata Samal, V. Vijaya Saradhi, Sukumar Nandi:
Scalability of correlation clustering. Pattern Anal. Appl. 21(3): 703-719 (2018) - [j49]Sunil Dutt, Sukumar Nandi, Gaurav Trivedi:
Analysis and Design of Adders for Approximate Computing. ACM Trans. Embed. Comput. Syst. 17(2): 40:1-40:28 (2018) - [j48]Niladri Sett, Saptarshi Basu, Sukumar Nandi, Sanasam Ranbir Singh:
Temporal link prediction in multi-relational network. World Wide Web 21(2): 395-419 (2018) - [c129]Jinita Patel, Manik Lal Das, Sukumar Nandi:
On the Security of Remote Key Less Entry for Vehicles. ANTS 2018: 1-6 - [c128]Srikanta Pradhan, Somanath Tripathy, Sukumar Nandi:
Blockchain based Security Framework for P2P Filesharing system. ANTS 2018: 1-6 - [c127]Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi:
CRT-KPS: A Key Predistribution Schemes Using CRT. ACISP 2018: 821-830 - [c126]Bhriguraj Borah, Dhrubajyoti Pathak, Priyankoo Sarmah, Bidisha Som, Sukumar Nandi:
Survey of Textbased Chatbot in Perspective of Recent Technologies. CICBA (2) 2018: 84-96 - [c125]Puneet Bakshi, Neelakantan Subramanian, Sukumar Nandi:
Using Digital Tokens to Improve Amortized Performance of eSign. DASC/PiCom/DataCom/CyberSciTech 2018: 121-128 - [c124]Pranav Kumar Singh, Subhrendu Chattopadhyay, Pradeepkumar Bhale, Sukumar Nandi:
Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment. ICDCIT 2018: 189-204 - [c123]Pranav Kumar Singh, Manish Kumar Dash, Paritosh Mittal, Sunit Kumar Nandi, Sukumar Nandi:
Misbehavior Detection in C-ITS Using Deep Learning Approach. ISDA (1) 2018: 641-652 - [c122]Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh, Sukumar Nandi:
EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers. ISEA-ISAP 2018: 140-150 - [c121]Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, Sukumar Nandi:
Machine Learning Based Approach to Detect Position Falsification Attack in VANETs. ISEA-ISAP 2018: 166-178 - [c120]Sukanta Dey, Satyabrata Dash, Sukumar Nandi, Gaurav Trivedi:
PGIREM: Reliability-Constrained IR Drop Minimization and Electromigration Assessment of VLSI Power Grid Networks Using Cooperative Coevolution. ISVLSI 2018: 40-45 - [c119]Pranav Kumar Singh, Sahil Sharma, Sunit Kumar Nandi, Roshan Singh, Sukumar Nandi:
Leader Election in Cooperative Adaptive Cruise Control Based Platooning. C3VP@MOBICOM 2018: 8-14 - [c118]Pranav Kumar Singh, Geetesh Saikamal Tabjul, Mohd Imran, Sunit Kumar Nandi, Sukumar Nandi:
Impact of Security Attacks on Cooperative Driving Use Case: CACC Platooning. TENCON 2018: 138-143 - [c117]Pranav Kumar Singh, Suraj Kumar Jha, Sunit Kumar Nandi, Sukumar Nandi:
ML-Based Approach to Detect DDoS Attack in V2I Communication Under SDN Architecture. TENCON 2018: 144-149 - [c116]Subhrendu Chattopadhyay, Samar Shailendra, Sukumar Nandi, Sandip Chakraborty:
Improving MPTCP Performance by Enabling Sub-Flow Selection over a SDN Supported Network. WiMob 2018: 1-8 - 2017
- [j47]Mayank Agarwal, Sanketh Purwar, Santosh Biswas, Sukumar Nandi:
Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system. IEEE CAA J. Autom. Sinica 4(4): 792-808 (2017) - [c115]Subhrendu Chattopadhyay, Niladri Sett, Sukumar Nandi, Sandip Chakraborty:
FLIPPER: Fault-tolerant distributed network management and control. IM 2017: 421-427 - [c114]Subhrendu Chattopadhyay, Sukumar Nandi, Samar Shailendra, Sandip Chakraborty:
Primary Path Effect in Multi-Path TCP: How Serious Is It for Deployment Consideration? MobiHoc 2017: 36:1-36:2 - [c113]Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi:
Approxhash: delay, power and area optimized approximate hash functions for cryptography applications. SIN 2017: 291-294 - [c112]Sukanta Dey, Satyabrata Dash, Sukumar Nandi, Gaurav Trivedi:
Markov Chain Model Using Lévy Flight for VLSI Power Grid Analysis. VLSID 2017: 107-112 - 2016
- [j46]Niladri Sett, Sanasam Ranbir Singh, Sukumar Nandi:
Influence of edge weight on node proximity based link prediction methods: An empirical analysis. Neurocomputing 172: 71-83 (2016) - [j45]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Impact of redundant sensor deployment over data gathering performance: A model based approach. J. Netw. Comput. Appl. 67: 26-42 (2016) - [j44]Mayank Agarwal, Dileep Pasumarthi, Santosh Biswas, Sukumar Nandi:
Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization. Int. J. Mach. Learn. Cybern. 7(6): 1035-1051 (2016) - [j43]Satyajit Mondal, Sraban Kumar Mohanty, Sukumar Nandi:
Energy efficient secure communication architecture for wireless sensor network. Secur. Commun. Networks 9(16): 3314-3323 (2016) - [j42]Abhijit Sarma, Sandip Chakraborty, Sukumar Nandi:
Deciding Handover Points Based on Context-Aware Load Balancing in a WiFi-WiMAX Heterogeneous Network Environment. IEEE Trans. Veh. Technol. 65(1): 348-357 (2016) - [j41]Sandip Chakraborty, Sukumar Nandi, Subhrendu Chattopadhyay:
Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks. IEEE Trans. Wirel. Commun. 15(2): 928-937 (2016) - [c111]Subhrendu Chattopadhyay, Sandip Chakraborty, Sukumar Nandi:
Leveraging the trade-off between spatial reuse and channel contention in wireless mesh networks. COMSNETS 2016: 1-8 - [c110]Ronald Ashley Dkhar, Keshab Nath, Swarup Roy, Dhruba K. Bhattacharyya, Sukumar Nandi:
Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters. ICTCS 2016: 4:1-4:6 - [c109]Keshab Nath, Swarup Roy, Sukumar Nandi:
Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures. MEDI 2016: 220-233 - [c108]Sunil Dutt, Harsh Patel, Sukumar Nandi, Gaurav Trivedi:
Exploring Approximate Computing for Yield Improvement via Re-design of Adders for Error-Resilient Applications. VLSID 2016: 134-139 - [c107]Niladri Sett, Subhrendu Chattopadhyay, Sanasam Ranbir Singh, Sukumar Nandi:
A Time Aware Method for Predicting Dull Nodes and Links in Evolving Networks for Data Cleaning. WI 2016: 304-310 - 2015
- [j40]Sandip Chakraborty, Sukumar Nandi:
Data rate, path length and network contention trade-off in IEEE 802.11s mesh networks: A dynamic data rate selection approach. Comput. Networks 91: 225-243 (2015) - [j39]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks. IEEE Commun. Lett. 19(4): 581-584 (2015) - [j38]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Fault resilience in sensor networks: Distributed node-disjoint multi-path multi-sink forwarding. J. Netw. Comput. Appl. 57: 85-101 (2015) - [j37]Suchetana Chakraborty, Sandip Chakraborty, Sushanta Karmakar, Sukumar Nandi:
Dynamic Tree Switching for Distributed Message-Passing Applications. J. Netw. Syst. Manag. 23(1): 1-40 (2015) - [j36]Bidyut Kr. Patra, Sukumar Nandi:
Effective data summarization for hierarchical clustering in large datasets. Knowl. Inf. Syst. 42(1): 1-20 (2015) - [j35]Bidyut Kr. Patra, Raimo Launonen, Ville Ollikainen, Sukumar Nandi:
A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data. Knowl. Based Syst. 82: 163-177 (2015) - [j34]Sandip Chakraborty, Sidharth Sharma, Sukumar Nandi:
MAC Layer Channel Access and Forwarding in a Directional Multi-Interface Mesh Network. IEEE Trans. Mob. Comput. 14(3): 565-578 (2015) - [j33]Pravati Swain, Sandip Chakraborty, Sukumar Nandi, Purandar Bhaduri:
Performance Modeling and Analysis of IEEE 802.11 IBSS PSM in Different Traffic Conditions. IEEE Trans. Mob. Comput. 14(8): 1644-1658 (2015) - [j32]Sandip Chakraborty, Sukumar Nandi:
Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 14(11): 2229-2243 (2015) - [c106]Amrita Bose Paul, Sandip Chakraborty, Suddhasil De, Sukumar Nandi, Santosh Biswas:
Adaptive path selection for high throughput Heterogeneous Wireless Mesh Networks. IEEE ANTS 2015: 1-6 - [c105]Sandip Chakraborty, Sukumar Nandi:
Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks. ICDCN 2015: 21:1-21:10 - [c104]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
I2-diagnosability framework for detection of Advanced Stealth Man in the Middle attack in Wi-Fi networks. MED 2015: 349-356 - [c103]Mayank Agarwal, Santosh Biswas, Sukumar Nandi:
Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach. SMC 2015: 246-251 - [c102]Sunil Dutt, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi:
Variability-aware parametric yield enhancement via post-silicon tuning of hybrid redundant MAC units. VLSI-DAT 2015: 1-4 - [c101]Sunil Dutt, Anshu Chauhan, Rahul Bhadoriya, Sukumar Nandi, Gaurav Trivedi:
A High-Performance Energy-Efficient Hybrid Redundant MAC for Error-Resilient Applications. VLSID 2015: 351-356 - 2014
- [j31]Pravati Swain, Sandip Chakraborty, Sukumar Nandi, Purandar Bhaduri:
Performance modeling and evaluation of IEEE 802.11 IBSS power save mode. Ad Hoc Networks 13: 336-350 (2014) - [j30]Suddhasil De, Sukumar Nandi, Diganta Goswami:
Tuple space enhancements for mobile middleware. Int. J. Commun. Networks Distributed Syst. 12(3): 299-326 (2014) - [j29]Aditya Yadav, Maushumi Barooah, Sandip Chakraborty, Sukumar Nandi, Sanjay Ahuja:
Evaluation of the end-to-end TCP performance for vertical handover using intermediate switching network. Int. J. Commun. Networks Distributed Syst. 12(3): 327-351 (2014) - [j28]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Topology Management Ensuring Reliability in Delay Sensitive Sensor Networks with Arbitrary Node Failures. Int. J. Wirel. Inf. Networks 21(4): 262-279 (2014) - [j27]Pravati Swain, Purandar Bhaduri, Sukumar Nandi:
Probabilistic model checking of IEEE 802.11 IBSS power save mode. Int. J. Wirel. Mob. Comput. 7(5): 465-474 (2014) - [j26]Sandip Chakraborty, Sukumar Nandi:
Evaluating transport protocol performance over a wireless mesh backbone. Perform. Evaluation 79: 198-215 (2014) - [j25]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
ADCROSS: Adaptive Data Collection from Road Surveilling Sensors. IEEE Trans. Intell. Transp. Syst. 15(5): 2049-2062 (2014) - [j24]Abhijit Sarma, Sandip Chakraborty, Sukumar Nandi:
Context Aware Handover Management: Sustaining QoS and QoE in a Public IEEE 802.11e Hotspot. IEEE Trans. Netw. Serv. Manag. 11(4): 530-543 (2014) - [j23]Sandip Chakraborty, Sukumar Nandi:
Selective greedy routing: exploring the path diversity in backbone mesh networks. Wirel. Networks 20(7): 1995-2017 (2014) - [j22]Aditya Yadav, Maushumi Barooah, Sandip Chakraborty, Sukumar Nandi:
Vertical Handover Over Intermediate Switching Framework: Assuring Service Quality for Mobile Users. Wirel. Pers. Commun. 77(1): 507-527 (2014) - [j21]Abhijit Sarma, Sandip Chakraborty, Sukumar Nandi, Anchal Choubey:
Context Aware Inter-BSS Handoff in IEEE 802.11 Networks: Efficient Resource Utilization and Performance Improvement. Wirel. Pers. Commun. 77(4): 2587-2614 (2014) - [c100]Sandip Chakraborty, Sukumar Nandi:
QoS associated path selection in wireless mesh networks. IEEE ANTS 2014: 1-6 - [c99]Tejmani Sinam, Nandarani Ngasham, Pradeep Lamabam, Irengbam Tilokchan Singh, Sukumar Nandi:
Early detection of VoIP network flows based on sub-flow statistical characteristics of flows using machine learning techniques. IEEE ANTS 2014: 1-6 - [c98]Mamata Samal, V. Vijaya Saradhi, Sukumar Nandi:
Scalability of Correlation Clustering Through Constraint Reduction. CODS 2014: 1-10 - [c97]Sandip Chakraborty, Subhrendu Chattopadhyay, Suchetana Chakraborty, Sukumar Nandi:
Defending concealedness in IEEE 802.11n. COMSNETS 2014: 1-8 - [c96]Sandip Chakraborty, Sukumar Nandi:
Evaluating the effect of path diversity over QoS and QoE in a high speed indoor mesh backbone. COMSNETS 2014: 1-8 - [c95]Amrita Bose Paul, Shantanu Konwar, Santosh Biswas, Sukumar Nandi:
M-HRP for Wireless Mesh Networks and its performance evaluation. COMSNETS 2014: 1-4 - [c94]Bidyut Kr. Patra, Raimo Launonen, Ville Ollikainen, Sukumar Nandi:
Exploiting Bhattacharyya Similarity Measure to Diminish User Cold-Start Problem in Sparse Data. Discovery Science 2014: 252-263 - 2013
- [j20]Sandip Chakraborty, Pravati Swain, Sukumar Nandi:
Proportional fairness in MAC layer channel access of IEEE 802.11s EDCA based wireless mesh networks. Ad Hoc Networks 11(1): 570-584 (2013) - [j19]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Convergecast tree management from arbitrary node failure in sensor network. Ad Hoc Networks 11(6): 1796-1819 (2013) - [j18]Arijit Sur, Anand S. Nair, Abhishek Kumar, Apul Jain, Sukumar Nandi:
Steganalysis of Network Packet Length Based Data Hiding. Circuits Syst. Signal Process. 32(3): 1239-1256 (2013) - [j17]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Towards reducing false alarms in network intrusion detection systems with data summarization technique. Secur. Commun. Networks 6(3): 275-285 (2013) - [j16]Sandip Chakraborty, Sukumar Nandi:
IEEE 802.11s Mesh Backbone for Vehicular Communication: Fairness and Throughput. IEEE Trans. Veh. Technol. 62(5): 2193-2203 (2013) - [j15]Maushumi Barooah, Sandip Chakraborty, Sukumar Nandi, Dhananjay Kotwal:
An architectural framework for seamless handoff between IEEE 802.11 and UMTS networks. Wirel. Networks 19(4): 411-429 (2013) - [c93]Sandip Chakraborty, Sukumar Nandi, Subhrendu Chattopadhyay:
Surpassing flow fairness in a mesh network: How to ensure equity among end users? IEEE ANTS 2013: 1-6 - [c92]Deepak Mangal, Niladri Sett, Sanasam Ranbir Singh, Sukumar Nandi:
Link prediction on evolving social network using spectral analysis. IEEE ANTS 2013: 1-6 - [c91]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Energy-Efficient Data Gathering for Road-Side Sensor Networks Ensuring Reliability and Fault-Tolerance. AINA 2013: 189-196 - [c90]Ravi Tandon, Sukumar Nandi:
CRP: Cluster head Re-election Protocol for heterogeneous wireless sensor networks. COMSNETS 2013: 1-10 - [c89]Paromita Choudhury, K. R. Prasanna Kumar, G. Athithan, Sukumar Nandi:
Analysis of VBR coded VoIP for traffic classification. ICACCI 2013: 90-95 - [c88]Niteesh Kumar, Sukumar Nandi:
DisTree: A scheme for DHT. ICACCI 2013: 794-799 - [c87]Suddhasil De, Diganta Goswami, Sukumar Nandi:
Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications. ICDCIT 2013: 220-231 - [c86]Ravi Tandon, Biswanath Dey, Sukumar Nandi:
POSTER: Distributed Lagrangean Clustering Protocol. ICDCN 2013: 450-451 - [c85]Tanima Dutta, Arijit Sur, Sukumar Nandi:
MCRD: Motion coherent region detection in H.264 compressed video. ICME 2013: 1-6 - [c84]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
RelBAS: Reliable data gathering from border area sensors. ISCC 2013: 904-909 - [c83]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
Exploring gradient in sensor deployment pattern for data gathering with sleep based energy saving. IWCMC 2013: 1394-1399 - [c82]Sandip Chakraborty, Suchetana Chakraborty, Sukumar Nandi:
Beyond conventional routing protocols: Opportunistic path selection for IEEE 802.11s mesh networks. PIMRC 2013: 3224-3228 - [c81]Bidyut Kr. Patra, Ville Ollikainen, Raimo Launonen, Sukumar Nandi, Korra Sathya Babu:
Distance based Incremental Clustering for Mining Clusters of Arbitrary Shapes. PReMI 2013: 229-236 - [c80]Suddhasil De, Diganta Goswami, Sukumar Nandi:
Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks. QSHINE 2013: 415-430 - [i4]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification. CoRR abs/1306.1332 (2013) - 2012
- [j14]Nityananda Sarma, Sukumar Nandi:
Enhanced service differentiation using priority-based MAC protocol for MANETs. Int. J. Commun. Networks Distributed Syst. 8(1/2): 149-187 (2012) - [c79]Suddhasil De, Suchetana Chakraborty, Sukumar Nandi, Diganta Goswami:
Supporting Tuple Space based Mobile Middleware over unreliable mobile infrastructures: Design and formal specifications. IEEE ANTS 2012: 123-125 - [c78]Ferdous A. Barbhuiya, Tonmoy Saikia, Sukumar Nandi:
An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics. CSS 2012: 139-152 - [c77]Sandip Chakraborty, Sidharth Sharma, Sukumar Nandi:
Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization. ICC 2012: 5451-5456 - [c76]Sandip Chakraborty, Sukumar Nandi:
MAC layer fairness in IEEE 802.11 DCF based Wireless Mesh Networks. ICNC 2012: 1138-1143 - [c75]Sandip Chakraborty, Sukumar Nandi:
Achieving fairness for multi-class traffic in directional multi-interface IEEE 802.11s MCCA. ICON 2012: 143-148 - [c74]Suddhasil De, Diganta Goswami, Sukumar Nandi, Suchetana Chakraborty:
Formalization of a Fully-Decoupled Reactive Tuple Space Model for Mobile Middleware. MOBILWARE 2012: 77-91 - [c73]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
A novel crash-tolerant data gathering in wireless sensor networks. NOMS 2012: 940-946 - [c72]Shilpa Budhkar, Anshita Mishra, Ferdous A. Barbhuiya, Sukumar Nandi:
Security in Mobile agent systems with Locator mechanism. RAIT 2012: 124-130 - [c71]Pravati Swain, Sandip Chakraborty, Sukumar Nandi, Purandar Bhaduri:
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model. SAC 2012: 631-633 - [c70]Dhruwajita Devi, Sukumar Nandi:
Detection of packed malware. SECURIT 2012: 22-26 - [c69]Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi:
Obfuscated malware detection using API call dependency. SECURIT 2012: 185-193 - [c68]Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas:
Detection of NDP based attacks using MLD. SIN 2012: 163-167 - [c67]Ferdous A. Barbhuiya, Vaibhav Gupta, Santosh Biswas, Sukumar Nandi:
Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack. SERE 2012: 291-300 - [c66]Ferdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi:
An Active Detection Mechanism for Detecting ICMP Based Attacks. TrustCom 2012: 51-58 - [c65]Sandip Chakraborty, Sukumar Nandi:
A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone. TrustCom 2012: 1624-1631 - [c64]Suddhasil De, Sukumar Nandi, Diganta Goswami:
Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY. TrustCom 2012: 1684-1691 - 2011
- [j13]Bidyut Kr. Patra, Sukumar Nandi, P. Viswanath:
A distance based clustering method for arbitrary shaped clusters in large datasets. Pattern Recognit. 44(12): 2862-2870 (2011) - [j12]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Network specific false alarm reduction in intrusion detection system. Secur. Commun. Networks 4(11): 1339-1349 (2011) - [j11]Bidyut Kr. Patra, Sukumar Nandi:
Tolerance Rough Set Theory Based Data Summarization for Clustering Large Datasets. Trans. Rough Sets 14: 139-158 (2011) - [c63]Maushumi Barooah, Sanjay Ahuja, Sandip Chakraborty, Sukumar Nandi:
TCP performance for WLAN-GPRS handover in an Intermediate Switching Network based framework. IEEE ANTS 2011: 1-6 - [c62]Sumit Kumar, Santosh Kumar, Sukumar Nandi:
Distributed smart camera network and mobile devices. ACAI 2011: 21-24 - [c61]Santosh Kumar, Sumit Kumar, Sukumar Nandi:
Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset. ACC (1) 2011: 619-630 - [c60]Amrita Bose Paul, Shantanu Konwar, Upola Gogoi, Sukumar Nandi, Santosh Biswas:
E-AODV for Wireless Mesh Networks and Its Performance Evaluation. BWCCA 2011: 26-33 - [c59]Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi:
A host based DES approach for detecting ARP spoofing. CICS 2011: 114-121 - [c58]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Sequencegram: n-gram modeling of system calls for program based anomaly detection. COMSNETS 2011: 1-10 - [c57]Santosh Kumar, Sukumar Nandi, Santosh Biswas:
Research and application of One-class small hypersphere support vector machine for network anomaly detection. COMSNETS 2011: 1-4 - [c56]Suchetana Chakraborty, Sandip Chakraborty, Sukumar Nandi, Sushanta Karmakar:
A Tree-Based Local Repairing Approach for Increasing Lifetime of Query Driven WSN. CSE 2011: 475-482 - [c55]Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi:
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. ICISS 2011: 294-308 - [c54]Bidyut Kr. Patra, Sukumar Nandi:
Neighborhood Based Clustering Method for Arbitrary Shaped Clusters. ISMIS 2011: 306-315 - [c53]Neminath Hubballi, Bidyut Kr. Patra, Sukumar Nandi:
NDoT: Nearest Neighbor Distance Based Outlier Detection Technique. PReMI 2011: 36-42 - [c52]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. SIN 2011: 111-118 - [c51]Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi:
An active DES based IDS for ARP spoofing. SMC 2011: 2743-2748 - [c50]Soumyadeep G. Dastidar, Subhrangsu Mandal, Ferdous A. Barbhuiya, Sukumar Nandi:
Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm. SocProS (2) 2011: 305-315 - [c49]Abhijit Sarma, Sukumar Nandi:
Zone Based Seamless Vertical Handoff Technique between WiFi and WiMax. WiMo/CoNeCo 2011: 305-314 - [i3]Sumit Kumar, Santosh Kumar, Sukumar Nandi:
Stage Staffing Scheme for Copyright Protection in Multimedia. CoRR abs/1103.3802 (2011) - [i2]Abhijit Sarma, Shantanu Joshi, Sukumar Nandi:
Context Awarw Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks. CoRR abs/1105.5563 (2011) - [i1]Sukumar Nandi, Aditya Yadav:
Cross Layer Adaptation for QoS in WSN. CoRR abs/1110.1496 (2011) - 2010
- [j10]Nityananda Sarma, Sukumar Nandi:
Service differentiation using priority-based MAC protocol in MANETs. Int. J. Internet Protoc. Technol. 5(3): 115-131 (2010) - [j9]Nityananda Sarma, Sukumar Nandi:
Route Stability Based QoS Routing in Mobile Ad Hoc Networks. Wirel. Pers. Commun. 54(1): 203-224 (2010) - [c48]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. ARES 2010: 321-326 - [c47]Dhananjay Kotwal, Maushumi Barooah, Sukumar Nandi:
Seamless Handoff between IEEE 802.11 and GPRS Networks. ICDCIT 2010: 84-90 - [c46]Santosh Kumar, Sukumar Nandi, Santosh Biswas:
Peer-to-Peer Network Classification Using nu-Maximal Margin Spherical Structured Multiclass Support Vector Machine. ICDEM 2010: 80-84 - [c45]Bidyut Kr. Patra, Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Distance Based Fast Hierarchical Clustering Method for Large Datasets. RSCTC 2010: 50-59 - [c44]Neminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, Vivek Ramachandran:
An Active Intrusion Detection System for LAN Specific Attacks. AST/UCMA/ISA/ACN 2010: 129-142
2000 – 2009
- 2009
- [j8]Somanath Tripathy, Sukumar Nandi:
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption. Int. J. Netw. Secur. 8(3): 243-252 (2009) - [c43]Abhishek Anand, Shikhar Sachan, Kalpesh Kapoor, Sukumar Nandi:
QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks. ICDCN 2009: 306-317 - [c42]Abhijit Sarma, Rajat Kumar Gupta, Sukumar Nandi:
A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks. ISPAN 2009: 232-237 - [c41]Bidyut Kr. Patra, Sukumar Nandi:
Fast Single-Link Clustering Method Based on Tolerance Rough Set Model. RSFDGrC 2009: 414-422 - 2008
- [j7]Somanath Tripathy, Sukumar Nandi:
Defense against outside attacks in wireless sensor networks. Comput. Commun. 31(4): 818-826 (2008) - [j6]Somanath Tripathy, Sukumar Nandi:
Secure user-identification and key distribution scheme preserving anonymity. Int. J. Secur. Networks 3(3): 201-205 (2008) - [c40]Amrita Bose Paul, Sukumar Nandi:
Modified Optimized Link State Routing (M-OLSR) for Wireless Mesh Networks. ICIT 2008: 147-152 - [c39]Nityananda Sarma, Aditya Singh, Sukumar Nandi:
A Strict Priority Based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks. ICDCIT 2008: 121-132 - [c38]Nityananda Sarma, Sukumar Nandi:
A Route Stability Based Multipath QoS Routing (SMQR) in MANETs. ICETET 2008: 193-198 - [c37]Giriraj Chauhan, Sukumar Nandi:
QoS Aware Stable path Routing (QASR) Protocol for MANETs. ICETET 2008: 202-207 - [c36]Sounak Paul, Sukumar Nandi, Indrajeet Singh:
A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network. ICON 2008: 1-6 - [c35]Nityananda Sarma, Sukumar Nandi, Rakesh Tripathi:
Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks. ISPAN 2008: 39-44 - [c34]Nityananda Sarma, Sukumar Nandi:
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. Q2SWinet 2008: 79-82 - 2007
- [c33]V. Chennakesavulu, Sukumar Nandi, Somanath Tripathy:
OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol. ICIT 2007: 116-121 - [c32]Atanu Roy Chowdhury, Somanath Tripathy, Sukumar Nandi:
Securing Wireless Sensor Networks Against Spurious Injections. COMSWARE 2007 - [c31]Mantha Venkata Sreedhara Deekshitulu, Sukumar Nandi, Atanu Roy Chowdhury:
Improving MAC Layer Fairness in Multi-Hop 802.11 Networks. COMSWARE 2007 - [c30]Swapnil Pathare, Sukumar Nandi:
Sahnet: a secure system for ad-hoc networking using ecc. Q2SWinet 2007: 130-135 - 2006
- [j5]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals. Perform. Evaluation 63(4-5): 441-462 (2006) - [c29]Vinod Kone, Sukumar Nandi:
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks. ICIT 2006: 40-45 - [c28]Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury:
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. ICIT 2006: 190-191 - [c27]Suresh Reddy, Sukumar Nandi:
Modular approach for anomaly based NIDS. COMSWARE 2006: 1-6 - [c26]Somanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi:
CARA: Cellular automata based remote-user authentication scheme. COMSWARE 2006: 1-4 - [c25]Somanath Tripathy, Sukumar Nandi:
Efficient Remote User Authentication and Key Establishment for Multi-server Environment. ICDCIT 2006: 333-346 - [c24]Biswanath Dey, Sukumar Nandi:
Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network. ICDCN 2006: 534-545 - [c23]Sumeet N. Parmar, Sukumar Nandi, Atanu Roy Chowdhury:
LLM: Low Latency MAC Protocol for Wireless Sensor Networks. SECON 2006: 905-909 - [c22]Sumeet N. Parmar, Sukumar Nandi, Atanu Roy Chowdhury:
Power Efficient and Low Latency MAC for Wireless Sensor Networks. SECON 2006: 940-944 - 2005
- [j4]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks. Comput. Commun. 28(17): 1970-1984 (2005) - [c21]Suresh Reddy, Sukumar Nandi:
Enhanced Network Traffic Anomaly Detector. ICDCIT 2005: 397-403 - [c20]Vivek Ramachandran, Sukumar Nandi:
Detecting ARP Spoofing: An Active Technique. ICISS 2005: 239-250 - [c19]Jiawei Xie, Amitabha Das, Sukumar Nandi, Anil K. Gupta:
Improving the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad hoc networks. WCNC 2005: 126-131 - 2004
- [c18]Suraj Jaiswal, Fernando Boavida, João Orvalho, Sukumar Nandi:
Quality of Service Model and Signaling for Cellular IP Access Network. Broadband Satellite Comunication Systems 2004: 191-204 - [c17]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. ISCC 2004: 176-181 - [c16]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Improving MAC Performance in Wireless Ad Hoc Networks Using Enhanced Carrier Sensing (ECS). NETWORKING 2004: 600-612 - [c15]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals. NETWORKING 2004: 613-625 - [c14]Jiawei Xie, Amitabha Das, Sukumar Nandi:
An improvement to the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad networks. SECON 2004: 359-366 - 2003
- [c13]Zhuowei Li, Amitabha Das, Sukumar Nandi:
Utilizing Statistical Characteristics of N-grams for Intrusion Detection. CW 2003: 486-493 - [c12]Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Study of IEEE 802.11 Fairness and its Interaction with Routing Mechanism. MWCN 2003 - [c11]Jiawei Xie, Sukumar Nandi, Anil K. Gupta:
Gateway-based Multicast Protocol for Mobile Ad Hoc Networks. MWCN 2003 - [c10]Zhi Zhou, Kin Choong Yow, Sukumar Nandi:
A Secure Location Service in Mobile Ad Hoc Networks. MWCN 2003
1990 – 1999
- 1999
- [c9]N. Sudha, Sukumar Nandi, K. Sridharan:
A Parallel Algorithm to Construct Voronoi Diagram and Its VLSI Architecture. ICRA 1999: 1683-1688 - [c8]Sukumar Nandi, Ch. Rambabu, Parimal Pal Chaudhuri:
A VLSI Architecture for Cellular Automata Based Reed-Solomon Decoder. ISPAN 1999: 158-167 - 1998
- [c7]N. Sudha, Sukumar Nandi:
A parallel skeletonization algorithm and its VLSI architecture. HiPC 1998: 65-72 - 1997
- [j3]Sukumar Nandi, Parimal Pal Chaudhuri:
Reply to Comments on "Theory and Application of Cellular Automata in Cryptography". IEEE Trans. Computers 46(5): 639 (1997) - [c6]D. K. Bhattacharryya, Sukumar Nandi:
An efficient class of SEC-DED-AUED codes. ISPAN 1997: 410-416 - 1996
- [j2]Sukumar Nandi, Parimal Pal Chaudhuri:
Analysis of Periodic and Intermediate Boundary 90/150 Cellular Automata. IEEE Trans. Computers 45(1): 1-12 (1996) - [c5]Sukumar Nandi, Santanu Chattopadhyay, Parimal Pal Chaudhuri:
Programmable cellular automata based testbed for fault diagnosis in VLSI circuits. VLSI Design 1996: 61-64 - [c4]S. Mitra, S. Das, Parimal Pal Chaudhuri, Sukumar Nandi:
Architecture of a VLSI Chip for Modeling Amino Acid Sequence in Proteins. VLSI Design 1996: 316-317 - 1995
- [c3]Sukumar Nandi, Parimal Pal Chaudhuri:
Theory and applications of cellular automata for synthesis of easily testable combinational logic. Asian Test Symposium 1995: 146-152 - 1994
- [j1]Sukumar Nandi, B. K. Kar, Parimal Pal Chaudhuri:
Theory and Applications of Cellular Automata in Cryptography. IEEE Trans. Computers 43(12): 1346-1357 (1994) - [c2]Sukumar Nandi, Vamsi Boppana, Parimal Pal Chaudhuri:
A CAD Tool for Design of On-Chip Store & Generate Scheme. VLSI Design 1994: 169-174 - 1993
- [c1]Sukumar Nandi, Vamsi Boppana, Supratik Chakraborty, Parimal Pal Chaudhuri, Samir Roy:
Delay Fault Test Generation with Cellular Automata. VLSI Design 1993: 281-286
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint