default search action
Arindam Sarkar
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Sarah A. Alzakari, Arindam Sarkar, Mohammad Zubair Khan, Amel Ali Alhussan:
Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence. IEEE Access 12: 99469-99498 (2024) - [j39]Arindam Sarkar:
Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things. Appl. Soft Comput. 161: 111731 (2024) - [j38]Tao Hai, Arindam Sarkar, Muammer Aksoy, Rahul Karmakar, Sarbajit Manna, Amrita Prasad:
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning. Clust. Comput. 27(6): 7889-7914 (2024) - [j37]Tao Hai, Arindam Sarkar, Muammer Aksoy, Mohammad Zubair Khan, Abdulrahman Alahmadi:
Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things. Eng. Appl. Artif. Intell. 128: 107561 (2024) - [j36]Chengzhi Jiang, Arindam Sarkar, Abdulfattah Noorwali, Rahul Karmakar, Kamal M. Othman, Sarbajit Manna:
Secured mutual wireless communication using real and imaginary-valued artificial neuronal synchronization and attack detection. Eng. Appl. Artif. Intell. 137: 109203 (2024) - [j35]Ju Lu, Arindam Bhar, Arindam Sarkar, Abdulfattah Noorwali, Kamal M. Othman:
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats. Internet Things 28: 101377 (2024) - [j34]Chongzhou Zhong, Arindam Sarkar, Sarbajit Manna, Mohammad Zubair Khan, Abdulfattah Noorwali, Ashish Das, Koyel Chakraborty:
Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things. Int. J. Mach. Learn. Cybern. 15(12): 5635-5665 (2024) - [j33]Arindam Sarkar, Rahul Karmakar, Mandira Roy:
GAN-guided artificial neural collaborative complex computation for efficient neural synchronization. Multim. Tools Appl. 83(9): 26387-26418 (2024) - [j32]Arindam Sarkar, Krishna Daripa, Mohammad Zubair Khan, Abdulfattah Noorwali:
An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key. Soft Comput. 28(5): 4413-4433 (2024) - [c9]Deepanshu Pandey, Arindam Sarkar, Prakash Mandayam Comar:
GLAD: Graph-Based Long-Term Attentive Dynamic Memory for Sequential Recommendation. ECIR (3) 2024: 72-88 - 2023
- [j31]Arindam Sarkar:
A symmetric neural cryptographic key generation scheme for Iot security. Appl. Intell. 53(8): 9344-9367 (2023) - [j30]Mohammad Zubair Khan, Arindam Sarkar, Abdulfattah Noorwali:
Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in Industrial Internet of Things. Eng. Appl. Artif. Intell. 123(Part B): 106357 (2023) - [j29]Tao Hai, Arindam Sarkar, Rahul Karmakar, Mohammad Zubair Khan, Ayman Noor, Talal H. Noor, Abhinav Kumar, A. Yvaz:
Neural session key exchange in the Industrial Internet of Things using hyperchaotic-guided vector-valued artificial neural synchronization. Eng. Appl. Artif. Intell. 125: 106683 (2023) - [j28]Arindam Sarkar:
Generative adversarial network-based efficient synchronization of group of neural networks to exchange the neural key. J. Ambient Intell. Humaniz. Comput. 14(6): 6463-6488 (2023) - [j27]Joydeep Dey, Arindam Sarkar, Sunil Karforma, Bappaditya Chowdhury:
Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19. J. Ambient Intell. Humaniz. Comput. 14(6): 6623-6644 (2023) - [j26]Arindam Sarkar:
Neural coordination through spider monkey optimization-guided weight synchronization. Multim. Tools Appl. 82(22): 33577-33606 (2023) - [j25]Arindam Sarkar:
Gravitational Search-Based Efficient Multilayer Artificial Neural Coordination. Neural Process. Lett. 55(7): 8509-8530 (2023) - [j24]Hanjabam Saratchandra Sharma, Arindam Sarkar, Moirangthem Marjit Singh:
An efficient deep learning-based solution for network intrusion detection in wireless sensor network. Int. J. Syst. Assur. Eng. Manag. 14(6): 2423-2446 (2023) - [c8]Dibyanshu Jaiswal, Debatri Chatterjee, Arindam Sarkar, Meghana S, Ramesh Kumar Ramakrishnan, Arpan Pal, Ratna Ghosh:
Assessment of Mental Workloads using Differential Dermal Potentials Recorded from in and around Ear. BodySys@MobiSys 2023: 1-6 - 2022
- [j23]Arindam Sarkar:
Development of GAN-based optimal neural network structure for group synchronization. Multim. Tools Appl. 81(20): 28999-29025 (2022) - [j22]Mohammad Zubair Khan, Arindam Sarkar, Hamza Ghandorh, Maha Driss, Wadii Boulila:
Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization. Sensors 22(4): 1652 (2022) - [j21]Arindam Sarkar, Bhaswati Goswami, Ratna Ghosh:
Validating Differential Dermal Potentials for Use in Real-Time Human Condition Monitoring. IEEE Trans. Instrum. Meas. 71: 1-9 (2022) - [j20]Arindam Sarkar, Krishna Daripa, Mohammad Zubair Khan, Abdulfattah Noorwali:
Cloud enabled Blockchain-based secured communication in mutual intelligent transportation using neural synchronization. Veh. Commun. 38: 100533 (2022) - [j19]Joydeep Dey, Anirban Bhowmik, Arindam Sarkar, Sunil Karforma, Bappaditya Chowdhury:
Cryptographic Engineering on COVID-19 Telemedicine: An Intelligent Transmission Through Recurrent Relation Based Session Key. Wirel. Pers. Commun. 122(4): 3167-3204 (2022) - [j18]Arindam Sarkar:
Faster Synchronization of Triple Layer Neural Network Using Nature Inspired Whale Optimization: A Key Exchange Protocol. Wirel. Pers. Commun. 124(1): 683-713 (2022) - [j17]Arindam Sarkar:
Generative Adversarial Networks Based Neural Session Key Exchange Protocol for Secured Transmission of Information. Wirel. Pers. Commun. 126(3): 2207-2229 (2022) - [c7]Arindam Sarkar, Dipankar Das, Vivek Sembium, Prakash Mandayam Comar:
Dual Attentional Higher Order Factorization Machines. RecSys 2022: 378-388 - 2021
- [j16]Arindam Sarkar, Mohammad Zubair Khan, Moirangthem Marjit Singh, Abdulfattah Noorwali, Chinmay Chakraborty, Subhendu Kumar Pani:
Artificial Neural Synchronization Using Nature Inspired Whale Optimization. IEEE Access 9: 16435-16447 (2021) - [j15]Arindam Sarkar, Moirangthem Marjit Singh, Mohammad Zubair Khan, Omar Hussain Alhazmi:
Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement. IEEE Access 9: 76780-76795 (2021) - [j14]Arindam Sarkar:
Neural cryptography using optimal structure of neural networks. Appl. Intell. 51(11): 8057-8066 (2021) - [j13]Arindam Sarkar, Newton Singh, Varun Venkitaraman, Virendra Singh:
DAM: Deadblock Aware Migration Techniques for STT-RAM-Based Hybrid Caches. IEEE Comput. Archit. Lett. 20(1): 62-65 (2021) - [j12]Arindam Sarkar, Mohammad Zubair Khan, Abdulfattah Noorwali:
CMOS technology-based energy efficient artificial neural session key synchronization for securing IoT. Comput. Electr. Eng. 95: 107369 (2021) - [j11]Arindam Sarkar, Mohammad Zubair Khan, Abdulfattah Noorwali:
Secured communication using efficient artificial neural synchronization. Eng. Appl. Artif. Intell. 106: 104478 (2021) - [j10]Arindam Sarkar:
Neural synchronization of optimal structure-based group of neural networks. Neurocomputing 450: 156-167 (2021) - [j9]Arindam Sarkar, Mohammad Zubair Khan, Ahmed H. Alahmadi:
Neural weight coordination-based vector-valued neural network synchronization. Neurocomputing 464: 507-521 (2021) - [j8]Nongmeikapam Brajabidhu Singh, Moirangthem Marjit Singh, Arindam Sarkar, Jyotsna Kumar Mandal:
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection. J. Inf. Secur. Appl. 61: 102899 (2021) - [j7]Arindam Sarkar:
Secure exchange of information using artificial intelligence and chaotic system guided neural synchronization. Multim. Tools Appl. 80(12): 18211-18241 (2021) - [j6]Arindam Sarkar, Moumita Sarkar:
Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19. Multim. Tools Appl. 80(14): 21899-21923 (2021) - [j5]Arindam Sarkar:
Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning. Neural Process. Lett. 53(2): 1355-1384 (2021) - [j4]Joydeep Dey, Arindam Sarkar, Sunil Karforma:
ICT-Guided Glycemic Information Sharing Through Artificial Neural Telecare Network. SN Comput. Sci. 2(6): 426 (2021) - [j3]Joydeep Dey, Arindam Sarkar, Bappaditya Chowdhury, Sunil Karforma:
Episode of COVID-19 Telepsychiatry Session Key Origination Upon Swarm-Based Metaheuristic and Neural Perceptron Blend. SN Comput. Sci. 2(6): 445 (2021) - [j2]Arindam Sarkar, Joydeep Dey, Sunil Karforma:
Musically Modified Substitution-Box for Clinical Signals Ciphering in Wireless Telecare Medical Communicating Systems. Wirel. Pers. Commun. 117(2): 727-745 (2021) - 2020
- [c6]Arindam Sarkar, Nikhil Mehta, Piyush Rai:
Graph Representation Learning via Ladder Gamma Variational Autoencoders. AAAI 2020: 5604-5611
2010 – 2019
- 2015
- [j1]Arindam Sarkar, Jyotsna Kumar Mandal:
Cryptanalysis of Key Exchange method in Wireless Communication. Int. J. Netw. Secur. 17(4): 484-493 (2015) - 2014
- [c5]Arindam Sarkar, J. K. Mandal, Pritha Mondal:
Neuro-key Generation Based on HEBB Network for Wireless Communication. FICTA (2) 2014: 197-205 - [c4]Madhumita Sengupta, J. K. Mandal, Arindam Sarkar, Tamal Bhattacharjee:
KSOFM Network Based Neural Key Generation for Wireless Communication. FICTA (2) 2014: 207-215 - [c3]J. K. Mandal, Debdyuti Datta, Arindam Sarkar:
Hopfield Network Based Neural Key Generation for Wireless Communication (HNBNKG). FICTA (2) 2014: 217-224 - 2013
- [c2]Arindam Sarkar, J. K. Mandal, Priyadarsan Patra:
Double Layer Perceptron Synchronized Computational Intelligence Guided Fractal Triangle Based Cryptographic Technique for Secured Communication (DLPFT). ISED 2013: 191-195 - 2012
- [i5]Arindam Sarkar, Sunil Karforma, J. K. Mandal:
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG). CoRR abs/1204.1797 (2012) - [i4]Arindam Sarkar, J. K. Mandal:
Energy Efficient Wireless Communication using Genetic Algorithm Guided Faster Light Weight Digital Signature Algorithm (GADSA). CoRR abs/1208.2333 (2012) - [i3]Arindam Sarkar, J. K. Mandal:
Multilayer Perceptron Guided Key Generation Through Mutation with Recursive Replacement in Wireless Communication (MLPKG). CoRR abs/1208.2334 (2012) - [i2]Arindam Sarkar, J. K. Mandal:
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC). CoRR abs/1211.2087 (2012) - [i1]Arindam Sarkar, J. K. Mandal:
Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP). CoRR abs/1211.4723 (2012) - 2011
- [c1]J. K. Mandal, Arindam Sarkar:
An adaptive genetic key based neural encryption for online wireless communication (AGKNE). ReTIS 2011: 62-67
Coauthor Index
aka: Jyotsna Kumar Mandal
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint