A genetic algorithm (ga) based load balancing strategy for cloud computing K Dasgupta, B Mandal, P Dutta, JK Mandal, S Dam Procedia Technology 10, 340-347, 2013 | 461 | 2013 |
Hash based least significant bit technique for video steganography (HLSB) K Dasgupta, JK Mandal, P Dutta International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012 | 136 | 2012 |
Incorporating nonlinearities of measurement function in power system dynamic state estimation JK Mandal, AK Sinha, L Roy IEE Proceedings-Generation, Transmission and Distribution 142 (3), 289-296, 1995 | 118 | 1995 |
Colour image steganography based on pixel value differencing in spatial domain JK Mandal, D Das International journal of information sciences and techniques 2 (4), 2012 | 112 | 2012 |
Computational Intelligence, Communications, and Business Analytics [electronic resource]: First International Conference, CICBA 2017, Kolkata, India, March 24–25, 2017, Revised … JK Mandal, P Dutta, S Mukhopadhyay Singapore: Springer Singapore: Imprint: Springer, 2017., 2017 | 106* | 2017 |
A novel secure image steganography method based on chaos theory in spatial domain D Bandyopadhyay, K Dasgupta, JK Mandal, P Dutta International Journal of Security, Privacy and Trust Management (IJSPTM) 3 …, 2014 | 82 | 2014 |
QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack RK Bar, JK Mandal, MM Singh Procedia Technology 10, 530-537, 2013 | 78 | 2013 |
Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow JK Mandal, D Das arXiv preprint arXiv:1205.6775, 2012 | 67 | 2012 |
Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2 JK Mandal, SC Satapathy, MK Sanyal, PP Sarkar, A Mukhopadhyay Springer India, 2015 | 65 | 2015 |
A genetic algorithm based steganography using discrete cosine transformation (GASDCT) A Khamrui, JK Mandal Procedia Technology 10, 105-111, 2013 | 61 | 2013 |
A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT) N Ghoshal, JK Mandal Malaysian Journal of Computer Science 21 (1), 24-32, 2008 | 54 | 2008 |
Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society S Bandyopadhyay, SS Thakur, JK Mandal Innovations in Systems and Software Engineering 17 (1), 45-52, 2021 | 51 | 2021 |
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection NB Singh, MM Singh, A Sarkar, JK Mandal Journal of Information Security and Applications 61, 102899, 2021 | 48 | 2021 |
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector SK Ghosal, JK Mandal, R Sarkar Multimedia Tools and Applications 77 (23), 30403-30418, 2018 | 47 | 2018 |
Computational intelligence in data mining-volume LC Jain, HS Behera, JK Mandal, DP Mohapatra Proceedings of the International Conference on CIDM 20, 21, 2014 | 47 | 2014 |
Wavelet based denoising of medical images using sub-band adaptive thresholding through genetic algorithm S Mukhopadhyay, JK Mandal Procedia Technology 10, 680-689, 2013 | 47 | 2013 |
Emerging Technology in Modelling and Graphics JK Mandal, D Bhattacharya Springer Singapore, 2020 | 43 | 2020 |
Emerging Technologies in Data Mining and Information Security A Abraham, P Dutta, JK Mandal, A Bhattacharya, S Dutta Proceedings of IEMIS-2018, 2018 | 42 | 2018 |
Steganographic technique based on minimum deviation of fidelity (STMDF) JK Mandal, M Sengupta 2011 Second International Conference on Emerging Applications of Information …, 2011 | 41 | 2011 |
Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC) JK Mandal, M Sengupta 2010 International Symposium on Electronic System Design, 225-229, 2010 | 40 | 2010 |