关注
Indira K Dutta
Indira K Dutta
Assistant Professor, Arkansas Tech University
在 atu.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lightweight Cryptography for Internet of Insecure Things: A Survey
IK Dutta, B Ghosh, M Bayoumi
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
1102019
A survey on security in internet of things with a focus on the impact of emerging technologies
P Williams, IK Dutta, H Daoud, M Bayoumi
Internet of Things 19, 100564, 2022
792022
Generative Adversarial Networks in Security: A Survey
IK Dutta, B Ghosh, AH Carlson, M Totaro, M Bayoumi
2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020
372020
A survey on the progression and Performance of Generative Adversarial Networks
B Ghosh, IK Dutta, M Totaro, M Bayoumi
2020 11th International Conference on Computing, Communication and …, 2020
172020
An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes
B Ghosh, IK Dutta, AH Carlson, M Totaro, M Bayoumi
2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020
122020
Minimizing shadowing effects on mobile ad hoc networks
D Debnath, CA Hossain, R Islam, M Tarique, IK Dutta
Journal of Selected Areas in Telecommunications 1 (10), 46-51, 2011
92011
Security Aspects in Internet of Things – A Survey
P Williams, IK Dutta, H Daoud, M Bayoumi
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
82020
A hardware obfuscation technique for manufacturing a secure 3D IC
S Madani, MR Madani, IK Dutta, Y Joshi, M Bayoumi
2018 IEEE 61st International Midwest Symposium on Circuits and Systems …, 2018
82018
Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices
IK Dutta, B Ghosh, AH Carlson, M Bayoumi
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
72020
Generative adversarial networks in security: A survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
IK Dutta, B Ghosh, A Carlson, M Totaro, M Bayoumi
IEEE, 0399ś0405, 2020
72020
Evaluating True Cryptographic Key Space Size
A Carlson, G Gang, T Gang, B Ghosh, IK Dutta
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
52021
Isomorphic cipher reduction
B Ghosh, IK Dutta, S Khare, A Carlson, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
42021
Key space reduction using isomorphs
A Carlson, B Ghosh, IK Dutta, S Khare, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
32021
Techniques to detect fake profiles on social media using the new age algorithms-A Survey
AKMRR Habib, EE Akpan, B Ghosh, IK Dutta
2024 IEEE 14th Annual Computing and Communication Workshop and Conference …, 2024
22024
Using the collision attack for breaking cryptographic modes
A Carlson, I Dutta, B Ghosh
2022 13th International Conference on Computing Communication and Networking …, 2022
22022
Modeling polymorphic ciphers
A Carlson, IK Dutta, B Ghosh, M Totaro
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-5, 2021
22021
A High-performance Lightweight Polymorphic Encryption System for Constrained Internet of Things (IoT) Devices
IK Dutta
University of Louisiana at Lafayette, 2021
12021
A Demonstrable Break of PCBC Mode
A Carlson, I Dutta, B Ghosh
2023 International Symposium on Networks, Computers and Communications …, 2023
2023
Enhancing the Programming Sequence for Undergraduate Computer Science Students: A Program for Improving Learning Outcomes
M Rahaman, R Ghosh, I Dutta, T Ensari, R Cunningham
2023 5th International Congress on Human-Computer Interaction, Optimization …, 2023
2023
The Problem with Regular Multiple Byte Block Boundaries in Encryption
A Carlson, I Dutta, B Ghosh, R Hiromoto
2022 IEEE 13th Annual Information Technology, Electronics and Mobile …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20