A genetic algorithm (ga) based load balancing strategy for cloud computing K Dasgupta, B Mandal, P Dutta, JK Mandal, S Dam Procedia Technology 10, 340-347, 2013 | 462 | 2013 |
Hash based least significant bit technique for video steganography (HLSB) K Dasgupta, JK Mandal, P Dutta International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012 | 131 | 2012 |
Incorporating nonlinearities of measurement function in power system dynamic state estimation JK Mandal, AK Sinha, L Roy IEE Proceedings-Generation, Transmission and Distribution 142 (3), 289-296, 1995 | 118 | 1995 |
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain L Riley, JK Mandal, D Das International Journal of Information Sciences and Techniques (IJIST) Vol 2, 2012 | 113 | 2012 |
Computational Intelligence, Communications, and Business Analytics [electronic resource]: First International Conference, CICBA 2017, Kolkata, India, March 24–25, 2017, Revised … JK Mandal, P Dutta, S Mukhopadhyay Singapore: Springer Singapore: Imprint: Springer, 2017., 2017 | 108* | 2017 |
A novel secure image steganography method based on chaos theory in spatial domain D Bandyopadhyay, K Dasgupta, JK Mandal, P Dutta International Journal of Security, Privacy and Trust Management (IJSPTM) 3 …, 2014 | 80 | 2014 |
QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack RK Bar, JK Mandal, MM Singh Procedia Technology 10, 530-537, 2013 | 78 | 2013 |
Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2 JK Mandal, SC Satapathy, MK Sanyal, PP Sarkar, A Mukhopadhyay Springer India, 2015 | 71 | 2015 |
Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow JK Mandal, D Das arXiv preprint arXiv:1205.6775, 2012 | 66 | 2012 |
A genetic algorithm based steganography using discrete cosine transformation (GASDCT) A Khamrui, JK Mandal Procedia Technology 10, 105-111, 2013 | 61 | 2013 |
Emerging Technology in Modelling and Graphics JK Mandal, D Bhattacharya Springer Singapore, 2020 | 53 | 2020 |
A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT) N Ghoshal, JK Mandal Malaysian Journal of Computer Science 21 (1), 24-32, 2008 | 53 | 2008 |
Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society S Bandyopadhyay, SS Thakur, JK Mandal Innovations in Systems and Software Engineering 17 (1), 45-52, 2021 | 50 | 2021 |
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection NB Singh, MM Singh, A Sarkar, JK Mandal Journal of Information Security and Applications 61, 102899, 2021 | 48 | 2021 |
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector SK Ghosal, JK Mandal, R Sarkar Multimedia Tools and Applications 77 (23), 30403-30418, 2018 | 47 | 2018 |
Computational intelligence in data mining-volume LC Jain, HS Behera, JK Mandal, DP Mohapatra Proceedings of the International Conference on CIDM 20, 21, 2014 | 47 | 2014 |
Wavelet based denoising of medical images using sub-band adaptive thresholding through genetic algorithm S Mukhopadhyay, JK Mandal Procedia Technology 10, 680-689, 2013 | 47 | 2013 |
Emerging Technologies in Data Mining and Information Security A Abraham, P Dutta, JK Mandal, A Bhattacharya, S Dutta Proceedings of IEMIS-2018, 2018 | 44 | 2018 |
Steganographic technique based on minimum deviation of fidelity (STMDF) JK Mandal, M Sengupta 2011 Second International Conference on Emerging Applications of Information …, 2011 | 41 | 2011 |
Binomial transform based fragile watermarking for image authentication SK Ghosal, JK Mandal Journal of Information Security and Applications 19 (4-5), 272-281, 2014 | 40 | 2014 |