Lightweight Cryptography for Internet of Insecure Things: A Survey IK Dutta, B Ghosh, M Bayoumi 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 110 | 2019 |
A survey on security in internet of things with a focus on the impact of emerging technologies P Williams, IK Dutta, H Daoud, M Bayoumi Internet of Things 19, 100564, 2022 | 79 | 2022 |
Generative Adversarial Networks in Security: A Survey IK Dutta, B Ghosh, AH Carlson, M Totaro, M Bayoumi 2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020 | 37 | 2020 |
A survey on the progression and Performance of Generative Adversarial Networks B Ghosh, IK Dutta, M Totaro, M Bayoumi 2020 11th International Conference on Computing, Communication and …, 2020 | 17 | 2020 |
An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes B Ghosh, IK Dutta, AH Carlson, M Totaro, M Bayoumi 2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020 | 12 | 2020 |
Minimizing shadowing effects on mobile ad hoc networks D Debnath, CA Hossain, R Islam, M Tarique, IK Dutta Journal of Selected Areas in Telecommunications 1 (10), 46-51, 2011 | 9 | 2011 |
Security Aspects in Internet of Things – A Survey P Williams, IK Dutta, H Daoud, M Bayoumi 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020 | 8 | 2020 |
A hardware obfuscation technique for manufacturing a secure 3D IC S Madani, MR Madani, IK Dutta, Y Joshi, M Bayoumi 2018 IEEE 61st International Midwest Symposium on Circuits and Systems …, 2018 | 8 | 2018 |
Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices IK Dutta, B Ghosh, AH Carlson, M Bayoumi 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020 | 7 | 2020 |
Generative adversarial networks in security: A survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) IK Dutta, B Ghosh, A Carlson, M Totaro, M Bayoumi IEEE, 0399ś0405, 2020 | 7 | 2020 |
Evaluating True Cryptographic Key Space Size A Carlson, G Gang, T Gang, B Ghosh, IK Dutta 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021 | 5 | 2021 |
Isomorphic cipher reduction B Ghosh, IK Dutta, S Khare, A Carlson, M Totaro 2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021 | 4 | 2021 |
Key space reduction using isomorphs A Carlson, B Ghosh, IK Dutta, S Khare, M Totaro 2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021 | 3 | 2021 |
Techniques to detect fake profiles on social media using the new age algorithms-A Survey AKMRR Habib, EE Akpan, B Ghosh, IK Dutta 2024 IEEE 14th Annual Computing and Communication Workshop and Conference …, 2024 | 2 | 2024 |
Using the collision attack for breaking cryptographic modes A Carlson, I Dutta, B Ghosh 2022 13th International Conference on Computing Communication and Networking …, 2022 | 2 | 2022 |
Modeling polymorphic ciphers A Carlson, IK Dutta, B Ghosh, M Totaro 2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-5, 2021 | 2 | 2021 |
A High-performance Lightweight Polymorphic Encryption System for Constrained Internet of Things (IoT) Devices IK Dutta University of Louisiana at Lafayette, 2021 | 1 | 2021 |
A Demonstrable Break of PCBC Mode A Carlson, I Dutta, B Ghosh 2023 International Symposium on Networks, Computers and Communications …, 2023 | | 2023 |
Enhancing the Programming Sequence for Undergraduate Computer Science Students: A Program for Improving Learning Outcomes M Rahaman, R Ghosh, I Dutta, T Ensari, R Cunningham 2023 5th International Congress on Human-Computer Interaction, Optimization …, 2023 | | 2023 |
The Problem with Regular Multiple Byte Block Boundaries in Encryption A Carlson, I Dutta, B Ghosh, R Hiromoto 2022 IEEE 13th Annual Information Technology, Electronics and Mobile …, 2022 | | 2022 |