deepBF: Malicious URL detection using learned bloom filter and evolutionary deep learning

R Patgiri, A Biswas, S Nayak - Computer Communications, 2023 - Elsevier
Malicious URL detection is an emerging research area due to the continuous modernization
of various systems, for instance, Edge Computing. This article presents a novel malicious …

Is bloom filter a bad choice for security and privacy?

R Patgiri, S Nayak… - … Conference on Information …, 2021 - ieeexplore.ieee.org
Today, millions of devices produce billions of network requests to the servers. All these
request packets need to be scanned for security. Hence, providing network security and …

countBF: A general-purpose high accuracy and space efficient counting bloom filter

S Nayak, R Patgiri - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
Bloom Filter is a probabilistic data structure for the membership query, and it has been
intensely experimented in various fields to reduce memory consumption and enhance a …

Inspecting End-to-End Encrypted Communication Differentially for the Efficient Identification of Harmful Media

T Zheng, T Zhou, K Lu, Z Cai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Due to the immense benefits of guaranteeing user privacy, popular messaging platforms
have shown enthusiasm for deploying End-to-End Encryption (E2EE). However, E2EE could …

Performance analysis of bloom filter for big data analytics

SA Alsuhibany, M Alsuhaibani… - Computational …, 2022 - Wiley Online Library
The rapid rise of data value, such as social media and mobile applications, results in large
volumes of data, which is what the term “big data” refers to. The increased rate of data …

PSBF: p-adic Integer Scalable Bloom Filter

W Yi, C Wang, Q Xie, Y Zhao, J Jia - Sensors, 2023 - mdpi.com
Given the challenges associated with the dynamic expansion of the conventional bloom
filter's capacity, the prevalence of false positives, and the subpar access performance, this …

robustBF: A high accuracy and memory efficient 2d bloom filter

S Nayak, R Patgiri - arXiv preprint arXiv:2106.04365, 2021 - arxiv.org
Bloom Filter is an important probabilistic data structure to reduce memory consumption for
membership filters. It is applied in diverse domains such as Computer Networking, Network …

Whisper: A curious case of valid and employed mallory in cloud computing

R Patgiri - 2021 8th IEEE International Conference on Cyber …, 2021 - ieeexplore.ieee.org
Apart from Security and privacy, there are crucial requirements of secrecy for modern
practice in Cloud Computing. Secrecy protocol keeps client's data secret, and it protects the …

HEX-BLOOM: An efficient method for authenticity and integrity verification in privacy-preserving computing

R Patgiri, MD Borah - 2022 IEEE International Performance …, 2022 - ieeexplore.ieee.org
Merkle tree is applied in diverse applications, namely, Blockchain, smart grid, IoT,
Biomedical, financial transactions, etc., to verify authenticity and integrity. Also, the Merkle …

SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data

R Patgiri, MD Borah, LD Singh - 2021 26th IEEE Asia-Pacific …, 2021 - ieeexplore.ieee.org
Data secrecy is a major concern in many domains. Nowadays, the data are kept in tight
security with high privacy. Users do not want to share their secret information with anyone; …