Sledovat
Dr. Arunava Roy
Dr. Arunava Roy
Research Assistant Prof., Dept. of CS, The University of Memphis, USA
E-mailová adresa ověřena na: memphis.edu
Název
Citace
Citace
Rok
Emerging trends, techniques and open issues of containerization: A review
J Watada, A Roy, R Kadikar, H Pham, B Xu
IEEE Access 7, 152443-152472, 2019
1002019
Advances in User Authentication
D Dasgupta, A Roy, A Nag
Book; Springer, 2017
912017
Toward the design of adaptive selection strategies for multi-factor authentication
D Dasgupta, A Roy, A Nag
Computers & Security (Elsevier) 63, 85-116;, 2016
872016
Multi-factor authentication: more secure approach towards authenticating individuals
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag
Advances in User Authentication, 185-233, 2017
822017
In object detection deep learning methods, YOLO shows supremum to Mask R-CNN
S Shahriar, W Junzo, R Anurava, DRA Rambli
Journal of Physics: Conference Series; https://iopscience.iop.org/article/10 …, 2020
562020
A structure-based software reliability allocation using fuzzy analytic hierarchy process
S Chatterjee, JB Singh, A Roy
International Journal of Systems Science (Taylor & Francis) 46 (3), 513-525 …, 2015
412015
Adaptive multi-factor authentication system
D Dasgupta, AK Nag, A Roy
US Patent 9,912,657, 2018
272018
An Adaptive Approach Towards the Selection of Multi-Factor Authentication
AK Nag, A Roy, D Dasgupta
Computational Intelligence, 2015 IEEE Symposium Series on, 463 - 472, 2015
252015
A reinforcement learning algorithm for automated detection of skin lesions
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Applied Sciences 11 (20), 9367, 2021
242021
Software Fault Prediction using Neuro-Fuzzy Network and Evolutionary Learning Approach
C Subhashis, N Shobhit, A Roy
Neural Computing and Applications (Springer), 1-11; Impact Factor: 2.505, 2016
24*2016
Multi-user Permission Strategy to Access Sensitive Information
D Dasgupta, A Roy, D Ghosh
Information Sciences 423, 24-49, 2017
22*2017
Insights from curve fitting models in mouse dynamics authentication systems
YXM Tan, A Binder, A Roy
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
212017
Novel algorithms for web software fault prediction
S Chatterjee, A Roy
Quality and Reliability Engineering International (Wiley) 31 (8), 1517-1535 …, 2015
212015
Enhanced reinforcement learning model for extraction of objects in complex imaging
UA Usmani, A Roy, J Watada, J Jaafar, IA Aziz
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2022
162022
Particle swarm optimization with deep learning for human action recognition
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021
162021
Particle swarm optimization with deep learning for human action recognition
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021
162021
A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction
A Roy
Soft Computing (Springer) 20 (5), 1991-2019; Impact Factor 2.472, 2016
162016
A fuzzy decision support system for multifactor authentication
A Roy, D Dasgupta
Soft Computing (Springer), 1-23; Impact Factor 2.472, 2017
152017
A reinforced active learning algorithm for semantic segmentation in complex imaging
UA usmani, J Watada, J Jaafar, IA Aziz, A Roy
IEEE Access, 2021
142021
Negative Authentication Systems: Who am I?“I am not this; no, nor am I this, nor this,” then which remains is the identity of I
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag
Advances in User Authentication, 85-145, 2017
142017
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20