Feedback

Sanjay K. Sahay

Professor

Applied Artificial Intelligence, Applied Cryptography, Blockchain Technology, Gravitational Wave, Information Security, Malware Analysis

.

Refereed Journals and Conferences: 

      1. A Novel Protocol for the Secure Communication between UAV and Ground Control Station. [Scopus]
        Authors: Ankush Soni and Sanjay K. Sahay
        Accepted, IEEE ICMSS, 2025.
      2. SATCOM-UAV: Efficient and Secure Satellite Based Communication for UAV Swarms with QUIC and TLS. [Scopus]
        Authors: Ankush Soni and Sanjay K. Sahay
        Accepted, IEEE IC3, 2025.
      3. Explainable Skin cancer Detection via Hybrid CNN and Adaptive Post-Hoc Explanations. [Scopus]
        Authors: Kushanoor Akbar and Sanjay K. Sahay
        Accepted, 10th National Conference on Computer Vision, Pattern Recognition, Image Process- ing and Graphics, Springer, CCIS 2025.
      4. AI-Driven Dermatology: Enhancing Melanoma Detection with XAI and Deep Learning. [Scopus]
        Authors: Kushanoor Akbar and Sanjay K. Sahay
        Accepted, 10th National Conference on Computer Vision, Pattern Recognition, Image Process- ing and Graphics, Springer, CCIS 2025.
      5. On the Security and Efficiency of Different Secure Hash Algorithm. [Scopus]
        Authors: Ankush Soni and Sanjay K. Sahay
        Accepted, CCNCPS, 2025
      6. Cache and Speculative Side Channel Attacks: A Comprehensive Review. [Scopus]
        Authors: Jyotiprakash Mishra, Sanjay K. Sahay and Aman Pathak
        Accepted, ICT4SD, 2025
      7. A Hardware Security Review of RISC-V. [Scopus]
        Authors: Jyotiprakash Mishra, Sanjay K. Sahay and Aman Pathak
        Accepted, ICT4SD, 2025
      8. An investigation of deep learning techniques for the robust detection of melanoma cancer. [Scopus]
        Authors: Kushanoor Akbar and Sanjay K. Sahay
        Accepted,  ICETSS, 2025
      9. A novel method for the detection of gravitational wave signal of BBH and BNS using convolutional neurals. [Scopus]
        Authors: Lokesh Kumar and Sanjay K. Sahay
        Accepted,  ICETSS, 2025
      10. Hash Based Message Authentication Code Performance with Different Secure Hash Functions. [Scopus]
        Authors: Ankush Soni, Sanjay K. Sahay and Vaishali Soni
        IEEE Xplore,  IEEE ICSC, 104-109, 2025
      11. AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3. [Core-C]
        Authors: Ankush Soni, Sanjay K. Sahay and Parit Mehta
        Springer, BROADNETS, LNICST, Vol. 601, pp. 42 - 53, 2025
      12. SEASHA3: Secure and Efficient Encryption for the IoT Data by Replacing Subkeys of AES with SHA3. [Core-B]
        Authors: Ankush Soni and Sanjay K. Sahay
        IEEE Xplore,  IEEE International Conference on Systems, Man, and Cybernetics, 2024.
      13. Gravitational wave: generation and detection techniques. [SCI-Q2]
        Authors: Saibal Ray, R. Bhattacharya, Sanjay K. Sahay, Abdul Aziz and Amit Das
        IJMPD, Vol. 33, No. 14, 2340006, 2024.
      14. An Investigation of Two-Step Cascaded CNN for the Detection of Gravitational Wave Signal from Two Different Astronomical Sources. [Scopus]
        Authors: Lokesh Kumar, Sanjay K. Sahay and Hrishikesh Govindrao Kusneniwar
        Procedia Computer Science,  Vol. 222, PP. 676 - 684, 2023.
      15. Adversarial Superiority in Android Malware Detection: Lessons from Reinforcement Learning based Evasion Attacks and Defenses. [SCI-Q1]
        Authors:  Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay and Mohit Sewak
        Forensic Science International: Digital Investigation, Vol. 44, p. 301511 , 2023.
      16. RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries. [Core-A]
        Authors: A. Nandanwar, Hemant Rathore, Sanjay K. Sahay, Mohit Sewak
        International Conference on Computational Science,  77 - 92, 2023.
      17. Defending malware detection models against evasion based adversarial attacks. [Core-A*]
        Authors: Hemant Rathore, Animesh Sasan, Sanjay K. Sahay and Mohit Sewak
        IEEE, NDSS (Poster)-2023.
      18. Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense against Metamorphic Ransomware Swarm Attack. [Core-B]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        BROADNETS,  pp. 31-50, 2023.
      19. Android Malware Detection based on Static Analysis and Data Mining Techniques: A Systematic Literature Review. [Core-B]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        BROADNETS,  pp. 51-71, 2023.
      20. MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection. [Core-B]
        Authors: Hemant Rathore, Ajay Kharat, Rashmi T, Adithya Manickavasakam, Sanjay K. Sahay and Mohit Sewak
        BROADNETS,  pp. 72-92, 2023.
      21. Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. [Core-A]
        Authors: Hemant Rathore, S. S. Iyengar, Sanjay K. Sahay
        International Conference on Computational Science, 535 - 550, 2023.
      22. Towards Adversarially Superior Malware Detection Models: An Adversary-Aware Proactive Approach using Adversarial Attacks and Defenses. [SCI-Q1]
        Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
        Information Systems Frontiers, Vol. 25, pp. 567–587, 2023.
      23. Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. [SCI-Q1]
        Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
        Information Systems Frontiers, Vol. 25, pp. 589–611, 2023.
      24. SAMPARK: Secure and Lightweight Communication Protocols for Smart Parking Management. [SCI-Q1]
        Authors:  Trupil Limbasiya, Sanjay K Sahay and Debasis Das
        Journal of Information Security and Applications, Vol. 71, p. 103381, 2022.
      25. Defending malware detection models against evasion based adversarial attacks. [SCI-Q1]
        Authors:  Hemant Rathore, Animesh Sasan, Sanjay Kumar Sahay and Mohit Sewak
        Pattern Recognition Letters, Vol. 164, pp. 119-125, 2022.
      26. Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for Malware Detection and Forensics. [SCI-Q1]
        Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
        Forensic Science International: Digital Investigation, Vol. 43, p. 301444, 2022.
      27. GreenForensics: Deep Hybrid Edge-Cloud Detection and Forensics System for Battery-Performance-Balance Conscious Devices. [SCI-Q1]
        Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
        Forensic Science International: Digital Investigation, Vol. 43, p. 301445, 2022.
      28. Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks? [ESCI]
        Authors: Hemant Rathore, Sujay C Sharma, Sanjay K. Sahay and Mohit Sewak
        EAI Endorsed Transaction on Scalable Information Systems, sis 18: e74, 2022.
      29. Are Malware Detection Models Adversarial Robust Against Evasion Attack. [Core-A*]
        Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
        IEEE, INFOCOM-2022, Conference on Computer Communications Workshops (INFOCOM-2022), 2022.
      30. X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation. [Core-A*]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, International Conference on Pervasive Computing and Communication (PerCom-2022), pp. 169-174, 2022.
      31. Adversarial Robustness of Image based Android Malware Detection Models. [Scopus]
        Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay and Mohit Sewak
        Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 3-22, 2022.
      32. Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. [Scopus]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 51-72, 2022.
      33. Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models. [Core-C]
        Authors: Jyotiprakash Mishra, Sanjay K. Sahay, Hemant Rathore and Lokesh Kumar
        IEEE, 26th IEEE Asia-Pacific Conference on Communications (APCC), pp. 161-165, 2021.
      34. Advances in Secure Knowledge Management in the Artificial Intelligence Era. [SCI-Q1]
        Authors: Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
        Information Systems Frontiers, Vol. 23, No. 4, p. 807, 2021.
      35. Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses. [SCI-Q1]
        Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
        Forensic Science International: Digital Investigation, Vol. 37, p. 301183, 2021.
      36. Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. [SCI-Q1]
        Authors: Trupil Limbasiya and Sanjay K. Sahay and Bharath Sridhar
        Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021.
      37. DRLDO: A novel DRL based De-Obfuscation System for Defense against Metamorphic Malware. [SCI-Q2]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        Defence Science Journal, Vol. 71, Issue 1, pp. 55-65, 2021.
      38. Robust Android Malware Detection System against Adversarial Attacks using Q-learning. [SCI-Q1]
        Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak
        Information Systems Frontiers, Vol. 23, No. 4, p. 867, 2021.
      39. Are CNN based Malware Detection Models Robust? Developing Superior Models using Adversarial Attack and Defense. [Core-A*]
        Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak
        ACM, Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, p. 355 - 356, 2021 .
      40. Image-based Android Malware Detection Models using Static and Dynamic Features. [Core-C]
        Authors: Hemant Rathore, B Raja Narasimhan, Sanjay K. Sahay, Mohit Sewak
        Springer, LNNS, ISDA-2021, Volume 418, pp. 1292–1305, 2022.
      41. DRo: A Data-Scarce Mechanism to Revolutionize the Performance of DL-Based Security Systems. [Core-B]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, 46th Conference on Local Computer Networks (LCN), p. 581-588, 2021.
      42. Identification of Adversarial Android Intents using Reinforcement Learning. [Core-A]
        Authors: Hemant Rathore, Piyush Nikam, Sanjay K. Sahay and Mohit Sewak
        IEEE, International Joint Conference on Neural Networks (IJCNN), 1-8, 2021.
      43. LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. [Core-A]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
      44. ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator. [Core-A]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
      45. Towards Robust Android Malware Detection Models using Adversarial Learning. [Core-A*]
        Authors:Hemant Rathore and Sanjay K. Sahay
        IEEE, International Conference on Pervasive Computing and Communications Work- shops, pp. 424 - 425, 2021.
      46. Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. [Core-A]
        Authors: Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak
        IEEE, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 29 - 32, 2021.
      47. Are Android Malware Detection Models Adversarially Robust? [Core-A*]
        Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
        ACM, 20th International Conference on Information Processing in Sensor Networks, pp. 408 - 409, 2021.
      48. Policy-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        Springer, Lecture Notes in Networks and Systems (ICTCS 2020), Vol. 191, pp. 493 - 507, 2021.
      49. Identification of Significant Permissions for Efficient Android Malware Detection. [Core-B]
        Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi and Mohit Sewak
        Springer, LNICST, Vol. 355, pp. 33-52, Proceedings BROADNETS-2020, 2021.
      50. Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. -B] [Core-B]
        Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral and Mohit Sewak
        Springer, LNICST, Vol. 355, pp. 109-128, Proceedings BROADNETS-2020, 2021.
      51. An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders. [Scopus]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        Journal of Computational and Theoretical Nanoscience, Vol. 17, No. 1, pp. 182-188, 2020.
      52. How Robust are Malware Detection Models for Android Smartphones against Adversarial Attacks? [Core-A*]
        Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
        ACM, Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys), pp. 683-684, 2020.
      53. DOOM: A Novel Adversarial-DRL-based Op-Code Level Metamorphic Malware Obfuscator for the enhancement of IDS. [Core-A*]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        ACM, Proceedings International Joint Conference on Pervasive and Ubiquitous Computing, pp. 131-134, 2020
      54. DeepIntent: ImplicitIntent Based Android IDS with E2E Deep Learning Architecture. [Core-B]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, p. 1-6, 2020
      55. Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. [Core-C]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, TENCON-2020, pp. 414-419, 2020.
      56. Value-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, 5th International Conference on Computing Communication and Automation, pp. 379-384, 2020.
      57. A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery. 
        Authors: Shriya Gupta and Sanjay K. Sahay
        Springer, International Neural Networks Society, Proceedings of the 21st Engineering Applications of Neural Networks, Vol. 2, pp. 227-239, 2020.
      58. Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture. [Scopus]
        Authors: Trupil Limbasiya and Sanjay K. Sahay
        Springer, Communications in Computer and Information Science, Proceeding SKM-2019, Vol. 1186, pp. 82-97, 2020.
      59. Secure communication protocol for smart transportation based on vehicular cloud. [Core-A*]
        Authors: Trupil Limbasiya, Debasis Das and Sanjay K Sahay
        ACM, pp. 372-376, International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019.
      60. A Survey on the Detection of Android Malicious Apps. [Scopus]
        Authors: Sanjay K. Sahay and Ashu Sharma
        Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 437-446, 2019.
      61. An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU. [Scopus]
        Authors: Sanjay K. Sahay and Mayank Chaudhari
        Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 255-262, 2019.
      62. Evolution of Malware and its Detection Techniques. [Scopus]
        Authors: Sanjay K. Sahay and Ashu Sharma
        Springer, Information and Communication Technology for Sustainable Development, Vol. 933, pp 139-150, 2019.
      63. A Survey on the Detection of Windows Desktops Malware. [Scopus]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        Springer, Ambient Communications and Computer Systems (AISC), Vol. 904, pp. 149-159, 2019.
      64. Android Malicious Application Classification Using Clustering. [Core-C]
        Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, and Mohit Sewak
        Springer, Springer, Intelligent Systems Design and Applications (AISC) Vol. 941, pp 659-667, 2019.
      65. Malware Detection using Machine Learning and Deep Learning. [Scopus]
        Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, and Mohit Sewak
        Springer, LNCS, Vol. 11297, pp. 402-411, 2018.
      66. An investigation of a deep learning based malware detection system. [Core-B]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018.
      67. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. [Core-C]
        Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
        IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018.
      68. Detection of Advanced Malware by Machine Learning Techniques. [Scopus]
        Authors: Sanjay Sharma, Rama Krishna and Sanjay K. Sahay
        Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 333-342, 2018.
      69. Categorizing Text Data using Deep Learning: A Novel Approach. [Scopus]
        Authors: R.K. Roul and Sanjay K. Sahay
        Springer Advances in Intelligent Systems and Computing, pp. 793-805, AISC Vol. 711, 2018.
      70. An investigation of the classifiers to detect Android malicious apps. [Scopus]
        Authors: Ashu Sharma and Sanjay K. Sahay
        Springer, Information and Communication Technology, 625, p. 207 - 217, 2017.
      71. Combining Apriori Approach with Support Based Count Technique to Cluster the Web Documents. [Scopus]
        Authors: R.K. Roul and Sanjay K. Sahay
        Springer, Computational Intelligence in Data Mining, Proceedings ICCIDM (2016), Vol. 556, pp 119-132, 2017.
      72. Semi-supervised Clustering using Seeded-kMeans in the Feature Space of ELM. [Scopus]
        Authors: R.K. Roul and Sanjay K. Sahay
        IEEE Xplore, DOI: 10.1109/INDICON.2016.7838892, Proceedings, India Conference (INDICON), 2016 IEEE Annual, 2017.
      73. Distributed multi-class rule based classification using RIPPER. [Core-C]
        Authors: Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay
        IEEE Xplore, 978-1-5090-4314-9/16, pp. 303 - 309, IEEE Computer Society, 2016 IEEE International Conference on Computer and Information Technology, 2017.
      74. An effective approach for classification of advanced malware with high accuracy. [Scopus]
        Authors: Ashu Sharma and Sanjay K. Sahay
        International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016.
      75. Grouping the executables to detect malware with high accuracy. [Scopus]
        Authors: Sanjay K. Sahay and Ashu Sharma
        Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016.
      76. A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data. [SCI-Q2]
        Authors: Aruna Govada and Sanjay K. Sahay
        Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016.
      77. Covariance estimation for Vertically partitioned data in a Distributed environment. [Core-C]
        Authors: Aruna Govada and Sanjay K. Sahay
        Springer, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016.
      78. Improving the detection accuracy of unknown malware by partitioning the executables in groups. [Scopus]
        Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar
        Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421-431, 2016.
      79. K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification. [Scopus]
        Authors: R.K. Roul and Sanjay K. Sahay
        Springer, LNCS, Distributed Computing and Internet Technology, Vol. 9581, p. 103, Proceedings 12th ICDCIT, 2016.
      80. Extreme Learning Machines in the field of Text Classification. [Core-C]
        Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
        IEEE Xplore, DOI: 10.1109/SNPD.2015.7176204, 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2015.
      81. Distributed Multi Class SVM for Large Data Sets. [Scopus]
        Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
        ACM Digital Library, PP. 54-58, Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015.
      82. Centroid Based Binary Tree Structured SVM for Multi Classification. [Scopus]
        Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
        IEEE Xplore, DOI: 10.1109/ICACCI.2015.7275618, Proceedings Fourth International Conference on Advances in Computing, Communications and Informatics, 2015.
      83. A Novel Modified Apriori Approach for Web Document Clustering. [Scopus]
        Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra and Sanjay K. Sahay
        Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171.
      84. Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine. [Scopus]
        Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, and Sanjay K. Sahay
        Springer, LNAI, Machine Learning and Data Mining in Pattern Recognition, Vol. 9166, p. 199; Proceedings 11th International Conference MLDM, Germany, 2015.
      85. Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach. [Scopus]
        Authors: Rajendra Kumar Roul, Sachin Joglekar and Sanjay K. Sahay
        IEEE Xplore, DOI: 10.1109/ICHPCA.2014.7045347, Proceedings, ICHPCA, 2014.
      86. On the independent points in the sky for the search of periodic gravitational wave. [SCI-Q2]
        Author: Sanjay K. Sahay
        Romanian Reports in Physics, Vol. 61, No. 2, 191, 2009.
      87. Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave. [SCI-Q2]
        Author: Sanjay K. Sahay
        International Journal of Modern Physics D, Vol. 15, No. 2, 225, 2006.
      88. Matching of the continuous gravitational wave in an all sky search.  [SCI-Q2]
        Author: Sanjay K. Sahay
        International Journal of Modern Physics D, Vol. 12, No. 7, 1227, 2003.
      89. Data analysis of continuous gravitational wave: All sky search and study of templates. [SCI-Q1]
        Authors: D.C. Srivastava and Sanjay K. Sahay
        Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 322, 2002.
      90. Data analysis of continuous gravitational wave: Fourier transform-II. [SCI-Q1]
        Authors: D.C. Srivastava and Sanjay K. Sahay
        Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 315, 2002.
      91. Data analysis of continuous gravitational wave: Fourier transform-I. [SCI-Q1]
        Authors: D.C. Srivastava and Sanjay K. Sahay
        Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 305, 2002.
      92. Group-wise classification approach to improve Android malicious apps detection accuracy.
        Authors: Ashu Sharma and Sanjay K. Sahay
        International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019.
      93. Cluster labelling using chi-square-based keyword ranking and mutual information score: A hybrid approach.
        Authors: R.K. Roul and Sanjay K. Sahay
        Inderscience, Int. J. Intelligent Systems Design and Computing, Vol. 1, No. 1/2, pp. 145 - 167, 2017.
      94. Extreme Learning Machines in the field of Text Classification.
        Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
        International Journal of Computer & Information Science, Vol. 16, No. 3, p. 34, 2015.
      95. Web Document Clustering and Ranking using Tf-Idf based Apriori Approach.
        Authors: Rajendra Roul, O.R. Devanand and Sanjay K. Sahay
        International Journal of Computer Applications , No. 2, p. 34, 2014.
      96. A Novel Approach to Distributed Multi-Class SVM.
        Authors: Aruna Govada, Shree S S. Ranjani, Aditi Viswanathan, Sanjay K. Sahay
        Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014.
      97. Evolution and Detection of Polymorphic and Metamorphic Malware: A Survey.
        Authors: Ashu Sharma and Sanjay K. Sahay
        International Journal of Computer Applications, Vol. 90, No. 2, p. 7, 2014.
      98. An effective web document clustering for information retrieval.
        Authors: R.K. Roul and Sanjay K. Sahay
        International Journal of Computer Science and Management Research, Vol. 1, No. 3, p. 481, 2012.
      99. An effective information retrieval for ambiguous query.
        Authors: R.K. Roul and Sanjay K. Sahay
        Asian Journal of Computer Science and Information Technology, Vol. 2, No. 3, p. 26, 2012.
      100. An Effective Approach for Web Document Classification using the Concept of Association Anal- ysis of Data Mining.
        Authors: R.K. Roul and Sanjay K. Sahay
        International Journal of Computer Science & Engineering Technology, Vol. 3, No. 10, p. 483, 2012.

      Books Published and Edited:

      1. Data Analysis of Gravitational Waves.
        Authors: Sanjay K. Sahay
        Publisher:  Svenska fysikarkivet, Sweden, 2008, ISBN: 978-91-85917-05-1
      2. Secure Knowledge Management In The Artificial Intelligence Era, Proceedings, 9th Internationale Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021.
        Editors: Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani and Ziming Zhao
        Publisher:  Springer, Communications in Computer and Information Science, 2022, ISBN: 978-3-030-97532-6
      3. Special issue on Advances in Secure Knowledge Management in the Artificial Intelligence Era.
        Editors: Sanjay K Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
        Publisher:  pringer, Information Systems Frontiers, 2021, ISSN: 1387-3326
      4. Secure Knowledge Management In Artificial Intelligence Era, Proceedings, 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019.
        Editors: Sanjay K. Sahay, Nihita Goel, Vishwas Patil and Murtuza Jadliwala
        Publisher:  Springer, Communications in Computer and Information Science, 2020, ISBN: 978-981-15-3816-2

      Contribution to Conferences/ArXiv:

      1. Modern Hardware Security: A Review of Attacks and Countermeasures.
        Author: Jyotiprakash Mishra and Sanjay K. Sahay
        Ref: ArXiv:2501.04394
      2. An effective distributed data mining for Astronomical Data.
        Authors: Aruna Govda and S.K. Sahay
        Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.
      3. An effective approach for web document clustering.
        Authors: R.K. Roul and S.K. Sahay
        Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.
      4. An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining.
        Author: R.K. Roul and S.K. Sahay
        Ref: arXiv:1406.5616
      5. Studies in gravitational wave data analysis.
        Author: S.K. Sahay
        Ref: arXiv:gr-qc/0209019, Ph.D Thesis
      6. Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: I.
        Authors: D.C. Srivastava and Sanjay K. Sahay
        Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.
      7. Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: II.
        Authors: D.C. Srivastava and Sanjay K. Sahay
        Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.
      8. All Sky Search for Continuous Gravitational Waves.
        Authors: D.C. Srivastava and S.K. Sahay
        21st Meeting of the Indian Association for General Relativity and Gravitation, Central India Research Institute, Nagpur, India, Jan. 30 - Feb. 01, 2001.
      9. Data Analysis of Continuous Gravitational Wave: Fourier Transform.
        Authors: D.C. Srivastava and S.K. Sahay
        20th Astronomical Society of India Meeting and National Symposium on Multiwavelength Astronomy, DDU. Gorakhpur University, Gorakhpur, India, Nov. 15 - 18, 2000.
      10. Data analysis of continuous gravitational wave signal: Fourier transform.
        Authors: D.C. Srivastava and S.K. Sahay
        Ref: arXiv:gr-qc/0009094
      11. A Study of Number of Patches in the Sky for the Pulsar Search for Gravitational Radiation. 
        Authors: D.C. Srivastava and S.K. Sahay
        Conference on Recent Developments in General Relativity and Allied Topics, Aligarh Muslim University, Aligarh, India, Aug. 30 - Sept. 01, 1999.
      12. Detection of Continuous Gravitational Waves from Rotating Rigid Newtonian Body: Pulsars. 
        Authors: D.C. Srivastava and S.K. Sahay
        20th Meeting of the Indian Association for General Relativity and Gravitation and National Symposium on Currents Trends in Gravitation and Cosmology, DDU Gorakhpur Universtiy, Gorakhpur, India, Jan. 20 - 21, 1999.