- Gravitational wave: generation and detection techniques. [SCI-Q2]
Authors: Saibal Ray, R. Bhattacharya, Sanjay K. Sahay, Abdul Aziz and Amit Das
IJMPD, Vol. 33, No. 14, 2340006, 2024
-
An Investigation of Two-Step Cascaded CNN for the Detection of Gravitational Wave Signal from Two Different Astronomical Sources. [Scopus]
Authors: Lokesh Kumar, Sanjay K. Sahay and Hrishikesh Govindrao Kusneniwar
Procedia Computer Science, Vol. 222, PP. 676 - 684, 2023.
-
Adversarial Superiority in Android Malware Detection: Lessons from Reinforcement Learning based Evasion Attacks and Defenses. [SCI-Q1]
Authors: Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay and Mohit Sewak
Forensic Science International: Digital Investigation, Vol. 44, p. 301511 , 2023.
-
SAMPARK: Secure and Lightweight Communication Protocols for Smart Parking Management. [SCI-Q1]
Authors: Trupil Limbasiya, Sanjay K Sahay and Debasis Das
Journal of Information Security and Applications, Vol. 71, p. 103381, 2022.
-
Defending malware detection models against evasion based adversarial attacks. [SCI-Q1]
Authors: Hemant Rathore, Animesh Sasan, Sanjay Kumar Sahay and Mohit Sewak
Pattern Recognition Letters, Vol. 164, pp. 119-125, 2022.
-
Towards Adversarially Superior Malware Detection Models: An Adversary-Aware Proactive Approach using Adversarial Attacks and Defenses. [SCI-Q1]
Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
Information Systems Frontiers, Vol. 25, pp. 567–587, 2023.
-
Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. [SCI-Q1]
Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
Information Systems Frontiers, Vol. 25, pp. 589–611, 2023.
-
Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for Malware Detection and Forensics. [SCI-Q1]
Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
Forensic Science International: Digital Investigation, Vol. 43, p. 301444, 2022.
-
GreenForensics: Deep Hybrid Edge-Cloud Detection and Forensics System for Battery-Performance-Balance Conscious Devices. [SCI-Q1]
Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
Forensic Science International: Digital Investigation, Vol. 43, p. 301445, 2022.
-
Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks? [ESCI]
Authors: Hemant Rathore, Sujay C Sharma, Sanjay K. Sahay and Mohit Sewak
EAI Endorsed Transaction on Scalable Information Systems, sis 18: e74, 2022.
-
Advances in Secure Knowledge Management in the Artificial Intelligence Era. [SCI-Q1]
Authors: Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
Information Systems Frontiers, Vol. 23, No. 4, p. 807, 2021.
-
Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses. [SCI-Q1]
Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
Forensic Science International: Digital Investigation, Vol. 37, p. 301183, 2021.
-
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. [SCI-Q1]
Authors: Trupil Limbasiya and Sanjay K. Sahay and Bharath Sridhar
Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021.
-
DRLDO: A novel DRL based De-Obfuscation System for Defense against Metamorphic Malware. [SCI-Q2]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
Defence Science Journal, Vol. 71, Issue 1, pp. 55-65, 2021.
-
Robust Android Malware Detection System against Adversarial Attacks using Q-learning. [SCI-Q1]
Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak
Information Systems Frontiers, Vol. 23, No. 4, p. 867, 2021.
-
An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders. [Scopus]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
Journal of Computational and Theoretical Nanoscience, Vol. 17, No. 1, pp. 182-188, 2020.
-
An effective approach for classification of advanced malware with high accuracy. [Scopus]
Authors: Ashu Sharma and Sanjay K. Sahay
International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016.
-
Grouping the executables to detect malware with high accuracy. [Scopus]
Authors: Sanjay K. Sahay and Ashu Sharma
Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016.
-
A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data. [SCI-Q2]
Authors: Aruna Govada and Sanjay K. Sahay
Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016.
-
On the independent points in the sky for the search of periodic gravitational wave. [SCI-Q2]
Author: Sanjay K. Sahay
Romanian Reports in Physics, Vol. 61, No. 2, 191, 2009.
-
Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave. [SCI-Q2]
Author: Sanjay K. Sahay
International Journal of Modern Physics D, Vol. 15, No. 2, 225, 2006.
-
Matching of the continuous gravitational wave in an all sky search. [SCI-Q2]
Author: Sanjay K. Sahay
International Journal of Modern Physics D, Vol. 12, No. 7, 1227, 2003.
-
Data analysis of continuous gravitational wave: All sky search and study of templates. [SCI-Q1]
Authors: D.C. Srivastava and Sanjay K. Sahay
Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 322, 2002.
-
Data analysis of continuous gravitational wave: Fourier transform-II. [SCI-Q1]
Authors: D.C. Srivastava and Sanjay K. Sahay
Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 315, 2002.
-
Data analysis of continuous gravitational wave: Fourier transform-I. [SCI-Q1]
Authors: D.C. Srivastava and Sanjay K. Sahay
Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 305, 2002.
-
Group-wise classification approach to improve Android malicious apps detection accuracy.
Authors: Ashu Sharma and Sanjay K. Sahay
International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019.
-
Cluster labelling using chi-square-based keyword ranking and mutual information score: A hybrid approach.
Authors: R.K. Roul and Sanjay K. Sahay
Inderscience, Int. J. Intelligent Systems Design and Computing, Vol. 1, No. 1/2, pp. 145 - 167, 2017.
-
Extreme Learning Machines in the field of Text Classification.
Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
International Journal of Computer & Information Science, Vol. 16, No. 3, p. 34, 2015.
-
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach.
Authors: Rajendra Roul, O.R. Devanand and Sanjay K. Sahay
International Journal of Computer Applications , No. 2, p. 34, 2014.
-
A Novel Approach to Distributed Multi-Class SVM.
Authors: Aruna Govada, Shree S S. Ranjani, Aditi Viswanathan, Sanjay K. Sahay
Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014.
-
Evolution and Detection of Polymorphic and Metamorphic Malware: A Survey.
Authors: Ashu Sharma and Sanjay K. Sahay
International Journal of Computer Applications, Vol. 90, No. 2, p. 7, 2014.
-
An effective web document clustering for information retrieval.
Authors: R.K. Roul and Sanjay K. Sahay
International Journal of Computer Science and Management Research, Vol. 1, No. 3, p. 481, 2012.
-
An effective information retrieval for ambiguous query.
Authors: R.K. Roul and Sanjay K. Sahay
Asian Journal of Computer Science and Information Technology, Vol. 2, No. 3, p. 26, 2012.
-
An Effective Approach for Web Document Classification using the Concept of Association Anal- ysis of Data Mining.
Authors: R.K. Roul and Sanjay K. Sahay
International Journal of Computer Science & Engineering Technology, Vol. 3, No. 10, p. 483, 2012.
-
On the Security and Efficiency of Different Secure Hash Algorithm. [Scopus]
Authors: Ankush Soni and Sanjay K. Sahay
Accepted, CCNCPS, 2025
-
Cache and Speculative Side Channel Attacks: A Comprehensive Review. [Scopus]
Authors: Jyotiprakash Mishra, Sanjay K. Sahay and Aman Pathak
Accepted, ICT4SD, 2025
-
A Hardware Security Review of RISC-V. [Scopus]
Authors: Jyotiprakash Mishra, Sanjay K. Sahay and Aman Pathak
Accepted, ICT4SD, 2025
-
An investigation of deep learning techniques for the robust detection of melanoma cancer. [Scopus]
Authors: Kushanoor Akbar and Sanjay K. Sahay
Accepted, ICETSS, 2025
-
A novel method for the detection of gravitational wave signal of BBH and BNS using convolutional neurals. [Scopus]
Authors: Lokesh Kumar and Sanjay K. Sahay
Accepted, ICETSS, 2025
-
Hash Based Message Authentication Code Performance with Different Secure Hash Functions. [Scopus]
Authors: Ankush Soni, Sanjay K. Sahay and Vaishali Soni
IEEE Xplore, IEEE ICSC, 104-109, 2025
-
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3. [Core-C]
Authors: Ankush Soni, Sanjay K. Sahay and Parit Mehta
Springer, BROADNETS, LNICST, Vol. 601, pp. 42 - 53, 2005
-
SEASHA3: Secure and Efficient Encryption for the IoT Data by Replacing Subkeys of AES with SHA3. [Core-B]
Authors: Ankush Soni and Sanjay K. Sahay
IEEE Xplore, IEEE International Conference on Systems, Man, and Cybernetics, 2024
-
Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. [Core-A]
Authors: Hemant Rathore, S. S. Iyengar, Sanjay K. Sahay
International Conference on Computational Science, 535 - 550, 2023.
-
RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries. [Core-A]
Authors: A. Nandanwar, Hemant Rathore, Sanjay K. Sahay, Mohit Sewak
International Conference on Computational Science, 77 - 92, 2023.
-
Defending malware detection models against evasion based adversarial attacks. [Core-A*]
Authors: Hemant Rathore, Animesh Sasan, Sanjay K. Sahay and Mohit Sewak
IEEE, NDSS (Poster)-2023.
-
Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense against Metamorphic Ransomware Swarm Attack. [Core-B]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
BROADNETS, pp. 31-50, 2023.
-
Android Malware Detection based on Static Analysis and Data Mining Techniques: A Systematic Literature Review. [Core-B]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
BROADNETS, pp. 51-71, 2023.
-
MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection. [Core-B]
Authors: Hemant Rathore, Ajay Kharat, Rashmi T, Adithya Manickavasakam, Sanjay K. Sahay and Mohit Sewak
BROADNETS, pp. 72-92, 2023.
-
Are Malware Detection Models Adversarial Robust Against Evasion Attack. [Core-A*]
Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
IEEE, INFOCOM-2022, Conference on Computer Communications Workshops (INFOCOM-2022), 2022.
-
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation. [Core-A*]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, International Conference on Pervasive Computing and Communication (PerCom-2022), pp. 169-174, 2022.
-
Image-based Android Malware Detection Models using Static and Dynamic Features. [Core-C]
Authors: Hemant Rathore, B Raja Narasimhan, Sanjay K. Sahay, Mohit Sewak
Springer, LNNS, ISDA-2021, Volume 418, pp. 1292–1305, 2022.
-
Are CNN based Malware Detection Models Robust? Developing Superior Models using Adversarial Attack and Defense. [Core-A*]
Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak
ACM, Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, p. 355 - 356, 2021 .
-
Adversarial Robustness of Image based Android Malware Detection Models. [Scopus]
Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay and Mohit Sewak
Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 3-22, 2022.
-
Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models. [Core-C]
Authors: Jyotiprakash Mishra, Sanjay K. Sahay, Hemant Rathore and Lokesh Kumar
IEEE, 26th IEEE Asia-Pacific Conference on Communications (APCC), pp. 161-165, 2021.
-
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. [Scopus]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 51-72, 2022.
-
DRo: A Data-Scarce Mechanism to Revolutionize the Performance of DL-Based Security Systems. [Core-B]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, 46th Conference on Local Computer Networks (LCN), p. 581-588, 2021.
-
Identification of Adversarial Android Intents using Reinforcement Learning. [Core-A]
Authors: Hemant Rathore, Piyush Nikam, Sanjay K. Sahay and Mohit Sewak
IEEE, International Joint Conference on Neural Networks (IJCNN), 1-8, 2021.
-
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. [Core-A]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
-
ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator. [Core-A]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
-
Towards Robust Android Malware Detection Models using Adversarial Learning. [Core-A*]
Authors:Hemant Rathore and Sanjay K. Sahay
IEEE, International Conference on Pervasive Computing and Communications Work- shops, pp. 424 - 425, 2021.
-
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. [Core-A]
Authors: Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak
IEEE, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 29 - 32, 2021.
-
Are Android Malware Detection Models Adversarially Robust? [Core-A*]
Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
ACM, 20th International Conference on Information Processing in Sensor Networks, pp. 408 - 409, 2021.
-
Policy-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
Springer, Lecture Notes in Networks and Systems (ICTCS 2020), Vol. 191, pp. 493 - 507, 2021.
-
Identification of Significant Permissions for Efficient Android Malware Detection. [Core-B]
Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi and Mohit Sewak
Springer, LNICST, Vol. 355, pp. 33-52, Proceedings BROADNETS-2020, 2021.
-
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. -B] [Core-B]
Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral and Mohit Sewak
Springer, LNICST, Vol. 355, pp. 109-128, Proceedings BROADNETS-2020, 2021.
-
How Robust are Malware Detection Models for Android Smartphones against Adversarial Attacks? [Core-A*]
Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
ACM, Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys), pp. 683-684, 2020.
-
DOOM: A Novel Adversarial-DRL-based Op-Code Level Metamorphic Malware Obfuscator for the enhancement of IDS. [Core-A*]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
ACM, Proceedings International Joint Conference on Pervasive and Ubiquitous Computing, pp. 131-134, 2020
-
DeepIntent: ImplicitIntent Based Android IDS with E2E Deep Learning Architecture. [Core-B]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, p. 1-6, 2020
-
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. [Core-C]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, TENCON-2020, pp. 414-419, 2020.
-
Value-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, 5th International Conference on Computing Communication and Automation, pp. 379-384, 2020.
-
A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery.
Authors: Shriya Gupta and Sanjay K. Sahay
Springer, International Neural Networks Society, Proceedings of the 21st Engineering Applications of Neural Networks, Vol. 2, pp. 227-239, 2020.
-
Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture. [Scopus]
Authors: Trupil Limbasiya and Sanjay K. Sahay
Springer, Communications in Computer and Information Science, Proceeding SKM-2019, Vol. 1186, pp. 82-97, 2020.
-
Secure communication protocol for smart transportation based on vehicular cloud. [Core-A*]
Authors: Trupil Limbasiya, Debasis Das and Sanjay K Sahay
ACM, pp. 372-376, International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019.
-
A Survey on the Detection of Android Malicious Apps. [Scopus]
Authors: Sanjay K. Sahay and Ashu Sharma
Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 437-446, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.
-
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU. [Scopus]
Authors: Sanjay K. Sahay and Mayank Chaudhari
Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 255-262, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.
-
Evolution of Malware and its Detection Techniques. [Scopus]
Authors: Sanjay K. Sahay and Ashu Sharma
Springer, Information and Communication Technology for Sustainable Development, Vol. 933, pp 139-150, 2019, Proceedings ICT4SD, 2018.
-
A Survey on the Detection of Windows Desktops Malware. [Scopus]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
Springer, Ambient Communications and Computer Systems (AISC), Vol. 904, pp. 149-159, 2019, Proceedings RACCCS, 2018.
-
Android Malicious Application Classification Using Clustering. [Core-C]
Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, and Mohit Sewak
Springer, Springer, Intelligent Systems Design and Applications (AISC) Vol. 941, pp 659-667, 2019, Proceedings ISDA, 2018. .
-
Malware Detection using Machine Learning and Deep Learning. [Scopus]
Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, and Mohit Sewak
Springer, LNCS, Vol. 11297, pp. 402-411, 2018, Proceedings BDA-2018.
-
An investigation of a deep learning based malware detection system. [Core-B]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany.
-
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. [Core-C]
Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018.
-
Detection of Advanced Malware by Machine Learning Techniques. [Scopus]
Authors: Sanjay Sharma, Rama Krishna and Sanjay K. Sahay
Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 333-342, 2018, Proceedings Soft Computing: Theories and Applications (2017).
-
Categorizing Text Data using Deep Learning: A Novel Approach. [Scopus]
Authors: R.K. Roul and Sanjay K. Sahay
Springer Advances in Intelligent Systems and Computing, pp. 793-805, AISC Vol. 711, 2018, Proceedings ICCIDM-2017.
-
An investigation of the classifiers to detect Android malicious apps. [Scopus]
Authors: Ashu Sharma and Sanjay K. Sahay
Springer, Information and Communication Technology, 625, p. 207 - 217, 2017, Proceedings, ICICT, 2016.
-
Distributed multi-class rule based classification using RIPPER. [Core-C]
Authors: Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay
IEEE Xplore, 978-1-5090-4314-9/16, pp. 303 - 309, IEEE Computer Society, 2016 IEEE International Conference on Computer and Information Technology, 2017.
-
Semi-supervised Clustering using Seeded-kMeans in the Feature Space of ELM. [Scopus]
Authors: R.K. Roul and Sanjay K. Sahay
IEEE Xplore, DOI: 10.1109/INDICON.2016.7838892, Proceedings, India Conference (INDICON), 2016 IEEE Annual, 2017.
-
Combining Apriori Approach with Support Based Count Technique to Cluster the Web Documents. [Scopus]
Authors: R.K. Roul and Sanjay K. Sahay
Springer, Computational Intelligence in Data Mining, Proceedings ICCIDM (2016), Vol. 556, pp 119-132, 2017.
-
Covariance estimation for Vertically partitioned data in a Distributed environment. [Core-C]
Authors: Aruna Govada and Sanjay K. Sahay
Springer, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016.
Proceedings, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016.
-
Improving the detection accuracy of unknown malware by partitioning the executables in groups. [Scopus]
Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar
Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421-431, 2016; Proceedings 9th ICACCT, 2015.
-
K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification. [Scopus]
Authors: R.K. Roul and Sanjay K. Sahay
Springer, LNCS, Distributed Computing and Internet Technology, Vol. 9581, p. 103, Proceedings 12th ICDCIT, 2016.
-
Extreme Learning Machines in the field of Text Classification. [Core-C]
Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
IEEE Xplore, DOI: 10.1109/SNPD.2015.7176204, Proceedings 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2015), Japan.
-
Distributed Multi Class SVM for Large Data Sets. [Scopus]
Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
ACM Digital Library, PP. 54-58, Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015.
-
Centroid Based Binary Tree Structured SVM for Multi Classification. [Scopus]
Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
IEEE Xplore, DOI: 10.1109/ICACCI.2015.7275618, Proceedings Fourth International Conference on Advances in Computing, Communications and Informatics, 2015.
-
Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine. [Scopus]
Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, and Sanjay K. Sahay
Springer, LNAI, Machine Learning and Data Mining in Pattern Recognition, Vol. 9166, p. 199; Proceedings 11th International Conference MLDM, Germany, 2015.
-
Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach. [Scopus]
Authors: Rajendra Kumar Roul, Sachin Joglekar and Sanjay K. Sahay
IEEE Xplore, DOI: 10.1109/ICHPCA.2014.7045347, Proceedings, ICHPCA, 2014.
-
A Novel Modified Apriori Approach for Web Document Clustering. [Scopus]
Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra and Sanjay K. Sahay
Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings ICCIDM, 2014.