figshare
Browse

Sanjay Singh

Professor (Information and computing sciences)

Manipal, India

I have a PhD in Electronics and Communications Engineering from Manipal University. Currently I am working as Professor in the Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal, India.

Publications

  • Towards a generic framework for short term firm-specific stock forecasting
  • Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices
  • Smart card based password authentication and user anonymity scheme using ECC and steganography
  • Differential private random forest
  • Modeling and verification of fiat-shamir zero knowledge authentication protocol DOI: 10.1007/978-3-642-27308-7_6
  • Cloud based application development for accessing restaurant information on mobile device using lbs
  • Two Way Concurrent Buffer System without Deadlock in Various Time Models Using Timed Automata ISSN: 2150-7988
  • Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS) DOI: 10.1109/indcon.2013.6726055
  • Stock market prediction accuracy analysis using kappa measure DOI: 10.1109/CSNT.2013.136
  • Ownership authentication transfer protocol for ubiquitous computing devices DOI: 10.1109/ICCCI.2013.6466133
  • Optimal neural network architecture for stock market forecasting DOI: 10.1109/CSNT.2013.120
  • Intrusion Detection in Zero Knowledge System Using Model Checking Approach DOI: 10.1007/978-1-4614-6154-8_45
  • Detection of User Cluster with Suspicious Activity in Online Social Networking Sites DOI: 10.1109/ADCONS.2013.17
  • Detection and filtering of collaborative malicious users in reputation system using quality repository approach DOI: 10.1109/ICACCI.2013.6637216
  • Contextual information based recommender system using Singular Value Decomposition DOI: 10.1109/ICACCI.2013.6637502
  • Aware-BDI: An extension of the BDI model incorporating situational awareness DOI: 10.1109/CSNT.2013.30
  • Alert-BDI: BDI model with adaptive alertness through situational awareness DOI: 10.1109/ICACCI.2013.6637212
  • Web opinion mining for social networking sites DOI: 10.1145/2393216.2393316
  • Symbolic verification of web crawler functionality and its properties DOI: 10.1109/ICCCI.2012.6158649
  • Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication DOI: 10.1109/INNOVATIONS.2012.6207712
  • Modeling two way concurrent buffer system using timed automata in UPPAAL DOI: 10.1109/WICT.2012.6409193
  • Modeling and Verification of Sliding Window Protocol with Data Loss and Intruder Detection using NuSMV
  • Modeling and Verification of Extensible Authentication Protocol using SPIN Model Checker DOI: 10.5121/ijnsa.2012.4606
  • Modeling and verification of agent based adaptive traffic signal using symbolic model verifier ISSN: 0975 - 8887
  • Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV DOI: 10.1145/2393216.2393276
  • Formal verification of the extensible authentication protocol using SPIN DOI: 10.1145/2393216.2393278
  • Erroneous state detection in piecewise FIFO system DOI: 10.1109/WICT.2012.6409192
  • Enhanced mining association rule algorithm with reduced time & space complexity DOI: 10.1109/INDCON.2012.6420782
  • Differentiated QoS with Modified C/I based scheduling algorithm DOI: 10.1109/WICT.2012.6409191
  • Design and development of a desktop monitoring system DOI: 10.1145/2393216.2393319
  • Decoding robustness performance comparison for QR and data matrix code DOI: 10.1145/2393216.2393337
  • Symbolic verification of a strength based multi-agent argumentation scheme
  • Physical layer authentication in wired and wireless communication systems DOI: 10.1007/978-3-642-24055-3_30
  • Modeling and verification of server aided verification protocol using NuSMV DOI: 10.1007/978-3-642-24043-0_49
  • Modeling and verification of kerberos protocol using symbolic model verifier DOI: 10.1109/CSNT.2011.140
  • Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier DOI: 10.1007/978-3-642-24043-0_50
  • Modeling and verification of chess game using NuSMV DOI: 10.1007/978-3-642-22714-1_47
  • Modeling and verifcation of inter realm authentication in kerberos using symbolic model verifier DOI: 10.1007/978-3-642-24043-0_50
  • Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV DOI: 10.1007/978-3-642-17857-3_38
  • Formal verification of OAuth 2.0 using alloy framework DOI: 10.1109/CSNT.2011.141
  • Cloud based application development for mobile devices for accessing LBS DOI: 10.1007/978-3-642-24037-9_53
  • Securing location privacy in augmented reality DOI: 10.1109/ICIINFS.2010.5578714
  • Protecting location privacy in augmented reality using k-anonymization and pseudo-id DOI: 10.1109/ICCCT.2010.5640424
  • Performance analysis of error control coding techniques for peak-to-average power ratio reduction of multicarrier signals
  • Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV DOI: 10.1109/ICCCT.2010.5640425
  • Model checking message exchange in location based services DOI: 10.1109/ICCCT.2010.5640417
  • Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking DOI: 10.1109/ICIINFS.2010.5578694
  • A generalized closed form relation for BER of QPSK/M-QAM over fading channel DOI: 10.1109/ICIINFS.2010.5578716
  • Reduction of peak-to-average ratio of an ofdm signal using scrambling coding
  • Providing confidentiality to nemo in an efficient way using session key generation
  • Peak-to-average power ratio reduction performance comparision of golay and reed-muller coded ofdm signal
  • Effect of peak-to-average power ratio reduction on the multicarrier communication systems performance parameters
  • Design and development of an online voting system
  • A performance comparison of golay and reed-muller coded ofdm signal for peak-to-average power ratio reduction
  • Peak-to-average power ratio reduction of an ofdm signal using scrambling coding
  • PAPR reduction of multicarrier signal using error control coding techniques
  • Multicarrier modulation system and its challenges
  • Mobile device based social networking application
  • Wavelet based acoustic measures for pathological voice analysis
  • Is Stack Overflow Overflowing With Questions and Tags DOI: http://dx.doi.org/10.1145/2791405.2791537
  • Is That Twitter Hashtag Worth Reading DOI: http://dx.doi.org/10.1145/2791405.2791526
  • Stock market prediction accuracy analysis using kappa measure DOI: 10.1109/CSNT.2013.136
  • Ownership authentication transfer protocol for ubiquitous computing devices DOI: 10.1109/ICCCI.2013.6466133
  • Optimal neural network architecture for stock market forecasting DOI: 10.1109/CSNT.2013.120
  • Aware-BDI: An extension of the BDI model incorporating situational awareness DOI: 10.1109/CSNT.2013.30
  • Web opinion mining for social networking sites DOI: 10.1145/2393216.2393316
  • Symbolic verification of web crawler functionality and its properties DOI: 10.1109/ICCCI.2012.6158649
  • Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication DOI: 10.1109/INNOVATIONS.2012.6207712
  • Modeling two way concurrent buffer system using timed automata in UPPAAL DOI: 10.1109/WICT.2012.6409193
  • Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV DOI: 10.1145/2393216.2393276
  • Formal verification of the extensible authentication protocol using SPIN DOI: 10.1145/2393216.2393278
  • Erroneous state detection in piecewise FIFO system DOI: 10.1109/WICT.2012.6409192
  • Enhanced mining association rule algorithm with reduced time & space complexity DOI: 10.1109/INDCON.2012.6420782
  • Differentiated QoS with Modified C/I based scheduling algorithm DOI: 10.1109/WICT.2012.6409191
  • Design and development of a desktop monitoring system DOI: 10.1145/2393216.2393319
  • Decoding robustness performance comparison for QR and data matrix code DOI: 10.1145/2393216.2393337
  • Physical layer authentication in wired and wireless communication systems DOI: 10.1007/978-3-642-24055-3_30
  • Modeling and verification of server aided verification protocol using NuSMV DOI: 10.1007/978-3-642-24043-0_49
  • Modeling and verification of kerberos protocol using symbolic model verifier DOI: 10.1109/CSNT.2011.140
  • Modeling and verification of chess game using NuSMV DOI: 10.1007/978-3-642-22714-1_47
  • Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV DOI: 10.1007/978-3-642-17857-3_38
  • Formal verification of OAuth 2.0 using alloy framework DOI: 10.1109/CSNT.2011.141
  • Cloud based application development for mobile devices for accessing LBS DOI: 10.1007/978-3-642-24037-9_53
  • Securing location privacy in augmented reality DOI: 10.1109/ICIINFS.2010.5578714
  • Protecting location privacy in augmented reality using k-anonymization and pseudo-id DOI: 10.1109/ICCCT.2010.5640424
  • Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV DOI: 10.1109/ICCCT.2010.5640425
  • Model checking message exchange in location based services DOI: 10.1109/ICCCT.2010.5640417
  • Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking DOI: 10.1109/ICIINFS.2010.5578694
  • A generalized closed form relation for BER of QPSK/M-QAM over fading channel DOI: 10.1109/ICIINFS.2010.5578716

Sanjay Singh's public data