Follow
Satyabrata Roy
Satyabrata Roy
Manipal University Jaipur
Verified email at jaipur.manipal.edu
Title
Cited by
Cited by
Year
Anomaly based network intrusion detection for IoT attacks using deep learning technique
B Sharma, L Sharma, C Lal, S Roy
Computers and Electrical Engineering 107, 108626, 2023
572023
A lightweight cellular automata based encryption technique for IoT applications
S Roy, U Rawat, J Karjee
IEEE Access 7, 39782-39793, 2019
542019
IEHC: An efficient image encryption technique using hybrid chaotic map
K Kumar, S Roy, U Rawat, S Malhotra
Chaos, Solitons & Fractals 158, 111994, 2022
502022
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata
S Roy, M Shrivastava, CV Pandey, SK Nayak, U Rawat
Multimedia Tools and Applications 80, 31529-31567, 2021
452021
Symmetric key encryption technique: a cellular automata based approach in wireless sensor networks
S Roy, J Karjee, US Rawat, N Dey
Procedia Computer Science 78, 408-414, 2016
442016
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
S Roy, U Rawat, HA Sareen, SK Nayak
Journal of Ambient Intelligence and Humanized Computing 11, 5083-5102, 2020
412020
Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system
S Nandi, S Roy, J Dansana, WBA Karaa, R Ray, SR Chowdhury, ...
International Journal of Computer Network and Information Security 6 (11), 1, 2014
362014
IESCA: An efficient image encryption scheme using 2-D cellular automata
S Roy, M Shrivastava, U Rawat, CV Pandey, SK Nayak
Journal of Information Security and Applications 61, 102919, 2021
352021
Application of cellular automata in symmetric key cryptography
S Roy, S Nandi, J Dansana, PK Pattnaik
2014 International Conference on Communication and Signal Processing, 572-576, 2014
332014
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach
B Sharma, L Sharma, C Lal, S Roy
Expert Systems with Applications 238, 121751, 2024
292024
1-D group cellular automata based image encryption technique
S Nandi, S Roy, S Nath, S Chakraborty, WBA Karaa, N Dey
2014 International Conference on Control, Instrumentation, Communication and …, 2014
262014
Scrapnet: An efficient approach to trash classification
A Masand, S Chauhan, M Jangid, R Kumar, S Roy
IEEE access 9, 130947-130958, 2021
242021
Symmetric key encryption technique: A cellular automata based approach
D Parashar, S Roy, N Dey, V Jain, US Rawat
Cyber Security: Proceedings of CSI 2015, 59-67, 2018
142018
LICCA: a lightweight image cipher using 3-D cellular automata
M Shrivastava, S Roy, K Kumar, CV Pandey, J Grover
Nonlinear Dynamics 106, 2679-2702, 2021
102021
IETD: a novel image encryption technique using Tinkerbell map and Duffing map for IoT applications
TA Dhopavkar, SK Nayak, S Roy
Multimedia Tools and Applications 81 (30), 43189-43228, 2022
82022
A novel cryptosystem using cellular automata
S Roy, N Bhatia, US Rawat
International Conference on Communication and Signal Processing, 1781-1785, 2018
72018
A novel symmetric key encryption technique using Cellular Automata
D Parashar, S Roy, V Jain
2015 International Conference on Green Computing and Internet of Things …, 2015
72015
A siamese neural network-based face recognition from masked faces
R Chatterjee, S Roy, S Roy
International Conference on Advanced Network Technologies and Intelligent …, 2021
52021
An efficient image encryption technique using Logistic map and 2D-TCLM
K Kumar, S Roy, U Rawat, I Mishra
International Conference on Cyber Warfare, Security and Space Research, 87-96, 2021
32021
An efficient technique to access cryptographic file system over network file system
U Rawat, S Roy, S Acharya, K Kumar
Innovations in Computational Intelligence and Computer Vision: Proceedings …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20