Follow
Jyotsna Kumar Mandal
Jyotsna Kumar Mandal
Professor of Computer Science & Engineering, Kalyani University
Verified email at klyuniv.ac.in - Homepage
Title
Cited by
Cited by
Year
A genetic algorithm (ga) based load balancing strategy for cloud computing
K Dasgupta, B Mandal, P Dutta, JK Mandal, S Dam
Procedia Technology 10, 340-347, 2013
4162013
Hash based least significant bit technique for video steganography (HLSB)
K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012
1252012
Incorporating nonlinearities of measurement function in power system dynamic state estimation
JK Mandal, AK Sinha, L Roy
IEE Proceedings-Generation, Transmission and Distribution 142 (3), 289-296, 1995
1171995
Colour image steganography based on pixel value differencing in spatial domain
JK Mandal, D Das
International journal of information sciences and techniques 2 (4), 2012
1102012
Computational Intelligence, Communications, and Business Analytics [electronic resource]: First International Conference, CICBA 2017, Kolkata, India, March 24–25, 2017, Revised …
JK Mandal, P Dutta, S Mukhopadhyay
Singapore: Springer Singapore: Imprint: Springer, 2017., 2017
88*2017
QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack
RK Bar, JK Mandal, MM Singh
Procedia Technology 10, 530-537, 2013
762013
A novel secure image steganography method based on chaos theory in spatial domain
D Bandyopadhyay, K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 3 …, 2014
732014
Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow
JK Mandal, D Das
arXiv preprint arXiv:1205.6775, 2012
622012
Computational intelligence in data mining-volume
LC Jain, HS Behera, JK Mandal, DP Mohapatra
Proceedings of the International Conference on CIDM 20, 21, 2014
612014
Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2
JK Mandal, SC Satapathy, MK Sanyal, PP Sarkar, A Mukhopadhyay
Springer India, 2015
562015
A genetic algorithm based steganography using discrete cosine transformation (GASDCT)
A Khamrui, JK Mandal
Procedia Technology 10, 105-111, 2013
562013
A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT)
N Ghoshal, JK Mandal
Malaysian Journal of Computer Science 21 (1), 24-32, 2008
542008
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
432018
Wavelet based denoising of medical images using sub-band adaptive thresholding through genetic algorithm
S Mukhopadhyay, JK Mandal
Procedia Technology 10, 680-689, 2013
422013
Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC)
JK Mandal, M Sengupta
2010 International Symposium on Electronic System Design, 225-229, 2010
412010
Steganographic technique based on minimum deviation of fidelity (STMDF)
JK Mandal, M Sengupta
2011 Second International Conference on Emerging Applications of Information …, 2011
402011
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of Information Security and Applications 19 (4-5), 272-281, 2014
382014
Activity recognition system using inbuilt sensors of smart mobile phone and minimizing feature vectors
D Acharjee, A Mukherjee, JK Mandal, N Mukherjee
Microsystem Technologies 22 (11), 2715-2722, 2016
362016
Hierarchical dynamic state estimator using ANN-based dynamic load prediction
AK Sinha, JK Mandal
IEE Proceedings-Generation, Transmission and Distribution 146 (6), 541-549, 1999
351999
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection
NB Singh, MM Singh, A Sarkar, JK Mandal
Journal of Information Security and Applications 61, 102899, 2021
332021
The system can't perform the operation now. Try again later.
Articles 1–20