Follow
Dr. Arunava Roy
Dr. Arunava Roy
Research Assistant Prof., Dept. of CS, The University of Memphis, USA
Verified email at memphis.edu
Title
Cited by
Cited by
Year
Emerging trends, techniques and open issues of containerization: A review
J Watada, A Roy, R Kadikar, H Pham, B Xu
IEEE Access 7, 152443-152472, 2019
1132019
Toward the design of adaptive selection strategies for multi-factor authentication
D Dasgupta, A Roy, A Nag
Computers & Security (Elsevier) 63, 85-116;, 2016
952016
Advances in User Authentication
D Dasgupta, A Roy, A Nag
Book; Springer, 2017
942017
Multi-factor authentication: more secure approach towards authenticating individuals
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag
Advances in User Authentication, 185-233, 2017
842017
In object detection deep learning methods, YOLO shows supremum to Mask R-CNN
S Shahriar, W Junzo, R Anurava, DRA Rambli
Journal of Physics: Conference Series; https://iopscience.iop.org/article/10 …, 2020
592020
A structure-based software reliability allocation using fuzzy analytic hierarchy process
S Chatterjee, JB Singh, A Roy
International Journal of Systems Science (Taylor & Francis) 46 (3), 513-525 …, 2015
432015
Adaptive multi-factor authentication system
D Dasgupta, AK Nag, A Roy
US Patent 9,912,657, 2018
292018
A reinforcement learning algorithm for automated detection of skin lesions
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Applied Sciences 11 (20), 9367, 2021
272021
An Adaptive Approach Towards the Selection of Multi-Factor Authentication
AK Nag, A Roy, D Dasgupta
Computational Intelligence, 2015 IEEE Symposium Series on, 463 - 472, 2015
252015
Software Fault Prediction using Neuro-Fuzzy Network and Evolutionary Learning Approach
C Subhashis, N Shobhit, A Roy
Neural Computing and Applications (Springer), 1-11; Impact Factor: 2.505, 2016
24*2016
Multi-user Permission Strategy to Access Sensitive Information
D Dasgupta, A Roy, D Ghosh
Information Sciences 423, 24-49, 2017
22*2017
Insights from curve fitting models in mouse dynamics authentication systems
YXM Tan, A Binder, A Roy
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
212017
Novel algorithms for web software fault prediction
S Chatterjee, A Roy
Quality and Reliability Engineering International (Wiley) 31 (8), 1517-1535 …, 2015
212015
Particle swarm optimization with deep learning for human action recognition
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021
182021
Enhanced reinforcement learning model for extraction of objects in complex imaging
UA Usmani, A Roy, J Watada, J Jaafar, IA Aziz
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2022
162022
A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction
A Roy
Soft Computing (Springer) 20 (5), 1991-2019; Impact Factor 2.472, 2016
162016
A reinforced active learning algorithm for semantic segmentation in complex imaging
UA usmani, J Watada, J Jaafar, IA Aziz, A Roy
IEEE Access, 2021
142021
A reinforcement learning based adaptive ROI generation for video object segmentation
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
IEEE Access 9, 161959-161977, 2021
142021
An artificial bee colony-based double layered neural network approach for solving quadratic bi-level programming problems
J Watada, A Roy, B Wang, SC Tan, B Xu
IEEE Access 8, 21549-21564, 2020
142020
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
S Bhattacharjee, L Rahim, J Watada, A Roy
IEEE Access 8 (1), 45477-45495, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20