Follow
Sanjay K. Sahay
Sanjay K. Sahay
Professor, Department of Computer Science and Information Systems, BITS, Pilani, Goa
Verified email at goa.bits-pilani.ac.in - Homepage
Title
Cited by
Cited by
Year
Malware detection using machine learning and deep learning
H Rathore, S Agarwal, SK Sahay, M Sewak
Big Data Analytics: 6th International Conference, BDA 2018, Warangal, India …, 2018
1772018
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
A Sharma, SK Sahay
International Journal of Computer Applications 90 (2), 7-11, 2014
1322014
Comparison of deep learning and the classical machine learning algorithm for the malware detection
M Sewak, SK Sahay, H Rathore
2018 19th IEEE/ACIS international conference on software engineering …, 2018
1262018
An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders
M Sewak, SK Sahay, H Rathore
Journal of Computational and Theoretical Nanoscience 17 (1), 182–188, 2020
1082020
Detection of advanced malware by machine learning techniques
S Sharma, C Rama Krishna, SK Sahay
Soft Computing: Theories and Applications: Proceedings of SoCTA 2017, 333-342, 2019
972019
Robust android malware detection system against adversarial attacks using q-learning
H Rathore, SK Sahay, P Nikam, M Sewak
Information Systems Frontiers 23, 867-882, 2021
782021
Evolution of malware and its detection techniques
SK Sahay, A Sharma, H Rathore
Information and Communication Technology for Sustainable Development …, 2020
712020
An investigation of a deep learning based malware detection system
M Sewak, SK Sahay, H Rathore
Proceedings of the 13th International Conference on Availability …, 2018
632018
Deep reinforcement learning in the advanced cybersecurity threat detection and protection
M Sewak, SK Sahay, H Rathore
Information Systems Frontiers 25 (2), 589-611, 2023
622023
An effective approach for classification of advanced malware with high accuracy
A Sharma, SK Sahay
International Journal of Security and Its Applications 10 (4), 249-266, 2016
532016
Grouping the executables to detect malware with high accuracy
SK Sahay, A Sharma
Procedia Computer Science 78, 667 - 674, 2016
432016
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach
RK Roul, OR Devanand, SK Sahay
International Conference on Advances in Computer Engineering & Applications …, 2014
382014
Deep reinforcement learning for cybersecurity threat detection and protection: A review
M Sewak, SK Sahay, H Rathore
International Conference On Secure Knowledge Management In Artificial …, 2021
362021
Identification of significant permissions for efficient android malware detection
H Rathore, SK Sahay, R Rajvanshi, M Sewak
International conference on broadband communications, networks and systems …, 2020
332020
A novel modified apriori approach for web document clustering
RK Roul, S Varshneya, A Kalra, SK Sahay
Computational Intelligence in Data Mining-Volume 3: Proceedings of the …, 2015
282015
Robust malware detection models: learning from adversarial attacks and defenses
H Rathore, A Samavedhi, SK Sahay, M Sewak
Forensic Science International: Digital Investigation 37, 301183, 2021
272021
Detection of malicious android applications: Classical machine learning vs. deep neural network integrated with clustering
H Rathore, SK Sahay, S Thukral, M Sewak
International conference on broadband communications, networks and systems …, 2020
242020
Doom: a novel adversarial-drl-based op-code level metamorphic malware obfuscator for the enhancement of ids
M Sewak, SK Sahay, H Rathore
Adjunct proceedings of the 2020 ACM international joint conference on …, 2020
242020
Improving the detection accuracy of unknown malware by partitioning the executables in groups
A Sharma, SK Sahay, A Kumar
Advanced Computing and Communication Technologies: Proceedings of the 9th …, 2016
242016
DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture
M Sewak, SK Sahay, H Rathore
2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile …, 2020
222020
The system can't perform the operation now. Try again later.
Articles 1–20