Follow
Sangeeta
Sangeeta
Lecturer at Keele University, United Kingdom
Verified email at keele.ac.uk - Homepage
Title
Cited by
Cited by
Year
Twis–a lightweight block cipher
SK Ojha, N Kumar, K Jain, Sangeeta
Information Systems Security: 5th International Conference, ICISS 2009 …, 2009
542009
Analysis and classification of crime tweets
S Lal, L Tiwari, R Ranjan, A Verma, N Sardana, R Mourya
Procedia computer science 167, 1911-1919, 2020
372020
ORFDetector: ensemble learning based online recruitment fraud detection
S Lal, R Jiaswal, N Sardana, A Verma, A Kaur, R Mourya
2019 twelfth international conference on contemporary computing (IC3), 1-5, 2019
362019
A static technique for fault localization using character n-gram based information retrieval model
S Lal, A Sureka
Proceedings of the 5th India Software Engineering Conference, 109-118, 2012
302012
Logopt: Static feature extraction from source code for automated catch block logging prediction
S Lal, A Sureka
Proceedings of the 9th India Software Engineering Conference, 151-155, 2016
282016
Cvdmagic: a mobile based study for cvd risk detection in rural india
P Singh, A Singh, V Naik, S Lal
Proceedings of the fifth international conference on Information and …, 2012
262012
LogOptPlus: Learning to optimize logging in catch and if programming constructs
S Lal, N Sardana, A Sureka
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
242016
Effective asthma disease prediction using naive Bayes—Neural network fusion technique
S Aneja, S Lal
2014 international conference on parallel, distributed and grid computing …, 2014
232014
Improving the efficiency of healthcare delivery system in underdeveloped rural areas
A Singh, V Naik, S Lal, R Sengupta, D Saxena, P Singh, A Puri
2011 Third International Conference on Communication Systems and Networks …, 2011
232011
Applying fellegi-sunter (fs) model for traceability link recovery between bug databases and version archives
A Sureka, S Lal, L Agarwal
2011 18th Asia-Pacific Software Engineering Conference, 146-153, 2011
222011
A novel approach of sentiment classification using emoticons
S Bahri, P Bahri, S Lal
Procedia computer science 132, 669-678, 2018
212018
Comparison of seven bug report types: A case-study of google chrome browser project
S Lal, A Sureka
2012 19th Asia-Pacific Software Engineering Conference 1, 517-526, 2012
212012
BEAN: a lightweight stream cipher
N Kumar, S Ojha, K Jain, S Lal
Proceedings of the 2nd international conference on Security of information …, 2009
192009
ECLogger: Cross-project catch-block logging prediction using ensemble of classifiers
S Lal, N Sardana, A Sureka
e-Informatica Software Engineering Journal 11 (1), 2017
172017
Estimation of maintainability parameters for object-oriented software using hybrid neural network and class level metrics
L Kumar, S Lal, LB Murthy
International Journal of System Assurance Engineering and Management 10 (5 …, 2019
102019
Two level empirical study of logging statements in open source Java projects
S Lal, N Sardana, A Sureka
International Journal of Open Source Software and Processes (IJOSSP) 6 (1 …, 2015
92015
Change-proneness of object-oriented software using combination of feature selection techniques and ensemble learning techniques
L Kumar, S Lal, A Goyal, NLB Murthy
Proceedings of the 12th Innovations in Software Engineering Conference …, 2019
82019
Samekana: A browser extension for including relevant web links in issue tracking system discussion forum
D Correa, S Lal, A Saini, A Sureka
2013 20th Asia-Pacific Software Engineering Conference (APSEC) 1, 25-33, 2013
82013
Improving logging prediction on imbalanced datasets: A case study on open source java projects
S Lal, N Sardana, A Sureka
Cognitive Analytics: Concepts, Methodologies, Tools, and Applications, 740-772, 2020
72020
Empirical analysis of the logging questions on the Stack Overflow website
H Gujral, A Sharma, S Lal, A Kaur, A Kumar, A Sureka
2018 Conference On Software Engineering & Data Sciences (CoSEDS)(in-press), 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20