# | List of Publication by Prof. Malay Kule |
---|---|
1 | S Adhikari, S Datta, M Kule, On Detection of Phishing URLs using Plant Propagation Algorithm, (Accepted and Presented), International Conference on Network Security and Blockchain Technology, 2024 |
2 | B Bhunia, D Dey, M Kule, H Rahaman, International Conference on Cryptography, Network Security and Blockchain technology, (Accepted and Presented), International Conference on Intelligent Systems and Embedded Design (ISED), 2024 |
3 | S Basu, R Ghoshal, M Kule, Detection of Hardware Trojan in Nanocrossbar-Based Cryptographic Circuit, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024 |
4 | R Das, S Basu, M Kule, A New Technique of Cellular-Automata-Based PUF Design in Nanoscale Crossbar Circuits, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024 |
5 | P Halder, S Sikdar, M Kule, An Improved Cryptanalysis Of Knapsack Cryptosystem Using Dingo Optimizer, (Accepted and Presented), International Conference on Data Electronics and Computing, 2024 |
6 | S Sikdar, M Kule, A Machine Learning and Nature Inspired Algorithm Based Hybrid Approach for Detection of IOT Attacks, (Accepted and Presented), International Conference on Computer, Communication, Control & Information Technology, 2024 |
7 | S K Mitra, S Chakraborty, M Kule, An Enhanced Network Density based Centrality for Influential Node Detection in Complex Networks, (Accepted and Presented), IEEE Region 10 Conference (TENCON), 2024 |
8 | S Dutta, S Chakraborty, M Kule, A Novel Two-Phase Social Network-Based Consensus Mechanism: Opinion Dynamics for Large-Scale Group Decision-Making, (Accepted and Presented), IEEE Region 10 Conference (TENCON), 2024 |
9 | P. Halder, M. Kule, Security Attacks on Social Networking: A Review, 01-04, International Symposium on Devices, Circuits and Systems (ISDCS), Hiroshima, Japan, 2023 |
10 | T Adhikari, A K Khan and M Kule, Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN, (Accepted and Presented), International Conference on Computational Technologies and Electronics (ICCTE), 2023 |
11 | S Sikdar, P Basu, M Kule, Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention, 4th International Conference on Frontiers in Computing and Systems (COMSYS 2023), 2023 |
12 | T Adhikai, M Kule, A K Khan, An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface, ICCNT, 2022 |
13 | G Das, M Kule, A New Error Correction Technique in Quantum Cryptography using Artificial Neural Networks, 1-5, IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022 |
14 | A. Mukherjee, A. Sen, K. Bera, R. Ghosh, S. Mondal, S. Chakravarty, S. Sikdar, M. Kule, Detection of Cipher Types Using Machine Learning Techniques, 725, 297-307, Computational Intelligence in Pattern Recognition, 2022 |
15 | P. Halder, A. Mallick, S. Debnath, M. Kule, Machine Learning-Based Phishing Detection in Heterogeneous Information Network, 725, 221-234, Computational Intelligence in Pattern Recognition, 2022 |
16 | S. Sikdar, M. Kule, A New Technique of Cipher Type Identification Using Convolutional Neural Networks, 725, 1-16, Computational Intelligence in Pattern Recognition, 2022 |
17 | P. K. Pal, M. Kule, A New Approach to Pharmaceutical Product Verification Using Barcode and QR Code, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 |
18 | S. Basu, M. Kule, On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 |
19 | S. Sikdar, J. Biswas, M. Kule, Cryptanalysis of Markle Hellman Knapsack Cipher Using Cuckoo Search Algorithm, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 |
20 | S. Sikdar, M. Kule, Recent Trends in Cryptanalysis Techniques: A Review, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 |
21 | K Dey, M Kule, H Rahaman, PUF Based Hardware Security: A Review, 1-6, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021 |
22 | T Chaku, A Rakshit, I Sarkar and M Kule, On Defect Tolerance of Nanocrossbar Arrays using Divide and Conquer Technique, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021 |
23 | S Basu, M Kule, H Rahaman, Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021 |
24 | T. Chaku, A. Ray, M. Kule, D. K. Kole, Swift Sort: A New Divide and Conquer Approach Based Sorting Algorithm, 404, 529-537, International Conference on Frontiers in Computing and Systems (COMSYS), 2021 |
25 | A Mallick, S Mondal, S Debnath, S Majumder, Harsh, A Pal, A Verma, M Kule, Security Aspects of Social Media Applications, 404, 455-465, International Conference on Frontiers in Computing and Systems (COMSYS), 2021 |
26 | S Basu, M Kule, Detection Of Hardware Trojan In Memristive Ternary CAM Circuits, 1-5, International Symposium on Devices, Circuits and Systems, 2020 |
27 | S Basu, M Kule, H Rahaman, Symmetric Function Based Memristive Polimino PUF with Enhanced Security, 154-157, 6th IEEE International Symposium on Smart Electronic Systems (iSES), 2020 |
28 | S Basu, M Kule, On the Synthesis of Unate Symmetric Function Using Memristor-Based Nano-Crossbar Circuit, 1-8, Computational Intelligence in Pattern Recognition, 2020 |
29 | R Kamal, M Bag, M Kule, On the Cryptanalysis of S-DES Using Binary Cuckoo Search Algorithm, 23-32, Computational Intelligence in Pattern Recognition, 2020 |
30 | S Mitra, S Das, M Kule, Prevention of The Man-In-The-Middle Attack on Diffie-Hellman Key Exchange Algorithm: A Review, 625-635, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020 |
31 | T Chaku, M Kundu, D Dhara, M Kule, A New Function Mapping Approach in Defective Nanocrossbar Array using Unique Number Sequence, 805-813, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020 |
32 | D Dhara, M Kule, A Microcontroller-Based Design of Chopper Circuit for DC Motor Control, 1-7, 2020 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 2020 |
33 | H. Rahaman, M. Kule, Defect Tolerant Approaches for Function Mapping in Nano-Crossbar Circuits, 48-53, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2018 |
34 | M. Chakraborty, B. Jana, T. Mandal, M. Kule, An Performance Analysis of RAS Scheme Using Artificial Neural Network, 1-5, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), India, 2018 |
35 | B Jana, M Chakraborty, T Mandal, M Kule, An Overview on Security Issues in Modern Cryptographic Techniques, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), India, 2018 |
36 | A. B. Majumdar, S. Chakraborty, M. Kule, A High-Yield Function Mapping Technique for Defective Nano-Crossbar Circuits, 5-9, National Conference on Recent Trends in Information Technology and Management (RTITM 2017), ISBN : 978-93-80813-59-2, 2017 |
37 | B Jana, J Poray, T Mandal, M Kule, A multilevel encryption technique in cloud security, 220-224, " 7th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2017 |
38 | M. Kule, H. Rahaman, Defect Tolerant Approach For Function Mapping in Nano Crossbar Using Evolutionary Algorithms, International Conference on Microelectronics, Circuits and Systems, 2016, 2016 |
39 | M Kule, H Rahaman, B B Bhattacharya, Reliable logic design with defective nano-crossbar architecture, 47-52, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), 2016 |
40 | M Kule, A Dutta, H Rahaman, B B Bhattacharya, High-speed decoder design using memristor-based nano-crossbar architecture, 77-81, Sixth IEEE International Symposium on Embedded Computing and System Design (ISED), India, 2016 |
41 | M Kule, H Rahaman, B B Bhattacharya, On finding a defect-free component in nanoscale crossbar circuits, 70, 421-427, Procedia Computer Science, 2015 |
42 | S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, A Cryptanalytic Attack on Knapsack Cipher Using Differential Evolution Algorithm, 317-320, IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2011 |
43 | S Palit, SN Sinha, MA Molla, A Khanra, M Kule, A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm, 428-432, 2nd IEEE International conference on computer and communication technology (ICCCT-2011), 2011 |
44 | M. Kule, S. Sen, A. Salman, H. Rahaman, Simulation of Symmetric Functions with optimal Solution through Defective Nanoscale crossbar Circuits using Greedy Method,, E-102 – E-106, ICCET, 2010 |
Created: 23 November 2019