Pre-loader

Conference

# List of Publication by Prof. Malay Kule
1 S Adhikari, S Datta, M Kule, On Detection of Phishing URLs using Plant Propagation Algorithm, (Accepted and Presented), International Conference on Network Security and Blockchain Technology, 2024
2 B Bhunia, D Dey, M Kule, H Rahaman, International Conference on Cryptography, Network Security and Blockchain technology, (Accepted and Presented), International Conference on Intelligent Systems and Embedded Design (ISED), 2024
3 S Basu, R Ghoshal, M Kule, Detection of Hardware Trojan in Nanocrossbar-Based Cryptographic Circuit, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
4 R Das, S Basu, M Kule, A New Technique of Cellular-Automata-Based PUF Design in Nanoscale Crossbar Circuits, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
5 P Halder, S Sikdar, M Kule, An Improved Cryptanalysis Of Knapsack Cryptosystem Using Dingo Optimizer, (Accepted and Presented), International Conference on Data Electronics and Computing, 2024
6 S Sikdar, M Kule, A Machine Learning and Nature Inspired Algorithm Based Hybrid Approach for Detection of IOT Attacks, (Accepted and Presented), International Conference on Computer, Communication, Control & Information Technology, 2024
7 S K Mitra, S Chakraborty, M Kule, An Enhanced Network Density based Centrality for Influential Node Detection in Complex Networks, (Accepted and Presented), IEEE Region 10 Conference (TENCON), 2024
8 S Dutta, S Chakraborty, M Kule, A Novel Two-Phase Social Network-Based Consensus Mechanism: Opinion Dynamics for Large-Scale Group Decision-Making, (Accepted and Presented), IEEE Region 10 Conference (TENCON), 2024
9 P. Halder, M. Kule, Security Attacks on Social Networking: A Review, 01-04, International Symposium on Devices, Circuits and Systems (ISDCS), Hiroshima, Japan, 2023
10 T Adhikari, A K Khan and M Kule, Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN, (Accepted and Presented), International Conference on Computational Technologies and Electronics (ICCTE), 2023
11 S Sikdar, P Basu, M Kule, Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention, 4th International Conference on Frontiers in Computing and Systems (COMSYS 2023), 2023
12 T Adhikai, M Kule, A K Khan, An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface, ICCNT, 2022
13 G Das, M Kule, A New Error Correction Technique in Quantum Cryptography using Artificial Neural Networks, 1-5, IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022
14 A. Mukherjee, A. Sen, K. Bera, R. Ghosh, S. Mondal, S. Chakravarty, S. Sikdar, M. Kule, Detection of Cipher Types Using Machine Learning Techniques, 725, 297-307, Computational Intelligence in Pattern Recognition, 2022
15 P. Halder, A. Mallick, S. Debnath, M. Kule, Machine Learning-Based Phishing Detection in Heterogeneous Information Network, 725, 221-234, Computational Intelligence in Pattern Recognition, 2022
16 S. Sikdar, M. Kule, A New Technique of Cipher Type Identification Using Convolutional Neural Networks, 725, 1-16, Computational Intelligence in Pattern Recognition, 2022
17 P. K. Pal, M. Kule, A New Approach to Pharmaceutical Product Verification Using Barcode and QR Code, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
18 S. Basu, M. Kule, On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
19 S. Sikdar, J. Biswas, M. Kule, Cryptanalysis of Markle Hellman Knapsack Cipher Using Cuckoo Search Algorithm, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
20 S. Sikdar, M. Kule, Recent Trends in Cryptanalysis Techniques: A Review, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
21 K Dey, M Kule, H Rahaman, PUF Based Hardware Security: A Review, 1-6, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
22 T Chaku, A Rakshit, I Sarkar and M Kule, On Defect Tolerance of Nanocrossbar Arrays using Divide and Conquer Technique, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
23 S Basu, M Kule, H Rahaman, Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
24 T. Chaku, A. Ray, M. Kule, D. K. Kole, Swift Sort: A New Divide and Conquer Approach Based Sorting Algorithm, 404, 529-537, International Conference on Frontiers in Computing and Systems (COMSYS), 2021
25 A Mallick, S Mondal, S Debnath, S Majumder, Harsh, A Pal, A Verma, M Kule, Security Aspects of Social Media Applications, 404, 455-465, International Conference on Frontiers in Computing and Systems (COMSYS), 2021
26 S Basu, M Kule, Detection Of Hardware Trojan In Memristive Ternary CAM Circuits, 1-5, International Symposium on Devices, Circuits and Systems, 2020
27 S Basu, M Kule, H Rahaman, Symmetric Function Based Memristive Polimino PUF with Enhanced Security, 154-157, 6th IEEE International Symposium on Smart Electronic Systems (iSES), 2020
28 S Basu, M Kule, On the Synthesis of Unate Symmetric Function Using Memristor-Based Nano-Crossbar Circuit, 1-8, Computational Intelligence in Pattern Recognition, 2020
29 R Kamal, M Bag, M Kule, On the Cryptanalysis of S-DES Using Binary Cuckoo Search Algorithm, 23-32, Computational Intelligence in Pattern Recognition, 2020
30 S Mitra, S Das, M Kule, Prevention of The Man-In-The-Middle Attack on Diffie-Hellman Key Exchange Algorithm: A Review, 625-635, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
31 T Chaku, M Kundu, D Dhara, M Kule, A New Function Mapping Approach in Defective Nanocrossbar Array using Unique Number Sequence, 805-813, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
32 D Dhara, M Kule, A Microcontroller-Based Design of Chopper Circuit for DC Motor Control, 1-7, 2020 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 2020
33 H. Rahaman, M. Kule, Defect Tolerant Approaches for Function Mapping in Nano-Crossbar Circuits, 48-53, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2018
34 M. Chakraborty, B. Jana, T. Mandal, M. Kule, An Performance Analysis of RAS Scheme Using Artificial Neural Network, 1-5, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), India, 2018
35 B Jana, M Chakraborty, T Mandal, M Kule, An Overview on Security Issues in Modern Cryptographic Techniques, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), India, 2018
36 A. B. Majumdar, S. Chakraborty, M. Kule, A High-Yield Function Mapping Technique for Defective Nano-Crossbar Circuits, 5-9, National Conference on Recent Trends in Information Technology and Management (RTITM 2017), ISBN : 978-93-80813-59-2, 2017
37 B Jana, J Poray, T Mandal, M Kule, A multilevel encryption technique in cloud security, 220-224, " 7th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2017
38 M. Kule, H. Rahaman, Defect Tolerant Approach For Function Mapping in Nano Crossbar Using Evolutionary Algorithms, International Conference on Microelectronics, Circuits and Systems, 2016, 2016
39 M Kule, H Rahaman, B B Bhattacharya, Reliable logic design with defective nano-crossbar architecture, 47-52, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), 2016
40 M Kule, A Dutta, H Rahaman, B B Bhattacharya, High-speed decoder design using memristor-based nano-crossbar architecture, 77-81, Sixth IEEE International Symposium on Embedded Computing and System Design (ISED), India, 2016
41 M Kule, H Rahaman, B B Bhattacharya, On finding a defect-free component in nanoscale crossbar circuits, 70, 421-427, Procedia Computer Science, 2015
42 S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, A Cryptanalytic Attack on Knapsack Cipher Using Differential Evolution Algorithm, 317-320, IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2011
43 S Palit, SN Sinha, MA Molla, A Khanra, M Kule, A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm, 428-432, 2nd IEEE International conference on computer and communication technology (ICCCT-2011), 2011
44 M. Kule, S. Sen, A. Salman, H. Rahaman, Simulation of Symmetric Functions with optimal Solution through Defective Nanoscale crossbar Circuits using Greedy Method,, E-102 – E-106, ICCET, 2010

Created: 23 November 2019