A systematic survey on influential spreaders identification in complex networks with a focus on K-shell based techniques G Maji, S Mandal, S Sen Expert Systems with Applications 161, 113681, 2020 | 92 | 2020 |
Dual image based LSB steganography G Maji, S Mandal, S Sen, NC Debnath 2018 2nd International Conference on Recent Advances in Signal Processing …, 2018 | 18 | 2018 |
Pixel value difference based image steganography with one time pad encryption G Maji, S Mandal, NC Debnath, S Sen 2019 IEEE 17th international conference on industrial informatics (INDIN) 1 …, 2019 | 17 | 2019 |
Secure and Robust Image Steganography Using a Reference Image as Key G Maji, S Mandal International Journal of Innovative Technology and Exploring Engineering …, 2019 | 16 | 2019 |
Identification of city hotspots by analyzing telecom call detail records using complex network modeling G Maji, S Mandal, S Sen Expert Systems with Applications 215, 119298, 2023 | 14 | 2023 |
Integrating telecom CDR and customer data from different operational databases and data warehouses into a central data warehouse for business analysis S Mandal, G Maji International Journal of Engineering and Technical Research 5 (02), 516-523, 2016 | 12 | 2016 |
A forward email based high capacity text steganography technique using a randomized and indexed word dictionary G Maji, S Mandal Multimedia Tools and Applications 79 (35), 26549-26569, 2020 | 11 | 2020 |
Cover independent image steganography in spatial domain using higher order pixel bits G Maji, S Mandal, S Sen Multimedia Tools and Applications 80 (10), 15977-16006, 2021 | 10 | 2021 |
Cost minimizing reservation and scheduling algorithms for public clouds S Mandal, G Maji, S Khatua, RK Das IEEE Transactions on Cloud Computing 11 (2), 1365-1380, 2021 | 7 | 2021 |
Bid selection for deadline constrained jobs over spot VMs in computational cloud S Mandal, S Khatua, RK Das Distributed Computing and Internet Technology: 13th International Conference …, 2017 | 5 | 2017 |
A Conceptual Model to Implement Smart Bus System using Internet of Things (IoT) G Maji, S Mandal, S Sen, NC Debnath 32nd International Conference on Computers and Their Applications (CATA 2017 …, 2017 | 4 | 2017 |
Designing combo recharge plans for telecom subscribers using itemset mining technique G Maji, S Mandal, S Bhattacharya, S Sen 2017 IEEE International Conference on Industrial Technology (ICIT), 1232-1237, 2017 | 3 | 2017 |
An approach to cost minimization with EC2 spot instances using VM based migration policy S Mandal, SS Saify, A Ghosh, G Maji, S Khatua, RK Das International Conference on Distributed Computing and Internet Technology …, 2022 | 2 | 2022 |
Dual image-based dictionary encoded data hiding in spatial domain G Maji, S Mandal, S Sen International Journal of Information Security and Privacy (IJISP) 14 (2), 83-101, 2020 | 2 | 2020 |
A Novel Delivery Model to Expand E-commerce Customers Based on Telecom Data Mining. G Maji, S Mandal, NC Debnath, S Sen CATA, 336-344, 2019 | 2 | 2019 |
An Online Algorithm for Cost Minimization of Amazon EC2 Burstable Resources S Mandal, S Lal, S Sensarma, S Saha, G Maji, S Khatua, RK Das International Conference on Distributed Computing and Intelligent Technology …, 2024 | | 2024 |
Impact of ICT on Higher Education in India with Special Focus on NPTEL S Mandal, G Maji International Journal of Emerging Technologies and Innovative Research, ISSN …, 2019 | | 2019 |