Anomaly detection in industrial control systems using logical analysis of data TK Das, S Adepu, J Zhou Computers & Security 96, 101935, 2020 | 111 | 2020 |
A hybrid scheme for handprinted numeral recognition based on a self-organizing network and MLP classifiers U Bhattacharya, TK Das, A Datta, SK Parui, BB Chaudhuri International journal of pattern recognition and artificial intelligence 16 …, 2002 | 74 | 2002 |
BASIC: Backbone-assisted successive interference cancellation W Zhou, T Das, L Chen, K Srinivasan, P Sinha Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 38 | 2016 |
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme TK Das, S Maitra, J Mitra IEEE transactions on Signal Processing 53 (2), 768-775, 2005 | 38 | 2005 |
Pitfalls in the management of TB-associated uveitis S Basu, T Das Eye 24 (11), 1681-1684, 2010 | 31 | 2010 |
Intelligent intrusion detection scheme for smart power-grid using optimized ensemble learning on selected features M Panthi, TK Das International Journal of Critical Infrastructure Protection 39, 100567, 2022 | 29 | 2022 |
Cryptanalysis of correlation-based watermarking schemes using single watermarked copy TK Das, S Maitra IEEE Signal Processing Letters 11 (4), 446-449, 2004 | 27 | 2004 |
Recognition of handprinted Bangla numerals using neural network models U Bhattacharya, TK Das, A Datta, SK Parui, BB Chaudhuri Advances in Soft Computing—AFSS 2002: 2002 AFSS International Conference on …, 2002 | 26 | 2002 |
Diverging keys in wireless sensor networks M Ren, TK Das, Jianying Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006 | 20 | 2006 |
Parthenium: a curse for natural herbs M Mahadevappa, TK Das, A Kumar Proceedings of the National Research Seminar on Herbal Conservation, Culture …, 2001 | 20 | 2001 |
CoReCast: Collision resilient broadcasting in vehicular networks T Das, L Chen, R Kundu, A Bakshi, P Sinha, K Srinivasan, G Bansal, ... Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018 | 15 | 2018 |
Analysis of the “Wavelet Tree Quantization” watermarking strategy and a modified robust scheme TK Das, S Maitra Multimedia systems 12, 151-163, 2006 | 12 | 2006 |
A robust block oriented watermarking scheme in spatial domain TK Das, S Maitra Information and Communications Security: 4th International Conference, ICICS …, 2002 | 11 | 2002 |
A Cascaded Scheme for Recognition of Handprinted Numerals. U Bhattacharya, TK Das, BB Chaudhuri ICVGIP, 2002 | 11 | 2002 |
Anti-forensics of JPEG compression detection schemes using approximation of DCT coefficients TK Das Multimedia Tools and Applications 77 (24), 31835-31854, 2018 | 10 | 2018 |
CAVIDS: Real time intrusion detection system for connected autonomous vehicles using logical analysis of data A Kumar, TK Das Vehicular Communications 43, 100652, 2023 | 8 | 2023 |
Prevention and detection of FDIA on power-network protection scheme using multiple support set TK Das, S Ghosh, E Koley Journal of Information Security and Applications 63, 103054, 2021 | 8 | 2021 |
An asynchronous node replication attack in wireless sensor networks J Zhou, TK Das, J Lopez Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 7 | 2008 |
A critical evaluation of the probable causes of musculoskeletal disorders prevalent among the manual material handling workers of a construction industry T Das, S Gangopadhyay Proceedings of International Ergonomics Conference (HWWE 2005), 128, 2005 | 7 | 2005 |
Cryptanalysis of “wavelet tree quantization” watermarking scheme TK Das, S Maitra Distributed Computing-IWDC 2004: 6th International Workshop, Kolkata, India …, 2005 | 7 | 2005 |