Calculated based on number of publications stored in Pure and citations from Scopus
20102024

Research activity per year

Search results

  • 2016

    Detection of fake Twitter followers using graph centrality measures

    Mehrotra, A., Sarreddy, M. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Aradhya, V. N. M. & Niranjan, S. K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 499-504 6 p. 7918016. (Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy

    Krishna, M. K. S. G. & Singh, S., 02-11-2016, 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016. Rodrigues, J. J. P. C., Siarry, P., Perez, G. M., Tomar, R., Pathan, A.-S. K., Mehta, S., Thampi, S. M., Berretti, S., Gorthi, R. P., Pathan, A.-S. K., Wu, J., Li, J., Jain, V., Rodrigues, J. J. P. C., Atiquzzaman, M., Rodrigues, J. J. P. C., Bedi, P. & Kammoun, M. H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1511-1516 6 p. 7732262. (2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Identification of gene network motifs for cancer disease diagnosis

    Gupta, R., Fayaz, S. M. & Singh, S., 01-01-2016, 2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 179-184 6 p. 7806253. (2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning

    Jindal, S. & Singh, S., 10-06-2016, Proceedings - IEEE International Conference on Information Processing, ICIP 2015. Vatti, R. & Chopde, A. M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 447-451 5 p. 7489424. (Proceedings - IEEE International Conference on Information Processing, ICIP 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Citations (Scopus)
  • Intelligence analysis of Tay Twitter bot

    Mathur, V., Stavrakas, Y. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Aradhya, V. N. M. & Niranjan, S. K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 231-236 6 p. 7917966. (Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Mutual fund performance prediction

    Qamar, H. & Singh, S., 01-01-2016, 2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 185-189 5 p. 7806257. (2016 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2016 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Natural language image descriptor

    Kishore, A. & Singh, S., 09-06-2016, 2015 IEEE Recent Advances in Intelligent Computational Systems, RAICS 2015. Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 7488398. (2015 IEEE Recent Advances in Intelligent Computational Systems, RAICS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Path independent real time points of interest detection in road networks

    Rohella, A. & Singh, S., 01-01-2016, Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016. Aradhya, V. N. M. & Niranjan, S. K. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 633-638 6 p. 7918040. (Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Unemployment rates forecasting using supervised neural networks

    Sharma, S. & Singh, S., 08-07-2016, Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence 2016. Bansal, A. & Singhal, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 28-33 6 p. 7508042. (Proceedings of the 2016 6th International Conference - Cloud System and Big Data Engineering, Confluence 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2015

    Anti-scraping application development

    Haque, A. & Singh, S., 01-01-2015, 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015. Mauri, J. L., Thampi, S. M., Wozniak, M., Marques, O., Krishnaswamy, D., Sahni, S., Callegari, C., Takagi, H., Bojkovic, Z. S., Vinod, M., Prasad, N. R., Alcaraz Calero, J. M., Rodrigues, J., Rodrigues, J., Que, X., Meghanathan, N., Sandhu, R. & Au, E. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 869-874 6 p. 7275720. (2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Is stack overflow overflowing with questions and tags

    Ranjitha, R. K. & Singh, S., 10-08-2015, Proceeding of the 3rd International Symposium on Women in Computing and Informatics, WCI 2015. Mitra, S., Bedi, P., McIntosh, S., M.S., R. & Nair, I. (eds.). Association for Computing Machinery (ACM), Vol. 10-13-August-2015. p. 278-283 6 p. (ACM International Conference Proceeding Series; vol. 10-13-August-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Is that twitter hashtag worth reading

    Anusha, A. & Singh, S., 10-08-2015, Proceeding of the 3rd International Symposium on Women in Computing and Informatics, WCI 2015. Mitra, S., Bedi, P., McIntosh, S., M.S., R. & Nair, I. (eds.). Association for Computing Machinery (ACM), Vol. 10-13-August-2015. p. 272-277 6 p. (ACM International Conference Proceeding Series; vol. 10-13-August-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • 2014

    Differential private random forest

    Patil, A. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Comer, D. E., Mueller, P., Mallick, B., Mukherjea, S., Thampi, S. M., Krishnaswamy, D. & Sikora, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2623-2630 8 p. 6968348. (Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Citations (Scopus)
  • Smart card based password authentication and user anonymity scheme using ECC and steganography

    Singh, V., Dahiya, P. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Comer, D. E., Mueller, P., Mallick, B., Mukherjea, S., Thampi, S. M., Krishnaswamy, D. & Sikora, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1614-1621 8 p. 6968403. (Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Three way authentication protocol for privacy preserving and ownership authentication transfer for ubiquitous computing devices

    Pradeep, B. H. & Singh, S., 01-01-2014, In: WSEAS Transactions on Communications. 13, p. 430-443 14 p.

    Research output: Contribution to journalArticlepeer-review

  • Towards a generic framework for short term firm-specific stock forecasting

    Ahmed, M., Sriram, A. & Singh, S., 01-01-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Comer, D. E., Mueller, P., Mallick, B., Mukherjea, S., Thampi, S. M., Krishnaswamy, D. & Sikora, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2681-2688 8 p. 6968411. (Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2013

    Alert-BDI: BDI model with adaptive alertness through situational awareness

    Hegde, M. S. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 442-447 6 p. 6637212. (Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Aware-BDI: An extension of the BDI model incorporating situational awareness

    Hegde, M. S. & Singh, S., 05-08-2013, p. 100-104. 5 p.

    Research output: Contribution to conferencePaperpeer-review

    2 Citations (Scopus)
  • Contextual information based recommender system using Singular Value Decomposition

    Gupta, R., Jain, A., Rana, S. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 2084-2089 6 p. 6637502. (Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Detection and filtering of collaborative malicious users in reputation system using quality repository approach

    Jnanamurthy, H. K. & Singh, S., 01-12-2013, Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013. p. 466-471 6 p. 6637216. (Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Detection of user cluster with suspicious activity in online social networking sites

    Sharath, K. A. & Singh, S., 01-01-2013, Proceedings - 2nd International Conference on Advanced Computing, Networking and Security, ADCONS 2013. IEEE Computer Society, p. 220-225 6 p. 6714167. (Proceedings - 2nd International Conference on Advanced Computing, Networking and Security, ADCONS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Intrusion detection in zero knowledge system using model checking approach

    Jacob, T., Raman, M. & Singh, S., 03-10-2013, Computer Networks and Communications, NetCom 2012 - Proceedings of the Fourth International Conference on Networks and Communications. p. 453-465 13 p. (Lecture Notes in Electrical Engineering; vol. 131 LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Optimal neural network architecture for stock market forecasting

    Khirbat, G., Gupta, R. & Singh, S., 05-08-2013, p. 557-561. 5 p.

    Research output: Contribution to conferencePaperpeer-review

    12 Citations (Scopus)
  • Ownership authentication transfer protocol for ubiquitous computing devices

    Pradeep, B. H. & Singh, S., 12-03-2013, 2013 International Conference on Computer Communication and Informatics, ICCCI 2013. 6466133. (2013 International Conference on Computer Communication and Informatics, ICCCI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Stock market prediction accuracy analysis using kappa measure

    Gupta, R., Garg, N. & Singh, S., 05-08-2013, p. 635-639. 5 p.

    Research output: Contribution to conferencePaperpeer-review

    10 Citations (Scopus)
  • Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)

    Jnanamurthy, H. K., Warty, C. & Singh, S., 01-12-2013, 2013 Annual IEEE India Conference, INDICON 2013. 6726055. (2013 Annual IEEE India Conference, INDICON 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2012

    Decoding robustness performance comparison for QR and data matrix code

    Kulshreshtha, R., Kamboj, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 722-731 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Design and development of a desktop monitoring system

    Santhalia, V. K. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 620-625 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Differentiated QoS with Modified C/I based scheduling algorithm

    Divya, A. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 835-840 6 p. 6409191. (Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Enhanced mining association rule algorithm with reduced time & space complexity

    Mundra, P., Maurya, A. K. & Singh, S., 01-12-2012, 2012 Annual IEEE India Conference, INDICON 2012. p. 1105-1110 6 p. 6420782. (2012 Annual IEEE India Conference, INDICON 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Erroneous state detection in piecewise FIFO system

    Sharath, K. A., Vishesh, H. V. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 841-845 5 p. 6409192. (Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal verification of the extensible authentication protocol using SPIN

    Jnanamurthy, H. K., S.hegde, M. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 365-371 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling & verification of sliding window protocol with data loss and intruder detection using NuSMV

    Sinha, A., Ry, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 352-357 6 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Modeling and verification of Fiat-Shamir zero knowledge authentication protocol

    Maurya, A. K., Choudhary, M. S., Ajeyaraj, P. & Singh, S., 01-12-2012, Advances in Computer Science and Information Technology: Computer Science and Engineering - Second International Conference, CCSIT 2012, Proceedings. PART 2 ed. p. 61-70 10 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 85, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Modeling two way concurrent buffer system using timed automata in UPPAAL

    Mishra, R., Zeeshaan, M. & Singh, S., 01-12-2012, Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012. p. 846-851 6 p. 6409193. (Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

    Hanumanthappa, P. & Singh, S., 13-07-2012, 2012 International Conference on Innovations in Information Technology, IIT 2012. p. 107-112 6 p. 6207712. (2012 International Conference on Innovations in Information Technology, IIT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Symbolic verification of web crawler functionality and its properties

    Shetty, K. S., Bhat, S. & Singh, S., 27-03-2012, 2012 International Conference on Computer Communication and Informatics, ICCCI 2012. 6158649. (2012 International Conference on Computer Communication and Informatics, ICCCI 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Web opinion mining for social networking sites

    Kaur, B., Saxena, A. & Singh, S., 12-12-2012, Proceedings of the 2nd International Conference on Computational Science, Engineering and Information, CCSEIT 2012. p. 598-605 8 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2011

    Cloud based application development for mobile devices for accessing LBS

    Shetty, K. S. & Singh, S., 26-10-2011, Advances in Parallel, Distributed Computing - First International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, Proceedings. p. 532-543 12 p. (Communications in Computer and Information Science; vol. 203 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Formal verification of OAuth 2.0 using alloy framework

    Pai, S., Sharma, Y., Kumar, S., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 655-659 5 p. 5966531. (Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    75 Citations (Scopus)
  • Logical modeling and verification of a strength based multi-agent argumentation scheme using NuSMV

    Shetty, S., Shashi Kiran, H. S., Namala, M. B. & Singh, S., 01-12-2011, Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. p. 378-387 10 p. (Communications in Computer and Information Science; vol. 131 CCIS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Modeling and verification of chess game using NuSMV

    Saralaya, V., Kishore, J. K., Reddy, S., Pai, R. M. & Singh, S., 2011, Advances in Computing and Communications - First International Conference, ACC 2011, Proceedings. PART 2 ed. Vol. 191 CCIS. p. 460-470 11 p. (Communications in Computer and Information Science; vol. 191 CCIS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and verification of Inter Realm Authentication in Kerberos using symbolic model verifier

    Mundra, P., Sharma, M., Shukla, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 496-506 11 p. (Communications in Computer and Information Science; vol. 204 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and verification of kerberos protocol using symbolic model verifier

    Mundra, P., Shukla, S., Sharma, M., Pai, R. M. & Singh, S., 2011, Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011. p. 651-654 4 p. 5966530. (Proceedings - 2011 International Conference on Communication Systems and Network Technologies, CSNT 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Modeling and verification of server aided verification protocol using NuSMV

    Saralaya, V., Kishore, J. K., Reddy, S. & Singh, S., 28-10-2011, Trends in Computer Science, Engineering and Information Technology - First International Conference on Computer Science, Engineering and Information Technology, CCSEIT 2011, Proceedings. p. 486-495 10 p. (Communications in Computer and Information Science; vol. 204 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Physical layer authentication in wired and wireless communication systems

    Mouli, C. & Singh, S., 26-10-2011, Advances in Digital Image Processing and Information Technology - First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, Proceedings. p. 291-304 14 p. (Communications in Computer and Information Science; vol. 205 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2010

    A generalized closed form relation for BER of QPSK/M-QAM over fading channel

    Singh, S., Kumar, M. S. & Mruthyunjaya, H. S., 2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 161-165 5 p. 5578716. (2010 5th International Conference on Industrial and Information Systems, ICIIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking

    Lele, A., Kumar, A., Rohith, H. M. & Singh, S., 02-11-2010, 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010. p. 281-285 5 p. 5578694. (2010 5th International Conference on Industrial and Information Systems, ICIIS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Model checking message exchange in location based services

    Moily, A., Prasanna, G., Shetty, K. S. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 164-167 4 p. 5640417. (2010 International Conference on Computer and Communication Technology, ICCCT-2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Modelingfreshness concept to overcome replay attackin Kerberos protocol using NuSMV

    Adyanthaya, S., Rukmangada, S., Tiwari, A. & Singh, S., 30-12-2010, 2010 International Conference on Computer and Communication Technology, ICCCT-2010. p. 125-129 5 p. 5640425. (2010 International Conference on Computer and Communication Technology, ICCCT-2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)