Gangopadhyay, Sugata
79  results:
Search for persons X
?
1

ULTRA: Exploring Team Recommendations in Two Geographies Us..:

, In: Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD),
 
?
2

DiTRU: A Resurrection of NTRU over Dihedral Group:

, In: Progress in Cryptology - AFRICACRYPT 2024; Lecture Notes in Computer Science,
Raya, Ali ; Kumar, Vikas ; Gangopadhyay, Sugata - p. 349-375 , 2024
 
?
3

Results on the Key Space of Group-Ring NTRU: The Case of th..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
 
?
4

Study of Support Set Generation Techniques in LAD for Intru..:

, In: Communications in Computer and Information Science; Intelligent Systems and Pattern Recognition,
 
?
5

Randomness Enhancement in a Quantum Dot-Based Quantum Rando..:

, In: 2023 IEEE 23rd International Conference on Nanotechnology (NANO),
Khare, Anvadya ; Jothishwaran, C A ; Tiwari, Yash.. - p. 539-544 , 2023
 
?
6

Stability of the Walsh–Hadamard spectrum of cryptographic B..:

Gangopadhyay, Aditi Kar ; Kumar, Vikas ; Stănică, Pantelimon.
Journal of Applied Mathematics and Computing.  69 (2023)  4 - p. 3337-3357 , 2023
 
?
7

Computational Results on Gowers $$U_2$$ and $$U_3$$ Norms o..:

, In: Codes, Cryptology and Information Security; Lecture Notes in Computer Science,
 
?
9

Generating Adversarial Examples Using LAD:

, In: Intelligent Data Engineering and Automated Learning – IDEAL 2023; Lecture Notes in Computer Science,
Chauhan, Sneha ; Mahmoud, Loreen ; Sheth, Tanay.. - p. 154-165 , 2023
 
?
11

Design of Intrusion Detection System Based on Logical Analy..:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
Chauhan, Sneha ; Gangopadhyay, Sugata - p. 47-65 , 2022
 
?
12

A Comparative Study of LAD, CNN and DNN for Detecting Intru..:

, In: Intelligent Data Engineering and Automated Learning – IDEAL 2022; Lecture Notes in Computer Science,
 
?
14

BSAT: A New Tool for Analyzing Cryptographic Strength of Bo..:

, In: Advances in Intelligent Systems and Computing; Progress in Advanced Computing and Intelligent Engineering,
 
1-15