Emerging trends, techniques and open issues of containerization: A review J Watada, A Roy, R Kadikar, H Pham, B Xu IEEE Access 7, 152443-152472, 2019 | 110 | 2019 |
Advances in User Authentication D Dasgupta, A Roy, A Nag Book; Springer, 2017 | 94 | 2017 |
Toward the design of adaptive selection strategies for multi-factor authentication D Dasgupta, A Roy, A Nag Computers & Security (Elsevier) 63, 85-116;, 2016 | 94 | 2016 |
Multi-factor authentication: more secure approach towards authenticating individuals D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag Advances in User Authentication, 185-233, 2017 | 84 | 2017 |
In object detection deep learning methods, YOLO shows supremum to Mask R-CNN S Shahriar, W Junzo, R Anurava, DRA Rambli Journal of Physics: Conference Series; https://iopscience.iop.org/article/10 …, 2020 | 59 | 2020 |
A structure-based software reliability allocation using fuzzy analytic hierarchy process S Chatterjee, JB Singh, A Roy International Journal of Systems Science (Taylor & Francis) 46 (3), 513-525 …, 2015 | 43 | 2015 |
Adaptive multi-factor authentication system D Dasgupta, AK Nag, A Roy US Patent 9,912,657, 2018 | 28 | 2018 |
A reinforcement learning algorithm for automated detection of skin lesions UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy Applied Sciences 11 (20), 9367, 2021 | 27 | 2021 |
An Adaptive Approach Towards the Selection of Multi-Factor Authentication AK Nag, A Roy, D Dasgupta Computational Intelligence, 2015 IEEE Symposium Series on, 463 - 472, 2015 | 25 | 2015 |
Software Fault Prediction using Neuro-Fuzzy Network and Evolutionary Learning Approach C Subhashis, N Shobhit, A Roy Neural Computing and Applications (Springer), 1-11; Impact Factor: 2.505, 2016 | 24* | 2016 |
Multi-user Permission Strategy to Access Sensitive Information D Dasgupta, A Roy, D Ghosh Information Sciences 423, 24-49, 2017 | 22* | 2017 |
Insights from curve fitting models in mouse dynamics authentication systems YXM Tan, A Binder, A Roy 2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017 | 21 | 2017 |
Novel algorithms for web software fault prediction S Chatterjee, A Roy Quality and Reliability Engineering International (Wiley) 31 (8), 1517-1535 …, 2015 | 21 | 2015 |
Particle swarm optimization with deep learning for human action recognition UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021 | 18 | 2021 |
Enhanced reinforcement learning model for extraction of objects in complex imaging UA Usmani, A Roy, J Watada, J Jaafar, IA Aziz Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2022 | 16 | 2022 |
A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction A Roy Soft Computing (Springer) 20 (5), 1991-2019; Impact Factor 2.472, 2016 | 16 | 2016 |
A reinforced active learning algorithm for semantic segmentation in complex imaging UA usmani, J Watada, J Jaafar, IA Aziz, A Roy IEEE Access, 2021 | 14 | 2021 |
A reinforcement learning based adaptive ROI generation for video object segmentation UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy IEEE Access 9, 161959-161977, 2021 | 14 | 2021 |
An artificial bee colony-based double layered neural network approach for solving quadratic bi-level programming problems J Watada, A Roy, B Wang, SC Tan, B Xu IEEE Access 8, 21549-21564, 2020 | 14 | 2020 |
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission S Bhattacharjee, L Rahim, J Watada, A Roy IEEE Access 8 (1), 45477-45495, 2020 | 14 | 2020 |