A statistical approach to predict flight delay using gradient boosted decision tree S Manna, S Biswas, R Kundu, S Rakshit, P Gupta, S Barman 2017 International conference on computational intelligence in data science …, 2017 | 92 | 2017 |
A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme S Barman, HPH Shum, S Chattopadhyay, D Samanta IEEE Access 7, 12557-12574, 2019 | 68 | 2019 |
Fingerprint-based crypto-biometric system for network security S Barman, D Samanta, S Chattopadhyay EURASIP Journal on Information Security 2015, 1-17, 2015 | 62 | 2015 |
Biometric-based cryptography for digital content protection without any key storage G Panchal, D Samanta, S Barman Multimedia Tools and Applications 78, 26979-27000, 2019 | 49 | 2019 |
Provably secure multi-server authentication protocol using fuzzy commitment S Barman, AK Das, D Samanta, S Chattopadhyay, JJPC Rodrigues, ... IEEE Access 6, 38578-38594, 2018 | 47 | 2018 |
An efficient fingerprint matching approach based on minutiae to minutiae distance using indexing with effectively lower time complexity S Barman, S Chattopadhyay, D Samanta, S Bag, G Show 2014 International Conference on Information Technology, 179-183, 2014 | 33 | 2014 |
Prediction of diabetes type-II using a two-class neural network S Rakshit, S Manna, S Biswas, R Kundu, P Gupta, S Maitra, S Barman Computational Intelligence, Communications, and Business Analytics: First …, 2017 | 30 | 2017 |
Emotion recognition from speech signals using excitation source and spectral features AR Choudhury, A Ghosh, R Pandey, S Barman 2018 IEEE Applied Signal Processing Conference (ASPCON), 257-261, 2018 | 27 | 2018 |
A novel secure key-exchange protocol using biometrics of the sender and receiver S Barman, S Chattopadhyay, D Samanta, G Panchal Computers & Electrical Engineering 64, 65-82, 2017 | 21 | 2017 |
A complete literature review on financial fraud detection applying data mining techniques Subhas Barman, Utpal Pal, Md. Asif Sarfaraj, Biswajit Biswas, Animesh Mahata ... Int. J. of Trust Management in Computing and Communications 3 (4), 336-359, 2016 | 21 | 2016 |
Trend of Candida infection and antifungal resistance in a tertiary care hospital of north east India RC Roy, GD Sharma, SR Barman, S Chanda Blood 100, 19, 2013 | 21 | 2013 |
Deep approaches on malicious URL classification A Das, A Das, A Datta, S Si, S Barman 2020 11th International Conference on Computing, Communication and …, 2020 | 18 | 2020 |
An appropriate and cost-effective hospital recommender system for a patient of rural area using deep reinforcement learning RK Jha, S Bag, D Koley, GR Bojja, S Barman Intelligent Systems with Applications 18, 200218, 2023 | 15 | 2023 |
Effect of nano NPK and straight fertilizers on yield, economics and agronomic indices in baby corn (Zea mays L.) LR Sankar, GC Mishra, S Maitra, S Barman Int J Chem Stud 8 (2), 614-618, 2020 | 15 | 2020 |
An approach to cryptographic key distribution through fingerprint based key distribution center S Barman, S Chattopadhyay, D Samanta 2014 International Conference on Advances in Computing, Communications and …, 2014 | 15 | 2014 |
Revocable key generation from irrevocable biometric data for symmetric cryptography S Barman, D Samanta, S Chattopadhyay Computer, Communication, Control and Information Technology (C3IT), 2015 …, 2015 | 13 | 2015 |
Approach to cryptographic key generation from fingerprint biometrics S Barman, D Samanta, S Chattopadhyay International Journal of biometrics 7 (3), 226-248, 2015 | 11 | 2015 |
Fingerprint Based Symmetric Cryptography S Barman, S Chattopadhyay, D Samanta | 10 | 2014 |
A blockchain‐based approach to secure electronic health records using fuzzy commitment scheme SB Samiran Chattopadhyay, Debasis Samanta, Sayantani Barman Security and Privacy, 2022 | 8 | 2022 |
Implementation of a smart map using spatial oracle S Barman, AK Barman, B Panda, P Sharma Proceedings of the 2015 Third International Conference on Computer …, 2015 | 8 | 2015 |