Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work S Dey 10th Computer Science and Electronic Engineering Conference, 2018 | 112 | 2018 |
FoodSQRBlock: Digitizing food production and the supply chain with blockchain and QR code in the cloud S Dey, S Saha, AK Singh, K McDonald-Maier Sustainability 13 (6), 3486, 2021 | 100 | 2021 |
Advanced steganography algorithm using randomized intermediate QR host embedded with any encrypted secret message: ASA_QR algorithm S Dey, K Mondal, J Nath, A Nath International Journal of Modern Education and Computer Science 4 (6), 59, 2012 | 74 | 2012 |
SD-EQR: A New Technique To Use QR CodesTM in Cryptography: Use of QR CodesTM In Data Hiding and Securing S Dey International Journal of Information Technology & Computer Science ( IJITCS ), 2012 | 58* | 2012 |
An Integrated Symmetric Key Cryptographic Method-Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm S Dey, J Nath, A Nath International Journal of Modern Education and Computer Science 4 (5), 1, 2012 | 55 | 2012 |
A Proof of Work: Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory S Dey International Journal of Wireless and Microwave Technologies 8 (5), 1-9, 2018 | 53 | 2018 |
SD-AEI: An advanced encryption technique for images S Dey 2012 Second International Conference on Digital Information Processing and …, 2012 | 51 | 2012 |
Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System S Dey, S Agarwal, A Nath 2013 IEEE International Conference on Communication Systems and Network …, 2013 | 50 | 2013 |
SmartNoshWaste: Using blockchain, machine learning, cloud computing and QR code to reduce food waste in decentralized web 3.0 enabled smart cities S Dey, S Saha, AK Singh, K McDonald-Maier Smart Cities 5 (1), 162-176, 2022 | 49 | 2022 |
SD-EI: A cryptographic technique to encrypt images S Dey Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 46 | 2012 |
An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm S Dey, J Nath, A Nath International Journal of Computer Applications 46 (20), 46-53, 2012 | 45 | 2012 |
Dynamic energy and thermal management of multi-core mobile platforms: A survey AK Singh, S Dey, K McDonald-Maier, KR Basireddy, GV Merrett, ... IEEE Design & Test 37 (5), 25-33, 2020 | 44 | 2020 |
Socodecnn: Program source code for visual cnn classification using computer vision methodology S Dey, AK Singh, DK Prasad, KD Mcdonald-Maier IEEE Access 7, 157158-157172, 2019 | 35 | 2019 |
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES S Dey International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1 (2 …, 2012 | 35 | 2012 |
Modern encryption standard (mes) version-i: An advanced cryptographic method S Dey, A Nath 2012 World Congress on Information and Communication Technologies, 242-247, 2012 | 34 | 2012 |
Teem: Online thermal-and energy-efficiency management on cpu-gpu mpsocs S Isuwa, S Dey, AK Singh, K McDonald-Maier 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 438-443, 2019 | 32 | 2019 |
Edge Cooling Mode: An Agent Based Thermal Management Mechanism For DVFS Enabled Heterogeneous MPSoCs S Dey, E Zaragoza Guajardo, K Reddy Basireddy, X Wang, ... 2019 32nd International Conference on VLSI Design and 2019 18th …, 2019 | 32 | 2019 |
User Interaction Aware Reinforcement Learning for Power and Thermal Efficiency of CPU-GPU Mobile MPSoCs S Dey, A Singh, X Wang, K McDonald-Maier 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020 | 27 | 2020 |
SD-AREE: A new modified caesar cipher cryptographic method along with bit-manipulation to exclude repetition from a message to be encrypted S Dey arXiv preprint arXiv:1205.4279, 2012 | 27 | 2012 |
Design and Implementation of a Simple Cache Simulator in Java to Investigate MESI and MOESI Coherency Protocols S Dey, MS Nair International Journal of Computer Applications 87 (11), 6-13, 2014 | 26 | 2014 |