rDBF: A r-dimensional bloom filter for massive scale membership query R Patgiri, S Nayak, SK Borgohain Journal of Network and Computer Applications 136, 100-113, 2019 | 34 | 2019 |
Preventing ddos using bloom filter: A survey R Patgiri, S Nayak, SK Borgohain arXiv preprint arXiv:1810.06689, 2018 | 30 | 2018 |
Comparative Evaluation of CNN Architectures for Image Caption Generation S Katiyar, SK Borgohain International Journal of Advanced Computer Science and Applications(IJACSA …, 2020 | 29 | 2020 |
Image captioning using deep stacked LSTMs, contextual word embeddings and data augmentation S Katiyar, SK Borgohain arXiv preprint arXiv:2102.11237, 2021 | 25 | 2021 |
Low resource language specific pre-processing and features for sentiment analysis task LS Meetei, TD Singh, SK Borgohain, S Bandyopadhyay Language Resources and Evaluation 55 (4), 947-969, 2021 | 24 | 2021 |
Role of bloom filter in big data research: A survey R Patgiri, S Nayak, SK Borgohain International Journal of Advanced Computer Science and Applications 9 (11 …, 2018 | 24 | 2018 |
Morphological analyzer for manipuri: design and implementation SI Choudhury, LS Singh, S Borgohain, PK Das Applied Computing: Second Asian Applied Computing Conference, AACC 2004 …, 2004 | 24 | 2004 |
Passdb: A password database with strict privacy protocol using 3d bloom filter R Patgiri, S Nayak, SK Borgohain Information Sciences 539, 157-176, 2020 | 19 | 2020 |
Design and implementation of a spell checker for Assamese M Das, S Borgohain, J Gogoi, SB Nair Language Engineering Conference, 2002. Proceedings, 156-162, 2002 | 18 | 2002 |
Fake news detection in Dravidian languages using transfer learning with adaptive finetuning E Raja, B Soni, SK Borgohain Engineering Applications of Artificial Intelligence 126, 106877, 2023 | 17 | 2023 |
Hunting the pertinency of bloom filter in computer networking and beyond: A survey R Patgiri, S Nayak, SK Borgohain Journal of Computer Networks and Communications 2019 (1), 2712417, 2019 | 17 | 2019 |
Sentence generation from a bag of words using N-gram model AK Yadav, SK Borgohain 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 17 | 2014 |
Machine learning image processing network security and data sciences A Bhattacharjee, SK Borgohain, B Soni, G Verma, XZ Gao (No Title), 2020 | 13 | 2020 |
Performance enhancement of SVM-based ML malware detection model using data preprocessing P Singh, SK Borgohain, J Kumar 2022 2nd International Conference on Emerging Frontiers in Electrical and …, 2022 | 12 | 2022 |
Feed‐Forward Deep Neural Network (FFDNN)‐Based Deep Features for Static Malware Detection P Singh, SK Borgohain, AK Sarkar, J Kumar, LD Sharma International Journal of Intelligent Systems 2023 (1), 9544481, 2023 | 10 | 2023 |
Minimized feature overhead malware detection machine learning model employing MRMR‐based ranking P Singh, SK Borgohain, LD Sharma, J Kumar Concurrency and Computation: Practice and Experience 34 (17), e6992, 2022 | 10 | 2022 |
Shed More Light on Bloom Filter's Variants R Patgiri, S Nayak, SK Borgohain arXiv preprint arXiv:1903.12525, 2019 | 9 | 2019 |
An adaptive cyclical learning rate based hybrid model for Dravidian fake news detection E Raja, B Soni, C Lalrempuii, SK Borgohain Expert Systems with Applications 241, 122768, 2024 | 8 | 2024 |
Machine learning, image processing, network security and data sciences A Choudhury, J van Soest, S Nayak, A Bhattacharjee, SK Borgohain, ... Personal health train on FHIR: A privacy preserving federated approach for …, 2020 | 7 | 2020 |
PassDB: A password database using 3D bloom filter R Patgiri, S Nayak, SK Borgohain 2019 IEEE 21st International Conference on High Performance Computing and …, 2019 | 6 | 2019 |