Nilesh Chakraborty left SDA. The profile below reflects the status at the point of his departure and is no longer updated.
Student Assistant
Computer Science Institute
University of Bonn
Room A109
Römerstr. 164, 53117 Bonn
University of Bonn, Computer Science
nilesh@nileshc.com
Short CV
Nilesh Chakraborty is a Graduate Research Assistant at the Computer Science Department III of the University of Bonn.
Research Interests
- Big Data / Distributed Processing
- Machine Learning
- Named Entity Disambiguation, Knowledge Fusion
- Knowledge Graph Embeddings
Publications
2022
RTT-Based Rogue UAV Detection in IoV Networks Journal Article
In: IEEE Internet Things J., vol. 9, no. 8, pp. 5909–5919, 2022.
Cryptanalysis of a Honeyword System in the IoT Platform Journal Article
In: IEEE Internet Things J., vol. 9, no. 4, pp. 2614–2626, 2022.
2021
On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries Journal Article
In: Frontiers Comput. Sci., vol. 15, no. 2, pp. 152803, 2021.
On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things Journal Article
In: IEEE Internet Things J., vol. 8, no. 5, pp. 3255–3267, 2021.
Introduction to neural network-based question answering over knowledge graphs Journal Article
In: WIREs Data Mining Knowl. Discov., vol. 11, no. 3, 2021.
2020
On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs Journal Article
In: IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 4, pp. 1218–1229, 2020.
2019
Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs Proceedings Article
In: The Semantic Web - ISWC 2019 - 18th International Semantic Web Conference, Auckland, New Zealand, October 26-30, 2019, Proceedings, Part I, pp. 487–504, Springer, 2019.
On Overcoming the Identified Limitations of a Usable PIN Entry Method Journal Article
In: IEEE Access, vol. 7, pp. 124366–124378, 2019.
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services Journal Article
In: Comput. Secur., vol. 84, pp. 193–205, 2019.
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services Journal Article
In: IET Inf. Secur., vol. 13, no. 1, pp. 7–18, 2019.
2018
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness Proceedings Article
In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 444–455, IEEE, 2018.
2017
The Tale of Sansa Spark Proceedings Article
In: Proceedings of the ISWC 2017 Posters & Demonstrations and Industry Tracks co-located with 16th International Semantic Web Conference (ISWC 2017), Vienna, Austria, October 23rd - to - 25th, 2017, CEUR-WS.org, 2017.
Distributed Semantic Analytics Using the SANSA Stack Proceedings Article
In: The Semantic Web - ISWC 2017 - 16th International Semantic Web Conference, Vienna, Austria, October 21-25, 2017, Proceedings, Part II, pp. 147–155, Springer, 2017.
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations Journal Article
In: Comput. Secur., vol. 66, pp. 155–168, 2017.
2016
FREME: Multilingual Semantic Enrichment with Linked Data and Language Technologies Proceedings Article
In: Proceedings of the Tenth International Conference on Language Resources and Evaluation LREC 2016, Portorov z, Slovenia, May 23-28, 2016, European Language Resources Association (ELRA), 2016.
On Designing Leakage-Resilient Vibration Based Authentication Techniques Proceedings Article
In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 1875–1881, IEEE, 2016.
2015
Few notes towards making honeyword system more secure and usable Proceedings Article
In: Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pp. 237–245, ACM, 2015.
Fault masking in Quantum-dot cellular automata using prohibitive logic circuit Proceedings Article
In: 19th International Symposium on VLSI Design and Test, VDAT 2015, Ahmedabad, India, June 26-29, 2015, pp. 1–5, IEEE Computer Society, 2015.
HoneyString: an improved methodology over tag digit-based honeypot to detect shoulder surfing attack Journal Article
In: Int. J. Trust. Manag. Comput. Commun., vol. 3, no. 2, pp. 93–114, 2015.
2014
An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing Attack Proceedings Article
In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 298–317, Springer, 2014.
SLASS: Secure Login against Shoulder Surfing Proceedings Article
In: Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings, pp. 346–357, Springer, 2014.
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack Proceedings Article
In: Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, pp. 101–110, Springer, 2014.
I-SLASS: an improved login approach over SLASS Journal Article
In: Int. J. Trust. Manag. Comput. Commun., vol. 2, no. 4, pp. 309–329, 2014.