2021
|
Chakraborty, Nilesh; Mondal, Samrat On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries Journal Article Frontiers Comput. Sci., 15 (2), pp. 152803, 2021. Links | BibTeX @article{DBLP:journals/fcsc/ChakrabortyM21,
title = {On designing an unaided authentication service with threat detection and leakage control for defeating opportunistic adversaries},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1007/s11704-019-9134-9},
doi = {10.1007/s11704-019-9134-9},
year = {2021},
date = {2021-01-01},
journal = {Frontiers Comput. Sci.},
volume = {15},
number = {2},
pages = {152803},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Chakraborty, Nilesh; Li, Jian-Qiang; Mondal, Samrat; Luo, Chengwen; Wang, Huihui; Alazab, Mamoun; Chen, Fei; Pan, Yi On Designing a Lesser Obtrusive Authentication Protocol to Prevent
Machine-Learning-Based Threats in Internet of Things Journal Article IEEE Internet Things J., 8 (5), pp. 3255–3267, 2021. Links | BibTeX @article{DBLP:journals/iotj/ChakrabortyLMLW21,
title = {On Designing a Lesser Obtrusive Authentication Protocol to Prevent
Machine-Learning-Based Threats in Internet of Things},
author = {Nilesh Chakraborty and
Jian-Qiang Li and
Samrat Mondal and
Chengwen Luo and
Huihui Wang and
Mamoun Alazab and
Fei Chen and
Yi Pan},
url = {https://doi.org/10.1109/JIOT.2020.3025274},
doi = {10.1109/JIOT.2020.3025274},
year = {2021},
date = {2021-01-01},
journal = {IEEE Internet Things J.},
volume = {8},
number = {5},
pages = {3255--3267},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2020
|
Chakraborty, Nilesh; Chao, Yao; Luo, Chengwen; Li, Jianqiang; Ziying, Pan; Chen, Jie; Pan, Yi On Understanding the Impact of RTT in the Mobile Network for Detecting
the Rogue UAVs Journal Article IEEE Trans. Cogn. Commun. Netw., 6 (4), pp. 1218–1229, 2020. Links | BibTeX @article{DBLP:journals/tccn/ChakrabortyCLLZ20,
title = {On Understanding the Impact of RTT in the Mobile Network for Detecting
the Rogue UAVs},
author = {Nilesh Chakraborty and
Yao Chao and
Chengwen Luo and
Jianqiang Li and
Pan Ziying and
Jie Chen and
Yi Pan},
url = {https://doi.org/10.1109/TCCN.2020.3004583},
doi = {10.1109/TCCN.2020.3004583},
year = {2020},
date = {2020-01-01},
journal = {IEEE Trans. Cogn. Commun. Netw.},
volume = {6},
number = {4},
pages = {1218--1229},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2019
|
Maheshwari, Gaurav; Trivedi, Priyansh; Lukovnikov, Denis; Chakraborty, Nilesh; Fischer, Asja; Lehmann, Jens Learning to Rank Query Graphs for Complex Question Answering over
Knowledge Graphs Inproceedings The Semantic Web - ISWC 2019 - 18th International Semantic Web Conference,
Auckland, New Zealand, October 26-30, 2019, Proceedings, Part I, pp. 487–504, Springer, 2019. Links | BibTeX @inproceedings{DBLP:conf/semweb/MaheshwariTLCF019,
title = {Learning to Rank Query Graphs for Complex Question Answering over
Knowledge Graphs},
author = {Gaurav Maheshwari and
Priyansh Trivedi and
Denis Lukovnikov and
Nilesh Chakraborty and
Asja Fischer and
Jens Lehmann},
url = {https://doi.org/10.1007/978-3-030-30793-6_28},
doi = {10.1007/978-3-030-30793-6_28},
year = {2019},
date = {2019-01-01},
booktitle = {The Semantic Web - ISWC 2019 - 18th International Semantic Web Conference,
Auckland, New Zealand, October 26-30, 2019, Proceedings, Part I},
volume = {11778},
pages = {487--504},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Li, Jianqiang; Mondal, Samrat; Chen, Fei; Pan, Yi On Overcoming the Identified Limitations of a Usable PIN Entry Method Journal Article IEEE Access, 7 , pp. 124366–124378, 2019. Links | BibTeX @article{DBLP:journals/access/ChakrabortyLMCP19,
title = {On Overcoming the Identified Limitations of a Usable PIN Entry Method},
author = {Nilesh Chakraborty and
Jianqiang Li and
Samrat Mondal and
Fei Chen and
Yi Pan},
url = {https://doi.org/10.1109/ACCESS.2019.2937948},
doi = {10.1109/ACCESS.2019.2937948},
year = {2019},
date = {2019-01-01},
journal = {IEEE Access},
volume = {7},
pages = {124366--124378},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Chakraborty, Nilesh; Anand, Vijay S; Mondal, Samrat Towards identifying and preventing behavioral side channel attack
on recording attack resilient unaided authentication services Journal Article Comput. Secur., 84 , pp. 193–205, 2019. Links | BibTeX @article{DBLP:journals/compsec/ChakrabortyAM19,
title = {Towards identifying and preventing behavioral side channel attack
on recording attack resilient unaided authentication services},
author = {Nilesh Chakraborty and
S. Vijay Anand and
Samrat Mondal},
url = {https://doi.org/10.1016/j.cose.2019.03.019},
doi = {10.1016/j.cose.2019.03.019},
year = {2019},
date = {2019-01-01},
journal = {Comput. Secur.},
volume = {84},
pages = {193--205},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Chakraborty, Nilesh; Mondal, Samrat Towards incorporating honeywords in n-session recording attack resilient
unaided authentication services Journal Article IET Information Security, 13 (1), pp. 7–18, 2019. Links | BibTeX @article{DBLP:journals/iet-ifs/ChakrabortyM19,
title = {Towards incorporating honeywords in n-session recording attack resilient
unaided authentication services},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1049/iet-ifs.2017.0538},
doi = {10.1049/iet-ifs.2017.0538},
year = {2019},
date = {2019-01-01},
journal = {IET Information Security},
volume = {13},
number = {1},
pages = {7--18},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2018
|
Chakraborty, Nilesh; Singh, Shreya; Mondal, Samrat On Designing a Questionnaire Based Honeyword Generation Approach for
Achieving Flatness Inproceedings 17th IEEE International Conference On Trust, Security And Privacy
In Computing And Communications / 12th IEEE International Conference
On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
York, NY, USA, August 1-3, 2018, pp. 444–455, IEEE, 2018. Links | BibTeX @inproceedings{DBLP:conf/trustcom/ChakrabortySM18,
title = {On Designing a Questionnaire Based Honeyword Generation Approach for
Achieving Flatness},
author = {Nilesh Chakraborty and
Shreya Singh and
Samrat Mondal},
url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00071},
doi = {10.1109/TrustCom/BigDataSE.2018.00071},
year = {2018},
date = {2018-01-01},
booktitle = {17th IEEE International Conference On Trust, Security And Privacy
In Computing And Communications / 12th IEEE International Conference
On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
York, NY, USA, August 1-3, 2018},
pages = {444--455},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
2017
|
Ermilov, Ivan; Lehmann, Jens; Sejdiu, Gezim; Bühmann, Lorenz; Westphal, Patrick; Stadler, Claus; Bin, Simon; Chakraborty, Nilesh; Petzka, Henning; Saleem, Muhammad; Ngomo, Axel-Cyrille Ngonga; Jabeen, Hajira The Tale of Sansa Spark Inproceedings Proceedings of the ISWC 2017 Posters & Demonstrations and Industry
Tracks co-located with 16th International Semantic Web Conference
(ISWC 2017), Vienna, Austria, October 23rd - to - 25th, 2017, CEUR-WS.org, 2017. Links | BibTeX @inproceedings{DBLP:conf/semweb/ErmilovLSBWSBCP17,
title = {The Tale of Sansa Spark},
author = {Ivan Ermilov and
Jens Lehmann and
Gezim Sejdiu and
Lorenz Bühmann and
Patrick Westphal and
Claus Stadler and
Simon Bin and
Nilesh Chakraborty and
Henning Petzka and
Muhammad Saleem and
Axel-Cyrille Ngonga Ngomo and
Hajira Jabeen},
url = {http://ceur-ws.org/Vol-1963/paper552.pdf},
year = {2017},
date = {2017-01-01},
booktitle = {Proceedings of the ISWC 2017 Posters & Demonstrations and Industry
Tracks co-located with 16th International Semantic Web Conference
(ISWC 2017), Vienna, Austria, October 23rd - to - 25th, 2017},
volume = {1963},
publisher = {CEUR-WS.org},
series = {CEUR Workshop Proceedings},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Lehmann, Jens; Sejdiu, Gezim; Bühmann, Lorenz; Westphal, Patrick; Stadler, Claus; Ermilov, Ivan; Bin, Simon; Chakraborty, Nilesh; Saleem, Muhammad; Ngomo, Axel-Cyrille Ngonga; Jabeen, Hajira Distributed Semantic Analytics Using the SANSA Stack Inproceedings The Semantic Web - ISWC 2017 - 16th International Semantic Web Conference,
Vienna, Austria, October 21-25, 2017, Proceedings, Part II, pp. 147–155, Springer, 2017. Abstract | Links | BibTeX @inproceedings{DBLP:conf/semweb/LehmannSBWSEBCS17,
title = {Distributed Semantic Analytics Using the SANSA Stack},
author = {Jens Lehmann and
Gezim Sejdiu and
Lorenz Bühmann and
Patrick Westphal and
Claus Stadler and
Ivan Ermilov and
Simon Bin and
Nilesh Chakraborty and
Muhammad Saleem and
Axel-Cyrille Ngonga Ngomo and
Hajira Jabeen},
url = {http://svn.aksw.org/papers/2017/ISWC_SANSA_SoftwareFramework/public.pdf},
doi = {10.1007/978-3-319-68204-4_15},
year = {2017},
date = {2017-01-01},
booktitle = {The Semantic Web - ISWC 2017 - 16th International Semantic Web Conference,
Vienna, Austria, October 21-25, 2017, Proceedings, Part II},
volume = {10588},
pages = {147--155},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
abstract = {Over the past decade, vast amounts of machine-readable structured information have become available through the automation of research processes as well as the increasing popularity of knowledge graphs and semantic technologies. A major research challenge today is to perform scalable analysis of large-scale knowledge graphs to facilitate applications like link prediction, knowledge base completion and question answering. Most analytics approaches, which scale horizontally (i.e., can be executed in a distributed environment) work on simple feature-vector-based input rather than more expressive knowledge structures. On the other hand, analytics methods which exploit expressive structures usually do not scale well to very large knowledge bases. This software framework paper describes the ongoing project Semantic Analytics Stack (SANSA) which supports expressive and scalable semantic analytics by providing functionality for distributed in-memory computing for RDF data. The library provides APIs for RDF storage, querying using SPARQL and forward chaining inference. It includes several machine learning algorithms for RDF knowledge graphs. The article describes the vision, architecture and use cases of SANSA.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Over the past decade, vast amounts of machine-readable structured information have become available through the automation of research processes as well as the increasing popularity of knowledge graphs and semantic technologies. A major research challenge today is to perform scalable analysis of large-scale knowledge graphs to facilitate applications like link prediction, knowledge base completion and question answering. Most analytics approaches, which scale horizontally (i.e., can be executed in a distributed environment) work on simple feature-vector-based input rather than more expressive knowledge structures. On the other hand, analytics methods which exploit expressive structures usually do not scale well to very large knowledge bases. This software framework paper describes the ongoing project Semantic Analytics Stack (SANSA) which supports expressive and scalable semantic analytics by providing functionality for distributed in-memory computing for RDF data. The library provides APIs for RDF storage, querying using SPARQL and forward chaining inference. It includes several machine learning algorithms for RDF knowledge graphs. The article describes the vision, architecture and use cases of SANSA. |
Chakraborty, Nilesh; Mondal, Samrat On designing a modified-UI based honeyword generation approach for
overcoming the existing limitations Journal Article Comput. Secur., 66 , pp. 155–168, 2017. Links | BibTeX @article{DBLP:journals/compsec/ChakrabortyM17,
title = {On designing a modified-UI based honeyword generation approach for
overcoming the existing limitations},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1016/j.cose.2017.01.011},
doi = {10.1016/j.cose.2017.01.011},
year = {2017},
date = {2017-01-01},
journal = {Comput. Secur.},
volume = {66},
pages = {155--168},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2016
|
Dojchinovski, Milan; Sasaki, Felix; Gornostaja, Tatjana; Hellmann, Sebastian; Mannens, Erik; Salliau, Frank; Osella, Michele; Ritchie, Phil; Stoitsis, Giannis; Koidl, Kevin; Ackermann, Markus; Chakraborty, Nilesh FREME: Multilingual Semantic Enrichment with Linked Data and Language Technologies Inproceedings Proceedings of the Tenth International Conference on Language Resources
and Evaluation LREC 2016, Portorov z, Slovenia, May 23-28, 2016, European Language Resources Association (ELRA), 2016. Links | BibTeX @inproceedings{DBLP:conf/lrec/DojchinovskiSGH16,
title = {FREME: Multilingual Semantic Enrichment with Linked Data and Language Technologies},
author = {Milan Dojchinovski and
Felix Sasaki and
Tatjana Gornostaja and
Sebastian Hellmann and
Erik Mannens and
Frank Salliau and
Michele Osella and
Phil Ritchie and
Giannis Stoitsis and
Kevin Koidl and
Markus Ackermann and
Nilesh Chakraborty},
url = {http://www.lrec-conf.org/proceedings/lrec2016/summaries/578.html},
year = {2016},
date = {2016-01-01},
booktitle = {Proceedings of the Tenth International Conference on Language Resources
and Evaluation LREC 2016, Portorov z, Slovenia, May 23-28, 2016},
publisher = {European Language Resources Association (ELRA)},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Anand, Vijay S; Randhawa, Gurpinder Singh; Mondal, Samrat On Designing Leakage-Resilient Vibration Based Authentication Techniques Inproceedings 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
2016, pp. 1875–1881, IEEE, 2016. Links | BibTeX @inproceedings{DBLP:conf/trustcom/ChakrabortyARM16,
title = {On Designing Leakage-Resilient Vibration Based Authentication Techniques},
author = {Nilesh Chakraborty and
S. Vijay Anand and
Gurpinder Singh Randhawa and
Samrat Mondal},
url = {https://doi.org/10.1109/TrustCom.2016.0287},
doi = {10.1109/TrustCom.2016.0287},
year = {2016},
date = {2016-01-01},
booktitle = {2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
2016},
pages = {1875--1881},
publisher = {IEEE},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
2015
|
Chakraborty, Nilesh; Mondal, Samrat Few notes towards making honeyword system more secure and usable Inproceedings Proceedings of the 8th International Conference on Security of Information
and Networks, SIN 2015, Sochi, Russian Federation, September 8-10,
2015, pp. 237–245, ACM, 2015. Links | BibTeX @inproceedings{DBLP:conf/sin/ChakrabortyM15,
title = {Few notes towards making honeyword system more secure and usable},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1145/2799979.2799992},
doi = {10.1145/2799979.2799992},
year = {2015},
date = {2015-01-01},
booktitle = {Proceedings of the 8th International Conference on Security of Information
and Networks, SIN 2015, Sochi, Russian Federation, September 8-10,
2015},
pages = {237--245},
publisher = {ACM},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Nath, Rajdeep Kumar; Sen, Bibhash; Daga, Rachit; Chakraborty, Nilesh; Tibrewal, Harsh; Sikdar, Biplab K Fault masking in Quantum-dot cellular automata using prohibitive logic
circuit Inproceedings 19th International Symposium on VLSI Design and Test, VDAT 2015,
Ahmedabad, India, June 26-29, 2015, pp. 1–5, IEEE Computer Society, 2015. Links | BibTeX @inproceedings{DBLP:conf/vdat/NathSDCTS15,
title = {Fault masking in Quantum-dot cellular automata using prohibitive logic
circuit},
author = {Rajdeep Kumar Nath and
Bibhash Sen and
Rachit Daga and
Nilesh Chakraborty and
Harsh Tibrewal and
Biplab K. Sikdar},
url = {https://doi.org/10.1109/ISVDAT.2015.7208103},
doi = {10.1109/ISVDAT.2015.7208103},
year = {2015},
date = {2015-01-01},
booktitle = {19th International Symposium on VLSI Design and Test, VDAT 2015,
Ahmedabad, India, June 26-29, 2015},
pages = {1--5},
publisher = {IEEE Computer Society},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Mondal, Samrat HoneyString: an improved methodology over tag digit-based honeypot
to detect shoulder surfing attack Journal Article IJTMCC, 3 (2), pp. 93–114, 2015. Links | BibTeX @article{DBLP:journals/ijtmcc/ChakrabortyM15,
title = {HoneyString: an improved methodology over tag digit-based honeypot
to detect shoulder surfing attack},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1504/IJTMCC.2015.076952},
doi = {10.1504/IJTMCC.2015.076952},
year = {2015},
date = {2015-01-01},
journal = {IJTMCC},
volume = {3},
number = {2},
pages = {93--114},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2014
|
Chakraborty, Nilesh; Mondal, Samrat An Improved Methodology towards Providing Immunity against Weak Shoulder
Surfing Attack Inproceedings Information Systems Security - 10th International Conference, ICISS
2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 298–317, Springer, 2014. Links | BibTeX @inproceedings{DBLP:conf/iciss/ChakrabortyM14,
title = {An Improved Methodology towards Providing Immunity against Weak Shoulder
Surfing Attack},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1007/978-3-319-13841-1_17},
doi = {10.1007/978-3-319-13841-1_17},
year = {2014},
date = {2014-01-01},
booktitle = {Information Systems Security - 10th International Conference, ICISS
2014, Hyderabad, India, December 16-20, 2014, Proceedings},
volume = {8880},
pages = {298--317},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Mondal, Samrat SLASS: Secure Login against Shoulder Surfing Inproceedings Recent Trends in Computer Networks and Distributed Systems Security
- Second International Conference, SNDS 2014, Trivandrum, India,
March 13-14, 2014, Proceedings, pp. 346–357, Springer, 2014. Links | BibTeX @inproceedings{DBLP:conf/snds/ChakrabortyM14,
title = {SLASS: Secure Login against Shoulder Surfing},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1007/978-3-642-54525-2_31},
doi = {10.1007/978-3-642-54525-2_31},
year = {2014},
date = {2014-01-01},
booktitle = {Recent Trends in Computer Networks and Distributed Systems Security
- Second International Conference, SNDS 2014, Trivandrum, India,
March 13-14, 2014, Proceedings},
volume = {420},
pages = {346--357},
publisher = {Springer},
series = {Communications in Computer and Information Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Mondal, Samrat Tag Digit Based Honeypot to Detect Shoulder Surfing Attack Inproceedings Security in Computing and Communications - Second International Symposium,
SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, pp. 101–110, Springer, 2014. Links | BibTeX @inproceedings{DBLP:conf/sscc/ChakrabortyM14,
title = {Tag Digit Based Honeypot to Detect Shoulder Surfing Attack},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1007/978-3-662-44966-0_10},
doi = {10.1007/978-3-662-44966-0_10},
year = {2014},
date = {2014-01-01},
booktitle = {Security in Computing and Communications - Second International Symposium,
SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings},
volume = {467},
pages = {101--110},
publisher = {Springer},
series = {Communications in Computer and Information Science},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
|
Chakraborty, Nilesh; Mondal, Samrat I-SLASS: an improved login approach over SLASS Journal Article IJTMCC, 2 (4), pp. 309–329, 2014. Links | BibTeX @article{DBLP:journals/ijtmcc/ChakrabortyM14,
title = {I-SLASS: an improved login approach over SLASS},
author = {Nilesh Chakraborty and
Samrat Mondal},
url = {https://doi.org/10.1504/IJTMCC.2014.067375},
doi = {10.1504/IJTMCC.2014.067375},
year = {2014},
date = {2014-01-01},
journal = {IJTMCC},
volume = {2},
number = {4},
pages = {309--329},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|