Dr. Amitava Nag, Fellow of IEI, SM-IEEE, SM-ACM
Dr. Amitava Nag, Fellow of IEI, SM-IEEE, SM-ACM Professor Department of Computer Science & Engineering (HoD, Dept. of CSE, Nodal officer of NIRF(CIT))
QUALIFICATIONS PhD
AREA OF INTERESTS
Internet of Things(IoT), Machine Learning(ML) and Security

 

CONTACT: Phone: Email: amitava.nag@cit.ac.in
DOWNLOADS

Teaching Activities

  1. Advance Algorithms(Odd Semester2022)
  2. Machine Learning(Even Semester 2021,2023)
  3. Design and analysis of algorithm (Even Semester 2021,2022,2023)
  4. Advanced Computer Networks (Even Semester 2020)
  5. Design and analysis of algorithm (Odd Semester 2017, 2018, 2019,2021)
  6. Data structure (Odd Semester 2017, 2018, 2019,2020)
  7. Computer Networks (Even Semester 2019)
  8. E-commerce & ERP (Even Semester 2018, 2019, 2020,2021)
  9. Web Technology(Even Semester 2018)
ACHIEVMENTS:
  • Fellow of the Institution of Engineers (India)
  • Honoured with the designation of ACM (Association for Computing Machinery USA) senior member
  • Elected to the grade of IEEE(Institute of Electrical& Electronics Engineer )Senior Member

 

 

RESEARCHES:

https://scholar.google.co.in/citations?user=rzwLBjEAAAAJ&hl=en

 

https://orcid.org/0000-0003-4408-7307

 

Web of Science Researcher ID: C-5421-2016

 

Scopus Author ID: 36919086400

 

https://citkokrajhar.irins.org/profile/149437

 

PUBLICATIONS:
Research Publication 

Papers published in Journals

 

  • Subir Panja, Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh,Fuzzy-logic-based IoMT framework for COVID19 patient monitoring,Computers & Industrial Engineering, 2022,108941,ISSN 0360 8352, https://doi.org/10.1016/j.cie.2022.108941
  • Gupta, D.S., Mazumdar, N., Nag, Amitavaet al. Secure data authentication and access control protocol for industrial healthcare system. J Ambient Intell Human Comput (2023). https://doi.org/10.1007/s12652-022-04370-2
  • Karmakar, M.; Choudhury, B.; Patowary, R.; Nag, A. An IoT-Based Deep Learning Framework for Real-Time Detection of COVID-19 through Chest X-ray Images. Computers 2023, 12, 8. https:// doi.org/10.3390/computers12010008
  • Hota, A., Panja, S. & Nag, A. Lightweight CNN-based malware image classification for resource-constrained applications. Innovations Syst Softw Eng (2022). https://doi.org/10.1007/s11334-022-00461-7
  • Mazumdar, Nabajyoti,  Saugata Roy, Amitava Nag, and Jyoti Prakash Singh."A buffer-aware dynamic UAV trajectory design for data collection in  resource-constrained IoT frameworks", in the Computers and Electrical Engineering, March, 2022(Accepted) .
  • Mazumdar, Nabajyoti, Amitava Nag, and Jyoti Prakash Singh. "Cache-aware mobile data collection schedule for IoT enabled multi-rate data generator wireless sensor network." Sustainable Computing: Informatics and Systems 31 (2021): 100583.
  • Nabajyoti Mazumdar, Amitava Nag and Jyoti Prakash Singh, "Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT", in the Computers and Electrical Engineering, May, 2021(Accepted)[SCIE IF: 2.663] 
  • Nabajyoti Mazumdar, Saugata Roy, Amitava Nag and Sukumar Nandi, "An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network", in the Journal of Network and Computer Applications, Volume 186July 2021, 103097.[SCI Rank Q1, IF: 5.570].

  • Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh, "An Efficient Verifiable (t,n)-Threshold Secret Image Sharing Scheme with Ultralight Shares",Multimedia Tools and Applications, January- 2021(Accepted) [SCI - IF: 2.313].
  • Nabajyoti Mazumdar, Amitava Nag and Sukumar Nandi, "HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments", in the Ad Hoc Networks (Accepted)[SCI Rank Q1, IF: 3.643].
  • Apurbalal Senapati,Amitava Nag,A Mondal and S Maji, "A novel framework for COVID-19 case prediction through Piecewise Regression in India", in International Journal of Information Technology, Springer(Accepted).
  • Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh, Amit Kumar Singh, "A verifiable multi-secret image sharing scheme using XOR operation and hash function",Multimedia Tools and Applications, July- 2020, https://doi.org/10.1007/s11042-020-09174-0 [SCI - IF: 2.313]
  • Amitava Nag, Jyoti Prakash Singh, Amit Kumar Singh, "An efficient Boolean based Multi-secret Image Sharing Scheme", Multimedia Tools and Applications(Accepted), May - 2019,Doi.org/10.1007/s11042-019-07807-7 [SCI - IF: 2.313].
  • Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “A New (k,n) Secret Image Sharing Scheme (SISS)”, International Arab Journal of Information Technology, vol. 14,pp. 448 – 456(2017) [ SCI - IF: 0.724].
  • Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, ”Secure Data Outsourcing on Cloud Using Secret Sharing Scheme”, International Journal of Network Security . Vol. 19,No 6pp. 912 - 921, (2017).
  • Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, An Ideal Multi-Secret Sharing Scheme with Verification, Sensors & Transducers,vol. 209, pp. 65 – 73(2017).
  • Amitava Nag, Soni Choudhary, Suryadip Basu, and Subham Dawn. "An image steganography scheme based on LSB++ and RHTF for resisting statistical steganalysis." IEIE Transactions on Smart Processing & Computing 5, no. 4 (2016): 250-255.
  • Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “Semi Random Position Based Steganography for Resisting Statistical Steganalysis”, International Journal of Network Security Vol. 17,No 1pp. 57-65, Vol. 17,No 1pp. 57-65, (2015).
  • Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “Secret Image Sharing Scheme Based on Boolean Operation”, Cybernetics and Information Technologies Vol. 14,No 2, pp.98 - 112, (2014).
  • Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “A new (k, n) verifiable secret image sharing scheme (VSISS)”, Egyptian Informatics Journal Elsevier, Vol. 15,No 3, pp.201 – 209, ( 2014) [SCIE - IF : 3.119].

 

Papers published in Proceeding of Conferences

 

  • Choudhury, B., Dewri, N., Das, P., Nag, A. (2022). Blockchain-IoT Based Blood Supply Chain Management System. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481,pp. 356 - 368. Springer, Singapore. https://doi.org/10.1007/978-981-19-3182-6_29
  • Saha, S., Chattopadhyay, A.K., Mal, S.K., Nag, A. (2022). A Secure ‘e-Tendering’ Application Based on Secret Image Sharing. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481.pp, 64 - 77. Springer, Singapore. https://doi.org/10.1007/978-981-19-3182-6_6
  • Bikramjit Choudhury, Amitava Nag and Sukumar Nandi, "DTLS based secure group communication scheme for Internet of Things", in the 17th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), December 10-13, 2020.
  • Arun Kumar Chattonadhvav, Debalina Ghosh,  Ram Sekher Pati,  Amitava Nag, Sanchita Ghosh,” Visual Cryptography: Review and Analysis of Existing Methods”,  in the 6th Global Wireless Summit (GWS), November 25-28, 2018.
  • Arup Kumar Chattopadhyay, Paramita Maitra, Himadri Nath Saha, Amitava Nag, "A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography," in the IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), November 1 – 3, 2018.
  • Debalina Ghosh, Arup Kumar Chattopadhyay, Koustav Chanda, Amitava Nag, “A Secure Steganography Scheme Using LFSR”, in  the 1st International conference on Emerging Technology in Modelling and Graphics, September 6 – 7, 2018.
  • Soumadip Ghosh, Arnab Hazra, Bikramjit Choudhury, Payel Biswas, Amitava Nag, “A Comparative Study to the Bank Market Prediction”, in the 14th Machine Learning and Data Mining in Pattern Recognition(MLDM), July 15-19, 2018. 
  • Pradeep Kumar Roy, Jyoti Prakash Singh, Amitava Nag,“Finding Active Expert Users for Question Routing in Community Question Answering Sites”, in the 14th Machine Learning and Data Mining in Pattern Recognition(MLDM), July 15-19, 2018. 
  • Debalina Ghosh, Arup Kumar Chattopadhyay, Amitava Nag, “ A Novel Approach of Image Steganography with Encoding and Location Selection”, in the 1st International Ethical Hacking Conference, April 6 – 7, 2018.
  • Arup Kumar Chattopadhyay, Shayak Sadhu, Amitava Nag and Jyoti Prakash Singh, "An audio secret sharing using XOR operations with scalable shares," TENCON 2017 - 2017 IEEE Region 10 Conference, November  5 – 8, 2017.
  • Amitava Nag, Soni Choudhary, Subham Dawn, Suryadip Basu (2017), “Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)”, in the First International Conference on Intelligent Computing and Communication, February 18-19, 2016. 
  • Joydeep Choudhury, Indushree Banerjee, Amitava Nag, Indika Parera (2017), “Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)”, in the First International Conference on Intelligent Computing and Communication, February 18-19, 2016. 

 

Conferences/Workshops/Symposia attended 

Name of Conferences/Workshops/Symposia Place Date International/National
IEEE TENCON 2017 The Wembley St. Giles Premier Hotel, Penang Malaysia 5-8 November International

Powered by Froala Editor

COURSE ENGAGEMENT:
# Course Name Code Credits Semester
1 Data Structures and Algorithms UCSE301 4 3
Units Chapter Course Materials/Slides
5 Data Structures and Algorithms
STUDENTS SUPERVISED:

Phd Students

  • Arup Kumar Chattopadhyay (January 2019 – 2022)
  • Dersin Daimari (January 2019 – Continue)
  • Subir Panja (January 2019 – Continue)
  • Mithun Karmakar (January 2019 – Continue)
  • Puja Sarkar (July 2019 – Continue)
  •