Research Publication
Papers published in Journals
- Subir Panja, Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh,Fuzzy-logic-based IoMT framework for COVID19 patient monitoring,Computers & Industrial Engineering, 2022,108941,ISSN 0360 8352, https://doi.org/10.1016/j.cie.2022.108941
- Gupta, D.S., Mazumdar, N., Nag, Amitava. et al. Secure data authentication and access control protocol for industrial healthcare system. J Ambient Intell Human Comput (2023). https://doi.org/10.1007/s12652-022-04370-2
- Karmakar, M.; Choudhury, B.; Patowary, R.; Nag, A. An IoT-Based Deep Learning Framework for Real-Time Detection of COVID-19 through Chest X-ray Images. Computers 2023, 12, 8. https:// doi.org/10.3390/computers12010008
- Hota, A., Panja, S. & Nag, A. Lightweight CNN-based malware image classification for resource-constrained applications. Innovations Syst Softw Eng (2022). https://doi.org/10.1007/s11334-022-00461-7
- Mazumdar, Nabajyoti, Saugata Roy, Amitava Nag, and Jyoti Prakash Singh."A buffer-aware dynamic UAV trajectory design for data collection in resource-constrained IoT frameworks", in the Computers and Electrical Engineering, March, 2022(Accepted) .
- Mazumdar, Nabajyoti, Amitava Nag, and Jyoti Prakash Singh. "Cache-aware mobile data collection schedule for IoT enabled multi-rate data generator wireless sensor network." Sustainable Computing: Informatics and Systems 31 (2021): 100583.
- Nabajyoti Mazumdar, Amitava Nag and Jyoti Prakash Singh, "Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT", in the Computers and Electrical Engineering, May, 2021(Accepted)[SCIE IF: 2.663]
-
Nabajyoti Mazumdar, Saugata Roy, Amitava Nag and Sukumar Nandi, "An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network", in the Journal of Network and Computer Applications, Volume 186, July 2021, 103097.[SCI Rank Q1, IF: 5.570].
- Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh, "An Efficient Verifiable (t,n)-Threshold Secret Image Sharing Scheme with Ultralight Shares",Multimedia Tools and Applications, January- 2021(Accepted) [SCI - IF: 2.313].
- Nabajyoti Mazumdar, Amitava Nag and Sukumar Nandi, "HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments", in the Ad Hoc Networks (Accepted)[SCI Rank Q1, IF: 3.643].
- Apurbalal Senapati,Amitava Nag,A Mondal and S Maji, "A novel framework for COVID-19 case prediction through Piecewise Regression in India", in International Journal of Information Technology, Springer(Accepted).
- Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh, Amit Kumar Singh, "A verifiable multi-secret image sharing scheme using XOR operation and hash function",Multimedia Tools and Applications, July- 2020, https://doi.org/10.1007/s11042-020-09174-0 [SCI - IF: 2.313]
- Amitava Nag, Jyoti Prakash Singh, Amit Kumar Singh, "An efficient Boolean based Multi-secret Image Sharing Scheme", Multimedia Tools and Applications(Accepted), May - 2019,Doi.org/10.1007/s11042-019-07807-7 [SCI - IF: 2.313].
- Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “A New (k,n) Secret Image Sharing Scheme (SISS)”, International Arab Journal of Information Technology, vol. 14,pp. 448 – 456(2017) [ SCI - IF: 0.724].
- Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, ”Secure Data Outsourcing on Cloud Using Secret Sharing Scheme”, International Journal of Network Security . Vol. 19,No 6pp. 912 - 921, (2017).
- Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, An Ideal Multi-Secret Sharing Scheme with Verification, Sensors & Transducers,vol. 209, pp. 65 – 73(2017).
- Amitava Nag, Soni Choudhary, Suryadip Basu, and Subham Dawn. "An image steganography scheme based on LSB++ and RHTF for resisting statistical steganalysis." IEIE Transactions on Smart Processing & Computing 5, no. 4 (2016): 250-255.
- Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “Semi Random Position Based Steganography for Resisting Statistical Steganalysis”, International Journal of Network Security Vol. 17,No 1pp. 57-65, Vol. 17,No 1pp. 57-65, (2015).
- Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “Secret Image Sharing Scheme Based on Boolean Operation”, Cybernetics and Information Technologies Vol. 14,No 2, pp.98 - 112, (2014).
- Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, “A new (k, n) verifiable secret image sharing scheme (VSISS)”, Egyptian Informatics Journal Elsevier, Vol. 15,No 3, pp.201 – 209, ( 2014) [SCIE - IF : 3.119].
Papers published in Proceeding of Conferences
- Choudhury, B., Dewri, N., Das, P., Nag, A. (2022). Blockchain-IoT Based Blood Supply Chain Management System. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481,pp. 356 - 368. Springer, Singapore. https://doi.org/10.1007/978-981-19-3182-6_29
- Saha, S., Chattopadhyay, A.K., Mal, S.K., Nag, A. (2022). A Secure ‘e-Tendering’ Application Based on Secret Image Sharing. In: Giri, D., Mandal, J.K., Sakurai, K., De, D. (eds) Proceedings of International Conference on Network Security and Blockchain Technology. ICNSBT 2021. Lecture Notes in Networks and Systems, vol 481.pp, 64 - 77. Springer, Singapore. https://doi.org/10.1007/978-981-19-3182-6_6
- Bikramjit Choudhury, Amitava Nag and Sukumar Nandi, "DTLS based secure group communication scheme for Internet of Things", in the 17th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), December 10-13, 2020.
- Arun Kumar Chattonadhvav, Debalina Ghosh, Ram Sekher Pati, Amitava Nag, Sanchita Ghosh,” Visual Cryptography: Review and Analysis of Existing Methods”, in the 6th Global Wireless Summit (GWS), November 25-28, 2018.
- Arup Kumar Chattopadhyay, Paramita Maitra, Himadri Nath Saha, Amitava Nag, "A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography," in the IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), November 1 – 3, 2018.
- Debalina Ghosh, Arup Kumar Chattopadhyay, Koustav Chanda, Amitava Nag, “A Secure Steganography Scheme Using LFSR”, in the 1st International conference on Emerging Technology in Modelling and Graphics, September 6 – 7, 2018.
- Soumadip Ghosh, Arnab Hazra, Bikramjit Choudhury, Payel Biswas, Amitava Nag, “A Comparative Study to the Bank Market Prediction”, in the 14th Machine Learning and Data Mining in Pattern Recognition(MLDM), July 15-19, 2018.
- Pradeep Kumar Roy, Jyoti Prakash Singh, Amitava Nag,“Finding Active Expert Users for Question Routing in Community Question Answering Sites”, in the 14th Machine Learning and Data Mining in Pattern Recognition(MLDM), July 15-19, 2018.
- Debalina Ghosh, Arup Kumar Chattopadhyay, Amitava Nag, “ A Novel Approach of Image Steganography with Encoding and Location Selection”, in the 1st International Ethical Hacking Conference, April 6 – 7, 2018.
- Arup Kumar Chattopadhyay, Shayak Sadhu, Amitava Nag and Jyoti Prakash Singh, "An audio secret sharing using XOR operations with scalable shares," TENCON 2017 - 2017 IEEE Region 10 Conference, November 5 – 8, 2017.
- Amitava Nag, Soni Choudhary, Subham Dawn, Suryadip Basu (2017), “Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)”, in the First International Conference on Intelligent Computing and Communication, February 18-19, 2016.
- Joydeep Choudhury, Indushree Banerjee, Amitava Nag, Indika Parera (2017), “Progressing the Security Landscape of Cloud by Incorporating Security Service Level Agreement (Sec-SLA)”, in the First International Conference on Intelligent Computing and Communication, February 18-19, 2016.
Conferences/Workshops/Symposia attended
Name of Conferences/Workshops/Symposia |
Place |
Date |
International/National |
IEEE TENCON 2017 |
The Wembley St. Giles Premier Hotel, Penang Malaysia |
5-8 November |
International |
Powered by Froala Editor