Gravitational wave: generation and detection techniques. [SCI-Q2] Authors: Saibal Ray, R. Bhattacharya, Sanjay K. Sahay, Abdul Aziz and Amit Das Accepted, IJMPD, 2023.
An Investigation of Two-Step Cascaded CNN for the Detection of Gravitational Wave Signal from Two Different Astronomical Sources. [Scopus] Authors: Lokesh Kumar, Sanjay K. Sahay and Hrishikesh Govindrao Kusneniwar Procedia Computer Science, Vol. 222, PP. 676 - 684, 2023.
Adversarial Superiority in Android Malware Detection: Lessons from Reinforcement Learning based Evasion Attacks and Defenses. [SCI-Q1] Authors: Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay and Mohit Sewak Forensic Science International: Digital Investigation, Vol. 44, p. 301511 , 2023.
SAMPARK: Secure and Lightweight Communication Protocols for Smart Parking Management. [SCI-Q1] Authors: Trupil Limbasiya, Sanjay K Sahay and Debasis Das Journal of Information Security and Applications, Vol. 71, p. 103381, 2022.
Defending malware detection models against evasion based adversarial attacks. [SCI-Q1] Authors: Hemant Rathore, Animesh Sasan, Sanjay Kumar Sahay and Mohit Sewak Pattern Recognition Letters, Vol. 164, pp. 119-125, 2022.
Towards Adversarially Superior Malware Detection Models: An Adversary-Aware Proactive Approach using Adversarial Attacks and Defenses. [SCI-Q1] Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak Information Systems Frontiers, Vol. 25, pp. 567–587, 2023.
Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. [SCI-Q1] Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore Information Systems Frontiers, Vol. 25, pp. 589–611, 2023.
Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for Malware Detection and Forensics. [SCI-Q1] Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore Forensic Science International: Digital Investigation, Vol. 43, p. 301444, 2022.
GreenForensics: Deep Hybrid Edge-Cloud Detection and Forensics System for Battery-Performance-Balance Conscious Devices. [SCI-Q1] Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore Forensic Science International: Digital Investigation, Vol. 43, p. 301445, 2022.
Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks? [ESCI] Authors: Hemant Rathore, Sujay C Sharma, Sanjay K. Sahay and Mohit Sewak EAI Endorsed Transaction on Scalable Information Systems, sis 18: e74, 2022.
Advances in Secure Knowledge Management in the Artificial Intelligence Era. [SCI-Q1] Authors: Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya Information Systems Frontiers, Vol. 23, No. 4, p. 807, 2021.
Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses. [SCI-Q1] Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak Forensic Science International: Digital Investigation, Vol. 37, p. 301183, 2021.
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. [SCI-Q1] Authors: Trupil Limbasiya and Sanjay K. Sahay and Bharath Sridhar Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021.
DRLDO: A novel DRL based De-Obfuscation System for Defense against Metamorphic Malware. [SCI-Q2] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore Defence Science Journal, Vol. 71, Issue 1, pp. 55-65, 2021.
Robust Android Malware Detection System against Adversarial Attacks using Q-learning. [SCI-Q1] Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak Information Systems Frontiers, Vol. 23, No. 4, p. 867, 2021.
An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders. [Scopus] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore Journal of Computational and Theoretical Nanoscience, Vol. 17, No. 1, pp. 182-188, 2020.
An effective approach for classification of advanced malware with high accuracy. [Scopus] Authors: Ashu Sharma and Sanjay K. Sahay International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016.
Grouping the executables to detect malware with high accuracy. [Scopus] Authors: Sanjay K. Sahay and Ashu Sharma Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016.
A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data. [SCI-Q2] Authors: Aruna Govada and Sanjay K. Sahay Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016.
On the independent points in the sky for the search of periodic gravitational wave. [SCI-Q2] Author: Sanjay K. Sahay Romanian Reports in Physics, Vol. 61, No. 2, 191, 2009.
Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave. [SCI-Q2] Author: Sanjay K. Sahay International Journal of Modern Physics D, Vol. 15, No. 2, 225, 2006.
Matching of the continuous gravitational wave in an all sky search. [SCI-Q2] Author: Sanjay K. Sahay International Journal of Modern Physics D, Vol. 12, No. 7, 1227, 2003.
Data analysis of continuous gravitational wave: All sky search and study of templates. [SCI-Q1] Authors: D.C. Srivastava and Sanjay K. Sahay Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 322, 2002.
Data analysis of continuous gravitational wave: Fourier transform-II. [SCI-Q1] Authors: D.C. Srivastava and Sanjay K. Sahay Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 315, 2002.
Data analysis of continuous gravitational wave: Fourier transform-I. [SCI-Q1] Authors: D.C. Srivastava and Sanjay K. Sahay Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 305, 2002.
Group-wise classification approach to improve Android malicious apps detection accuracy. Authors: Ashu Sharma and Sanjay K. Sahay International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019.
Cluster labelling using chi-square-based keyword ranking and mutual information score: A hybrid approach. Authors: R.K. Roul and Sanjay K. Sahay Inderscience, Int. J. Intelligent Systems Design and Computing, Vol. 1, No. 1/2, pp. 145 - 167, 2017.
Extreme Learning Machines in the field of Text Classification. Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay International Journal of Computer & Information Science, Vol. 16, No. 3, p. 34, 2015.
A Novel Approach to Distributed Multi-Class SVM. Authors: Aruna Govada, Shree S S. Ranjani, Aditi Viswanathan, Sanjay K. Sahay Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014.
Evolution and Detection of Polymorphic and Metamorphic Malware: A Survey. Authors: Ashu Sharma and Sanjay K. Sahay International Journal of Computer Applications, Vol. 90, No. 2, p. 7, 2014.
An effective web document clustering for information retrieval. Authors: R.K. Roul and Sanjay K. Sahay International Journal of Computer Science and Management Research, Vol. 1, No. 3, p. 481, 2012.
An effective information retrieval for ambiguous query. Authors: R.K. Roul and Sanjay K. Sahay Asian Journal of Computer Science and Information Technology, Vol. 2, No. 3, p. 26, 2012.
An Effective Approach for Web Document Classification using the Concept of Association Anal- ysis of Data Mining. Authors: R.K. Roul and Sanjay K. Sahay International Journal of Computer Science & Engineering Technology, Vol. 3, No. 10, p. 483, 2012.
Refereed Conferences:
Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. [Core-A] Authors: Hemant Rathore, S. S. Iyengar, Sanjay K. Sahay International Conference on Computational Science, 535 - 550, 2023.
RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries. [Core-A] Authors: A. Nandanwar, Hemant Rathore, Sanjay K. Sahay, Mohit Sewak International Conference on Computational Science, 77 - 92, 2023.
Defending malware detection models against evasion based adversarial attacks. [Core-A*] Authors: Hemant Rathore, Animesh Sasan, Sanjay K. Sahay and Mohit Sewak IEEE, NDSS (Poster)-2023.
Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense against Metamorphic Ransomware Swarm Attack. [Core-B] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore BROADNETS, pp. 31-50, 2023.
Android Malware Detection based on Static Analysis and Data Mining Techniques: A Systematic Literature Review. [Core-B] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore BROADNETS, pp. 51-71, 2023.
MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection. [Core-B] Authors: Hemant Rathore, Ajay Kharat, Rashmi T, Adithya Manickavasakam, Sanjay K. Sahay and Mohit Sewak BROADNETS, pp. 72-92, 2023.
Are Malware Detection Models Adversarial Robust Against Evasion Attack. [Core-A*] Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak IEEE, INFOCOM-2022, Conference on Computer Communications Workshops (INFOCOM-2022), 2022.
X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation. [Core-A*] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, International Conference on Pervasive Computing and Communication (PerCom-2022), pp. 169-174, 2022.
Image-based Android Malware Detection Models using Static and Dynamic Features. [Core-C] Authors: Hemant Rathore, B Raja Narasimhan, Sanjay K. Sahay, Mohit Sewak Springer, LNNS, ISDA-2021, Volume 418, pp. 1292–1305, 2022.
Are CNN based Malware Detection Models Robust? Developing Superior Models using Adversarial Attack and Defense. [Core-A*] Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak ACM, Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, p. 355 - 356, 2021 .
Adversarial Robustness of Image based Android Malware Detection Models. [Scopus] Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay and Mohit Sewak Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 3-22, 2022.
Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models. [Core-C] Authors: Jyotiprakash Mishra, Sanjay K. Sahay, Hemant Rathore and Lokesh Kumar IEEE, 26th IEEE Asia-Pacific Conference on Communications (APCC), pp. 161-165, 2021.
Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. [Scopus] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 51-72, 2022.
DRo: A Data-Scarce Mechanism to Revolutionize the Performance of DL-Based Security Systems. [Core-B] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, 46th Conference on Local Computer Networks (LCN), p. 581-588, 2021.
Identification of Adversarial Android Intents using Reinforcement Learning. [Core-A] Authors: Hemant Rathore, Piyush Nikam, Sanjay K. Sahay and Mohit Sewak IEEE, International Joint Conference on Neural Networks (IJCNN), 1-8, 2021.
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. [Core-A] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator. [Core-A] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.
Towards Robust Android Malware Detection Models using Adversarial Learning. [Core-A*] Authors:Hemant Rathore and Sanjay K. Sahay IEEE, International Conference on Pervasive Computing and Communications Work- shops, pp. 424 - 425, 2021.
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. [Core-A] Authors: Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak IEEE, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 29 - 32, 2021.
Are Android Malware Detection Models Adversarially Robust? [Core-A*] Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak ACM, 20th International Conference on Information Processing in Sensor Networks, pp. 408 - 409, 2021.
Policy-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore Springer, Lecture Notes in Networks and Systems (ICTCS 2020), Vol. 191, pp. 493 - 507, 2021.
Identification of Significant Permissions for Efficient Android Malware Detection. [Core-B] Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi and Mohit Sewak Springer, LNICST, Vol. 355, pp. 33-52, Proceedings BROADNETS-2020, 2021.
Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. -B] [Core-B] Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral and Mohit Sewak Springer, LNICST, Vol. 355, pp. 109-128, Proceedings BROADNETS-2020, 2021.
How Robust are Malware Detection Models for Android Smartphones against Adversarial Attacks? [Core-A*] Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak ACM, Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys), pp. 683-684, 2020.
DOOM: A Novel Adversarial-DRL-based Op-Code Level Metamorphic Malware Obfuscator for the enhancement of IDS. [Core-A*] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore ACM, Proceedings International Joint Conference on Pervasive and Ubiquitous Computing, pp. 131-134, 2020
DeepIntent: ImplicitIntent Based Android IDS with E2E Deep Learning Architecture. [Core-B] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, p. 1-6, 2020
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. [Core-C] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, TENCON-2020, pp. 414-419, 2020.
Value-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, 5th International Conference on Computing Communication and Automation, pp. 379-384, 2020.
A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery. Authors: Shriya Gupta and Sanjay K. Sahay Springer, International Neural Networks Society, Proceedings of the 21st Engineering Applications of Neural Networks, Vol. 2, pp. 227-239, 2020.
Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture. [Scopus] Authors: Trupil Limbasiya and Sanjay K. Sahay Springer, Communications in Computer and Information Science, Proceeding SKM-2019, Vol. 1186, pp. 82-97, 2020.
Secure communication protocol for smart transportation based on vehicular cloud. [Core-A*] Authors: Trupil Limbasiya, Debasis Das and Sanjay K Sahay ACM, pp. 372-376, International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019.
A Survey on the Detection of Android Malicious Apps. [Scopus] Authors: Sanjay K. Sahay and Ashu Sharma Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 437-446, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.
An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU. [Scopus] Authors: Sanjay K. Sahay and Mayank Chaudhari Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 255-262, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.
Evolution of Malware and its Detection Techniques. [Scopus] Authors: Sanjay K. Sahay and Ashu Sharma Springer, Information and Communication Technology for Sustainable Development, Vol. 933, pp 139-150, 2019, Proceedings ICT4SD, 2018.
A Survey on the Detection of Windows Desktops Malware. [Scopus] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore Springer, Ambient Communications and Computer Systems (AISC), Vol. 904, pp. 149-159, 2019, Proceedings RACCCS, 2018.
Android Malicious Application Classification Using Clustering. [Core-C] Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, and Mohit Sewak Springer, Springer, Intelligent Systems Design and Applications (AISC) Vol. 941, pp 659-667, 2019, Proceedings ISDA, 2018. .
Malware Detection using Machine Learning and Deep Learning. [Scopus] Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, and Mohit Sewak Springer, LNCS, Vol. 11297, pp. 402-411, 2018, Proceedings BDA-2018.
An investigation of a deep learning based malware detection system. [Core-B] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany.
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. [Core-C] Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018.
Detection of Advanced Malware by Machine Learning Techniques. [Scopus] Authors: Sanjay Sharma, Rama Krishna and Sanjay K. Sahay Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 333-342, 2018, Proceedings Soft Computing: Theories and Applications (2017).
Categorizing Text Data using Deep Learning: A Novel Approach. [Scopus] Authors: R.K. Roul and Sanjay K. Sahay Springer Advances in Intelligent Systems and Computing, pp. 793-805, AISC Vol. 711, 2018, Proceedings ICCIDM-2017.
An investigation of the classifiers to detect Android malicious apps. [Scopus] Authors: Ashu Sharma and Sanjay K. Sahay Springer, Information and Communication Technology, 625, p. 207 - 217, 2017, Proceedings, ICICT, 2016.
Distributed multi-class rule based classification using RIPPER. [Core-C] Authors: Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay IEEE Xplore, 978-1-5090-4314-9/16, pp. 303 - 309, IEEE Computer Society, 2016 IEEE International Conference on Computer and Information Technology, 2017.
Semi-supervised Clustering using Seeded-kMeans in the Feature Space of ELM. [Scopus] Authors: R.K. Roul and Sanjay K. Sahay IEEE Xplore, DOI: 10.1109/INDICON.2016.7838892, Proceedings, India Conference (INDICON), 2016 IEEE Annual, 2017.
Combining Apriori Approach with Support Based Count Technique to Cluster the Web Documents. [Scopus] Authors: R.K. Roul and Sanjay K. Sahay Springer, Computational Intelligence in Data Mining, Proceedings ICCIDM (2016), Vol. 556, pp 119-132, 2017.
Covariance estimation for Vertically partitioned data in a Distributed environment. [Core-C] Authors: Aruna Govada and Sanjay K. Sahay Springer, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016. Proceedings, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016.
Improving the detection accuracy of unknown malware by partitioning the executables in groups. [Scopus] Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421-431, 2016; Proceedings 9th ICACCT, 2015.
K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification. [Scopus] Authors: R.K. Roul and Sanjay K. Sahay Springer, LNCS, Distributed Computing and Internet Technology, Vol. 9581, p. 103, Proceedings 12th ICDCIT, 2016.
Extreme Learning Machines in the field of Text Classification. [Core-C] Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay IEEE Xplore, DOI: 10.1109/SNPD.2015.7176204, Proceedings 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2015), Japan.
Distributed Multi Class SVM for Large Data Sets. [Scopus] Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay ACM Digital Library, PP. 54-58, Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015.
Centroid Based Binary Tree Structured SVM for Multi Classification. [Scopus] Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay IEEE Xplore, DOI: 10.1109/ICACCI.2015.7275618, Proceedings Fourth International Conference on Advances in Computing, Communications and Informatics, 2015.
Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine. [Scopus] Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, and Sanjay K. Sahay Springer, LNAI, Machine Learning and Data Mining in Pattern Recognition, Vol. 9166, p. 199; Proceedings 11th International Conference MLDM, Germany, 2015.
Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach. [Scopus] Authors: Rajendra Kumar Roul, Sachin Joglekar and Sanjay K. Sahay IEEE Xplore, DOI: 10.1109/ICHPCA.2014.7045347, Proceedings, ICHPCA, 2014.
A Novel Modified Apriori Approach for Web Document Clustering. [Scopus] Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra and Sanjay K. Sahay Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings ICCIDM, 2014.
Web Document Clustering and Ranking using Tf-Idf based Apriori Approach. Authors: R.K. Roul, O.R. Devanand and Sanjay K. Sahay International Journal of Computer Applications, No. 2, p. 34, 2014, Proceedings ICACEA.
Books Published and Edited:
Data Analysis of Gravitational Waves. Authors: Sanjay K. Sahay Publisher: Svenska fysikarkivet, Sweden, 2008, ISBN: 978-91-85917-05-1
Secure Knowledge Management In The Artificial Intelligence Era, Proceedings, 9th Internationale Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021. Editors: Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani and Ziming Zhao Publisher: Springer, Communications in Computer and Information Science, 2022, ISBN: 978-3-030-97532-6
Special issue on Advances in Secure Knowledge Management in the Artificial Intelligence Era. Editors: Sanjay K Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya Publisher: pringer, Information Systems Frontiers, 2021, ISSN: 1387-3326
Secure Knowledge Management In Artificial Intelligence Era, Proceedings, 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019. Editors: Sanjay K. Sahay, Nihita Goel, Vishwas Patil and Murtuza Jadliwala Publisher: Springer, Communications in Computer and Information Science, 2020, ISBN: 978-981-15-3816-2
Contribution to Conferences/ArXiv:
An effective distributed data mining for Astronomical Data. Authors: Aruna Govda and S.K. Sahay Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.
An effective approach for web document clustering. Authors: R.K. Roul and S.K. Sahay Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.
An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining. Author: R.K. Roul and S.K. Sahay Ref: arXiv:1406.5616
Studies in gravitational wave data analysis. Author: S.K. Sahay Ref: arXiv:gr-qc/0209019, Ph.D Thesis
Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: I. Authors: D.C. Srivastava and Sanjay K. Sahay Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.
Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: II. Authors: D.C. Srivastava and Sanjay K. Sahay Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.
All Sky Search for Continuous Gravitational Waves. Authors: D.C. Srivastava and S.K. Sahay 21st Meeting of the Indian Association for General Relativity and Gravitation, Central India Research Institute, Nagpur, India, Jan. 30 - Feb. 01, 2001.
Data Analysis of Continuous Gravitational Wave: Fourier Transform. Authors: D.C. Srivastava and S.K. Sahay 20th Astronomical Society of India Meeting and National Symposium on Multiwavelength Astronomy, DDU. Gorakhpur University, Gorakhpur, India, Nov. 15 - 18, 2000.
Data analysis of continuous gravitational wave signal: Fourier transform. Authors: D.C. Srivastava and S.K. Sahay Ref: arXiv:gr-qc/0009094
A Study of Number of Patches in the Sky for the Pulsar Search for Gravitational Radiation. Authors: D.C. Srivastava and S.K. Sahay Conference on Recent Developments in General Relativity and Allied Topics, Aligarh Muslim University, Aligarh, India, Aug. 30 - Sept. 01, 1999.
Detection of Continuous Gravitational Waves from Rotating Rigid Newtonian Body: Pulsars. Authors: D.C. Srivastava and S.K. Sahay 20th Meeting of the Indian Association for General Relativity and Gravitation and National Symposium on Currents Trends in Gravitation and Cosmology, DDU Gorakhpur Universtiy, Gorakhpur, India, Jan. 20 - 21, 1999.