Anomaly Detection in WBANs using CNN-Autoencoders and LSTMs, Kartikeya Dubey, and Chittaranjan Hota, 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, LNDECT Vol:201, Springer, pp. 187-197, April 2024.
Eye Movement Tracking for Computer Vision Syndrome using Deep Learning Techniques, Manan Popat, Vibhum Raj Tripathi, Divyan Goyal, Nirmal Jayabalan, and Chittaranjan Hota, 6th IEEE International Conference on Artificial Intelligence in Information and Communication, Osaka University, Osaka, Japan, IEEE Xplore, pp. 317-322. Feb 2024.
Role of Artificial Intelligence in Toxicity Prediction of Drugs, Manisha Malani, Anirudh Kasturi, Md. Moinul, Shovanlal Gayen, Chittaranjan Hota, and Jayabalan Nirmal, In: Mohanan P.V, Kappalli S (eds), Biomedical Applications and Toxicity of Nanomaterials, Springer, pp. 589-636, May 2023.
STONE: When Split meets Transfer for One Shot Learning, Akshat Agrawal, Anirudh Kasturi, and Chittaranjan Hota, The 37th AAAI Conference on Artificial Intelligence (AAAI-23), The Fourth AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-23), (Core A*), Washington DC, USA, Feb 7th-14th 2023.
Distributed Learning of Pure Non-IID data using Latent Codes, Anirudh Kasturi, Akshat Agrawal and Chittaranjan Hota, 17th IEEE International Conference on Ubiquitous Information Management and Communication (IMCOM 2023), pp. 1-6, South Korea, Jan 2023, IEEE Xplore.
Secure Peer to Peer Learning using Auto Encoders, Anirudh Kasturi, Akshat Agrawal, and Chittaranjan Hota, IEEE International Symposium on Smart Electronic Systems (2022 IEEE iSES), Dec 2022, pp. 236-241, IEEE Xplore.
Continuous Cloud User Authentication By Efficient Facial Recognition, Soumya Prakash Otta, Siddharth K, Vijay Malhotra, Aman Raj, Subhrakanta Panda and Chittaranjan Hota, 5th IEEE International Conference on Computational Intelligence and Networks (CINE 2022), pp. 1-6, India, Dec 2022, IEEE Xplore.
Identity Management with Blockchain: Indian Migrant Workers Prospective, Soumya Prakash Otta, Subhrakanta Panda and Chittaranjan Hota, IEEE International conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IEEE IATMSI-2022), ABV-IIITM, Gwalior, Dec 2022.
An efficient approach to kNN algorithm for IoT devices, Bhavesh Gawri, Anirudh Kasturi, Lalita Bhanu Murthy Neti, and Chittaranjan Hota , 14th International Conference on COMmunication Systems & NETworks, January '22, Bengaluru, 2022, IEEE, pp. 734-738.
Heuristix: Adaptive event processing using lightweight machine learning approaches on edge devices, Sanket Mishra, Shubham Arawkar, Sashikant Singh, Ankit Shibu, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
FedPeer: A Peer to Peer learning framework using Federated Learning, Anirudh Kasturi, Raviteja Sivaraju, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
Vertical Fusion: A Distributed Learning Approach for Vertically Partitioned Data, Anirudh Kasturi, Ameya Salankar, Sharath S Chandra, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
Sequential Anomaly Detection using Feedback and Prioritized Experience Replay, Anish Reddy Ellore, Sanket Mishra, and Chittaranjan Hota, 14th International Conference on Network and System Security, In: Kutylowski M et al. (eds), NSS 2020, Melbourne, Australia, LNCS, vol. 12570, pp. 245-260, Nov 2020 (Core B).
Real-time Probabilistic Approach for Traffic Prediction on IoT Data Streams, Sanket Mishra, Raghunathan B, Ankit S, and Chittaranjan Hota, 27th International Conference on Neural Information Processing (ICONIP 2020), In: Yang H et al. (eds), Neural Information Processing, CCIS, vol. 1333, Springer, Nov 2020 (Core A).
An Evolutionary Approach for Congestion Prediction on IoT data streams in Smart City Environment, Sanket Mishra, Ankit S, Raghunathan B, and Chittaranjan Hota, 14th International FLINS Conference on Robotics and Artificial Intelligence, Developments of Artificial Intelligence Technologies in Computation and Robotics, World Scientific, Vol. 12, Germany, pp. 84-92, Aug 2020 (Core B).
Fusion Learning: A One Shot Federated Learning, Anirudh Kasturi, Anish Reddy Ellore, and Chittaranjan Hota (2020), In: Krzhizhanovskaya V. et al. (eds), Computational Science – ICCS 2020, ICCS 2020, Lecture Notes in Computer Science, Vol 12139, pp. 424-436, Springer (Core A).
Code-Tampering Defense for Internet of Things Using System Call Traces. Shrivastava R. K., Hota Chittaranjan. In: Rautaray S., Eichler G., Erfurth C., Fahrnberger G. (eds) Innovations for Community Services. I4CS 2020. Communications in Computer and Information Science, vol 1139. Springer, Cham.
Reputation-Based Reinforcement Algorithm for Motivation in Crowdsourcing Platform, A Vijayalakshmi, and Chittaranjan Hota, Second International Conference on Computational Intelligence, In: S K Sahana, Bhattacharjee V (eds), Advances in Intelligent Systems and Computing (AISC), Vo: 988, Springer, pp. 175-186, 2020, Scopus Indexed.
Preventing data tampering in IoT networks, Rajesh Kumar Srivastava, Sanket Mishra, Archana E, and Chittaranjan Hota, IEEE International Conference on Advanced Networks and Telecommunications Systems, IEEE ANTS 2019, Goa, India, Dec 2019. Scopus Indexed.
UnderTracker: Binary Hardening Through Execution Flow Verification, Rajesh Srivastava, Chittaranjan Hota, Govind Mittal, and Zahid Akhtar, In: Sahay S, Goel N, Patil V, Jadliwala M (eds), Secure Knowledge Management in Artificial Intelligence Era (SKM 2019), Communications in Computer and Information Science (CCIS), Vol: 1186, Springer, pp. 3-20. Scopus Indexed.
Code tamper-proofing using dynamic canaries, Rajesh Kumar Srivastava, Kevin Jude Concessao, and Chittaranjan Hota, 25th Asia-Pacific Conference on Communications (APCC 2019), IEEE ComSoc, Ho Chi Minh City, Vietnam, Nov 2019. Scopus Indexed, IEEE Xplore.
IoT Threats: Risk Analysis using Honeypots, Rajesh Kumar Srivastava, and Chittaranjan Hota, All India Seminar on Cyber Security and Image Processing, The Institution of Engineers (IE, India), Telangana State Centre, Hyderabad, 10th-11th August 2019.
An ensemble approach with differential evolution optimization to detect occupancy in IoT environments, Sanket Mishra, Sarthak Rajwanshi, and Chittaranjan Hota, First International Conference on Intelligent Computing (ICIC 2018), Amrita University, Bangalore, Oct 2018.
Social media and Machine computation for Task Assignment in Crowdsourcing platform, A Vijayalakshmi, and Chittaranjan Hota, IEEE International Conference on Innovative Technologies in Engineering (ICITE-2018), 11th-13th April 2018, University College of Engineering, Osmania University, Hyderabad, IEEE Xplore.
Intelligent Task Assignment in Crowdsourcing Platform, A Vijayalakshmi, and Chittaranjan Hota (2018) In: Chakraverty S., Goel A., Misra S. (eds), Towards Extensible and Adaptable Methods in Computing, Springer, pp. 339-350, Singapore.
Honeynet Data Analysis and Distributed SSH Brute-Force Attacks, Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan (2018) In: Chakraverty S., Goel A., Misra S. (eds), Towards Extensible and Adaptable Methods in Computing, Springer, pp. 107-118, Singapore.
Task assignment in Crowd sourcing using vector space model, A. Vijayalakshmi, and Chittaranjan Hota, International Journal of Pure and Applied Mathematics, Vol.116, Issue 23 (Special issue), Academic pub., 2017, Scopus Indexed, pp. 605-609.
Resilient Complex Event Processing in IoT using Side-channel Information, Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, and Chittaranjan Hota, 10th ACM International Conference on Security of Information and Networks (SIN'17), ACM ICPS, ACM Digital library, SIGSAC, 13th-15th Oct 2017, India.
Tamper-Resistant Code Using Optimal ROP Gadgets for IoT Devices, Chittaranjan Hota, Rajesh Kumar Shrivastava, and Shivangi Shipra, 13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), University of Valencia, Spain, IEEE Xplore, June 2017, pp.570-575.
Energy efficient IoT framework for smart buildings, Sameer Dharur, K Swaminathan, and Chittaranjan Hota, IEEE International Conference on IoT in Social, Analytics and Cloud (I-SMAC 2017), Coimbatore, TN, India, IEEE Xplore, Feb 2017.
Attack Identification Framework for IoT Devices, Jagan Mohan Reddy, and Chittaranjan Hota, Third International Conference on Information Systems Design and Intelligent Applications, January 2016, Vol. 434, Advances in Intelligent Systems and Computing, Springer, pp. 505-513.
Quality of Service Enforcing Centrally Optimized Routing for Delay Tolerant Networks, Abhishek Thakur, and Chittaranjan Hota, IEEE 18th International Symposium on Wireless Personal Multimedia Communications (WPMC), 13th-16th Dec 2015, Hyderabad.
Behavior-based P2P Traffic Identification using Fuzzy Approach, Jagan Mohan Reddy, Chittaranjan Hota, and M Rajarajan, IEEE International Conference on Applied and Theoretical Computing and Communication Technologies (iCATccT), Oct 2015, IEEE Xplore.
Heuristic-based Real-time P2P Traffic Identification, Jagan Mohan Reddy, and Chittaranjan Hota, The 2nd International Research Conference on Emerging Information Technology and Engineering Solutions (EITES 2015), Feb 2015, Pune, IEEE, CPS, pp. 38-43, ISBN:978-1-4799-1838-6, IEEE Xplore.
Scalable Honeypot Architecture for Identifying Malicious Network activities, S Gokul Kannan, and Chittaranjan Hota, The 2nd International Research Conference on Emerging Information Technology and Engineering Solutions (EITES 2015), Feb 2015, Pune, IEEE, CPS, pp. 27-31, ISBN:978-1-4799-1838-6, IEEE Xplore.
Efficient Detection of Malwares using Low-interaction Honeypots, S Gokul Kannan, and Chittaranjan Hota, National Conference on Intelligent Systems, Computing and Information Technology (NCICIT'14), 4th-5th April 2014, Anna University, Tiruchirappalli, TN, India, April, 2014.
Distributed Scheduling on Utility Grids, Sunita Bansal, and Chittaranjan Hota, Romanian Journal of Information Science and Technology (SCI Expanded), Vol.16, No.4, 2013, pp. 373-392.
Honeypot Challenges and Countermeasures, S Gokul Kannan, and Chittaranjan Hota, Symposium on Information Security, BITS-Pilani Hyderabad Campus, Hyderabad, 15-16 November 2013 (Poster)
P2P Traffic Classification using Ensemble Learning, Jagan Mohan Reddy, and Chittaranjan Hota, 5th IBM Collaborative Academia Research Exchange(I-CARE 2013), IBM, New Delhi, India, ACM Digital Library,Oct 2013.
Feature Selection for Optimizing Detection of P2P Botnet Traffic, Pratik Narang, Jagan Mohan Reddy and Chittaranjan Hota, The 6th ACM India Computing Convention on Next Generation Computing Paradigms and Technologies, ACM Digital Library, 22nd-24th August 2013, (ACM Compute 2013), India.
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks, Chittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, and A. Y. Jaaski, 8th International Conference on Grid and Pervasive Computing, Seoul, KOREA, Arabnia H.R, Kim C, Shi W, Gil J (Eds), Lecture Notes in Computer Science 7861, May 2013.
P2P Traffic Classification for Intrusion Detection Systems, Jagan Mohan, Pratik Narang, Chittaranjan Hota, Prafulla Kumar, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
Packet Anonymization: Preserving Privacy for DPI in P2P Realm, Sarath Chandra G, Vikram Nunia, Abhishek Thakur, and Chittaranjan Hota, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
Approaches for Measuring P2P Classification Efficiency for Intrusion Detection and Prevention Systems, Jagan Mohan, A. Thakur, and C. R. Hota, First National Conference on Cyber Security, NCCS 2012, Defence Institute of Advanced Technology(DU), Pune, India, June 7-8, 2012.
Resilient GIA, Rusheel Jain, and Chittaranjan Hota, Second Student Research Symposium, ICDCIT 2012, Bhubaneswar, International Journal of Computer and Communication Technology, IJCCT Special Issue, pp. 26-31, Feb 2012.
Efficient Algorithm on Heterogeneous Computing Systems, S Bansal, and Chittaranjan Hota, Proc. of International Conference on Recent Trends in Information Systems (ReTIS 2011), Jadavpur University, Kolkata, Dec 2011, pp. 57-61, India, IEEE Xplore.
Improved Object Lookup in Unstructured Peer-to-Peer Overlay Networks, Chittaranjan Hota, Gaurav K, Prasanna G, Sathya M, Hrushikesha Mohanty, and Muttukrishnan Rajarajan, Fourth International Conference on Recent Trends in Computing, Communication & Information Technologies, VIT, Vellore, P.V. Krishna, M.R. Babu, and E. Ariwa (Eds.), ObCom 2011, Communications in Computer and Information Science (CCIS 269), Springer, pp. 237-244, Dec 2011.
A Resilient Voting Scheme for Improving Secondary Structure Prediction, Chittaranjan Hota, Filippo Ledda, and Giuliano Armano, Fifth Multi-disciplinary International Workshop on Artificial Intelligence (MIWAI 2011), University of Hyderabad, Hyderabad, C. Sombattheera et al.(Eds.), Lecture Notes in Artificial Intelligence (LNAI 7080), Springer, pp. 339-350, Dec 2011.
Secure Web Services Negotiation, V Mohanty, and Chittaranjan Hota, CCSEIT 2011, Tirunelveli, Tamilnadu, N. Dhinaharan, Renault Eric, and D. Murugan (Eds.), Trends in Computer Science, Engineering and Information Technology, Springer (Communications in Computer & Information Science), Vol. 204, Sep 2011.
Efficient Refinery Scheduling Heuristics in Heterogeneous Computing Systems, S Bansal, and Chittaranjan Hota, Journal of Advances in Information technology, Vol 2, No 3, pp. 159-164, Academy Publisher, August 2011.
Probabilistic Anonymous Routing in Mobile Ad-Hoc Networks, Dhaval M, Rusheel Jain, Vakul Mohanty, and Chittaranjan Hota, Special Issue of International Journal of Computer and Communications Technology (IJCCT), 2 (5), Research Symposium at ICDCIT 2011, Feb 2011, pp. 6-12.
Securing Peer-to-Peer Overlays from Multiple Identity Forgery Attacks, K. Haribabu, and Chittaranjan Hota, International Journal of Advanced Engineering and Applications (IJAEA), pp. 132-138, (2010).
Novel adaptive scheduling algorithm for computational Grids, S Bansal, Gowtham K, and Chittaranjan Hota, Proc. of IEEE International Conference on Internet Multimedia Services Architecture and Applications (IEEE IMSAA-IWAP2PT’09), Dec 2009, IIIT, Bangalore, India.
Detecting Sybils in Peer-to-Peer File Replication Systems, K. Haribabu, Chittaranjan Hota, and Saravana S, Proc. of International Conference on Information Security and Digital Forensics (ISDF 2009), Sept 2009, City University, London.
Adaptive Decentralized Load Sharing Algorithm with Multiple Job Transfers in Distributed Computing Environments, S Bansal, D Gupta, and Chittaranjan Hota, International Journal of Recent Trends in Engineering (IJRTE), Vol. 2, No.1-6, Academy Publishers, Finland, pp. 217-221 (2009).
Priority-based Job Scheduling in Distributed Systems, Sunita Bansal, and Chittaranjan Hota, Sartaj Sahani et al. (Eds.), Communications in Computer and Information Science Series, Vol 31, pp. 110-118, Springer-Verlag Berlin Heidelberg (2009).
Adaptive Lookup for Unstructured Peer-to-Peer Overlays, K. Haribabu, Dayakar Reddy, C. R. Hota, A. Yla-Jaaski, and Sasu Tarkoma, Proc. of Third International Conference on Communication Systems & Middleware (IAMCOM/COMSWARE 2008), Jan 2008, Bangalore, India.
Distributed Approach to Sybil Defense in Peer-to-Peer Overlay Networks, Chittaranjan Hota, Antti Ylä-Jääski, Janne Lindqvist, Kristine Karvonen, and Mohan C.K.J, Proc. of International Conference on Information Processing (ICIP 2007), Aug 2007, Bangalore, India.
Sybil defense via Social Networks, Chittaranjan Hota, Antti Ylä-Jääski, Janne Lindqvist and Kristine Karvonen, Proc. of International Conference on Communications and Networking in China (CHINACOM 2007), Aug 2007, Shanghai, China.
Dynamic IPv6-in-IPv4 Tunneling Extension to MobileIPv6 and Deployment in a Real Time Network with Secured Route Optimizations, Amarnath B, Prabhu Patil and Chittaranjan Hota, Proc. of First International Conference on Network Security(ICONS 2007), Jan 29-31, 2007, Erode, Tamilnadu, India.
Intrusion Detection System in Wireless Ad-hoc Networks using Bayesian Belief Networks, Navin Sati, and Chittaranjan Hota, National Conference on High Performance Computing, Vision-06, Govt College of Engineering, Tirunelveli, April 5-6, 2006.
Bandwidth Guaranteed Restorable Paths in Multicast Virtual Private Networks, Chittaranjan Hota, Sanjay Jha, Raghurama G and William Lau, Proc. of Asia-Pacific Conf. on Parallel and Distributed Computing Technologies (ObComAPC 2004), Dec 13-15, 2004, Vellore, India.
A Heuristic Algorithm for Quality of Service Path Computation in Virtual Private Networks, Chittaranjan Hota and Raghurama G, Proc. of Sixth International Conference on Information Technology (CIT 2003), Dec 22-25, 2003, Bhubaneswar, India.