BITS Pilani

  • Page last updated on Tuesday, January 23, 2024

Dr. Sanjay K. Sahay

banner
Weak Mind, Body Suffers

Refereed Journals: 
  1. Gravitational wave: generation and detection techniques. [SCI-Q2]
    Authors: Saibal Ray, R. Bhattacharya, Sanjay K. Sahay, Abdul Aziz and Amit Das
    Accepted,  IJMPD, 2023.

  2. An Investigation of Two-Step Cascaded CNN for the Detection of Gravitational Wave Signal from Two Different Astronomical Sources. [Scopus]
    Authors: Lokesh Kumar, Sanjay K. Sahay and Hrishikesh Govindrao Kusneniwar
    Procedia Computer Science,  Vol. 222, PP. 676 - 684, 2023.

  3. Adversarial Superiority in Android Malware Detection: Lessons from Reinforcement Learning based Evasion Attacks and Defenses. [SCI-Q1]
    Authors:  Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay and Mohit Sewak
    Forensic Science International: Digital Investigation, Vol. 44, p. 301511 , 2023.

  4. SAMPARK: Secure and Lightweight Communication Protocols for Smart Parking Management. [SCI-Q1]
    Authors:  Trupil Limbasiya, Sanjay K Sahay and Debasis Das
    Journal of Information Security and Applications, Vol. 71, p. 103381, 2022.

  5. Defending malware detection models against evasion based adversarial attacks. [SCI-Q1]
    Authors:  Hemant Rathore, Animesh Sasan, Sanjay Kumar Sahay and Mohit Sewak
    Pattern Recognition Letters, Vol. 164, pp. 119-125, 2022.

  6. Towards Adversarially Superior Malware Detection Models: An Adversary-Aware Proactive Approach using Adversarial Attacks and Defenses. [SCI-Q1]
    Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
    Information Systems Frontiers, Vol. 25, pp. 567–587, 2023.

  7. Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and Protection. [SCI-Q1]
    Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
    Information Systems Frontiers, Vol. 25, pp. 589–611, 2023.

  8. Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for Malware Detection and Forensics. [SCI-Q1]
    Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
    Forensic Science International: Digital Investigation, Vol. 43, p. 301444, 2022.

  9. GreenForensics: Deep Hybrid Edge-Cloud Detection and Forensics System for Battery-Performance-Balance Conscious Devices. [SCI-Q1]
    Authors: Mohit Sewak, Sanjay K. Sahay, and Hemant Rathore
    Forensic Science International: Digital Investigation, Vol. 43, p. 301445, 2022.

  10. Are Malware Detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks? [ESCI]
    Authors: Hemant Rathore, Sujay C Sharma, Sanjay K. Sahay and Mohit Sewak
    EAI Endorsed Transaction on Scalable Information Systems, sis 18: e74, 2022.

  11. Advances in Secure Knowledge Management in the Artificial Intelligence Era. [SCI-Q1]
    Authors: Sanjay K. Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
    Information Systems Frontiers, Vol. 23, No. 4, p. 807, 2021.

  12. Robust Malware Detection Models: Learning from Adversarial Attacks and Defenses. [SCI-Q1]
    Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
    Forensic Science International: Digital Investigation, Vol. 37, p. 301183, 2021.

  13. Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System. [SCI-Q1]
    Authors: Trupil Limbasiya and Sanjay K. Sahay and Bharath Sridhar
    Information Systems Frontiers, Vol. 23, No. 4, p. 835, 2021.

  14. DRLDO: A novel DRL based De-Obfuscation System for Defense against Metamorphic Malware. [SCI-Q2]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    Defence Science Journal, Vol. 71, Issue 1, pp. 55-65, 2021.

  15. Robust Android Malware Detection System against Adversarial Attacks using Q-learning. [SCI-Q1]
    Authors: Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak
    Information Systems Frontiers, Vol. 23, No. 4, p. 867, 2021.

  16. An Overview of Deep Learning Architecture of Deep Neural Networks and Autoencoders. [Scopus]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    Journal of Computational and Theoretical Nanoscience, Vol. 17, No. 1, pp. 182-188, 2020.

  17. An effective approach for classification of advanced malware with high accuracy. [Scopus]
    Authors: Ashu Sharma and Sanjay K. Sahay
    International Journal of Security and Its Applications, Vol. 10, No. 4, pp.249-266, 2016.

  18. Grouping the executables to detect malware with high accuracy. [Scopus]
    Authors: Sanjay K. Sahay and Ashu Sharma
    Elsevier, Procedia Computer Science, Vol. 78, pp. 667 - 674, 2016.

  19. A Communication Efficient and Scalable Distributed Data Mining for the Astronomical Data. [SCI-Q2]
    Authors: Aruna Govada and Sanjay K. Sahay
    Elsevier, Astronomy and Computing, Vol. 16, pp. 166 - 174, 2016.

  20. On the independent points in the sky for the search of periodic gravitational wave. [SCI-Q2]
    Author: Sanjay K. Sahay
    Romanian Reports in Physics, Vol. 61, No. 2, 191, 2009.

  21. Earth azimuth effect in the bank of search templates for an all sky search of the continuous gravitational wave. [SCI-Q2]
    Author: Sanjay K. Sahay
    International Journal of Modern Physics D, Vol. 15, No. 2, 225, 2006.

  22. Matching of the continuous gravitational wave in an all sky search.  [SCI-Q2]
    Author: Sanjay K. Sahay
    International Journal of Modern Physics D, Vol. 12, No. 7, 1227, 2003.

  23. Data analysis of continuous gravitational wave: All sky search and study of templates. [SCI-Q1]
    Authors: D.C. Srivastava and Sanjay K. Sahay
    Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 322, 2002.

  24. Data analysis of continuous gravitational wave: Fourier transform-II. [SCI-Q1]
    Authors: D.C. Srivastava and Sanjay K. Sahay
    Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 315, 2002.

  25. Data analysis of continuous gravitational wave: Fourier transform-I. [SCI-Q1]
    Authors: D.C. Srivastava and Sanjay K. Sahay
    Monthly Notices of the Royal Astronomical Society, Vol. 337, No. 1, p. 305, 2002.

  26. Group-wise classification approach to improve Android malicious apps detection accuracy.
    Authors: Ashu Sharma and Sanjay K. Sahay
    International Journal of Network Security, Vol. 21, No. 3, pp. 409-417, 2019.

  27. Cluster labelling using chi-square-based keyword ranking and mutual information score: A hybrid approach.
    Authors: R.K. Roul and Sanjay K. Sahay
    Inderscience, Int. J. Intelligent Systems Design and Computing, Vol. 1, No. 1/2, pp. 145 - 167, 2017.

  28. Extreme Learning Machines in the field of Text Classification.
    Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
    International Journal of Computer & Information Science, Vol. 16, No. 3, p. 34, 2015.

  29. A Novel Approach to Distributed Multi-Class SVM.
    Authors: Aruna Govada, Shree S S. Ranjani, Aditi Viswanathan, Sanjay K. Sahay
    Transactions on Machine Learning and Artificial Intelligence, Vol. 2, No. 5, p. 72, 2014.

  30. Evolution and Detection of Polymorphic and Metamorphic Malware: A Survey.
    Authors: Ashu Sharma and Sanjay K. Sahay
    International Journal of Computer Applications, Vol. 90, No. 2, p. 7, 2014.

  31. An effective web document clustering for information retrieval.
    Authors: R.K. Roul and Sanjay K. Sahay
    International Journal of Computer Science and Management Research, Vol. 1, No. 3, p. 481, 2012.

  32. An effective information retrieval for ambiguous query.
    Authors: R.K. Roul and Sanjay K. Sahay
    Asian Journal of Computer Science and Information Technology, Vol. 2, No. 3, p. 26, 2012.

  33. An Effective Approach for Web Document Classification using the Concept of Association Anal- ysis of Data Mining.
    Authors: R.K. Roul and Sanjay K. Sahay
    International Journal of Computer Science & Engineering Technology, Vol. 3, No. 10, p. 483, 2012.

  34. Refereed Conferences:

  35. Breaking the Anti-malware: EvoAAttack Based on Genetic Algorithm Against Android Malware Detection Systems. [Core-A]
    Authors: Hemant Rathore, S. S. Iyengar, Sanjay K. Sahay
    International Conference on Computational Science, 535 - 550, 2023.

  36. RL-MAGE: Strengthening Malware Detectors Against Smart Adversaries. [Core-A]
    Authors: A. Nandanwar, Hemant Rathore, Sanjay K. Sahay, Mohit Sewak
    International Conference on Computational Science,  77 - 92, 2023.

  37. Defending malware detection models against evasion based adversarial attacks. [Core-A*]
    Authors: Hemant Rathore, Animesh Sasan, Sanjay K. Sahay and Mohit Sewak
    IEEE, NDSS (Poster)-2023.

  38. Deep CounterStrike: Counter Adversarial Deep Reinforcement Learning for Defense against Metamorphic Ransomware Swarm Attack. [Core-B]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    BROADNETS,  pp. 31-50, 2023.

  39. Android Malware Detection based on Static Analysis and Data Mining Techniques: A Systematic Literature Review. [Core-B]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    BROADNETS,  pp. 51-71, 2023.

  40. MalEfficient10%: A Novel Feature Reduction Approach for Android Malware Detection. [Core-B]
    Authors: Hemant Rathore, Ajay Kharat, Rashmi T, Adithya Manickavasakam, Sanjay K. Sahay and Mohit Sewak
    BROADNETS,  pp. 72-92, 2023.

  41. Are Malware Detection Models Adversarial Robust Against Evasion Attack. [Core-A*]
    Authors: Hemant Rathore, Adithya Samavedhi, Sanjay K. Sahay and Mohit Sewak
    IEEE, INFOCOM-2022, Conference on Computer Communications Workshops (INFOCOM-2022), 2022.

  42. X-Swarm: Adversarial DRL for Metamorphic Malware Swarm Generation. [Core-A*]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, International Conference on Pervasive Computing and Communication (PerCom-2022), pp. 169-174, 2022.

  43. Image-based Android Malware Detection Models using Static and Dynamic Features. [Core-C]
    Authors: Hemant Rathore, B Raja Narasimhan, Sanjay K. Sahay, Mohit Sewak
    Springer, LNNS, ISDA-2021, Volume 418, pp. 1292–1305, 2022.

  44. Are CNN based Malware Detection Models Robust? Developing Superior Models using Adversarial Attack and Defense. [Core-A*]
    Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay, Mohit Sewak
    ACM, Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, p. 355 - 356, 2021 .

  45. Adversarial Robustness of Image based Android Malware Detection Models. [Scopus]
    Authors: Hemant Rathore, Taeeb Bandwala, Sanjay K. Sahay and Mohit Sewak
    Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 3-22, 2022.

  46. Duplicates in the Drebin Dataset and Reduction in the Accuracy of the Malware Detection Models. [Core-C]
    Authors: Jyotiprakash Mishra, Sanjay K. Sahay, Hemant Rathore and Lokesh Kumar
    IEEE, 26th IEEE Asia-Pacific Conference on Communications (APCC), pp. 161-165, 2021.

  47. Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review. [Scopus]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    Springer, Communications in Computer and Information Science, Proceeding SKM-2021, Vol. 1549, pp. 51-72, 2022.

  48. DRo: A Data-Scarce Mechanism to Revolutionize the Performance of DL-Based Security Systems. [Core-B]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, 46th Conference on Local Computer Networks (LCN), p. 581-588, 2021.

  49. Identification of Adversarial Android Intents using Reinforcement Learning. [Core-A]
    Authors: Hemant Rathore, Piyush Nikam, Sanjay K. Sahay and Mohit Sewak
    IEEE, International Joint Conference on Neural Networks (IJCNN), 1-8, 2021.

  50. LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach. [Core-A]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.

  51. ADVERSARIALuscator: An Adversarial-DRL based Obfuscator and Metamorphic Malware Swarm Generator. [Core-A]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, International Joint Conference on Neural Networks (IJCNN), 1-9, 2021.

  52. Towards Robust Android Malware Detection Models using Adversarial Learning. [Core-A*]
    Authors:Hemant Rathore and Sanjay K. Sahay
    IEEE, International Conference on Pervasive Computing and Communications Work- shops, pp. 424 - 425, 2021.

  53. Designing Adversarial Attack and Defence for Robust Android Malware Detection Models. [Core-A]
    Authors: Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak
    IEEE, 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 29 - 32, 2021.

  54. Are Android Malware Detection Models Adversarially Robust? [Core-A*]
    Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
    ACM, 20th International Conference on Information Processing in Sensor Networks, pp. 408 - 409, 2021.

  55. Policy-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    Springer, Lecture Notes in Networks and Systems (ICTCS 2020), Vol. 191, pp. 493 - 507, 2021.

  56. Identification of Significant Permissions for Efficient Android Malware Detection. [Core-B]
    Authors: Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi and Mohit Sewak
    Springer, LNICST, Vol. 355, pp. 33-52, Proceedings BROADNETS-2020, 2021.

  57. Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering. -B] [Core-B]
    Authors: Hemant Rathore, Sanjay K. Sahay, Shivin Thukral and Mohit Sewak
    Springer, LNICST, Vol. 355, pp. 109-128, Proceedings BROADNETS-2020, 2021.

  58. How Robust are Malware Detection Models for Android Smartphones against Adversarial Attacks? [Core-A*]
    Authors: Hemant Rathore, Sanjay K. Sahay and Mohit Sewak
    ACM, Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys), pp. 683-684, 2020.

  59. DOOM: A Novel Adversarial-DRL-based Op-Code Level Metamorphic Malware Obfuscator for the enhancement of IDS. [Core-A*]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    ACM, Proceedings International Joint Conference on Pervasive and Ubiquitous Computing, pp. 131-134, 2020

  60. DeepIntent: ImplicitIntent Based Android IDS with E2E Deep Learning Architecture. [Core-B]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, p. 1-6, 2020

  61. Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. [Core-C]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, TENCON-2020, pp. 414-419, 2020.

  62. Value-Approximation based Deep Reinforcement Learning Techniques: An Overview. [Scopus]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, 5th International Conference on Computing Communication and Automation, pp. 379-384, 2020.

  63. A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery. 
    Authors: Shriya Gupta and Sanjay K. Sahay
    Springer, International Neural Networks Society, Proceedings of the 21st Engineering Applications of Neural Networks, Vol. 2, pp. 227-239, 2020.

  64. Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture. [Scopus]
    Authors: Trupil Limbasiya and Sanjay K. Sahay
    Springer, Communications in Computer and Information Science, Proceeding SKM-2019, Vol. 1186, pp. 82-97, 2020.

  65. Secure communication protocol for smart transportation based on vehicular cloud. [Core-A*]
    Authors: Trupil Limbasiya, Debasis Das and Sanjay K Sahay
    ACM, pp. 372-376, International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019.

  66. A Survey on the Detection of Android Malicious Apps. [Scopus]
    Authors: Sanjay K. Sahay and Ashu Sharma
    Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 437-446, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.

  67. An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU. [Scopus]
    Authors: Sanjay K. Sahay and Mayank Chaudhari
    Springer, Advances in Computer Communication and Computational Sciences, Vol. 924, pp 255-262, 2019, Proceedings in Springer, Proceedings ICCCCS, 2018.

  68. Evolution of Malware and its Detection Techniques. [Scopus]
    Authors: Sanjay K. Sahay and Ashu Sharma
    Springer, Information and Communication Technology for Sustainable Development, Vol. 933, pp 139-150, 2019, Proceedings ICT4SD, 2018.

  69. A Survey on the Detection of Windows Desktops Malware. [Scopus]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    Springer, Ambient Communications and Computer Systems (AISC), Vol. 904, pp. 149-159, 2019, Proceedings RACCCS, 2018.

  70. Android Malicious Application Classification Using Clustering. [Core-C]
    Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, and Mohit Sewak
    Springer, Springer, Intelligent Systems Design and Applications (AISC) Vol. 941, pp 659-667, 2019, Proceedings ISDA, 2018. .

  71. Malware Detection using Machine Learning and Deep Learning. [Scopus]
    Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, and Mohit Sewak
    Springer, LNCS, Vol. 11297, pp. 402-411, 2018, Proceedings BDA-2018.

  72. An investigation of a deep learning based malware detection system. [Core-B]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    ACM, pp. 26, Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES), 27-30 Aug., 2018, University of Hamburg, Germany.

  73. Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection. [Core-C]
    Authors: Mohit Sewak, Sanjay K. Sahay and Hemant Rathore
    IEEE, pp. 293-296, 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018.

  74. Detection of Advanced Malware by Machine Learning Techniques. [Scopus]
    Authors: Sanjay Sharma, Rama Krishna and Sanjay K. Sahay
    Springer, Advances in Intelligent Systems and Computing, Vol. 742, pp. 333-342, 2018, Proceedings Soft Computing: Theories and Applications (2017).

  75. Categorizing Text Data using Deep Learning: A Novel Approach. [Scopus]
    Authors: R.K. Roul and Sanjay K. Sahay
    Springer Advances in Intelligent Systems and Computing, pp. 793-805, AISC Vol. 711, 2018, Proceedings ICCIDM-2017.

  76. An investigation of the classifiers to detect Android malicious apps. [Scopus]
    Authors: Ashu Sharma and Sanjay K. Sahay
    Springer, Information and Communication Technology, 625, p. 207 - 217, 2017, Proceedings, ICICT, 2016.

  77. Distributed multi-class rule based classification using RIPPER. [Core-C]
    Authors: Aruna Govada, Varsha S. Thomas, Ipsita Samal, Sanjay K. Sahay
    IEEE Xplore, 978-1-5090-4314-9/16, pp. 303 - 309, IEEE Computer Society, 2016 IEEE International Conference on Computer and Information Technology, 2017.

  78. Semi-supervised Clustering using Seeded-kMeans in the Feature Space of ELM. [Scopus]
    Authors: R.K. Roul and Sanjay K. Sahay
    IEEE Xplore, DOI: 10.1109/INDICON.2016.7838892, Proceedings, India Conference (INDICON), 2016 IEEE Annual, 2017.

  79. Combining Apriori Approach with Support Based Count Technique to Cluster the Web Documents. [Scopus]
    Authors: R.K. Roul and Sanjay K. Sahay
    Springer, Computational Intelligence in Data Mining, Proceedings ICCIDM (2016), Vol. 556, pp 119-132, 2017.

  80. Covariance estimation for Vertically partitioned data in a Distributed environment. [Core-C]
    Authors: Aruna Govada and Sanjay K. Sahay
    Springer, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Studies in Computational Intelligence, Vol. 653, pp 151-164, 2016.
    Proceedings, 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016.

  81. Improving the detection accuracy of unknown malware by partitioning the executables in groups. [Scopus]
    Authors: Ashu Sharma, Sanjay K. Sahay, Abhishek Kumar
    Springer, Advances in Intelligent System and Computing, Vol. 452, pp. 421-431, 2016; Proceedings 9th ICACCT, 2015.

  82. K-means and Wordnet based Feature Selection Combine with Extreme Learning Machines for Text Classification. [Scopus]
    Authors: R.K. Roul and Sanjay K. Sahay
    Springer, LNCS, Distributed Computing and Internet Technology, Vol. 9581, p. 103, Proceedings 12th ICDCIT, 2016.

  83. Extreme Learning Machines in the field of Text Classification. [Core-C]
    Authors: R.K. Roul, Ashish Nanda, Viraj Patel and Sanjay K. Sahay
    IEEE Xplore, DOI: 10.1109/SNPD.2015.7176204, Proceedings 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2015), Japan.

  84. Distributed Multi Class SVM for Large Data Sets. [Scopus]
    Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
    ACM Digital Library, PP. 54-58, Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015.

  85. Centroid Based Binary Tree Structured SVM for Multi Classification. [Scopus]
    Authors: Aruna Govada, Bhavul Gauri and Sanjay K. Sahay
    IEEE Xplore, DOI: 10.1109/ICACCI.2015.7275618, Proceedings Fourth International Conference on Advances in Computing, Communications and Informatics, 2015.

  86. Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine. [Scopus]
    Authors: Aruna Govada, Pravin Joshi, Sahil Mittal, and Sanjay K. Sahay
    Springer, LNAI, Machine Learning and Data Mining in Pattern Recognition, Vol. 9166, p. 199; Proceedings 11th International Conference MLDM, Germany, 2015.

  87. Automated Document Indexing via Intelligent Hierarchical Clustering: A Novel Approach. [Scopus]
    Authors: Rajendra Kumar Roul, Sachin Joglekar and Sanjay K. Sahay
    IEEE Xplore, DOI: 10.1109/ICHPCA.2014.7045347, Proceedings, ICHPCA, 2014.

  88. A Novel Modified Apriori Approach for Web Document Clustering. [Scopus]
    Authors: Rajendra Kumar Roul, Saransh Varshneya, Ashu Kalra and Sanjay K. Sahay
    Springer, Smart Innovation Systems and Technologies, Vol. 33, 2015, p. 159-171; Proceedings ICCIDM, 2014.

  89. Web Document Clustering and Ranking using Tf-Idf based Apriori Approach.
    Authors: R.K. Roul, O.R. Devanand and Sanjay K. Sahay
    International Journal of Computer Applications, No. 2, p. 34, 2014, Proceedings ICACEA.

  90. Books Published and Edited:

  91. Data Analysis of Gravitational Waves.
    Authors: Sanjay K. Sahay
    Publisher:  Svenska fysikarkivet, Sweden, 2008, ISBN: 978-91-85917-05-1

  92. Secure Knowledge Management In The Artificial Intelligence Era, Proceedings, 9th Internationale Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021.
    Editors: Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani and Ziming Zhao
    Publisher:  Springer, Communications in Computer and Information Science, 2022, ISBN: 978-3-030-97532-6

  93. Special issue on Advances in Secure Knowledge Management in the Artificial Intelligence Era.
    Editors: Sanjay K Sahay, Nihita Goel, Murtuza Jadliwala and Shambhu Upadhyaya
    Publisher:  pringer, Information Systems Frontiers, 2021, ISSN: 1387-3326

  94. Secure Knowledge Management In Artificial Intelligence Era, Proceedings, 8th International Conference, SKM 2019, Goa, India, December 21–22, 2019.
    Editors: Sanjay K. Sahay, Nihita Goel, Vishwas Patil and Murtuza Jadliwala
    Publisher:  Springer, Communications in Computer and Information Science, 2020, ISBN: 978-981-15-3816-2

  95. Contribution to Conferences/ArXiv:

  96. An effective distributed data mining for Astronomical Data.
    Authors: Aruna Govda and S.K. Sahay
    Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.

  97. An effective approach for web document clustering.
    Authors: R.K. Roul and S.K. Sahay
    Twenty first International Conference of Forum for Interdisciplinary Mathematics on Interdisciplinary Mathematics, Statistics and Computational Techniques, Punjab University, Chandigarh, Dec. 15 - 17, 2012.

  98. An Effective Approach for Web Document Classification using the Concept of Association Analysis of Data Mining.
    Author: R.K. Roul and S.K. Sahay
    Ref: arXiv:1406.5616

  99. Studies in gravitational wave data analysis.
    Author: S.K. Sahay
    Ref: arXiv:gr-qc/0209019, Ph.D Thesis

  100. Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: I.
    Authors: D.C. Srivastava and Sanjay K. Sahay
    Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.

  101. Analysis of noise free response of interferometric antenna to gravitational radiation from pulsars: II.
    Authors: D.C. Srivastava and Sanjay K. Sahay
    Pramana, Vol. 55, No. 4, p. 586, Proceedings of the Fourth ICGC, 2000.

  102. All Sky Search for Continuous Gravitational Waves.
    Authors: D.C. Srivastava and S.K. Sahay
    21st Meeting of the Indian Association for General Relativity and Gravitation, Central India Research Institute, Nagpur, India, Jan. 30 - Feb. 01, 2001.

  103. Data Analysis of Continuous Gravitational Wave: Fourier Transform.
    Authors: D.C. Srivastava and S.K. Sahay
    20th Astronomical Society of India Meeting and National Symposium on Multiwavelength Astronomy, DDU. Gorakhpur University, Gorakhpur, India, Nov. 15 - 18, 2000.

  104. Data analysis of continuous gravitational wave signal: Fourier transform.
    Authors: D.C. Srivastava and S.K. Sahay
    Ref: arXiv:gr-qc/0009094

  105. A Study of Number of Patches in the Sky for the Pulsar Search for Gravitational Radiation. 
    Authors: D.C. Srivastava and S.K. Sahay
    Conference on Recent Developments in General Relativity and Allied Topics, Aligarh Muslim University, Aligarh, India, Aug. 30 - Sept. 01, 1999.

  106. Detection of Continuous Gravitational Waves from Rotating Rigid Newtonian Body: Pulsars. 
    Authors: D.C. Srivastava and S.K. Sahay
    20th Meeting of the Indian Association for General Relativity and Gravitation and National Symposium on Currents Trends in Gravitation and Cosmology, DDU Gorakhpur Universtiy, Gorakhpur, India, Jan. 20 - 21, 1999.

An Institution Deemed to be University estd. vide Sec.3 of the UGC Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 Centre for Software Development,SDET Unit, BITS-Pilani, India.

Designed and developed by fractal | ink design studios