Interaction of systemic drugs
causing ocular toxicity with organic cation transporter: an artificial
intelligence prediction, Manisha Malani, M.S. Hiremath, Surbhi Sharma, Manisha
Jhunjhunwala, Shovanlal Gayen, Chittaranjan Hota, and Jayabalan Nirmal, Journal of Biomolecular Structure and Dynamics ,
Taylor and Francis, June 2023 (Online).
Role of Artificial Intelligence in Toxicity Prediction of Drugs, Manisha Malani, Anirudh Kasturi, Md. Moinul, Shovanlal Gayen, Chittaranjan Hota, and Jayabalan Nirmal, In: Mohanan P.V, Kappalli S (eds), Biomedical Applications and Toxicity of Nanomaterials, Springer, pp. 589-636, May 2023.
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure, S P Otta, S Panda, Maanak Gupta, and Chittaranjan Hota, Future Internet, 15(4):146, MDPI, April 2023.
OSGAN: One Shot Distributed Learning using Generative Adversarial Networks, Anirudh Kasturi, and Chittaranjan Hota, The Journal of Supercomputing, Springer, Q1 Journal, March 2023 (Available online from 28th March 2023).
Joint QoS and Energy-Efficient Resource Allocation and Scheduling in 5G Network Slicing, Saibharath S, Sudeepta Mishra, and Chittaranjan Hota, Computer Communications, Elsevier, Q1 Journal, Vol: 202, March 2023, pp. 110-123.
STONE: When Split meets Transfer for One Shot Learning, Akshat Agrawal, Anirudh Kasturi, and Chittaranjan Hota, The 37th AAAI Conference on Artificial Intelligence (AAAI-23), The Fourth AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-23), (Core A*), Washington DC, USA, Feb 7th-14th 2023.
Auto Encoders for Communication Efficient Distributed Learning, Anirudh Kasturi, Akshat Agrawal, Deepanshu Mody, and Chittaranjan Hota, The 37th AAAI Conference on Artificial Intelligence (AAAI-23), Deployable AI Workshop, (Core A*), Washington DC, USA, Feb 7th-14th 2023.
A Machine Learning Approach for Electrochemiluminescence Based Point-of-Care Testing Device to Detect Multiple Biomarkers, Sanjeet Kumar Srivastava, Maish Bhaiyya, Sohan Dudala, Chittaranjan Hota, and Sanket Goel, Sensors and Actuators A: Physical, Q1 Journal, Vol: 350, Springer, Feb 2023.
Distributed Learning of Pure Non-IID data using Latent Codes, Anirudh Kasturi, Akshat Agrawal and Chittaranjan Hota, 17th IEEE International Conference on Ubiquitous Information Management and Communication (IMCOM 2023), pp. 1-6, South Korea, Jan 2023, IEEE Xplore.
Secure Peer to Peer Learning using Auto Encoders, Anirudh Kasturi, Akshat Agrawal, and Chittaranjan Hota, IEEE International Symposium on Smart Electronic Systems (2022 IEEE iSES), Dec 2022, pp. 236-241, IEEE Xplore.
Continuous Cloud User Authentication By Efficient Facial Recognition, Soumya Prakash Otta, Siddharth K, Vijay Malhotra, Aman Raj, Subhrakanta Panda and Chittaranjan Hota, 5th IEEE International Conference on Computational Intelligence and Networks (CINE 2022), pp. 1-6, India, Dec 2022, IEEE Xplore.
- Identity Management with Blockchain: Indian Migrant Workers Prospective, Soumya Prakash Otta, Subhrakanta Panda and Chittaranjan Hota, IEEE International conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IEEE IATMSI-2022), ABV-IIITM, Gwalior, Dec 2022.
- Artificial intelligence and experimental studies to understand the role of transporters in ocular toxicity of systemic drugs, Manisha Malani, Surbhi Sharma, Manisha Jhunjhunwala, Manthan S Hiremath, Shovan Lal Gayen, Chittaranjan Hota, Jayabalan Nirmal, in ARVO 2022, Denver, Colorado, USA, May 2022.
- User Identification with Face Recognition: A Systematic Analysis, Soumya Prakash Otta, Siddharth K, Subhrakanta Panda, and Chittaranjan Hota, 3rd IEEE International Conference on Emerging Technologies (INCET 2022), Karnataka, May 2022.
- Communication Efficient Distributed Learning using Variational Auto Encoders, Anirudh Kasturi, S Vishwamithra, and Chittaranjan Hota , 14th International Conference on COMmunication Systems & NETworks (COMSNETS), January '22, Bengaluru, 2022, IEEE, pp. 744-748.
- An efficient approach to kNN algorithm for IoT devices, Bhavesh Gawri, Anirudh Kasturi, Lalita Bhanu Murthy Neti, and Chittaranjan Hota , 14th International Conference on COMmunication Systems & NETworks, January '22, Bengaluru, 2022, IEEE, pp. 734-738.
- Swap-Based Load Balancing for Fairness in Radio Access Networks, Saibharat S, Sudeepta Mishra, and Chittaranjan Hota, IEEE Wireless Communications Letters (WCL), IEEE, Vol. 10 (11), Nov 2021, pp. 2412-2416.
- Analyzing events using IoT data streams in a smart city scenario, Chittaranjan Hota, and Sanket Mishra, IET Handbook on Bigdata Analytics, The Institution of Engineering and Technology, V. Ravi, and Ch. Aswani Kumar (eds), IET, UK, July 2021.
- Attention-based Bi-LSTM for Anomaly Detection on Time-Series Data, Sanket Mishra, Varad Kshirsagar, Rohit Dwivedula, and Chittaranjan Hota, 30th International Conference on Artificial Neural Networks (ICANN 2021), In: Farkaš I., Masulli P., Otte S., Wermter S. (eds) Artificial Neural Networks and Machine Learning – ICANN 2021, LNCS, vol: 12891, Springer.
- Code Integrity Verification using Cache Memory Monitoring, Rajesh Kumar Shrivastava, Varun Natu, and Chittaranjan Hota, Information Security Journal: A Global Perspective, Taylor & Francis, Vol. 31 (2), 2021, pp. 226-236.
- Decentralized Learning with GANs, Anirudh Kasturi, Atharva Sune, and Chittaranjan Hota, CODS COMAD 2021, Jan 2021, Bangalore, ACM.
- UnderTracker: Generating Robust Binaries Using Execution Flow Traces, Rajesh Kumar Shrivastava, and Chittaranjan Hota, Inf Syst Front, Vol. 23, Springer (2021), pp. 915-930.
- Detection of Stealthy Single-Source SSH Password Guessing Attacks, Gokul Kannan S, Chittaranjan Hota, and Anand Bhojan, Evolving Systems, Vol. 13, Springer (2021), pp. 1-15.
- QoS Driven Task Offloading and Resource Allocation at Edge Servers in RAN Slicing, Saibharat S, Sudeepta Mishra, and Chittaranjan Hota, IEEE Consumer Communications and Networking Conference (IEEE CCNC 2021), Jan 2021 (Core B).
- Robust Detection of Network Intrusion using Tree-based Convolutional Neural Networks, Sanket Mishra, Rohit Dwivedula, Varad Kshirsagar, and Chittaranjan Hota, 8th ACM IKDD CODS and 26th COMAD, Jan 2021, pp. 233-237, Jan 2021 (Core B).
- Heuristix: Adaptive event processing using lightweight machine learning approaches on edge devices, Sanket Mishra, Shubham Arawkar, Sashikant Singh, Ankit Shibu, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
- FedPeer: A Peer to Peer learning framework using Federated Learning, Anirudh Kasturi, Raviteja Sivaraju, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
- Vertical Fusion: A Distributed Learning Approach for Vertically Partitioned Data, Anirudh Kasturi, Ameya Salankar, Sharath S Chandra, and Chittaranjan Hota, 26th Annual International Conference on Advanced Computing and Communications (ADCOM 2020), In: Patgiri, R., Bandyopadhyay, S., Borah, M.D., Emilia Balas, V. (eds) Edge Analytics, Lecture Notes in Electrical Engineering, Vol. 869, Springer.
- Sequential Anomaly Detection using Feedback and Prioritized Experience Replay, Anish Reddy Ellore, Sanket Mishra, and Chittaranjan Hota, 14th International Conference on Network and System Security, In: Kutylowski M et al. (eds), NSS 2020, Melbourne, Australia, LNCS, vol. 12570, pp. 245-260, Nov 2020 (Core B).
- Real-time Probabilistic Approach for Traffic Prediction on IoT Data Streams, Sanket Mishra, Raghunathan B, Ankit S, and Chittaranjan Hota, 27th International Conference on Neural Information Processing (ICONIP 2020), In: Yang H et al. (eds), Neural Information Processing, CCIS, vol. 1333, Springer, Nov 2020 (Core A).
- Hybrid Fusion Learning: A Hierarchical Learning Model for Distributed Systems, Anirudh Kasturi, Anish Reddy Ellore, Paresh Saxena, and Chittaranjan Hota, 4th International Workshop on Deep Learning for Mobile Systems and Applications (26th ACM MobiCom 2020), EMDL'20, London, Sept 2020, ACM (Core A*).
- An Evolutionary Approach for Congestion Prediction on IoT data streams in Smart City Environment, Sanket Mishra, Ankit S, Raghunathan B, and Chittaranjan Hota, 14th International FLINS Conference on Robotics and Artificial Intelligence, Developments of Artificial Intelligence Technologies in Computation and Robotics, World Scientific, Vol. 12, Germany, pp. 84-92, Aug 2020 (Core B).
- Fusion Learning: A One Shot Federated Learning, Anirudh Kasturi, Anish Reddy Ellore, and Chittaranjan Hota (2020), In: Krzhizhanovskaya V. et al. (eds), Computational Science – ICCS 2020, ICCS 2020, Lecture Notes in Computer Science, Vol 12139, pp. 424-436, Springer (Core A).
- Quality of Service Driven Resource Allocation in Network Slicing, Saibharath S, Sudeepta Mishra, and Chittaranjan Hota, IEEE 91st Vehicular Technology Conference (VTC 2020-Spring), Belgium, May 2020 (Core B).
- Code-Tampering Defense for Internet of Things Using System Call Traces. Shrivastava R. K., Hota Chittaranjan. In: Rautaray S., Eichler G., Erfurth C., Fahrnberger G. (eds) Innovations for Community Services. I4CS 2020. Communications in Computer and Information Science, vol 1139. Springer, Cham.
- Lightweight code self-verification using return-oriented programming in resilient IoT, Rajesh Kumar Srivastava, and Chittaranjan Hota (2020), In H Das, Nilanjan Dey, and Valentina Emilia Balas (eds), Real-Time Data Analytics for Large Scale Sensor Data, Vol.6, pp. 51-71, Academic Press, Elsevier. Scopus Indexed.
- Reputation-Based Reinforcement Algorithm for Motivation in Crowdsourcing Platform, A Vijayalakshmi, and Chittaranjan Hota, Second International Conference on Computational Intelligence, In: S K Sahana, Bhattacharjee V (eds), Advances in Intelligent Systems and Computing (AISC), Vo: 988, Springer, pp. 175-186, 2020, Scopus Indexed.
- Motivation of participants on the crowdsourcing platform using intelligent agents, A Vijayalakshmi, and Chittaranjan Hota, International Journal of Computing, RIICS. Vol:19 (1), 2020, pp. 78-87, Scopus Indexed.
- Internet of Things Based Occupancy Detection Using Ensemble Classifier for Smart Buildings, Sanket Mishra, Chittaranjan Hota, and Sarthak Rajwanshi, J. Comput. Theor. Nanosci, Vol.17 (1), Jan 2020, pp. 505-518. American Scientific Publishers. Scopus Indexed.
- Gamification and Q-learning for motivation of user participation on crowdsourcing platform, A Vijayalakshmi, and Chittaranjan Hota, 3rd International Research Conference on Emerging Information Technology and Engineering Solutions (EITES 2019), SCIT, Pune, Dec 2019.
- Preventing data tampering in IoT networks, Rajesh Kumar Srivastava, Sanket Mishra, Archana E, and Chittaranjan Hota, IEEE International Conference on Advanced Networks and Telecommunications Systems, IEEE ANTS 2019, Goa, India, Dec 2019. Scopus Indexed.
- A Rest Framework on IoT Streams using Apache Spark for Smart Cities, Sanket Mishra, and Chittaranjan Hota, 16th IEEE Indicon, Focus Session, Rajkot, Gujarat, Dec 2019. IEEE Xplore, Scopus Indexed.
- UnderTracker: Binary Hardening Through Execution Flow Verification, Rajesh Srivastava, Chittaranjan Hota, Govind Mittal, and Zahid Akhtar, In: Sahay S, Goel N, Patil V, Jadliwala M (eds), Secure Knowledge Management in Artificial Intelligence Era (SKM 2019), Communications in Computer and Information Science (CCIS), Vol: 1186, Springer, pp. 3-20. Scopus Indexed.
- Game Theory Based Modified Naive-bayes Algorithm to Detect DoS Attacks using Honeypots, Rajesh Kumar Srivastava, Saradhi Ramakrishna, and Chittaranjan Hota, 16th IEEE India Council International Conference (INDICON 2019), Rajkot, India, Dec 2019. IEEE Xplore. Scopus Indexed.
- Code tamper-proofing using dynamic canaries, Rajesh Kumar Srivastava, Kevin Jude Concessao, and Chittaranjan Hota, 25th Asia-Pacific Conference on Communications (APCC 2019), IEEE ComSoc, Ho Chi Minh City, Vietnam, Nov 2019. Scopus Indexed, IEEE Xplore.
- Profile-guided code identification and hardening using return oriented programming, Rajesh Kumar Shrivastava, and Chittaranjan Hota, Journal of Information Security and Applications (JISA), Elsevier, Vol. 48, October 2019, SCIE. Scopus Indexed.
- IoT Threats: Risk Analysis using Honeypots, Rajesh Kumar Srivastava, and Chittaranjan Hota, All India Seminar on Cyber Security and Image Processing, The Institution of Engineers (IE, India), Telangana State Centre, Hyderabad, 10th-11th August 2019.
- STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks, Abhishek Thakur, R Sathiyanarayanan, and Chittaranjan Hota, Wireless Networks, Springer, Vol:25 (SCI, and SCOPUS Indexed journal), pp. 3275-3296, 2019.
- Attack Detection and Forensics Using Honeypot in IoT Environment, Rajesh Kumar Shrivastava, Bazila Bashir, and Chittaranjan Hota (2019) In: Fahrnberger G., Gopinathan S., Parida L. (eds) Distributed Computing and Internet Technology. ICDCIT 2019. Lecture Notes in Computer Science, vol 11319. Springer. Scopus Indexed.
- An Ingestion Based Analytics Framework for Complex Event Processing Engine in Internet of Things, Sanket Mishra, Mohit Jain, B Siva Nagasasank, and Chittaranjan Hota (2018) In: Mondal A., Gupta H., Srivastava J., Reddy P., Somayajulu D. (eds) Big Data Analytics. BDA 2018, Lecture Notes in Computer Science, vol 11297. Springer. Scopus Indexed.
- An ensemble approach with differential evolution optimization to detect occupancy in IoT environments, Sanket Mishra, Sarthak Rajwanshi, and Chittaranjan Hota, First International Conference on Intelligent Computing (ICIC 2018), Amrita University, Bangalore, Oct 2018.
- Social media and Machine computation for Task Assignment in Crowdsourcing platform, A Vijayalakshmi, and Chittaranjan Hota, IEEE International Conference on Innovative Technologies in Engineering (ICITE-2018), 11th-13th April 2018, University College of Engineering, Osmania University, Hyderabad, IEEE Xplore.
- Intelligent Task Assignment in Crowdsourcing Platform, A Vijayalakshmi, and Chittaranjan Hota (2018) In: Chakraverty S., Goel A., Misra S. (eds), Towards Extensible and Adaptable Methods in Computing, Springer, pp. 339-350, Singapore.
- Honeynet Data Analysis and Distributed SSH Brute-Force Attacks, Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan (2018) In: Chakraverty S., Goel A., Misra S. (eds), Towards Extensible and Adaptable Methods in Computing, Springer, pp. 107-118, Singapore.
- Task assignment in Crowd sourcing using vector space model, A. Vijayalakshmi, and Chittaranjan Hota, International Journal of Pure and Applied Mathematics, Vol.116, Issue 23 (Special issue), Academic pub., 2017, Scopus Indexed, pp. 605-609.
- Resilient Complex Event Processing in IoT using Side-channel Information, Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, and Chittaranjan Hota, 10th ACM International Conference on Security of Information and Networks (SIN'17), ACM ICPS, ACM Digital library, SIGSAC, 13th-15th Oct 2017, India.
- Tamper-Resistant Code Using Optimal ROP Gadgets for IoT Devices, Chittaranjan Hota, Rajesh Kumar Shrivastava, and Shivangi Shipra, 13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), University of Valencia, Spain, IEEE Xplore, June 2017, pp.570-575.
- Protection against code exploitation using ROP and check-summing in IoT environment, Rajesh Kumar Shrivastava, Chittaranjan Hota, and Prashast Srivastava, The 5th International Conference on Information and Communication Technology (ICoICT), Multimedia University, Malaysia, Scopus Indexed, IEEE Xplore, May 2017, pp. 7-12.
- Energy efficient IoT framework for smart buildings, Sameer Dharur, K Swaminathan, and Chittaranjan Hota, IEEE International Conference on IoT in Social, Analytics and Cloud (I-SMAC 2017), Coimbatore, TN, India, IEEE Xplore, Feb 2017.
- Detection of Severe SSH Attacks using Honeypot Servers and Machine Learning Techniques, Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan, Software Networking, Jan 2017, pp. 1-22.
- Noise-resistant mechanisms for detection of stealthy peer-to-peer botnets, Pratik Narang, Chittaranjan Hota, and Husrev Taha Sencar, Computer Communications, Elsevier, Vol. 96, Dec 2016, pp. 29-42.
- Classification of SSH attacks using Machine learning algorithms, Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan, 6th International conference on IT convergence and security (ICITCS 2016), Prague, Czech Republic, Sept 2016, IEEE Xplore.
- Unwanted Traffic Identification in Large-scale University Networks: A Case Study, Chittaranjan Hota, Pratik Narang, and Jagan Mohan Reddy, Big Data Analytics: Methods and Applications, Springer book chapter, pp. 163-187, October 2016.
- Cooperative Spectrum Sensing in Cognitive Radio: An Archetypal Clustering Approach, Balaji V, Tejas N, Chittaranjan Hota, and G Raghurama, IEEE International Conference on Wireless Communications Signal Processing and Networking (IEEE WiSPNET 2016), March 2016, India, IEEE Xplore.
- Spectrum Hole Prediction for Cognitive Radios: An Artificial Neural Network Approach, V Balaji, C R Hota, and G Raghurama, International Journal on Information Processing (IJIP Journal), Vol.10 (1), March 2016, pp. 52-66.
- Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning, V. Balaji, S. Anand, C. R. Hota, and G. Raghurama, EAI Endorsed Transactions on Wireless Spectrum, 16(7), Jan 2016, pp.1-8.
- Attack Identification Framework for IoT Devices, Jagan Mohan Reddy, and Chittaranjan Hota, Third International Conference on Information Systems Design and Intelligent Applications, January 2016, Vol. 434, Advances in Intelligent Systems and Computing, Springer, pp. 505-513.
- Quality of Service Enforcing Centrally Optimized Routing for Delay Tolerant Networks, Abhishek Thakur, and Chittaranjan Hota, IEEE 18th International Symposium on Wireless Personal Multimedia Communications (WPMC), 13th-16th Dec 2015, Hyderabad.
- Behavior-based P2P Traffic Identification using Fuzzy Approach, Jagan Mohan Reddy, Chittaranjan Hota, and M Rajarajan, IEEE International Conference on Applied and Theoretical Computing and Communication Technologies (iCATccT), Oct 2015, IEEE Xplore.
- Advances in secure knowledge management in the big data era, Chittaranjan Hota, Shambhu Upadhyaya, and Jamal Nazzal Al-Karaki, Information Systems Frontiers, Springer, Vol.17, Issue 5 (2015), pp. 983-986.
- Cooperative Spectrum Sensing in Cognitive Radios using Perceptron Learning for IEEE 802.22 WRAN, Balaji Venkat, Pranav K, Saieesh P, Chittaranjan Hota, and Raghurama G,Eleventh International Multi Conference on Information Processing, Elsevier Procedia-Computer Science,Vol:54 (2015), pp. 14-23.
- Game-theoretic strategies for IDS deployment in peer-to-peer networks, Pratik Narang, and Chittaranjan Hota, Information Systems Frontiers, Springer, Vol.17, Issue 5 (2015), pp. 1017-1028.
- Heuristic-based Real-time P2P Traffic Identification, Jagan Mohan Reddy, and Chittaranjan Hota, The 2nd International Research Conference on Emerging Information Technology and Engineering Solutions (EITES 2015), Feb 2015, Pune, IEEE, CPS, pp. 38-43, ISBN:978-1-4799-1838-6, IEEE Xplore.
- Scalable Honeypot Architecture for Identifying Malicious Network activities, S Gokul Kannan, and Chittaranjan Hota, The 2nd International Research Conference on Emerging Information Technology and Engineering Solutions (EITES 2015), Feb 2015, Pune, IEEE, CPS, pp. 27-31, ISBN:978-1-4799-1838-6, IEEE Xplore.
- Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation, K Haribabu, and Chittaranjan Hota, 16th International Conference on Distributed Computing and Networking (ICDCN 2015), Jan 2015, Goa.
- Game-theoretic Patrolling Strategies for Intrusion Detection in Collaborative Peer-to-Peer Networks, Pratik Narang, Kunal Mehta, and Chittaranjan Hota, International Conference on Secure Knowledge Management in Big Data Era (SKM 2014), Dubai, Dec 2014.
- HaDeS: A Hadoop-based Framework for Detection of Peer-to-Peer Botnets, Pratik Narang, A Thakur, and Chittaranjan Hota, 20th International Conference on Management of Data (COMAD 2014), Demo and Poster Track, Hyderabad, Dec 2014.
- Efficient Cooperative Spectrum Sensing in Cognitive Radio using Coalition Game Model, Balaji Venkat, and Chittaranjan Hota, IEEE International Conference on Contemporary Computing and Informatics (iC3I), Mysore, IEEE Xplore, Nov 2014.
- PeerShark: Flow-clustering and conversation-generation for malicious peer-to-peer traffic identification, Pratik Narang, Chittaranjan Hota and V N Venkatakrishnan, EURASIP Journal on Information Security 2014, 2014:15, October 2014.
- Designing an Extensible Communication Platform for Rural Area, Abhishek Thakur, and Chittaranjan Hota, 3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), New Delhi, Sept 2014.
- Hybrid Multi-objective WorkFlow Scheduling on Utility Grids, Sunita Bansal, and Chittaranjan Hota, INFOCOMP Journal of Computer Science, Brazil, Vol.13(1), June 2014, pp.12-20, June 2014.
- Machine-learning Approaches for P2P Botnet Detection using Signal-processing Techniques, Pratik Narang, Vansh Khurana, and Chittaranjan Hota, 8th ACM International Conference on Distributed Event-Based Systems (DEBS'14), ACM SIGMOD/SIGSOFT, Mumbai, India, pp. 338-341, May 2014.
- PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations, Pratik Narang, Subhajit Ray, Chittaranjan Hota, and Venkat Venkatakrishnan, 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014, IWCC), San Jose, CA, May 2014.
- Efficient Detection of Malwares using Low-interaction Honeypots, S Gokul Kannan, and Chittaranjan Hota, National Conference on Intelligent Systems, Computing and Information Technology (NCICIT'14), 4th-5th April 2014, Anna University, Tiruchirappalli, TN, India, April, 2014.
- Big Data Analytics Framework for Peer-to-Peer Botnet Detection using Random Forests, K Singh, Sharath Chandra G, A Thakur, and Chittaranjan Hota, Information Sciences Journal, Elsevier, Vol. 278, 2014, pp. 488-497.
- Distributed Scheduling on Utility Grids, Sunita Bansal, and Chittaranjan Hota, Romanian Journal of Information Science and Technology (SCI Expanded), Vol.16, No.4, 2013, pp. 373-392.
- Honeypot Challenges and Countermeasures, S Gokul Kannan, and Chittaranjan Hota, Symposium on Information Security, BITS-Pilani Hyderabad Campus, Hyderabad, 15-16 November 2013 (Poster)
- P2P Traffic Classification using Ensemble Learning, Jagan Mohan Reddy, and Chittaranjan Hota, 5th IBM Collaborative Academia Research Exchange(I-CARE 2013), IBM, New Delhi, India, ACM Digital Library,Oct 2013.
- Sector Based Multicast Routing Algorithm for Mobile Ad-Hoc Networks, Murali P, and Chittaranjan Hota, International Journal of Wireless & Mobile Networks(IJWMN), Vol. 5, No. 5, Oct 2013, pp. 49-63.
- Feature Selection for Optimizing Detection of P2P Botnet Traffic, Pratik Narang, Jagan Mohan Reddy and Chittaranjan Hota, The 6th ACM India Computing Convention on Next Generation Computing Paradigms and Technologies, ACM Digital Library, 22nd-24th August 2013, (ACM Compute 2013), India.
- Sustainable Wireless Internet Connectivity for Rural Areas, Abhishek Thakur, and Chittaranjan Hota, International Symposium on Green Networks and Distributed Systems, GNDS 2013, ICACCI 2013, 22nd-24th August 2013, Mysore, India.
- A Virtual-force based Multicast Routing Algorithm for Mobile Ad-hoc Networks, Murali P, V Rastogi, and Chittaranjan Hota, Fifth International Conference on Ubiquitous and Future Networks 2013 (ICUFN 2013), July 2013, Vietnam, IEEE Xplore (Excellent Paper Award).
- Enhanced Search in Unstructured Peer-to-Peer Overlay Networks, Chittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, and A. Y. Jaaski, 8th International Conference on Grid and Pervasive Computing, Seoul, KOREA, Arabnia H.R, Kim C, Shi W, Gil J (Eds), Lecture Notes in Computer Science 7861, May 2013.
- Arbitration-based Reliable Distributed Mutual Exclusion for Mobile Ad-hoc Networks, Murali P, and Chittaranjan Hota, 11th International Symposium on Modeling and Optimization in Mobile, Ad-hoc and Wireless Networks (WiOpt 2013), Tsukuba, Japan, May 2013, IEEE Xplore.
- P2P Traffic Classification for Intrusion Detection Systems, Jagan Mohan, Pratik Narang, Chittaranjan Hota, Prafulla Kumar, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
- A Crowdsourcing and Data Mining-based system for Content Tagging, Vijay Sridhar, Chinmay Dabral, and Chittaranjan Hota, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
- Packet Anonymization: Preserving Privacy for DPI in P2P Realm, Sarath Chandra G, Vikram Nunia, Abhishek Thakur, and Chittaranjan Hota, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
- Goodwill based scheduling algorithm for economy grid, Sunita Bansal, and Chittaranjan Hota, 3rd IEEE International Advance Computing Conference, New Delhi, India, Feb 2013, IEEE Xplore.
- Adaptive Task Scheduling in Service Oriented Crowd using SLURM, Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota, and M Rajarajan, ICDCIT 2013, C R Hota, Pradip K. Srimani (Eds.), Lecture Notes in Computer Science (LNCS 7753), pp.373-385 (2013).
- Tag-based Improved Search in Peer-to-Peer Overlays, Sreeja T, Chittaranjan Hota, and A. Yla Jaaski,Int. J. Computer Applications, Vol. 49, July 2012.
- Approaches for Measuring P2P Classification Efficiency for Intrusion Detection and Prevention Systems, Jagan Mohan, A. Thakur, and C. R. Hota, First National Conference on Cyber Security, NCCS 2012, Defence Institute of Advanced Technology(DU), Pune, India, June 7-8, 2012.
- GAUR: A method to detect Sybil groups in Peer-to-Peer overlays, Haribabu K, Chittaranjan Hota, and A Paul, Int. J. Grid and Utility Computing, IJGUC, Vol. 3, Nos. 2/3, Inderscience, pp. 145-156, 2012.
- Distributed Algorithms for Improving Search Efficiency in P2P Overlays, Chittaranjan Hota, Vikram Nunia, and Antti Yla-Jaaski, International Journal of Computer Network and Information Security, IJCNIS, Vol. 4, No. 3, pp. 1-7, April 2012.
- Resilient GIA, Rusheel Jain, and Chittaranjan Hota, Second Student Research Symposium, ICDCIT 2012, Bhubaneswar, International Journal of Computer and Communication Technology, IJCCT Special Issue, pp. 26-31, Feb 2012.
- Efficient Algorithm on Heterogeneous Computing Systems, S Bansal, and Chittaranjan Hota, Proc. of International Conference on Recent Trends in Information Systems (ReTIS 2011), Jadavpur University, Kolkata, Dec 2011, pp. 57-61, India, IEEE Xplore.
- Improved Object Lookup in Unstructured Peer-to-Peer Overlay Networks, Chittaranjan Hota, Gaurav K, Prasanna G, Sathya M, Hrushikesha Mohanty, and Muttukrishnan Rajarajan, Fourth International Conference on Recent Trends in Computing, Communication & Information Technologies, VIT, Vellore, P.V. Krishna, M.R. Babu, and E. Ariwa (Eds.), ObCom 2011, Communications in Computer and Information Science (CCIS 269), Springer, pp. 237-244, Dec 2011.
- A Resilient Voting Scheme for Improving Secondary Structure Prediction, Chittaranjan Hota, Filippo Ledda, and Giuliano Armano, Fifth Multi-disciplinary International Workshop on Artificial Intelligence (MIWAI 2011), University of Hyderabad, Hyderabad, C. Sombattheera et al.(Eds.), Lecture Notes in Artificial Intelligence (LNAI 7080), Springer, pp. 339-350, Dec 2011.
- Secure Web Services Negotiation, V Mohanty, and Chittaranjan Hota, CCSEIT 2011, Tirunelveli, Tamilnadu, N. Dhinaharan, Renault Eric, and D. Murugan (Eds.), Trends in Computer Science, Engineering and Information Technology, Springer (Communications in Computer & Information Science), Vol. 204, Sep 2011.
- Probabilistic Routing using Queuing Theory for MANETs, Gaurav K, G Prasanna, and Chittaranjan Hota, International Journal of Wireless and Mobile Networks, Vol 3, pp. 144-158, August 2011.
- Efficient Refinery Scheduling Heuristics in Heterogeneous Computing Systems, S Bansal, and Chittaranjan Hota, Journal of Advances in Information technology, Vol 2, No 3, pp. 159-164, Academy Publisher, August 2011.
- Dynamic task scheduling in grid computing using prioritised round robin algorithm, S Bansal, B Kothari, and Chittaranjan Hota, International Journal of Computer Science Issues, 8 (2), March 2011.
- Detecting Sybils in P2P Overlays using Psychometric Analysis Methods, K Haribabu, Arindam Pal, Chittaranjan Hota,Proc. of IEEE International Conference on Advanced Information Networking and Applications (AINA), Singapore, March 2011.
- Capability-based Cryptographic Data Access Control in Cloud Computing, Chittaranjan Hota, Sunil S, M Rajarajan, and Srijith Nair, International Journal of Advanced Networking and Applications, Vol.3, Issue 3, pp. 1152-1161, 2011.
- Probabilistic Anonymous Routing in Mobile Ad-Hoc Networks, Dhaval M, Rusheel Jain, Vakul Mohanty, and Chittaranjan Hota, Special Issue of International Journal of Computer and Communications Technology (IJCCT), 2 (5), Research Symposium at ICDCIT 2011, Feb 2011, pp. 6-12.
- An Efficient On-demand Routing Protocol for MANETs using Bayesian Approach, Rusheel Jain, Murali P, and Chittaranjan Hota, Proc. of Third International Conference on Communication Systems and Networks (COMSNET 2011), Bangalore, January 2011.
- Secure Data Access in Cloud Computing, Sunil Sanka, Chittaranjan Hota, and M Rajarajan, Proc. of IEEE IMSAA, Bangalore, Dec 2010.
- Detecting Sybils in Peer-to-Peer Overlays using Neural Networks and CAPTCHAs, K. Haribabu, D Arora, B Kothari, and Chittaranjan Hota, Proc. of International Conference on Computational Intelligence and Communication Networks (CICN 2010), Nov 2010, Bhopal, India, IEEE Xplore.
- A Generalized Energy Consumption Model for Wireless Sensor Networks, Murali P, Challa A, Kasyap M R, and Chittaranjan Hota, Proc. of International Conference on Computational Intelligence and Communication Networks (CICN 2010), Nov 2010, Bhopal, India, IEEE Xplore.
- Secure Resilient High Performance File System for Distributed Systems, Sunil Chakravarthy, and Chittaranjan Hota, Proc.of IEEE ICCCT, Sept 2010, MNNIT, Allahabad, India, IEEE Xplore.
- A Novel Permission-based Reliable Distributed Mutual Exclusion Algorithm for Mobile Ad-hoc Networks, Murali P, and Chittaranjan Hota, Proc. of Seventh IEEE International Conference on Wireless and Optical Communication Networks (WOCN 2010), Sept 2010, Colombo, Sri lanka, IEEE Xplore.
- Securing Peer-to-Peer Overlays from Multiple Identity Forgery Attacks, K. Haribabu, and Chittaranjan Hota, International Journal of Advanced Engineering and Applications (IJAEA), pp. 132-138, (2010).
- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection, V Mohanty, Dhaval Moliya, Chittaranjan Hota, and M Rajarajan, H. Chen et al. (Ed.s), Lecture Notes in Computer Science (LNCS 6122), pp.65-72, (2010).
- Enhanced Search in Peer-to-Peer Networks using Fuzzy Logic, Sirish Kumar, Haribabu K, and Chittaranjan Hota, Lecture Notes in Computer Science(LNCS 5966),pp.188-193, ICDCIT 2010,(2010).
- Novel adaptive scheduling algorithm for computational Grids, S Bansal, Gowtham K, and Chittaranjan Hota, Proc. of IEEE International Conference on Internet Multimedia Services Architecture and Applications (IEEE IMSAA-IWAP2PT’09), Dec 2009, IIIT, Bangalore, India.
- Detecting Sybils in Peer-to-Peer File Replication Systems, K. Haribabu, Chittaranjan Hota, and Saravana S, Proc. of International Conference on Information Security and Digital Forensics (ISDF 2009), Sept 2009, City University, London.
- Adaptive Decentralized Load Sharing Algorithm with Multiple Job Transfers in Distributed Computing Environments, S Bansal, D Gupta, and Chittaranjan Hota, International Journal of Recent Trends in Engineering (IJRTE), Vol. 2, No.1-6, Academy Publishers, Finland, pp. 217-221 (2009).
- Priority-based Job Scheduling in Distributed Systems, Sunita Bansal, and Chittaranjan Hota, Sartaj Sahani et al. (Eds.), Communications in Computer and Information Science Series, Vol 31, pp. 110-118, Springer-Verlag Berlin Heidelberg (2009).
- Indexing through Querying in Unstructured Peer-to-Peer Overlay Networks, K. Haribabu, Chittaranjan Hota, and Antti Ylä-Jääski, Lecture Notes in Computer Science (LNCS 5297), pp. 102-111, Springer-Verlag Berlin Heidelberg (2008).
- Adaptive Bandwidth Management and QoS Provisioning in IP Virtual Private Networks, Chittaranjan Hota, Sanjay Jha and Raghurama G, International Journal of Computers and Applications, ACTA, pp. 142-150, Vol. 30, Issue 2 (2008).
- Energy-aware Routing in Mobile Ad-Hoc Networks, Murali P, Chittaranjan Hota and Antti Ylä-Jääski, Proc. of IFIP Wireless Days Conference 2008, Nov 2008, Dubai, IEEE Xplore.
- Adaptive Lookup for Unstructured Peer-to-Peer Overlays, K. Haribabu, Dayakar Reddy, C. R. Hota, A. Yla-Jaaski, and Sasu Tarkoma, Proc. of Third International Conference on Communication Systems & Middleware (IAMCOM/COMSWARE 2008), Jan 2008, Bangalore, India.
- Efficient Fault Tolerant Mobile IP in Wireless Networks using Load Balancing Approach, Shiladitya Bose and Chittaranjan Hota, Information Technology Journal, 6(3), 463-468(2007).
- Distributed Approach to Sybil Defense in Peer-to-Peer Overlay Networks, Chittaranjan Hota, Antti Ylä-Jääski, Janne Lindqvist, Kristine Karvonen, and Mohan C.K.J, Proc. of International Conference on Information Processing (ICIP 2007), Aug 2007, Bangalore, India.
- Sybil defense via Social Networks, Chittaranjan Hota, Antti Ylä-Jääski, Janne Lindqvist and Kristine Karvonen, Proc. of International Conference on Communications and Networking in China (CHINACOM 2007), Aug 2007, Shanghai, China.
- Dynamic IPv6-in-IPv4 Tunneling Extension to MobileIPv6 and Deployment in a Real Time Network with Secured Route Optimizations, Amarnath B, Prabhu Patil and Chittaranjan Hota, Proc. of First International Conference on Network Security(ICONS 2007), Jan 29-31, 2007, Erode, Tamilnadu, India.
- Safeguarding against Sybil attacks via Social networks and Multipath routing, C. Hota, J. Lindqvist, K. Karvonen, A.Yla-Jaaski, and C.K.J. Mohan, IEEE International Conference on Networking, Architecture, and Storage, 2007, NAS 2007, 2007, IEEE Xplore, pp. 122–132.
- Intrusion Detection System in Wireless Ad-hoc Networks using Bayesian Belief Networks, Navin Sati, and Chittaranjan Hota, National Conference on High Performance Computing, Vision-06, Govt College of Engineering, Tirunelveli, April 5-6, 2006.
- DiffServ QoS Provisioning for Real Time Traffic in Frequent Handoff MobileIPv6 Networks, Prabhu Patil and Chittaranjan Hota, International Journal of Computer Science and Network Security, 6(4), 151-155(2006).
- Bandwidth Guaranteed Restorable Multicast Virtual Private Networks, Chittaranjan Hota, Sanjay Jha, Raghurama G and William Lau, Proc. of Seventh IEEE International Conference on Personal Wireless Communications (ICPWC 2005), Jan 23-25, 2005, New Delhi, India.
- Bandwidth Guaranteed Restorable Paths in Multicast Virtual Private Networks, Chittaranjan Hota, Sanjay Jha, Raghurama G and William Lau, Proc. of Asia-Pacific Conf. on Parallel and Distributed Computing Technologies (ObComAPC 2004), Dec 13-15, 2004, Vellore, India.
- Distributed Dynamic Resource Management in IP Virtual Private Networks to Guarantee Quality of Service, Chittaranjan Hota, Sanjay Jha and Raghurama G, (Invited paper), Proc. of International Conference on Computer Networks (ICON 2004), Nov 16-19, 2004, Singapore.
- Design and Deployment of IP Virtual Private Networks: A Case Study, Chittaranjan Hota and Raghurama G, Lecture Notes in Computer Science (LNCS 3326), N. Das, A. Sen, Sajal. K. Das and B. P. Sinha (Eds.), Springer-Verlag, pp. 288-301 (2004).
- Restoration of Virtual Private Networks with Quality of Service Guarantees in the Pipe Model, Chittaranjan Hota, Sanjay Jha and Raghurama G, Lecture Notes in Computer Science (LNCS 3356), G. Das and V. P. Gulati (Eds.), Springer-Verlag, 76-86(2004).
- A Heuristic Algorithm for Quality of Service Path Computation in Virtual Private Networks, Chittaranjan Hota and Raghurama G, Proc. of Sixth International Conference on Information Technology (CIT 2003), Dec 22-25, 2003, Bhubaneswar, India.
- Building Virtual Private Networks to Support Mobile VPN users in a Group with Quality of Service Guarantees, Chittaranjan Hota and Raghurama G, Proc. of Third International Conference on Electronic Business (ICEB 2003), Dec 9-13, 2003, Singapore.