Angshuman Jana

ORCID: 0000-0003-1044-7765
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Advanced Database Systems and Queries
  • Web Application Security Vulnerabilities
  • Advanced Malware Detection Techniques
  • scientometrics and bibliometrics research
  • Software System Performance and Reliability
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Face and Expression Recognition
  • Parallel Computing and Optimization Techniques
  • Doctoral Education Challenges and Solutions
  • Complex Network Analysis Techniques
  • Recommender Systems and Techniques
  • Service-Oriented Architecture and Web Services
  • IoT and Edge/Fog Computing
  • Advanced Graph Neural Networks
  • Misinformation and Its Impacts
  • Software Reliability and Analysis Research
  • Cloud Computing and Resource Management
  • Opportunistic and Delay-Tolerant Networks
  • Subtitles and Audiovisual Media
  • Sentiment Analysis and Opinion Mining
  • Distributed and Parallel Computing Systems
  • Machine Learning and ELM

Indian Institute of Information Technology Guwahati
2020-2024

Indian Institute of Technology Patna
2015-2018

National Institute of Technology Durgapur
2014

10.1109/tai.2025.3558183 article EN IEEE Transactions on Artificial Intelligence 2025-01-01

In today's world the art of sending & displaying hidden information especially in public places, has received much attention and faced many challenges. Therefore, different methods have been proposed so far for hiding various cover media. Steganography is method to hide a message inside another without drawing any suspicion others that can only be detected by its intended recipient. With other steganography such as Image, Audio, Video, number text algorithms introduced. This paper presents...

10.1109/iccpct.2014.7054849 article EN 2014-03-01

Dependency information (data-and/or control-dependencies) among program variables and statements is playing crucial roles in a wide range of software-engineering activities, e.g. slicing, flow security analysis, debugging, code-optimization, code-reuse, code-understanding.Most existing dependency analyzers focus on mainstream languages they do not support database applications embedding queries data-manipulation commands.The first extension to the for relational management systems, proposed...

10.1109/tse.2018.2861707 article EN IEEE Transactions on Software Engineering 2018-07-31

10.1007/s41060-024-00623-9 article EN International Journal of Data Science and Analytics 2024-08-14

SQL injection attack is one of the serious security threat for a database application. It permits attackers to get unauthorized access by inserting malicious code into application through user input parameters. In this paper, we propose input-based analysis approach detect and prevent Injection Attacks (SQLIA), as an alternative existing solutions. This technique has two part (i) categorization (ii) verifier. We provide brief discussion proposal w.r.t literature on time cost point view.

10.1109/tensymp50017.2020.9230758 article EN 2017 IEEE Region 10 Symposium (TENSYMP) 2020-01-01

In scientific research work, collaboration always plays an important role. Although the development of new is mostly aligned among established researchers. However, need for Early Career-stage Researcher (ECR) a crucial role in his career and growth works concerned domain. this we address ECR co-authorship network characterize their behavior. We analyze pub-lication pattern ECRs first ten years compare same with early stage period Note that, use h-index distributions authors to find...

10.1109/gcon58516.2023.10183410 article EN 2023-06-23

In the realm of scientific research, collaboration plays a pivotal role. Identifying and supporting Early Career-stage Researchers (ECRs) is crucial for fostering their career development ensuring growth knowledge in respective fields. this paper, we present machine learning-based approach to identify ECRs from large-scale bibliographic datasets. Our proposed framework leverages various features extracted dataset, including publication records, citation patterns, academic affiliations,...

10.1109/icccnt56998.2023.10307427 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2023-07-06

Now-a-days web applications are everywhere. Usually these developed by database program which often written in popular host programming languages such as C, C++, C#, Java, etc., with embedded Structured Query Language (SQL). These used to access and process crucial data the help of Database Management System (DBMS). Preserving sensitive from any kind attacks is one prime factors that needs be maintained applications. The SQL injection important security threat for In this paper, we propose a...

10.1109/icccnt49239.2020.9225575 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2020-07-01

10.1007/s11042-024-19967-2 article EN Multimedia Tools and Applications 2024-08-08

10.1109/icccnt61001.2024.10724209 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2024-06-24

10.1109/tensymp61132.2024.10752184 article EN 2017 IEEE Region 10 Symposium (TENSYMP) 2024-09-27
Coming Soon ...