Sanjay Saha

ORCID: 0009-0003-5386-0768
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Machine Learning in Bioinformatics
  • Hepatitis C virus research
  • Media Influence and Health
  • Computational Drug Discovery Methods
  • Biometric Identification and Security
  • RNA and protein synthesis mechanisms
  • Generative Adversarial Networks and Image Synthesis
  • Hearing Impairment and Communication
  • Hand Gesture Recognition Systems
  • Social Media and Politics
  • Misinformation and Its Impacts
  • Face recognition and analysis
  • Advanced Authentication Protocols Security
  • Security and Verification in Computing
  • SARS-CoV-2 and COVID-19 Research
  • Human Pose and Action Recognition
  • Media, Gender, and Advertising
  • Digital Media Forensic Detection
  • Privacy, Security, and Data Protection
  • Genomics and Phylogenetic Studies
  • Emotion and Mood Recognition
  • Advanced Image Processing Techniques
  • Access Control and Trust
  • Vibration Control and Rheological Fluids

National University of Singapore
2019-2025

Mawlana Bhashani Science and Technology University
2019-2022

University of Rajshahi
2022

Institute of Post Graduate Medical Education and Research
2020-2021

University of Asia Pacific
2017-2019

United International University
2017-2018

Jadavpur University
2015

Abstract Glycation is chemical reaction by which sugar molecule bonds with a protein without the help of enzymes. This often cause to many diseases and therefore knowledge about glycation very important. In this paper, we present iProtGly‐SS, lysine site identification method based on features extracted from sequence secondary structural information. experiments, found best feature groups combination: Amino Acid Composition, Secondary Structure Motifs, Polarity. We used support vector...

10.1002/prot.25511 article EN Proteins Structure Function and Bioinformatics 2018-04-20

Abstract The year 2020 witnessed a heavy death toll due to COVID-19, calling for global emergency. continuous ongoing research and clinical trials paved the way vaccines. But, vaccine efficacy in long run is still questionable mutating coronavirus, which makes drug re-positioning reasonable alternative. COVID-19 has hence fast-paced treatment of its symptoms. This work builds computational models using matrix completion techniques predict drug-virus association re-positioning. aim assist...

10.1038/s41598-021-88153-3 article EN cc-by Scientific Reports 2021-04-27

Deepfakes of deceased individuals have recently been explored as tools for conveying prosocial messages that promote positive behaviors. This exploratory study examines how nostalgia influences the perceived credibility this particular deepfake genre, focusing on psychological mechanisms narrative persuasion: transportation and character identification. Nostalgia in narratives about can reduce defensive avoidance shape attitudes through these mechanisms. A between-subjects experiment (n =...

10.31219/osf.io/jvybw_v1 preprint EN 2025-02-03

10.1109/wacv61041.2025.00110 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

Amid growing ethical concerns over the viral spread of deepfakes, existing literature suggests that their sensory richness and enhanced realism evoke complex, sometimes contradictory, audience reactions. This study examines persuasive potential deepfakes by comparing responses to identical resurrection narratives presented in deepfake video format versus text-based storytelling. Participants (N = 813, Mage 37.28, SDage 12.46) were exposed either a or textual narrative featuring historical...

10.31219/osf.io/r6p8a_v1 preprint EN 2025-04-25

This research applies Uses and Gratifications theory to examine individual motivations for sharing or not deepfakes. After characterizing popular deepfakes in five genres (two examples each), 1035 US participants (42% female; Age: M = 42.8, SD 14.1, Mdn 41, Range 18–93) watched one of the ten completed a questionnaire Prolific. Results show that most would share due lack personal relevance. However, those who did intend them had hedonistic motivations, mostly enjoyment desire entertainment...

10.31235/osf.io/mhd48_v2 preprint EN 2025-05-07

Recent advancements in the field of computer vision with help deep neural networks have led us to explore and develop many existing challenges that were once unattended due lack necessary technologies. Hand Sign/Gesture Recognition is one significant areas where network making a substantial impact. In last few years, large number researches has been conducted recognize hand signs gestures, which we aim extend our mother-tongue, Bangla (also known as Bengali). The primary goal work make an...

10.2139/ssrn.3358187 article EN SSRN Electronic Journal 2019-01-01

The recent renaissance in generative models, driven primarily by the advent of diffusion models and iterative improvement GAN methods, has enabled many creative applications. However, each advancement is also accompanied a rise potential for misuse. In arena deepfake generation, this key societal issue. particular, ability to modify segments videos using such techniques creates new paradigm deepfakes which are mostly real altered slightly distort truth. This been under-explored current...

10.1109/iccvw60793.2023.00048 article EN 2023-10-02

Electroencephalogram (EEG) signals are of very low amplitude and easily contaminated by different types noises like environmental non-cerebral in nature. Thus signal pre-processing is a major challenge while dealing with applications involving EEG signals. The scenario becomes much more complex using commercially available, resolution devices as they have fewer electrodes. In this paper, we applied some the widely used processing techniques to get rid eye blink noise related artifacts from...

10.1109/smc.2015.256 article EN 2015-10-01

In order to provide the additional security required by modern mobile devices, biometric methods and Continuous Authentication(CA) systems are getting popular. Most existing work on CA concerned about achieving higher accuracy or fusing multiple modalities. However, in a environment there more constraints resources available. This is first compare between different modalities based they use. We do this determining Resource Profile Curve (RPC) for each modality. reveals trade-off...

10.1109/icb45273.2019.8987402 article EN 2019-06-01

Face recognition is a popular form of biometric authentication and due to its widespread use, attacks have become more common as well.Recent studies show that Recognition Systems are vulnerable can lead erroneous identification faces.Interestingly, most these white-box, or they manipulating facial images in ways not physically realizable.In this paper, we propose an attack scheme where the attacker generate realistic synthesized face with subtle perturbations realize onto his black-box...

10.1109/ijcb48548.2020.9304864 preprint EN 2020-09-28

VANET (Vehicular Ad-hoc NETwork) is a network architecture designed to provide road safety, improve transport efficiency, and reduce traffic congestion by combining vehicles with high mobility fixed road-side units or without Vehicular Cloud. Connected aided sensors need be authenticated before transmitting message. Two major problems in existing state-of-the-art schemes which are redundant authentication of each RSUs it passes through authenticating message trusted authority large...

10.1109/iccitechn.2017.8281821 article EN 2017-12-01

With the advancement of Information technologies and applications, a copious amount data is generated, which attracts both research community to utilize this information for extracting knowledge industry developing knowledge-based system. Visualization data, pattern mining from datasets analyzing drift different features are three highly used applications machine learning science fields. A generic web-based tool integrated with such will provide prodigious support preprocessing dataset thus...

10.1109/wiecon-ece.2017.8468939 article EN 2017-12-01

Institute, Warsaw, Poland This paper describes the results of IEEE BigData 2023 Keystroke Verification Challenge <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">1</sup> (KVC), that considers biometric verification performance Dynamics (KD), captured as tweet-long sequences variable transcript text from over 185,000 subjects. The data are obtained two largest public databases KD up to date, Aalto Desktop and Mobile Databases, guaranteeing a...

10.1109/bigdata59044.2023.10386557 article EN 2021 IEEE International Conference on Big Data (Big Data) 2023-12-15

This paper describes the results of IEEE BigData 2023 Keystroke Verification Challenge (KVC), that considers biometric verification performance Dynamics (KD), captured as tweet-long sequences variable transcript text from over 185,000 subjects. The data are obtained two largest public databases KD up to date, Aalto Desktop and Mobile Databases, guaranteeing a minimum amount per subject, age gender annotations, absence corrupted data, avoiding excessively unbalanced subject distributions with...

10.48550/arxiv.2401.16559 preprint EN arXiv (Cornell University) 2024-01-29

This article presents the Keystroke Verification Challenge - onGoing (KVC-onGoing), on which researchers can easily benchmark their systems in a common platform using large-scale public databases, Aalto University and standard experimental protocol. The keystroke data consist of tweet-long sequences variable transcript text from over 185,000 subjects, acquired through desktop mobile keyboards simulating real-life conditions. results evaluation set KVC-onGoing have proved high discriminative...

10.2139/ssrn.4743934 preprint EN 2024-01-01

Face reenactment refers to the process of transferring pose and facial expressions from a reference (driving) video onto static (source) image while maintaining original identity source image. Previous research in this domain has made significant progress by training controllable deep generative models generate faces based on specific identity, expression conditions. However, mechanisms used these methods control often inadvertently introduce information driving video, also causing loss...

10.48550/arxiv.2406.13272 preprint EN arXiv (Cornell University) 2024-06-19

This research applies Uses and Gratifications theory to examine individual motivations for sharing or not deepfakes. After characterizing popular deepfakes in five genres (two examples each), 1035 US participants (42% female; Age: M = 42.8, SD 14.1, Mdn 41, Range 18–93) watched one of the ten completed a questionnaire Prolific. Results show that most would share due lack personal relevance. However, those who did intend them had hedonistic motivations, mostly enjoyment desire entertainment...

10.31235/osf.io/mhd48 preprint EN 2024-11-11
Coming Soon ...