Follow
Indira K Dutta
Indira K Dutta
Assistant Professor, Arkansas Tech University
Verified email at atu.edu
Title
Cited by
Cited by
Year
Lightweight Cryptography for Internet of Insecure Things: A Survey
IK Dutta, B Ghosh, M Bayoumi
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
1042019
A survey on security in internet of things with a focus on the impact of emerging technologies
P Williams, IK Dutta, H Daoud, M Bayoumi
Internet of Things 19, 100564, 2022
702022
Generative Adversarial Networks in Security: A Survey
IK Dutta, B Ghosh, AH Carlson, M Totaro, M Bayoumi
2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020
312020
A survey on the progression and Performance of Generative Adversarial Networks
B Ghosh, IK Dutta, M Totaro, M Bayoumi
2020 11th International Conference on Computing, Communication and …, 2020
162020
An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes
B Ghosh, IK Dutta, AH Carlson, M Totaro, M Bayoumi
2020 IEEE 11th Annual Ubiquitous Computing, Electronics and Mobile …, 2020
112020
Minimizing shadowing effects on mobile ad hoc networks
D Debnath, CA Hossain, R Islam, M Tarique, IK Dutta
Journal of Selected Areas in Telecommunications 1 (10), 46-51, 2011
92011
Security Aspects in Internet of Things – A Survey
P Williams, IK Dutta, H Daoud, M Bayoumi
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
82020
Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices
IK Dutta, B Ghosh, AH Carlson, M Bayoumi
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
72020
A hardware obfuscation technique for manufacturing a secure 3D IC
S Madani, MR Madani, IK Dutta, Y Joshi, M Bayoumi
2018 IEEE 61st International Midwest Symposium on Circuits and Systems …, 2018
72018
Evaluating True Cryptographic Key Space Size
A Carlson, G Gang, T Gang, B Ghosh, IK Dutta
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
52021
Generative adversarial networks in security: A survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
IK Dutta, B Ghosh, A Carlson, M Totaro, M Bayoumi
IEEE, 0399ś0405, 2020
52020
Isomorphic cipher reduction
B Ghosh, IK Dutta, S Khare, A Carlson, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
42021
Key space reduction using isomorphs
A Carlson, B Ghosh, IK Dutta, S Khare, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
32021
Using the collision attack for breaking cryptographic modes
A Carlson, I Dutta, B Ghosh
2022 13th International Conference on Computing Communication and Networking …, 2022
22022
Modeling polymorphic ciphers
A Carlson, IK Dutta, B Ghosh, M Totaro
2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC), 1-5, 2021
22021
A High-performance Lightweight Polymorphic Encryption System for Constrained Internet of Things (IoT) Devices
IK Dutta
University of Louisiana at Lafayette, 2021
12021
Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms-A Survey
AKMRR Habib, EE Akpan, B Ghosh, IK Dutta
2024 IEEE 14th Annual Computing and Communication Workshop and Conference …, 2024
2024
A Demonstrable Break of PCBC Mode
A Carlson, I Dutta, B Ghosh
2023 International Symposium on Networks, Computers and Communications …, 2023
2023
Enhancing the Programming Sequence for Undergraduate Computer Science Students: A Program for Improving Learning Outcomes
M Rahaman, R Ghosh, I Dutta, T Ensari, R Cunningham
2023 5th International Congress on Human-Computer Interaction, Optimization …, 2023
2023
The Problem with Regular Multiple Byte Block Boundaries in Encryption
A Carlson, I Dutta, B Ghosh, R Hiromoto
2022 IEEE 13th Annual Information Technology, Electronics and Mobile …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20