default search action
Saikat Das
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks. Algorithms 17(3): 99 (2024) - [c19]Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, Sajjan G. Shiva:
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation. CCWC 2024: 527-533 - [c18]Saikat Das, Bhargavi Krishnamurthy, Raktim Ranjan Das, Sajjan G. Shiva:
State of the art: Security Testing of Machine Learning Development Systems. CCWC 2024: 534-540 - [i1]Sajal Saha, Saikat Das, Glaucio H. S. Carvalho:
ConvLSTMTransNet: A Hybrid Deep Learning Approach for Internet Traffic Telemetry. CoRR abs/2409.13179 (2024) - 2023
- [j4]Saikat Das, Indranil Bose, Uttam Kumar Sarkar:
Predicting the outbreak of epidemics using a network-based approach. Eur. J. Oper. Res. 309(2): 819-831 (2023) - [c17]Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:
Handling Node Discovery Problem in Fog Computing using Categorical51 Algorithm With Explainability. AIIoT 2023: 210-215 - [c16]Saikat Das, Zhifang Wang:
Optimizing Microgrid Energy Management Systems with Variable Renewable Energy Penetration: Analysis of Data Loss Effects. FTC (2) 2023: 357-374 - [c15]Saikat Das, Mazharul Hossain, Sajjan G. Shiva:
Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art. ICIT 2023: 561-566 - [c14]Mazharul Hossain, Saikat Das, Bhargavi Krishnamurthy, Sajjan G. Shiva:
Explainability of Artificial Intelligence Systems: A Survey. ISNCC 2023: 1-6 - [c13]Onkar Singh, Koushlendra Kumar Singh, Saikat Das, Akbar Sheikh Akbari, Nurulfajar Abd Manap:
Classification of lung cancer from histopathology Images using a Deep Ensemble Classifier. IST 2023: 1-6 - 2022
- [j3]Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, Anwar Haque, Sajjan G. Shiva:
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection. IEEE Trans. Netw. Serv. Manag. 19(4): 4821-4833 (2022) - [c12]Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:
MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing. AIIoT 2022: 84-90 - [c11]Saikat Das, Zhifang Wang:
Cascading Failure Risk Analysis of Electrical Power Grid. FTC (1) 2022: 906-923 - [c10]Raktim Ranjan Das, Bhargavi Krishnamurthy, Saikat Das:
Securing IoT devices using Ensemble Machine Learning in Smart Home Management System. SSCI 2022: 915-922 - 2021
- [c9]Saikat Das, Sajjan G. Shiva:
Machine Learning application lifecycle augmented with explanation and security. UEMCON 2021: 171-177 - 2020
- [j2]Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan G. Shiva, Frederick T. Sheldon:
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Secur. 97: 101994 (2020) - [j1]Saikat Das, Amitabha Bhattacharya:
Application of the Mixture of Lognormal Distribution to Represent the First-Order Statistics of Wireless Channels. IEEE Syst. J. 14(3): 4394-4401 (2020) - [c8]Saikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon:
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack. CSCloud/EdgeCom 2020: 56-61 - [c7]Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, Sajjan G. Shiva:
Taxonomy and Survey of Interpretable Machine Learning Method. SSCI 2020: 670-677 - [c6]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning. SSCI 2020: 829-835 - [c5]Mohammad Ashrafuzzaman, Saikat Das, Ananth A. Jillepalli, Yacine Chakhchoukh, Frederick T. Sheldon:
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems. SSCI 2020: 1131-1137 - [c4]Namita Agarwal, Saikat Das:
Interpretable Machine Learning Tools: A Survey. SSCI 2020: 1528-1534
2010 – 2019
- 2019
- [c3]Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
DDoS Intrusion Detection Through Machine Learning Ensemble. QRS Companion 2019: 471-477 - 2018
- [c2]Sajjan G. Shiva, Saikat Das:
CoRuM: Collaborative Runtime Monitor Framework for Application Security. UCC Companion 2018: 201-206 - 2016
- [c1]Saikat Das, Mohammad Zulkernine:
CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions. HASE 2016: 268-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint