Publications

(2024). Climbing the Influence Tiers on TikTok: A Multimodal Study. The 18th International AAAI Conference on Web and Social Media (ICWSM-2024). [Core: A Ranked].

Preprint Cite DOI

(2023). EPASAD: Ellipsoid Decision Boundary Based Process-Aware Stealthy Attack Detector. Cybersecurity, Springer. [Q1].

Cite DOI

(2023). KalpaVriksh: Efficient and Cost-effective GUI Application Hosting using Singleton Snapshots. The 23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGrid-2023). [Core: A Ranked ].

Cite DOI

(2022). InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems. ACM Journal on Digital Threats: Research and Practice (DTRAP). [Q2].

Cite DOI

(2022). SniP: An Efficient Stack Tracing Framework for Multi-threaded Programs. 2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR-2022). [Core: A Ranked].

Preprint Cite Code DOI

(2022). AndroOBFS: Time-tagged Obfuscated Android Malware Dataset with Family Information. 2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR-2022). [Core: A Ranked].

Preprint Cite Dataset Slides Video DOI

(2021). Android Malware Family Classification: What Works -- API Calls, Permissions or API Packages?. 14th International Conference on Security of Information and Networks (SIN-2021). [Core: C Ranked].

Preprint Cite Slides Video DOI

(2021). DeepDetect: A Practical On-device Android Malware Detector. 21st IEEE International Conference on Software Quality, Reliability, and Security (QRS-2021). [Core: B Ranked].

Preprint Cite Dataset Slides Video DOI Appendix

(2020). STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments. 19th International Conference on Cryptology and Network Security (CANS-2020). [Core: B Ranked].

Preprint Cite Slides Video DOI Appendix

(2020). The State of Android Security. Cyber Security in India. IIT Directions book series, vol 4. Springer, Singapore (Book Chapter).

Cite DOI

(2019). Host-Server-Based Malware Detection System for Android Platforms Using Machine Learning. 5th International Conference on Computing Intelligence & Collaborative Technology (CICT-2019).

Cite DOI

(2012). An Enhanced and Effective Encrypting Algorithm for High Volume Video Data Streaming Application on MANET. IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT-2012).

PDF Cite

(2011). Simulation based Performance Comparison of AODV, DSR and WRP Routing Protocols in MANET using Random Waypoint Mobility Model. National Conference on Artificial Intelligence and Agents: Theory & Applications (AIATA).

Cite