Follow
Dr. Arunava Roy
Dr. Arunava Roy
Research Assistant Prof., Dept. of CS, The University of Memphis, USA
Verified email at memphis.edu
Title
Cited by
Cited by
Year
Emerging trends, techniques and open issues of containerization: A review
J Watada, A Roy, R Kadikar, H Pham, B Xu
IEEE Access 7, 152443-152472, 2019
972019
Advances in User Authentication
D Dasgupta, A Roy, A Nag
Book; Springer, 2017
902017
Toward the design of adaptive selection strategies for multi-factor authentication
D Dasgupta, A Roy, A Nag
Computers & Security (Elsevier) 63, 85-116;, 2016
862016
Multi-factor authentication: more secure approach towards authenticating individuals
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag
Advances in User Authentication, 185-233, 2017
822017
In object detection deep learning methods, YOLO shows supremum to Mask R-CNN
S Shahriar, W Junzo, R Anurava, DRA Rambli
Journal of Physics: Conference Series; https://iopscience.iop.org/article/10 …, 2020
552020
A structure-based software reliability allocation using fuzzy analytic hierarchy process
S Chatterjee, JB Singh, A Roy
International Journal of Systems Science (Taylor & Francis) 46 (3), 513-525 …, 2015
412015
Adaptive multi-factor authentication system
D Dasgupta, AK Nag, A Roy
US Patent 9,912,657, 2018
272018
Software Fault Prediction using Neuro-Fuzzy Network and Evolutionary Learning Approach
C Subhashis, N Shobhit, A Roy
Neural Computing and Applications (Springer), 1-11; Impact Factor: 2.505, 2016
24*2016
An Adaptive Approach Towards the Selection of Multi-Factor Authentication
AK Nag, A Roy, D Dasgupta
Computational Intelligence, 2015 IEEE Symposium Series on, 463 - 472, 2015
242015
A reinforcement learning algorithm for automated detection of skin lesions
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Applied Sciences 11 (20), 9367, 2021
212021
Insights from curve fitting models in mouse dynamics authentication systems
YXM Tan, A Binder, A Roy
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
212017
Multi-user Permission Strategy to Access Sensitive Information
D Dasgupta, A Roy, D Ghosh
Information Sciences 423, 24-49, 2017
21*2017
Novel algorithms for web software fault prediction
S Chatterjee, A Roy
Quality and Reliability Engineering International (Wiley) 31 (8), 1517-1535 …, 2015
202015
A novel multivariate fuzzy time series based forecasting algorithm incorporating the effect of clustering on prediction
A Roy
Soft Computing (Springer) 20 (5), 1991-2019; Impact Factor 2.472, 2016
152016
Negative Authentication Systems: Who am I?“I am not this; no, nor am I this, nor this,” then which remains is the identity of I
D Dasgupta, A Roy, A Nag, D Dasgupta, A Roy, A Nag
Advances in User Authentication, 85-145, 2017
142017
A fuzzy decision support system for multifactor authentication
A Roy, D Dasgupta
Soft Computing (Springer), 1-23; Impact Factor 2.472, 2017
142017
Enhanced reinforcement learning model for extraction of objects in complex imaging
UA Usmani, A Roy, J Watada, J Jaafar, IA Aziz
Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume …, 2022
132022
Particle swarm optimization with deep learning for human action recognition
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021
132021
Particle swarm optimization with deep learning for human action recognition
UA Usmani, J Watada, J Jaafar, IA Aziz, A Roy
Int. J. Innovative Comput. Inform. Control 17 (6), 1843-1870, 2021
132021
Preference Identification Based on Big Data Mining for Customer Responsibility Management.
J Watada, A Roy, P Vasant
International Journal of Intelligent Technologies & Applied Statistics 13 (1), 2020
132020
The system can't perform the operation now. Try again later.
Articles 1–20