Follow
Jyotsna Kumar Mandal
Jyotsna Kumar Mandal
Professor of Computer Science & Engineering, Kalyani University
Verified email at klyuniv.ac.in - Homepage
Title
Cited by
Cited by
Year
A genetic algorithm (ga) based load balancing strategy for cloud computing
K Dasgupta, B Mandal, P Dutta, JK Mandal, S Dam
Procedia Technology 10, 340-347, 2013
4442013
Hash based least significant bit technique for video steganography (HLSB)
K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012
1342012
Incorporating nonlinearities of measurement function in power system dynamic state estimation
JK Mandal, AK Sinha, L Roy
IEE Proceedings-Generation, Transmission and Distribution 142 (3), 289-296, 1995
1171995
Colour image steganography based on pixel value differencing in spatial domain
JK Mandal, D Das
International journal of information sciences and techniques 2 (4), 2012
1122012
Computational Intelligence, Communications, and Business Analytics [electronic resource]: First International Conference, CICBA 2017, Kolkata, India, March 24–25, 2017, Revised …
JK Mandal, P Dutta, S Mukhopadhyay
Singapore: Springer Singapore: Imprint: Springer, 2017., 2017
100*2017
A novel secure image steganography method based on chaos theory in spatial domain
D Bandyopadhyay, K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 3 …, 2014
782014
QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack
RK Bar, JK Mandal, MM Singh
Procedia Technology 10, 530-537, 2013
772013
Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow
JK Mandal, D Das
arXiv preprint arXiv:1205.6775, 2012
642012
Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2
JK Mandal, SC Satapathy, MK Sanyal, PP Sarkar, A Mukhopadhyay
Springer India, 2015
612015
A genetic algorithm based steganography using discrete cosine transformation (GASDCT)
A Khamrui, JK Mandal
Procedia Technology 10, 105-111, 2013
612013
A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT)
N Ghoshal, JK Mandal
Malaysian Journal of Computer Science 21 (1), 24-32, 2008
542008
Computational intelligence in data mining-volume
LC Jain, HS Behera, JK Mandal, DP Mohapatra
Proceedings of the International Conference on CIDM 20, 21, 2014
472014
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection
NB Singh, MM Singh, A Sarkar, JK Mandal
Journal of Information Security and Applications 61, 102899, 2021
452021
Product recommendation for e-commerce business by applying principal component analysis (PCA) and K-means clustering: benefit for the society
S Bandyopadhyay, SS Thakur, JK Mandal
Innovations in Systems and Software Engineering 17 (1), 45-52, 2021
452021
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
452018
Wavelet based denoising of medical images using sub-band adaptive thresholding through genetic algorithm
S Mukhopadhyay, JK Mandal
Procedia Technology 10, 680-689, 2013
452013
Emerging Technologies in Data Mining and Information Security
A Abraham, P Dutta, JK Mandal, A Bhattacharya, S Dutta
Proceedings of IEMIS-2018, 2018
422018
Steganographic technique based on minimum deviation of fidelity (STMDF)
JK Mandal, M Sengupta
2011 Second International Conference on Emerging Applications of Information …, 2011
412011
Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC)
JK Mandal, M Sengupta
2010 International Symposium on Electronic System Design, 225-229, 2010
402010
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of Information Security and Applications 19 (4-5), 272-281, 2014
392014
The system can't perform the operation now. Try again later.
Articles 1–20