default search action
Sanjeev Sofat
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j29]Ridhma, Manvjeet Kaur, Sanjeev Sofat, Devendra K. Chouhan, Mahesh Prakash:
Automated measurement of sulcus angle on axial knee magnetic resonance images. Int. J. Imaging Syst. Technol. 32(1): 251-265 (2022) - [j28]Sanjay Madan, Sanjeev Sofat, Divya Bansal:
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9867-9888 (2022) - [j27]Nancy Singla, Manvjeet Kaur, Sanjeev Sofat:
Hybrid framework for identifying partial latent fingerprints using minutiae points and pores. Multim. Tools Appl. 81(14): 19525-19542 (2022) - [j26]Kavita V. Mitkari, Manoj K. Arora, Reet Kamal Tiwari, Sanjeev Sofat, Hemendra S. Gusain, Surya Prakash Tiwari:
Large-Scale Debris Cover Glacier Mapping Using Multisource Object-Based Image Analysis Approach. Remote. Sens. 14(13): 3202 (2022) - [c19]Ridhma, Manvjeet Kaur, Sanjeev Sofat, Devendra K. Chouhan, Mahesh Prakash:
Automated Sulcus Depth Measurement on Axial Knee MR Images. CVIP (1) 2022: 448-461 - 2021
- [j25]Ridhma, Manvjeet Kaur, Sanjeev Sofat, Devendra K. Chouhan:
Review of automated segmentation approaches for knee images. IET Image Process. 15(2): 302-324 (2021) - [j24]Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat:
Optimised K-anonymisation technique to deal with mutual friends and degree attacks. Int. J. Inf. Comput. Secur. 14(3/4): 281-299 (2021) - [j23]Parmod Kalia, Divya Bansal, Sanjeev Sofat:
A hybrid approach for preserving privacy for real estate data. Int. J. Inf. Comput. Secur. 15(4): 400-410 (2021) - [j22]Parmod Kalia, Divya Bansal, Sanjeev Sofat:
Privacy Preservation in Cloud Computing Using Randomized Encoding. Wirel. Pers. Commun. 120(4): 2847-2859 (2021) - 2020
- [j21]Rahul Hooda, Ajay Mittal, Sanjeev Sofat:
A Novel Ensemble Method for PTB Classification in CXRs. Wirel. Pers. Commun. 112(2): 809-826 (2020)
2010 – 2019
- 2019
- [j20]Monika Singh, Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Analytical Model for Identifying Suspected Users on Twitter. Cybern. Syst. 50(4): 383-404 (2019) - [j19]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Malware intelligence: beyond malware analysis. Int. J. Adv. Intell. Paradigms 13(1/2): 80-100 (2019) - [j18]Rahul Hooda, Ajay Mittal, Sanjeev Sofat:
Automated TB classification using ensemble of deep architectures. Multim. Tools Appl. 78(22): 31515-31532 (2019) - 2018
- [j17]Monika Singh, Divya Bansal, Sanjeev Sofat:
Who is Who on Twitter-Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time. Cybern. Syst. 49(1): 1-25 (2018) - [j16]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
What about Privacy of My OSN Data? Cybern. Syst. 49(1): 44-63 (2018) - [j15]Manvjeet Kaur, Sanjeev Sofat:
Real-time chaff generation for a biometric fuzzy vault. Turkish J. Electr. Eng. Comput. Sci. 26(1): 89-100 (2018) - [j14]Ajay Mittal, Rahul Hooda, Sanjeev Sofat:
LF-SegNet: A Fully Convolutional Encoder-Decoder Network for Segmenting Lung Fields from Chest Radiographs. Wirel. Pers. Commun. 101(1): 511-529 (2018) - [j13]Rahul Hooda, Ajay Mittal, Sanjeev Sofat:
An Efficient Variant of Fully-Convolutional Network for Segmenting Lung Fields from Chest Radiographs. Wirel. Pers. Commun. 101(3): 1559-1579 (2018) - [c18]Gulbadan Khehra, Sanjeev Sofat:
BotScoop: Scalable Detection of DGA Based Botnets Using DNS Traffic. ICCCNT 2018: 1-6 - 2017
- [j12]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Malware Threat Assessment Using Fuzzy Logic Paradigm. Cybern. Syst. 48(1): 29-48 (2017) - [j11]Nancy Singla, Sanjeev Sofat, Manvjeet Kaur:
Neoteric chaff generation method of fingerprint fuzzy vault. Turkish J. Electr. Eng. Comput. Sci. 25: 4722-4733 (2017) - [j10]Ajay Mittal, Rahul Hooda, Sanjeev Sofat:
Lung field segmentation in chest radiographs: a historical review, current status, and expectations from deep learning. IET Image Process. 11(11): 937-952 (2017) - [j9]Gurdit Singh, Divya Bansal, Sanjeev Sofat:
A smartphone based technique to monitor driving behavior using DTW and crowdsensing. Pervasive Mob. Comput. 40: 56-70 (2017) - [j8]Gurdit Singh, Divya Bansal, Sanjeev Sofat, Naveen Aggarwal:
Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing. Pervasive Mob. Comput. 40: 71-88 (2017) - [j7]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
A Framework for Generating Malware Threat Intelligence. Scalable Comput. Pract. Exp. 18(3): 195-206 (2017) - [c17]Rahul Hooda, Sanjeev Sofat, Simranpreet Kaur, Ajay Mittal, Fabrice Mériaudeau:
Deep-learning: A potential method for tuberculosis detection using chest radiography. ICSIPA 2017: 497-502 - 2016
- [j6]Monika Singh, Divya Bansal, Sanjeev Sofat:
Followers or Fradulents? An Analysis and Classification of Twitter Followers Market Merchants. Cybern. Syst. 47(8): 674-689 (2016) - [j5]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
Preventing Identity Disclosure in Social Networks Using Intersected Node. Int. J. Inf. Secur. Priv. 10(3): 25-41 (2016) - [j4]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Tools & Techniques for Malware Analysis and Classification. Int. J. Next Gener. Comput. 7(3) (2016) - [j3]Monika Singh, Divya Bansal, Sanjeev Sofat:
Behavioral analysis and classification of spammers distributing pornographic content in social media. Soc. Netw. Anal. Min. 6(1): 41:1-41:18 (2016) - [c16]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
A Novel Approach to Evade Attacks in Online Social Networks. ICCNS 2016: 70-74 - [c15]Monika Singh, Divya Bansal, Sanjeev Sofat:
A Novel Technique to Characterize Social Network Users: Comparative Study. ICCNS 2016: 75-79 - [c14]Manvjeet Kaur, Sanjeev Sofat:
Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack. ISED 2016: 122-126 - [c13]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Zero-day malware detection. ISED 2016: 171-175 - 2015
- [j2]Nidhi Gautam, Sanjeev Sofat, Renu Vig:
Data collection model for energy-efficient wireless sensor networks. Ann. des Télécommunications 70(11-12): 501-511 (2015) - [c12]Deepika Bansal, Sanjeev Sofat, Manvjeet Kaur:
Fingerprint fuzzy vault using hadamard transformation. ICACCI 2015: 1830-1834 - 2014
- [c11]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Approach of Privacy Preserving based Publishing in Twitter. SIN 2014: 39 - [c10]Monika Singh, Divya Bansal, Sanjeev Sofat:
Detecting Malicious Users in Twitter using Classifiers. SIN 2014: 247 - [c9]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Integrated Framework for Classification of Malwares. SIN 2014: 417 - [c8]Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Classification of PE Files using Static Analysis. SIN 2014: 429 - 2013
- [c7]Nidhi Gautam, Sanjeev Sofat, Renu Vig:
An Ant Voronoi Based Clustering Approach for Wireless Sensor Networks. ADHOCNETS 2013: 32-46 - 2012
- [c6]Ajay Mittal, Sanjeev Sofat, Edwin R. Hancock:
Detection of Edges in Color Images: A Review and Evaluative Comparison of State-of-the-Art Techniques. AIS 2012: 250-259 - [c5]Ajay Mittal, Sanjeev Sofat, Edwin R. Hancock:
An Efficient Scheme for Color Edge Detection in Uniform Color Space. AIS 2012: 260-267 - [c4]Ajay Mittal, Sanjeev Sofat, Edwin R. Hancock, Stéphane Mousset:
A Statistical Operator for Detecting Weak Edges in Low Contrast Images. ICIAR (1) 2012: 89-96 - 2010
- [c3]Divya Bansal, Sanjeev Sofat:
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment. NSDR 2010: 15
2000 – 2009
- 2009
- [j1]Naveen Aggarwal, Nupur Prakash, Sanjeev Sofat:
Web hypermedia content management system effort estimation model. ACM SIGSOFT Softw. Eng. Notes 34(2): 1-7 (2009) - 2008
- [c2]Naveen Aggarwal, Nupur Prakash, Sanjeev Sofat:
Content Management System Effort Estimation Using Bagging Predictors. EIAT/IETA 2008: 19-24 - [c1]Naveen Aggarwal, Nupur Prakash, Sanjeev Sofat:
Detecting camera movements & production effects in digital videos. Bangalore Compute Conf. 2008: 13
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint