default search action
Ashutosh Dhar Dwivedi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j28]Ashutosh Dhar Dwivedi, Rajani Singh, Keshav Kaushik, Raghava Rao Mukkamala, Waleed S. Alnumay:
Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j27]Shalini Dhar, Ashish Khare, Ashutosh Dhar Dwivedi, Rajani Singh:
Securing IoT devices: A novel approach using blockchain and quantum cryptography. Internet Things 25: 101019 (2024) - [j26]Subhrangshu Adhikary, Subhayu Dutta, Ashutosh Dhar Dwivedi:
TinyWolf - Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization. Internet Things 28: 101365 (2024) - [j25]Vatsal Vasani, Kumar Prateek, Ruhul Amin, Soumyadev Maity, Ashutosh Dhar Dwivedi:
Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions. J. Ind. Inf. Integr. 39: 100594 (2024) - [j24]Subhayu Dutta, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi:
VisFormers - Combining Vision and Transformers for Enhanced Complex Document Classification. Mach. Learn. Knowl. Extr. 6(1): 448-463 (2024) - 2023
- [j23]Deepraj Chowdhury, Soham Banerjee, Madhushree Sannigrahi, Arka Chakraborty, Anik Das, Ajoy Dey, Ashutosh Dhar Dwivedi:
Federated learning based Covid-19 detection. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j22]Ashutosh Dhar Dwivedi, Gautam Srivastava:
Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK. Internet Things 21: 100677 (2023) - [j21]Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Pushpita Chatterjee, Jerry Chun-Wei Lin:
A Privacy-Preserving Internet of Things Smart Healthcare Financial System. IEEE Internet Things J. 10(21): 18452-18460 (2023) - [j20]Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi, Uttam Ghosh, Waleed S. Alnumay:
DeCrypt: a 3DES inspired optimised cryptographic algorithm. J. Ambient Intell. Humaniz. Comput. 14(5): 4745-4755 (2023) - 2022
- [j19]Rajani Singh, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala, Waleed S. Alnumay:
Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems. Comput. Electr. Eng. 103: 108290 (2022) - [j18]Ashutosh Dhar Dwivedi, Rajani Singh, Uttam Ghosh, Raghava Rao Mukkamala, Amr Tolba, Omar Said:
Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. J. Ambient Intell. Humaniz. Comput. 13(10): 4639-4649 (2022) - [j17]Hong-ni Zhang, Ashutosh Dhar Dwivedi:
Precise Marketing Data Mining Method of E-Commerce Platform Based on Association Rules. Mob. Networks Appl. 27(6): 2400-2408 (2022) - [j16]Deepraj Chowdhury, Anik Das, Ajoy Dey, Shreya Sarkar, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala, Lakhindar Murmu:
ABCanDroid: A Cloud Integrated Android App for Noninvasive Early Breast Cancer Detection Using Transfer Learning. Sensors 22(3): 832 (2022) - [j15]Manik Gupta, Bhisham Sharma, Akarsh Tripathi, Shashank Singh, Abhishek Bhola, Rajani Singh, Ashutosh Dhar Dwivedi:
n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications. Sensors 22(6): 2422 (2022) - [j14]Sakshi Dhall, Ashutosh Dhar Dwivedi, Saibal K. Pal, Gautam Srivastava:
Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms. ACM Trans. Asian Low Resour. Lang. Inf. Process. 21(1): 8:1-8:33 (2022) - 2021
- [j13]Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
Correction to: A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(4): 1869 (2021) - [j12]Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14(5): 2665-2680 (2021) - [j11]Ashutosh Dhar Dwivedi:
BRISK: Dynamic Encryption Based Cipher for Long Term Security. Sensors 21(17): 5744 (2021) - [j10]Hongjiao Wu, Ashutosh Dhar Dwivedi, Gautam Srivastava:
Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 60:1-60:17 (2021) - 2020
- [j9]Bassam Aboushosha, Rabie A. Ramadan, Ashutosh Dhar Dwivedi, Ayman El-Sayed, Mohamed M. Dessouky:
SLIM: A Lightweight Block Cipher for Internet of Health Things. IEEE Access 8: 203747-203757 (2020) - [j8]Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava, Agnieszka Wiszniewska-Matyszkiel, Xiaochun Cheng:
A game theoretic analysis of resource mining in blockchain. Clust. Comput. 23(3): 2035-2046 (2020) - [j7]Ashutosh Dhar Dwivedi:
Security Analysis of Lightweight IoT Cipher: Chaskey. Cryptogr. 4(3): 22 (2020) - [j6]Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava:
Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention. Sensors 20(14): 3951 (2020) - 2019
- [j5]Ashutosh Dhar Dwivedi, Pawel Morawiecki, Gautam Srivastava:
Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices. IEEE Access 7: 16476-16486 (2019) - [j4]Ashutosh Dhar Dwivedi, Shalini Dhar, Gautam Srivastava, Rajani Singh:
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. Cryptogr. 3(1): 4 (2019) - [j3]Ashutosh Dhar Dwivedi, Gautam Srivastava, Shalini Dhar, Rajani Singh:
A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors 19(2): 326 (2019) - 2018
- [j2]Ashutosh Dhar Dwivedi, Gautam Srivastava:
Differential Cryptanalysis of Round-Reduced LEA. IEEE Access 6: 79105-79113 (2018) - [j1]Ashutosh Dhar Dwivedi, Pawel Morawiecki, Rajani Singh, Shalini Dhar:
Differential-linear and related key cryptanalysis of round-reduced scream. Inf. Process. Lett. 136: 5-8 (2018)
Conference and Workshop Papers
- 2023
- [c16]Ashutosh Dhar Dwivedi, Subhayu Dutta, Subhrangshu Adhikary, Jens Myrup Pedersen:
Price Prediction of Digital Currencies using Machine Learning. DSAA 2023: 1-9 - [c15]Ashutosh Dhar Dwivedi, Rajani Singh, Rasmus Løvenstein Olsen, Peyman Pahlevani:
Sustainable and Secure Renewable Energy Trading System Based on Digital Twin, Blockchain and Game Theory Integration. IC3I 2023: 1014-1020 - [c14]Gonzalo Lara de Leyva, Ashutosh Dhar Dwivedi, Jens Myrup Pedersen:
CincoCrypto - A Cryptocurrency Price Forecasting Tool for Everyone. RTIP2R (2) 2023: 250-264 - 2022
- [c13]Abhimanyu Bhowmik, Madhushree Sannigrahi, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala:
DBNex: Deep Belief Network and Explainable AI based Financial Fraud Detection. IEEE Big Data 2022: 3033-3042 - [c12]Deepraj Chowdhury, Rupanjan Das, Risav Rana, Ashutosh Dhar Dwivedi, Pushpita Chatterjee, Raghava Rao Mukkamala:
AUTODEEPSLICE: A Data Driven Network Slicing Technique of 5G network using Automatic Deep Learning. GLOBECOM (Workshops) 2022: 450-454 - [c11]Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala:
Data Driven based Malicious URL Detection using Explainable AI. TrustCom 2022: 1266-1272 - 2020
- [c10]Keshav Kaushik, Susheela Dahiya, Rajani Singh, Ashutosh Dhar Dwivedi:
Role of Blockchain in Forestalling Pandemics. MASS 2020: 32-37 - [c9]Ashutosh Dhar Dwivedi, Rajani Singh, Sakshi Dhall, Gautam Srivastava, Saibal K. Pal:
Tracing the Source of Fake News using a Scalable Blockchain Distributed Network. MASS 2020: 38-43 - 2019
- [c8]Gautam Srivastava, Shalini Dhar, Ashutosh Dhar Dwivedi, Jorge Crichigno:
Blockchain Education. CCECE 2019: 1-5 - [c7]Kyle Clarkson, Gautam Srivastava, Fatma Meawad, Ashutosh Dhar Dwivedi:
Where's @Waldo?: Finding Users on Twitter. ICAISC (2) 2019: 338-349 - [c6]Ashutosh Dhar Dwivedi, Lukas Malina, Petr Dzurenda, Gautam Srivastava:
Optimized Blockchain Model for Internet of Things based Healthcare Applications. TSP 2019: 135-139 - 2018
- [c5]Gautam Srivastava, Ashutosh Dhar Dwivedi, Rajani Singh:
PHANTOM Protocol as the New Crypto-Democracy. CISIM 2018: 499-509 - [c4]Gautam Srivastava, Ashutosh Dhar Dwivedi, Rajani Singh:
Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology. ICETE (2) 2018: 674-679 - 2017
- [c3]Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. SECRYPT 2017: 237-246 - [c2]Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz:
Differential and Rotational Cryptanalysis of Round-reduced MORUS. SECRYPT 2017: 275-284 - [c1]Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz:
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. SECRYPT 2017: 501-506
Informal and Other Publications
- 2019
- [i6]Ashutosh Dhar Dwivedi, Lukas Malina, Petr Dzurenda, Gautam Srivastava:
Optimized Blockchain Model for Internet of Things based Healthcare Applications. CoRR abs/1906.06517 (2019) - 2018
- [i5]Gautam Srivastava, Ashutosh Dhar Dwivedi, Rajani Singh:
Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain. CoRR abs/1811.03417 (2018) - [i4]Rajani Singh, Ashutosh Dhar Dwivedi, Gautam Srivastava:
Bitcoin Mining: A Game Theoretic Analysis. IACR Cryptol. ePrint Arch. 2018: 780 (2018) - [i3]Ashutosh Dhar Dwivedi, Gautam Srivastava:
Differential Cryptanalysis in ARX Ciphers, Applications to LEA. IACR Cryptol. ePrint Arch. 2018: 898 (2018) - [i2]Ashutosh Dhar Dwivedi, Pawel Morawiecki:
Differential cryptanalysis in ARX ciphers, Application to SPECK. IACR Cryptol. ePrint Arch. 2018: 899 (2018) - 2016
- [i1]Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. IACR Cryptol. ePrint Arch. 2016: 1053 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint