[go: up one dir, main page]

Follow
Hridoy Sankar Dutta
Hridoy Sankar Dutta
Deakin University ← University of Cambridge
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
HawkesEye: Detecting fake retweeters using Hawkes process and topic modeling
HS Dutta, VR Dutta, A Adhikary, T Chakraborty
IEEE Transactions on Information Forensics and Security 15, 2667-2678, 2020
652020
Retweet us, we will retweet you: Spotting collusive retweeters involved in blackmarket services
HS Dutta, A Chetan, B Joshi, T Chakraborty
2018 IEEE/ACM International conference on advances in social networks …, 2018
502018
Corerank: Ranking to detect users involved in blackmarket-based collusive retweeting activities
A Chetan, B Joshi, HS Dutta, T Chakraborty
Proceedings of the Twelfth ACM International Conference on Web Search and …, 2019
362019
Pradhan, Microstructure characterization of nanocrystalline Ni3C synthesized by high-energy ball milling
B Ghosh, H Dutta
J. Alloys Compd 479, 193-200, 2009
332009
Detecting and analyzing collusive entities on YouTube
HS Dutta, M Jobanputra, H Negi, T Chakraborty
ACM Transactions on Intelligent Systems and Technology (TIST) 12 (5), 1-28, 2021
292021
Blackmarket-driven collusion among retweeters–analysis, detection, and characterization
HS Dutta, T Chakraborty
IEEE Transactions on Information Forensics and Security 15, 1935-1944, 2019
282019
Analyzing and detecting collusive users involved in blackmarket retweeting activities
U Arora, HS Dutta, B Joshi, A Chetan, T Chakraborty
ACM Transactions on Intelligent Systems and Technology (TIST) 11 (3), 1-24, 2020
222020
Blackmarket-driven collusion on online media: a survey
HS Dutta, T Chakraborty
ACM/IMS Transactions on Data Science 2 (4), 1-37, 2021
152021
DECIFE: Detecting collusive users involved in blackmarket following services on Twitter
HS Dutta, K Aggarwal, T Chakraborty
Proceedings of the 32nd ACM conference on hypertext and social media, 91-100, 2021
92021
On good and bad intentions behind anomalous citation patterns among journals in computer sciences
J Chakraborty, D Pradhan, HS Dutta, S Nandi, T Chakraborty
arXiv preprint arXiv:1807.10804, 2018
92018
ABOME: A Multi-platform Data Repository of Artificially Boosted Online Media Entities
HS Dutta, U Arora, T Chakraborty
International AAAI Conference on Web and Social Media (ICWSM) 15, 1000-1008, 2021
72021
Offline crisis mapping by opportunistic dissemination of crisis data after large-scale disasters
PS Paul, HS Dutta, BC Ghosh, K Hazra, S Chakraborty, S Saha, S Nandi
Proceedings of the Second ACM SIGSPATIALInternational Workshop on the Use of …, 2016
52016
ModZoo: A Large-Scale Study of Modded Android Apps and their Markets
LA Saavedra, HS Dutta, AR Beresford, A Hutchings
2024 APWG Symposium on Electronic Crime Research (eCrime), 162-174, 2024
42024
CRIMP: Here crisis mapping goes offline
PS Paul, BC Ghosh, HS Dutta, K De, AP Basu, P Pramanik, S Saha, ...
Journal of Network and Computer Applications 146, 102418, 2019
42019
Weakening the inner strength: Spotting core collusive users in youtube blackmarket network
HS Dutta, N Diwan, T Chakraborty
Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022
32022
A survey of threats against voice authentication and anti-spoofing systems
K Kamel, K Sood, HS Dutta, S Aryal
arXiv preprint arXiv:2508.16843, 2025
22025
Spectral Masking and Interpolation Attack (SMIA): A Black-box Adversarial Attack against Voice Authentication and Anti-Spoofing Systems
K Kamel, HS Dutta, K Sood, S Aryal
arXiv preprint arXiv:2509.07677, 2025
12025
App-solutely Modded: Surveying Modded App Market Operators and Original App Developers
LA Saavedra, HS Dutta, AR Beresford, A Hutchings
Proceedings of the 20th ACM Asia Conference on Computer and Communications …, 2025
12025
Modeling Wavelet Transformed Quantum Support Vector for Network Intrusion Detection
S Kumari, SR Pokhrel, S Chandrasekhar, N Singh, HS Dutta, A Anwar, ...
arXiv preprint arXiv:2512.01365, 2025
2025
Securing User Identity in Web3 Social Platforms: A Post-Quantum Biometric Approach
S Kumari, HS Dutta, H Tewari
Proceedings of the 6th Workshop on Secure IoT, Edge and Cloud systems, 1-6, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20