


default search action
Priyanka Singh 0001
Person information
Other persons with the same name
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Dingzong Zhang
, Devi Listiyani
, Priyanka Singh
, Manoranjan Mohanty
:
Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models. IEEE Access 13: 56296-56325 (2025) - [i3]Paul R. B. Houssel, Siamak Layeghy, Priyanka Singh, Marius Portmann:
eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models. CoRR abs/2507.16241 (2025) - 2024
- [j7]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty, Manik Lal Das:
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications. Computing 106(10): 3309-3333 (2024) - [c32]Paul R. B. Houssel
, Priyanka Singh
, Siamak Layeghy
, Marius Portmann
:
Towards Explainable Network Intrusion Detection using Large Language Models. BDCAT 2024: 67-72 - [c31]Dingzong Zhang, Khushi Jain, Priyanka Singh
:
Guarding Against ChatGPT Threats: Identifying and Addressing Vulnerabilities. MIPR 2024: 612-615 - [c30]Quoc Hoan Vu, Priyanka Singh
:
Exploiting Correlation Between Facial Action Units for Detecting Deepfake Videos. MIPR 2024: 622-625 - [c29]Khushi Jain, Priyanka Singh
, Xue Li
:
Privacy-Preserving Disease Prediction with Secure Data Deduplication on Untrusted Cloud Servers. MIPR 2024: 660-666 - [c28]Priyanka Singh
, Jash Rathi
, Priyankaben Babulal Patel
:
SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption. SAC 2024: 139-141 - [c27]Devi Listiyani
, Priyanka Singh
:
IRIS-SAFE: Privacy-Preserving Biometric Authentication. SIN 2024: 1-7 - [c26]Xufeng Liu, Quoc Hoan Vu, Priyanka Singh
:
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces. SIN 2024: 1-7 - [c25]Rahat Mehmood, Priyanka Singh
, Zoe Jeffery:
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach. SIN 2024: 1-7 - [c24]Pankaj Hariom Sharma, Priyanka Singh
:
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework. SIN 2024: 1-6 - [c23]Dyah Puji Utami, Priyanka Singh
, Sathiamoorthy Manoharan:
An Evaluation of Enigma Machine Online Emulators for Teaching and Learning. TALE 2024: 1-7 - [i2]Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann:
Towards Explainable Network Intrusion Detection using Large Language Models. CoRR abs/2408.04342 (2024) - 2023
- [j6]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty
:
PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. J. Imaging 9(9): 172 (2023) - [j5]Divakar Singh, Priyanka Singh
, Riyanka Jena, Rajat Subhra Chakraborty:
An image forensic technique based on JPEG ghosts. Multim. Tools Appl. 82(9): 14153-14169 (2023) - [c22]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty:
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image. CSCML 2023: 188-199 - [c21]Mayank Kumar, Radha Agrawal, Priyanka Singh
:
RAFT: Evaluating Federated Learning Resilience Against Threats. SIN 2023: 1-6 - [c20]Mayank Kumar, Radha Agrawal, Priyanka Singh
:
BATFL: Battling Backdoor Attacks in Federated Learning. SIN 2023: 1-6 - 2022
- [c19]Nisarg Patel, Siddhraj Parmar, Priyanka Singh
, Manoranjan Mohanty:
XAIForCOVID-19: A Comparative Analysis of Various Explainable AI Techniques for COVID-19 Diagnosis Using Chest X-Ray Images. CVIP (2) 2022: 503-517 - [c18]Ayushi Patel, Priyanka Singh
:
Targeted Clean-Label Poisoning Attacks on Federated Learning. RTIP2R 2022: 231-243 - [c17]Saurabh Gajbhiye
, Priyanka Singh
, Shaifu Gupta
:
Data Poisoning Attack by Label Flipping on SplitFed Learning. RTIP2R 2022: 391-405 - [i1]Karan Bhatia, Ansh Agrawal, Priyanka Singh
, Arun Kumar Singh:
Detection of AI Synthesized Hindi Speech. CoRR abs/2203.03706 (2022) - 2021
- [c16]Pucha Rohan, Priyanka Singh
, Manoranjan Mohanty:
Effect of Environmental Conditions on PRNU. CSE 2021: 154-161 - [c15]Megha Gupta, Priyanka Singh
:
An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching. ICCCNT 2021: 1-7 - [c14]Priyanka Singh
:
Robust Homomorphic Video Hashing. MIPR 2021: 91-96 - [c13]Arun Kumar Singh, Priyanka Singh
:
Detection of AI-Synthesized Speech Using Cepstral & Bispectral Statistics. MIPR 2021: 412-417 - [c12]Mishel Jain, Priyanka Singh
, Balasubramanian Raman:
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption. SPACE 2021: 63-80 - 2020
- [c11]Ayush Nirwal, Raghav Khandelwal, Smit Patel, Priyanka Singh
:
A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics. SPACE 2020: 86-98 - [c10]Ganeshsai Garikipati, Roshani, Anish Mathuria, Priyanka Singh
:
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption. SPACE 2020: 147-166
2010 – 2019
- 2019
- [j4]Priyanka Singh
, Pradeep K. Atrey:
Recovering tampered regions in encrypted video using POB number system. Signal Process. Image Commun. 74: 96-109 (2019) - 2018
- [j3]Priyanka Singh
, Partha Pratim Roy
, Balasubramanian Raman:
Writer identification using texture features: A comparative study. Comput. Electr. Eng. 71: 1-12 (2018) - [j2]Priyanka Singh
, Balasubramanian Raman, Partha Pratim Roy
:
Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents. Displays 54: 47-59 (2018) - [j1]Priyanka Singh
, Nishant Agarwal, Balasubramanian Raman:
Secure data deduplication using secret sharing schemes over cloud. Future Gener. Comput. Syst. 88: 156-167 (2018) - [c9]Pushkar Shukla, Tanu Gupta, Priyanka Singh
, Balasubramanian Raman:
CARTOONNET: Caricature Recognition of Public Figures. CVIP (1) 2018: 1-10 - [c8]Vikram Patil, Priyanka Singh
, Shivam Parikh, Pradeep K. Atrey:
GeoSClean: Secure Cleaning of GPS Trajectory Data Using Anomaly Detection. MIPR 2018: 166-169 - [c7]Aishwary K. Pandey, Priyanka Singh
, Nishant Agarwal, Balasubramanian Raman:
SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud. MIPR 2018: 390-395 - [c6]Neha Sharma, Priyanka Singh
, Pradeep K. Atrey:
SecureCMerge: Secure PDF Merging over Untrusted Servers. MIPR 2018: 402-407 - [c5]Ashish Agarwala, Priyanka Singh
, Pradeep K. Atrey:
Client Side Secure Image Deduplication Using DICE Protocol. MIPR 2018: 412-417 - 2017
- [c4]Vikram Patil, Shivam Parikh, Priyanka Singh
, Pradeep K. Atrey:
GeoSecure: Towards secure outsourcing of GPS data over cloud. CNS 2017: 495-501 - [c3]Shivendra Shivani
, Priyanka Singh
, Suneeta Agarwal:
A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication. ICCAE 2017: 131-135 - [c2]Priyanka Singh
, Shashank Arora, Kaliel Williamson, Pradeep K. Atrey:
S3Email: A method for securing emails from service providers. SMC 2017: 2170-2175 - [c1]Ashish Agarwala, Priyanka Singh
, Pradeep K. Atrey:
DICE: A dual integrity convergent encryption protocol for client side secure data deduplication. SMC 2017: 2176-2181
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-16 00:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint