Follow
Jugal Kalita
Title
Cited by
Cited by
Year
A survey of the usages of deep learning for natural language processing
DW Otter, JR Medina, JK Kalita
IEEE transactions on neural networks and learning systems 32 (2), 604-624, 2020
19002020
Network anomaly detection: methods, systems and tools
MH Bhuyan, DK Bhattacharyya, JK Kalita
Ieee communications surveys & tutorials 16 (1), 303-336, 2013
16732013
MIFS-ND: A mutual information-based feature selection method
N Hoque, DK Bhattacharyya, JK Kalita
Expert systems with applications 41 (14), 6371-6385, 2014
4822014
Botnet in DDoS Attacks: Trends and Challenges
N Hoque, DK Bhattacharyya, JK Kalita
IEEE Communications Surveys and Tutorials 17 (4), 2242-2270, 2015
3582015
Network attacks: Taxonomy, tools and systems
N Hoque, MH Bhuyan, RC Baishya, DK Bhattacharyya, JK Kalita
Journal of Network and Computer Applications 40, 307-324, 2014
3492014
A survey of outlier detection methods in network anomaly identification
P Gogoi, DK Bhattacharyya, B Borah, JK Kalita
The Computer Journal 54 (4), 570-588, 2011
3482011
Network anomaly detection: A machine learning perspective
DK Bhattacharyya, JK Kalita
Crc Press, 2013
3142013
Summarizing microblogs automatically
B Sharifi, MA Hutton, J Kalita
Human language technologies: The 2010 annual conference of the north …, 2010
3002010
Deep Learning applied to NLP
MM Lopez, J Kalita
arXiv preprint arXiv:1703.03091, 2017
2732017
An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
MH Bhuyan, DK Bhattacharyya, JK Kalita
Pattern Recognition Letters 51, 1-7, 2015
2712015
Syntactic normalization of twitter messages
M Kaufmann, J Kalita
International conference on natural language processing, Kharagpur, India 16, 2010
2662010
Streaming trend detection in twitter
J Benhardus, J Kalita
International Journal of Web Based Communities 9 (1), 122-139, 2013
2612013
Comparing twitter summarization algorithms for multiple post summaries
D Inouye, JK Kalita
2011 IEEE Third international conference on privacy, security, risk and …, 2011
2612011
Authentication of smartphone users using behavioral biometrics
A Alzubaidi, J Kalita
IEEE Communications Surveys & Tutorials 18 (3), 1998-2026, 2016
2532016
Detecting distributed denial of service attacks: methods, tools and future directions
MH Bhuyan, HJ Kashyap, DK Bhattacharyya, JK Kalita
The Computer Journal 57 (4), 537-556, 2014
2532014
Surveying port scans and their detection methodologies
MH Bhuyan, DK Bhattacharyya, JK Kalita
The Computer Journal 54 (10), 1565-1581, 2011
2342011
Experiments in microblog summarization
B Sharifi, MA Hutton, JK Kalita
2010 IEEE Second International Conference on Social Computing, 49-56, 2010
2142010
Making Them Move: Mechanics, Control & Animation of Articulated Figures
N Badler, B Barsky, D Zeltzer
Routledge, 1990
2131990
Improving the reliability of deep neural networks in NLP: A review
B Alshemali, J Kalita
Knowledge-Based Systems 191, 105210, 2020
2112020
Packet and flow based network intrusion dataset
P Gogoi, MH Bhuyan, DK Bhattacharyya, JK Kalita
Contemporary Computing: 5th International Conference, IC3 2012, Noida, India …, 2012
2002012
The system can't perform the operation now. Try again later.
Articles 1–20