Name
Affiliation
Papers
SANJAY KUMAR JENA
Department of Computer Science and Engineering, National Institute of Technology, Rourkela, 769008, Orissa, India
35
Collaborators
Citations 
PageRank 
47
101
14.37
Referers 
Referees 
References 
315
894
350
Search Limit
100894
Title
Citations
PageRank
Year
A model for sentiment and emotion analysis of unstructured social media text.40.532018
An adaptive task allocation technique for green cloud computing.60.442018
Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.60.572017
K-NN Based Outlier Detection Technique on Intrusion Dataset.10.432017
Rendezvous based routing protocol for wireless sensor networks with mobile sink.130.642017
Two-Stage Classification Approach For The Recognition Of Handwritten Atomic Odia Character00.342017
Deceptive review detection using labeled and unlabeled data.60.442017
WDTF: A Technique for Wireless Device Type Fingerprinting.10.362017
Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data10.392017
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.30.382017
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications.00.342017
Face Expression Recognition Using Histograms of Oriented Gradients with Reduced Features.00.342016
EAMRP: energy aware multipath routing protocol for wireless sensor networks10.342016
Sarcastic sentiment detection in tweets streamed in real time: a big data approach20.412016
Cluster Based Multipath Routing Protocol for Wireless Sensor Networks200.782015
Parsing-based Sarcasm Sentiment Recognition in Twitter Data80.592015
On Selection Of Attributes For Entropy Based Detection Of Ddos10.352015
Introduction to special issue on ‘Advances in Information Systems and Network Systems Security’00.342015
Classification Of Handwritten Odia Basic Character Using Stockwell Transform00.342015
Privacy preserving social networking00.342014
Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks40.412014
Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases.60.502013
Enhanced t-closeness for balancing utility and privacy.00.342013
Anonymizing social networks: A generalization approach20.372013
Balancing between Utility and Privacy for k-Anonymity.00.342011
A novel and efficient cryptosystem for large message encryption00.342011
A survey on secure hierarchical routing protocols in wireless sensor networks80.492011
Evaluation of web application security risks and secure design patterns10.352011
Security in Bluetooth, RFID and wireless sensor networks20.392011
Improved Query Plans for Unnesting Nested SQL Queries.00.342009
On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature00.342009
A Novel Protocol for Smart Card Using ECDLP.10.372008
A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems30.392008
Improved offline signature verification scheme using feature point extraction method10.382008
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash00.342007