Publications

Categorized in reversed chronological order. Refer Google Scholar for an up-to-date list.

2024

  1. Runtime Enforcement with Event Reordering
    A. Pradhan, C. G. Mitun Akil, and S. Pinisetty
    In International Colloquium on Theoretical Aspects of Computing (ICTAC), 2024
  2. Bounded-memory runtime enforcement with probabilistic and performance analysis
    S. Shankar, A. Pradhan, S. PinisettyA. Rollet, and Y. Falcone
    Formal Methods in System Design, 2024

2023

  1. Model based verification of spiking neural networks in cyber physical systems
    A. Pradhan, J. King, S. Pinisetty, and P. Roop
    IEEE Transactions on Computers, 2023

2022

  1. Compositional runtime enforcement revisited
    S. Pinisetty, A. Pradhan, P. Roop, and S. Tripakis
    Formal Methods in System Design, 2022

2021

  1. CC
    PMTER-ABE: a practical multi-authority CP-ABE with traceability, revocation and outsourcing decryption for secure access control in cloud systems
    K. Sethi, A. Pradhan, and P. Bera
    Cluster Computing, 2021
  2. Graphs Whose Independence Fractals are Line Segments
    S. BarikT. Nayak, and A. Pradhan
    Bulletin of the Malaysian Mathematical Sciences Society, 2021

2020

  1. Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications
    K. Sethi, A. Pradhan, and P. Bera
    In 2020 International Conference on COMmunication Systems NETworkS (COMSNETS), 2020
  2. Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
    K. Sethi, A. Pradhan, and P. Bera
    Journal of Information Security and Applications, 2020
  3. Self-Attention for Cyberbullying Detection
    A. Pradhan, V. M. Yatam, and P. Bera
    In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020
  4. Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption
    A. Pradhan, R. Punith, K. Sethi, and P. Bera
    In 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020

2019

  1. Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    A. Pradhan, K. Sethi, S. Mohapatra, and P. Bera
    In Cryptology and Network Security (CANS), 2019
  2. A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud
    K. Sethi, A. Pradhan, R. Punith, and P. Bera
    In 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2019