Indira Kalyan Dutta Data-verified
Affiliation confirmed via AI analysis of OpenAlex, ORCID, and web sources.
Researcher
faculty
Research Areas
Links
Biography and Research Information
OverviewAI-generated summary
Indira Kalyan Dutta's research focuses on the application of advanced algorithms and deep learning techniques across various domains. Recent publications include work on detecting fake profiles on social media using new-age algorithms and personality prediction through deep learning. Dutta has also investigated cryptographic methods, with publications on isomorphic cipher reduction, modeling polymorphic ciphers, evaluating cryptographic key space size, and using collision attacks to break cryptographic modes. Further research has explored security in the Internet of Things, specifically examining the impact of emerging technologies. Dutta has co-authored publications with collaborators Hayin Tamut, Md. Shaba Sayeed, and Musfikur Rahaman, all from Arkansas Tech University. With an h-index of 8 and 296 citations across 27 publications, Dutta's work demonstrates activity in machine learning, cybersecurity, and related computational fields.
Metrics
- h-index: 9
- Publications: 27
- Citations: 299
Selected Publications
-
A Chaotic Non-Linear Pseudo Random Number Generator (CNPRNG) Design for High-Security Applications (2025)
-
Detecting Malicious URLs in Brushing Scams: A Machine Learning Approach with Human-Centered Cybersecurity (2025)
-
ElderConnect: An AI-Powered Platform to Empower Seniors Against Cyberthreats (2025)
-
Understanding and Mitigating Social Engineering Attacks to Elderly People: A Comprehensive Survey of Methods, Impacts, and Future Solutions (2024)
-
Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A Survey (2024)
-
A Demonstrable Break of PCBC Mode (2023)
-
Enhancing the Programming Sequence for Undergraduate Computer Science Students: A Program for Improving Learning Outcomes (2023)
-
Using the Collision Attack for Breaking Cryptographic Modes (2022)
-
The Problem with Regular Multiple Byte Block Boundaries in Encryption (2022)
-
A survey on security in internet of things with a focus on the impact of emerging technologies (2022)
-
Space Selection and Abstraction in Set Theoretic Estimation (2022)
-
Modeling Polymorphic Ciphers (2021)
-
Evaluating True Cryptographic Key Space Size (2021)
-
Key Space Reduction Using Isomorphs (2021)
-
Isomorphic Cipher Reduction (2021)
Collaboration Network
Top Collaborators
- Techniques to Detect Fake Profiles on Social Media Using the New Age Algorithms - A Survey
- Isomorphic Cipher Reduction
- Modeling Polymorphic Ciphers
- Evaluating True Cryptographic Key Space Size
- Using the Collision Attack for Breaking Cryptographic Modes
Showing 5 of 9 shared publications
- Isomorphic Cipher Reduction
- Modeling Polymorphic Ciphers
- Evaluating True Cryptographic Key Space Size
- Using the Collision Attack for Breaking Cryptographic Modes
- Key Space Reduction Using Isomorphs
Showing 5 of 8 shared publications
- Isomorphic Cipher Reduction
- Modeling Polymorphic Ciphers
- Key Space Reduction Using Isomorphs
- Space Selection and Abstraction in Set Theoretic Estimation
- Isomorphic Cipher Reduction
- Key Space Reduction Using Isomorphs
- Space Selection and Abstraction in Set Theoretic Estimation
- Personality Prediction Using Deep Learning
- Unlocking Personality Insights: Assessing Videos with Deep Learning Techniques
- Personality Prediction Using Deep Learning
- Unlocking Personality Insights: Assessing Videos with Deep Learning Techniques
- Understanding and Mitigating Social Engineering Attacks to Elderly People: A Comprehensive Survey of Methods, Impacts, and Future Solutions
- ElderConnect: An AI-Powered Platform to Empower Seniors Against Cyberthreats
- Detecting Malicious URLs in Brushing Scams: A Machine Learning Approach with Human-Centered Cybersecurity
- ElderConnect: An AI-Powered Platform to Empower Seniors Against Cyberthreats
- Evaluating True Cryptographic Key Space Size
- Evaluating True Cryptographic Key Space Size
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Contents
- Table of Contents
Similar Researchers
Based on overlapping research topics