


default search action
Priyanka Singh 0001
Person information
- affiliation: University of Queensland, School of Electrical Engineering and Computer Science, Brisbane, QLD, Australia
- affiliation (2017 - 2019): Dartmouth College, Hanover, NH, USA
- affiliation (2017): State University of New York at Albany, NY, USA
- affiliation (2016 - 2017): Indian Institute of Technology Roorkee, India
- affiliation (PhD 2016): Motilal Nehru National Institute of Technology, Allahabad, India
Other persons with the same name
- Priyanka Singh — disambiguation page
- Priyanka Singh 0003
— SRM University AP, Department of Computer Science, Amaravati, India - Priyanka Singh 0004
— VIT-AP University, School of Computer Science and Engineering, Amaravati, India (and 1 more) - Priyanka Singh 0005
— Maynooth University, Innovation Value Institute, Ireland - Priyanka Singh 0007
— Institute of Genomics and Integrative Biology, Delhi University Campus, India - Priyanka Singh 0008
— Indraprastha Institute of Information Technology-Delhi, Department of Electronics and Communication Engineering, New Delhi, India - Priyanka Singh 0009
— Indian Institute of Remote Sensing, Geoinformatics Department, Dehradun, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j23]Paul R. B. Houssel, Siamak Layeghy
, Priyanka Singh, Marius Portmann:
eX-NIDS: A framework for explainable network intrusion detection leveraging Large Language Models. Comput. Electr. Eng. 129: 110826 (2026)- 2025
[j22]Dingzong Zhang
, Devi Listiyani
, Priyanka Singh
, Manoranjan Mohanty
:
Distilling Wisdom: A Review on Optimizing Learning From Massive Language Models. IEEE Access 13: 56296-56325 (2025)
[i4]Paul R. B. Houssel, Siamak Layeghy, Priyanka Singh, Marius Portmann:
eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models. CoRR abs/2507.16241 (2025)- 2024
[j21]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty, Manik Lal Das:
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications. Computing 106(10): 3309-3333 (2024)
[c37]Paul R. B. Houssel
, Priyanka Singh
, Siamak Layeghy
, Marius Portmann
:
Towards Explainable Network Intrusion Detection using Large Language Models. BDCAT 2024: 67-72
[c36]Dingzong Zhang, Khushi Jain, Priyanka Singh
:
Guarding Against ChatGPT Threats: Identifying and Addressing Vulnerabilities. MIPR 2024: 612-615
[c35]Quoc Hoan Vu, Priyanka Singh
:
Exploiting Correlation Between Facial Action Units for Detecting Deepfake Videos. MIPR 2024: 622-625
[c34]Khushi Jain, Priyanka Singh
, Xue Li
:
Privacy-Preserving Disease Prediction with Secure Data Deduplication on Untrusted Cloud Servers. MIPR 2024: 660-666
[c33]Priyanka Singh
, Jash Rathi
, Priyankaben Babulal Patel
:
SADHE: Secure Anomaly Detection for GPS Trajectory Based on Homomorphic Encryption. SAC 2024: 139-141
[c32]Devi Listiyani
, Priyanka Singh
:
IRIS-SAFE: Privacy-Preserving Biometric Authentication. SIN 2024: 1-7
[c31]Xufeng Liu, Quoc Hoan Vu, Priyanka Singh
:
FakeFaceDiscriminator: Discrimination of AI-Synthesized Fake Faces. SIN 2024: 1-7
[c30]Rahat Mehmood, Priyanka Singh
, Zoe Jeffery:
Unsupervised Learning for Insider Threat Prediction: A Behavioral Analysis Approach. SIN 2024: 1-7
[c29]Pankaj Hariom Sharma, Priyanka Singh
:
CDCEF: A Cloud-Based Data Volatility & CSP Reliance Eradication Framework. SIN 2024: 1-6
[c28]Dyah Puji Utami, Priyanka Singh
, Sathiamoorthy Manoharan:
An Evaluation of Enigma Machine Online Emulators for Teaching and Learning. TALE 2024: 1-7
[i3]Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann:
Towards Explainable Network Intrusion Detection using Large Language Models. CoRR abs/2408.04342 (2024)- 2023
[j20]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty
:
PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization. J. Imaging 9(9): 172 (2023)
[j19]Divakar Singh, Priyanka Singh
, Riyanka Jena, Rajat Subhra Chakraborty:
An image forensic technique based on JPEG ghosts. Multim. Tools Appl. 82(9): 14153-14169 (2023)
[c27]Riyanka Jena, Priyanka Singh
, Manoranjan Mohanty:
PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image. CSCML 2023: 188-199
[c26]Mayank Kumar, Radha Agrawal, Priyanka Singh
:
RAFT: Evaluating Federated Learning Resilience Against Threats. SIN 2023: 1-6
[c25]Mayank Kumar, Radha Agrawal, Priyanka Singh
:
BATFL: Battling Backdoor Attacks in Federated Learning. SIN 2023: 1-6- 2022
[c24]Nisarg Patel, Siddhraj Parmar, Priyanka Singh
, Manoranjan Mohanty:
XAIForCOVID-19: A Comparative Analysis of Various Explainable AI Techniques for COVID-19 Diagnosis Using Chest X-Ray Images. CVIP (2) 2022: 503-517
[c23]Ayushi Patel, Priyanka Singh
:
Targeted Clean-Label Poisoning Attacks on Federated Learning. RTIP2R 2022: 231-243
[c22]Saurabh Gajbhiye
, Priyanka Singh
, Shaifu Gupta
:
Data Poisoning Attack by Label Flipping on SplitFed Learning. RTIP2R 2022: 391-405
[i2]Karan Bhatia, Ansh Agrawal, Priyanka Singh
, Arun Kumar Singh:
Detection of AI Synthesized Hindi Speech. CoRR abs/2203.03706 (2022)- 2021
[c21]Pucha Rohan, Priyanka Singh
, Manoranjan Mohanty:
Effect of Environmental Conditions on PRNU. CSE 2021: 154-161
[c20]Megha Gupta, Priyanka Singh
:
An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching. ICCCNT 2021: 1-7
[c19]Priyanka Singh
:
Robust Homomorphic Video Hashing. MIPR 2021: 91-96
[c18]Arun Kumar Singh, Priyanka Singh
:
Detection of AI-Synthesized Speech Using Cepstral & Bispectral Statistics. MIPR 2021: 412-417
[c17]Mishel Jain, Priyanka Singh
, Balasubramanian Raman:
SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption. SPACE 2021: 63-80
[i1]Mishel Jain, Priyanka Singh, Balasubramanian Raman:
SHELBRS: Location Based Recommendation Services using Switchable Homomorphic Encryption. CoRR abs/2105.14512 (2021)- 2020
[c16]Ayush Nirwal, Raghav Khandelwal, Smit Patel, Priyanka Singh
:
A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics. SPACE 2020: 86-98
[c15]Ganeshsai Garikipati, Roshani, Anish Mathuria, Priyanka Singh
:
HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption. SPACE 2020: 147-166
2010 – 2019
- 2019
[j18]Priyanka Singh
, Pradeep K. Atrey:
Recovering tampered regions in encrypted video using POB number system. Signal Process. Image Commun. 74: 96-109 (2019)- 2018
[j17]Priyanka Singh
, Partha Pratim Roy
, Balasubramanian Raman:
Writer identification using texture features: A comparative study. Comput. Electr. Eng. 71: 1-12 (2018)
[j16]Priyanka Singh
, Balasubramanian Raman, Partha Pratim Roy
:
Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents. Displays 54: 47-59 (2018)
[j15]Priyanka Singh
, Nishant Agarwal, Balasubramanian Raman:
Secure data deduplication using secret sharing schemes over cloud. Future Gener. Comput. Syst. 88: 156-167 (2018)
[j14]Priyanka Singh
, Balasubramanian Raman:
Reversible data hiding based on Shamir's secret sharing for color images over cloud. Inf. Sci. 422: 77-97 (2018)
[j13]Rajkumar Saini, Barjinder Kaur, Priyanka Singh
, Pradeep Kumar, Partha Pratim Roy
, Balasubramanian Raman, Dinesh Singh
:
Don't just sign use brain too: A novel multimodal approach for user identification and verification. Inf. Sci. 430: 163-178 (2018)
[j12]Priyanka Singh
, Balasubramanian Raman, Manoj Misra:
Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multim. Tools Appl. 77(10): 12581-12605 (2018)
[j11]Priyanka Singh
, Balasubramanian Raman, Manoj Misra:
A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process. 142: 301-319 (2018)
[j10]Priyanka Singh
, Balasubramanian Raman, Nishant Agarwal:
Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud. IEEE Trans. Circuits Syst. Video Technol. 28(9): 2116-2130 (2018)
[c14]Pushkar Shukla, Tanu Gupta, Priyanka Singh
, Balasubramanian Raman:
CARTOONNET: Caricature Recognition of Public Figures. CVIP (1) 2018: 1-10
[c13]Vikram Patil, Priyanka Singh
, Shivam Parikh, Pradeep K. Atrey:
GeoSClean: Secure Cleaning of GPS Trajectory Data Using Anomaly Detection. MIPR 2018: 166-169
[c12]Aishwary K. Pandey, Priyanka Singh
, Nishant Agarwal, Balasubramanian Raman:
SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud. MIPR 2018: 390-395
[c11]Neha Sharma, Priyanka Singh
, Pradeep K. Atrey:
SecureCMerge: Secure PDF Merging over Untrusted Servers. MIPR 2018: 402-407
[c10]Ashish Agarwala, Priyanka Singh
, Pradeep K. Atrey:
Client Side Secure Image Deduplication Using DICE Protocol. MIPR 2018: 412-417- 2017
[j9]Anshul Mittal, Partha Pratim Roy
, Priyanka Singh
, Balasubramanian Raman:
Rotation and script independent text detection from video frames using sub pixel mapping. J. Vis. Commun. Image Represent. 46: 187-198 (2017)
[j8]Priyanka Singh
, Balasubramanian Raman, Partha Pratim Roy
:
A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multim. Tools Appl. 76(3): 3871-3897 (2017)
[j7]Priyanka Singh
, Suneeta Agarwal:
A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multim. Tools Appl. 76(5): 6389-6428 (2017)
[j6]Priyanka Singh
, Balasubramanian Raman:
A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion. Multim. Tools Appl. 76(20): 21497-21517 (2017)
[j5]Himaanshu Gauba
, Pradeep Kumar, Partha Pratim Roy
, Priyanka Singh
, Debi Prosad Dogra, Balasubramanian Raman:
Prediction of advertisement preference by fusing EEG response and sentiment analysis. Neural Networks 92: 77-88 (2017)
[j4]Priyanka Singh
, Balasubramanian Raman, Manoj Misra:
A secure image sharing scheme based on SVD and Fractional Fourier Transform. Signal Process. Image Commun. 57: 46-59 (2017)
[j3]Priyanka Singh
, Balasubramanian Raman, Nishant Agarwal, Pradeep K. Atrey:
Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System. ACM Trans. Multim. Comput. Commun. Appl. 13(3): 23:1-23:23 (2017)
[c9]Vikram Patil, Shivam Parikh, Priyanka Singh
, Pradeep K. Atrey:
GeoSecure: Towards secure outsourcing of GPS data over cloud. CNS 2017: 495-501
[c8]Shivendra Shivani
, Priyanka Singh
, Suneeta Agarwal:
A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication. ICCAE 2017: 131-135
[c7]Priyanka Singh
, Shashank Arora, Kaliel Williamson, Pradeep K. Atrey:
S3Email: A method for securing emails from service providers. SMC 2017: 2170-2175
[c6]Ashish Agarwala, Priyanka Singh
, Pradeep K. Atrey:
DICE: A dual integrity convergent encryption protocol for client side secure data deduplication. SMC 2017: 2176-2181
[c5]Pushkar Shukla, Tanu Gupta
, Aradhya Saini
, Priyanka Singh
, Raman Balasubramanian:
A Deep Learning Frame-Work for Recognizing Developmental Disorders. WACV 2017: 705-714- 2016
[j2]Priyanka Singh
, Suneeta Agarwal:
An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multim. Tools Appl. 75(14): 8165-8194 (2016)
[c4]Priyanka Singh
, Nishant Agarwal, Balasubramanian Raman:
Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system. ICVGIP 2016: 12:1-12:8- 2014
[c3]Ruchika Jangwan, Pradeep K. Juneja, Mayank Chaturvedi
, Sandeep Sunori, Priyanka Singh
:
Comparative analysis of controllers designed for pure integral complex delayed process model. ICACCI 2014: 712-717- 2013
[j1]Swati Singh, Veda P. Pandey
, Huma Naaz, Priyanka Singh
, Upendra N. Dwivedi
:
Structural modeling and simulation studies of human cyclooxygenase (COX) isozymes with selected terpenes: Implications in drug designing and development. Comput. Biol. Medicine 43(6): 744-750 (2013)
[c2]Priyanka Singh
, Suneeta Agarwal:
A hybrid DCT-SVD based robust watermarking scheme for copyright protection. AFRICON 2013: 1-5- 2012
[c1]Priyanka Singh
, Suneeta Agarwal:
A region specific robust watermarking scheme based on singular value decomposition. SIN 2012: 117-123
Coauthor Index
aka: Raman Balasubramanian

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-29 02:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







