Follow
Jyoti Gajrani
Jyoti Gajrani
Verified email at mnit.ac.in
Title
Cited by
Cited by
Year
A robust dynamic analysis system preventing SandBox detection by Android malware
J Gajrani, J Sarswat, M Tripathi, V Laxmi, MS Gaur, M Conti
Proceedings of the 8th International Conference on Security of Information …, 2015
452015
Vulnerability scanners-a proactive approach to assess web application security
S Bairwa, B Mewara, J Gajrani
arXiv preprint arXiv:1403.6955, 2014
312014
EspyDroid+: Precise reflection analysis of android apps
J Gajrani, U Agarwal, V Laxmi, B Bezawada, MS Gaur, M Tripathi, ...
Computers & Security 90, 101688, 2020
232020
Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements
J Gajrani, V Laxmi, M Tripathi, MS Gaur, A Zemmari, M Mosbah, M Conti
Advances in Computers 119, 73-120, 2020
192020
Browser's defenses against reflected cross-site scripting attacks
B Mewara, S Bairwa, J Gajrani
2014 International Conference on Signal Propagation and Computer Technology …, 2014
162014
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network
R Bhan, R Pamula, P Faruki, J Gajrani
The Journal of Supercomputing 79 (14), 16233-16274, 2023
142023
Vulvet Vetting of Vulnerabilities in Android Apps to Thwart Exploitation
J Gajrani, M Tripathi, V Laxmi, G Somani, A Zemmari, MS Gaur
Digital Threats: Research and Practice 1 (2), 1-25, 2020
142020
Enhanced browser defense for reflected Cross-Site Scripting
B Mewara, S Bairwa, J Gajrani, V Jain
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
132014
A survey of android malware detection strategy and techniques
M Sharma, M Chawla, J Gajrani
Proceedings of International Conference on ICT for Sustainable Development …, 2016
72016
Energy efficient source based tree routing with time stamp in WSN
D Singh, S Sharma, V Jain, J Gajrani
2014 International Conference on Signal Propagation and Computer Technology …, 2014
72014
Deep Learning With PyTorch
A Chaudhary, KS Chouhan, J Gajrani, B Sharma
Machine Learning and Deep Learning in Real-Time Applications, 61-95, 2020
62020
Unraveling reflection induced sensitive leaks in Android apps
J Gajrani, V Laxmi, M Tripathi, MS Gaur, DR Sharma, A Zemmari, ...
Risks and Security of Internet and Systems: 12th International Conference …, 2018
52018
sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps
J Gajrani, M Tripathi, V Laxmi, MS Gaur, M Conti, M Rajarajan
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
52017
IoT security: a survey of issues, attacks and defences
V Kumar Jain, J Gajrani
Intelligent Learning for Computer Vision: Proceedings of Congress on …, 2021
42021
Detection of information leaks via reflection in android apps
J Gajrani, L Li, V Laxmi, M Tripathi, MS Gaur, M Conti
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
42017
Challenges in implementing cache-based side channel attacks on modern processors
J Gajrani, P Mazumdar, S Sharma, B Menezes
2014 27th International Conference on VLSI Design and 2014 13th …, 2014
42014
Android malware analysis using machine learning classifiers
S Jain, T Khandelwal, Y Jain, J Gajrani
Proceedings of International Conference on Computational Intelligence and …, 2022
32022
Performance measurement of RPL protocol using modified MRHOF in IoT network
B Sharma, J Gajrani, V Jain
Conference Proceedings of ICDLAIR2019, 235-245, 2021
32021
Two levels TTL for unstructured P2P network using adaptive probabilistic search
YP Singh, R Rathi, J Gajrani, V Jain
International Journal of Scientific & Engineering Research 3 (1), 1-4, 2012
32012
Arrhythmia Classification Using Deep Learning Architecture
KS Chouhan, J Gajrani, B Sharma, SN Tazi
Real-Time Applications of Machine Learning in Cyber-Physical Systems, 148-172, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20