Author

Manish Kesherwani

IBM Research India - Cited by 236 - Database - Cryptography - Machine Learning

Biography

He is currently working as a Professor in the Department of Crystallography and Biophysics. His research interests includes Crystallography and Biophysics. He is serving as an editorial member and reviewer of several international reputed journals. He has successfully completed his Administrative responsibilities. He has authored of many research articles/books related to Crystallography and Biophysics.
Title
Cited by
Year
Model extraction warning in mlaas paradigm
M Kesarwani, B Mukhoty, V Arya, S MehtaProceedings of the 34th Annual Computer Security Applications Conference …, 2018201
112
2018
Securely processing range predicates on cloud databases
PM Deshpande, JR Haritsa, A Kaul, M Kesarwani, G SinghUS Patent 10,055,602, 2018201
22
2018
Efficient Secure k-Nearest Neighbours over Encrypted Data.
M Kesarwani, A Kaul, P Naldurg, S Patranabis, G Singh, S Mehta, ...EDBT 18, 564-575, 181
20
2018
Anonymous encrypted data
S Antonatos, S Braghin, A Kaul, M Kesarwani, S MehtaUS Patent 10,700,866,
20
2020
Data readiness report
S Afzal, C Rajmohan, M Kesarwani, S Mehta, H Patel2021 IEEE International Conference on Smart Data Services (SMDS), 42-51, 2021202
14
2021
Detecting and delaying effect of machine learning model attacks
M Kesarwani, A Kumar, V Arya, RR Pimplikar, S MehtaUS Patent 10,824,21, 2020202
7
2020
System and method for association rule mining from encrypted databases
M Kesarwani, K Narayanam, S MehtaUS Patent 10,54,032, 2020202
6
2020
Secure order preserving string compression
M Kesarwani, A Kaul, S Mehta, H MinUS Patent 10,601,80, 2020202
5
2020
Resiliency of machine learning models
M Kesarwani, S Samanta, D Vijaykeerthy, S Mehta, K SankaranarayananUS Patent 10,7,287, 2020202
3
2020
Collusion-resistant processing of SQL range predicates
M Kesarwani, A Kaul, G Singh, PM Deshpande, JR HaritsaData Science and Engineering , 2-40, 2018201
3
2018
Half-pyramid data encryption
A Kaul, M Kesarwani, S Mehta, PG Naldurg, G SinghUS Patent 10,742,401, 2020202
3
2020
Tracking missing data using provenance traces and data simulation
S Joshi, HP Karanam, M Kesarwani, S MehtaUS Patent 10,740,209, 2020202
3
2020
Generation and management of an artificial intelligence (AI) model documentation throughout its life cycle
MR Arnold, RKE Bellamy, K El Maghraoui, M Hind, S Houde, K Kannan, ...US Patent 11,63,188, 0
2
2022
Secure and efficient wildcard search over encrypted data
S Chatterjee, M Kesarwani, J Modi, S Mukherjee, SK Parshuram Puria, ...International Journal of Information Security 0 (), 199-44, 010
2
2021
Knowledge & learning-based adaptable system for sensitive information identification and handling
A Kaul, M Kesarwani, H Min, Q Zhang01 IEEE 14th International Conference on Cloud Computing (CLOUD), 61-71, 010
2
2021
Secure distance computations
G Singh, A Kaul, M Kesarwani, P Naldurg, S MehtaUS Patent 10,51,359, 01901
2
2019
Secure encrypted document retrieval
K Narayanam, M Kesarwani, S MehtaUS Patent App. 15/954,369, 01901
2
2019
Dynamically managing predicate expression columns in an encrypted database
A Kaul, G Singh, H Min, M KesarwaniUS Patent 11,157,495, 010
2
2021
Generating a data partitioning strategy for secure and efficient query processing
A Kaul, G Singh, M Kesarwani, K NarayanamUS Patent 11,194,838, 010
2
2021
Adversarial treatment to machine learning model adversary
M Kesarwani, D Vijaykeerthy, S Mehta, S Samanta, K SankaranarayananUS Patent App. 6/255,620, 2020202
1
2020