Academic Information
Dr. Baisakhi Das is a Professor in the Department of Information Technology at the Institute of Engineering & Management, Kolkata, India. She earned her Ph.D. (Engineering) and M.Tech degrees from the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, and holds a B.Tech from the West Bengal University of Technology, India.
With over 19 years of academic experience, Dr. Das has established herself as a committed educator and researcher. Her primary research interests include Blockchain, Artificial Intelligence, and Cellular Automata. She has published extensively in international journals, conferences, and edited book volumes.
Dr. Das has actively contributed to the academic community through her roles as Technical Program Committee (TPC) member at various international conferences, and as a reviewer/editorial board member for several international journals. She has also served as organizing chair, co-convener, and committee member for multiple international conferences. She is a senior member of IEEE and Senior member of INAE, reflecting her dedication to advancing research and collaboration in emerging technologies.
Research Areas
Courses Taught
Blockchain
Cyber Security
Artificial Intelligence
Publications
Book Chapter
-
B. Saha and B. Das, “Social Engineering and the Psychological Aspects of Cyber Crime,” in Cyber Forensic Frameworks for User-Centric Human Threat Intelligence Analysis, S. Kadry et al., Eds. IGI Global Scientific Publishing, 2026, pp. 403–436, doi: 10.4018/979-8-3373-4898-8.ch013.
Journal Papers
-
B. Das, K. Dikpati, N. Maiti, M. Saha, S. Das, S. Karmakar, and B. Sikdar, “Cellular Automata-Based Data Migration Scheme for Chip-Multiprocessors,” J. Emerg. Technol. Comput. Syst., ACM, communicated.
-
S. Karmakar, B. Das, K. Dikpati, and B. Sikdar, “Effective Amalgamation of Logic Locking Schemes,” Integration, Elsevier, communicated.
-
B. Das, M. Dalui, M. Saha, K. Ghosh, N. Das, and B. K. Sikdar, “Exploring Periodic Boundary Cellular Automaton Rules for One and Two Fixed Points,” Complex Systems, vol. 33, no. 1, pp. 31–60, 2024.
-
B. Das, “Implementation of Blind Watermarking Through Haar Wavelet Transformation,” Int. J. Adv. Res. Comput. Commun. Eng., vol. 4, 2015.
-
B. Das and B. K. Sikdar, “Evaluating Impact on CMPs' Power for Design Inaccuracy Diagnosis,” Int. J. Comput. Appl. Technol., vol. 56, no. 3, pp. 198–209.
-
B. Das, “Implementation of Digital Watermarking Using Discrete Wavelet Transform,” Int. J. Innov. Res. Technol. Sci.
Conference Papers
2026
-
D. Basak, F. Mobo, and B. Das, “AURA: Enhancing Trust and Security in Blockchain-Enabled Electronic Voting Systems,” in Proc. 4th Int. Conf. Comput. Intell., Data Sci., Cloud Comput. (IEM-ICDC), Kolkata, India, Mar. 2026.
-
S. Chandra, P. Baral, F. Mobo, and B. Das, “A Secure Blockchain Framework for Patient-Centric Electronic Health Records,” in Proc. 4th Int. Conf. Comput. Intell., Data Sci., Cloud Comput. (IEM-ICDC), Kolkata, India, Mar. 2026.
-
M. A. Ameen, D. Basak, and B. Das, “Intrusion Detection Using AI and ML in Cybersecurity,” in Proc. IEEE IEMENTech, Feb. 2026.
-
S. Adak, A. Kulavi, S. Chatterjee, and B. Das, “A Comparative Study of Deep Learning Models for Efficient and Accurate Brain Tumour Detection,” in Proc. IEEE IEMENTech, Feb. 2026.
-
S. Dutta, A. Kulavi, and B. Das, “Design and Implementation of a Dual-Control Cloud-Based IoT Prosthetic Hand Using Embedded Vision and Sensor Glove Interfaces,” in Proc. IEEE IEMENTech, Feb. 2026.
2025
-
R. Chandra and B. Das, “Review on Blockchain-Based Data Authentication for Secured Healthcare System,” in Proc. 3rd Int. Conf. Comput. Intell., Data Sci., Cloud Comput. (IEM-ICDC), Kolkata, India, Apr. 2025.
-
B. Saha and B. Das, “A Review of Trends in Malware Analysis,” in Proc. 3rd Int. Conf. Comput. Intell., Data Sci., Cloud Comput. (IEM-ICDC), Kolkata, India, Apr. 2025.
-
D. Basak et al., “Combining Blockchain with AI to Enhance Fraud Detection and Improve the Efficiency of the Voting Process,” in Proc. Eur. Conf. Interdiscip. Res. Technol. Manag., France, Apr. 2025.
-
A. Paul et al., “Minimisation of Energy Consumption in Blockchain Technology Using PoDL,” in Proc. Eur. Conf. Interdiscip. Res. Technol. Manag., France, Apr. 2025.
-
A. Paul and B. Das, “A Review on the Minimisation of Energy Consumption in Blockchain Technology,” in Proc. IEEE IEMENTech, Feb. 2025.
2022
-
B. Das, M. Saha, N. Das, and B. K. Sikdar, “Identification of Periodic Boundary SACA Rules Exploring NSRT Diagram,” in Proc. Int. Conf. Cellular Automata Res. Ind., Switzerland, Sep. 2022.
2021
-
M. K. Kedia, M. F. Farooquee, and B. Das, “The Study of Major Web Application Vulnerabilities and Their Implementation for Learning Purposes,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2021.
-
B. Jha and B. Das, “The Study of Issues Related to Orphan Blocks,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2021.
2020
-
B. Das et al., “A Smart Home Security System in Low Computing IoT Environment,” in Proc. IEEE INDICON, 2020.
-
D. Ali et al., “Deep Learning Approaches to Improve Effectiveness and Efficiency for Time Series Prediction,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2020.
-
A. Ganguly et al., “Secure Blockchain: Assessing Specific Security Threats,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2020.
-
P. P. Ray et al., “IoT-Blockchain Integration: The Way Ahead,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2020.
-
E. Ghosh et al., “An Analysis of Energy Consumption of Blockchain Mining and Techniques to Overcome It,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2020.
-
M. K. Kedia and B. Das, “A Unique Approach for Detection and Removal of Key Loggers,” in Proc. Int. Conf. Comput. Intell., Data Sci., Cloud Comput., Springer, 2020.
-
B. Das, N. Das, and B. K. Sikdar, “Exploring Hard-to-Detect Sequential Hardware Trojan,” in Proc. VDAT, 2020.
-
A. Ganguly, B. Das, and A. Das, “Blockchain Security Issues and Challenges,” in Proc. IOTWR, Jun. 2020.
-
P. P. Ray, B. Das, and A. Das, “Blockchain-Based Solution for the IoT Data Management,” in Proc. IOTWR, Jun. 2020.
2019 and Earlier
-
B. Das, N. Das, and B. K. Sikdar, “Effect of Trojans on Write Data Access in Memory,” in Proc. IEEE ISED, 2019.
-
D. Roy et al., “Is Blockchain the Future of Supply Chain Management—A Review Paper,” in Proc. Int. Ethical Hacking Conf., 2019.
-
E. Ghosh and B. Das, “A Study on the Issue of Blockchain’s Energy Consumption,” in Proc. Int. Ethical Hacking Conf., 2019.
-
B. Das, N. Das, and B. K. Sikdar, “Stuck-At 0/1 Trojans on Return Address Stack,” in Proc. IEEE ISED, 2018.
-
B. Das et al., “Evaluation of Misspeculation Impact on Chip-Multiprocessors Power Overhead,” in Proc. ICSCA, 2018.
-
M. Saha, B. Das, and B. K. Sikdar, “Periodic Boundary Cellular Automata Based Test Structure for Memory,” in Proc. IEEE East-West Design Test Symp., 2017.
-
B. Das, S. Kamilya, and B. K. Sikdar, “Design of CA-Based Scheme for Evenhanded Data Migration in CMPs,” in Proc. Int. Symp. Electron. Syst. Design, 2016.
-
B. Das et al., “A CA-Based Scheme of Cache Zone Prediction for Data Migration in CMPs,” in Proc. IEEE INDICON, 2014.
-
B. Das et al., “Design of an Efficient Scheme for Data Migration in Chip Multiprocessors,” in Proc. Int. Symp. Electron. Syst. Design, 2013.
-
B. Das et al., “An Efficient Scheme for Data Block Migration in Tiled CMPs Cache System,” in Proc. IEEE INDICON, 2013.
-
B. Das et al., “Identification of Power Hungry Unit in a Processor With Faulty Predictor,” in Proc. IEEE ICCAS, 2012.
-
B. Das, M. Saha, and B. K. Sikdar, “Evaluation of Branch Predictors Targeting Easeful Diagnosis of Design Inaccuracies,” in Proc. IEEE ICDCS, 2012.
-
B. Das et al., “Impact of Inaccurate Design of Branch Predictors on Processors' Power Consumption,” in Proc. IEEE Int. Conf. Dependable Auton. Secure Comput., 2011.
-
G. Bhattacharya et al., “Exploring Impact of Faults on Branch Predictors' Power for Diagnosis of Faulty Module,” in Proc. IEEE Asian Test Symp., 2011.