Collection's Items (Sorted by Submit Date in Descending order): 1 to 500 of 839
Issue Date | Title | Author(s) |
2025 | Emotion-aware dual cross-attentive neural network with label fusion for stance detection in misinformative social media content | Pangtey, Lata; Rehman, Mohammad Zia Ur; Chaudhari, Prasad; Bansal, Shubhi; Kumar, Nagendra |
2025 | Securing Identities through Biometric Template Security | Baghel, Vivek Singh; Prakash, Surya |
2025 | A scalable method for extracting features using a complex network from SNP sequences and clustering using the scalable Max of Min algorithm | Kansal, Achint Kumar; Tiwari, Aruna; Dwivedi, Rajesh |
2025 | High Level Synthesis Based Forensic Watermarking of Hardware IPs using IP Vendor’s DNA Signature | Sengupta, Anirban; Bhui, Nabendu; Anshul, Aditya |
2024 | LLMs as Master Forgers: Generating Synthetic Time Series Data for Manufacturing | Shah, Vineet |
2025 | Scalable alignment-free feature extraction approach for genome data and their cluster analysis | Tripathi, Abhishek; Tiwari, Aruna; Chaudhari, Narendra S.; Ratnaparkhe, Milind Balkrishna; Dwivedi, Rajesh |
2025 | Intra-modal Relation and Emotional Incongruity Learning using Graph Attention Networks for Multimodal Sarcasm Detection | Bansal, Shubhi; Kumar, Nagendra |
2025 | VISIONARY: Novel Spatial-Spectral Attention Mechanism for Hyperspectral Image Denoising | Hosamani, Nischit; Gupta, Puneet |
2025 | ARRQP: Anomaly Resilient Real-time QoS Prediction Framework with Graph Convolution | Kumar, Suraj; Chattopadhyay, Soumi |
2025 | Toward Faster and Accurate Detection of Craters | Nath, Anirban |
2025 | Hardware IP protection by exploiting IP vendor’s proteogenomic BioMarker as digital watermark during behavioral synthesis | Sengupta, Anirban; Bhui, Nabendu; Chourasia, Vishal |
2025 | Benchmarking Hindi-to-English direct speech-to-speech translation with synthetic data | Maurya, Chandresh Kumar |
2024 | HLS driven Hybrid GA-PSO for Design Space Exploration of Optimal Palmprint Biometric based IP Watermark and Loop Unrolling Factor | Sengupta, Anirban; Chourasia, Vishal; Kumar, Nitish Sai |
2024 | SWIFT: Swarm Intelligence Driven ESL Synthesis for Functional Trojan Fortification | Sengupta, Anirban |
2024 | Gen-Sign: HLS Based Watermarking Using IP Vendor's Feistel Cipher Encrypted Genomic Signature for Protecting CNN and Image Processing Filter Cores Against Piracy | Sengupta, Anirban; Chourasia, Vishal; Singh, Ayush Kumar |
2025 | EVADE: A novel method to detect adversarial and OOD samples in Medical Image Segmentation | Shukla, Sneha; Gupta, Puneet |
2025 | RISE: Modular Blockchain-Integrated Enhancements for Reducing Food Waste and Boosting Retail Accountability | Sharma, Rishika; Banda, Gourinath |
2024 | HLS Based Rapid Pareto Front Search of Watermarked Convolutional Layer IP Design | Sengupta, Anirban; Chourasia, Vishal; |
2024 | HLS Based Hardware Watermarking Using IP Seller's Superimposed Facial Anthropometric Features | Sengupta, Anirban; Anshul, Aditya; Chourasia, Vishal |
2025 | Demonstration of an Application Layer Omni-frequency IoT Protocol | Gupta, Nayancy; Peddamalla, Lokesh; Mendu, Veman Sai Prabhath; Banda, Gourinath |
2024 | HClass: Fast hybrid network traffic classification with bit and keyword level signatures | Khandait, Pratibha; Hubballi, Neminath |
2024 | Secure Accelerated Computing: High-Level Synthesis Based Hardware Accelerator Design for CNN Applications | Chaurasia, Rahul; Sengupta, Anirban |
2025 | Delay-Aware Dynamic Resource Orchestration for IoT-Enabled Software-Defined Edge Networks | Agrawal, Lalita; Mondal, Ayan |
2024 | SecureHD: Designing Low-Cost Reliable and Security Aware Hardware Accelerators During High-Level Synthesis for Computationally Intensive Application Frameworks | Chaurasia, Rahul; Sengupta, Anirban |
2025 | Advancing Software-Defined Vehicles: An End-to-End Framework with Digital Twin Based Attestation for OTA Updates | Agrawal, Krish; Rohan, Jha; Luthra, Nishkarsh; Sekhar, Pilla Venkata; Sharma, Hrishesh; Banda, Gourinath |
2024 | Efficient Machine Learning Systems in Edge Cloud Environments | Shrivastava, Abhishek |
2024 | Implication of Cyber Attacks in Smart-Grid Auction: A Performance Evaluation Case Study | Shrivastava, Pragya; Hubballi, Neminath |
2025 | On construction of data preprocessing for real-life SoyLeaf dataset & disease identification using Deep Learning Models | Gudge, Sujata; Tiwari, Aruna |
2024 | A Framework for Future Net Zero and Sustainable Network Architecture | Hubballi, Neminath |
2025 | Unsupervised continual learning by cross-level, instance-group and pseudo-group discrimination with hard attention | Malviya, Ankit; Dhole, Sayak; Maurya, Chandresh Kumar |
2025 | Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm | Sharmila, S. P.; Tiwari, Aruna; Chaudhari, Narendra S. |
2025 | A novel chemical property-based, alignment-free scalable feature extraction method for genomic data clustering | Dwivedi, Rajesh; Tiwari, Aruna; Singh, Saurabh Kumar; Tripathi, Abhishek |
2025 | AVENUE: A Novel Deepfake Detection Method Based on Temporal Convolutional Network and rPPG Information | Birla, Lokendra; Saikia, Trishna; Gupta, Puneet |
2024 | Enhancing Traffic Sign Recognition: A Deep Learning Approach for Occluded Environments | Chattopadhyay, Soumi |
2024 | Securing Lightning Channels against Rational Miners | Mazumdar, Subhra |
2025 | AI algorithm for predicting and optimizing trajectory of massive UAV swarm | Raj, Amit; Ahuja, Kapil |
2025 | Hierarchical Attention-enhanced Contextual CapsuleNet for Multilingual Hope Speech Detection | Rehman, Mohammad Zia Ur; Pachar, Harshit; Raghaw, Chandravardhan Singh; Kumar, Nagendra |
2025 | Secure Edge Intelligence in the 6G Era | Agrawal, Lalita; Mondal, Ayan |
2016 | Network planning using scheduling and splitting in elastic optical networks | Vyas, Upama; Bhatia, Vimal |
2024 | Enhancing K-means Clustering Performance with a Two-Stage Hybrid Preprocessing Strategy | Tripathi, Abhishek; Tiwari, Aruna; Chaudhari, Narendra S.; Dwivedi, Rajesh |
2025 | SANGAM: Synergizing Local and Global Analysis for Simultaneous WBC Classification and Segmentation | Srivastava, Adit; Ramagiri, Aravind; Gupta, Puneet |
2022 | Handling Data Scarcity Through Data Augmentation in Training of Deep Neural Networks for 3D Data Processing | Srivastava, Akhilesh Mohan; Rotte, Priyanka; Jain, Arushi; Prakash, Surya |
2015 | Big Data Analysis in Cyber-Physical Systems | Swarnkar, Mayank; Bhadoria, Robin Singh |
2013 | Integrated load balancing approach for fault tolerance in MPLS networks | Chaudhari, Narendra S. |
2019 | DDoS prevention using third party auditor in cloud computing | Saxena, Rajat; Dey, Somnath |
2020 | Design Space Exploration of DSP Hardware Using Adaptive PSO and Bacterial Foraging for Power/Area-Delay Trade-Off | Sengupta, Anirban; Rathor, Mahendra |
2025 | An Ensemble Technique for Classification of Oral Cancer by Using Histopathological Imaging | Saikia, Trishna; Dhamaniya, Ashutosh; Gupta, Puneet |
2024 | ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System | Reddy, Annapureddy Venkata Sai Kumar; Banda, Gourinath |
2024 | Securing Reusable IP Cores Using Voice Biometric Based Watermark | Anshul, Aditya; Sengupta, Anirban |
2024 | Preface | Mondal, Ayan |
2025 | MNet-SAt: A Multiscale Network with Spatial-enhanced Attention for segmentation of polyps in colonoscopy | Raghaw, Chandravardhan Singh; Yadav, Aryan; Sanjotra, Jasmer Singh; Dangi, Shalini; Kumar, Nagendra |
2024 | Polynomial Calculus Sizes Over the Boolean and Fourier Bases are Incomparable | Mouli, Sasank |
2021 | Advance security schemes for smart societies | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2022 | Estimation of speaker age and height from speech signal using bi-encoder transformer mixture model | Gupta, Tarun Kumar |
2015 | Analysis for Security Attacks in Cyber-Physical Systems | Dorbala, Sri Yogesh; Bhadoria, Robin Singh |
2019 | Multi-resolution Local Descriptor for 3D Ear Recognition | Ganapathi, Iyyakutti Iyappan; Ali, Syed Sadaf; Prakash, Surya |
2025 | Security Analysis of ASCON Cipher Under Persistent Faults: Official Work-in-Progress Paper | Das, Madhurima; Mazumdar, Bodhisatwa |
2023 | A Survey of 3D Ear Recognition Techniques | Prakash, Surya |
2022 | System Network Analytics: Evolution and Stable Rules of a State Series | Tiwari, Aruna |
2015 | Architectural Analysis of Cyber-Physical Systems | Yadav, Radhakishan |
2025 | PeNCache: Popularity based cooperative caching in Named Data Networks | Chaudhary, Pankaj; Hubballi, Neminath |
2024 | High-level synthesis-based watermarking using multimodal biometric | Sengupta, Anirban; Anshul, Aditya |
2024 | Hardware obfuscation-high level synthesis-based structural obfuscation for hardware security and trust | Sengupta, Anirban; Chaurasia, Rahul |
2024 | HLS-based mathematical watermarks for hardware security and trust | Sengupta, Anirban; Anshul, Aditya |
2024 | Introduction to hardware security and trust and high-level synthesis | Sengupta, Anirban; Chaurasia, Rahul |
2024 | Fundamentals on HLS-based hardware Trojan | Sengupta, Anirban |
2024 | High-level synthesis-based watermarking using protein molecular biometric with facial biometric encryption | Sengupta, Anirban; Chaurasia, Rahul |
2024 | High-level synthesis-based watermarking using retinal biometrics | Sengupta, Anirban; Chaurasia, Rahul |
2024 | High-level synthesis-based watermarking using crypto-chain signature framework | Sengupta, Anirban; Anshul, Aditya |
2024 | HLS-based fingerprinting | Sengupta, Anirban; Anshul, Aditya |
2024 | Hardware Trojans-detective countermeasure against HLS-based hardware Trojan attack | Sengupta, Anirban |
2024 | Hardware obfuscation-algorithmic transformation-based obfuscation for secure floorplan-driven high-level synthesis | Sengupta, Anirban; Chaurasia, Rahul |
2024 | Conclusion | Sengupta, Anirban |
2024 | High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection | Sengupta, Anirban |
2025 | HR-TRACK: An rPPG Method for Heartrate Monitoring Using Temporal Convolution Networks | Birla, Lokendra; Shukla, Sneha; Saikia, Trishna; Gupta, Puneet |
2025 | Comparative and evolutionary analyses of cyclophilins in Cucumis sativus, Phaseolus vulgaris, and Vitis vinifera | Bharill, Neha; Tiwari, Aruna |
2024 | Sentiment and hashtag-aware attentive deep neural network for multimodal post popularity prediction | Bansal, Shubhi; Kumar, Mohit; Raghaw, Chandravardhan Singh; Kumar, Nagendra |
2023 | Obfuscated Malware Detection using Multi-class Classification | Sharmila, S. P.; Tiwari, Aruna; Chaudhari, Narendra S. |
2025 | P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams | Sharma, Sidharth |
2024 | A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers | Sharma, Sidharth |
2025 | End-to-End Speech-to-Text Translation: A Survey | Sethiya, Nivedita; Maurya, Chandresh Kumar |
2025 | Hardware security against IP piracy using secure fingerprint encrypted fused amino-acid biometric with facial anthropometric signature | Sengupta, Anirban; Anshul, Aditya; Singh, Ayush Kumar |
2024 | Demystifying Visual Features of Movie Posters for Multilabel Genre Identification | Chattopadhyay, Soumi |
2025 | Cross-Lingual Summarization of Speech-to-Speech Translation: A Baseline | Karande, Pranav; Sarkar, Balaram; Maurya, Chandresh Kumar |
2024 | RADIANCE: Reliable and interpretable depression detection from speech using transformer | Gupta, Anup Kumar; Dhamaniya, Ashutosh; Gupta, Puneet |
2024 | A novel IoT-device management platform for on-the-fly generation of user interface via manifest-file addressing heterogeneity | Gupta, Nayancy; Banda, Gourinath |
2024 | HLS based Hardware Watermarking of Blur, Embossment and Sharpening Filters Using Fused Ocular Biometrics and Digital Signature | Chourasia, Vishal; Sengupta, Anirban; Chaurasia, Rahul |
2024 | Event-Triggered Sliding Mode Controller for Cognitive Internet of Things | Mondal, Ayan |
2024 | Halide-Assisted Electrophilic C-H Activation in Aqueous Acid and Salt Solutions for the Synthesis of Ru(III)-Abnormal NHC Complexes | Shahid, Nida; Budhija, Vishal; Singh, Amrendra Kumar |
2024 | Hardware Security of Image Processing Cores Against IP Piracy Using PSO-Based HLS-Driven Multi-Stage Encryption Fused with Fingerprint Signature | Sengupta, Anirban; Anshul, Aditya |
2024 | Robust Watermarking of Loop Unrolled Convolution Layer IP Design for CNN using 4-variable Encoded Register Allocation | Sengupta, Anirban; Chourasia, Vishal; Anshul, Aditya; Kumar, Nitish |
2024 | Designing Optimal Secure Hardware IPs for Consumer Electronics using Fingerprint Watermark and Evolutionary Algorithm Framework | Sengupta, Anirban; Chourasia, Vishal; Kumar, Nilesh; Dawar, Praveen |
2024 | HLS Scheduling Driven Encoded Watermarking for Secure Convolutional Layer IP Design in CNN | Sengupta, Anirban; Chourasia, Vishal; Anshul, Aditya |
2024 | Weibull Distribution based False Data Injection Attack Detection | Kukadiya, Purna; Jain, Trapti; Hubballi, Neminath |
2024 | Exploiting Retina Biometric Fused with Encoded Hash for Designing Watermarked Convolutional Hardware IP Against Piracy | Sengupta, Anirban |
2024 | A hybrid filtering for micro-video hashtag recommendation using graph-based deep neural network | Bansal, Shubhi; Rehman, Mohammad Zia Ur; Raghaw, Chandravardhan Singh; Kumar, Nagendra |
2024 | Masked Autoencoders for Spatial-Temporal Relationship in Video-Based Group Activity Recognition | Banda, Gourinath |
2024 | SIRD-YOLO: an enhanced deep learning model for weapon detection using spatial interactions and diverse receptive fields | Banda, Gourinath |
2024 | Detecting rumors in social media using emotion based deep learning approach | Sharma, Drishti; Shrivastava, Abhishek |
2023 | Traffic Sign Detection and Recognition Using Dense Connections in YOLOv4 | Saxena, Swastik; Dey, Somnath |
2024 | Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy | Sengupta, Anirban; Bhui, Nabendu; Anshul, Aditya; Chourasia, Vishal |
2024 | Enhancing skeleton-based action recognition using a knowledge-driven shift graph convolutional network | Roy, Ananya; Tiwari, Aruna |
2025 | A context-aware attention and graph neural network-based multimodal framework for misogyny detection | Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2024 | An Explainable Contrastive-based Dilated Convolutional Network with Transformer for Pediatric Pneumonia Detection | Raghaw, Chandravardhan Singh; Bhore, Parth Shirish; Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2025 | MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection | Rai, Anuj; Dey, Somnath; Patidar, Pradeep; Rai, Prakhar |
2025 | A social context-aware graph-based multimodal attentive learning framework for disaster content classification during emergencies | Dar, Shahid Shafi; Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2024 | Lightweight human activity recognition system for resource constrained environments | Karandikar, Mihir Kanchan; Jain, Ankit; Shrivastava, Abhishek |
2024 | A contrastive topic-aware attentive framework with label encodings for post-disaster resource classification | Dar, Shahid Shafi; Karandikar, Mihir Kanchan; Rehman, Mohammad Zia Ur; Bansal, Shubhi; Kumar, Nagendra |
2024 | New Lower Bounds for Polynomial Calculus over Non-Boolean Bases | Mouli, Sasank |
2024 | FINDINGS OF THE IWSLT 2024 EVALUATION CAMPAIGN | Maurya, Chandresh Kumar; Sethiya, Nivedita; Sarkar, Balaram |
2024 | SliAvailRAN: Availability-Aware Slicing and Adaptive Function Placement in Virtualized RANs | Ahmed, Saad; Ramnani, Mayank; Sharma, Sidharth |
2024 | One Shot Learning to Select Data Augmentations for Skin Lesion Classification | Kanhegaonkar, Prasad; Prakash, Surya |
2024 | MAAD-GAN: Memory-Augmented Attention-Based Discriminator GAN for Video Anomaly Detection | Sethi, Anikeit; Saini, Krishanu; Singh, Rituraj K.; Tiwari, Aruna |
2024 | A Survey of High Level Synthesis based Hardware (IP) Watermarking Approaches | Sengupta, Anirban; Anshul, Aditya |
2024 | An Explainable Deep Learning Model for Fingerprint Presentation Attack Detection | Rai, Anuj; Dey, Somnath |
2024 | Unsupervised Continual Learning using Cross-Level Discrimination and Evidential Pseudo Out-of-Distribution Detection along with Gradient Projected Hard Attention | Malviya, Ankit; Maurya, Chandresh Kumar |
2024 | Automatic Signboard Recognition in Low Quality Night Images | Kagde, Manas; Choudhary, Priyanka; Dey, Somnath |
2024 | Semi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphers | Joshi, Priyanka; Mazumdar, Bodhisatwa |
2024 | An Efficient Anomaly Detection Approach Using Cube Sampling with Streaming Data | Jain, Seemandhar; Jain, Prarthi; Shrivastava, Abhishek |
2024 | CPCache: Cooperative Popularity based Caching for Named Data Networks | Hubballi, Neminath; Chaudhary, Pankaj |
2024 | Dynamic Cluster Head Selection in WSN | Hada, Rupendra Pratap Singh; Shrivastava, Abhishek |
2024 | A taxonomy of unsupervised feature selection methods including their pros, cons, and challenges | Dwivedi, Rajesh; Tiwari, Aruna |
2024 | An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection | Anshul, Ashutosh; Jha, Ashwini; Jain, Prayag; Rai, Anuj; Dey, Somnath |
2024 | Secure hardware IP of GLRT cascade using color interval graph based embedded fingerprint for ECG detector | Sengupta, Anirban; Anshul, Aditya |
2024 | Detecting severity of Diabetic Retinopathy from fundus images: A transformer network-based review | Chattopadhyay, Soumi |
2024 | M-HLS: Malevolent High-Level Synthesis for Watermarked Hardware IPs | Sengupta, Anirban; Anshul, Aditya; Chourasia, Vishal; Kumar, Nitish |
2024 | Reducing the Impact of DoS Attack on Static and Dynamic SE Using a Deep Learning-Based Model | Kukadiya, Purna; Jain, Trapti; Hubballi, Neminath |
2024 | Indic-TEDST: Datasets and Baselines for Low-Resource Speech to Text Translation | Sethiya, Nivedita; Maurya, Chandresh Kumar |
2024 | Deep Learning Forecasting: An LSTM Neural Architecture based Approach to Rainfall and Flood Impact Predictions in Bihar | Kumar, Guru Dayal; Pradhan, Kalandi C; Tyagi, Shekhar |
2024 | CoTCoNet: An optimized coupled transformer-convolutional network with an adaptive graph reconstruction for leukemia detection | Raghaw, Chandravardhan Singh; Bansal, Shubhi; Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2024 | Deep learning approaches for breast cancer detection using breast MRI | Sahu, Tanisha |
2024 | A note on graphs with purely imaginary per-spectrum | Singh, Ranveer; Wankhede, Hitesh |
2024 | Secure FFT IP using C way Partitioning based Obfuscation and Fingerprint | Sengupta, Anirban; Chaurasia, Rahul |
2024 | TPMCF: Temporal QoS Prediction Using Multi-Source Collaborative Features | Kumar, Suraj; Chattopadhyay, Soumi |
2024 | Federated learning in healthcare applications | Kanhegaonkar, Prasad; Prakash, Surya |
2024 | Cancelable biometrics for fingerprint template protection | Baghel, Vivek Singh; Prakash, Surya |
2024 | T-RESIN: Throughput-aware dynamic resource orchestration for Internet of Everything-enabled software-defined edge networks | Agrawal, Lalita; Mondal, Ayan |
2023 | Securing Fault-Detectable CNN Hardware Accelerator Against False Claim of IP Ownership Using Embedded Fingerprint as Countermeasure | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Key-Driven Multi-Layered Structural Obfuscation of IP cores using Reconfigurable Obfuscator based Network Challenge and Switch Control Logic | Sengupta, Anirban; Anshul, Aditya |
2023 | Artificial Intelligence Based Real Time Surveillance and Object localization System | Kapoor, Aarchishya |
2024 | A Comprehensive Framework for Detecting Behavioural Anomalies in the Elderly | Jain, Ankit; Shrivastava, Abhishek |
2023 | Designing Optimized and Secured Reusable Convolutional Hardware Accelerator Against IP Piracy Using Retina Biometrics | Chaurasia, Rahul; Sengupta, Anirban |
2023 | Low-Cost Hardware Security of Laplace Edge Detection and Embossment Filter Using HLS Based Encryption and PSO | Anshul, Aditya; Sengupta, Anirban |
2023 | Blockchain Based Pharmaceutical Supply Chain and its Challenges: A Review and Proposed Solution | Chaurasia, Rahul |
2024 | Watermarking Hardware IPs using Design Parameter Driven Encrypted Dispersion Matrix with Eigen Decomposition Based Security Framework | Sengupta, Anirban; Anshul, Aditya |
2024 | PePC: Popularity Based Early Predictive Caching in Named Data Networks | Hubballi, Neminath; Chaudhary, Pankaj |
2024 | Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN | Joshi, Priyanka; Mazumdar, Bodhisatwa |
2024 | Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison | Barsha, Nisha Kumari; Hubballi, Neminath |
2024 | CVAD-GAN: Constrained video anomaly detection via generative adversarial network | Singh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna |
2024 | Scheduling of Safety-Critical Tasks on Edge Devices via Reinforcement Learning | Chattopadhyay, Soumi |
2023 | Hardware Security of Digital Image Filter IP Cores against Piracy using IP Seller's Fingerprint Encrypted Amino Acid Biometric Sample | Sengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya |
2024 | <italic>DefScan</italic>: Provably Defeating Scan Attack on AES-Like Ciphers | Mazumdar, Bodhisatwa |
2024 | ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game Theory | Mondal, Ayan |
2023 | A Study on the Effect of 2-Approximate Shortest-Path Integration in Extracting Context-Sensitive Dense Structures | Mandal, Subhrangsu |
2024 | B3D-EAR: Binarized 3D descriptors for ear-based human recognition | Prakash, Surya |
2024 | Anomaly Detection in SCADA Systems: A State Transition Modeling | Barsha, Nisha Kumari; Hubballi, Neminath |
2023 | Fusing IP vendor Palmprint Biometric with Encoded Hash for Hardware IP Core Protection of Image Processing Filters | Sengupta, Anirban; Anshul, Aditya; Thakur, Sumer; Kothari, Chirag |
2023 | Secured and Optimized Hardware Accelerators using Key-Controlled Encoded Hash Slices and Firefly Algorithm based Exploration | Sengupta, Anirban; Anshul, Aditya; Kothari, Chirag; Thakur, Sumer |
2024 | SAHA: An SDN Enabled Fog Architecture for Healthcare Applications | Mondal, Ayan |
2023 | Video Anomaly Latent Training GAN (VALT GAN): Enhancing Anomaly Detection Through Latent Space Mining | Sethi, Anikeit; Saini, Krishanu; Singh, Rituraj K.; Tiwari, Aruna |
2024 | Preface | Mazumdar, Bodhisatwa |
2023 | Scalable Kernelized Deep Fuzzy Clustering Algorithms for Big Data | Jha, Preeti; Tiwari, Aruna; Gupta, Anjali; Sukhija, Deepali; Sukhija, Deepika; Dwivedi, Rajesh |
2023 | A Novel Feature Extraction Approach for the Clustering and Classification of Genome Sequences | Dwivedi, Rajesh; Tiwari, Aruna; Tripathi, Abhishek |
2023 | Revisiting Black-Hat HLS: A Lightweight Countermeasure to HLS-Aided Trojan Attack | Sengupta, Anirban |
2023 | Efficient AI Applications in Edge-Cloud Environments | Shrivastava, Abhishek |
2023 | Priority Based Scheduler for Asymmetric Multi-core Edge Computing | Hada, Rupendra Pratap Singh; Shrivastava, Abhishek |
2024 | A Novel Priority Based Scheduler for Asymmetric Multi-core Edge Computing | Hada, Rupendra Pratap Singh; Shrivastava, Abhishek |
2024 | TiME: Time-Sensitive Multihop Data Transmission in Software-Defined Edge Networks for IoT | Mondal, Ayan |
2024 | Attention-guided generator with dual discriminator GAN for real-time video anomaly detection | Singh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna |
2024 | MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices | Mondal, Ayan |
2023 | A Survey of High Level Synthesis Based Hardware Security Approaches for Reusable IP Cores [Feature] | Anshul, Aditya; Sengupta, Anirban |
2024 | 3sXcsNet: A framework for face presentation attack detection using deep learning | Biswas, Aparna Santra; Dey, Somnath; Ahirwar, Akash Kumar |
2024 | Multi-cut based architectural obfuscation and handprint biometric signature for securing transient fault detectable IP cores during HLS | Chaurasia, Rahul; Sengupta, Anirban |
2023 | Fault Secured JPEG-Codec Hardware Accelerator with Piracy Detective Control using Secure Fingerprint Template | Chaurasia, Rahul; Reddy Asireddy, Abhinav; Sengupta, Anirban |
2023 | Securing hardware coprocessors against piracy using biometrics for secured IoT systems | Anshul, Aditya; Chaurasia, Rahul; Sengupta, Anirban |
2023 | Differential evolution with nearest better clustering for multimodal multiobjective optimization | Agrawal, Suchitra; Tiwari, Aruna; Yaduvanshi, Bhaskar; Rajak, Prashant |
2023 | VALD-GAN: video anomaly detection using latent discriminator augmented GAN | Singh, Rituraj K.; Sethi, Anikeit; Saini, Krishanu; Tiwari, Aruna |
2023 | Privacy-Preserving Human Activity Recognition System for Assisted Living Environments | Jain, Ankit; Shrivastava, Abhishek |
2023 | Recent advances in the discipline of text based affect recognition | Kapoor, Aarchishya |
2023 | Predicting the spatiotemporal characteristics of atmospheric rivers: A novel data-driven approach | Singh, Shivam; Kumar, Nagendra; Goyal, Manish Kumar |
2023 | UNFOLD: 3-D U-Net, 3-D CNN, and 3-D Transformer-Based Hyperspectral Image Denoising | Dixit, Aditya; Gupta, Anup Kumar; Gupta, Puneet |
2023 | HREADAI: Heart rate estimation from face mask videos by consolidating Eulerian and Lagrangian approaches | Saikia, Trishna; Birla, Lokendra; Gupta, Anup Kumar; Gupta, Puneet |
2023 | Exploration of optimal functional Trojan-resistant hardware intellectual property (IP) core designs during high level synthesis | Sengupta, Anirban; Anshul, Aditya; Chaurasia, Rahul |
2023 | eNCache: Improving content delivery with cooperative caching in Named Data Networking | Chaudhary, Pankaj; Hubballi, Neminath |
2023 | STemGAN: spatio-temporal generative adversarial network for video anomaly detection | Singh, Rituraj K.; Saini, Krishanu; Sethi, Anikeit; Tiwari, Aruna |
2023 | Introduction: Secured co-processors for machine learning and DSP applications using biometrics | Sengupta, Anirban; Chaurasia, Rahul; Bharath, K. K. |
2023 | Biometrics for Hardware Security and Trust: Discussion and Analysis | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Exploring unified biometrics with encoded dictionary for hardware security of fault secured IP core designs | Sengupta, Anirban; Chaurasia, Rahul; Bharath, K. K. |
2023 | Secured convolutional layer hardware co-processor in convolutional neural network (CNN) using facial biometric | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Handling symmetrical IP core protection and IP protection (IPP) of Trojan-secured designs in HLS using physical biometrics | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Methodology for exploration of security-design cost trade-off for signature-based security algorithms | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Facial signature-based biometrics for hardware security and IP core protection | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Physical biometrics for hardware security of DSP and machine learning coprocessors | Sengupta, Anirban |
2023 | Integrated defense using structural obfuscation and encrypted DNA-based biometric for hardware security | Sengupta, Anirban; Chaurasia, Rahul |
2023 | Taxonomy of hardware security methodologies: IP core protection and obfuscation | Sengupta, Anirban; Anshul, Aditya |
2023 | Palmprint biometrics vs. fingerprint biometrics vs. digital signature using encrypted hash: Qualitative and quantitative comparison for security of DSP coprocessors | Sengupta, Anirban; Anshul, Aditya |
2023 | Secured design flow using palmprint biometrics, steganography, and PSO for DSP coprocessors | Sengupta, Anirban; Anshul, Aditya |
2024 | Traffic sign detection in unconstrained environment using improved YOLOv4 | Saxena, S. P.; Dey, Somnath; Shah, Miten; Gupta, Sundesh |
2023 | KisanQRS: A deep learning-based automated query-response system for agricultural decision-making | Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2023 | An open patch generator based fingerprint presentation attack detection using generative adversarial network | Rai, Anuj; Anshul, Aditya; Jha, Ashwini; Jain, Prayag; Dey, Somnath |
2023 | PAVeDS: A Synthetic Dataset for Developing Autonomous Personal Aerial Vehicles | Prasad, Deepak; Thanmai, Kondru; Banda, Gourinath |
2023 | Efficient live exploration of a dynamic ring with mobile robots | Mandal, Subhrangsu |
2024 | A novel minutiae-oriented approach for partial fingerprint-based MasterPrint mitigation | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2023 | LS-AKA: A lightweight and secure authentication and key agreement scheme for enhanced machine type communication devices in 5G smart environment | Chaudhari, Narendra S. |
2023 | An incremental clustering method based on multiple objectives for dynamic data analysis | Dwivedi, Rajesh; Tiwari, Aruna; Soni, Rishabh; Mahbubani, Rahul; Kumar, S. Ganesh |
2023 | A novel apache spark-based 14-dimensional scalable feature extraction approach for the clustering of genomics data | Dwivedi, Rajesh; Tiwari, Aruna; Ratnaparkhe, Milind Balkrishna; Mogre, Parul; Gadge, Pranjal; Jagadeesh, Kethavath |
2023 | MahaEmoSen: Towards Emotion-aware Multimodal Marathi Sentiment Analysis | Chaudhari, Prasad; Nandeshwar, Pankaj; Bansal, Shubhi; Kumar, Nagendra |
2023 | Impact of Existing Deep CNN and Image Descriptors Empowered SVM Models on Fingerprint Presentation Attacks Detection | Baishya, Jyotishna; Tiwari, Prasheel Kumar; Rai, Anuj; Dey, Somnath |
2024 | Multilingual personalized hashtag recommendation for low resource Indic languages using graph-based deep neural network | Bansal, Shubhi; Gowda, Kushaan; Kumar, Nagendra |
2023 | Exploration of optimal crypto-chain signature embedded secure JPEG-CODEC hardware IP during high level synthesis | Anshul, Aditya; Sengupta, Anirban |
2023 | A Multimodal Framework for Depression Detection During COVID-19 via Harvesting Social Media | Anshul, Aditya; Pranav, Gumpili Sai; Rehman, Mohammad Zia Ur; Kumar, Nagendra |
2023 | Challenges of Facial Micro-Expression Detection and Recognition: A Survey | Dwivedi, Rajesh |
2023 | A Hybrid Feature Selection Approach for Data Clustering Based on Ant Colony Optimization | Dwivedi, Rajesh; Tiwari, Aruna |
2023 | HPC Based Scalable Logarithmic Kernelized Fuzzy Clustering Algorithms for Handling Big Data | Jha, Preeti; Tiwari, Aruna; Saloni, Sawarkar; Sreeharsh, Namani |
2023 | An Enhanced Generative Adversarial Network Model for Fingerprint Presentation Attack Detection | Anshul, Aditya; Jha, Ashwini; Jain, Prayag; Rai, Anuj; Dey, Somnath |
2022 | Preface | Bansal, Shubhi |
2022 | Promoting consumer engagement through emotional branding and sensory marketing | Bansal, Shubhi |
2022 | Towards using artificial intelligence in neuromarketing | Bansal, Shubhi |
2023 | Deep Analysis of Visual Product Reviews | Chattopadhyay, Soumi |
2023 | NOVEL APPROACH TO HIDE SENSITIVE ASSOCIATION RULES BY INTRODUCING TRANSACTION AFFINITY | Chaudhari, Narendra S. |
2023 | Exploring the feasibility of adversarial attacks on medical image segmentation | Shukla, Sneha; Gupta, Anup Kumar; Gupta, Puneet |
2023 | Towards resolving privacy and security issues in iot-based cloud computing platforms for smart city applications | Mazumdar, Bodhisatwa |
2023 | User-aware multilingual abusive content detection in social media | Zia Ur Rehman, Mohammad; Mehta, Somya; Singh, Kuldeep; Kumar, Nagendra |
2023 | Generating Automated Layout Design using a Multi-population Genetic Algorithm | Kumar, Arun M.; Shrivastava, Abhishek |
2023 | Reliable and Scalable Big-Data Applications in Edge Cloud Environments | Shrivastava, Abhishek |
2023 | A Study and Analysis of a New Hybrid Approach for Localization in Wireless Sensor Networks | Hada, Rupendra Pratap Singh; Aggarwal, Uttkarsh; Shrivastava, Abhishek |
2023 | SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters | Sood, Shaurya; Hubballi, Neminath |
2023 | Trustworthy Medical Image Segmentation with improved performance for in-distribution samples | Shukla, Sneha; Gupta, Puneet |
2022 | Hardware (IP) Watermarking During Behavioral Synthesis | Sengupta, Anirban; Rathor, Mahendra |
2023 | Robust Security of Hardware Accelerators Using Protein Molecular Biometric Signature and Facial Biometric Encryption Key | Sengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya |
2023 | CBP: Coalitional Game-Based Broadcast Proxy Re-encryption in IoT | Mondal, Ayan |
2023 | Retinal Biometric for Securing JPEG Codec Hardware IP core for CE systems | Chaurasia, Rahul; Sengupta, Anirban |
2023 | Near-Real-Time Detection of Craters: A YOLO v5 Based Approach | Nath, Anirban |
2023 | PSO based exploration of multi-phase encryption based secured image processing filter hardware IP core datapath during high level synthesis | Anshul, Aditya; Sengupta, Anirban |
2023 | Robust face recognition using multimodal data and transfer learning | Srivastava, Akhilesh Mohan; Chintaginjala, Sai Dinesh; Bhogavalli, Samhit Chowdary; Prakash, Surya |
2022 | A Distinguished Method for Network Intrusion Detection using Random Initialized Viterbi Algorithm in Hidden Markov Model | Sharmila, S. P.; Chaudhari, Narendra S. |
2023 | CoviIS: A Real-Time Covid Help Information System Using Digital Media | Ganji, Niharika; Bansal, Shubhi; Kumar, Nagendra |
2023 | Investigating the impact of thresholding and thinning methods on the performance of partial fingerprint identification systems: a review | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2023 | A Novel Clustering-Based Hybrid Feature Selection Approach Using Ant Colony Optimization | Dwivedi, Rajesh; Tiwari, Aruna |
2023 | 4H-Pyrido[1,2-a]pyrimidin-4-one, biologically important fused heterocyclic scaffold: Synthesis and functionalization | Bhawale, Rajesh T.; Chillal, Abhinay S.; Kshirsagar, Umesh Achyutrao |
2023 | A Deep Learning Based Approach to Perform Fingerprint Matching | Baghel, Vivek Singh; Patel, Smit; Prakash, Surya; Srivastava, Akhilesh Mohan |
2023 | A Novel Hybrid Approach for Localization in Wireless Sensor Networks | Agrawal, Uttkarsh; Shrivastava, Abhishek |
2023 | XSSMitigate: Deep Packet Inspection based XSS Attack Quarantine in Software Defined Networks | Hubballi, Neminath; Singh, Yogendra; Garg, Dipin |
2022 | Protecting Trojan Secured DSP cores against IP piracy using Facial Biometrics | Chaurasia, Rahul; Sengupta, Anirban |
2022 | Crypto-Genome Signature for Securing Hardware Accelerators | Chaurasia, Rahul; Sengupta, Anirban |
2023 | RADIANT: Better rPPG estimation using signal embeddings and Transformer | Gupta, Anup Kumar; Kumar, Rupesh; Birla, Lokendra; Gupta, Puneet |
2022 | NCache: Neighborhood Cooperative Caching in Named Data Networking | Chaudhary, Pankaj; Hubballi, Neminath |
2023 | ALPINE: Improving Remote Heart Rate Estimation using Contrastive Learning | Birla, Lokendra; Shukla, Sneha; Gupta, Anup Kumar; Gupta, Puneet |
2022 | High-Performance Computing based Scalable Online Fuzzy Clustering Algorithms for Big Data | Jha, Preeti; Tiwari, Aruna; Pulakitha, Rapolu; Chauhan, Aditi |
2023 | Feature subset selection using multimodal multiobjective differential evolution | Agrawal, Suchitra; Tiwari, Aruna; Yaduvanshi, Bhaskar; Rajak, Prashant |
2022 | SABMIS: sparse approximation based blind multi-image steganography scheme | Agrawal, Rohit; Ahuja, Kapil |
2023 | Logics for Temporal Information Systems in Rough Set Theory | Khan, Md. Aquil; Panda, Sibsankar |
2022 | Security Vs Design Cost of Signature Driven Security Methodologies for Reusable Hardware IP Core | Chaurasia, Rahul; Sengupta, Anirban |
2022 | Symmetrical Protection of Ownership Right's for IP Buyer and IP Vendor using Facial Biometric Pairing | Chaurasia, Rahul; Sengupta, Anirban |
2022 | IP Core Protection of Image Processing Filters with Multi-Level Encryption and Covert Steganographic Security Constraints | Anshul, Aditya; Sengupta, Anirban |
2022 | Designing Low Cost Secured DSP Core using Steganography and PSO for CE systems | Anshul, Aditya; Bharath, K. K.; Sengupta, Anirban |
2022 | WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection | Sood, Shaurya; Palod, Pritesh; Hubballi, Neminath |
2022 | WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics | Sangwan, Aniket; Jain, Sarthak; Hubballi, Neminath |
2023 | Apache Spark-based scalable feature extraction approaches for protein sequence and their clustering performance analysis | Jha, Preeti; Tiwari, Aruna; Mounika, Mukkamalla; Nagendra, Neha |
2022 | WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks | Hubballi, Neminath; Patel, Kanishk |
2023 | Topological and Dimensional constraints based optimal placement of Layout Entities using Clustering and Genetic Algorithm | 57307633000; Shrivastava, Abhishek |
2023 | Quadruple phase watermarking during high level synthesis for securing reusable hardware intellectual property cores | Anshul, Aditya; Bharath, K. K.; Chaurasia, Rahul; Sengupta, Anirban |
2022 | A novel technique for fingerprint template security in biometric authentication systems | Ali, Afeeza; Baghel, Vivek Singh; Prakash, Surya |
2021 | Email Validation & Arbitration Framework and Platform based on Blockchain for Legal Matters | Reddy, Bheemarjuna Rushya Sree; Sravya, Atche; Banda, Gourinath |
2022 | Exploring Handwritten Signature Image Features for Hardware Security | Sengupta, Anirban; Chaurasia, Rahul; Anshul, Aditya |
2022 | Generation of Secure Fingerprint Template using DFT for Consumer Electronics Devices | Baghel, Vivek Singh; Prakash, Surya |
2022 | Design and Implementation of Closed Loop Control of PSFB Topology Using Artificial Intelligence | Gupta, Yatharth |
2022 | SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox | Joshi, Priyanka; Mazumdar, Bodhisatwa |
2022 | Preface | Chaudhari, Narendra S. |
2022 | An Energy Efficient Health Monitoring Approach with Wireless Body Area Networks | Jain, Seemandhar; Jain, Prarthi; Upadhyay, Prabhat Kumar; Shrivastava, Abhishek |
2022 | Secure Socket Shell Bruteforce Attack Detection with Petri Net Modeling | Tiwari, Namrata;Hubballi, Neminath; |
2022 | Self-supervised learning for macromolecular structure classification based on cryo-electron tomograms | Gupta, Tarun |
2022 | Solving multimodal optimization problems using adaptive differential evolution with archive | Agrawal, Suchitra;Tiwari, Aruna; |
2022 | HPC enabled a Novel Deep Fuzzy Scalable Clustering Algorithm and its Application for Protein Data | Jha, Preeti;Tiwari, Aruna;Anand, Vaibhav K.Arya, Sudhanshu S.Singh, Tanmay P. |
2022 | Tackling over-smoothing in multi-label image classification using graphical convolution neural network | Chauhan, Vikas;Tiwari, Aruna;Venkata, BoppudiNaik, Vislavath |
2022 | Conceptual Study of Prevalent Methods for Cyber-Attack Prediction | Chaudhari, Narendra S.; |
2022 | Neuromarketing: An Emerging Domain in the Formal Education System | Bansal, Shubhi |
2022 | Adaptation of Pair-Polar Structures to Compute a Secure and Alignment-free Fingerprint Template | Baghel, Vivek Singh;Prakash, Surya; |
2022 | A robust and singular point independent fingerprint shell | Baghel, Vivek Singh;Ali, Afeeza;Prakash, Surya; |
2022 | Comparative Study of Supervised Machine Learning Methods for Prediction of Heart Disease | Ur Rehman, Mohammad Zia |
2022 | SRF: Random Expanders for Designing Scalable Robust and Fast Communication Networks | Singh, Ranveer; |
2022 | On the Prospects of Latent MasterPrints | Joshi, Mahesh;Mazumdar, Bodhisatwa;Dey, Somnath; |
2022 | Secured Convolutional Layer IP Core in Convolutional Neural Network Using Facial Biometric | Sengupta, Anirban;Chaurasia, Rahul; |
2022 | Workshop on AI/ML for Edge/Fog Networks (A4E) | Mondal, Ayan; |
2022 | TRIESTE: translation based defense for text classifiers | Gupta, Anup Kumar; Paliwal, Vardhan; Rastogi, Aryan; Gupta, Puneet |
2022 | D-NEXUS: Defending text networks using summarization | Gupta, Anup Kumar; Rastogi, Aryan; Paliwal, Vardhan; Gupta, Puneet |
2021 | Secure Multimodal Access with 2D and 3D Ears | Ganapathi, Iyyakutti Iyappan; Prakash, Surya; Ali, Syed Sadaf |
2022 | System Neural Network: Evolution and Change Based Structure Learning | Tiwari, Aruna |
2022 | Pairnorm based Graphical Convolution Network for zero-shot multi-label classification | Chauhan, Vikas; Tiwari, Aruna |
2022 | Brain tumor segmentation using a hybrid multi resolution U-Net with residual dual attention and deep supervision on MR images | Prakash, Surya |
2022 | An Alignment-Free Fingerprint Template Protection Technique Based on Minutiae Triplets | Ali, Afeeza; Baghel, Vivek Singh; Prakash, Surya |
2022 | HarSaRK_multi_rs: A Hard Real-time Kernel for Multi-core Microcontrollers in Rust Language | Vishnunaryan, K. I.; Banda, Gourinath |
2022 | Securing IP Cores for DSP Applications Using Structural Obfuscation and Chromosomal DNA Impression | Sengupta, Anirban; Chaurasia, Rahul |
2022 | PERSIST: Improving micro-expression spotting using better feature encodings and multi-scale Gaussian TCN | Gupta, Puneet |
2022 | Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP Cores | Rathor, Mahendra; Sengupta, Anirban |
2022 | Multigoal-oriented error estimation and mesh adaptivity for fluid–structure interaction | Ahuja, Kapil |
2022 | SUNRISE: Improving 3D mask Face Anti-spoofing for Short Videos using Pre-emptive Split and Merge | Birla, Lokendra; Gupta, Puneet; Kumar, Shravan |
2022 | Blockchain-Based Medical Records System | Soni, Nisarg; Tayal, Saurav; Singh, Tarun Kumar; Banda, Gourinath |
2021 | Contextual Emotion Learning Challenge | Gupta, Puneet; Gupta, Anup Kumar |
2022 | An Intelligent Recommendation-cum-Reminder System | Maurya, Chandresh Kumar |
2022 | Machine learning methods for hardware security | Mazumdar, Bodhisatwa |
2021 | Signature Biometric based Authentication of IP Cores for Secure Electronic Systems | Rathor, Mahendra; Sengupta, Anirban |
2022 | Wheat Disease Severity Estimation: A Deep Learning Approach | Prakash, Surya |
2021 | Predictive Analytics for Recognizing Human Activities Using Residual Network and Fine-Tuning | Chaudhari, Narendra S. |
2021 | Large-Scale Contact Tracing, Hotspot Detection, and Safe Route Recommendation | Maurya, Chandresh Kumar; Jain, Seemandhar; Thakre, Vishal |
2021 | Scalable and Dynamic Big Data Processing and Service Provision in Edge Cloud Environments | Shrivastava, Abhishek |
2022 | Mitigating MasterPrint vulnerability by employing minutiae geometry | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2022 | A Novel Scalable Feature Extraction Approach for COVID-19 Protein Sequences and their Cluster Analysis with Kernelized Fuzzy Algorithm | Jha, Preeti; Tiwari, Aruna |
2021 | Cube Sampled K-Prototype Clustering for Featured Data | Jain, Seemandhar; Ahuja, Kapil |
2022 | KeyClass: Efficient keyword matching for network traffic classification | Hubballi, Neminath; Khandait, Pratibha |
2021 | Graph Classification with Minimum DFS Code: Improving Graph Neural Network Expressivity | Gupta, Jhalak |
2021 | Securing Reusable Hardware IP cores using Palmprint Biometric | Chaurasia, Rahul; Sengupta, Anirban |
2022 | Palmprint Biometric vs Encrypted Hash based Digital Signature for Securing DSP Cores Used in CE systems | Chaurasia, Rahul; Anshul, Aditya; Sengupta, Anirban; Gupta, Shikha |
2015 | A novel technique of feature extraction with dual similarity measures for protein sequence classification | Bharill, Neha; Tiwari, Aruna; Rawat, Anshul |
2012 | Performance evaluation of Ad hoc network under Black hole attack | Sahu, Rakesh Kumar; Chaudhari, Narendra S. |
2020 | System Network Complexity: Network Evolution Subgraphs of System State Series | Chaturvedi, Animesh; Tiwari, Aruna |
2017 | Low overhead symmetrical protection of reusable IP core using robust fingerprinting and watermarking during high level synthesis | Roy, Dipanjan; Sengupta, Anirban |
2016 | Rangegram: A novel payload based anomaly detection technique against web traffic | Swarnkar, Mayank; Hubballi, Neminath |
2011 | A reduction of 3-Sat problem from optimal sanitization in association rule hiding | Tiwari, Aruna; Chaudhari, Narendra S. |
2015 | Design space exploration of datapath (architecture) in high-level synthesis for computation intensive applications | Sengupta, Anirban |
2013 | D-logic exploration: Rapid search of Pareto fronts during architectural synthesis of custom processors | Sengupta, Anirban; Mishra, Vipul Kumar |
2017 | DSP design protection in CE through algorithmic transformation based structural obfuscation | Sengupta, Anirban; Roy, Dipanjan |
2010 | Binary neural network classifier and it's bound for the number of hidden layer neurons | Chaudhari, Narendra S.; Tiwari, Aruna |
2018 | Addressing EMI in Electric Cars with Radio Tuner Architecture [Future Directions] | Racherla, Kishore |
2012 | A new 3-clustering algorithm for minimum sum of diameter using bit representation | Jain, Rajkumar C.; Chaudhari, Narendra S. |
2018 | An Efficient Algorithmic 3-SAT Formulation for Sudoku Puzzle using Graph Coloring | Chaudhari, Narendra S. |
2018 | Comprehensive operation chaining based schedule delay estimation during high level synthesis | Mishra, Vipul Kumar; Sengupta, Anirban |
2016 | An integrated genetic algorithm approach to 1D-cutting stock problem | Thomas, Jaya; Chaudhari, Narendra S. |
2018 | Analyzing the role of interfaces in enterprise service bus: A middleware epitome for service-oriented systems | Bhadoria, Robin Singh; Chaudhari, Narendra S. |
2014 | Integrated particle swarm optimization (i-PSO): An adaptive design space exploration framework for power-performance tradeoff in architectural synthesis | Sengupta, Anirban; Mishra, Vipul Kumar |
2017 | A Framework for Hardware Efficient Reusable IP Core for Grayscale Image CODEC | Sengupta, Anirban; Roy, Dipanjan |
2018 | Correlation power analysis on KASUMI: Attack and countermeasure | Mazumdar, Bodhisatwa |
2018 | A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem | Chaudhari, Narendra S. |
2017 | The internet of things: Foundation for smart cities, ehealth, and ubiquitous computing | Bhadoria, Robin Singh |
2018 | An efficient handover AKA protocol for wireless network using Chameleon Hash function | Chaudhari, Narendra S. |
2017 | Low-cost security aware HLS methodology | Sengupta, Anirban |
2020 | Security of functionally obfuscated DSP cores | Sengupta, Anirban; Rathor, Mahendra |
2018 | BitCoding : Network traffic classification through encoded bit level signatures | Hubballi, Neminath; Swarnkar, Mayank |
2020 | POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters | Khandait, Pratibha; Hubballi, Neminath |
2016 | An IoT Protocol and Framework for OEMs to Make IoT-Enabled Devices forward Compatible | Banda, Gourinath; Mohan, Harsh |
2018 | Analyzing crowdsourcing to teach mobile crowdsensing a few lessons | Shrivastava, Abhishek |
2021 | Graph-Embedded Multi-Layer Kernel Ridge Regression for One-Class Classification | Gautam, Chandan; Tiwari, Aruna; Mishra, Pratik K.; Tanveer, M. |
2012 | Classification of HIV-1 sequences using profile Hidden Markov Models | Dwivedi, Sanjiv Kumar |
2021 | Contact-less palmprint biometric for securing DSP coprocessors used in CE systems | Sengupta, Anirban; Chaurasia, Rahul; Reddy, Tarun |
2013 | Hybrid approach for 2D strip packing problem using genetic algorithm | Thomas, Jaya; Chaudhari, Narendra S. |
2021 | Multi-label classifier for protein sequence using heuristic-based deep convolution neural network | Chauhan, Vikas; Tiwari, Aruna; Joshi, Niranjan; Khandelwal, Sahaj |
2018 | Enhancing Saliency of an Object Using Genetic Algorithm | Roy, Dipanjan |
2014 | False alarm minimization techniques in signature-based intrusion detection systems: A survey | Hubballi, Neminath |
2017 | Hardware Vulnerabilities and Their Effects on CE Devices: Design for Security Against Trojans [Hardware Matters] | Sengupta, Anirban |
2018 | Architectural building protocols for Li-Fi (light fidelity) | Swarnkar, Mayank; Bhadoria, Robin Singh |
2015 | Big data parallelism: Challenges in different computational paradigms | Mondal, Koushik |
2020 | Introduction to hardware (IP) security: Forensic detective control and obfuscation of digital signal processing (DSP) cores | Sengupta, Anirban |
2014 | MO-PSE: Adaptive multi-objective particle swarm optimization based design space exploration in architectural synthesis for application specific processor design | Mishra, Vipul Kumar; Sengupta, Anirban |
2020 | Image enhancement with naturalness preservation | Joshi, Piyush; Prakash, Surya |
2018 | Shielding CE Hardware Against Reverse-Engineering Attacks Through Functional Locking [Hardware Matters] | Kachave, Deepak; Sengupta, Anirban |
2013 | Performance Enhancement of NUMA Multiprocessor Systems with On-Demand Memory Migration | Mishra, Vipul Kumar |
2017 | An automated approach to estimate human interest | Shrivastava, Abhishek |
2020 | Geometric statistics-based descriptor for 3D ear recognition | Prakash, Surya |
2017 | Coprime mapping transformation for protected and revocable fingerprint template generation | Dey, Somnath |
2016 | Supportive architectural analysis for big data | Bhadoria, Robin Singh |
2018 | 3D Ear Biometrics: Acquisition and Recognition | Dave, Ishan R.; Prakash, Surya; Mohan Srivastava, Akhilesh |
2019 | Combining humans and machines for the future: A novel procedure to predict human interest | Shrivastava, Abhishek |
2016 | VoIP profiler: Profiling voice over IP user communication behavior | Batthalla, Sainath; Swarnkar, Mayank; Hubballi, Neminath |
2019 | Formation of stable and efficient social storage cloud | Mane, Pramod C.; Ahuja, Kapil |
2017 | N-gram approach for a URL similarity measure | Chaudhari, Narendra S. |
2018 | Earprint based mobile user authentication using convolutional neural network and SIFT | Maheshwari, Mudit; Srivastava, Akhilesh Mohan; Agrawal, Aditi; Garg, Mahak L.; Prakash, Surya |
2011 | An intelligent network for handwritten Devnagri digit recognition using Structural features | Chaudhari, Narendra S. |
2014 | A data-centric and machine based approach towards fixing the cold start problem in web service recommendation | Shrivastava, Abhishek |
2019 | Real-time BigData and Predictive Analytical Architecture for healthcare application | Chauhan, Vikas; Tiwari, Aruna |
2019 | Data integrity verification: a novel approach for cloud computing | Saxena, Rajat; Dey, Somnath |
2019 | Low cost dual-phase watermark for protecting CE devices in IoT framework | Sengupta, Anirban; Roy, Dipanjan |
2014 | Fingerprint indexing using minutiae-based invariable set of multidimensional features | Dey, Somnath |
2019 | Cloud Security Service Level Agreements: Representation and Measurement | Hubballi, Neminath; Patel, Amey Kiran; Meena, Amit Kumar |
2019 | Embedding Digital Signature Using Encrypted-Hashing for Protection of DSP Cores in CE | Sengupta, Anirban; Kumar, E. Ranjith; Chandra, N. Prajwal |
2014 | Enhanced cluster validity index for the evaluation of optimal number of clusters for Fuzzy C-Means algorithm | Bharill, Neha; Tiwari, Aruna |
2016 | Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack | Hubballi, Neminath |
2018 | A novel cuckoo search technique for solving discrete optimization problems | Chaudhari, Narendra S. |
2016 | A genetically optimized neural network model for multi-class classification | Tiwari, Aruna; Bhardwaj, Aditi |
2010 | A constructive approach for classification of Semi-Labeled data by extending the BLTA algorithm | Tiwari, Aruna; Chaudhari, Narendra S. |
2020 | A comprehensive security analysis of match-in-database fingerprint biometric system | Joshi, Mahesh; Mazumdar, Bodhisatwa; Dey, Somnath |
2017 | Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflow | Shrivastava, Abhishek |
2018 | ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks | Chaudhari, Narendra S. |
2019 | A Computational Analysis of Protein Sequences for Cyclophilin Superfamily using Feature Extraction | Mehra, Neha; Tiwari, Aruna; Bharill, Neha |
2021 | A novel technique for fingerprint based secure user authentication | Baghel, Vivek Singh; Prakash, Surya |
2021 | Preface | Sengupta, Anirban |
2019 | Breast Cancer Diagnosis using Simultaneous Feature Selection and Classification: A Genetic Programming Approach | Tiwari, Aruna |
2020 | Fuzzy knowledge based performance analysis on big data | Bharill, Neha; Tiwari, Aruna |
2019 | A fast adaptive classification approach using kernel ridge regression and clustering for non-stationary data stream | Gautam, Chandan; Bansal, Raman; Garg, Ruchir; Agarwalla, Vedaanta; Tiwari, Aruna |
2016 | Embedding low cost optimal watermark during high level synthesis for reusable IP core protection | Sengupta, Anirban |
2015 | Swarm-inspired exploration of architecture and unrolling factors for nested-loop-based application in architectural synthesis | Mishra, Vipul Kumar; Sengupta, Anirban |
2012 | Fault tolerant reliable multipath routing protocol for ad hoc network | Sahu, Rakesh Kumar; Chaudhari, Narendra S. |
2018 | 3D ear recognition using global and local features | Prakash, Surya |
2011 | Formulation of 3-clustering as a 3-SAT problem | Jain, Rajkumar C.; Chaudhari, Narendra S. |
2015 | Cloud Brokering Architecture for Dynamic Placement of Virtual Machines | Rane, Dheeraj; Shrivastava, Abhishek |
2017 | Aspect of ESB with wireless sensor network | Bhadoria, Robin Singh |
2018 | A dynamic service description for mobile environments | Verma, Rohit; Shrivastava, Abhishek |
2019 | Quality Analysis of Fingerprint Images Using Local Phase Quantization | Dey, Somnath |
2020 | Genetically Optimized Deep Neural Learning for Breast Cancer Prediction | Agrawal, Suchitra; Tiwari, Aruna; Goel, Ishan |
2012 | Information extraction from semi-structured and un-structured documents using probabilistic context free grammar inference | Chaudhari, Narendra S. |
2017 | Secure algorithms for SAKA protocol in the GSM network | Chaudhari, Narendra S. |
2018 | SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network | Chaudhari, Narendra S. |
2020 | Network Security Systems Log Analysis for Trends and Insights: A Case Study | Meena, Amit Kumar; Hubballi, Neminath; Singh, Yogendra; Bhatia, Vimal |
2021 | Learning similarity and dissimilarity in 3D faces with triplet network | Bhople, Anagha R.; Prakash, Surya |
2021 | MERASTC: Micro-expression Recognition using Effective Feature Encodings and 2D Convolutional Neural network | Gupta, Puneet |
2021 | A Novel Scalable Kernelized Fuzzy Clustering Algorithms Based on In-Memory Computation for Handling Big Data | Jha, Preeti; Tiwari, Aruna; Bharill, Neha; Mounika, Mukkamalla |
2018 | A firefly algorithm driven approach for high level synthesis | Sengupta, Anirban; Rathlavat, Santosh |
2012 | Enhanced traffic aware LSP selection method in MPLS networks | Chaudhari, Narendra S. |
2020 | Protecting the rights of an IP buyer using cryptosystem-based multivariable fingerprinting | Sengupta, Anirban |
2019 | An improved genetic algorithm and a new discrete cuckoo algorithm for solving the classical substitution cipher | Chaudhari, Narendra S. |
2019 | Enhancing saliency of a target object through color modification of every object using genetic algorithm | Roy, Dipanjan |
2020 | BitProb: Probabilistic Bit Signatures for Accurate Application Identification | Hubballi, Neminath; Swarnkar, Mayank |
2021 | Structural transformation-based obfuscation using pseudo-operation mixing for securing data-intensive IP cores | Sengupta, Anirban; Rathor, Mahendra |
2014 | Time varying vs. fixed acceleration coefficient PSO driven exploration during high level synthesis: Performance and quality assessment | Sengupta, Anirban; Mishra, Vipul Kumar |
2013 | Swarm intelligence driven Design Space Exploration: An integrated framework for power-performance trade-off in architectural synthesis | Mishra, Vipul Kumar; Sengupta, Anirban |
2019 | Scaled and Projected Spectral Clustering with Vector Quantization for Handling Big Data | Nemade, Vishal; Shastri, Aditya A.; Ahuja, Kapil; Tiwari, Aruna |
2018 | A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A Networks | Chaudhari, Narendra S. |
2017 | A forward compatible IoT protocol and framework addressing concerns due to internet-outage | Banda, Gourinath; Mohan, Harsh; Saini, Manish Singh |
2019 | PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks | Chaudhari, Narendra S. |
2019 | Two-stage quality adaptive fingerprint image enhancement using Fuzzy C-means clustering based fingerprint quality analysis | Dey, Somnath |
2021 | Cryptography-driven IP steganography for DSP hardware accelerators | Sengupta, Anirban |
2017 | Protecting IP core during architectural synthesis using HLT-based obfuscation | Sengupta, Anirban; Roy, Dipanjan |
2016 | Evolution of the IP Design Process in the Semiconductor/EDA Industry Hardware Matters | Sengupta, Anirban |
2020 | Parameterized complexity of determinant and permanent | Singh, Ranveer |
2014 | Extended support for visualizing requirements: Filtering and tracing requirements in ReBlock | Poothiyot, Ashok Pancily |
2016 | Integrating physical level design and high level synthesis for simultaneous multi-cycle transient and multiple transient fault resiliency of application specific datapath processors | Kachave, Deepak; Sengupta, Anirban |
2014 | Differential reward mechanism based online learning algorithm for url-based topic classification | Chaudhari, Narendra S. |
2019 | Identifying Anomalous HTTP Traffic with Association Rule Mining | Hubballi, Neminath |
2020 | Securing Hardware Accelerators for CE Systems Using Biometric Fingerprinting | Sengupta, Anirban; Rathor, Mahendra |
2018 | Functional obfuscation of DSP cores using robust logic locking and encryption | Sengupta, Anirban |
2018 | Mathematical validation of HWT based lossless image compression | Sengupta, Anirban; Roy, Dipanjan |
2015 | An analysis of integration of hill climbing in crossover and mutation operation for EEG signal classification | Bhardwaj, Arpit; Tiwari, Aruna; Varma, M. Vishaal; Krishna, M. Ramesh |
2014 | Automated exploration of datapath in high level synthesis using temperature dependent bacterial foraging optimization algorithm | Sengupta, Anirban |
2019 | Localized multiple kernel support vector data description | Gautam, Chandan; Tiwari, Aruna |
2020 | NViZ: An Interactive Visualization of Network Security Systems Logs | Meena, Amit Kumar; Hubballi, Neminath |
2016 | IEEE Access Special Section Editorial: Security and Reliability Aware System Design for Mobile Computing Devices | Sengupta, Anirban |
2018 | Guest Editorial: Hardware-Assisted Techniques for Security and Protection of Consumer Electronics | Sengupta, Anirban |
2016 | False mapped feature removal in spin images based 3D ear recognition | Iyyakutti Iyappan, G.; Prakash, Surya |
2020 | Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification | Khandait, Pratibha; Hubballi, Neminath; Mazumdar, Bodhisatwa |
2016 | Novel quantum inspired binary neural network algorithm | Tiwari, Aruna |
2018 | DNS spoofing in local networks made easy | Swarnkar, Mayank; Hubballi, Neminath |
2021 | Scalable Fuzzy Clustering-based Regression to Predict the Isoelectric Points of the Plant Protein Sequences using Apache Spark | Choudhary, Ajay K.; Jha, Preeti; Tiwari, Aruna; Bharill, Neha |
2022 | An Algorithm for the Sequence Alignment with Gap Penalty Problem using Multiway Divide-and-Conquer and Matrix Transposition | Shubham; Prakash, Surya; Ganapathi, Pramod |
2020 | Minimum variance-embedded deep kernel regularized least squares method for one-class classification and its applications to biomedical data | Gautam, Chandan; Mishra, Pratik K.; Tiwari, Aruna; Richhariya, Bharat; Tanveer, M. |
2022 | PATRON: Exploring respiratory signal derived from non-contact face videos for face anti-spoofing | Birla, Lokendra; Gupta, Puneet |
2020 | EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups | Chaudhari, Narendra S. |
2018 | Message from the technical program chairs | Sengupta, Anirban |
2021 | Entropy Reduction Model for Pinpointing Differential Fault Analysis on SIMON and SIMECK Ciphers | Singhal, Naman; Joshi, Priyanka; Mazumdar, Bodhisatwa |
2015 | An efficient technique for image contrast enhancement using artificial bee colony | Joshi, Piyush; Prakash, Surya |
2019 | Reduction of time for speech recognition system by shrinking adaptive layers of ADAG for real time system using ADAT SVM | Chaudhari, Narendra S. |
2020 | AEKOC+: Kernel Ridge Regression-Based Auto-Encoder for One-Class Classification Using Privileged Information | Gautam, Chandan; Tiwari, Aruna; Tanveer, M. |
2021 | A Robotic Software Framework for Autonomous Navigation in Unknown Environment | Banda, Gourinath |
2015 | Cloud Shield: Effective solution for DDoS in cloud | Saxena, Rajat; Dey, Somnath |
2015 | Cloud partner selection algorithm for dynamic cloud collaboration | Mane, Pramod C. |
2021 | Introduction: Secured and optimized hardware accelerators for DSP and image processing applications | Sengupta, Anirban |
2019 | SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks | Chaudhari, Narendra S. |
2020 | Stability, efficiency, and contentedness of social storage networks | Mane, Pramod C.; Ahuja, Kapil |
2020 | Multi-Label classifier based on Kernel Random Vector Functional Link Network | Chauhan, Vikas; Tiwari, Aruna |
2019 | Localized Multiple Kernel learning for Anomaly Detection: One-class Classification | Gautam, Chandan; Sudharsan, K.; Tiwari, Aruna; Ahuja, Kapil |
2012 | Placement strategy for trim minimization in one-dimensional cutting stock | Thomas, Jaya; Chaudhari, Narendra S. |
2021 | WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters | Sood, Shaurya; Hubballi, Neminath |
2016 | If-what analysis to manage batch systems | Batthalla, Sainath; Hubballi, Neminath |
2019 | Linear approximation and differential attacks on logic locking techniques | Bairwa, Ghanshyam; Mandal, Souvik; Nikhil, Tatavarthy Venkat; Mazumdar, Bodhisatwa |
2020 | Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks (Journal of Network and Systems Management, (2020), 10.1007/s10922-020-09514-3) | Tayal, Anuja; Sharma, Neha; Hubballi, Neminath |
2020 | Multi-phase obfuscation for fault-secured DSP circuits | Sengupta, Anirban |
2018 | PASE-AKA: Performance and Security Enhanced AKA Protocol for UMTS Network | Chaudhari, Narendra S. |
2015 | GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesis | Sengupta, Anirban |
2017 | 3D ear based human recognition using gauss map clustering | Prakash, Surya |
2017 | Fingerprint shell construction with prominent minutiae points | Prakash, Surya |
2018 | Communication recurrence and similarity detection in network flows | Tayal, Anuja; Hubballi, Neminath |
2013 | Efficient human recognition system using ear and profile face | Prakash, Surya |
2012 | A performance analysis of network under SYN-flooding attack | Sahu, Rakesh Kumar; Chaudhari, Narendra S. |
2017 | Designing Low-Cost Hardware Accelerators for CE Devices [Hardware Matters] | Sengupta, Anirban; Rathlavat, Santosh |
2012 | A secure approach for SMS in GSM network | Chaudhari, Narendra S. |
2021 | Multimodal hardware accelerators for image processing filters | Sengupta, Anirban |
2018 | Slow rate denial of service attacks against HTTP/2 and detection | Hubballi, Neminath |
2012 | An analytical approach for column generation for One-Dimensional cutting stock problem | Thomas, Jaya; Chaudhari, Narendra S. |
2019 | Robust Logic locking for Securing Reusable DSP Cores | Rathor, Mahendra; Sengupta, Anirban |
2020 | ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation Based Ciphers with a Case Study on GIFT | Joshi, Priyanka; Mazumdar, Bodhisatwa |
2018 | Quantum-Inspired Stacked Auto-encoder-Based Deep Neural Network Algorithm (Q-DNN) | Tiwari, Aruna; Bagade, Vinay |
2014 | A novel web service directory framework for mobile environments | Verma, Rohit; Shrivastava, Abhishek |
2010 | Semi-supervised classification for intrusion detection system in networks | Chaudhari, Narendra S.; Tiwari, Aruna; Thomas, Jaya |
2015 | A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphers | Chaudhari, Narendra S. |
2019 | Minimum Variance-Embedded Multi-layer Kernel Ridge Regression for One-class Classification | Gautam, Chandan; Tiwari, Aruna |
2017 | Retina inspired no-reference image quality assessment for blur and noise | Joshi, Piyush; Prakash, Surya |
2014 | Handling big data with fuzzy based classification approach | Bharill, Neha; Tiwari, Aruna |
2015 | Online and semi-online sentiment classification | Gautam, Chandan |
2016 | Cloud Audit: A Data Integrity Verification Approach for Cloud Computing | Saxena, Rajat; Dey, Somnath |
2019 | Preface | Sengupta, Anirban; Vishvakarma, Santosh Kumar |
2021 | A comparative study of handcrafted local texture descriptors for fingerprint liveness detection under real world scenarios | Dey, Somnath |
2016 | How Secure are Web Servers? An empirical study of Slow HTTP DoS attacks and detection | Hubballi, Neminath; Singh, Yogendra |
2014 | An experimental evaluation of feature selection based classifier ensemble for handwritten numeral recognition | Chaudhari, Narendra S. |
2018 | Security architecture for cloud computing | Bhadoria, Robin Singh |
2020 | A Cooperative Algorithm for Lane Sorting of Autonomous Vehicles | Chouhan, Aaditya Prakash; Banda, Gourinath; Jothibasu, Kanishkar |
2018 | Fuzzy LogicHybrid model with semantic filtering approach for pseudo relevance feedback-based query expansion | Bharill, Neha |
2016 | A novel access control model for cloud computing | Saxena, Rajat; Dey, Somnath |
2020 | Obfuscating DSP Hardware Accelerators in CE Systems Using Pseudo Operations Mixing | Rathor, Mahendra; Sengupta, Anirban |
2017 | Fingerprint image quality assessment and scoring | Dey, Somnath |
2015 | ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks | Thomas, Jaya; Chaudhari, Narendra S. |
2010 | Intelligent systems and polynomial solvability of NP-complete problems | Chaudhari, Narendra S. |
2014 | Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization | Chaudhari, Narendra S. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 500 of 839