Collection's Items (Sorted by Submit Date in Descending order): 1 to 78 of 78
Issue Date | Title | Author(s) |
2025-04-16 | Alternative paradigms of hardware security for addressing threats of IP piracy and trojan during high level synthesis | Sengupta, Anirban; Anshul, Aditya |
2025-01-06 | ElasticPay: instant peer-to-peer offline extended digital payment system | Banda, Gourinath; Reddy, Annapureddy Venkata Sai Kumar |
2024-11-22 | A scalable method for extracting features using a complex network from SNP sequences and a novel scalable max of min algorithm for clustering | Tiwari, Aruna; Kansal, Achint Kumar |
2025-01-06 | Improving deep packet inspection performance for traffic classification and security monitoring applications | Hubballi, Neminath; Mazumdar, Bodhisatwa; Khandait, Pratibha |
2024-12-31 | Privacy-preserving indoor monitoring using vision sensors | Srivastava, Abhishek; Jain, Ankit Kumar |
2024-10-25 | Design of novel generative adversarial network (GAN) architecture and its application for video anomaly detection | Tiwari, Aruna; Singh, Sanjay; Singh, Rituraj |
2024-10-15 | AI Algorithm for predicting and optimizing trajectory of UAV swarm | Ahuja, Kapil; Amit Raj |
2024-08-16 | Integrated landslide susceptibility mapping and early warning systems for combined landslide hazards in Uttarakhand
[RESTRICTED THESIS] | Satyam, Neelima; Gupta, Kunal |
2024-05-22 | Detection and mitigation of cyber attacks in smart grid networks | Hubballi, Neminath; Barsha, Nisha Kumari |
2024-07-19 | MahaEmoSen: towards emotion-aware multimodal Marathi sentiment analysis | Kumar, Nagendra; Chaudhari, Prasad |
2024-07-08 | Detecting rumors in social media using emotion based deep learning approach | Srivastava, Abhishek; Sharma, Drishti |
2024-07-08 | Sampled clustering on phenotypic data of plant | Ahuja, Kapil; Singh, Mithun |
2024-02-07 | Synthetic dataset towards autonomous personal aerial vehicles | Banda, Gourinath; Prasad, Deepak |
2024-06-18 | FFO: an ontological decision support system for forest fire alert and management services | Srivastava, Abhishek; Das, Shibani |
2024-06-27 | A feature-enhanced shift graph convolutional network and its application in skeleton-based action recognition | Tiwari, Aruna; Singh, Sanjay; Roy, Ananya |
2024-05-01 | Novel feature selection, scalable feature extraction, and clustering algorithms for plant genome sequences | Tiwari, Aruna; Ratnaparkhe, Milind B.; Bharill, Neha; Dwivedi, Rajesh |
2024-05-27 | Fault analysis of lightweight cryptosystems : vulnerabilities, and countermeasures | Mazumdar, Bodhisatwa; Joshi, Priyanka |
2023-12-07 | Machine learning classification in resource constrained environments | Srivastava, Abhishek; Kumar, Arun |
2023-08-25 | Ensuring secure and robust web service interactions | Srivastava, Abhishek; Tiwary, Gyan Prakash |
2023-10-13 | Investigations in multimodal optimization using differential evolution and its applications | Tiwari, Aruna; Agrawal, Suchitra |
2023-08-31 | IP core protection and detective control of data-intensive hardware IPs against piracy | Sengupta, Anirban; Chaurasia, Rahul |
2023-02-08 | Encoded encryption and biometrics for high-level synthesis based hardware security against IP piracy and fraud IP ownership | Sengupta, Anirban; Bharath, Kollanur |
2023-03-09 | Securing identities through fingerprint template protection | Surya Prakash; Baghel, Vivek Singh |
2023-02-08 | CaaGrad: an adaptive approach for optimization in deep learning | Ahuja, Kapil; Tiwari, Aruna; Kumar, Saurav |
2023-02-10 | Mitigating masterprint vulnerability a security threat to fingerprint biometric systems | Mazumdar, Bodhisatwa; Dey, Somnath; Joshi, Mahesh |
2020-05-28 | SLA driven performance optimization in cloud computing | Srivastava, Abhishek; Rane, Dheeraj |
2020-05-20 | System evolution analytics: data mining and learning of complex and big evolving systems | Tiwari, Aruna; Chaturvedi, Animesh |
2020-05-18 | Kernel-based learning in the absence of counterexamples: one-class classification | Tiwari, Aruna; Gautam, Chandan |
2023-02-02 | Biometric recognition using 3D face | Surya Prakash; Srivastava, Akhilesh Mohan |
2023-01-05 | Automatic sign recognition for low quality images using modified MIRNET | Dey, Somnath; Kagde, Manas |
2022-11-16 | Traffic sign-board detection in unconstrained environment using improved YOLOv4 | Dey, Somnath; Saxena, Swastik |
2022-12-02 | Multi-label classification using non-iterative learning and deep learning based approaches | Tiwari, Aruna; Chauhan, Vikas |
2022-09-26 | Unraveling the importance of remote-PPG for securing face analytic systems
[RESTRICTED THESIS] | Gupta, Puneet; Birla, Lokendra |
2022-08-08 | Pulse estimation from face videos using transformer | Gupta, Puneet; Kumar, Rupesh |
2022-07-29 | Novel optimization algorithms for steganography and chip routing | Ahuja, Kapil; Agrawal, Rohit |
2022-03-07 | Hardware (IP) security for DSP and multimedia applications | Sengupta, Anirban; Rathor, Mahendra |
2021-12-23 | Design of scalable fuzzy clustering algorithms and its application to huge genomics data | Tiwari, Aruna; Ratnaparkhe, Milind; Bharill, Neha; Jha, Preeti |
2021-11-05 | Enhanced opposition differential evolution algorithm for multimodal optimization | Tiwari, Aruna; Singh, Shatendra |
2021-11-05 | Predictions in non-stationary data streams using Fuzzy clustering-based adaptive regression | Tiwari, Aruna; Ajay |
2021-10-25 | SSH Bruteforce attack detection with network flow analysis | Hubballi, Neminath; Tiwari, Namrata |
2021-10-25 | Activity monitoring in assisted living environments | Srivastava, Abhishek; Anil |
2021-10-22 | Malware detection and classification using transformer-based learning | Hubballi, Neminath; Nassar, Fyse |
2021-09-24 | Adversarial attack on audio-visual speech recognition model | Gupta, Puneet; Mishra, Saumya |
2021-09-09 | RSSI-based node localization in wireless sensor networks using a hybrid approach | Srivastava, Abhishek; Aggarwal, Uttkarsh |
2021-08-13 | Adversarial attack on visual speech recognition models | Gupta, Puneet; Gupta, Anup Kumar |
2021-07-28 | Novel statistical and probabilistic machine learning algorithms for genotype clustering and cancer classification | Ahuja, Kapil; Shastri, Aditya Anand |
2021-03-24 | Stable linear solves with preconditioner updates for model reduction | Ahuja, Kapil; Singh, Navneet Pratap |
2021-04-19 | Intelligent transportation systems: algorithms and formal verification | Banda, Gourinath; Chouhan, Aditya Prakash |
2020-12-30 | Approaches to minimum sum of diameter and radii clustering | Chaudhari, Narendra S.; Jain, Rajkumar |
2020-10-14 | Inversion optimization in majority inverter graph with minority operations : A novel approach | Mazumdar, Bodhisatwa; Hubballi, Neminath; Aalam, Umar |
2020-10-12 | Anomaly detection in resource constrained environments and its applications | Srivastava, Abhishek; Jain, Prarthi |
2020-12-04 | Approximated deep neural networks : A computationally efficient inference | Ahuja, Kapil; Tiwari, Aruna; Gupta, Siddharth |
2020-05-18 | 3D Ear based human recognition | Surya Prakash; Iyappan, Ganapathi Iyyakutti |
2020-05-28 | Game theoretic models in the social cloud | Ahuja, Kapil; Krishnamurthy, Nagarajan; Mane, Pramod C. |
2020-01-20 | Service oriented architecture for constrained environments | Srivastava, Abhishek; Verma, Rohit |
2020-01-14 | Assessment of fingerprint quality with application in enhancement and liveness detection | Dey, Somnath; Sharma, Ram Prakash |
2019-10-25 | Stability analysis of inexact linear solves in model order reduction | Ahuja, Kapil; Choudhary, Rajendra |
2019-09-30 | Deep packet inspection applications for traffic classification and security monitoring | Hubballi, Neminath; Swarnkar, Mayank |
2019-09-09 | Collaborative approach for efficient authentication, data auditing, and data availability in cloud computing | Dey, Somnath; Saxena, Rajat |
2019-07-23 | A few techniques for fingerprint template protection | Surya Prakash; Ali, Syed Sadaf |
2019-05-11 | Presentation attack detection and matching techniques for hand-based biometric systems | Chaudhari, Narendra S.; Kanhangad, Vivek; Bhilare, Shruti |
2019-04-16 | Transient fault reliability and security of IP cores | Sengupta, Anirban; Kachave, Deepak |
2019-02-23 | No-reference and no-training based image quality assessment and enhancement | Surya Prakash; Joshi, Piyush |
2019-02-19 | Efficient energy aware routing protocol for mobile Ad hoc network | Chaudhari, Narendra S.; Sahu, Rakesh Kumar |
2019-02-12 | Unimodal and multimodal biometric verification using cancelable iris and fingerprint templates | Dey, Somnath; Dwivedi, Rudresh |
2019-01-31 | Hardware security and IP core protection of CE systems | Sengupta, Anirban; Roy, Dipanjan |
2018-05-31 | Novel application layer denial of service attacks and detection | Hubballi, Neminath; Tripathi, Nikhil |
2018-07-31 | Analysis of graph coloring problem based on satisfiability and maximal independent set | Chaudhari, Narendra S.; Sharma, Prakash Chandra |
2018-03-23 | Investigations in metaheuristic techniques with application to cryptology | Chaudhari, Narendra S.; Jain, Ashish |
2018-03-23 | Investigations in quantum inspired neural network learning algorithms | Tiwari, Aruna; Patel, Om Prakash |
2018-08-13 | Understanding and evaluating human behaviour: an application of psychology and machine learning | Srivastava, Abhishek; Ahmed, Tanveer |
2018-01-15 | Investigations in fuzzy based learning algorithms with application to big data classification | Tiwari, Aruna; Bharill, Neha |
2018-01-12 | Assessment of data and interfacing of service-oriented system with sensors | Chaudhari, Narendra S.; Umarikar, Amod C.; Bhadoria, Robin Singh |
2015-12-21 | Investigation in tree based genetic programming for data classification | Tiwari, Aruna; Bhardwaj, Arpit |
2016-04-18 | Low cost fault reliability and trojan security aware high level synthesis for application specific datapath processors | Sengupta, Anirban; Bhadauria, Saumya |
2015-03-13 | Multi - objective design space exploration in high level synthesis for application specific computing | Sengupta, Anirban; Mishra, Vipul Kumar |
2015-01-15 | Design of authentication protocols and message security algorithms in cellular networks | Chaudhari, Narendra S.; Saxena, Neetesh |
2014-08-27 | Approaches to cutting stock and strip packing problems | Chaudhari, Narendra S.; Thomas, Jaya |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 78 of 78