Abstract is missing.
- Statistical and Deep Learning Approach for Kannada Parts of Speech TaggerAkarsh Ramachandra Hegde, Akash S, Adarsh Ishwar Hegde, Adarsh Nayak S. R, Mamatha H. R.. 1-7 [doi]
- Multi-Class Network Intrusion Detection Using Deep Neural Networks Tuned on Imbalanced DataShruti Tyagi, Shriya Pingulkar, Amaan Shaikh. 1-5 [doi]
- Anomaly-Based Intrusion Detection System for IoT Environment Using Machine LearningArya Patil, Digvijay Machale, Dipanshu Goswami, Parimal Muley, Prachi Rajarapollu. 1-4 [doi]
- Intrusion Detection System for Live Anomaly-Based Network PacketsNishad Khare, Sonali Bhutad. 1-6 [doi]
- A New Wave in HDFS Data Security: Merging AES & MapReduce for Efficient Data EncryptionYash Watarkar, Avi Jain, Dipesh Shah, Aliasgar Thanawala, Aparna Kamble. 1-5 [doi]
- Gender Classification Model based on the Resnet 152 ArchitectureNidhi Jain, Prasadu Peddi. 1-7 [doi]
- Automatic Saline Monitoring System Using IoTRaju Patel, Manoj Singh Adhikari, Manoj Kumar Shukla, Mohit Payal, Palvai Manoj Kumar, Yogesh Kumar Verma. 1-4 [doi]
- Comprehensive Review of Historical Analogies and Challenges in Lung Cancer DetectionK. Sathyamoorthy, Mohanaprakash T. A, V. Vijayashanthi, S. M. Keerthana, Kanimozhi S, R. Vasanthi. 1-8 [doi]
- Comparative Analysis of Algorithms for Cotton Plant Leaf Disease Classification from an ImageAniket Singh, Amitesh Patra, Arjun Tyagi, Shivali Amit Wagle, Pooja Kamat. 1-5 [doi]
- Exploring Chip-Off Firmware Extraction Techniques and Challenges: Case Studies in Smart PlugsShravan Singh, Amey Chavekar, Sushant Mane, Faruk Kazi 0001. 1-6 [doi]
- Accounting for the Unaccounted Vulnerabilities Found in Endpoint ISP SOHO RouterAkshat Jain, Prasanna Shete. 1-4 [doi]
- SL-Defender: Decentralized Defense for Adversarial Robustness in Federated LearningCynara Justine, Sathyanarayanan Manamohan, Jiji Charangatt Victor. 1-7 [doi]
- The New Communication Network for an Internet of Things/Everything Based Security/Safety/General Management/Visitor's Services Integrated System of the Pompeii Archeological Park, ItalyAlberto Bruni, Fabio Garzia. 1-6 [doi]
- A Comparative Analysis of Image Enhancement Techniques For Improving Blurry Identity ImagesAziz Makandar, Syeda Bibi Javeriya. 1-6 [doi]
- Fault Detection of Underwater Cables by Using Robotic Operating SystemYogesh Kisan Mali, Seema Arvind Darekar, Shravil Sopal, Mansi Kale, Vishakha Kshatriya, Atharva Palaskar. 1-6 [doi]
- Pseudo Random Binary Sequence using Lattice-based Hard Problem for Quantum Key DistributionAnupama Arjun Pandit, Arun Mishra. 1-7 [doi]
- A Technique for Maintaining Attribute-based Privacy Implementing Blockchain and Machine LearningAshvini Chaudhari, Sweta Dargad, Yogesh Kisan Mali, Prasad Satish Dhend, Vaishnavi Adinath Hande, Shivanjali Surendra Bhilare. 1-4 [doi]
- 3D Printed Terrain-Adaptive Wheels Based Rpi Surveillance BotSiddharth Bhorge, Harshal Daigavhane, Swarali Damle, Arya Chopda, Paras Buva. 1-5 [doi]
- Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware CategoriesSanyam Jain, Sumaiya Thaseen. 1-5 [doi]
- Enhancing Traffic Sign Detection and Classification through Multi-Task Learning Using CNNsShambhavi Patil, Om Nankar, Manish Goyal, Shivali Amit Wagle. 1-6 [doi]
- A Survey of Disease Detection in Cauliflower Using Machine Learning and Deep Learning TechniquesSwapna Tekale, Krishna Kumar Singh. 1-6 [doi]
- KILLS-1: An Analysis on the Present Security Trends and Proposal of a Multilingual Encryption AlgorithmSree Harsha Prada Peesapaty. 1-5 [doi]
- The Utilization of Block-chain Innovation to Confirm KYC RecordsYogesh Kisan Mali, Sweta Dargad, Asheesh Dixit, Nalini Tiwari, Sneha Narkhede, Ashvini Chaudhari. 1-5 [doi]
- Transform Domain Techniques combined with LBP for Tampered Image Detection using Machine LearningAziz Makandar, Shilpa Kaman. 1-7 [doi]
- Enhancing Online Job Posting Security: A Big Data Approach to Fraud DetectionKanhaiya Sharma, Deepak Parashar, Akshay Sangwan, Abhinav Vengali, Gouransh Agrawal. 1-6 [doi]
- Evaluating Machine Learning Classifiers for Breast Cancer Diagnosis: A Comparative Study Using Accuracy MetricsMohanaprakash T. A, Kalaiyarasi R, Ramya. M, Vyshnavi K, Madhura Deventhiran, I. Jaichitra. 1-6 [doi]
- Comparative Analysis of Nature Inspired Optimization Algorithms for Biodiesel Yield Prediction using Extreme Learning MachineSangita Patil, Shakti Mishra, Surendra Singh Kachhwaha. 1-5 [doi]
- Biometric Authentication from sEMG: Assessing the Potential of Adaptive Chirp Mode DecompositionShivam Sharma, Rishi Raj Sharma. 1-6 [doi]
- Physical Biometric Spoofing of 3D Dynamic On-Air SignatureJose Juan Quintana, Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte. 1-6 [doi]
- Null Broadening in A Wide Frequency Range Using Non-Uniform Amplitudes Antenna Array for Radar ApplicationsSathishkannan P., Nikita Sarode, Sakshi Nimbalkar, Sanket S. Kalamkar, Rajesh K. Singh. 1-5 [doi]
- Threat Modeling of Cube Orange Based Unmanned Aerial Vehicle SystemYasir Umair Mulla, Amey Chavekar, Sushant Mane, Faruk Kazi 0001. 1-6 [doi]
- NodeMCU Based Weather Monitoring SystemRohi Bindal, Aniruddha Yadav, Prajjwal Dewanzan, Aditya Shinde, Yuvraj Salaria, Shubhangi Deokar. 1-6 [doi]
- A Practical Framework for Evaluating Cybersecurity Tools Leveraging the IEC62443 StandardAnas Husseis, Jose Luis Flores. 1-5 [doi]
- Tourist Place Classification Using Topic Modeling AlgorithmsApeksha Arun Wadhe, Shraddha Suratkar. 1-10 [doi]
- Comparative Evaluation of Machine Learning Models for Malicious URL DetectionShruti Tyagi, Shriya Pingulkar, Amaan Shaikh. 1-6 [doi]
- Torsion Point Cryptography: Enhancing Data Security with Elliptic CurvesKalyan Banerjee, Jasleen Kaur, Nilesh Tiwari. 1-6 [doi]
- Blockchain-Based Personalized Federated Learning Leveraging the SMPC protocolSahil Dhumale, Dhairya Ameria, Surendra Shukla. 1-6 [doi]
- A Comprehensive Survey on Artificial Intelligence Based Methods and Technologies Used to Detect Nutrition Level (Malnourishment)Ankesh Khare, Manisha J. Nene. 1-6 [doi]
- Detecting Diabetic Retinopathy using ResNet50 and Explainable AIShruti Tyagi, Shriya Pingulkar, Aryaman Tiwary. 1-6 [doi]
- Scalable Federated Learning for Privacy-Preserving Credit Card Fraud DetectionKyle D'souza, Sia Viji Puthusseri, Aiden Gigi Samuel. 1-6 [doi]
- Legal Aspects of Monitoring and Tracking the Movement of Individuals Using Modern TechnologiesMarián Magdolen, Tomás Lovecek. 1-6 [doi]
- Enhancing Sentiment Analysis Accuracy in IMDb Movie Reviews with Deep Learning Models: A Comparative Study of RNN and CNN ModelsAshwin Kumar. 1-9 [doi]
- Real Time Automated Sign Language Recognition and Transcription with Audio FeedbackKavitha J. C, D. Nagarajan. 1-6 [doi]
- Application of CNN Algorithm on X-Ray Images in COVID-19 Disease PredictionYogesh Kisan Mali, Lakshmi Sharma, Krishnal Mahajan, Faizan Kazi, Probal Kar, Aman Bhogle. 1-6 [doi]
- A Recent Study of Security Techniques for IoTSachin Upadhye, Nilesh M. Shelke. 1-5 [doi]
- A Study on Privacy-Preserving Auctions Considering Possible CollusionsAnubhav Yadav, Gaurav Baranwal. 1-6 [doi]
- Locating People in a Confined Space Using iBeacon TechnologyTomás Lovecek, Erika Skýpalová, Martin Boros, Radoslav Kuffa. 1-9 [doi]
- Alignment Free Fingerprint Template Security Using Minutia NeighborsSuraj Patil, Manik Hendre, Aditya Abhyankar. 1-4 [doi]
- Insight Now: A Cross-Platform News Application for Real-Time and Personalized News AggregationSagar Mohite, Swati Jadhav, Aayush Aggarwal, Ananya Shukla, Devashish Jain, Simran Jaiswal. 1-7 [doi]
- 3D Synthetic On-Air Signatures for Biometric AttackMiguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Jose Juan Quintana. 1-6 [doi]
- Detection and Mitigation Mechanisms for Covert Channel AttackKurmi Sandeep Kumar S, Manisha J. Nene. 1-7 [doi]
- Classification of Malware Using Deep Learning: A StudyInakollu Shanmukha Srinu, Deepti Vidyarthi. 1-6 [doi]
- Jal-Tarang: Smart Buoy for Wave Height MeasurementMedha Wyawahare, M. Selva Balan, Akshay Aadarsh, Anish Patil, Utkarsh Anuse. 1-6 [doi]
- FPGA Acceleration of Authenticated Encryption with PUF-KeyR. V. Rohinth Ram, R. Meena Kaveri, P. Bhuvanesh, K. Mariammal. 1-8 [doi]
- Intelligent IOT-based BMS for Integrated Solar with AC grid Fast Charging Systems in Electric VehiclesShreyas Thombare, Pankai Kumar, Raiashree Bhokare, Sachin Jadhav. 1-6 [doi]
- A Review of Drone Communication Protocols: Current Trends and Future PerspectivesAmey Chavekar, Yasir Umair Mulla, Sushant Mane, Sunny Kumar, Faruk Kazi 0001. 1-6 [doi]
- A Protection Approach For Coal Miners Safety Helmet Using IoTSeema Arvind Darekar, Girish Patil, Nakul Pawar, Smita Jagdale, Nalini Tiwari, Akshada Padale. 1-5 [doi]
- Understanding Twitter Emojis for Sentiment Analysis and Risk Perception on Royal Palace of Naples, ItalyFabio Garzia, Francesco Borghini, Giorgia Modeo, Mario Epifani, Soodamani Ramalingam, Alberto Bruni. 1-6 [doi]
- Fed-Trace: An Efficient Model to Traceback Data Poisoning Attacks in Federated LearningHarshit Gupta, Pratyush Pareek, Anirudh Arora, Muskan Deep Kaur Maini, Ramesh Kumar Bhukya, O. P. Vyas 0001, Antonio Puliafito. 1-6 [doi]
- Enhancing Cybersecurity Proactive Decision-Making Through Attack Tree Analysis and MITRE FrameworkAnas Husseis, Jose Luis Flores, Andrej Bregar, Giovanni Mazzeo, Luigi Coppolino. 1-5 [doi]