Abstract is missing.
- Statistical and Deep Learning Approach for Kannada Parts of Speech TaggerAkarsh Ramachandra Hegde, Akash S, Adarsh Ishwar Hegde, Adarsh Nayak S. R, Mamatha H. R.. 1-7 [doi]
- Multi-Class Network Intrusion Detection Using Deep Neural Networks Tuned on Imbalanced DataShruti Tyagi, Shriya Pingulkar, Amaan Shaikh. 1-5 [doi]
- Anomaly-Based Intrusion Detection System for IoT Environment Using Machine LearningArya Patil, Digvijay Machale, Dipanshu Goswami, Parimal Muley, Prachi Rajarapollu. 1-4 [doi]
- Intrusion Detection System for Live Anomaly-Based Network PacketsNishad Khare, Sonali Bhutad. 1-6 [doi]
- Gender Classification Model based on the Resnet 152 ArchitectureNidhi Jain, Prasadu Peddi. 1-7 [doi]
- Automatic Saline Monitoring System Using IoTRaju Patel, Manoj Singh Adhikari, Manoj Kumar Shukla, Mohit Payal, Palvai Manoj Kumar, Yogesh Kumar Verma. 1-4 [doi]
- Comparative Analysis of Algorithms for Cotton Plant Leaf Disease Classification from an ImageAniket Singh, Amitesh Patra, Arjun Tyagi, Shivali Amit Wagle, Pooja Kamat. 1-5 [doi]
- Accounting for the Unaccounted Vulnerabilities Found in Endpoint ISP SOHO RouterAkshat Jain, Prasanna Shete. 1-4 [doi]
- SL-Defender: Decentralized Defense for Adversarial Robustness in Federated LearningCynara Justine, Sathyanarayanan Manamohan, Jiji Charangatt Victor. 1-7 [doi]
- The New Communication Network for an Internet of Things/Everything Based Security/Safety/General Management/Visitor's Services Integrated System of the Pompeii Archeological Park, ItalyAlberto Bruni, Fabio Garzia. 1-6 [doi]
- A Comparative Analysis of Image Enhancement Techniques For Improving Blurry Identity ImagesAziz Makandar, Syeda Bibi Javeriya. 1-6 [doi]
- Fault Detection of Underwater Cables by Using Robotic Operating SystemYogesh Kisan Mali, Seema Arvind Darekar, Shravil Sopal, Mansi Kale, Vishakha Kshatriya, Atharva Palaskar. 1-6 [doi]
- Pseudo Random Binary Sequence using Lattice-based Hard Problem for Quantum Key DistributionAnupama Arjun Pandit, Arun Mishra. 1-7 [doi]
- Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware CategoriesSanyam Jain, Sumaiya Thaseen. 1-5 [doi]
- Enhancing Traffic Sign Detection and Classification through Multi-Task Learning Using CNNsShambhavi Patil, Om Nankar, Manish Goyal, Shivali Amit Wagle. 1-6 [doi]
- A Survey of Disease Detection in Cauliflower Using Machine Learning and Deep Learning TechniquesSwapna Tekale, Krishna Kumar Singh. 1-6 [doi]
- KILLS-1: An Analysis on the Present Security Trends and Proposal of a Multilingual Encryption AlgorithmSree Harsha Prada Peesapaty. 1-5 [doi]
- Transform Domain Techniques combined with LBP for Tampered Image Detection using Machine LearningAziz Makandar, Shilpa Kaman. 1-7 [doi]
- Enhancing Online Job Posting Security: A Big Data Approach to Fraud DetectionKanhaiya Sharma, Deepak Parashar, Akshay Sangwan, Abhinav Vengali, Gouransh Agrawal. 1-6 [doi]
- Comparative Analysis of Nature Inspired Optimization Algorithms for Biodiesel Yield Prediction using Extreme Learning MachineSangita Patil, Shakti Mishra, Surendra Singh Kachhwaha. 1-5 [doi]
- Biometric Authentication from sEMG: Assessing the Potential of Adaptive Chirp Mode DecompositionShivam Sharma, Rishi Raj Sharma. 1-6 [doi]
- Physical Biometric Spoofing of 3D Dynamic On-Air SignatureJose Juan Quintana, Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte. 1-6 [doi]
- Threat Modeling of Cube Orange Based Unmanned Aerial Vehicle SystemYasir Umair Mulla, Amey Chavekar, Sushant Mane, Faruk Kazi 0001. 1-6 [doi]
- Tourist Place Classification Using Topic Modeling AlgorithmsApeksha Arun Wadhe, Shraddha Suratkar. 1-10 [doi]
- Torsion Point Cryptography: Enhancing Data Security with Elliptic CurvesKalyan Banerjee, Jasleen Kaur, Nilesh Tiwari. 1-6 [doi]
- Detecting Diabetic Retinopathy using ResNet50 and Explainable AIShruti Tyagi, Shriya Pingulkar, Aryaman Tiwary. 1-6 [doi]
- Enhancing Sentiment Analysis Accuracy in IMDb Movie Reviews with Deep Learning Models: A Comparative Study of RNN and CNN ModelsAshwin Kumar. 1-9 [doi]
- Real Time Automated Sign Language Recognition and Transcription with Audio FeedbackKavitha J. C, D. Nagarajan. 1-6 [doi]
- A Recent Study of Security Techniques for IoTSachin Upadhye, Nilesh M. Shelke. 1-5 [doi]
- A Study on Privacy-Preserving Auctions Considering Possible CollusionsAnubhav Yadav, Gaurav Baranwal. 1-6 [doi]
- Locating People in a Confined Space Using iBeacon TechnologyTomás Lovecek, Erika Skýpalová, Martin Boros, Radoslav Kuffa. 1-9 [doi]
- Alignment Free Fingerprint Template Security Using Minutia NeighborsSuraj Patil, Manik Hendre, Aditya Abhyankar. 1-4 [doi]
- Insight Now: A Cross-Platform News Application for Real-Time and Personalized News AggregationSagar Mohite, Swati Jadhav, Aayush Aggarwal, Ananya Shukla, Devashish Jain, Simran Jaiswal. 1-7 [doi]
- 3D Synthetic On-Air Signatures for Biometric AttackMiguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Jose Juan Quintana. 1-6 [doi]
- Detection and Mitigation Mechanisms for Covert Channel AttackKurmi Sandeep Kumar S, Manisha J. Nene. 1-7 [doi]
- Classification of Malware Using Deep Learning: A StudyInakollu Shanmukha Srinu, Deepti Vidyarthi. 1-6 [doi]
- Jal-Tarang: Smart Buoy for Wave Height MeasurementMedha Wyawahare, M. Selva Balan, Akshay Aadarsh, Anish Patil, Utkarsh Anuse. 1-6 [doi]
- Intelligent IOT-based BMS for Integrated Solar with AC grid Fast Charging Systems in Electric VehiclesShreyas Thombare, Pankai Kumar, Raiashree Bhokare, Sachin Jadhav. 1-6 [doi]
- Understanding Twitter Emojis for Sentiment Analysis and Risk Perception on Royal Palace of Naples, ItalyFabio Garzia, Francesco Borghini, Giorgia Modeo, Mario Epifani, Soodamani Ramalingam, Alberto Bruni. 1-6 [doi]
- Fed-Trace: An Efficient Model to Traceback Data Poisoning Attacks in Federated LearningHarshit Gupta, Pratyush Pareek, Anirudh Arora, Muskan Deep Kaur Maini, Ramesh Kumar Bhukya, O. P. Vyas 0001, Antonio Puliafito. 1-6 [doi]