101 results on '"Laxmi, Vijay"'
Search Results
2. Polarization-Independent Broadband Metasurface Absorber for Near Infrared Spectrum
3. Ultra-Broadband Absorber Based on Metasurfaces in the Infrared Regime
4. Supervısed Learnıng Algorıthm: A Survey
5. A Performance Discussion of Web Crawler Using Some Advanced Factors
6. Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking
7. APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android
8. DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks
9. Bloom Filter Based Privacy Preserving Deduplication System
10. A Novel Method of Data Partitioning Using Genetic Algorithm Work Load Driven Approach Utilizing Machine Learning
11. MAPPER: Mapping Application Description to Permissions
12. Performance Analysis of Various Congestion Control Schemes in VANET
13. Privacy Preserving Data Offloading Based on Transformation
14. Unraveling Reflection Induced Sensitive Leaks in Android Apps
15. Performance-Enhanced -LBDR for 2D Mesh Network-on-Chip
16. ‘X’ Shape Slot-Based Microstrip Fractal Antenna for IEEE 802.11 WLAN
17. Secure Random Encryption for Deduplicated Storage
18. Visual Speech Recognition with Selected Boundary Descriptors
19. DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis
20. Detection of SQLite Database Vulnerabilities in Android Apps
21. Fault Aware Dynamic Adaptive Routing Using LBDR
22. Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps
23. Environment–Reactive Malware Behavior: Detection and Categorization
24. Energy Scavenging Based HybridGSM Model for Mobile Towers
25. Privacy Leakage Attacks in Browsers by Colluding Extensions
26. Trust Establishment Techniques in VANET
27. Parameterized Path Based Randomized Oblivious Minimal Path Routing with Fault Tolerance in 2D Mesh Network on Chip
28. Misbehavior Detection Based on Ensemble Learning in VANET
29. PEAL—Packed Executable AnaLysis
30. Detection of Broken Link Fraud in DSDV Routing
31. A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs
32. Machine Learning Approach for Multiple Misbehavior Detection in VANET
33. Robust Watermarking through Spatially Disjoint Transformations
34. A Novel Attack Model Simulation in OLSR
35. Broken Link Fraud in DSDV Routing - Detection and Countermeasure
36. Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
37. Permuted Image DCT Watermarking
38. Lipreading Using n–Gram Feature Vector
39. ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips
40. Structural Fault Modelling in Nano Devices
41. Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip
42. Fuzzy String Matching Algorithm for Spam Detection in Twitter
43. Threshold Ring Signature with Message Block Sharing
44. Multiparty Evaluation of Finite State Machine
45. An Enhanced Privacy-Preserving Recommender System
46. Testing Program Crash Based on Search Based Testing and Exception Injection
47. An Approach to Meta-Alert Generation for Anomalous TCP Traffic
48. EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers
49. Malware Signature Generation Using Locality Sensitive Hashing
50. Bad Signature Identification in a Batch Using Error Detection Codes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.