Search

Your search keyword '"Nalini K"' showing total 132 results

Search Constraints

Start Over You searched for: Author "Nalini K" Remove constraint Author: "Nalini K" Topic business Remove constraint Topic: business
132 results on '"Nalini K"'

Search Results

1. Cognitive data augmentation for adversarial defense via pixel masking

2. Predicting land use and land cover scenario in Indian national river basin: the Ganga

3. CryptInfer: Enabling Encrypted Inference on Skin Lesion Images for Melanoma Detection

4. Recognizing Disguised Faces in the Wild

5. Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition

6. DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector

7. Securing CNN Model and Biometric Template using Blockchain

8. Privacy Enhanced Decision Tree Inference

9. DNDNet: Reconfiguring CNN for Adversarial Robustness

10. Dynamic behavior analysis in compressed fingerprint videos

11. DeepRing: Protecting Deep Neural Network With Blockchain

12. Color-Theoretic Experiments to Understand Unequal Gender Classification Accuracy From Face Images

13. Towards Deep Neural Network Training on Encrypted Data

14. Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition

15. A comparative study of paracetamol and tramadol in pain management in hemophilic patients

16. Changes in T-cell subsets identify responders to FcR-nonbinding anti-CD3 mAb (teplizumab) in patients with type 1 diabetes

17. Image Transformation based Defense Against Adversarial Perturbation on Deep Learning Models

18. Disguised Faces in the Wild

20. Big data and cloud identity service for mobile authentication

21. Treatment of new onset type 1 diabetes with teplizumab: successes and pitfalls in development

22. Reduced IL-7 Responsiveness Defined by Signal Transducer and Activator of Transcription 5 Phosphorylation in T Cells May Be a Marker for Increased Risk of Developing Cytomegalovirus Disease in Patients after Hematopoietic Stem Cell Transplantation

23. Improving classifier fusion via Pool Adjacent Violators normalization

24. Face anti-spoofing with multifeature videolet aggregation

25. Learning face recognition from limited training data using deep neural networks

26. Outlier faces detector via efficient cohesive subgraph identification

27. Back to the future: A fully automatic method for robust age progression

28. Both high and low levels of cellular Epstein-Barr virus DNA in blood identify failure after hematologic stem cell transplantation in conjunction with acute GVHD and type of conditioning

29. Heterochromia Iridis and Pertinent Clinical Findings in Patients with Glaucoma Associated with Sturge–Weber Syndrome

30. Pre-transplant cytomegalovirus (CMV) serostatus remains the most important determinant of CMV reactivation after allogeneic hematopoietic stem cell transplantation in the era of surveillance and preemptive therapy

32. Generating Cancelable Fingerprint Templates

33. Reduced numbers of IL-7 receptor (CD127) expressing immune cells and IL-7-signaling defects in peripheral blood from patients with breast cancer

34. Progression of glaucoma associated with the Sirsasana (headstand) yoga posture

35. Endothelial apoptosis and circulating endothelial cells after bypass grafting with and without cardiopulmonary bypass☆

36. Improving cross-resolution face matching using ensemble-based co-transfer learning

37. Dynamic Behavior Analysis in Compressed Fingerprint Videos

38. Error analysis of pattern recognition systems—the subsets bootstrap

39. Biometrics break-ins and band-aids

40. Biometric perils and patches

41. Reduced plasma levels of soluble interleukin-7 receptor during graft-versus-host disease (GVHD) in children and adults

42. Role of IL-32 in HIV Reactivation and its Link to HIV-HSV Coinfection

43. Enhancing security and privacy in biometrics-based authentication systems

44. Delayed anti-CD3 therapy in a mouse heart transplant model induced tolerance and long-term survival of allograft: achieving tolerance

45. Object detection using gabor filters

46. Face recognition using early biologically inspired features

47. Fake iris detection using structured light

48. Calcium Sulfate as Bone Graft Substitute in the Treatment of Osseous Bone Defects, A Prospective Study

49. Robust and Secure Iris Recognition

50. Adaptive flow orientation-based feature extraction in fingerprint images

Catalog

Books, media, physical & digital resources