102 results on '"Dwivedi, Ashutosh Dhar"'
Search Results
2. TinyWolf — Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization
3. Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions
4. Securing IoT devices: A novel approach using blockchain and quantum cryptography
5. DeCrypt: a 3DES inspired optimised cryptographic algorithm
6. Precise Marketing Data Mining Method of E-Commerce Platform Based on Association Rules
7. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
8. Optimized Blockchain Model for Internet of Things based Healthcare Applications
9. Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain
10. Global marine phytoplankton dynamics analysis with machine learning and reanalyzed remote sensing
11. Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems
12. VisFormers—Combining Vision and Transformers for Enhanced Complex Document Classification
13. A digital rights management system based on a scalable blockchain
14. Where’s @Waldo?: Finding Users on Twitter
15. Secret Learning for Lung Cancer Diagnosis - A Study with Homomorphic Encryption, Texture Analysis and Deep Learning
16. A Privacy-Preserving Internet of Things Smart Healthcare Financial System
17. A game theoretic analysis of resource mining in blockchain
18. PHANTOM Protocol as the New Crypto-Democracy
19. Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK
20. Where’s @Waldo?: Finding Users on Twitter
21. Correction to: A digital rights management system based on a scalable blockchain
22. PHANTOM Protocol as the New Crypto-Democracy
23. DBNex: Deep Belief Network and Explainable AI based Financial Fraud Detection
24. AUTODEEPSLICE: A Data Driven Network Slicing Technique of 5G network using Automatic Deep Learning
25. Data Driven based Malicious URL Detection using Explainable AI
26. Federated learning based Covid‐19 detection
27. Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Search
28. DeCrypt: a 3DES inspired optimised cryptographic algorithm
29. Federated learning based Covid‐19 detection.
30. Machine Learning-Based Regression Framework to Predict Health Insurance Premiums
31. Call for Book Chapters - Demystifying Big Data Analytics for Industries and Smart Societies (BDA2022)
32. Call for Book Chapters - Revolutionizing Healthcare Through Artificial Intelligence and Internet of Things Applications
33. n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications
34. ABCanDroid: A Cloud Integrated Android App for Noninvasive Early Breast Cancer Detection Using Transfer Learning
35. Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms
36. Correction to:A digital rights management system based on a scalable blockchain (Peer-to-Peer Networking and Applications, (2020), 10.1007/s12083-020-01023-z)
37. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
38. BRISK: Dynamic Encryption Based Cipher for Long Term Security
39. A Game Theoretic Analysis of Cryptocurrency Market for Sustainable Development of Smart Cities
40. Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology
41. Role of Blockchain in Forestalling Pandemics
42. Tracing the Source of Fake News using a Scalable Blockchain Distributed Network
43. A digital rights management system based on a scalable blockchain
44. Security Analysis of Lightweight IoT Cipher: Chaskey
45. Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention
46. SLIM: A Lightweight Block Cipher for Internet of Health Things
47. Where’s @waldo?:Finding users on twitter
48. Differential-linear and related key cryptanalysis of round-reduced scream
49. Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology.
50. Differential cryptanalysis in ARX ciphers, Application to SPECK
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.