351 results on '"Ravi Tandon"'
Search Results
2. A bioinformatics approach to elucidate conserved genes and pathways in C. elegans as an animal model for cardiovascular research
3. Microbiome analysis of saliva from oral squamous cell carcinoma (OSCC) patients and tobacco abusers with potential biomarkers for oral cancer screening
4. Subtype diversity and emergence of drug resistance in HIV-1 in solapur district of Maharashtra, India
5. Process development and preclinical evaluation of a major Plasmodium falciparum blood stage vaccine candidate, Cysteine-Rich Protective Antigen (CyRPA)
6. Reconsidering the 'MR Unsafe' breast tissue expander with magnetic infusion port: A case report and literature review
7. CORRELATION STUDY OF VASCULAR CELL ADHESION MOLECULE-1 AND REMNANT LIPOPROTEIN CHOLESTEROL WITH DIABETES RETINOPATHY A
8. Plasma metabolomic study in perinatally HIV-infected children using 1H NMR spectroscopy reveals perturbed metabolites that sustain during therapy.
9. Data on the evolutionary history of the V(D)J recombination-activating protein 1 – RAG1 coupled with sequence and variant analyses
10. Secure Retrospective Interference Alignment
11. Human Galectin-9 Is a Potent Mediator of HIV Transcription and Reactivation.
12. Intrinsic Fairness-Accuracy Tradeoffs Under Equalized Odds.
13. Communicating Classification Results Over Noisy Channels.
14. Skip the Benchmark: Generating System-Level High-Level Synthesis Data using Generative Machine Learning.
15. Mammalian Cell-Derived Respiratory Syncytial Virus-Like Particles Protect the Lower as well as the Upper Respiratory Tract.
16. Content Delivery in Fog-Aided Small-Cell Systems with Offline and Online Caching: An Information—Theoretic Analysis
17. Age-related expansion of Tim-3 expressing T cells in vertically HIV-1 infected children.
18. Atypical Neurofibroma and Osteosclerotic Metastasis
19. Human endogenous retrovirus expression is inversely associated with chronic immune activation in HIV-1 infection.
20. Trustworthy Actionable Perturbations.
21. Nonhealing Ulcer: Acroangiodermatitis of Mali
22. Feline leukemia virus and other pathogens as important threats to the survival of the critically endangered Iberian lynx (Lynx pardinus).
23. Learning Fair Classifiers via Min-Max F-divergence Regularization.
24. Generalization Bounds for Neural Belief Propagation Decoders.
25. Sparse Matrix Codes: Rate-Reliability Trade-offs for URLLC.
26. Differentially Private Federated Learning with Drift Control.
27. Unsupervised Change Detection using DRE-CUSUM.
28. Differentially Private Community Detection for Stochastic Block Models.
29. FAID Diversity via Neural Networks.
30. Adversarial Filters for Secure Modulation Classification.
31. On the Necessity of Aligning Gradients for Wireless Federated Learning.
32. On the Capacity of Latent Variable Private Information Retrieval.
33. Wiretap Channel with Latent Variable Secrecy.
34. Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation.
35. MAC Aware Quantization for Distributed Gradient Descent.
36. Unsupervised mmWave Beamforming via Autoencoders.
37. On Secure Topological Interference Management for Half-rate-feasible Networks.
38. Latent-variable Private Information Retrieval.
39. Wireless Federated Learning with Local Differential Privacy.
40. Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback.
41. Finite Alphabet Iterative Decoding of LDPC Codes with Coarsely Quantized Neural Networks.
42. Local Information Privacy with Bounded Prior.
43. Random Sampling for Distributed Coded Matrix Multiplication.
44. On the Capacity of Leaky Private Information Retrieval.
45. Interference Channels with Confidential Messages: Leveraging OFDM Transmission to Scale up Secure Degrees of Freedom with No CSIT.
46. Context Aware Laplacian Mechanism for Local Information Privacy.
47. On the Upload versus Download Cost for Secure and Private Matrix Multiplication.
48. Context-aware Data Aggregation with Localized Information Privacy.
49. Flow of Information in Feed-Forward Denoising Neural Networks.
50. On the Capacity of Secure Distributed Matrix Multiplication.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.