Collection's Items (Sorted by Submit Date in Descending order): 781 to 800 of 1064
Issue Date | Title | Author(s) |
2020-03 | Robust, efficient and privacy-preserving violent activity recognition in videos | Rajput, Amitesh Singh |
2022 | EraisNET: An Optical Flow based 3D ConvNET for Erasing Obstructions | Narang, Pratik; Rajput, Amitesh Singh |
2018-02 | CryptoCT: towards privacy preserving color transfer and storage over cloud | Rajput, Amitesh Singh |
2018-08 | Cloud based image color transfer and storage in encrypted domain | Rajput, Amitesh Singh |
2020-10 | 2DInpaint: A novel privacy-preserving scheme for image inpainting in an encrypted domain over the cloud | Rajput, Amitesh Singh |
2020 | CryptoLesion: A Privacy-preserving Model for Lesion Segmentation Using Whale Optimization over Cloud | Rajput, Amitesh Singh |
2020-01 | A privacy-preserving protocol for efficient nighttime haze removal using cloud based automatic reference image selection and color transfer as a service | Rajput, Amitesh Singh |
2020-08 | Privacy-preserving human action recognition as a remote cloud service using RGB-D sensors and deep CNN | Rajput, Amitesh Singh |
2021 | Z -Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud | Rajput, Amitesh Singh |
2022-04 | Securing Multimedia Videos Using Space-Filling Curves | Rajput, Amitesh Singh |
2022-07 | SecureDL: A privacy preserving deep learning model for image recognition over cloud | Rajput, Amitesh Singh |
2022 | Privacy-Preserving Distribution and Access Control of Personalized Healthcare Data | Rajput, Amitesh Singh |
2017-10 | How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach | Kumar, Rajesh |
2018-04 | Effective Analysis of Attack Trees: A Model-Driven Approach | Kumar, Rajesh |
2015-09 | Time Dependent Analysis with Dynamic Counter Measure Trees | Kumar, Rajesh |
2015-12 | Sequential and Parallel Attack Tree Modelling | Kumar, Rajesh |
2016-10 | Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study | Kumar, Rajesh |
2015-01 | Quantitative Attack Tree Analysis via Priced Timed Automata | Kumar, Rajesh |
2017 | Quantitative Security and Safety Analysis with Attack-Fault Trees | Kumar, Rajesh |
2018-04 | LOCKS: a property specification language for security goals | Kumar, Rajesh |
Collection's Items (Sorted by Submit Date in Descending order): 781 to 800 of 1064