Search Results - "Chapaneri, Radhika"
-
1
Multi-level Gaussian mixture modeling for detection of malicious network traffic
Published in The Journal of supercomputing (01-05-2021)“…Along with the growing network connectivity across the world, there is a substantial increase in malicious network traffic to exploit the vulnerabilities, thus…”
Get full text
Journal Article -
2
Enhanced detection of imbalanced malicious network traffic with regularized Generative Adversarial Networks
Published in Journal of network and computer applications (01-06-2022)“…Due to the emerging network security vulnerabilities and threats, securing the network and identifying malicious network traffic is crucial for various…”
Get full text
Journal Article -
3
Detection of Malicious Network Traffic using Convolutional Neural Networks
Published in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (01-07-2019)“…Networks are typically exposed to various attacks such as Denial of Service, Shellcode, and Fuzzers with increasing connectivity of users and organizations. It…”
Get full text
Conference Proceeding -
4
E-Agri Kit: Agricultural Aid using Deep Learning
Published in 2021 6th International Conference for Convergence in Technology (I2CT) (02-04-2021)“…This paper presents an agricultural aid application, developed and designed, to help farmers by utilizing Image Processing, Machine Learning and Deep Learning…”
Get full text
Conference Proceeding -
5
Cover Song Identification with Pairwise Cross-Similarity Matrix using Deep Learning
Published in 2019 IEEE Bombay Section Signature Conference (IBSSC) (01-07-2019)“…A cover song, by definition, is a rendition of a previously released song and mapping these cover songs to their original song is defined as "Cover Song…”
Get full text
Conference Proceeding -
6
Plant Disease Detection: A Comprehensive Survey
Published in 2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA) (01-04-2020)“…Plant diseases can affect vast produce of crops posing a major menace to food security. To avoid this risk, an approach is needed which performs early…”
Get full text
Conference Proceeding -
7
Chaos based image encryption using Latin rectangle scrambling
Published in 2014 Annual IEEE India Conference (INDICON) (01-12-2014)“…An efficient image cryptosystem is proposed in this paper employing Latin rectangle scrambling based on 2D Hénon chaotic map. To reduce the overall number of…”
Get full text
Conference Proceeding -
8
Employee Attrition Prediction Using Classification Models
Published in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT) (01-03-2019)“…The term Attrition refers to the voluntary or involuntary discontinuation of employees in an organization. This paper focuses on discussing a systematic flow…”
Get full text
Conference Proceeding -
9
Artificial Neural Network Based University Chatbot System
Published in 2019 IEEE Bombay Section Signature Conference (IBSSC) (01-07-2019)“…Chatbots have effectively reduced human efforts by providing automated human-like solutions for various business and societal problems. This paper is an…”
Get full text
Conference Proceeding -
10
Evaluation of Chaotic Map Lattice systems for image encryption
Published in 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) (01-04-2014)“…In this paper, the performance of Chaotic Map Lattice (CML) systems used for the purpose of digital image encryption is evaluated. The design and security…”
Get full text
Conference Proceeding -
11
Digital image encryption using improved chaotic map lattice
Published in 2013 Annual IEEE India Conference (INDICON) (01-12-2013)“…Chaotic map lattice (CML) has been used recently for digital image encryption; however, it has several flaws in terms of irreversibility and violates some…”
Get full text
Conference Proceeding