Search Results - "Tomar, Deepak Singh"

Refine Results
  1. 1

    Multiencoder‐based federated intelligent deep learning model for brain tumor segmentation by Soni, Vaibhav, Singh, Nikhil Kumar, Singh, Rishi Kumar, Tomar, Deepak Singh

    “…Glioma, a primary tumor derived from brain glial cells, is around 45% of all intracranial tumors. Magnetic resonance imaging's (MRI's) precise glioma…”
    Get full text
    Journal Article
  2. 2

    New biostatistics features for detecting web bot activity on web applications by Rahman, Rizwan Ur, Tomar, Deepak Singh

    Published in Computers & security (01-10-2020)
    “…Web bots are malicious scripts that automatically traverse the websites, fill the web form and illegally scrap the data from web sites. The never-ending threat…”
    Get full text
    Journal Article
  3. 3

    Self-Attention Mechanism-Based Federated Learning Model for Cross Context Recommendation System by Singh, Nikhil Kumar, Tomar, Deepak Singh, Shabaz, Mohammad, Keshta, Ismail, Soni, Mukesh, Sahu, Divya Rishi, Bhende, Manisha S., Nandanwar, Amit Kumar, Vishwakarma, Gagan

    Published in IEEE transactions on consumer electronics (01-02-2024)
    “…The traditional single-context recommendation algorithm is constrained by the sparse connection between users and items and a user/item cold start problem…”
    Get full text
    Journal Article
  4. 4

    The Demonstration of Android Vulnerabilities by Vinay, Mallela David, Hemanth Kumar, Mandavyapuram, Hemanth, Banoth, Singh Tomar, Deepak

    “…The development of mobile applications is increasing rapidly. Client-server architectures are common in many of these systems. IOS and Android are the most…”
    Get full text
    Conference Proceeding
  5. 5

    ACMFNN: A Novel design of an augmented convolutional model for intelligent cross-domain malware localization via forensic neural networks by Beg, Rijvan, Pateriya, R.K., Tomar, Deepak Singh

    Published in IEEE access (01-01-2023)
    “…The detection and localization of malwares using spatial and temporal data patterns require the development of efficient deep learning models. These models…”
    Get full text
    Journal Article
  6. 6

    An Efficient Hybrid User Profile Based Web Search Personalization Through Semantic Crawler by Choudhary, Jaytrilok, Tomar, Deepak Singh, Singh, Dhirendra Pratap

    Published in National Academy science letters (01-04-2019)
    “…The World Wide Web has a collection of trillions of web pages and these web pages are increasing day by day. Web pages available on the Web change frequently…”
    Get full text
    Journal Article
  7. 7

    Analysis of Web Application Code Vulnerabilities using Secure Coding Standards by Sahu, Divya Rishi, Tomar, Deepak Singh

    “…The evolution of modern web application involves a broad range of web technologies such as ActiveX, JavaScript and CGI. It mitigates the demand of bolt-on…”
    Get full text
    Journal Article
  8. 8

    Blockchain Security and Challenges: A Review by Golait, Pawan, Tomar, Deepak Singh, Pateriya, R.K, Sharma, Yogesh Kumar

    “…Blockchain technology has emerged as a ground-breaking innovation with the potential to revolutionize various industries and transform transactions. Its…”
    Get full text
    Conference Proceeding
  9. 9

    Transformer based multimodal similarity search method for E-Commerce platforms by Sahoo, Chandan Charchit, Tomar, Deepak Singh, Bharti, Jyoti

    “…Multimodal similarity search has been attracting much attention from scholars in recent times. The intensification of research into Multimodal search lies in…”
    Get full text
    Conference Proceeding
  10. 10

    Precision Agriculture: Crop Image Segmentation and Loss Evaluation through Drone Surveillance by Patidar, Pawan Kumar, Tomar, Deepak Singh, Pateriya, R. K., Sharma, Yogesh Kumar

    “…Agriculture is the most important source of livelihood. Crop segmentation has become an important role in precision agriculture which helps farmers to make…”
    Get full text
    Conference Proceeding
  11. 11

    A Threat modeling approach to analyze and mitigate WhatsApp attacks: A Review by Patidar, Pawan Kumar, Tomar, Deepak Singh, Pateriya, R.K., Sharma, Yogesh Kumar

    “…One of the most popularly used features on smart-phones is WhatsApp. It is a free messaging app available for An-droid, IOS, and all other smartphones. A…”
    Get full text
    Conference Proceeding
  12. 12

    Smart Attendance System Using Biometric and GPS by Vinay, Mallela David, Kumar, Mandavyapuram Hemanth, Hemanth, Banoth, Singh Tomar, Deepak

    “…Any academic institution must maintain an attendance system to teach discipline to students. It is also a factor to evaluate student performance in regularity…”
    Get full text
    Conference Proceeding
  13. 13

    Sentiment analysis: a review and comparative analysis over social media by Singh, Nikhil Kumar, Tomar, Deepak Singh, Sangaiah, Arun Kumar

    “…Sentiment analysis is the computational examination of end user’s opinion, attitudes and emotions towards a particular topic or product. Sentiment analysis…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Threats of price scraping on e-commerce websites: attack model and its detection using neural network by Rahman, Rizwan Ur, Tomar, Deepak Singh

    “…Scrapers are automated programs that mechanically traverse the website and steal the data from websites. According to numerous web traffic reports nearly fifty…”
    Get full text
    Journal Article
  16. 16
  17. 17
  18. 18

    Secure the ownership of WoT devices using secure ownership transfer framework by Singh, Kaptan, Tomar, Deepak Singh

    “…The primary concern behind ownership in Web of Things (WoT) is to provide rights to own devices to operate and access. When the ownership of Internet of Things…”
    Get full text
    Journal Article
  19. 19

    Investigation and Designing for Network Congestion Detection and Prevention in DTN by Tomar, Deepak Singh, Kamble, Megha

    “…Nowadays higher demands of lightweight mobile devices for monitoring critical situation such as weather, tsunami, earth quick and rural area where direct…”
    Get full text
    Conference Proceeding
  20. 20

    Human Activity Recognition Using Deep Learning Techniques for Healthcare Applications by Shekhar, Raj, Tomar, Deepak Singh, Sharan, Bhagwati, Pateriya, R. K.

    “…The idea of smart healthcare is gradually gaining traction with the rapid advancement in information technologies. Smart healthcare is the intelligent…”
    Get full text
    Conference Proceeding