Search Results - "Tomar, Deepak Singh"
-
1
Multiencoder‐based federated intelligent deep learning model for brain tumor segmentation
Published in International journal of imaging systems and technology (01-01-2024)“…Glioma, a primary tumor derived from brain glial cells, is around 45% of all intracranial tumors. Magnetic resonance imaging's (MRI's) precise glioma…”
Get full text
Journal Article -
2
New biostatistics features for detecting web bot activity on web applications
Published in Computers & security (01-10-2020)“…Web bots are malicious scripts that automatically traverse the websites, fill the web form and illegally scrap the data from web sites. The never-ending threat…”
Get full text
Journal Article -
3
Self-Attention Mechanism-Based Federated Learning Model for Cross Context Recommendation System
Published in IEEE transactions on consumer electronics (01-02-2024)“…The traditional single-context recommendation algorithm is constrained by the sparse connection between users and items and a user/item cold start problem…”
Get full text
Journal Article -
4
The Demonstration of Android Vulnerabilities
Published in 2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) (24-02-2024)“…The development of mobile applications is increasing rapidly. Client-server architectures are common in many of these systems. IOS and Android are the most…”
Get full text
Conference Proceeding -
5
ACMFNN: A Novel design of an augmented convolutional model for intelligent cross-domain malware localization via forensic neural networks
Published in IEEE access (01-01-2023)“…The detection and localization of malwares using spatial and temporal data patterns require the development of efficient deep learning models. These models…”
Get full text
Journal Article -
6
An Efficient Hybrid User Profile Based Web Search Personalization Through Semantic Crawler
Published in National Academy science letters (01-04-2019)“…The World Wide Web has a collection of trillions of web pages and these web pages are increasing day by day. Web pages available on the Web change frequently…”
Get full text
Journal Article -
7
Analysis of Web Application Code Vulnerabilities using Secure Coding Standards
Published in Arabian journal for science and engineering (2011) (01-02-2017)“…The evolution of modern web application involves a broad range of web technologies such as ActiveX, JavaScript and CGI. It mitigates the demand of bolt-on…”
Get full text
Journal Article -
8
Blockchain Security and Challenges: A Review
Published in 2023 IEEE 2nd International Conference on Industrial Electronics: Developments & Applications (ICIDeA) (29-09-2023)“…Blockchain technology has emerged as a ground-breaking innovation with the potential to revolutionize various industries and transform transactions. Its…”
Get full text
Conference Proceeding -
9
Transformer based multimodal similarity search method for E-Commerce platforms
Published in 2023 IEEE Guwahati Subsection Conference (GCON) (23-06-2023)“…Multimodal similarity search has been attracting much attention from scholars in recent times. The intensification of research into Multimodal search lies in…”
Get full text
Conference Proceeding -
10
Precision Agriculture: Crop Image Segmentation and Loss Evaluation through Drone Surveillance
Published in 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC) (26-05-2023)“…Agriculture is the most important source of livelihood. Crop segmentation has become an important role in precision agriculture which helps farmers to make…”
Get full text
Conference Proceeding -
11
A Threat modeling approach to analyze and mitigate WhatsApp attacks: A Review
Published in 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) (18-02-2023)“…One of the most popularly used features on smart-phones is WhatsApp. It is a free messaging app available for An-droid, IOS, and all other smartphones. A…”
Get full text
Conference Proceeding -
12
Smart Attendance System Using Biometric and GPS
Published in 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) (18-02-2023)“…Any academic institution must maintain an attendance system to teach discipline to students. It is also a factor to evaluate student performance in regularity…”
Get full text
Conference Proceeding -
13
Sentiment analysis: a review and comparative analysis over social media
Published in Journal of ambient intelligence and humanized computing (2020)“…Sentiment analysis is the computational examination of end user’s opinion, attitudes and emotions towards a particular topic or product. Sentiment analysis…”
Get full text
Journal Article -
14
Architecture, Enabling Technologies, Security and Privacy, and Applications of Internet of Things: A Survey
Published in 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on (01-08-2018)“…Internet of things plays an important role in communication technologies and that leads to produce critical issues in security, application and protocol. IOT…”
Get full text
Conference Proceeding -
15
Threats of price scraping on e-commerce websites: attack model and its detection using neural network
Published in Journal of Computer Virology and Hacking Techniques (01-03-2021)“…Scrapers are automated programs that mechanically traverse the website and steal the data from websites. According to numerous web traffic reports nearly fifty…”
Get full text
Journal Article -
16
Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models
Published in IEEE access (2024)Get full text
Journal Article -
17
A new web forensic framework for bot crime investigation
Published in Forensic science international. Digital investigation (Online) (01-06-2020)Get full text
Journal Article -
18
Secure the ownership of WoT devices using secure ownership transfer framework
Published in International journal of information technology (Singapore. Online) (01-04-2023)“…The primary concern behind ownership in Web of Things (WoT) is to provide rights to own devices to operate and access. When the ownership of Internet of Things…”
Get full text
Journal Article -
19
Investigation and Designing for Network Congestion Detection and Prevention in DTN
Published in 2021 13th International Conference on Computational Intelligence and Communication Networks (CICN) (22-09-2021)“…Nowadays higher demands of lightweight mobile devices for monitoring critical situation such as weather, tsunami, earth quick and rural area where direct…”
Get full text
Conference Proceeding -
20
Human Activity Recognition Using Deep Learning Techniques for Healthcare Applications
Published in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) (24-06-2024)“…The idea of smart healthcare is gradually gaining traction with the rapid advancement in information technologies. Smart healthcare is the intelligent…”
Get full text
Conference Proceeding