Search

Your search keyword '"Gautam, Srivastava"' showing total 124 results

Search Constraints

Start Over You searched for: Author "Gautam, Srivastava" Remove constraint Author: "Gautam, Srivastava" Topic computer.software_genre Remove constraint Topic: computer.software_genre
124 results on '"Gautam, Srivastava"'

Search Results

1. Privacy-Preserving Deep Reinforcement Learning in Vehicle Ad Hoc Networks

2. Robust Collaborative Filtering Recommendation With User-Item-Trust Records

3. Hybrid Group Anomaly Detection for Sequence Data: Application to Trajectory Data Analytics

4. Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations

5. An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things

6. Federated-Learning-Based Anomaly Detection for IoT Security Attacks

7. Reliable customer analysis using federated learning and exploring deep-attention edge intelligence

8. Efficient closed high-utility pattern fusion model in large-scale databases

9. Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings

10. Large-Scale High-Utility Sequential Pattern Analytics in Internet of Things

11. Uncertain-Driven Analytics of Sequence Data in IoCV Environments

12. Guest Editorial: Artificial Intelligence for Securing Industrial-Based Cyber-Physical Systems

13. The Efficient Mining of Skyline Patterns from a Volunteer Computing Network

14. A Pre-Large Weighted-Fusion System of Sensed High-Utility Patterns

15. PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities

16. Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

17. Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology

18. A secured distributed detection system based on IPFS and blockchain for industrial image and video data security

19. Self-attention-based conditional random fields latent variables model for sequence labeling

20. Efficient and reliable forensics using intelligent edge computing

21. Rec-CFSVD++: Implementing Recommendation System Using Collaborative Filtering and Singular Value Decomposition (SVD)++

22. Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security

23. Hiding sensitive information in eHealth datasets

24. LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme

25. A Response-Aware Traffic Offloading Scheme Using Regression Machine Learning for User-Centric Large-Scale Internet of Things

26. A survey on security and privacy of federated learning

27. Information Granulation-Based Community Detection for Social Networks

28. An Evolutionary Model to Mine High Expected Utility Patterns From Uncertain Databases

29. Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining

30. Mining of High-Utility Patterns in Big IoT-based Databases

31. FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts

32. Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability

34. Cyberbullying detection solutions based on deep learning architectures

35. Defensive Modeling of Fake News Through Online Social Networks

36. Image watermarking using soft computing techniques: A comprehensive survey

37. Suspicious activity detection using deep learning in secure assisted living IoT environments

38. An efficient algorithm for fuzzy frequent itemset mining

39. A Framework for Automatic Categorization of Social Data Into Medical Domains

40. Data storage security for the Internet of Things

41. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

42. Analysis of Dimensionality Reduction Techniques on Big Data

43. Hybrid genetic algorithm and a fuzzy logic classifier for heart disease diagnosis

44. Email Classification and Forensics Analysis using Machine Learning

45. Cybersecurity Education in Rural Indigenous Canada

46. A Machine Learning Driven Threat Intelligence System for Malicious URL Detection

47. Mobile Cloud Computing Framework for Securing Data

48. Deep-Attention Model to Analyze Reliable Customers via Federated Learning

49. Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-Based Optimization Algorithm

50. Fuzzy Explainable Attention-based Deep Active Learning on Mental-Health Data

Catalog

Books, media, physical & digital resources