Search

Your search keyword '"Thapa, Chandra"' showing total 197 results

Search Constraints

Start Over You searched for: Author "Thapa, Chandra" Remove constraint Author: "Thapa, Chandra"
197 results on '"Thapa, Chandra"'

Search Results

1. ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation

2. Mitigation of Channel Tampering Attacks in Continuous-Variable Quantum Key Distribution

3. Entropy Causal Graphs for Multivariate Time Series Anomaly Detection

4. Radio Signal Classification by Adversarially Robust Quantum Machine Learning

5. Federated Split Learning with Only Positive Labels for resource-constrained IoT environment

6. ACE: A Consent-Embedded privacy-preserving search on genomic database

7. Discretization-based ensemble model for robust learning in IoT

8. Access-based Lightweight Physical Layer Authentication for the Internet of Things Devices

9. Vertical Federated Learning: Taxonomies, Threats, and Prospects

10. Discretization-Based Ensemble Model for Robust Learning in IoT

11. Enabling All In-Edge Deep Learning: A Literature Review

12. Transformer-Based Language Models for Software Vulnerability Detection

13. Graph Lifelong Learning: A Survey

14. Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance

16. FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

19. Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

20. Advancements of federated learning towards privacy preservation: from federated learning to split learning

21. Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

22. Evaluation of Federated Learning in Phishing Email Detection

23. SplitFed: When Federated Learning Meets Split Learning

24. End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things

25. Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?

32. Structural Characteristics of Two-Sender Index Coding

35. Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples

38. Graph-Theoretic Approaches to Two-Sender Index Coding

43. Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques

45. Generalized Interlinked Cycle Cover for Index Coding

46. A New Index Coding Scheme Exploiting Interlinked Cycles

Catalog

Books, media, physical & digital resources