Остановите войну!
for scientists:
default search action
Rajesh Kumar
- > Home > Persons > Rajesh Kumar
Publications
- 2024
- [j78]Kapil Joshi, Rajesh Kumar, Salil Bharany, Dilip Kumar Jang Bahadur Saini, Rajiv Kumar, Ashraf Osman Ibrahim, Abdelzahir Abdelmaboud, Wamda Nagmeldin, Mohammad Awad Medani:
Exploring the Connectivity Between Education 4.0 and Classroom 4.0: Technologies, Student Perspectives, and Engagement in the Digital Era. IEEE Access 12: 24179-24204 (2024) - 2023
- [j69]Akshara Pande, Sumeet Patiyal, Anjali Lathwal, Chakit Arora, Dilraj Kaur, Anjali Dhall, Gaurav Mishra, Harpreet Kaur, Neelam Sharma, Shipra Jain, Salman Sadullah Usmani, Piyush Agrawal, Rajesh Kumar, Vinod Kumar, Gajendra P. S. Raghava:
Pfeature: A Tool for Computing Wide Range of Protein Features and Building Prediction Models. J. Comput. Biol. 30(2): 204-222 (2023) - [c61]Rajesh Kumar, Can Isik, Chilukuri Krishna Mohan:
Dictionary Attack on IMU-based Gait Authentication. AISec@CCS 2023: 115-126 - [c60]Varun Khurana, Yaman Kumar, Nora Hollenstein, Rajesh Kumar, Balaji Krishnamurthy:
Synthesizing Human Gaze Feedback for Improved NLP Performance. EACL 2023: 1887-1900 - [c59]Pradeep Kumar Kushwaha, Vikas Kumar, Manish Saraswat, Pankaj Singh, Rajesh Kumar, Swati Vashisht:
Android Malware Detection and its Security. IC3I 2023: 700-704 - [i26]Varun Khurana, Yaman Kumar Singla, Nora Hollenstein, Rajesh Kumar, Balaji Krishnamurthy:
Synthesizing Human Gaze Feedback for Improved NLP Performance. CoRR abs/2302.05721 (2023) - [i24]Rajesh Kumar, Can Isik, Chilukuri K. Mohan:
Dictionary Attack on IMU-based Gait Authentication. CoRR abs/2309.11766 (2023) - 2022
- [j65]Neeraj K. Maurya, Prem Chandra Pandey, Subhadip Sarkar, Rajesh Kumar, Prashant K. Srivastava:
Spatio-Temporal Monitoring of Atmospheric Pollutants Using Earth Observation Sentinel 5P TROPOMI Data: Impact of Stubble Burning a Case Study. ISPRS Int. J. Geo Inf. 11(5): 301 (2022) - [j64]Manoj Kumar Srivastava, Rajesh Kumar, Ashish Khare:
Z-Test-Based Analysis for Validating the Effectiveness of NPTEL E-Learning Modules. Int. J. Inf. Commun. Technol. Hum. Dev. 14(1): 1-14 (2022) - [j57]Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah:
GANTouch: An Attack-Resilient Framework for Touch-Based Continuous Authentication System. IEEE Trans. Biom. Behav. Identity Sci. 4(4): 533-543 (2022) - [j56]Sandeep Kumar, Poonam Yadav, Manpreet Kaur, Rajesh Kumar:
A survey on IRS NOMA integrated communication networks. Telecommun. Syst. 80(2): 277-302 (2022) - [j55]Poonam Yadav, Sandeep Kumar, Rajesh Kumar:
A Review of Transmission Rate over Wireless Fading Channels: Classifications, Applications, and Challenges. Wirel. Pers. Commun. 122(2): 1709-1765 (2022) - [c44]Rajesh Kumar, Harishchander Anandaram, Kapil Joshi, Vivek Kumar, Jadeep Reshi, Rakesh Kumar Saini:
Internet of things (IoT) applications and Challenges: A Study. ICCCS 2022: 1-6 - [c43]Namrata Meharwal, Shagun Tyagi, Rajesh Kumar, Kapil Joshi, Neha Rastogi, Nadia Mahmood Hussien:
Blockchain in HRM:Application and Future Perspective. ICCCS 2022: 1-5 - [i18]Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah:
GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System. CoRR abs/2210.01594 (2022) - 2021
- [j53]Vivek Dhar Dwivedi, Aditya Arya, Pardeep Yadav, Rajesh Kumar, Vinod Kumar, Gajendra P. S. Raghava:
DenvInD: dengue virus inhibitors database for clinical and molecular research. Briefings Bioinform. 22(3) (2021) - [j52]Anjali Lathwal, Rajesh Kumar, Gajendra P. S. Raghava:
In-silico identification of subunit vaccine candidates against lung cancer-associated oncogenic viruses. Comput. Biol. Medicine 130: 104215 (2021) - [j49]Poonam Yadav, Sandeep Kumar, Rajesh Kumar:
A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges. Trans. Emerg. Telecommun. Technol. 32(9) (2021) - [c42]Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah:
Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks. IJCB 2021: 1-8 - [i14]Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah:
Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks. CoRR abs/2106.07867 (2021) - 2020
- [j36]Poonam Yadav, Rajesh Kumar, Sandeep Kumar:
Effective capacity analysis over generalized lognormal shadowed composite fading channels. Internet Technol. Lett. 3(5) (2020) - [c41]Vishaal Udandarao, Mohit Agrawal, Rajesh Kumar, Rajiv Ratn Shah:
On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment. BigMM 2020: 76-85 - [c40]Shivam Rustagi, Aakash Garg, Pranay Raj Anand, Rajesh Kumar, Yaman Kumar, Rajiv Ratn Shah:
Touchless Typing Using Head Movement-based Gestures. BigMM 2020: 112-119 - [i12]Shivam Rustagi, Aakash Garg, Pranay Raj Anand, Rajesh Kumar, Yaman Kumar, Rajiv Ratn Shah:
Touchless Typing using Head Movement-based Gestures. CoRR abs/2001.09134 (2020) - [i11]Vishaal Udandarao, Mohit Agrawal, Rajesh Kumar, Rajiv Ratn Shah:
On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment. CoRR abs/2006.09501 (2020) - [i10]Rajesh Kumar, Can Isik, Vir V. Phoha:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication. CoRR abs/2012.09950 (2020) - 2019
- [j35]Piyush Agrawal, Sumeet Patiyal, Rajesh Kumar, Vinod Kumar, Harinder Singh, Pawan Kumar Raghav, Gajendra P. S. Raghava:
ccPDB 2.0: an updated version of datasets created and compiled from Protein Data Bank. Database J. Biol. Databases Curation 2019: bay142 (2019) - [c36]Harjeet Singh, Rajendra Kumar Sharma, Rajesh Kumar, Karun Verma, Ravinder Kumar, Munish Kumar:
A Benchmark Dataset of Online Handwritten Gurmukhi Script Words and Numerals. CVIP (2) 2019: 457-466 - 2018
- [j32]Salman Sadullah Usmani, Rajesh Kumar, Vinod Kumar, Sandeep Singh, Gajendra P. S. Raghava:
AntiTbPdb: a knowledgebase of anti-tubercular peptides. Database J. Biol. Databases Curation 2018: bay025 (2018) - [c32]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous authentication using one-class classifiers and their fusion. ISBA 2018: 1-8 - [c31]Pallav Kumar Bera, Rajesh Kumar, Can Isik:
Identification of internal faults in indirect symmetrical phase shift transformers using ensemble learning. ISSPIT 2018: 1-6 - [i9]Pallav Kumar Bera, Rajesh Kumar, Can Isik:
Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning. CoRR abs/1811.04537 (2018) - 2017
- [c27]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous user authentication via unlabeled phone movement patterns. IJCB 2017: 177-184 - [c22]Pradeep Kumar Sharma, Shaswata Banerjee, Subhodeep Bose, Biswajit Jana, Omkar Goswami, Surya Sen, Pradipan Dey, Ankan Bhunia, Pritam Modak, Arindam Shyam, Rajdip Mitra, Aritra Chandra, Rajib Sarkar, Supratim Sengupta, Divy Raj, Rajesh Kumar, Shiva Ashish, Pritam Kumar Mondal, Kamalesh Sarkar, Naushad Ahmed, Sougata Banerjee:
Performance of vertical multi junction solar cell for long distance wireless power transfer using high intensity laser beam. UEMCON 2017: 553-559 - [i8]Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha:
Continuous User Authentication via Unlabeled Phone Movement Patterns. CoRR abs/1708.04399 (2017) - [i7]Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha:
Continuous Authentication Using One-class Classifiers and their Fusion. CoRR abs/1710.11075 (2017) - 2016
- [j25]Abdul Serwadda, Vir V. Phoha, Zibo Wang, Rajesh Kumar, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. ACM Trans. Inf. Syst. Secur. 18(4): 14:1-14:25 (2016) - [c21]Rajesh Kumar, Vir V. Phoha, Abdul Serwadda:
Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. BTAS 2016: 1-8 - [i6]Rajesh Kumar, Vir V. Phoha, Rahul Raina:
Authenticating users through their arm movement patterns. CoRR abs/1603.02211 (2016) - 2015
- [j18]Manoj Kumar, Arun Sharma, Rajesh Kumar:
An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach. Softw. Pract. Exp. 45(7): 949-971 (2015) - [c19]Rajesh Kumar, Vir V. Phoha, Anshumali Jain:
Treadmill attack on gait-based authentication systems. BTAS 2015: 1-7 - 2014
- [j17]Manoj Kumar, Arun Sharma, Rajesh Kumar:
Fuzzy entropy-based framework for multi-faceted test case classification and selection: an empirical study. IET Softw. 8(3): 103-112 (2014) - [j14]Rajesh Kumar, Sushil Kumar, Diksha Shukla, Ram Shringar Raw, Omprakash Kaiwartya:
Geometrical Localization Algorithm for Three Dimensional Wireless Sensor Networks. Wirel. Pers. Commun. 79(1): 249-264 (2014) - [c15]Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha:
Beware, Your Hands Reveal Your Secrets! CCS 2014: 904-917 - [c14]Abena Primo, Vir V. Phoha, Rajesh Kumar, Abdul Serwadda:
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements. CVPR Workshops 2014: 98-105 - [i4]Rajesh Kumar, Sushil Kumar, Diksha Shukla, Ram Shringar Raw:
Geometrical Localization Algorithm for 3-D Wireless Sensor Networks. CoRR abs/1407.0756 (2014) - 2013
- [j12]Vijay Kumar, Arun Sharma, Rajesh Kumar:
Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. Comput. Informatics 32(1): 203-224 (2013) - 2011
- [j9]Manoj Kumar, Arun Sharma, Rajesh Kumar:
Towards Multi-Faceted Test Cases Optimization. J. Softw. Eng. Appl. 4(9): 550-557 (2011) - 2009
- [c6]Anuj Sharma, Rajesh Kumar, R. K. Sharma:
Rearrangement of Recognized Strokes in Online Handwritten Gurmukhi Words Recognition. ICDAR 2009: 1241-1245
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-17 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint