Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 73 matches
- 2024
- Dharminder Chaudhary, Pradeep Kumar Dadsena, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees, Uddeshaya Kumar:
Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices. IEEE Access 12: 74572-74585 (2024) - T. R. Vijaya Lakshmi, Ch. Venkata Krishna Reddy, Padmavathi Kora, Swaraja Kuraparthi, Meenakshi Kollati, Ch. Usha Kumari, Pratap Reddy Lankireddy:
Classification of multi-spectral data with fine-tuning variants of representative models. Multim. Tools Appl. 83(8): 23465-23487 (2024) - Josué A. Ruiz, Paliath Narendran, Amir Masoumzadeh, Padmavathi Iyer:
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules. SACMAT 2024 - 2023
- B. Padmavathi, B. Muthukumar:
A deep recursively learning LSTM model to improve cyber security botnet attack intrusion detection. Int. J. Model. Simul. Sci. Comput. 14(2): 2341018:1-2341018:21 (2023) - B. Padmavathi, B. Muthukumar:
An efficient botnet detection approach based on feature learning and classification. J. Control. Decis. 10(1): 40-53 (2023) - M. Kalaivani, G. Padmavathi:
Panthera Leo Optimized Multilayer Feed Forward Learning-Based Intrusion Detection Model for Cloud. SN Comput. Sci. 4(6): 800 (2023) - Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek:
Towards Audit Requirements for AI-Based Systems in Mobility Applications. ICISSP 2023: 339-348 - Padmavathi Iyer, Amir Masoumzadeh:
Towards Automated Learning of Access Control Policies Enforced by Web Applications. SACMAT 2023: 163-168 - Madisetty Padmavathi:
DS at SemEval-2023 Task 10: Explaining Online Sexism using Transformer based Approach. SemEval@ACL 2023: 1102-1106 - Devi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider, Arndt von Twickel, Fabian Woitschek:
Towards Audit Requirements for AI-based Systems in Mobility Applications. CoRR abs/2302.13567 (2023) - 2022
- Padmavathi Iyer, Amirreza Masoumzadeh, Paliath Narendran:
On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models. Comput. Secur. 116: 102586 (2022) - B. Padmavathi, B. Muthukumar:
Pattern Analysis and Regressive Linear Measure for Botnet Detection. Comput. Syst. Sci. Eng. 43(1): 119-139 (2022) - Anmol Agnihotri, R. Padmavathi, Santanu Chatterjee, Vinod Kumar Mahor:
Privacy in content-centric networking against side channel attacks. Int. J. Secur. Networks 17(1): 13-27 (2022) - Vasim Babu M, C. N. S. Vinoth Kumar, S. Parthiban, U. Padmavathi, Md. Zia Ur Rahman:
AE-LEACH: An Incremental Clustering Approach for Reducing the Energy Consumption in WSN. Microprocess. Microsystems 93: 104602 (2022) - Thirumala Vijaya Lakshmi, Ch. Venkata Krishna Reddy, Padmavathi Kora, Swaraja Kuraparthi, Meenakshi Kollati:
Entropy based single image dehazing with refined transmission using holistic edges. Multim. Tools Appl. 81(14): 20229-20253 (2022) - K. Reddy Madhavi, Padmavathi Kora, L. Venkateswara Reddy, Janagaraj Avanija, K. L. S. Soujanya, Prabhakar Telagarapu:
Cardiac arrhythmia detection using dual-tree wavelet transform and convolutional neural network. Soft Comput. 26(7): 3561-3571 (2022) - V. Padmavathi, Nanjundan Magesh, Kandasamy Alagesan, Muhammad Ijaz Khan, Samia Elattar, Mamdooh Alwetaishi, Ahmed M. Galal:
Numerical Modeling and Symmetry Analysis of a Pine Wilt Disease Model Using the Mittag-Leffler Kernel. Symmetry 14(5): 1067 (2022) - Padmavathi Iyer, Amirreza Masoumzadeh:
Learning Relationship-Based Access Control Policies from Black-Box Systems. ACM Trans. Priv. Secur. 25(3): 22:1-22:36 (2022) - Padmavathi Iyer, Amirreza Masoumzadeh:
Effective Evaluation of Relationship-Based Access Control Policy Mining. SACMAT 2022: 127-138 - 2021
- Arangarajan Vinayagam, Veerapandiyan Veerasamy, Padmavathi Radhakrishnan, Maheswari Sepperumal, Kalaivani Ramaiyan:
An ensemble approach of classification model for detection and classification of power quality disturbances in PV integrated microgrid network. Appl. Soft Comput. 106: 107294 (2021) - Swaraja Kuraparthi, Meenakshi Kollati, Padmavathi Kora:
Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine. Biomed. Signal Process. Control. 68: 102688 (2021) - Yasasvy Tadepalli, Meenakshi Kollati, Swaraja Kuraparthi, Padmavathi Kora, Anil Kumar Budati, Lakshmi Kala Pampana:
Content-based image retrieval using Gaussian-Hermite moments and firefly and grey wolf optimization. CAAI Trans. Intell. Technol. 6(2): 135-146 (2021) - Sengathir Janakiraman, Deva Priya M., S. Siamala Devi, G. Sandhya, G. Nivedhitha, S. Padmavathi:
A Markov Process-based Opportunistic Trust Factor Estimation Mechanism for Efficient Cluster Head Selection and Extending the Lifetime of Wireless Sensor Networks. EAI Endorsed Trans. Energy Web 8(35): e5 (2021) - Swaraja Kuraparthi, Madhavi K. Reddy, C. N. Sujatha, Hima Bindu Valiveti, Lakshmi Chaitanya Duggineni, Meenakshi Kollati, Padmavathi Kora, V. Sravan:
Brain Tumor Classification of MRI Images Using Deep Convolutional Neural Network. Traitement du Signal 38(4): 1171-1179 (2021) - Yasasvy Tadepalli, Meenakshi Kollati, Swaraja Kuraparthi, Padmavathi Kora:
EfficientNet-B0 Based Monocular Dense-Depth Map Estimation. Traitement du Signal 38(5): 1485-1493 (2021) - Gaurav Varshney, R. Padmavathi Iyer, Pradeep K. Atrey, Manoj Misra:
Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering. COMSNETS 2021: 1-4 - D. Malarvizhi, S. Padmavathi:
Mobility-Aware Application Placement for Obstacle Detection in UAM Using Fog Computing. FICTA (2) 2021: 191-202 - Amirreza Masoumzadeh, Paliath Narendran, Padmavathi Iyer:
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. SACMAT 2021: 33-43 - 2020
- Swaraja Kuraparthi, Meenakshi Kollati, Padmavathi Kora:
An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed. Signal Process. Control. 55 (2020) - Padmavathi Kora, Ajith Abraham, Meenakshi Kollati:
Heart disease detection using hybrid of bacterial foraging and particle swarm optimization. Evol. Syst. 11(1): 15-28 (2020)
skipping 43 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-15 04:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint