Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Speech Emotion Recognition Using Neural Networks. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (1): 922-927 (December 2021)Artificial Intelligence in Breast Cancer: Imaging and Diagnosis. Central Asian Journal of Medical and Natural Science, 2 (6): 390-406 (December 2021)A Study of Deep Learning Applications. International Journal of Trend in Scientific Research and Development, 4 (4): 1450-1452 (June 2020)PerSeg : segmenting salient objects from bag of single image perturbations., , and . Multim. Tools Appl., 79 (3-4): 2473-2493 (2020)CORDIC-Based High-Speed VLSI Architecture of Transform Model Estimation for Real-Time Imaging., and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 215-226 (2021)A Memory Efficient, Multiplierless & Modular VLSI Architecture of 1D/2D Re-Configurable 9/7 & 5/3 DWT Filters Using Distributed Arithmetic., and . J. Circuits Syst. Comput., 29 (9): 2050151:1-2050151:29 (2020)Kernel Density Estimation based Factored Relevance Model for Multi-Contextual Point-of-Interest Recommendation., , , and . CoRR, (2020)CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs., , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 501-526 (2024)Mining Data Impressions From Deep Models as Substitute for the Unavailable Training Data., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (11): 8465-8481 (2022)Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples., , , and . IACR Cryptol. ePrint Arch., (2023)