Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Agent-Based Intrusion Detection System for Local Area Networks.. Int. J. Commun. Networks Inf. Secur., (2010)A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks., , and . ICDCN, volume 4308 of Lecture Notes in Computer Science, page 139-144. Springer, (2006)Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism., , , , , , , and . CoRR, (2024)A Modified Word Saliency-Based Adversarial Attack on Text Classification Models., , and . CoRR, (2024)Generative AI-Based Text Generation Methods Using Pre-Trained GPT-2 Model., , , , , , , and . CoRR, (2024)Analysis and Forecasting of Financial Time Series Using CNN and LSTM-Based Deep Learning Models., , and . CoRR, (2020)A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach., and . OCIT, page 233-237. IEEE, (2022)Precise Stock Price Prediction for Optimized Portfolio Design Using an LSTM Model., , , and . OCIT, page 210-215. IEEE, (2021)Volatility Modeling of Stocks from Selected Sectors of the Indian Economy Using GARCH., , and . CoRR, (2021)A Comparative Study of Portfolio Optimization Methods for the Indian Stock Market., , , and . CoRR, (2023)