Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Copyright Protection Scheme Using Visual Cryptography., , , , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 612-619. Springer, (2011)NITP-AI-NLP@Dravidian-CodeMix-FIRE2020: A Hybrid CNN and Bi-LSTM Network for Sentiment Analysis of Dravidian Code-Mixed Social Media Posts., , and . FIRE (Working Notes), volume 2826 of CEUR Workshop Proceedings, page 582-590. CEUR-WS.org, (2020)Deep Learning based Abstractive Summarization for English Language., , and . FIRE (Working Notes), volume 3395 of CEUR Workshop Proceedings, page 383-392. CEUR-WS.org, (2022)Android Malware Detection Using Machine Learning Techniques., and . CSCI, page 1117-1121. IEEE, (2022)Early prediction of promising expert users on community question answering sites., and . Int. J. Syst. Assur. Eng. Manag., 15 (7): 2902-2913 (July 2024)AI_ML_NIT_Patna @ TRAC - 2: Deep Learning Approach for Multi-lingual Aggression Identification., and . TRAC@LREC, page 113-119. European Language Resources Association (ELRA), (2020)A Huffman Code Based Image Steganography Technique., , , , and . ICAA, volume 8321 of Lecture Notes in Computer Science, page 257-265. Springer, (2014)Bilingual Cyber-aggression detection on social media using LSTM autoencoder., , , and . Soft Comput., 25 (14): 8999-9012 (2021)A Comprehensive Survey of Deep Learning Techniques in Protein Function Prediction., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 20 (3): 2291-2301 (2023)COVID-19 and cyberbullying: deep ensemble model to identify cyberbullying from code-switched languages during the pandemic., , and . Multim. Tools Appl., 82 (6): 8773-8789 (March 2023)