displayNone
Banner

Publications

Books Chapters

  • Colin Boyd Computational Security Models in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila Springer, Berlin, Heidelberg pp. 53-94 ISBN: 9783662581452 doi: 10.1007/978-3-662-58146-9_2
  • Anshu Chittora and Hemant A. Patil Understanding infant cry analysis for pathology classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 1- 62. doi: 10.1515/9781501513138-001
  • Hardik B. Sailor and Hemant A. Patil Unsupervised auditory filterbank learning for infant cry classification in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 63- 92. doi: 10.1515/9781501513138-002
  • Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments in Acoustic Analysis of Pathologies: From Infancy to Young Adulthood, Amy Neustein and Hemant A. Patil, (eds), Boston, MA: De Gruyter pp. 198-212. doi: 10.1515/9781501513138-006
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion in Voice Technologies for Speech Reconstruction and Enhancement, Hemant A. Patil and Amy Neustein, (eds), Boston, MA: De Gruyter pp. 125-150. doi: 10.1515/9781501501265-006.
  • Hardik Gajera, Manik Lal Das and Viral Shah Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 ISBN: 9781785618994 doi: 10.1049/PBHE020E_ch16
  • Nidhi Desai and Manik Lal Das Privacy-Preserving Scheme Against Inference Attack in Social Networks in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 ISBN: 9789811533693 doi: 10.1007/978-981-15-3369-3_60
  • Pankaj Kumar and Mitalee Shingala Native monkey detection using deep convolution neural network in Advanced Machine Learning Technologies and Applications. AMLTA 2020, Advances in Intelligent Systems and Computing, vol 1141. Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore. ISBN: 9789811533839 doi: 10.1007/978-981-15-3383-9_34.
  • Alexander Tolstoy, Manik Lal Das, Natalia Miloslavskaya, Vladimir Budzko Blockchain Application for IoT Cybersecurity Management in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC ISBN: 9780429674457. doi: 10.1201/9780429674457-7
  • Harsh Kotta, Karan Pardasani, Megha Pandya and Ranendu Ghosh Optimization of loss functions for predictive soil mapping in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 ISBN: 9789811533839. doi: 10.1007/978-981-15-3383-9_9.
Back to Top