displayNone
Banner

Publications

Journal Article

  • Hemant A. Patil, Madhu R. Kamble Combination of Amplitude and Frequency Modulation Features for Presentation Attack Detection Journal of Signal Processing Systems vol. , no. , 15 Apr. 2020. 10.1007/s11265-020-01532-3
  • Ranjith Tharayil and Paramvir Singh, Saurabh Tiwari, Sheikh Umar Farooq An Experience Report on Second Workshop on Emerging Software Engineering Education ACM SIGSOFT Software Engineering Notes, vol. 45, no. 3 pp. 28-35 Jul. 2020. doi: 10.1145/3402127.3402139
  • Srimanta Mandal and A.N. Rajagopalan Local Proximity for Enhanced Visibility in Haze IEEE Transactions on Image Processing, vol. 29 pp. 2478-2491 2020. doi: 10.1109/TIP.2019.2957931
  • Gitam Shikkenawis and Suman K. Mitra Image denoising using 2D orthogonal locality preserving discriminant projection IET Image Processing, vol. 14, no. 3 pp. 552-560 Feb. 2020. doi: 10.1049/iet-ipr.2019.0436
  • Ankush Acharyya, Minati Deb, Subhas C.Nandya and Supantha Pandit Variations of largest rectangle recognition amidst a bichromatic point set Discrete Applied Mathematics, vol. 286 pp. 35-50 15 Nov. 2020. doi: 10.1016/j.dam.2019.05.012
  • Deepak K. Ghodgaonkar, Pankaj Chaudhary, Rajeev Jyoti and M. B. Mahajan,, Sanjeev Gupta Compact circularly polarized triband staired rectangular dielectric resonator antenna using single and dual sections WPD with phase shifter for navigation satellite applications Microwave and Optical Technology Letters, Microwave and Optical Technology Letters, pp. 2047-2058 24 Jan. 2020. doi: 10.1002/mop.32271
  • Hemant A. Patil, Nirmesh J. Shah A novel approach to remove outliers for parallel voice conversion Computer Speech & Language vol. 58, Nov. 2019, pp. 127-152. 10.1016/j.csl.2019.03.009
  • Hemant A. Patil, Maulik C. Madhavi Vocal Tract Length Normalization using a Gaussian Mixture Model Framework for Query-by-Example Spoke... Computer Speech & Language vol. 58, Nov. 2019, pp. 175-202. 10.1016/j.csl.2019.03.005.
  • Bubu Bhuyan, Manik Lal and Joshi, Subhas Chandra Sahana A provable secure key-escrow-free identity-based signature scheme without using secure channel at th... Sādhanā vol. 44, no. 6, Jun. 2019, pp. 1-9 . 10.1007/s12046-019-1117-x
  • Javier Lopez, Manik Lal, Sarita Agrawal Detection of Node Capture Attack in Wireless Sensor Networks IEEE Systems Journal vol. 13, no. 1, Mar. 2019, pp. 238-247, IEEE, 22 Aug. 2018. 10.1109/JSYST.2018.2863229
Back to Top