displayNone
banner

Publications

Books Chapters

  • Kirtana Sunil Phatnani and Hemant A. Patil Role of Music on Infant Developments Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 198-212. [in press]
  • Nirmesh J. Shah and Hemant A. Patil Non-audible murmur to audible speech conversion Voice Technologies for Speech Reconstruction and Enhancement Hemant A. Patil and Amy Neustein, Eds. Boston, MA: De Gruyter, 2020, pp. 125-150.
  • Girish Kumar Mekala, Yash Agrawal, Rajeevan Chandel and Ashwani Kumar Performance Analysis of Mixed-Wall CNT Interconnects Using Colliding Bodies Optimization Technique Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) Balwinder Raj, Mamta Khosla and Amandeep Singh, Eds. USA: IGI Global, Jan. 2020, pp. 189-211, doi: 10.4018/978-1-7998-1393-4.ch009
  • Native monkey detection using deep convolution neural network in Advanced Machine Learning Technologies and Applications. AMLTA 2020, Advances in Intelligent Systems and Computing, vol 1141. Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore. doi: 10.1007/978-981-15-3383-9_34.
  • Optimization of loss functions for predictive soil mapping in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 doi: 10.1007/978-981-15-3383-9_9.
  • Preface in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix
  • Blockchain-powered healthcare insurance system in 'Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions' (Healthcare Technologies, 2019), Tanwar, Sudeep; Tyagi, Sudhanshu; Kumar, Neeraj (eds), IET Digital Library, pp. 369-387 doi: 10.1049/PBHE020E_ch16
  • Introduction to Authentication and Key Establishment in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1
  • Privacy-Preserving Scheme Against Inference Attack in Social Networks in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 doi: 10.1007/978-981-15-3369-3_60
  • Protocols Using Shared Key Cryptography in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 95-134 doi: 10.1007/978-3-662-58146-9_3
Back to Top