displayNone
Banner

Publications

Journal Article

  • Hardik B. Sailor, Hemant A. Patil, Madhu R. Kamble Advances in anti-spoofing: From the perspective of ASVspoof challenges APSIPA Transactions on Signal and Information Processing vol. 9, no. E2, 15 Jan. 2020, pp. 1-18. 10.1017/ATSIP.2019.21
  • Amit Kumar Dhar, Raghunath Reddy Madireddy, Supantha Pandit and Jagpreet Singh Maximum independent and disjoint coverage Journal of Combinatorial Optimization, vol. 39, no. 4 pp. 1017-1037 May 2020. doi: 10.1007/s10878-020-00536-w
  • Hemant A. Patil, Madhu R. Kamble Combination of Amplitude and Frequency Modulation Features for Presentation Attack Detection Journal of Signal Processing Systems vol. , no. , 15 Apr. 2020. 10.1007/s11265-020-01532-3
  • T, Tushar Gadhiya and Anil K. Roy Superpixel-Driven Optimized Wishart Network for Fast PolSAR Image Classification Using Global k-Means Algorithm IEEE Transactions on Geoscience and Remote Sensing, vol. 58, no. 1 pp. 97-109 Jan. 2020. doi: 10.1109/TGRS.2019.2933483
  • Satyabrata Jana and Supantha Pandit Covering and packing of rectilinear subdivision Theoretical Computer Science, vol. 840 pp. 166-176 6 Nov. 2020. doi: 10.1016/j.tcs.2020.07.038
  • M V Joshi, Manish Khare and Ashish Khare Tracking of multiple human objects using a Combination of Daubechies complex wavelet transform and Zernike moment ICTACT Journal on Image and Video Processing, ICTACT vol. 11, no. 1 pp. 2251-2260 Aug. 2020 doi:10.21917/ijivp.2020.0320
  • Sumukh Bansal Affine interpolation in a lie group framework ACM Transactions on Graphics vol. 28, no. 4, article 71, July 2019, pp. 1-16. 10.1145/3306346.3322997
  • Aditya Tatu, Nileshkumar Vaishnav Signal processing on graphs: structure preserving maps IET Signal Processing vol. 13, no. 1, Feb. 2019, pp. 77-85. 10.1049/iet-spr.2018.5147
  • Amishal Modi Self-Conscious Pleasure-Seeking: Equality Arun Kolatkar’s Poetry International Journal of Research and Analytical Reviews (IJRAR) vol. 6, no. 1, Jan-Mar. 2019.
  • Anish Mathuria, Naveen Kumar Comprehensive evaluation of key management hierarchies for outsourced data Cybersecurity vol. 2, no. 2, Dec. 2019, pp. 1-17, Springer. 10.1186/s42400-019-0026-y |
Back to Top