Privacy-Preserving Scheme Against Inference Attack in Social Networks
in Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019). Lecture Notes in Networks and Systems, vol 121.,Singh P., Paw?owski W., Tanwar S., Kumar N., Rodrigues J., Obaidat M. (eds), Springer, Singapore pp. 819-830 doi: 10.1007/978-981-15-3369-3_60
Native monkey detection using deep convolution neural network
in Advanced Machine Learning Technologies and Applications. AMLTA 2020, Advances in Intelligent Systems and Computing, vol 1141. Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore. doi: 10.1007/978-981-15-3383-9_34.
Blockchain Application for IoT Cybersecurity Management
in Essentials of Blockchain Technology, ByKuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Boca Raton, Chapman and Hall/CRC doi: 10.1201/9780429674457-7
Optimization of loss functions for predictive soil mapping
in Advanced Machine Learning Technologies and Applications. AMLTA 2020 Advances in Intelligent Systems and Computing, vol 1141., Hassanien, A., Bhatnagar, R., Darwish, A. (eds), Springer, Singapore pp. 95-104 doi: 10.1007/978-981-15-3383-9_9.
Variational Inequalities in Semi-inner Product Spaces Optimization and Its Applications vol 159
in Computational Mathematics and Variational Analysis, Daras N., Rassias T., (eds), Cham: Springer, pp. 421-439.
Modeling the Dynamics of Carbon Dioxide Over an Educational Institute
in ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 93., Fong S., Dey N., Joshi A. (eds), Springer, Singapore. pp. 65-75 doi: 10.1007/978-981-15-0630-7_7
Anshu Chittora and Hemant A. Patil Infant cry analysis and its classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 1- 61.
Preface
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, pp. vii-ix
Hardik B. Sailor and Hemant A. Patil Unsupervised Auditory Filterbank Learning for Infant Cry Classification
Acoustic Analysis of Pathologies: From Infancy to Young Adulthood Amy Neustein and Hemant A. Patil, Eds. Boston, MA: De Gruyter, 2020, pp. 63- 92. [in press]
Introduction to Authentication and Key Establishment
in Protocols for Authentication and Key Establishment. Information Security and Cryptography., Colin Boyd, Anish Mathuria, Douglas Stebila, Springer, Berlin, Heidelberg pp. 1-52 doi: 10.1007/978-3-662-58146-9_1