displayNone
banner

Publications

Books Chapters

  • Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control Information Systems Security. ICISS 2017. Lecture Notes in Computer Science, vol 10717," Shyamasundar, R., Singh, V., Vaidya, J. (eds) Springer, Cham, 02 Dec. 2017. pp. 88–103 10.1007/978-3-319-72598-7_6
  • Can we predict useful comments in source codes? - Analysis of findings from Information Retrieval in Software Engineering Track @ FIRE 2022 10.1145/3574318.3574329
  • Phase Frequency Detector Using CNTFET 10.1007/978-981-19-4364-5_62
  • Overview of the HASOC Subtrack at FIRE 2022: Hate Speech and Offensive Content Identification in English and Indo-Aryan Languages 10.1145/3574318.3574326
  • A Study and Investigation of Structural Parameters of Vertically Aligned Carbon Nanotube Arrays as a Thermal Interface Material 10.1007/978-981-19-4364-5_16
  • Data Poisoning Attack by Label Flipping on SplitFed Learning 10.1007/978-3-031-23599-3_30
  • Analysis and Simulation of Various Parameters of Mixed CNT Bundle for Interconnect Applications 10.1007/978-981-19-4364-5_78
  • Targeted Clean-Label Poisoning Attacks on Federated Learning 10.1007/978-3-031-23599-3_17
  • Analysis of Graphene Field-Effect Transistor (GFET) as a Sensor 10.1007/978-981-19-4364-5_5
  • Application-Based Evaluation of Neural Network Architectures for Edge Devices 10.1201/9781003320333
Back to Top