关注
Pratiksha Gautam
Pratiksha Gautam
在 mail.juit.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
An efficient method to factorize the RSA public key encryption
BR Ambedkar, A Gupta, P Gautam, SS Bedi
2011 International Conference on Communication Systems and Network …, 2011
512011
Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing
P Gautam, MD Ansari, SK Sharma
International Journal of Information Security and Privacy (IJISP) 13 (1), 59-69, 2019
452019
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
Smart Trends in Information Technology and Computer Communications: First …, 2016
282016
A novel software protection approach for code obfuscation to enhance software security
P Gautam, H Saini
International Journal of Mobile Computing and Multimedia Communications …, 2017
82017
Effect of machine learning techniques for efficient classification of EMG patterns in gait disorders
M Kumar, P Gautam, VB Semwal
International Journal of Electrical and Electronics Research 10 (2), 117-121, 2022
62022
Dimensionality reduction-based discriminatory classification of human activity recognition using machine learning
M Kumar, P Gautam, VB Semwal
Proceedings of Third International Conference on Computing, Communications …, 2022
52022
A review of computational model for bipedal robot walking using gait analysis
M Kumar, P Gautam, VB Semwal
2020 International Conference on Emerging Smart Computing and Informatics …, 2020
52020
Non-trivial software clone detection using program dependency graph
P Gautam, H Saini
International Journal of Open Source Software and Processes 8 (2), 1-24, 2017
32017
Mutation testing-based evaluation framework for evaluating software clone detection tools
P Gautam, H Saini
Reliability and Risk Assessment in Engineering: Proceedings of INCRS 2018, 21-35, 2020
22020
DDoS Detection and Prediction Techniques-A Survey
A Goyal, P Matta, P Gautam
2023 International Conference on Computational Intelligence and Sustainable …, 2023
12023
Intrusion Detection in Health Care System: A logistic Regression Approach
A Tuteja, P Matta, S Sharma, K Nandan, P Gautam
2022 5th International Conference on Contemporary Computing and Informatics …, 2022
12022
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
P Gautam, H Saini
International Journal of Information Security and Privacy (IJISP) 13 (1), 30-45, 2019
12019
Correlation and Performance Estimation of Clone Detection Tools
P Gautam, H Saini
International Journal of Open Source Software and Processes (IJOSSP) 9 (2 …, 2018
12018
Type-2 software cone detection using directed acyclic graph
P Gautam, H Saini
2017 Fourth International Conference on Image Information Processing (ICIIP …, 2017
12017
A hybrid approach for detection of Type-1 software clones
P Gautam, H Saini
2017 4th International Conference on Signal Processing, Computing and …, 2017
12017
LSTM Approach for Efficient Stock Market Prediction
S Kumar, U Aggarwal, P Gautam, A Tuteja, P Matta, S Maurya
2023 3rd International Conference on Intelligent Technologies (CONIT), 1-5, 2023
2023
An Introspective Approach to Fathom Human-Inspired Bipedal Walk Using Gait Analysis for the Matrix of Cyber-Physical System
M Kumar, P Gautam, VB Semwal
Artificial Intelligence in Cyber-Physical Systems, 213-223, 2023
2023
In Cloud Computing Detection of DDoS Attack Using AI-Based Ensembled Techniques
A Shrivastava, P Gautam
International Conference on Communications and Cyber Physical Engineering …, 2023
2023
Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones
P Gautam, H Saini
Jaypee University of Information Technology, Solan, HP, 2019
2019
A Survey in Recent Trends and Techniques in Image Segmentation
RK Sah, P Gautam, S Ahsan
系统目前无法执行此操作,请稍后再试。
文章 1–20