A hybrid system for reducing the false alarm rate of anomaly intrusion detection system H Om, A Kundu 2012 1st international conference on recent advances in information …, 2012 | 163 | 2012 |
An improved image denoising method based on wavelet thresholding H Om, M Biswas Scientific Research Publishing, 2012 | 143 | 2012 |
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines S Kumari, H Om Computer Networks 104, 137-154, 2016 | 106 | 2016 |
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC P Chandrakar, H Om Computer Communications 110, 26-34, 2017 | 91 | 2017 |
Distributed fuzzy approach to unequal clustering and routing algorithm for wireless sensor networks N Mazumdar, H Om International journal of Communication systems 31 (12), e3709, 2018 | 85 | 2018 |
MCRMR: Maximum coverage and relevancy with minimal redundancy based multi-document summarization P Verma, H Om Expert Systems with Applications 120, 43-56, 2019 | 75 | 2019 |
Computational neural network regression model for Host based Intrusion Detection System SK Gautam, H Om Perspectives in Science 8, 93-95, 2016 | 68 | 2016 |
A comparative analysis on Hindi and English extractive text summarization P Verma, S Pal, H Om ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019 | 59 | 2019 |
Cloud computing and internet of things integration: Architecture, applications, issues, and challenges A Malik, H Om Sustainable cloud and energy services: Principles and practice, 1-24, 2018 | 57 | 2018 |
Newborn face recognition using deep convolutional neural network R Singh, H Om Multimedia Tools and Applications 76 (18), 19005-19015, 2017 | 52 | 2017 |
Efficient quantum secret sharing without a trusted player K Sutradhar, H Om Quantum Information Processing 19 (2), 73, 2020 | 51 | 2020 |
Data mining models for predicting oral cancer survivability N Sharma, H Om Network Modeling Analysis in Health Informatics and Bioinformatics 2, 285-295, 2013 | 48 | 2013 |
A generalized quantum protocol for secure multiparty summation K Sutradhar, H Om IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 2978-2982, 2020 | 44 | 2020 |
DUCR: Distributed unequal cluster‐based routing algorithm for heterogeneous wireless sensor networks N Mazumdar, H Om International Journal of Communication Systems 30 (18), e3374, 2017 | 44 | 2017 |
A secure authentication scheme for RFID systems P Dass, H Om Procedia Computer Science 78, 100-106, 2016 | 44 | 2016 |
Detection of copy-move forgery using AKAZE and SIFT keypoint extraction CS Prakash, PP Panzade, H Om, S Maheshkar Multimedia Tools and Applications 78, 23535-23558, 2019 | 43 | 2019 |
Usage of probabilistic and general regression neural network for early detection and prevention of oral cancer N Sharma, H Om The Scientific World Journal 2015 (1), 234191, 2015 | 42 | 2015 |
Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition G Agarwal, H Om Multimedia Tools and Applications 80 (7), 9961-9992, 2021 | 41 | 2021 |
Distributed fuzzy logic based energy‐aware and coverage preserving unequal clustering algorithm for wireless sensor networks N Mazumdar, H Om International Journal of Communication Systems 30 (13), e3283, 2017 | 40 | 2017 |
A Generalized Image Denoising Method Using Neighbouring Wavelet Coefficients HOM Biswas Signal Image and Video Processing 7 (2), 2013 | 40* | 2013 |