Document clustering using nonnegative matrix factorization F Shahnaz, MW Berry, VP Pauca, RJ Plemmons Information Processing & Management 42 (2), 373-386, 2006 | 827 | 2006 |
Robust real-time face detection V Paul IJCV 57 (2), 137-154, 2004 | 328 | 2004 |
Content based image retrieval using deep learning process RR Saritha, V Paul, PG Kumar Cluster Computing 22 (Suppl 2), 4187-4200, 2019 | 206 | 2019 |
An imperceptible spatial domain color image watermarking scheme J Abraham, V Paul Journal of King Saud University-Computer and Information Sciences 31 (1 …, 2019 | 197 | 2019 |
A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices S Rajesh, V Paul, VG Menon, MR Khosravi Symmetry 11 (2), 293, 2019 | 180 | 2019 |
A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment U Narayanan, V Paul, S Joseph Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 67 | 2022 |
A survey on various supervised classification algorithms U Narayanan, A Unnikrishnan, V Paul, S Joseph 2017 International Conference on Energy, Communication, Data Analytics and …, 2017 | 52 | 2017 |
A novel approach to fabric defect detection using digital image processing S Priya, TA Kumar, V Paul 2011 International Conference on Signal Processing, Communication, Computing …, 2011 | 42 | 2011 |
Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients S Rajesh, V Paul, VG Menon, S Jacob, P Vinod IEEE Internet of Things Journal 7 (4), 2531-2538, 2019 | 30 | 2019 |
The e-Government interoperability through Enterprise Architecture in Indian perspective A Paul, V Paul 2012 World Congress on Information and Communication Technologies, 645-650, 2012 | 29 | 2012 |
A method for text steganography using malayalam text PM Vidhya, V Paul Procedia Computer Science 46, 524-531, 2015 | 27 | 2015 |
Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec U Narayanan, V Paul, S Joseph Journal of Ambient Intelligence and Humanized Computing 13 (2), 769-787, 2022 | 26 | 2022 |
Role of gateways in MANET integration scenarios G Jisha, P Samuel, V Paul Indian Journal of Science and Technology, 2016 | 19 | 2016 |
Recursive backtracking for solving 9* 9 Sudoku puzzle D Job, V Paul Bonfring International Journal of Data Mining 6 (1), 7-9, 2016 | 18 | 2016 |
Stress management among adolescents D K Damodaran, V Paul Damodaran, DK, & Paul, VK (2015). Stress management among adolescents. The …, 2015 | 18 | 2015 |
A Framework for e-government interoperability in Indian perspective A Paul, V Paul International Journal of Computer Information Systems and Industrial …, 2014 | 18 | 2014 |
A Hybrid Crypto System based on a new Circle-Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications PS Rasmi, V Paul International Conference on VLSI, Communication & Instrumentation. Kerala 9 …, 2011 | 17 | 2011 |
A fast and secure encryption algorithm for message communication AJ Paul, V Paul, P Mythili 2007 IET-UK International Conference on Information and Communication …, 2007 | 17 | 2007 |
Towards detecting flooding DDOS attacks over software defined networks using machine learning techniques AS Jose, LR Nair, V Paul Revista Geintec-Gestao Inovacao E Tecnologias 11 (4), 3837-3865, 2021 | 16 | 2021 |
Image watermarking using DCT in selected pixel regions J Abraham, V Paul 2014 International Conference on Control, Instrumentation, Communication and …, 2014 | 16 | 2014 |