Author of the publication

Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model.

, , , and . IPMV, page 86-92. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genetic IMM_NN Based Tracking of Multiple Point Targets in Infrared Image Sequence., , and . AACC, volume 3285 of Lecture Notes in Computer Science, page 17-25. Springer, (2004)Graph based K-nearest neighbor minutiae clustering for fingerprint recognition., and . ICNC, page 675-680. IEEE, (2014)Multiple single pixel dim target detection in infrared image sequence., , and . ISCAS (2), page 380-383. IEEE, (2003)Graph-based Resource Allocation for Disaster Management in IoT Environment., and . AWICT, page 12:1-12:6. ACM, (2017)Face identification under uncontrolled environment with LGFSV face representation technique., , and . Central Eur. J. Comput. Sci., 3 (3): 129-148 (2013)Voice conversion system using salient sub-bands and radial basis function., , , and . Neural Comput. Appl., 27 (8): 2615-2628 (2016)Data Association for Multiple Target Tracking: An Optimization Approach., , and . ICONIP, volume 3316 of Lecture Notes in Computer Science, page 187-192. Springer, (2004)Robust Neural-Network-Based Data Association and Multiple Model-Based Tracking of Multiple Point Targets., , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (3): 337-351 (2007)Voice conversion using General Regression Neural Network., , , and . Appl. Soft Comput., (2014)DoA-Based Event Localization Using Uniform Concentric Circular Array in the IoT Environment., and . Comput. J., 62 (10): 1403-1425 (2019)