Author of the publication

Automatic glomerulus extraction in whole slide images towards computer aided diagnosis.

, , , , , , , and . eScience, page 165-174. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic glomerulus extraction in whole slide images towards computer aided diagnosis., , , , , , , and . eScience, page 165-174. IEEE Computer Society, (2016)Unmasking of source identity, a step beyond in cyber forensic., and . SIN, page 157-164. ACM, (2017)Primordial Fingerprinting Techniques from the Perspective of Digital Forensic Requirements., and . ICCCNT, page 1-6. IEEE, (2018)A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment., and . Int. J. Comput. Sci. Eng., 26 (2): 118-128 (2023)A provably secure signcryption with proxy re-encryption for smart water grid network., and . Int. J. Secur. Networks, 17 (4): 231-239 (2022)DDoS attack detection and defence mechanism based on second-order exponential smoothing: Holt's model.. Int. J. Comput. Appl. Technol., 68 (4): 397-404 (2022)A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment., , , , , and . Emerging Trends in Cybersecurity Applications, Springer International Publishing, (2023)Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime., and . J. King Saud Univ. Comput. Inf. Sci., 34 (5): 2031-2044 (2022)FER to FFR: a deep-learning-based approach for robust fatigue detection., , and . Int. J. Comput. Appl. Technol., 72 (3): 203-211 (2023)Digital forensics evidence management based on proxy re-encryption.. Int. J. Comput. Appl. Technol., 68 (4): 405-413 (2022)