Author of the publication

Leveraging the Potency of CNN for Efficient Assessment of Visual Complexity of Images.

, , and . IPTA, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream., , , , and . J. Ambient Intell. Humaniz. Comput., 13 (4): 2177-2189 (2022)Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems., , , , , , and . IEEE Internet Things J., 8 (10): 8119-8132 (2021)Improved Sine-Tangent chaotic map with application in medical images encryption., , , , , , and . J. Inf. Secur. Appl., (2022)A Hadamard walk model and its application in identification of important edges in complex networks., , , , and . Comput. Commun., (2022)Emotion space modelling for social robots., , and . Eng. Appl. Artif. Intell., (2021)Leveraging the Potency of CNN for Efficient Assessment of Visual Complexity of Images., , and . IPTA, page 1-8. IEEE, (2019)Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers.. Entropy, 15 (8): 2874-2974 (2013)Chromatic framework for quantum movies and applications in creating montages., , , and . Frontiers Comput. Sci., 12 (4): 736-748 (2018)Securing QR Codes Using a Hybrid Pseudo Baker's Mapped Cellular Automation., and . CCIS, page 193-199. IEEE, (2022)Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network., , , , , , and . Secur. Commun. Networks, (2021)