Follow
Latesh Kumar K J
Latesh Kumar K J
Postdoctoral Fellow, School of Computing and Information Sciences, FIU, USA
Verified email at sit.ac.in
Title
Cited by
Cited by
Year
Satellite quantum communication protocol regardless of the weather
M Mastriani, SS Iyengar, L Kumar
Optical and Quantum Electronics 53 (4), 181, 2021
242021
Bidirectional teleportation for underwater quantum communications
M Mastriani, SS Iyengar, KJ Latesh Kumar
Quantum Information Processing 20 (1), 22, 2021
182021
Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage
L KJ
IEEE, 7, 2013
122013
Boundary-based fake face anomaly detection in videos using recurrent neural networks
Y Hariprasad, KJ Latesh Kumar, L Suraj, SS Iyengar
Proceedings of SAI Intelligent Systems Conference, 155-169, 2022
62022
Hybrid synchronous discrete distance time model for traffic signal optimization
SK Sahana, K Kumar
Computational Intelligence in Data Mining-Volume 1: Proceedings of the …, 2015
62015
Novel approach: Deduplication for backup systems using data block size
KJ Latesh Kumar, R Lawrance
Computational Intelligence in Data Mining-Volume 1: Proceedings of the …, 2015
52015
Analysis of five techniques for the internal representation of a digital image inside a quantum processor
SS Iyengar, LKJ Kumar, M Mastriani
arXiv preprint arXiv:2008.01081, 2020
32020
Recent trends in computer networks and distributed systems security
GM Pérez, SM Thampi, R Ko, L Shu
Proceedings of the Second International Conference on Security in Computer …, 2014
32014
Hardware routed quantum key distribution networks
A Singal, SS Iyengar, L Kumar, AM Madni
IET Quantum Communication 3 (2), 127-138, 2022
22022
Quantum Computing Environments
SS Iyengar, M Mastriani, KJL Kumar
Springer, 2022
22022
Analysis of five techniques for the internal representation of a digital image inside a quantum processor
M Mastriani, SS Iyengar, L Kumar
SN Computer Science 2 (6), 450, 2021
22021
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data
LK KJ, HU Leena
International Journal of Next-Generation Computing 11 (1), 2020
22020
Perception of paddy farmers about minimum support price in Karnataka.
S Sahana, K Kumar, R Patil, MC Vivek
12021
Securing Storage Appliances via UNIX based Kerberos Authentication
L KJ
International Journal of Computer Applications (0975 – 8887) 65 (1), 4, 2013
12013
Novel Approach: Clustered Cache Parallel NFS and Implementing Across Wide Area Network: Disaster Recovery Centers
LKKJR Lawrance
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC, 0
1
AI-ML Analytics: A Comprehensive Investigation on Sentimental Analysis for Social Media Forensics Textual Data
Y Hariprasad, S Lokesh, NT Sharathkumar, LK KJ, C Miller, ...
Science and Information Conference, 923-935, 2023
2023
Resource Specific Security Implementation in Network and Cloud System.
LK KJ, HU Leena
International Journal of Next-Generation Computing 12 (4), 2021
2021
Analysis of five techniques for the internal representation of a digital image inside a quantum processor
S Sitharama Iyengar, LKJ Kumar, M Mastriani
arXiv e-prints, arXiv: 2008.01081, 2020
2020
Bidirectional teleportation for underwater quantum communications
SS Iyengar, KJ Kumar, M Mastriani
arXiv preprint arXiv:2009.04241, 2020
2020
Bidirectional teleportation for underwater quantum communications
S Sitharama Iyengar, KJ Latesh Kumar, M Mastriani
arXiv e-prints, arXiv: 2009.04241, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20