Anand Gupta
Anand Gupta
Netaji Subhas University of Technology, Delhi
Verified email at nsitonline.in
TitleCited byYear
sequenced tagged Captcha: generation and its analysis
A Gupta, A Jain, A Raj, A Jain
Advance Computing Conference, 2009. IACC 2009. IEEE International, 1286-1291, 2009
232009
Text Summarization through Entailment-based Minimum Vertex Cover
A Gupta, M Kaur, A Singh, A Goyal, S Mirkin
3rd Joint Conference on Lexical and Computational Semantics (SEM 2014), 75–80, 2014
182014
A pattern matching classifier for offline signature verification
A Bansal, D Garg, A Gupta
Emerging Trends in Engineering and Technology, 2008. ICETET'08. First …, 2008
142008
DGW-canny: An improvised version of Canny edge detector
A Gupta, RK Dalal, R Gupta, P Wadhwa
Intelligent Signal Processing and Communications Systems (ISPACS), 2011 …, 2011
122011
DTC: A framework to Detect Traffic Congestion by mining versatile GPS data
A Gupta, S Choudhary, S Paul
Emerging Trends and Applications in Computer Science (ICETACS), 2013 1st …, 2013
92013
Mining Regular Patterns in Weighted-Directed Networks
A Gupta, HK Thakur, P Kishore
13th International conference on Information Technology (ICIT 14), 215-220, 2014
82014
A Novel Method to Determine Regular Pattern in Edge Labelled Dynamic Graph
A Gupta, HK Thakur
Proceedings of 7th IEEE International Conferenceon Data mining and …, 2013
72013
A Big Data Analysis Framework Using Apache Spark and Deep Learning
A Gupta, HK Thakur, R Shrivastava, P Kumar, S Nag
Data Mining Workshops (ICDMW), 2017 IEEE International Conference on, 9-16, 2017
62017
Mining and Analysis of Periodic Patterns in Weighted Directed Dynamic Network
A Gupta, HK Thakur, A Garg, D Garg
International Journal of Service Science, Management, Engineering, and …, 2016
62016
Luring: A framework to induce a suspected user into Context Honeypot
SK Gupta, RGS Damor, A Gupta, V Goyal
Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second …, 2007
62007
Malafide intension based detection of privacy violation in information system
SK Gupta, V Goyal, A Gupta
Information Systems Security, 365-368, 2006
62006
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading
V Goyal, SK Gupta, A Gupta
Database Engineering and Applications Symposium, 2006. IDEAS'06. 10th …, 2006
62006
Malafide intension based detection of privacy violation in information system
SK Gupta, V Goyal, A Gupta
Information Systems Security, 365-368, 2006
62006
Analog Textual Entailment and Spectral Clustering (ATESC) Based Summarization
A Gupta, M Kathuria, A Singh, A Sachdeva, S Bhati
Big Data Analytics, 101-110, 2012
52012
Identification of Image Spam by Using Low Level & Metadata Features
A Gupta, S Aggarwal, C Singhal
International Journal of Network Security & Its Applications 4 (2), 2012
42012
Opaqueness characteristic of a context honeypot system
A Gupta, SK Gupta, IM Ganesh, P Gupta, V Goyal, S Sabharwal
Information Security Journal: A Global Perspective 19 (3), 142-152, 2010
42010
Context honeypot: A framework for anticipatory privacy violation
SK Gupta, A Gupta, R Damor, V Goyal, S Sabharwal
Emerging Trends in Engineering and Technology, 2008. ICETET'08. First …, 2008
42008
IDENTIFICATION OF IMAGE SPAM BY USING LOW LEVEL & METADATA
A Gupta, C Singhal, S Aggarwal
4*
Rumor Detection on Twitter Using a Supervised Machine Learning Framework
HK Thakur, A Gupta, A Bhardwaj, D Verma
International Journal of Information Retrieval Research (IJIRR) 8 (3), 1-13, 2018
32018
Method and system for summarizing a document
A Gupta, M Kaur, S Mirkin
US Patent App. 14/680,096, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20