Altered Fingerprint Identification and Classification Using SP Detection and Fuzzy Classification R Kumar, JP Singh, G Srivastava Proceedings of the Second International Conference on Soft Computing for …, 2014 | 42 | 2014 |
A network intrusion detection approach using variant of convolution neural network AK Verma, P Kaushik, G Shrivastava 2019 International Conference on Communication and Electronics Systems …, 2019 | 26 | 2019 |
A novel technique for data hiding in audio carrier by using sample comparison in DWT domain SS Verma, R Gupta, G Shrivastava 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 14 | 2014 |
A hybrid artificial immune system for IDS based on SVM and belief function S Singh, JP Singh, G Shrivastva 2013 Fourth International Conference on Computing, Communications and …, 2013 | 8 | 2013 |
Enhancement over the variant of public key cryptography algorithm M Jhalani, P Singh, G Shrivastava International journal of emerging technology and advanced engineering 2 (12), 2012 | 7 | 2012 |
An approach of human identification based on gait P Gangotia, G Shrivastava, JP Singh International Journal of Computer Applications 93 (1), 2014 | 6 | 2014 |
A hybrid method for image denoising based on wavelet thresholding and RBF network S Dubey, F Hasan, G Shrivastava International Journal of Advanced computer Research 2 (2), 167, 2012 | 6 | 2012 |
An efficient focused crawler using LSTM‑CNN based deep learning PK Gourav Kumar Shrivastava, Rajesh Kumar Pateriya Int J Syst Assur Eng Manag, 2022 | 5* | 2022 |
Cryptography: Recent research trends of encrypting mathematics RJ Kikani, K Verma, R Navalakhe, G Shrivastava, V Shrivastava Materials Today: Proceedings 56, 3247-3253, 2022 | 5 | 2022 |
Implementation and performance comparison of improved route maintenance strategy in AODV for quick route healing A Shastri, G Shrivastava 2013 International Conference on Communication Systems and Network …, 2013 | 5 | 2013 |
Improved ID-based proxy re-signcryption scheme SS Rawat, GK Shrivastava 2012 Fourth International Conference on Computational Intelligence and …, 2012 | 5 | 2012 |
Image classification using SOM and SVM feature extraction P Shrivastava, P Singh, G Shrivastava Int J Comput Sci Inf Technol 5 (1), 264-71, 2014 | 4 | 2014 |
SQL Injection Prevention Using Tokenization: Technique and Prevention Mechanism G Shrivastava, K Pathak International Journal 3 (6), 2013 | 3 | 2013 |
Load balancing strategies in software defined networks RKP Gourav Shrivastava, Praveen Kaushik International Journal of Engineering & Technology 7 (3), 1854-1857, 2018 | 2 | 2018 |
A review: AIS based intrusion detection system S Singh, JP Singh, G Shrivastva Int. J. Inf. Technol. 20 (1), 2014 | 2 | 2014 |
A EFFECTIVE CONTENT BASED IMAGE RETRIEVAL SYSTEM BASED ON FEATURES AND TECHNIQUES MRMRRG MR, G SHRIVASTAVA International Journal of Advanced Research in Computer Engineering …, 2013 | 2 | 2013 |
Multi-relational Bayesian Classification through Genetic Approach NK Choudhary, G Shrivastava, M Malviya International Journal of Advanced Research in Computer and Communication …, 2012 | 2 | 2012 |
Comprehensive Analysis of Edge Computing towards Adaptive Streaming for Enhanced QoS G Mehta, G Shrivastava 2022 IEEE International Conference on Current Development in Engineering and …, 2022 | 1 | 2022 |
LabelScr: Automated Image Annotation on Mobile and Web Applications for Object Detection and Localization Model Pipelines C Jha, G Shrivastava 2022 IEEE International Conference on Current Development in Engineering and …, 2022 | 1 | 2022 |
A Spam Filtering Technique using SVM Light Tool AR Ashok, G Shrivastav | 1 | 2014 |