Kaushik, Keshav
60  Ergebnisse:
Personensuche X
?
1

Braille Recognition of Geez Numbers Using an Optimal Deep L..:

, In: 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT),
 
?
2

Heart Disease Detection Model Using Support Vector Machine ..:

, In: 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT),
 
?
3

Ethical Considerations in AI-Based Cybersecurity:

, In: Blockchain Technologies; Next-Generation Cybersecurity,
Kaushik, Keshav ; Khan, Aadil ; Kumari, Ankita.. - p. 437-470 , 2024
 
?
4

Evaluation of Random Forest and Support Vector Machine Mode..:

, In: 2024 2nd International Conference on Advancement in Computation & Computer Technologies (InCACCT),
 
?
5

Machine Learning-Based Detection of API Security Attacks:

, In: Data Science and Applications; Lecture Notes in Networks and Systems,
Sharma, Ishu ; Kaur, Arshnoor ; Kaushik, Keshav. - p. 285-297 , 2024
 
?
6

MaOC: Model-Assisted Optimal Control for Ductless-Split Coo..:

, In: 2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS),
Kaushik, Keshav ; Naik, Vinayak - p. 790-797 , 2024
 
?
7

Design and Implementation of an Energy Saving Electric Stov..:

, In: 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
 
?
8

Security & Privacy Issues in IoT Using Blockchain and ML:

, In: 2023 Seventh International Conference on Image Information Processing (ICIIP),
Muhammad, Muna ; Sajid, Ahthasham ; Chhabra, Gunjan... - p. 733-740 , 2023
 
?
9

A Real-Time Non-Invasive Anomaly Detection Technique for Co..:

, In: Energy Informatics; Lecture Notes in Computer Science,
Kaushik, Keshav ; Naik, Vinayak - p. 135-151 , 2023
 
?
10

Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposa..:

, In: 2023 6th International Conference on Contemporary Computing and Informatics (IC3I),
 
?
11

HTML Smuggling: Attack and Mitigation:

, In: 2023 16th International Conference on Security of Information and Networks (SIN),
 
?
12

A Dynamic Scheduling Technique to Optimize Energy Consumpti..:

, In: 2023 International Conference on Information Networking (ICOIN),
 
?
13

Optimizing Real- Time Threat Detection with Feature Enginee..:

, In: 2023 6th International Conference on Contemporary Computing and Informatics (IC3I),
Verma, Jyoti ; Sethi, Monika ; Snehi, Manish.. - p. 416-421 , 2023
 
?
14

IoT-Assisted Solutions for Monitoring Cancer Patients:

, In: Lecture Notes in Electrical Engineering; Computational Intelligence for Engineering and Management Applications,
Tanwar, Rohit ; Kaushik, Keshav - p. 403-418 , 2023
 
?
15

Investigating Patterns of UAV Attacks for Building Secure U..:

, In: 2023 6th International Conference on Contemporary Computing and Informatics (IC3I),
Sharma, Ishu ; Kaushik, Keshav ; Chhabra, Gunjan - p. 136-141 , 2023
 
1-15