Jana, Sharmistha
30  Ergebnisse:
Personensuche X
?
1

Face Mask Detection Exploiting CNN and MobileNetV2:

, In: Proceedings of International Conference on Network Security and Blockchain Technology; Lecture Notes in Networks and Systems,
 
?
2

Secured Reversible Data Hiding Scheme with NMI Interpolatio..:

, In: Proceedings of International Conference on Network Security and Blockchain Technology; Lecture Notes in Networks and Systems,
 
?
3

Secured Information Communication Exploiting Fuzzy Weight S..:

, In: Proceedings of International Conference on Network Security and Blockchain Technology; Lecture Notes in Networks and Systems,
Haldar, Alok ; Jana, Biswapati ; Jana, Sharmistha.. - p. 95-110 , 2023
 
?
4

Secured Covert Communication Through Blockchain Technology:

, In: Proceedings of International Conference on Network Security and Blockchain Technology; Lecture Notes in Networks and Systems,
Jana, Sharmistha ; Dutta, Saraswati ; Roy, Shovan... - p. 425-437 , 2023
 
?
5

Single Image Fog Removal Using WLS Smoothing Filter Combini..:

, In: Computational Intelligence in Pattern Recognition; Lecture Notes in Networks and Systems,
 
?
6

Voronoi Diagrams Based Digital Tattoo for Multimedia Data P..:

, In: Communications in Computer and Information Science; Advanced Network Technologies and Intelligent Computing,
 
?
7

Reversible data hiding scheme exploiting center folding wit..:

Jana, Sharmistha ; Jana, Biswapati ; Lu, Tzu Chuen.
Journal of Information Security and Applications.  69 (2022)  - p. 103276 , 2022
 
?
8

A Novel Congestion Control Algorithm Using Buffer Occupancy..:

, In: Computational Intelligence in Pattern Recognition; Advances in Intelligent Systems and Computing,
 
?
9

An Innovative Active Queue Management Model Through Thresho..:

, In: Proceedings of International Conference on Advanced Computing Applications; Advances in Intelligent Systems and Computing,
 
?
10

Application of Dynamic Weight with Distance to Reduce Packe..:

, In: Advanced Techniques for IoT Applications; Lecture Notes in Networks and Systems,
 
?
11

Dual Image Based Watermarking Scheme Using Quorum Function:

, In: Advanced Techniques for IoT Applications; Lecture Notes in Networks and Systems,
Dey, Ashis ; Pal, Pabitra ; Chowdhuri, Partha... - p. 114-123 , 2021
 
?
12

Generalization of Multi-bit Encoding Function Based Data Hi..:

, In: Computational Intelligence in Pattern Recognition; Advances in Intelligent Systems and Computing,
 
?
13

Application of expected value and chance constraint on unce..:

Jana, Sharmistha Halder
International Journal of Management Science and Engineering Management.  17 (2022)  1 - p. 10-24 , 2022
 
1-15