Sudhakar, Sengan
134  results:
Search for persons X
?
1

Network embedding architecture using laplace regularization..:

Sudhakar, Sengan ; Kanmani, P ; Amudha, K...
Microprocessors and Microsystems.  81 (2021)  - p. 103616 , 2021
 
?
2

Design of peer-to-peer protocol with sensible and secure Io..:

Vijaya Kumar, V ; Devi, M ; Vishnu Raja, P...
Microprocessors and Microsystems.  78 (2020)  - p. 103216 , 2020
 
?
4

ACO-Optimized DRL Model for Energy-Efficient Resource Alloc..:

, In: Multi-Strategy Learning Environment; Algorithms for Intelligent Systems,
 
?
 
?
7

Utilizing stochastic differential equations and random fore..:

Sagar, P. Vidya ; Rajyalaxmi, M. ; Subbalakshmi, A.V.V.S....
Journal of Interdisciplinary Mathematics.  27 (2024)  2 - p. 285-298 , 2024
 
?
8

Secure multi-party computation in deep learning : Enhancing..:

Sagar, P. Vidya ; Ghanimi, Hayder M. A. ; Prabhu, L. Arokia Jesu...
Journal of Discrete Mathematical Sciences and Cryptography.  27 (2024)  2-A - p. 249-259 , 2024
 
?
10

Enhanced security in federated learning by integrating homo..:

Rao, Ganga Rama Koteswara ; Ghanimi, Hayder M. A. ; Ramachandran, V....
Journal of Discrete Mathematical Sciences and Cryptography.  27 (2024)  2-A - p. 361-370 , 2024
 
?
11

Chebyshev polynomial approximation in CNN for zero-knowledg..:

Ghanimi, Hayder M. A. ; Gopalakrishnan, T. ; Deol, G. Joel Sunny...
Journal of Discrete Mathematical Sciences and Cryptography.  27 (2024)  2-A - p. 203-214 , 2024
 
?
13

Security and privacy concerns in social networks mathematic..:

Krishna, Raguru Jaya ; Gopalakrishnan, T. ; Divyapushpalakshmi, M....
Journal of Discrete Mathematical Sciences and Cryptography.  27 (2024)  2-A - p. 371-382 , 2024
 
1-15