Sundarakantham, K.
22  results:
Search for persons X
?
1

A Novel Hierarchical Clustering Technique to Analyze Style ..:

, In: Signals and Communication Technology; Proceedings of the International Conference on Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication,
 
?
2

A Partitioned Task Offloading Approach for Privacy Preserva..:

, In: Lecture Notes in Electrical Engineering; Big Data, Machine Learning, and Applications,
Ramprasad, R. ; Pradhiksha, S. ; Sundarakantham, K... - p. 395-402 , 2023
 
?
3

Obfuscation Techniques for a Secure Endorsement System in H..:

, In: Proceedings of International Conference on Network Security and Blockchain Technology; Lecture Notes in Networks and Systems,
Dharani, J. ; Sundarakantham, K. ; Singh, Kunwar. - p. 146-158 , 2022
 
?
5

User Authentication of IoT Devices for Decentralized Archit..:

, In: Applied Soft Computing and Communication Networks; Lecture Notes in Networks and Systems,
 
?
6

ACA: Attention-Based Context-Aware Answer Selection System:

, In: Machine Intelligence and Signal Processing; Advances in Intelligent Systems and Computing,
 
?
8

Machine Learning Based Intrusion Detection System:

, In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI),
Halimaa A., Anish ; Sundarakantham, K. - p. 916-920 , 2019
 
?
9

SSE: Semantic Sentence Embedding for learning user interact..:

, In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT),
 
?
10

DDAM: Detecting DDoS Attacks Using Machine Learning Approac:

, In: Computational Intelligence: Theories, Applications and Future Directions - Volume I; Advances in Intelligent Systems and Computing,
 
?
11

Evaluation of Security Metrics for System Security Analysis:

, In: Computational Intelligence: Theories, Applications and Future Directions - Volume I; Advances in Intelligent Systems and Computing,
 
?
12

Fog Computing-Based Autonomic Security Approach to Internet..:

, In: Advances in Intelligent Systems and Computing; Computational Intelligence: Theories, Applications and Future Directions - Volume II,
 
?
13

Cosine similarity-based clustering and dynamic reputation t..:

Parvathy, M. ; Sundarakantham, K. ; Mercy Shalinie, S.
Journal of Statistical Computation and Simulation.  85 (2014)  16 - p. 3247-3258 , 2014
 
?
14

RISE : Privacy preserved data analytics using Regularized I..:

Mallikarjunan, Narasima ; R., Harine Rajashree ; K., Sundarakantham.
Engineering Applications of Artificial Intelligence.  133 (2024)  - p. 108384 , 2024
 
?
15

Content Based Classification of Short Messages using Recurr..:

, In: 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA),
 
1-15