Anand Gupta

According to our database1, Anand Gupta authored at least 46 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Table structure recognition using black widow based mutual exclusion and RESNET attention model.
J. Intell. Fuzzy Syst., January, 2024

2022
Analysis of Regular Patterns in Un-Weighted Directed Graphs.
Int. J. Inf. Retr. Res., 2022

2021
PE-MSC: partial entailment-based minimum set cover for text summarization.
Knowl. Inf. Syst., 2021

2020
Multi-class instance-incremental framework for classification in fully dynamic graphs.
Int. J. Comput. Sci. Eng., 2020

2019
Text Summarisation Using Laplacian Centrality-Based Minimum Vertex Cover.
J. Inf. Knowl. Manag., 2019

2018
Rumor Detection on Twitter Using a Supervised Machine Learning Framework.
Int. J. Inf. Retr. Res., 2018

Prediction of Lung Cancer from Low-Resolution Nodules in CT-Scan Images by using Deep Features.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
A Big Data Analysis Framework Using Apache Spark and Deep Learning.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Image Contrast Enhancement Using Hybrid Elitist Ant System, Elitism-Based Immigrants Genetic Algorithm and Simulated Annealing.
Proceedings of 2nd International Conference on Computer Vision & Image Processing, 2017

2016
Stochastic Simulation Service: Bridging the Gap between the Computational Expert and the Biologist.
PLoS Comput. Biol., 2016

Mining and Analysis of Periodic Patterns in Weighted Directed Dynamic Network.
Int. J. Serv. Sci. Manag. Eng. Technol., 2016

CDIA-DS: A framework for efficient reconstruction of compound document image using data structure.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

2015
Framework for mining regular patterns in dynamic networks.
Int. J. Knowl. Eng. Data Min., 2015

Fuzzy Based Support System for Melanoma Diagnosis.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2015

SuperContra: Cross-Language, Cross-Runtime Contracts as a Service.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

2014
Text Summarization through Entailment-based Minimum Vertex Cover.
Proceedings of the Third Joint Conference on Lexical and Computational Semantics, 2014

Evolution of regular directed patterns in dynamic social networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Automatic and portable cloud deployment for scientific simulations.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Mining Regular Patterns in Weighted-Directed Networks.
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
TAG: A two-level framework for user authentication through hand gestures.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Hybrid Cloud Support for Large Scale Analytics and Web Processing.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Gender Classification Based on Lip Colour.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

North by Northwest: Infrastructure Agnostic and Datastore Agnostic Live Migration of Private Cloud Platforms.
Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing, 2012

Analog Textual Entailment and Spectral Clustering (ATESC) Based Summarization.
Proceedings of the Big Data Analytics, First International Conference, 2012

Luring Conditions and Their Proof of Necessity through Mathematical Modelling.
Proceedings of the Big Data Analytics, First International Conference, 2012

2011
DGW-canny: An improvised version of Canny edge detector.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

Malware Attacks on Smartphones and Their Classification Based Detection.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

2010
Opaqueness Characteristic of a Context Honeypot System.
Inf. Secur. J. A Glob. Perspect., 2010

Simulation to track 3D location in GSM through NS2 and real life
CoRR, 2010

2009
Accuracy of 3D Location Computation in GSM Through NS2.
Proceedings of the First International Conference on Networks and Communications, 2009

CDIS: Circle Density Based Iris Segmentation.
Proceedings of the Contemporary Computing - Second International Conference, 2009

InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices.
Proceedings of the Contemporary Computing - Second International Conference, 2009

2008
Auditing Inference Based Disclosures in Dynamic Databases.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Offline Signature Verification: A Contour Based Mechanism Using HMM.
Proceedings of the 2008 International Conference on Image Processing, 2008

Practical Optimal Caching Using Multiple Virtual Caches in Multiple Query Optimization.
Proceedings of the Wireless Networks, 2008

Precomputation of privacy policy parameters for auditing SQL queries.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Context Honeypot: A Framework for Anticipatory Privacy Violation.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

A Pattern Matching Classifier for Offline Signature Verification.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

A Unified Audit Expression Model for Auditing SQL Queries.
Proceedings of the Data and Applications Security XXII, 2008

2007
PRINDA: Architecture and design of non-disclosure agreements in privacy policy framework.
Data Knowl. Eng., 2007

2006
Malafide Intension and its mapping to Privacy Policy Purposes for Masquerading.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report).
Proceedings of the Information Systems Security, Second International Conference, 2006

Malafide Intension Based Detection of Privacy Violation in Information System.
Proceedings of the Information Systems Security, Second International Conference, 2006

A System to test malafide intension based on privacy violation detection.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

Preserving Obliviousness Characteristic of Honeypot database.
Proceedings of the 13th International Conference on Management of Data, 2006

OCHD: Preserving Obliviousness Characteristic of Honeypot Database.
Proceedings of the 13th International Conference on Management of Data, 2006


  Loading...