Chandra Sekhar Vorugunti

Orcid: 0000-0002-8490-3594

According to our database1, Chandra Sekhar Vorugunti authored at least 40 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Can you even tell left from right? Presenting a new challenge for VQA.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
TSOSVNet: Teacher-student collaborative knowledge distillation for Online Signature Verification.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

OSVConTramer: A Hybrid CNN and Transformer based Online Signature Verification.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
COMPOSV: compound feature extraction and depthwise separable convolution-based online signature verification.
Neural Comput. Appl., 2022

Can you even tell left from right? Presenting a new challenge for VQA.
CoRR, 2022

COMPOSV++: Light Weight Online Signature Verification Framework Through Compound Feature Extraction and Few-Shot Learning.
Proceedings of the Frontiers in Handwriting Recognition - 18th International Conference, 2022

Impact of Type of Convolution Operation on Performance of Convolutional Neural Networks for Online Signature Verification.
Proceedings of the Frontiers in Handwriting Recognition - 18th International Conference, 2022

2020
OSVFuseNet: Online Signature Verification by feature fusion and depth-wise separable convolution based deep learning.
Neurocomputing, 2020

DeepFuseOSV: online signature verification using hybrid feature fusion and depthwise separable convolution neural network architecture.
IET Biom., 2020

Online Signature Profiling using Generative Adversarial Networks.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
An Efficient Online Signature Verification Based on Feature Fusion and Interval Valued Representation of Writer Specific Features.
Proceedings of the 5th IEEE International Conference on Identity, 2019

OSVNet: Convolutional Siamese Network for Writer Independent Online Signature Verification.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Online Signature Verification by Few-Shot Separable Convolution Based Deep Learning.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

A Light Weight and Hybrid Deep Learning Model Based Online Signature Verification.
Proceedings of the Second International Workshop on Machine Learning, 2019

Online Signature Verification Based on Writer Specific Feature Selection and Fuzzy Similarity Measure.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

2018
A Deep Learning Architecture Based Dimensionality Reduction and Online Signature Verification.
Proceedings of the Document Analysis and Recognition, 2018

A Secure and Light Weight User Authentication System Based on Online Signature Verification for Resource Constrained Mobile Networks.
Proceedings of the Document Analysis and Recognition, 2018

An Efficient Multi Lingual Optical Character Recognition System for Indian Languages Through Use of Bharati Script.
Proceedings of the Document Analysis and Recognition, 2018

2017
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

A novel online social network (Twitter)message (Tweet)classifier based on message diffusion in the network.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Epidemic model based evaluation of malware propagation in Twitter.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

2016
Notes on "An Effective ECC based User Access Control Scheme with Attribute based Encryption for WSN".
CoRR, 2016

PPMUAS: A privacy preserving mobile user authentication system for cloud environment utilizing big data features.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

A Secure and Light Weight Authentication and Key Establishment Framework for Wireless Mesh Network.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

A Robust and Light Weight Authentication Framework for Hadoop File System in Cloud Computing Environment.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

A secure and robust dynamic ID-based mutual authentication scheme with smart card using elliptic curve cryptography.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

A Robust Pairing-Free ID-Based Mutual Authentication Framework for Cloud Computing.
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015

A robust mutual authentication scheme for data security in cloud architecture.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

An energy efficient mutual authentication scheme for secure data exchange in health-care applications using wireless body sensor network.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

2014
A Robust Password-Based Multi-Server Authentication Scheme.
CoRR, 2014

A Robust Biometric-Based Three-factor Remote User Authentication Scheme.
CoRR, 2014

Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS.
CoRR, 2014

A robust ticket-based mutual authentication scheme for data security in cloud computing.
Proceedings of the International Conference on Data Science & Engineering, 2014

Cryptanalysis of "a biometric-based user authentication scheme for heterogeneous wireless sensor networks".
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Cryptanalysis of An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks.
CoRR, 2013

A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

POSTER: A Secure and Efficient Cross Authentication Protocol in VANET Hierarchical Model.
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013

POSTER: Cryptanalysis and Security Enhancement of Anil K Sarje's Authentication Scheme Using Smart Cards.
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013

Cryptanalysis and improvement of Anil K Sarje's authentication scheme over insecure networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013


  Loading...