Gaurav Gupta

According to our database1, Gaurav Gupta authored at least 85 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Trajectory generation and step planning of a 12 DoF biped robot on uneven surface.
Robotica, 2018

Fast 2D/3D object representation with growing neural gas.
Neural Computing and Applications, 2018

Approximate Submodular Functions and Performance Guarantees.
CoRR, 2018

Anonymizing k-Facial Attributes via Adversarial Perturbations.
CoRR, 2018

Re-thinking EEG-based non-invasive brain interfaces: modeling and analysis.
CoRR, 2018

Dealing with Unknown Unknowns: Identification and Selection of Minimal Sensing for Fractional Dynamics with Unknown Inputs.
CoRR, 2018

Resource-Based View of Information Systems: Sustainable and Transient Competitive Advantage Perspectives.
Australasian J. of Inf. Systems, 2018

Anonymizing k Facial Attributes via Adversarial Perturbations.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Detecting Data Leakage from Hard Copy Documents.
Proceedings of the Advances in Digital Forensics XIV, 2018

Re-thinking EEG-based non-invasive brain interfaces: modeling and analysis.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

Transforming temporary organizations to permanence: Examining the role of information systems.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

"Leadership in Action: How Top Hackers Behave" A Big-Data Approach with Text-Mining and Sentiment Analysis.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Dealing with Unknown Unknowns: Identification and Selection of Minimal Sensing for Fractional Dynamics with Unknown Inputs.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Passive Classification of Source Printer using Text-line-level Geometric Distortion Signatures from Scanned Images of Printed Documents.
CoRR, 2017

Robust Hand Gestural Interaction for Smartphone Based AR/VR Applications.
Proceedings of the 2017 IEEE Winter Conference on Applications of Computer Vision, 2017

Source Classification Using Document Images from Smartphones and Flatbed Scanners.
Proceedings of the Computer Vision, Pattern Recognition, Image Processing, and Graphics, 2017

Detecting Fraudulent Bank Checks.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Information Extraction from Hand-Marked Industrial Inspection Sheets.
Proceedings of the 7th International Workshop on Camera-Based Document Analysis and Recognition, 2017

Siamese Networks for Chromosome Classification.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

Distributed placement of power generation resources in uncertain environments.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

New Venture Ambidexterity in Emerging Markets: the Case of Crowdfunding in India.
Proceedings of the 25th European Conference on Information Systems, 2017

2016
Edge detection of digital color images using information sets.
J. Electronic Imaging, 2016

Segmentation of retail customers based on cluster analysis in building successful CRM.
IJBIS, 2016

uBeacon: Configuration based Beacon tracking.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Effect of human behavior on traffic patterns during an emergency.
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016

An AR Inspection Framework: Feasibility Study with Multiple AR Devices.
Proceedings of the 2016 IEEE International Symposium on Mixed and Augmented Reality, 2016

InspectAR: An Augmented Reality Inspection Framework for Industry.
Proceedings of the 2016 IEEE International Symposium on Mixed and Augmented Reality, 2016

Indoor Localisation and Navigation on Augmented Reality Devices.
Proceedings of the 2016 IEEE International Symposium on Mixed and Augmented Reality, 2016

Data Privacy Perceptions About Digital Forensic Investigations in India.
Proceedings of the Advances in Digital Forensics XII, 2016

Secure File Deletion for Solid State Drives.
Proceedings of the Advances in Digital Forensics XII, 2016

Forensic Authentication of Bank Checks.
Proceedings of the Advances in Digital Forensics XII, 2016

Analyzing Mobile Device Ads to Identify Users.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
A Tool for Extracting Static and Volatile Forensic Artifacts of Windows 8.x Apps.
Proceedings of the Advances in Digital Forensics XI, 2015

Forensic-Ready Secure iOS Apps for Jailbroken iPhones.
Proceedings of the Advances in Digital Forensics XI, 2015

An efficient DCT based image watermarking scheme for protecting distribution rights.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
User Selection in MIMO Interfering Broadcast Channels.
IEEE Trans. Communications, 2014

Preserving Dates and Timestamps for Incident Handling in Android Smartphones.
Proceedings of the Advances in Digital Forensics X, 2014

Adaptive-Threshold Region Merging via Path Scanning.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Compression noise based video forgery detection.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Conditional Entropy Based User Selection for Multiuser MIMO Systems.
IEEE Communications Letters, 2013

Conditional Entropy based User Selection for Multiuser MIMO Systems.
CoRR, 2013

User Selection in MIMO Interfering Broadcast Channels.
CoRR, 2013

Automatic Test Bench Generation and Connection in Modern Verification Environments: Methodology and Tool.
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013

Model Probability in Self-organising Maps.
Proceedings of the Advances in Computational Intelligence, 2013

Adaptive learning in motion analysis with self-organising maps.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Detecting Counterfeit Currency and Identifying Its Source.
Proceedings of the Advances in Digital Forensics IX, 2013

A novel optimal fuzzy color image enhancement using particle swarm optimization.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Visual region understanding : unsupervised extraction and abstraction.
PhD thesis, 2012

An Iterative Marching with Correctness Criterion Algorithm for Shape from Shading Under Oblique Light Source.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Augmenting Language Tools for Effective Communication.
Proceedings of the Perception and Machine Intelligence - First Indo-Japan Conference, 2012

Region analysis through close contour transformation using growing neural gas.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

2011
Bucket attack on numeric set watermarking model and safeguards.
Inf. Sec. Techn. Report, 2011

Socio-technological phishing prevention.
Inf. Sec. Techn. Report, 2011

Region growing stereo matching method for 3D building reconstruction.
IJCVR, 2011

Ontology-based Retrieval System Using Semantic Indexing.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

2010
Hand gesture modelling and tracking using a Self-Organising Network.
Proceedings of the International Joint Conference on Neural Networks, 2010

Tracking gestures using a probabilistic Self-Organising network.
Proceedings of the International Joint Conference on Neural Networks, 2010

Collaborative Spatial Object Recommendation in Location Based Services.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Digital Watermarking Based Stereo Image Coding.
Proceedings of the Contemporary Computing - Third International Conference, 2010

2009
Reversible and Blind Database Watermarking Using Difference Expansion.
IJDCF, 2009

Generic colour image segmentation via multi-stage region merging.
Proceedings of the 10th Workshop on Image Analysis for Multimedia Interactive Services, 2009

Robust and Reversible Numerical Set Watermarking.
Proceedings of the SIGMAP 2009, 2009

Database Relation Watermarking Resilient against Secondary Watermarking Attacks.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
On the degrees of freedom in linear array systems with tri-polarized antennas.
IEEE Trans. Wireless Communications, 2008

Designing Personal Robots for Education: Hardware, Software, and Curriculum.
IEEE Pervasive Computing, 2008

WiiArts: creating collaborative art experience with WiiRemote interaction.
Proceedings of the 2nd International Conference on Tangible and Embedded Interaction 2008, 2008

Active-GNG: model acquisition and tracking in cluttered backgrounds.
Proceedings of the 1st ACM Workshop on Vision Networks for Behavior Analysis, 2008

Source Code Watermarking Based on Function Dependency Oriented Sequencing.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Reversible and blind database watermarking using difference expansion.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
Software Watermarking Resilient to Debugging Attacks.
Journal of Multimedia, 2007

Reversible and Semi-Blind Relational Database Watermarking.
Proceedings of the SIGMAP 2007, 2007

A Structured Approach to Detect Scanner-Printer Used in Generating Fake Document.
Proceedings of the Information Systems Security, Third International Conference, 2007

Nonparametric Modelling and Tracking with Active -GNG.
Proceedings of the Human-Computer Interaction, 2007

Robust Modelling and Tracking of NonRigid Objects Using Active-GNG.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Document Frauds: Identification and Linking Fake Document to Scanners and Printers.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007

Efficient Registration of Aerial Image Sequences Without Camera Priors.
Proceedings of the Computer Vision, 2007

2006
Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents.
Digital Investigation, 2006

A Low-Cost Attack on Branch-Based Software Watermarking Schemes.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Document Layout Analysis and Classification and Its Application in OCR.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

An attack-localizing watermarking scheme for natural language documents.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol.
IJDE, 2004

2003
Fault-tolerant clustering of wireless sensor networks.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Minimizing the cost of mobility management: distance-based scheme as a function of user's profile.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Load-balanced clustering of wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2003


  Loading...