Naveen Kumar

According to our database1, Naveen Kumar authored at least 35 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




NBP: Namespace-based privacy to counter timing-based attack in named data networking.
J. Netw. Comput. Appl., 2019

Detecting Anomalous Online Reviewers: An Unsupervised Approach Using Mixture Models.
J. of Management Information Systems, 2019

Security Attacks in Named Data Networking: A Review and Research Directions.
J. Comput. Sci. Technol., 2019

Quantized deep learning models on low-power edge devices for robotic systems.
CoRR, 2019

MLPerf Training Benchmark.
CoRR, 2019

Scale MLPerf-0.6 models on Google TPU-v3 Pods.
CoRR, 2019

Achieving Zero ms Handover Interruption in New Radio with Higher Throughput Using D2D Communication.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning.
J. of Management Information Systems, 2018

Exit, Voice, and Response on Digital Platforms: An Empirical Investigation of Online Management Response Strategies.
Information Systems Research, 2018

A Triggered Delay-based Approach against Cache Privacy Attack in NDN.
IJNDC, 2018

Crypto-stego System for Securing Text and Image Data.
Int. J. Image Graphics, 2018

An Edge Based Smart Parking Solution Using Camera Networks and Deep Learning.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Integrating Knowledge-Supported Search into the INCEpTION Annotation Platform.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, 2018

Linking Text and Knowledge Using the INCEpTION Annotation Platform.
Proceedings of the 14th IEEE International Conference on e-Science, 2018

A Triggered Delay-based Approach against Cache Privacy Attack in NDN.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

In-Datacenter Performance Analysis of a Tensor Processing Unit.
CoRR, 2017

Evaluating machine learning algorithms for detection of interest flooding attack in named data networking.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Performance impact of topology poisoning attack in SDN and its countermeasure.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Device Placement Optimization with Reinforcement Learning.
Proceedings of the 34th International Conference on Machine Learning, 2017

An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC).
Proceedings of the First International Conference on Information Technology and Knowledge Management, 2017

DataBros@Information Retrieval from Microblogs during Disasters(IRMiDis).
Proceedings of the Working notes of FIRE 2017, 2017

COPMOC: Co-location Pattern Mining Using Map Overlay and Clustering Techniques.
Proceedings of the International Conference on Informatics and Analytics, 2016

Baseline Wander Cancellation on Trellis for Perpendicular Magnetic Recording.
IEEE Trans. Communications, 2015

A visual basic program for predicting optimum gear and throttle position for best fuel economy for 32 kW tractor.
Comput. Electron. Agric., 2015

Fast and efficient compressive sensing for wideband Cognitive Radio systems.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

Measurement of Cognitive Load in HCI Systems Using EEG Power Spectrum: An Experimental Study.
Proceedings of the Proceeding of the Seventh International Conference on Intelligent Human Computer Interaction, 2015

Application of Compressed Sensing in Cognitive Radio.
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2015

Towards Adapting Sakai for e-Learning Provider.
Proceedings of the CSEDU 2015, 2015

Improved fuzzy entropy clustering algorithm for MRI brain image segmentation.
Int. J. Imaging Systems and Technology, 2014

Toward Refactoring of DMARF and GIPSY Case Studies - a Team 12 SOEN6471-S14 Project Report.
CoRR, 2014

Lower bound for ML sequence detection in ISI channels with Gauss Markov noise.
Proceedings of IEEE International Conference on Communications, 2013

Hierarchical modeling using generalized linear models.
Quality and Reliability Eng. Int., 2011

Real Time Hand Tracking and Gesture Recognition.
Proceedings of the 2009 International Conference on Image Processing, 2009

Secure Authentication Using Visual Cryptography.
Proceedings of the 2009 International Conference on Security & Management, 2009