P. Deepa Shenoy

According to our database1, P. Deepa Shenoy authored at least 37 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Anonymity and Performance Analysis of Stream Isolation in Tor Network.
Proceedings of the 10th International Conference on Computing, 2019

2018
A novel sentiment aware dictionary for multi-domain sentiment classification.
Comput. Electr. Eng., 2018

Experimental Evaluation of BATMAN and BATMAN-Adv Routing Protocols in a Mobile Testbed.
Proceedings of the TENCON 2018, 2018

2017
Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier.
World Wide Web, 2017

2016
Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites.
Int. J. Knowl. Web Intell., 2016

Reputation System: Evaluating Reputation among All Good Sellers.
Proceedings of the 7th Workshop on Computational Approaches to Subjectivity, 2016

PCAD: Power control attack detection in wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
HOMS: Hindi opinion mining system.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

2014
Cancer Prognosis Prediction Using Balanced Stratified Sampling.
CoRR, 2014

DeMalFier: Detection of Malicious web pages using an effective classifier.
Proceedings of the International Conference on Data Science & Engineering, 2014

2013
Authentication using Finger Knuckle Prints.
Signal Image Video Process., 2013

Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity.
CoRR, 2013

2011
Heartbeat biometrics for human authentication.
Signal Image Video Process., 2011

Statistical Analysis for Human Authentication Using ECG Waves.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs.
Proceedings of the 2011 International Conference on Communication, 2011

Human authentication using finger knuckle print.
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, 2011

Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS.
Proceedings of the Advances in Computing and Communications, 2011

An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques.
Proceedings of the Advances in Computing and Communications, 2011

2010
HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index.
Proceedings of the SECRYPT 2010, 2010

JPEG Steganalysis Using HBCL Statistics and FR Index.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

SURF: Steganalysis using random forests.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Preserving Energy Using Link Protocol in Wireless Networks.
Proceedings of the Communication and Networking, 2010

Human Authentication Based on ECG Waves Using Radon Transform.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens.
Proceedings of the Communication and Networking, 2010

JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images.
Proceedings of the Signal Processing and Multimedia, 2010

2009
An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques.
Proceedings of the Rough Sets, 2009

2008
Proactive sliding -window strategy for merging sensor-enabled cars.
Proceedings of the 16th International Conference on Networks, 2008

2007
Lesion detection using segmentation and classification of mammograms.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007

2006
A neural network based CBIR system using STI features and relevance feedback.
Intell. Data Anal., 2006

Classification of Mammograms Using Decision Trees.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

2005
Dynamic Association Rule Mining using Genetic Algorithms.
Intell. Data Anal., 2005

A Dynamic Migration Model for Self-adaptive Genetic Algorithms.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

2004
Mining Top - <i>k</i> Ranked Webpages Using Simulated Annealing and Genetic Algorithms.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004

2003
Evolutionary Approach for Mining Association Rules on Dynamic Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2003

Dynamic Subspace Clustering for Very Large High-Dimensional Databases.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003


  Loading...