Image Encryption Schemes: A Complete Survey Y Jain, R Bansal, G Sharma, B Kumar, S Gupta International Journal of Signal Processing, Image Processing and Pattern …, 2016 | 24 | 2016 |
Optimizing ML Classification Models for Constrained EDA Resource Budgets G Parthasarathy, B Kumar, S Nanda, P Choudhary, S Rajakumar 2022 IEEE 40th International Conference on Computer Design (ICCD), 223-230, 2022 | 1 | 2022 |
Modeling of sequential circuit devices of multi-clock domain IC design for a transient vectorless power analysis Y Gogoi, B Kumar, A Mani, S Desai US Patent US 10,460,055 B1, 2019 | 1 | 2019 |
A Comprehensive Analysis of Various Steganography Techniques Under Different Attacks S Dhall, B Kumar, R Chawla International Conference on Computing for Sustainable Global Development …, 2017 | 1 | 2017 |
Optimizing machine learning classification models for resource constraints in electronic design automation (eda) computer aided design (cad) flows G Parthasarathy, B Kumar, S Nanda, P Choudhary, S Rajakumar | | 2024 |
Optimizing Constrained Random Verification with ML and Bayesian Estimation B Kumar, G Parthasarathy, S Nanda, S Rajakumar 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD (MLCAD), 1-6, 2023 | | 2023 |
Current modeling process A Mani, B Kumar, X Gu US Patent US 10,586,000 B1, 2020 | | 2020 |
COVID-19 Chest CT U-Net Segmentation and 3d CNN Classification B Kumar State University of New York at Stony Brook, 2020 | | 2020 |
A Hybrid Security Mechanism based on RC6 and LSB Status bit B Kumar, B Bhushan, M Vashisht International Conference on Computing for Sustainable Global Development …, 2017 | | 2017 |
Comprehensive Analysis of Global Contrast Improvement Technique B Kumar, K Rao, S Dhall, A Agarwal International Conference on Sustainable Development Through Research in …, 2016 | | 2016 |
Comprehensive Study of Imperceptible Watermarking Techniques B Kumar, B Chauhan, S Dhall, A Agarwal International Conference on Sustainable Development Through Research in …, 2016 | | 2016 |
Comparison of Hybrid Security Mechanism based on Symmetric and Asymmetric Key Cryptography B Kumar, B Bhushan, S Gupta National Conference on Role of Science and Technology Towards 'Make in India …, 2016 | | 2016 |
A Pseudo-Random LSB Image Steganography Technique based on Chaos R Bansal, B Kumar, S Sharma, S Gupta National Conference on Role of Science and Technology Towards 'Make in India …, 2016 | | 2016 |
Design and Development of GPS-GSM based caretaker for visually challenged people G Yadav, B Kumar National Conference on Role of Science and Technology Towards 'Make in India …, 2016 | | 2016 |