ECG-Remote patient monitoring using cloud computing P Chavan, P More, N Thorat, S Yewale, P Dhade Imperial Journal of Interdisciplinary Research 2 (2), 368-372, 2016 | 41 | 2016 |
Signature based authentication using contrast enhanced hierarchical visual cryptography PV Chavan, M Atique, L Malik 2014 IEEE Students' Conference on Electrical, Electronics and Computer …, 2014 | 37 | 2014 |
Cascade forward back-propagation neural network based group authentication using (n, n) secret sharing scheme S Narad, P Chavan Procedia Computer Science 78, 185-191, 2016 | 30 | 2016 |
Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme HMM Miss, PVC Miss Procedia Computer Science 78, 632-639, 2016 | 27 | 2016 |
Secret sharing based visual cryptography scheme using CMY color space AV Dahat, PV Chavan Procedia Computer Science 78, 563-570, 2016 | 24 | 2016 |
Design of hierarchical visual cryptography PV Chavan, M Atique 2012 Nirma University International Conference on Engineering (NUiCONE), 1-3, 2012 | 24 | 2012 |
Improving route selection mechanism using trust factor in AODV routing protocol for MaNeT RS Mangrulkar, PV Chavan, SN Dagadkar International Journal of Computer Applications 7 (10), 36-39, 2010 | 23 | 2010 |
Design and implementation of hierarchical visual cryptography with expansion less shares PV Chavan, DM Atique, DL Malik arXiv preprint arXiv:1402.2745, 2014 | 22 | 2014 |
Design of high-speed blockchain-based sidechaining peer to peer communication protocol over 5G networks N Balani, P Chavan, M Ghonghe Multimedia Tools and Applications 81 (25), 36699-36713, 2022 | 19 | 2022 |
Design of heuristic model to improve blockchain-based sidechain configuration N Balani, P Chavan International journal of computational science and engineering 26 (4), 372-384, 2023 | 14 | 2023 |
Deep learning challenges in medical imaging V Saraf, P Chavan, A Jadhav Advanced Computing Technologies and Applications: Proceedings of 2nd …, 2020 | 14 | 2020 |
Fundamental models in machine learning and deep learning TP Nagarhalli, AM Save, NM Shekokar Design of Intelligent Applications using Machine Learning and Deep Learning …, 2021 | 12 | 2021 |
An intelligent system for secured authentication using hierarchical visual cryptography-review PV Chavan, M Atique, AR Mahajan ACCE Int J. on Network Security 2 (04), 7-9, 2011 | 10 | 2011 |
BCPIS: Blockchain-based counterfeit product identification system M Mhatre, H Kashid, T Jain, P Chavan Journal of Applied Security Research 18 (4), 740-765, 2023 | 9 | 2023 |
Design of Intelligent Applications Using Machine Learning and Deep Learning Techniques RS Mangrulkar, A Michalas, N Shekokar, M Narvekar, PV Chavan CRC Press, 2021 | 8 | 2021 |
Fuzzy logic based image encryption for confidential data transfer using (2, 2) secret sharing scheme-review HM Mudia, PV Chavan 2015 International Conference on Advances in Computer Engineering and …, 2015 | 8 | 2015 |
Encrypting informative color image using color visual cryptography PV Chavan, RS Mangrulkar 2010 3rd International Conference on Emerging Trends in Engineering and …, 2010 | 8 | 2010 |
Encrypting Informative Image by Key Image using Hill Cipher Technique RS Mangrulkar, PV Chavan International Journal of Recent Trends in Engineering 1 (1), 568, 2009 | 6 | 2009 |
Convolutional neural network-based image segmentation techniques A Shah, P Chavan, D Jadhav Soft Computing and Signal Processing: Proceedings of 3rd ICSCSP 2020, Volume …, 2022 | 5 | 2022 |
Challenges to multimedia privacy and security over social media P Chavan, D Jadhav, GM Borkar Handbook of Research on Cyber Crime and Information Privacy, 118-131, 2021 | 5 | 2021 |