关注
Dr Geeta Sikka
Dr Geeta Sikka
Professor, National Institute of Technology, Delhi ,INDIA
在 nitdelhi.ac.in 的电子邮件经过验证
标题
引用次数
年份
A comparative study of classifiers used in facial embedding classification
S Sarkar, G Sikka
2018 First International Conference on Secure Cyber Computing and …, 2018
42018
A Comparative Study of Estimation by Analogy using Data Mining Techniques
G Nagpal, M Uddin, A Kaur
Journal of Information Processing Systems 8 (4), 621-652, 2012
142012
A Genetic Algorithm Based Dynamic Transmission of Data for Communicable Disease in IoMT Environment
S Singh, AS Nandan, G Sikka, A Malik, N Kumar
IEEE Internet of Things Journal, 2023
82023
A High Capacity Data Hiding Scheme Using Modified AMBTC Compression Technique
A Malik, G Sikka, H Verma
International Arab Journal of Information Technology 16 (1), 148-155, 2019
92019
A high capacity text steganography scheme based on huffman compression and color coding
A Malik, G Sikka, HK Verma
Journal of Information and Optimization Sciences 38 (5), 647-664, 2017
132017
A high capacity text steganography scheme based on LZW compression and color coding
A Malik, G Sikka, HK Verma
Engineering Science and Technology, an International Journal 20 (1), 72-79, 2017
952017
A high payload data hiding scheme based on modified AMBTC technique
A Malik, G Sikka, HK Verma
Multimedia Tools and Applications 76, 14151-14167, 2017
362017
A Hybrid Technique using Grey Relational Analysis and Regression for Software Effort Estimation using Feature Selection
G Nagpal, M Uddin, A Kaur
International Journal of Soft Computing and Engineering (IJSCE) 1 (6), 20-27, 2012
112012
A modified pixel-value differencing image steganographic scheme with least significant bit substitution method
A Malik, G Sikka, HK Verma
International Journal of Image, Graphics and Signal Processing 7 (4), 68, 2015
122015
A new image steganography based on first component alteration technique
A Kaur, R Dhir, G Sikka
arXiv preprint arXiv:1001.1972, 2010
592010
A reversible data hiding scheme for interpolated images based on pixel intensity range
A Malik, G Sikka, HK Verma
Multimedia Tools and Applications 79, 18005-18031, 2020
462020
A Review on Deep Learning-Based Polyp Segmentation for Efficient Colorectal Cancer Screening
S Gupta, G Sikka, A Malik
2023 Third International Conference on Secure Cyber Computing and …, 2023
32023
A secure data transmission protocol for cloud‐assisted edge‐Internet of Things environment
M Kumar, H Kumar Verma, G Sikka
Transactions on Emerging Telecommunications Technologies 31 (6), e3883, 2020
142020
A secure energy-efficient routing protocol for disease data transmission using IoMT
S Singh, AS Nandan, G Sikka, A Malik, A Vidyarthi
Computers and Electrical Engineering 101, 108113, 2022
202022
A secure lightweight signature based authentication for Cloud‐IoT crowdsensing environments
M Kumar, HK Verma, G Sikka
Transactions on Emerging Telecommunications Technologies 30 (4), e3292, 2019
222019
A study on vectorization methods for multicore SIMD architecture provided by compilers
DK Ojha, G Sikka
ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014
42014
A survey on wireless sensor network clustering protocols optimized via game theory
S Midha, AK Sharma, G Sikka
ACM SIGBED Review 11 (3), 8-18, 2014
62014
A systematic literature review on web service clustering approaches to enhance service discovery,selection and recommendation
Neha Agarwal, Geeta Sikka
Computer Science Review 45, 2022
142022
A systematic review of attack graph generation and analysis techniques
U Garg, G Sikka, LK Awasthi
Computer and Cyber Security, 115-146, 2018
52018
A Systematic review of attack graph generation and analysis techniques”,
LA Urvashi Garg, Geeta Sikka
Book on Computer and Cyber Security: Principles, Algorithm, Applications and …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20