A comparative study of classifiers used in facial embedding classification S Sarkar, G Sikka 2018 First International Conference on Secure Cyber Computing and …, 2018 | 4 | 2018 |
A Comparative Study of Estimation by Analogy using Data Mining Techniques G Nagpal, M Uddin, A Kaur Journal of Information Processing Systems 8 (4), 621-652, 2012 | 14 | 2012 |
A Genetic Algorithm Based Dynamic Transmission of Data for Communicable Disease in IoMT Environment S Singh, AS Nandan, G Sikka, A Malik, N Kumar IEEE Internet of Things Journal, 2023 | 8 | 2023 |
A High Capacity Data Hiding Scheme Using Modified AMBTC Compression Technique A Malik, G Sikka, H Verma International Arab Journal of Information Technology 16 (1), 148-155, 2019 | 9 | 2019 |
A high capacity text steganography scheme based on huffman compression and color coding A Malik, G Sikka, HK Verma Journal of Information and Optimization Sciences 38 (5), 647-664, 2017 | 13 | 2017 |
A high capacity text steganography scheme based on LZW compression and color coding A Malik, G Sikka, HK Verma Engineering Science and Technology, an International Journal 20 (1), 72-79, 2017 | 95 | 2017 |
A high payload data hiding scheme based on modified AMBTC technique A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 14151-14167, 2017 | 36 | 2017 |
A Hybrid Technique using Grey Relational Analysis and Regression for Software Effort Estimation using Feature Selection G Nagpal, M Uddin, A Kaur International Journal of Soft Computing and Engineering (IJSCE) 1 (6), 20-27, 2012 | 11 | 2012 |
A modified pixel-value differencing image steganographic scheme with least significant bit substitution method A Malik, G Sikka, HK Verma International Journal of Image, Graphics and Signal Processing 7 (4), 68, 2015 | 12 | 2015 |
A new image steganography based on first component alteration technique A Kaur, R Dhir, G Sikka arXiv preprint arXiv:1001.1972, 2010 | 59 | 2010 |
A reversible data hiding scheme for interpolated images based on pixel intensity range A Malik, G Sikka, HK Verma Multimedia Tools and Applications 79, 18005-18031, 2020 | 46 | 2020 |
A Review on Deep Learning-Based Polyp Segmentation for Efficient Colorectal Cancer Screening S Gupta, G Sikka, A Malik 2023 Third International Conference on Secure Cyber Computing and …, 2023 | 3 | 2023 |
A secure data transmission protocol for cloud‐assisted edge‐Internet of Things environment M Kumar, H Kumar Verma, G Sikka Transactions on Emerging Telecommunications Technologies 31 (6), e3883, 2020 | 14 | 2020 |
A secure energy-efficient routing protocol for disease data transmission using IoMT S Singh, AS Nandan, G Sikka, A Malik, A Vidyarthi Computers and Electrical Engineering 101, 108113, 2022 | 20 | 2022 |
A secure lightweight signature based authentication for Cloud‐IoT crowdsensing environments M Kumar, HK Verma, G Sikka Transactions on Emerging Telecommunications Technologies 30 (4), e3292, 2019 | 22 | 2019 |
A study on vectorization methods for multicore SIMD architecture provided by compilers DK Ojha, G Sikka ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention …, 2014 | 4 | 2014 |
A survey on wireless sensor network clustering protocols optimized via game theory S Midha, AK Sharma, G Sikka ACM SIGBED Review 11 (3), 8-18, 2014 | 6 | 2014 |
A systematic literature review on web service clustering approaches to enhance service discovery,selection and recommendation Neha Agarwal, Geeta Sikka Computer Science Review 45, 2022 | 14 | 2022 |
A systematic review of attack graph generation and analysis techniques U Garg, G Sikka, LK Awasthi Computer and Cyber Security, 115-146, 2018 | 5 | 2018 |
A Systematic review of attack graph generation and analysis techniques”, LA Urvashi Garg, Geeta Sikka Book on Computer and Cyber Security: Principles, Algorithm, Applications and …, 2018 | | 2018 |