Name
Papers
Collaborators
ABHISHEK KUMAR
21
70
Citations 
PageRank 
Referers 
15
7.52
44
Referees 
References 
146
39
Search Limit
100146
Title
Citations
PageRank
Year
Molecular docking and pharmacophore modelling of phytoconstituents of vaccinium secundiflorum for antidiabetic and antioxidant activity.00.342021
Trust Aware Scheme based Malicious Nodes Detection under Cooperative Spectrum Sensing for Cognitive Radio Networks.00.342021
Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation.00.342021
Service-Based Credit Card Fraud Detection Using Oracle SOA Suite.10.352021
Real time SOA based credit card fraud detection system using machine learning techniques.00.342021
Risk score learning for COVID-19 contact tracing apps.00.342021
3D Logic Cells Design and Results Based on Vertical NWFET Technology Including Tied Compact Model.00.342020
An Economical Methodology to Rhetorical Identifications in Cloud Victimization Virtual Machine Snapshots.00.342019
Language-Agnostic Model for Aspect-Based Sentiment Analysis.00.342019
Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage.00.342019
EvadePDF - Towards Evading Machine Learning Based PDF Malware Classifiers.00.342018
Segmentation of Lung Field in HRCT Images Using U-Net Based Fully Convolutional Networks.00.342018
Convolutional Neural Networks for Efficient Localization of Interstitial Lung Disease Patterns in HRCT Images.00.342018
Detection of Malicious Executables Using Rule Based Classification Algorithms.00.342017
Wallah: design and evaluation of a task-centric mobile-based crowdsourcing platform.20.392014
Prefrontal Cortex Motivated Cognitive Architecture for Multiple Robots.00.342014
PlaceMap: Discovering Human Places of Interest Using Low-Energy Location Interfaces on Mobile Phones.30.412014
Recreational Drug Slang: Identification of New Terms and Populating a Lexical Taxonomy Ontology.00.342013
TxtVect: A Tool for Extracting Features from Clinical Documents.00.342012
Adapting dialog call-flows for pervasive devices10.362005
XCHOKE: Malicious Source Control for Congestion Avoidance at Internet Gateways80.612002