ENHANCING AI MODEL SECURITY USING A HARDWARE-BASED APPROACH FOR PROTECTING FPGA IMPLEMENTATIONSyed Arfath Ahmed1, R.K. Agrawal2, Neelam Labhade Kumar3, V.S. Narayana Tinnaluri4, Geogen George5
|
PERFORMANCE ANALYSIS OF IPv4 AND IPv6 INTERNET TRAFFICRupesh Jaiswal1, Shashikant Lokhande2, Anuj Bakre3, Kishor Gutte4
|
BLOCKCHAIN-POWERED INTRUDER IDENTIFICATION IN IOT NETWORKS - METHODOLOGY AND IMPLEMENTATIONV. Thiruppathy Kesavan1, D. Danalakshmi2, R.Gopi3
|
VIDEO ENHANCEMENT USING DEEP LEARNINGJ. Jasmine
|
A FACTORIAL MODEL ON PROPAGATION OF AKSHAYA TELECENTRES AMONG GRAMA-PANCHAYATHS IN KERALAS. Sreejith1, S. Ganesan2, Hareesh N Ramanathan3
|
PRESERVING DATABASE SCHEMA PRIVACY WHILE GENERATING SQL QUERIES USING GENERATIVE AIJitesh Prasad Khatick1, Soumitra Kumar Mandal2
|