


Остановите войну!
for scientists:
Abhay Kumar
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Manuele Bertoluzzo
, Stefano Giacomuzzi
, Abhay Kumar
:
Design and Experimentation of a Single-Phase PLL With Novel OSG Method. IEEE Access 10: 33393-33407 (2022) - [j8]Syed Jalal Ahmad
, Ishrath Unissa, M. Shoukath Ali, Abhay Kumar:
Enhanced security to MANETs using digital codes. J. Inf. Secur. Appl. 66: 103147 (2022) - [c17]Abhay Kumar, Abhinav Gupta, Lalit Mohan Sanagavarapu, Y. Raghu Reddy:
An approach to Open-Source Software License Management using Blockchain-based Smart-Contracts. ISEC 2022: 20:1-20:5 - 2021
- [c16]Abhay Kumar, Sandeep Shukla:
Topology Validator - Defense Against Topology Poisoning Attack in SDN. QSHINE 2021: 241-260 - 2020
- [j7]Munshi Yusuf Alam, Akash Nandi, Abhay Kumar, Sujoy Saha, Mousumi Saha, Subrata Nandi, Sandip Chakraborty:
Crowdsourcing from the True crowd: Device, vehicle, road-surface and driving independent road profiling from smartphone sensors. Pervasive Mob. Comput. 61: 101103 (2020) - [c15]Narayana Darapaneni, Amanpreet Singh, Anwesh Paduri, Aparna Ranjith, Abhay Kumar, Divya Dixit, Suparna Khan:
A Machine Learning Approach to Predicting Covid-19 Cases Amongst Suspected Cases and Their Category of Admission. ICIIS 2020: 375-380 - [c14]Suraj Tripathi, Saurabh Tripathi, Abhay Kumar, Chirag Singh:
Input-conditioned convolution filters for feature learning. MoMM 2020: 30-34
2010 – 2019
- 2019
- [j6]Ankit Soni
, Raksha Upadhyay, Abhay Kumar
:
Performance improvement of wireless secret key generation with colored noise for IoT. Int. J. Commun. Syst. 32(16) (2019) - [j5]Ankit Soni
, Raksha Upadhyay, Abhay Kumar
:
Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging. Phys. Commun. 33: 249-258 (2019) - [c13]Chirag Singh, Abhay Kumar, Ajay Nagar, Suraj Tripathi, Promod Yenigalla:
Emoception: An Inception Inspired Efficient Speech Emotion Recognition Network. ASRU 2019: 787-791 - [c12]Suraj Tripathi, Abhiram Ramesh, Abhay Kumar, Chirag Singh, Promod Yenigalla:
Learning Discriminative Features using Center Loss and Reconstruction as Regularizer for Speech Emotion Recognition. AffComp@IJCAI 2019: 44-53 - [c11]Suraj Tripathi, Chirag Singh, Abhay Kumar, Chandan Kumar Pandey, Nishant Jain:
Bidirectional Transformer Based Multi-Task Learning for Natural Language Understanding. NLDB 2019: 54-65 - [c10]Nishant Jain, Abhay Kumar, Shekhar Singh, Chirag Singh, Suraj Tripathi:
Deceptive Reviews Detection Using Deep Learning Techniques. NLDB 2019: 79-91 - [i7]Abhay Kumar, Nishant Jain, Chirag Singh, Suraj Tripathi:
Exploiting SIFT Descriptor for Rotation Invariant Convolutional Neural Network. CoRR abs/1904.00197 (2019) - [i6]Abhay Kumar, Nishant Jain, Suraj Tripathi, Chirag Singh:
From Fully Supervised to Zero Shot Settings for Twitter Hashtag Recommendation. CoRR abs/1906.04914 (2019) - [i5]Suraj Tripathi, Abhay Kumar, Abhiram Ramesh, Chirag Singh, Promod Yenigalla:
Deep Learning based Emotion Recognition System Using Speech Features and Transcriptions. CoRR abs/1906.05681 (2019) - [i4]Suraj Tripathi, Abhay Kumar, Abhiram Ramesh, Chirag Singh, Promod Yenigalla:
Focal Loss based Residual Convolutional Neural Network for Speech Emotion Recognition. CoRR abs/1906.05682 (2019) - [i3]Suraj Tripathi, Abhiram Ramesh, Abhay Kumar, Chirag Singh, Promod Yenigalla:
Learning Discriminative features using Center Loss and Reconstruction as Regularizer for Speech Emotion Recognition. CoRR abs/1906.08873 (2019) - [i2]Suraj Tripathi, Abhay Kumar, Chirag Singh:
Visual Context-aware Convolution Filters for Transformation-invariant Neural Network. CoRR abs/1906.09986 (2019) - [i1]Abhay Kumar, Nishant Jain, Suraj Tripathi, Chirag Singh, Kamal Krishna:
MTCNET: Multi-task Learning Paradigm for Crowd Count Estimation. CoRR abs/1908.08652 (2019) - 2018
- [j4]Bhagawati Prasad Joshi
, Abhay Kumar
, Akhilesh Singh, Pradeep Kumar Bhatt, Bhupender Kumar Bharti:
Intuitionistic fuzzy parameterized fuzzy soft set theory and its application. J. Intell. Fuzzy Syst. 35(5): 5217-5223 (2018) - [c9]Promod Yenigalla, Abhay Kumar, Suraj Tripathi, Chirag Singh, Sibsambhu Kar, Jithendra Vepa:
Speech Emotion Recognition Using Spectrogram & Phoneme Embedding. INTERSPEECH 2018: 3688-3692 - 2017
- [c8]Neeraj Kumar, Ruchika Verma
, Ashish Arora, Abhay Kumar, Sanchit Gupta, Amit Sethi, Peter H. Gann:
Convolutional neural networks for prostate cancer recurrence prediction. Medical Imaging: Digital Pathology 2017: 101400H - 2015
- [j3]Basant Tiwari, Abhay Kumar
:
Role-based access control through on-demand classification of electronic health record. Int. J. Electron. Heal. 8(1): 9-24 (2015) - [j2]Ajay Kulkarni, Abhay Kumar:
Structurally optimized wavelet network based adaptive control for a class of uncertain underactuated systems with actuator saturation. Int. J. Hybrid Intell. Syst. 12(3): 171-184 (2015) - [c7]Vibha Tiwari, P. P. Bansod, Abhay Kumar
:
Medical imaging in heterogeneous telemedicine network. ICICS 2015: 1-5 - [c6]Sudhir Kumar
, Abhay Kumar, Akshay Kumar, Rajesh M. Hegde:
Hybrid maximum depth-kNN method for real time node tracking using multi-sensor data. ICC 2015: 6652-6657 - 2012
- [c5]Abhay Kumar, Ramnish Sinha, Vandana Bhattacherjee, Daya Shankar Verma, Satendra Singh:
Modeling using K-means clustering algorithm. RAIT 2012: 554-558 - 2011
- [j1]Debashis Mondal, Abhay Kumar, Arijit Bishnu, Krishnendu Mukhopadhyaya
, Subhas C. Nandy:
Measuring the Quality of Surveillance in a Wireless Sensor Network. Int. J. Found. Comput. Sci. 22(4): 983-998 (2011) - [c4]Sylvain Clerc, Fady Abouzeid
, Fabrice Argoud, Abhay Kumar, Rajesh Kumar, Philippe Roche:
A 240mV 1MHz, 340mV 10MHz, 40nm CMOS, 252 bits frame decoder using ultra-low voltage circuit design platform. ICECS 2011: 117-120
2000 – 2009
- 2007
- [c3]Kalyanmoy Deb, Abhay Kumar
:
Light beam search based multi-objective optimization using evolutionary algorithms. IEEE Congress on Evolutionary Computation 2007: 2125-2132 - [c2]Deepak Sharma
, Abhay Kumar
, Kalyanmoy Deb, Karthik Sindhya:
Hybridization of SBX based NSGA-II and sequential quadratic programming for solving multi-objective optimization problems. IEEE Congress on Evolutionary Computation 2007: 3003-3010 - [c1]Abhay Kumar
, Deepak Sharma
, Kalyanmoy Deb:
A hybrid multi-objective optimization procedure using PCX based NSGA-II and sequential quadratic programming. IEEE Congress on Evolutionary Computation 2007: 3011-3018
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-04-28 22:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint