Alert button
Picture for Aditya Pandey

Aditya Pandey

Alert button

Cross-Domain Shopping and Stock Trend Analysis

Add code
Bookmark button
Alert button
Dec 23, 2022
Aditya Pandey, Haseeba Fathiya, Nivedita Patel

Figure 1 for Cross-Domain Shopping and Stock Trend Analysis
Figure 2 for Cross-Domain Shopping and Stock Trend Analysis
Figure 3 for Cross-Domain Shopping and Stock Trend Analysis
Figure 4 for Cross-Domain Shopping and Stock Trend Analysis
Viaarxiv icon

Cross-Domain Consumer Review Analysis

Add code
Bookmark button
Alert button
Dec 23, 2022
Aditya Pandey, Kunal Joshi

Figure 1 for Cross-Domain Consumer Review Analysis
Figure 2 for Cross-Domain Consumer Review Analysis
Figure 3 for Cross-Domain Consumer Review Analysis
Figure 4 for Cross-Domain Consumer Review Analysis
Viaarxiv icon

Deployment of ML Models using Kubeflow on Different Cloud Providers

Add code
Bookmark button
Alert button
Jun 27, 2022
Aditya Pandey, Maitreya Sonawane, Sumit Mamtani

Figure 1 for Deployment of ML Models using Kubeflow on Different Cloud Providers
Figure 2 for Deployment of ML Models using Kubeflow on Different Cloud Providers
Figure 3 for Deployment of ML Models using Kubeflow on Different Cloud Providers
Figure 4 for Deployment of ML Models using Kubeflow on Different Cloud Providers
Viaarxiv icon

Detecting and Localizing Copy-Move and Image-Splicing Forgery

Add code
Bookmark button
Alert button
Feb 08, 2022
Aditya Pandey, Anshuman Mitra

Figure 1 for Detecting and Localizing Copy-Move and Image-Splicing Forgery
Figure 2 for Detecting and Localizing Copy-Move and Image-Splicing Forgery
Figure 3 for Detecting and Localizing Copy-Move and Image-Splicing Forgery
Viaarxiv icon

Intrusion Detection using Sequential Hybrid Model

Add code
Bookmark button
Alert button
Oct 29, 2019
Aditya Pandey, Abhishek Sinha, Aishwarya PS

Figure 1 for Intrusion Detection using Sequential Hybrid Model
Figure 2 for Intrusion Detection using Sequential Hybrid Model
Figure 3 for Intrusion Detection using Sequential Hybrid Model
Figure 4 for Intrusion Detection using Sequential Hybrid Model
Viaarxiv icon