Alert button
Picture for Rajesh Kumar

Rajesh Kumar

Alert button

Dublin Business School, Dublin, Ireland

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jun 15, 2021
Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Figure 1 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 2 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 3 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Figure 4 for Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks
Viaarxiv icon

Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists

Add code
Bookmark button
Alert button
Jun 14, 2021
Mahak Sharma, Abhishek Kaushik, Rajesh Kumar, Sushant Kumar Rai, Harshada Hanumant Desai, Sargam Yadav

Figure 1 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 2 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 3 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Figure 4 for Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists
Viaarxiv icon

Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties

Add code
Bookmark button
Alert button
Apr 22, 2021
Rajesh Kumar, WenYong Wang, Cheng Yuan, Jay Kumar, Zakria, He Qing, Ting Yang, Abdullah Aman Khan

Figure 1 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 2 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 3 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Figure 4 for Privacy-Preserved Blockchain-Federated-Learning for Medical Image Analysis Towards Multiple Parties
Viaarxiv icon

IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology

Add code
Bookmark button
Alert button
Feb 26, 2021
Rajesh Kumar, WenYong Wang, Jay Kumar, Zakria, Ting Yang, Waqar Ali, Abubackar Sharif

Figure 1 for IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology
Figure 2 for IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology
Figure 3 for IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology
Figure 4 for IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology
Viaarxiv icon

A note on synthesizing geodesic based contact curves

Add code
Bookmark button
Alert button
Feb 21, 2021
Rajesh Kumar, Sudipto Mukherjee

Figure 1 for A note on synthesizing geodesic based contact curves
Figure 2 for A note on synthesizing geodesic based contact curves
Figure 3 for A note on synthesizing geodesic based contact curves
Figure 4 for A note on synthesizing geodesic based contact curves
Viaarxiv icon

Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review

Add code
Bookmark button
Alert button
Feb 19, 2021
Zakria, Jianhua Deng, Muhammad Saddam Khokhar, Muhammad Umar Aftab, Jingye Cai, Rajesh Kumar, Jay Kumar

Figure 1 for Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review
Figure 2 for Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review
Figure 3 for Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review
Figure 4 for Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review
Viaarxiv icon

A Subword Guided Neural Word Segmentation Model for Sindhi

Add code
Bookmark button
Alert button
Dec 30, 2020
Wazir Ali, Jay Kumar, Zenglin Xu, Congjian Luo, Junyu Lu, Junming Shao, Rajesh Kumar, Yazhou Ren

Figure 1 for A Subword Guided Neural Word Segmentation Model for Sindhi
Figure 2 for A Subword Guided Neural Word Segmentation Model for Sindhi
Figure 3 for A Subword Guided Neural Word Segmentation Model for Sindhi
Figure 4 for A Subword Guided Neural Word Segmentation Model for Sindhi
Viaarxiv icon

Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication

Add code
Bookmark button
Alert button
Dec 17, 2020
Rajesh Kumar, Can Isik, Vir V Phoha

Figure 1 for Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Figure 2 for Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Figure 3 for Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Figure 4 for Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication
Viaarxiv icon