An object detection approach for detecting damages in heritage sites using 3-D point clouds and 2-D visual data R Pathak, A Saini, A Wadhwa, H Sharma, D Sangwan Journal of Cultural Heritage 48, 74-82, 2021 | 25 | 2021 |
An end-to-end trainable framework for joint optimization of document enhancement and recognition A Ray, M Sharma, A Upadhyay, M Makwana, S Chaudhury, A Trivedi, ... 2019 international conference on document analysis and recognition (ICDAR …, 2019 | 21 | 2019 |
The darker side of firefox extension A Saini, MS Gaur, V Laxmi Proceedings of the 6th International Conference on Security of Information …, 2013 | 14 | 2013 |
A secure priority vehicle movement based on blockchain technology in connected vehicles A Saini, S Sharma, P Jain, V Sharma, AK Khandelwal Proceedings of the 12th International Conference on Security of Information …, 2019 | 12 | 2019 |
Robust image colorization using self attention based progressive generative adversarial network M Sharma, M Makwana, A Upadhyay, A Pratap Singh, A Badhwar, ... Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2019 | 11 | 2019 |
Colluding browser extension attack on user privacy and its implication for web browsers A Saini, MS Gaur, V Laxmi, M Conti Computers & Security 63, 14-28, 2016 | 10 | 2016 |
Using modularity metrics as design features to guide evolution in genetic programming AK Saini, L Spector Genetic Programming Theory and Practice XVII, 165-180, 2020 | 9 | 2020 |
Effect of parent selection methods on modularity AK Saini, L Spector Genetic Programming: 23rd European Conference, EuroGP 2020, Held as Part of …, 2020 | 8 | 2020 |
You click, I steal: analyzing and detecting click hijacking attacks in web pages A Saini, MS Gaur, V Laxmi, M Conti International Journal of Information Security 18, 481-504, 2019 | 7 | 2019 |
Why and when are loops useful in genetic programming? AK Saini, L Spector Proceedings of the 2020 Genetic and Evolutionary Computation Conference …, 2020 | 5 | 2020 |
Privacy leakage attacks in browsers by colluding extensions A Saini, MS Gaur, V Laxmi, T Singhal, M Conti Information Systems Security: 10th International Conference, ICISS 2014 …, 2014 | 5 | 2014 |
A survey on biometric cryptosystems and their applications S Sharma, A Saini, S Chaudhury Computers & Security, 103458, 2023 | 4 | 2023 |
Deep learning methods for scientific and industrial research AS GK Patra, Kantha Rao Bhimala, Ashapurna Marndi, Saikat Chowdhury, Jarjish ... | 4* | 2023 |
sandfox: Secure sandboxed and isolated environment for firefox browser A Saini, MS Gaur, V Laxmi, P Nanda Proceedings of the 8th International Conference on Security of Information …, 2015 | 3 | 2015 |
A taxonomy of browser attacks A Saini, MS Gaur, V Laxmi Handbook of Research on Digital Crime, Cyberspace Security, and Information …, 2015 | 3 | 2015 |
Ancient indian murals digital restoration through image inpainting U Singh, S Maiti, A Saini 2023 10th International Conference on Signal Processing and Integrated …, 2023 | 2 | 2023 |
Insecurities within browser: issues and challenges MS Gaur, D Patel, A Saini Proceedings of the 6th International Conference on Security of Information …, 2013 | 2 | 2013 |
Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network S Sharma, A Saini, S Chaudhury Journal of Information Security and Applications 82, 103740, 2024 | 1 | 2024 |
Gradually Growing Residual and Self-attention Based Dense Deep Back Projection Network for Large Scale Super-Resolution of Image M Sharma, A Upadhyay, AP Singh, M Makwana, S Bhugra, B Lall, ... Pattern Recognition and Machine Intelligence: 8th International Conference …, 2019 | | 2019 |
Attacks And Mitigation In Web Browsers... A Saini MNIT Jaipur, 2015 | | 2015 |