default search action
Ayush Sharma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Ayush Sharma, Dongping Guo, Arsh Parmar, Jianye Ge, Hongmin Li:
Promoting Sign Language Awareness: A Deep Learning Web Application for Sign Language Recognition. ICDLT 2024: 22-28 - 2023
- [j4]Sumeet Saurav, Ayush Sharma, Ravi Saini, Sanjay Singh:
An attention-guided convolutional neural network for automated classification of brain tumor from MRI. Neural Comput. Appl. 35(3): 2541-2560 (2023) - [c9]Kumar Satyam, Ayush Sharma, Runumi Devi:
Implementing Blockchain Based Security in EHR Using Ganache. IC3I 2023: 276-284 - [c8]Ayush Sharma, Yash Mehan, Pradyumna Dasu, Sourav Garg, K. Madhava Krishna:
Hierarchical Unsupervised Topological SLAM. ITSC 2023: 4623-4628 - [i5]Ayush Sharma, Yash Mehan, Pradyumna Dasu, Sourav Garg, Madhava Krishna:
Hierarchical Unsupervised Topological SLAM. CoRR abs/2310.04802 (2023) - 2022
- [j3]Shweta Chauhan, Philemon Daniel, Shefali Saxena, Ayush Sharma:
Fully Unsupervised Machine Translation Using Context-Aware Word Translation and Denoising Autoencoder. Appl. Artif. Intell. 36(1) (2022) - 2021
- [j2]Shweta Singh, Ayush Sharma, Alankrita Aggarwal:
Performance Comparison of Image Processing Techniques on Various Filters: A Review. Int. J. Secur. Priv. Pervasive Comput. 13(3): 34-42 (2021) - 2020
- [i4]Ruskin Raj Manku, Ayush Sharma, Anand Panchbhai:
Malaria Detection and Classificaiton. CoRR abs/2011.14329 (2020)
2010 – 2019
- 2019
- [i3]Shreyansh Singh, Avi Chawla, Ayush Sharma, Anil Kumar Singh:
IIT (BHU) Varanasi at MSR-SRST 2018: A Language Model Based Approach for Natural Language Generation. CoRR abs/1904.06234 (2019) - 2017
- [i2]Ayush Sharma, Piyush Bajpai, Sukhdev Singh, Kiran Khatter:
Virtual Reality: Blessings and Risk Assessment. CoRR abs/1708.09540 (2017) - 2016
- [j1]Martin Jelemenský, Ayush Sharma, Radoslav Paulen, Miroslav Fikar:
Time-optimal control of diafiltration processes in the presence of membrane fouling. Comput. Chem. Eng. 91: 343-351 (2016) - 2015
- [c7]Ayush Sharma, Komal Agarwal, Rahul Dubey, Sandip Bhaumik, Samudrala Nagaraju:
S-fit: Knowledge guided fitness pattern mining framework. BIBM 2015: 875-882 - [c6]Ayush Sharma, David V. Anderson:
Deep emotion recognition using prosodic and spectral feature extraction and classification based on cross validation and bootstrap. SP/SPE 2015: 421-425 - [i1]Andreas Veit, Michael J. Wilber, Rajan Vaish, Serge J. Belongie, James Davis, Vishal Anand, Anshu Aviral, Prithvijit Chakrabarty, Yash Chandak, Sidharth Chaturvedi, Chinmaya Devaraj, Ankit Dhall, Utkarsh Dwivedi, Sanket Gupte, Sharath N. Sridhar, Karthik Paga, Anuj Pahuja, Aditya Raisinghani, Ayush Sharma, Shweta Sharma, Darpana Sinha, Nisarg Thakkar, K. Bala Vignesh, Utkarsh Verma, Kanniganti Abhishek, Amod Agrawal, Arya Aishwarya, Aurgho Bhattacharjee, Sarveshwaran Dhanasekar, Venkata Karthik Gullapalli, Shuchita Gupta, Chandana G, Kinjal Jain, Simran Kapur, Meghana Kasula, Shashi Kumar, Parth Kundaliya, Utkarsh Mathur, Alankrit Mishra, Aayush Mudgal, Aditya Nadimpalli, Munakala Sree Nihit, Akanksha Periwal, Ayush Sagar, Ayush Shah, Vikas Sharma, Yashovardhan Sharma, Faizal Siddiqui, Virender Singh, Abhinav S., Pradyumna Tambwekar, Rashida Taskin, Ankit Tripathi, Anurag D. Yadav:
On Optimizing Human-Machine Task Assignments. CoRR abs/1509.07543 (2015) - 2013
- [c5]Jongmoo Choi, Ayush Sharma, Gérard G. Medioni:
Comparing strategies for 3D face recognition from a 3D sensor. RO-MAN 2013: 19-24 - 2012
- [c4]Sathyanarayanan Rangarajan, Monica Verma, Anand Kannan, Ayush Sharma, Ingmar Schoen:
V2C: a secure vehicle to cloud framework for virtualized and on-demand service provisioning. ICACCI 2012: 148-154 - [c3]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Volker Fusenig, Peter Schoo:
N-ary tree based key distribution in a network as a service provisioning model. ICACCI 2012: 952-960 - [c2]Volker Fusenig, Ayush Sharma:
Security architecture for cloud networking. ICNC 2012: 45-49 - [c1]Anand Kannan, Gerald Q. Maguire Jr., Ayush Sharma, Peter Schoo:
Genetic Algorithm Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Networks. ICDM Workshops 2012: 416-423
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint