default search action
Shan Suthaharan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Shan Suthaharan:
Modeling and simulation of a Tamil language encoder for advanced encryption technologies. Patterns 4(7): 100740 (2023) - [c31]Adarsh Gadari, Sandeep Chandra Bollepalli, Mohammed Nasar Ibrahim, José-Alain Sahel, Jay Chhablani, Shan Suthaharan, Kiran Kumar Vupparaboina:
Robust Retinal Layer Segmentation Using OCT B-Scans: A Novel Approach Based on Pix2Pix Generative Adversarial Network. BCB 2023: 52:1-52:6 - [c30]Shan Suthaharan:
Fall Detection using Machine Learning Techniques and Frequency-Driven Riemannian Manifolds. ICMLA 2023: 194-201 - [c29]Shan Suthaharan, Lee Daniel M. W., Min Zhang, Ethan A. Rossi:
Microsaccade Segmentation using Directional Variance Analysis and Artificial Neural Networks. IRI 2023: 1-6 - [i5]Amitabha Dey, Shan Suthaharan:
LDEB - Label Digitization with Emotion Binarization and Machine Learning for Emotion Recognition in Conversational Dialogues. CoRR abs/2306.02193 (2023) - 2021
- [j22]Firoozeh Karimi, Selima Sultana, Ali Shirzadi Babakan, Shan Suthaharan:
Urban expansion modeling using an enhanced decision tree algorithm. GeoInformatica 25(4): 715-731 (2021) - [c28]Gunjan Chhablani, Abheesht Sharma, Harshit Pandey, Yash Bhartia, Shan Suthaharan:
NLRG at SemEval-2021 Task 5: Toxic Spans Detection Leveraging BERT-based Token Classification and Span Prediction Techniques. SemEval@ACL/IJCNLP 2021: 233-242 - [i4]Gunjan Chhablani, Yash Bhartia, Abheesht Sharma, Harshit Pandey, Shan Suthaharan:
NLRG at SemEval-2021 Task 5: Toxic Spans Detection Leveraging BERT-based Token Classification and Span Prediction Techniques. CoRR abs/2102.12254 (2021) - [i3]Aishwarya Gouru, Shan Suthaharan:
Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning. CoRR abs/2112.02729 (2021) - 2020
- [j21]Shan Suthaharan:
A low-sensitivity quantitative measure for traffic safety data analytics. Int. J. Data Sci. Anal. 9(2): 241-256 (2020) - [j20]Shan Suthaharan, Ethan A. Rossi, Valerie Snyder, Jay Chhablani, Raphael Lejoyeux, José-Alain Sahel, Kunal K. Dansingani:
Laplacian feature detection and feature alignment for multimodal ophthalmic image registration using phase correlation and Hessian affine feature space. Signal Process. 177: 107733 (2020) - [c27]Ritu Joshi, Shan Suthaharan:
Pixel-Level Feature Space Modeling and Brain Tumor Detection Using Machine Learning. ICMLA 2020: 821-826
2010 – 2019
- 2019
- [j19]Shan Suthaharan, Weining Shen:
Elliptical modeling and pattern analysis for perturbation models and classification. Int. J. Data Sci. Anal. 7(2): 103-113 (2019) - [j18]Firoozeh Karimi, Selima Sultana, Ali Shirzadi Babakan, Shan Suthaharan:
An enhanced support vector machine model for urban expansion prediction. Comput. Environ. Urban Syst. 75: 61-75 (2019) - [j17]Shan Suthaharan:
Big data analytics: Machine learning and Bayesian learning perspectives - What is done? What is not? WIREs Data Mining Knowl. Discov. 9(1) (2019) - [c26]Suprateek Kundu, Shan Suthaharan:
Privacy-Preserving Predictive Model Using Factor Analysis for Neuroscience Applications. BigDataSecurity/HPSC/IDS 2019: 67-73 - [c25]Selvarajah Mohanarajah, Gregorry Ross, Shan Suthaharan:
Towards Encapsulated Cyber Security Labs: A Container Based Approach. SIGCSE 2019: 1267 - 2018
- [c24]Shan Suthaharan:
Characterization of differentially private logistic regression. ACM Southeast Regional Conference 2018: 15:1-15:8 - [c23]Shan Suthaharan:
A software engineering schema for data intensive applications. ACM Southeast Regional Conference 2018: 23:1-23:8 - [c22]Vishali Vadakattu, Shan Suthaharan:
Feature Extraction Using Apparent Power and Real Power for Smart Home Data Classification. ICMLA 2018: 1290-1295 - [i2]David Santana, Shan Suthaharan, Somya D. Mohanty:
What we learn from learning - Understanding capabilities and limitations of machine learning in botnet attacks. CoRR abs/1805.01333 (2018) - 2017
- [i1]Shan Suthaharan:
A fatal point concept and a low-sensitivity quantitative measure for traffic safety analytics. CoRR abs/1711.10131 (2017) - 2016
- [c21]Shan Suthaharan, Weining Shen:
Pairing of most relevant variables and bootstrap samples with ridge regression for data sharing. CNS 2016: 384-385 - [c20]Shan Suthaharan:
A correlation-based subspace analysis for data confidentiality and classification as utility in CPS. CNS 2016: 426-431 - 2014
- [j16]Shan Suthaharan:
Big data classification: problems and challenges in network intrusion prediction with machine learning. SIGMETRICS Perform. Evaluation Rev. 41(4): 70-73 (2014) - [j15]Jeff Whitworth, Shan Suthaharan:
Security problems and challenges in a machine learning-based hybrid big data processing network systems. SIGMETRICS Perform. Evaluation Rev. 41(4): 82-85 (2014) - [c19]Kiranmayi Kotipalli, Shan Suthaharan:
Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification. RIIT 2014: 75-80 - [c18]Shan Suthaharan:
FLaSKU - a classroom experience with teaching computer networking: is it useful to others in the field? SIGITE 2014: 15-20 - 2013
- [c17]Shan Suthaharan, Laxmi Sunkara, Sweta Keshapagu:
Lame' curve-based signature discovery learning technique for network traffic classification. ISI 2013: 321-326 - [c16]Shan Suthaharan:
A Single-Domain, Representation-Learning Model for Big Data Classification of Network Intrusion. MLDM 2013: 296-310 - 2012
- [c15]Shan Suthaharan:
A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection. ISI 2012: 150-152 - 2010
- [j14]Shan Suthaharan:
Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J. Inf. Secur. 2010 (2010) - [c14]Shan Suthaharan, Christopher Leckie, Masud Moshtaghi, Shanika Karunasekera, Sutharshan Rajasegarar:
Sensor data boundary estimation for anomaly detection in wireless sensor networks. MASS 2010: 546-551
2000 – 2009
- 2009
- [j13]Shan Suthaharan:
No-reference visually significant blocking artifact metric for natural scene images. Signal Process. 89(8): 1647-1652 (2009) - [c13]Shan Suthaharan:
Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems. ICIAR 2009: 439-450 - [c12]Shan Suthaharan, Abhinav Chawade, Rittwik Jana, Jing Deng:
Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks. WASA 2009: 459-468 - 2008
- [c11]Amy R. Reibman, Shan Suthaharan:
A no-reference Spatial Aliasing Measure for digital image resizing. ICIP 2008: 1184-1187 - [c10]Shan Suthaharan:
Chaos-based image encryption scheme using Galois field for fast and secure transmission. Real-Time Image Processing 2008: 681105 - 2007
- [j12]Shan Suthaharan:
Reduction of queue oscillation in the next generation Internet routers. Comput. Commun. 30(18): 3881-3891 (2007) - 2005
- [p1]Zhongwei Zhang, Zhi Li, Shan Suthaharan:
Fuzzy Logic Strategy of Prognosticating TCP's Timeout and Retransmission. Computational Intelligence for Modelling and Prediction 2005: 309-320 - 2004
- [j11]Shan Suthaharan:
Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognit. Lett. 25(16): 1893-1903 (2004) - [j10]Shan Suthaharan, Mrinal K. Mandal:
Low bit-rate multimedia communication. Real Time Imaging 10(5): 275-276 (2004) - [c9]Shan Suthaharan:
Markov Model Based Congestion Control for TCP. Annual Simulation Symposium 2004: 285-292 - [c8]Seong-Whan Kim, Shan Suthaharan:
Perceptually Tuned Packet Scheduler for Video Streaming for DAB Based Access GRID. GCC 2004: 967-970 - [c7]Seong-Whan Kim, Shan Suthaharan:
An Entropy Masking Model for Multimedia Content Watermarking. HICSS 2004 - 2003
- [c6]Shan Suthaharan:
A perceptually significant block-edge impairment metric for digital video coding. ICASSP (3) 2003: 681-684 - [c5]Shan Suthaharan:
A perceptually significant block-edge impairment metric for digital video coding. ICME 2003: 585-588 - 2002
- [c4]Zhongwei Zhang, Zhi Li, Shan Suthaharan:
Fuzzy Logic Strategy of Prognosticating TCP's Timeout ad Retransmission. FSKD 2002: 310-313 - 2001
- [j9]Seong-Whan Kim, Shan Suthaharan, Heung-Kyu Lee, K. R. Rao:
MPEG-compliant joint source/channel coding using discrete cosine transform and substream scheduling for visual communication over packet networks. J. Electronic Imaging 10(1): 329-338 (2001) - 2000
- [j8]Shan Suthaharan, Seong-Whan Kim, Heung-Kyu Lee, Sivapragasam Sathananthan:
Perceptually tuned robust watermarking scheme for digital images. Pattern Recognit. Lett. 21(2): 145-149 (2000) - [j7]Shan Suthaharan:
Image and edge detail detection algorithm for object-based coding. Pattern Recognit. Lett. 21(6-7): 549-557 (2000) - [j6]Shan Suthaharan, Sivapragasam Sathananthan, Carl Pantsios Markhauser, Ling Guan:
Guest Editorial: Special Issue on Real-Time Digital Video over Multimedia Networks. Real Time Imaging 6(5): 325-326 (2000) - [c3]Shan Suthaharan, Hong Ren Wu, K. R. Rao:
Perceptually most significant edge detection algorithm for object-based coding. VCIP 2000: 328-335
1990 – 1999
- 1999
- [j5]Shan Suthaharan, Sivapragasam Sathananthan, Carl Pantsios Markhauser, Ling Guan:
Guest Editorial: Special Issue on Real-Time Digital Video over Multimedia Networks. Real Time Imaging 5(5): 293-294 (1999) - [j4]Seong-Whan Kim, Shan Suthaharan, Geun-Ho Lee, Heung-Kyu Lee, K. R. Rao:
Joint Source/Channel Coding to Maximize Perceptual Video Quality on Packet Networks. Real Time Imaging 5(5): 329-339 (1999) - [j3]Bin Qiu, Shan Suthaharan, Hong Ren Wu:
Neuro-Fuzzy Modeling and Prediction of VBR MPEG Video Sources. Real Time Imaging 5(5): 359-363 (1999) - 1997
- [c2]Shan Suthaharan, Zhongwei Zhang:
SNR Optimization Using Genetic Algorithm. ICIP (1) 1997: 295-297 - 1996
- [j2]Shan Suthaharan, S. Ray:
Generation of signal-uncorrelated noise for control experiments in image restoration. Pattern Recognit. Lett. 17(3): 219-230 (1996) - [c1]Shan Suthaharan, Hong Ren Wu:
Adaptive-Neighbourhood Image Filtering for Mpeg-1 Coded Images. ISSPA 1996: 166-167 - 1994
- [j1]Shan Suthaharan:
New SNR estimate for the Wiener filter to image restoration. J. Electronic Imaging 3(4): 379-389 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint