default search action
Bhawana Rudra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Suman Kumar Roy, Bhawana Rudra:
Quantum-inspired hybrid algorithm for image classification and segmentation: Q-Means++ max-cut method. Int. J. Imaging Syst. Technol. 34(1) (2024) - [c16]Saksham Goel, Sarvesh V. Sawant, Bhawana Rudra:
Secure Decentralized Carpooling Application Using Blockchain and Zero Knowledge Proof. IoTBDS 2024: 260-267 - 2023
- [j10]M. Revanesh, Bhawana Rudra, Ram Mohana Reddy Guddeti:
An Optimized Question Classification Framework Using Dual-Channel Capsule Generative Adversarial Network and Atomic Orbital Search Algorithm. IEEE Access 11: 75736-75747 (2023) - [j9]Praveen M. Naik, Bhawana Rudra:
Classification of Arecanut X-Ray Images for Quality Assessment Using Adaptive Genetic Algorithm and Deep Learning. IEEE Access 11: 127619-127636 (2023) - [j8]Aprameya Dash, Mohit Awachar, Anshul Patel, Bhawana Rudra:
Open-Domain Long-Form Question-Answering Using Transformer-Based Pipeline. SN Comput. Sci. 4(5): 595 (2023) - [c15]Sandeep Chouhan, Bhawana Rudra:
Autoencoder-Based Anomaly Detection in ECG Image Time Series Data: A Comparative Evaluation of Three Different Architectures. ICCCNT 2023: 1-6 - [c14]Krish Kumar, Nilesh Pingale, Bhawana Rudra:
Face Detection and Recognition Using OpenCV and Vision Transformer. ICCCNT 2023: 1-6 - [c13]Amrit Mohapatra, Natasha Jain, Bhawana Rudra:
Intrusion Detection System in Networks Employing a Double-Layer Architecture Using Machine Learning Algorithms. ICCCNT 2023: 1-7 - 2022
- [j7]Mummadi Swathi, Bhawana Rudra:
A Novel Approach for Asymmetric Quantum Error Correction With Syndrome Measurement. IEEE Access 10: 44669-44676 (2022) - [j6]A. Sujan Reddy, Bhawana Rudra:
Detection of injections in API requests using recurrent neural networks and transformers. Int. J. Electron. Secur. Digit. Forensics 14(6): 638-658 (2022) - [c12]Mummadi Swathi, Bhawana Rudra:
Novel Encoding method for Quantum Error Correction. CCWC 2022: 1001-1005 - [c11]Vivek Kumar Agrawal, Bhawana Rudra:
Performance Evaluation of Signature Based and Anomaly Based Techniques for Intrusion Detection. ISDA (4) 2022: 496-505 - [c10]Mummadi Swathi, Bhawana Rudra:
Experimental Analysis of a Quantum Encoder in Various Quantum Systems. UEMCON 2022: 138-143 - 2021
- [j5]Akshara P, Bhawana Rudra:
Study of a Hybrid Approach Towards Malware Detection in Executable Files. SN Comput. Sci. 2(4): 275 (2021) - [c9]Sujan Reddy A, Bhawana Rudra:
Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests. CCWC 2021: 936-941 - [c8]Mummadi Swathi, Bhawana Rudra:
Implementation of Reversible Logic Gates with Quantum Gates. CCWC 2021: 1557-1563 - [c7]Vishakh Rao, K. U. Hemanth, Bhawana Rudra:
Comparison of Algorithms for Style Transfer of Images Using Texture Synthesis. ICMC 2021: 219-236 - [c6]Manaswita Datta, Bhawana Rudra:
Prediction of Credibility of Football Player Rating Using Data Analytics. ISDA 2021: 775-786 - [c5]Sunil Kumar, Rohit Kumar Sahu, Bhawana Rudra:
DDoS Attack Detection on IoT Devices Using Machine Learning Techniques. ISDA 2021: 787-794 - [c4]A. Sujan Reddy, S. Akashdeep, S. Sowmya Kamath, Bhawana Rudra:
Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning. ISDA 2021: 859-869 - 2020
- [c3]Madhuparna Bhowmik, Arpitha Raghunandan, Bhawana Rudra:
Distributed Adaptive Video Streaming using Inter-Server Data Distribution and Agent-based Adaptive Load Balancing. DCOSS 2020: 273-280 - [c2]Y. C. Satish, Bhawana Rudra:
ATM Theft Investigation Using Convolutional Neural Network. FICTA (2) 2020: 21-29 - [c1]Ajaykumar K. B., Bhawana Rudra:
Machine Learning Techniques for the Investigation of Phishing Websites. FICTA (1) 2020: 55-64
2010 – 2019
- 2016
- [j4]Bhawana Rudra, Om Prakash Vyas:
Investigation of security issues for service-oriented network architecture. Secur. Commun. Networks 9(10): 1025-1039 (2016) - 2015
- [j3]Bhawana Rudra, A. P. Manu, O. P. Vyas:
Service-oriented network architecture: significant issues and principles of communication. Int. J. Comput. Sci. Eng. 10(3): 306-314 (2015) - [j2]Bhawana Rudra, O. P. Vyas:
Exploration of access control mechanisms for service-oriented network architecture. Int. J. Internet Protoc. Technol. 9(1): 1-11 (2015) - [j1]Bhawana Rudra, O. P. Vyas:
Understanding and mitigating security and authentication issues in service oriented network architecture. Int. J. Secur. Networks 10(1): 9-19 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 01:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint