default search action
Rajeev Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Avinash Anand, Raj Jaiswal, Mohit Gupta, Siddhesh S. Bangar, Pijush Bhuyan, Naman Lal, Rajeev Singh, Ritika Jha, Rajiv Ratn Shah, Shin'ichi Satoh:
RanLayNet: A Dataset for Document Layout Detection used for Domain Adaptation and Generalization. CoRR abs/2404.09530 (2024) - 2023
- [c9]Anjani Kumar Rai, Parul Madan, Irfan Khan, V. Divya Vani, Rajeev Singh, Narendra Singh:
Parking Slot Estimation and Occupancy Prediction using LSTM and CNN. IC3I 2023: 2689-2694 - [c8]Avinash Anand, Raj Jaiswal, Mohit Gupta, Siddhesh S. Bangar, Pijush Bhuyan, Naman Lal, Rajeev Singh, Ritika Jha, Rajiv Ratn Shah, Shin'ichi Satoh:
RanLayNet: A Dataset for Document Layout Detection used for Domain Adaptation and Generalization. MMAsia 2023: 74:1-74:6 - 2021
- [j5]Rajeev Singh, Sukhwinder Singh:
A Lightweight Security Scheme (LSS) for Wireless Node Communication for Border Surveillance System. J. Cyber Secur. Mobil. 10(4): 641-662 (2021) - 2020
- [j4]Rajeev Singh, Sudeep Tanwar, Teek Parval Sharma:
Utilization of blockchain for mitigating the distributed denial of service attacks. Secur. Priv. 3(3) (2020) - [i1]Jaydip Sen, Sidra Mehtab, Michael Ekonde Sone, Jyothsna Veeramreddy, Koneti Munivara Prasad, Rajeev Singh, Teek Parval Sharma, Anton Noskov, Ignacio Velásquez, Angélica Caro, Alfonco Rodriguez, Tamer S. A. Fatayer, Altaf O. Mulani, Pradeep B. Mane, Roshan Chitrakar, Roshan Bhusal, Prajwol Maharjan:
Computer and Network Security. CoRR abs/2007.16147 (2020)
2010 – 2019
- 2018
- [c7]Bhanu Teja Vankayalapati, Rajeev Singh, Vinod Kumar Bussa:
Two stage integrated on-board charger for EVs. ICIT 2018: 1807-1813 - 2015
- [j3]Rajeev Singh, Teek Parval Sharma:
A location-based method for restricting the flooding DoS effect in WLANs. J. Locat. Based Serv. 9(4): 273-295 (2015) - [j2]Rajeev Singh, Teek Parval Sharma:
On the IEEE 802.11i security: a denial-of-service perspective. Secur. Commun. Networks 8(7): 1378-1407 (2015) - 2014
- [j1]Rajeev Singh, Teek Parval Sharma:
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security. Wirel. Pers. Commun. 77(2): 1145-1165 (2014) - 2013
- [c6]Ravitashaw Bathla, Shubham Jain, Rajeev Singh:
Introducing a Novel Parameter in Generation of Course Timetable with Genetic Algorithm. SocProS (1) 2013: 321-332 - [c5]Rajeev Singh, Teek Parval Sharma:
A sequence number based WLAN authentication scheme for reducing the MIC field overhead. WOCN 2013: 1-4
2000 – 2009
- 2008
- [c4]Rajeev Singh, Suman Das, Durga Toshniwal, Manoj Mishra, Ramesh C. Joshi:
E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks. ICETET 2008: 1244-1249 - [c3]Suman Das, Rajeev Singh, Ramesh C. Joshi, Durga Toshiwal:
Reducing the Effect of Distributed Directory Harvest Attack and Load of Mail Server. ICIIS 2008: 1-6
1990 – 1999
- 1997
- [c2]Reena Singh, Ramón E. Vásquez, Rajeev Singh:
Wavelet transform and SGLDM: a classification performance study using ML parameter estimation, minimum distance, and k-nearest-neighbor classifiers. Visual Information Processing 1997: 142-150 - [c1]Rajeev Singh, Ramón E. Vásquez, Reena Singh:
Comparison of Daubechies, Coiflet, and Symlet for edge detection. Visual Information Processing 1997: 151-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint