Deep learning approach on network intrusion detection system using NSL-KDD dataset S Gurung, MK Ghose, A Subedi International Journal of Computer Network and Information Security 11 (3), 8-14, 2019 | 159 | 2019 |
Analysis of image steganography techniques: a survey P Rai, S Gurung, MK Ghose International Journal of Computer Applications 114 (1), 2015 | 27 | 2015 |
A survey on underwater object detection P Sarkar, S De, S Gurung Intelligence Enabled Research: DoSIER 2021, 91-104, 2022 | 13 | 2022 |
Multiple Information Hiding Using Circular Random Grids MKG Sandeep Gurung, Mirnaldeep Chakravorty International Conference on Computer, Communication and Convergence (ICCC …, 2015 | 9* | 2015 |
Efficacy of entomopathogens for control of blue pumpkin beetle (Aulacophora nigripennis Motschulsky, 1857) in sponge gourd (Luffa cylindrica) under laboratory condition at … SS Bhattarai, S Koirala Bishwokarma, S Gurung, P Dhami, ... GJBAHS 5 (2), 102-105, 2016 | 8 | 2016 |
Recursive information hiding in threshold visual cryptography scheme SG Lekhika Chhetri International Journal of Emerging Technology and Advanced Engineering 3 …, 2013 | 8 | 2013 |
Consumption of licit and illicit substances leading to mental illness: a prevalence study B Chhetri, LM Goyal, M Mittal, S Gurung EAI Endorsed Transactions on Pervasive Health and Technology 6 (21), e5-e5, 2020 | 6 | 2020 |
A novel approach for circular random grid with share authentication S Gurung, B Chhetri, MK Ghose 2015 International Conference on Advances in Computing, Communications and …, 2015 | 6 | 2015 |
Multiple image encryption using random circular grids and recursive image hiding S Gurung, G Ojha, MK Ghose International Journal of Computer Applications 86 (10), 2014 | 6 | 2014 |
An overview of 51% attack over Bitcoin network RS Raju, S Gurung, P Rai Contemporary Issues in Communication, Cloud and Big Data Analytics …, 2022 | 5 | 2022 |
Fish detection from underwater images using YOLO and its challenges P Sarkar, S De, S Gurung Doctoral Symposium on intelligence enabled research, 149-159, 2022 | 4 | 2022 |
Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network S Gurung, M Chakravorty Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 4 | 2018 |
Underwater Image Segmentation Using Fuzzy-Based Contrast Improvement and Partition-Based Thresholding Technique P Sarkar, S Gurung, S De Evolution in Computational Intelligence: Proceedings of the 9th …, 2022 | 3 | 2022 |
Varietal screening of gladiolus under Sikkim agro-climatic conditions S Gurung, S Rai, M Rana Biological Forum–An International Journal 13, 181-185, 2021 | 3 | 2021 |
Multiple information hiding using cubical approach on random grids S Gurung, KP Choudhury, A Parmar, K Panghaal International Journal of Computer Network and Information Security 7 (11), 54, 2015 | 3 | 2015 |
Hybridization of DCT based steganography and random grids P Saha, S Gurung, KK Ghose Int. J. Netw. Secur. Appl.(IJNSA) 5 (4), 2013 | 3 | 2013 |
Hybridization of DCT based Steganography and Random Grids S Gurung, P Saha, K Krishanu International Journal of Network Security & Its Applications 5 (5), 2013 | 3* | 2013 |
UICE-MIRNet guided image enhancement for underwater object detection P Sarkar, S De, S Gurung, P Dey Scientific Reports 14 (1), 22448, 2024 | 2 | 2024 |
Password Management System Using Blockchain RS Soren, S Gurung, D Gurung International Conference on Advanced Computational and Communication …, 2023 | 2 | 2023 |
Maize-legume intercrop in the hills of Darjeeling District. BC Saha, S Gurung, SK De | 2 | 2002 |