Evolution of bitcoin and security risk in bitcoin wallets PK Kaushal, A Bagga, R Sobti 2017 International Conference on Computer, Communications and Electronics …, 2017 | 111 | 2017 |
Sequential transform learning S Sharma, A Majumdar ACM Transactions on Knowledge Discovery from Data (TKDD) 15 (5), 1-18, 2021 | 61 | 2021 |
Opinion mining framework using proposed rb-bayes model for text classification. R Bhalla, A Bagga International Journal of Electrical & Computer Engineering (2088-8708) 9 (1), 2019 | 19 | 2019 |
Clustering techniques for traffic classification: A comprehensive review K Takyi, A Bagga, P Goopta 2018 7th International Conference on Reliability, Infocom Technologies and …, 2018 | 17 | 2018 |
Lempel-Ziv-Oberhumer: A critical evaluation of lossless algorithm and its applications S Preet, A Bagga 2018 4th International Conference on Computing Sciences (ICCS), 175-182, 2018 | 13 | 2018 |
Video watermarking scheme based on DWT, SVD, rail fence for quality loss of data C Sharma, A Bagga 2018 4th International Conference on Computing Sciences (ICCS), 84-87, 2018 | 13 | 2018 |
A semi-supervised QoS-aware classification for wide area networks with limited resources K Takyi, A Bagga, P Gupta International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | 6 | 2019 |
Bit sum attack G Geetha, A Bagga The Security Journal 35, 21-22, 2011 | 5 | 2011 |
Analysis of bitsum attack on block ciphers Amandeep, G Geetha Journal of Discrete Mathematical Sciences and Cryptography 19 (4), 875-885, 2016 | 4* | 2016 |
On the security of reduced key tiny encryption algorithm G Geetha 2012 International Conference on Computing Sciences, 322-325, 2012 | 4 | 2012 |
Real-time application clustering in wide area networks K Takyi, A Bagga Computers & Electrical Engineering 85, 106691, 2020 | 3 | 2020 |
Analyzing the applicability of bitsum algorithm on LSB steganography technique B Amandeep, G Geetha Security in Computing and Communications: 4th International Symposium, SSCC …, 2016 | 2 | 2016 |
Implications of bitsum attack on tiny encryption algorithm and XTEA G Geetha Journal of Computer Science 10 (6), 1077, 2014 | 2 | 2014 |
SECURITY OF ONLINE SOCIAL NETWORKS R Sobti, G Geetha, A Bagga Indian Journal of Science and Technology 9 (47), 2016 | 1* | 2016 |
Research Article A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition … C Sharma, B Amandeep, R Sobti, TK Lohani, M Shabaz | | 2021 |
Assessing the robustness of symmetric ciphers and LSB steganographic technique under proposed novel Bit Sum Attack B Amandeep Phagwara, 2013 | | 2013 |
Ensuring Trust and Reputation with Intrusion Detection and End-to-End Authentication A Bagga, R Saha, R Sobti ICCS - WILKES100 - Second International Conference on Computing Sciences …, 2013 | | 2013 |
Assessing the robustness of symmetric ciphers and lsb steganographic technique under proposed novel bitsum attack G Geetha Phagwara, 0 | | |