Android based malware detection using a multifeature collaborative decision fusion approach S Sheen, R Anitha, V Natarajan Neurocomputing 151, 905-912, 2015 | 130 | 2015 |
Pattern based 3d image steganography P Thiyagarajan, V Natarajan, G Aghila, V Prasanna Venkatesan, R Anitha 3D Research 4 (1), 1-8, 2013 | 62 | 2013 |
Hybrid robust watermarking for color images I Prathap, V Natarajan, R Anitha Computers & Electrical Engineering 40 (3), 920-930, 2014 | 27 | 2014 |
Detection of stegobot: A covert social network botnet V Natarajan, S Sheen, R Anitha Proceedings of the First International Conference on Security of Internet of …, 2012 | 24 | 2012 |
Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network Z Huang, SK Joshi, D Aktas, C Lupo, AO Quintavalle, N Venkatachalam, ... npj quantum information 8 (1), 25, 2022 | 16 | 2022 |
A multi-feature approach to detect Stegobot: a covert multimedia social network botnet N Venkatachalam, R Anitha Multimedia Tools and Applications 76, 6079-6096, 2017 | 16 | 2017 |
Multilevel analysis to detect covert social botnet in multimedia social networks V Natarajan, S Sheen, R Anitha The Computer Journal 58 (4), 679-687, 2015 | 15 | 2015 |
Blind image steganalysis based on contourlet transform V Natarajan, R Anitha International Journal on Cryptography and Information Security (IJCIS) 2 (3 …, 2012 | 15 | 2012 |
Scalable authentication and optimal flooding in a quantum network NR Solomons, AI Fletcher, D Aktas, N Venkatachalam, S Wengerowsky, ... PRX quantum 3 (2), 020311, 2022 | 14 | 2022 |
Unconditionally secure digital signatures implemented in an eight-user quantum network Y Pelet, IV Puthoor, N Venkatachalam, S Wengerowsky, M Lončarić, ... New journal of physics 24 (9), 093038, 2022 | 13 | 2022 |
Universal steganalysis using contourlet transform V Natarajan, R Anitha Advances in Computer Science, Engineering & Applications: Proceedings of the …, 2012 | 10 | 2012 |
System and method for classifying a skin infection GSVRK Rao, K Sundararaman, AM Vedamanickam, N Venkatachalem US Patent 9,286,537, 2016 | 8 | 2016 |
System and method for efficient recognition of handwritten characters in documents N Venkatachalam, SMB Mithra, GSVRK Rao, AS Gauriar US Patent 9,659,213, 2017 | 7 | 2017 |
System and method for efficiently and securely managing a network using fog computing GSVRK Rao, N VENKATACHALAM, A Kulshreshtha US Patent 10,642,656, 2020 | 6 | 2020 |
Experimental implementation of secure anonymous protocols on an eight-user quantum network Z Huang, SK Joshi, D Aktas, C Lupo, AO Quintavalle, N Venkatachalam, ... arXiv preprint arXiv:2011.09480, 2020 | 5 | 2020 |
Entanglement Based Quantum Networks: Protocols, AI control plane & coexistence with classical communication SK Joshi, Z Huang, A Fletcher, N Solomons, IV Puthoor, Y Pelet, D Aktas, ... European Quantum Electronics Conference, eb_1_2, 2021 | 2 | 2021 |
Scalable QKD Post Processing System With Reconfigurable Hardware Accelerator N Venkatachalam, FP Shingala, C Selvagangai, S Dillibabu, ... IEEE Transactions on Quantum Engineering, 2023 | | 2023 |
Real time QKD Post Processing based on Reconfigurable Hardware Acceleration FP Shingala, N Venkatachalam, P Chandravanshi, RP Singh arXiv preprint arXiv:2211.17019, 2022 | | 2022 |
Aggregation of Tokenized Signature Scheme and Its Applications N V, MPL Das QCrypt 2022, 2022 | | 2022 |
Scalable authentication in a quantum network NR Solomons, SK Joshi Q-Turn 2020, 2020 | | 2020 |