- Advanced Neural Network Applications
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Emotion and Mood Recognition
- Adversarial Robustness in Machine Learning
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- Fuzzy Logic and Control Systems
- Cloud Computing and Resource Management
- Microstructure and Mechanical Properties of Steels
- Innovative Energy Harvesting Technologies
- Welding Techniques and Residual Stresses
- Energy Harvesting in Wireless Networks
- Hydrogen embrittlement and corrosion behaviors in metals
- Advanced Computational Techniques and Applications
- Network Packet Processing and Optimization
- Water Quality Monitoring Technologies
- Evolutionary Algorithms and Applications
- Smart Grid Energy Management
- Advanced Data Processing Techniques
- Face and Expression Recognition
Jaypee University of Engineering and Technology
2022-2023
New York University
2021-2023
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2021
Sami Labs (India)
2020
Indian Institute of Science Bangalore
2020
Adaptive Neuro‐Fuzzy Inference System (ANFIS) blends advantages of both Artificial Neural Networks (ANNs) and Fuzzy Logic (FL) in a single framework. It provides accelerated learning capacity adaptive interpretation capabilities to model complex patterns apprehends nonlinear relationships. ANFIS has been applied practiced various domains provided solutions commonly recurring problems with improved time space complexity. Standard certain limitations such as high computational expense, loss...
Summary Perpetual lifetimes and low maintenance are few of the attractive aspects sensor nodes that harvest ambient energy. However, their operation depends heavily on energy profiles harvesting source(s). In this work, we study suitability (EHS) Nodes, powered using indoor lighting vibrations, for a simple temperature monitoring application. To help these sustain, have proposed schemes allow to sample transmit data judiciously. Along with an adaptive sampling based autoregressive (AR)...
Vision Transformers are increasingly embedded in industrial systems due to their superior performance, but memory and power requirements make deploying them edge devices a challenging task. Hence, model compression techniques now widely used deploy models on as they decrease the resource inference very fast efficient. But reliability robustness from security perspective is another major issue safety-critical applications. Adversarial attacks like optical illusions for ML algorithms can...
Convolution Neural Network is one of the phenomenal formulations in field pattern recognition research, computer vision and image processing. It helped to facilitate many theories into real working models. One them being Facial expression (FER) which has been benefited with development CNN architectures, especially ResNet architecture emerged as winner ImageNet 2015 competition. Residual (ResNet) inculcates idea skip connections became most cited neural network. In this paper we have...
Intrusion Detection System (IDS) is a system that surveils the dubious network activity. There are several approaches which deal with intrusion detection and cyber-attack detection, but most optimal IDS would be one can predict upcoming threats along detecting present attacks. The Machine Learning probabilistic models work remarkably in prediction of among these models, Hidden Markov Model (HMM) outperforms all other models. HMM widely used cryptanalysis, gene prediction, computational...