2021 |
2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) |
Tanisha Mahendru, Harsh Kumar Verma,"Hiding secret message using matrix reordering and image blocking" |
2021 |
2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) |
Paras Chugh, Harsh Kumar Verma,"Various Techniques to Improve the Efficiency of Apriori Algorithm: A Review" |
2021 |
3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) |
Vikramjit Singh, Krishna Pal Sharma, Harsh K Verma,"Evaluating the Impact of Beacon Interval and Neighbor Timeout Timer on the Performance of Geographical Routing in FANETs" |
2021 |
6th International Conference on Signal Processing, Computing and Control (ISPCC) |
Renu Verma, Kuldeep Kumar, Harsh K Verma,"A Study of Relevant Parameters Influencing Code Smell Prioritization in Object-Oriented Software Systems" |
2020 |
Proceedings of Industry Interactive Innovations in Science, Engineering & Technology (I3SET2K19) |
Gurjit Kaur, Harsh Kumar Verma, Ravindra Kumar Singh, "Dual Steganography Approach Using 3D Playfair Cipher and Pixel Value Differencing Method" |
2020 |
The International Conference on Recent Innovations in Computing |
Ravindra Kumar Singh, Harsh Kumar Verma, "Effective Analysis of Tweets Using Hadoop Ecosystem" |
2020 |
International conference on smart electronics and communication (ICOSEC) |
Aviral Sangal, Harsh Kumar Verma, "A static feature selection-based android malware detection using machine learning techniques" |
2018 |
4th International Conference on Computing Communication and Automation (ICCCA) |
Charu Guleria, Harsh Kumar Verma, "Improved detection and mitigation of ddos attack in vehicular ad-hoc network" |
2018 |
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 483-489 |
Himansu Sekhar Pattanayak, Harsh K Verma, AL Sangal, "Community Detection Metrics and Algorithms in Social Networks" |
2018 |
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), pp. 545-549 |
Naveen Bilandi, Harsh K Verma, Renu Dhir, "An Energy Efficient TDMA based MAC Protocol for Wireless Body Area Networks" |
2017 |
2017 International Conference on Intelligent Communication and Computational Techniques (ICCT) |
Sagar Mal Nitharwal, Harsh Kumar Verma, "A boolean-based multi-secret image sharing scheme using bit-reversal" |
2017 |
2017 International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 228-232 |
Kirti Kaur Sahota, Lalit Kumar Awasthi, Harsh Kumar Verma, "An empirical enhancement using scale invariant feature transform in text extraction from images" |
2017 |
2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), pp. 122-125 |
Jagmeet Singh Aidan, Harsh Kumar Verma, Lalit Kumar Awasthi, "Comprehensive Survey on Petya Ransomware Attack" |
2016 |
IEEE Symposium on Colossal Data Analysis and Networking (CDAN), Pages 1-5 |
Deepak Singh and Harsh Kumar Verma, "A new framework for cloud storage confidentiality to ensure information security" |
2016 |
IEEE International Conference on Computing, Communication and Automation, Pages 1069-1073 |
Dilpreet kaur, Harsh Kumar Verma and Ravinder Kumar Singh, "A hybrid approach for image steganography" |
2015 |
IEEE International Conference on Advances in Computer Engineering and Applications, Pages 450-454 |
Kirti Aggarwal and Harsh Kumar Verma, "Hash_RC6 -Variable length Hash algorithm using RC6" |
2014 |
International Conference On Advances in Engineering and Technology (ICAET'2014), Pages 375-380 |
Maninderjit Kaur, Harsh Kumar Verma, Moin Uddin, "QoS Provisioning in Channel Allocation Strategy in Cognitive Radio Using Fuzzy Logic" |
2014 |
IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization, Pages 1-6 |
Chaitna Vaid and Harsh Kumar Verma, "Anomaly-based IDS implementation in cloud environment using BOAT algorithm" |
2014 |
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Pages 1-6 |
Sandeep Mehmi, Harsh Kumar Verma and Amrit Lal Sangal, "Smart grid cloud for Indian power sector" |
2014 |
Third International Conference on Soft Computing for Problem Solving, Pages 109-114 |
Himakshi, Harsh Kumar Verma, Ravindra Kumar Singh, Charan Kamaljit Singh, "Bi-directional Pixel-Value Differencing Approach for Steganography" |
2013 |
International Conference on Multimedia and Human-Computer Interaction, Vol. 141, Pages 1-5 |
Harsh Kumar Verma, Anupama Gupta, Savita Gupta, "Multimodal Registration of Carotid MR and US Images Free-From Deformation Based Non-Rigid Methodology in a Hybrid Framework" |
2013 |
IEEE Sixth International Conference on Contemporary Computing (IC3), Pages 18-23 |
Amandeep Kaur, Harsh Kumar Verma and Ravinder Kumar Singh, "3D -Playfair cipher using LFSR based unique random number generator" |
2013 |
IEEE Second International Conference on Image Information Processing (ICIIP-2013), Pages 607-611 |
Jaspal Kaur Saini and Harsh Kumar Verma, "A hybrid approach for image security by combining encryption and steganography" |
2013 |
IEEE International Conference on Computational Intelligence and Computing Research, Pages 1-5 |
Manoj Kumar, Harsh Kumar Verma and Shantibala Singh, "A (m, m)VCS with consistent size reconstruction using full binary tree" |
2013 |
IEEE Sixth International Conference on Contemporary Computing (IC3), Pages 47-51 |
Himakshi, Ravinder Kumar Singh, Harsh Kumar Verma and Charan Kamaljit Singh, "Bi-directional pixel-value differencing approach for RGB color image" |
2013 |
IEEE 3rd International Advance Computing Conference (IACC), Pages 556-561 |
Harsh Kumar Verma and Ravinder Kumar Singh, "Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6" |
2013 |
IEEE 3rd International Advance Computing Conference (IACC), Pages 243-248 |
Naveen Bilandi, Harsh Kumar Verma and Naresh Kumar, "Comparative analysis of ad hoc routing protocols based on user's point of view" |
2012 |
International Conference on Electrical Engineering and Computer Science, Goa (India), Pages 72-82 |
Harsh Kumar Verma, Ravindra Kumar Singh, "Linear Feedback Shift Register based Unique Random Number Generator" |
2012 |
ICECECE 2012 : International Conference on Electrical, Computer, Electronics and Communication Engineering, Phuket (Thailand), Pages 515-521 |
Harsh Kumar Verma, Ravindra Kumar Singh, "Enhancement of Twofish Block Cipher Algorithm and Comparison with Twofish" |
2011 |
International Conference on Intelligent Information Networks ICIIN 2011, Dubai, Pages 97-104 |
Sunil Gupta, Harsh K Verma and A L Sangal, "A Survey on secure access control for Wireless Sensor Network" |
2011 |
IEEE International Conference on Advances in Computing and Communications, Pages 568-573 |
Syona Gupta, Geeta Sikka and Harsh Kumar Verma, "A survey on recent software effort estimation techniques using analogies" |
2010 |
IEEE 2nd International Advance Computing Conference (IACC), Pages 293-297 |
Raman Kumar and Harsh Kumar Verma, "An advanced secure (t, n) threshold proxy signature scheme based on RSA cryptosystem for known signers" |
2010 |
IEEE 2nd International Advance Computing Conference (IACC), Pages 436-442 |
Harsh Kumar Verma and Vishal Sharma, "Handling imprecision in inputs using fuzzy logic to predict effort in software development" |
2008 |
The 2008 International Conference on Security and Management SAM'08, USA, Pages 227-231 |
Harsh Kumar Verma, Kamalpreet Kaur, Raman Kumar, "A Comparison of Threshold Proxy Signature Schemes" |
2008 |
The 2008 International Conference on Scientific Computing CSC'08, USA, Pages 338-341 |
Sheo Kumar, Harsh Kumar Verma, ". Product Integration Methods for First Kind Abel Integral Equations Using Cubic B-Spline" |
2007 |
IASTED International Conference on Modelling and Simulation, Totonto, Pages 471-476 |
Harsh Kumar Verma, Puneet Sharma, "A Procedure for Face Detection and Recognition" |
2007 |
The 2007 International Conference on Scientific Computing, Pages 247-250 |
Harsh Kumar Verma,Sheo Kumar, "Numerical Solutions of Volterra Integro-Differential Equations with Weakly Singular Kernels" |
2007 |
The 2007 International Conference on Scientific Computing, Pages 213-217 |
Harsh Kumar Verma,Sheo Kumar, "Numerical Methods of Volterra Integro-Differential Equations with Two Point Boundary Conditions and Weakly Singular Kernels" |
|
|
|