default search action
Anand Mohan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Niharika Singh, Jitendra Kumar, Ashutosh Kumar Singh, Anand Mohan:
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 261-274 (2024) - 2022
- [j28]Mallory Ann Freeberg, Lauren A. Fromont, Teresa D'altri, Anna Foix Romero, Jorge Izquierdo Ciges, Aina Jene, Giselle Kerry, Mauricio Moldes, Roberto Ariosa, Silvia Bahena, Daniel Barrowdale, Marcos Casado Barbero, Dietmar Fernández-Orth, Carles Garcia-Linares, Emilio Garcia-Rios, Frédéric Haziza, Bela Juhasz, Oscar Martinez Llobet, Gemma Milla, Anand Mohan, Manuel Rueda, Aravind Sankar, Dona Shaju, Ashutosh Shimpi, Babita Singh, Coline Thomas, Sabela de la Torre, Umuthan Uyan, Claudia Vasallo, Paul Flicek, Roderic Guigó, Arcadi Navarro, Helen E. Parkinson, Thomas M. Keane, Jordi Rambla:
The European Genome-phenome Archive in 2021. Nucleic Acids Res. 50(D1): 980-987 (2022) - 2021
- [j27]Anand Mohan, Ashima Anand, Amit Kumar Singh, Ramji Dwivedi, Basant Kumar:
Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput. Electr. Eng. 95: 107385 (2021) - [j26]Hari Mohan Gaur, Ashutosh Kumar Singh, Anand Mohan, Masahiro Fujita, Dhiraj K. Pradhan:
Design of Single-Bit Fault-Tolerant Reversible Circuits. IEEE Des. Test 38(2): 89-96 (2021) - [j25]Amit Kumar Singh, Sriti Thakur, Alireza Jolfaei, Gautam Srivastava, Mohamed Elhoseny, Anand Mohan:
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents. ACM Trans. Internet Techn. 21(1): 18:1-18:20 (2021) - [j24]Amit Kumar Singh, Ashima Anand, Zhihan Lv, Hoon Ko, Anand Mohan:
A Survey on Healthcare Data: A Security Perspective. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 59:1-59:26 (2021) - [c8]Kishore Nandury, Anand Mohan, Frederick Weber:
Cross-Silo Federated Training in the Cloud with Diversity Scaling and Semi-Supervised Learning. ICASSP 2021: 3085-3089 - 2020
- [b1]Trailokya Nath Sasamal, Ashutosh Kumar Singh, Anand Mohan:
Quantum-Dot Cellular Automata Based Digital Logic Circuits: A Design Perspective. Studies in Computational Intelligence 879, Springer 2020, ISBN 978-981-15-1822-5, pp. 1-148 - [j23]Sriti Thakur, Amit Kumar Singh, Satya Prakash Ghrera, Anand Mohan:
Chaotic based secure watermarking approach for medical images. Multim. Tools Appl. 79(7-8): 4263-4276 (2020) - [j22]Jitendra Kumar, Deepika Saxena, Ashutosh Kumar Singh, Anand Mohan:
BiPhase adaptive learning-based neural network model for cloud datacenter workload forecasting. Soft Comput. 24(19): 14593-14610 (2020) - [j21]Bharat Padi, Anand Mohan, Sriram Ganapathy:
Towards Relevance and Sequence Modeling in Language Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 28: 1223-1232 (2020) - [c7]Indradip Banerjee, Kaustav Bandyopadhyay, Anand Mohan:
Handwriting Based Text Steganography Using Universal Languages. ICCCS 2020: 1-6 - [i1]Bharat Padi, Anand Mohan, Sriram Ganapathy:
Towards Relevance and Sequence Modeling in Language Recognition. CoRR abs/2004.01221 (2020)
2010 – 2019
- 2019
- [c6]Shreyas Ramoji, Anand Mohan, Bhargavram Mysore, Anmol Bhatia, Prachi Singh, Harsha Vardhan, Sriram Ganapathy:
The Leap Speaker Recognition System for NIST SRE 2018 Challenge. ICASSP 2019: 5771-5775 - [c5]Bharat Padi, Anand Mohan, Sriram Ganapathy:
End-to-end Language Recognition Using Attention Based Hierarchical Gated Recurrent Unit Models. ICASSP 2019: 5966-5970 - [c4]Bharat Padi, Anand Mohan, Sriram Ganapathy:
Attention Based Hybrid i-Vector BLSTM Model for Language Recognition. INTERSPEECH 2019: 1263-1267 - [e1]Amit Kumar Singh, Anand Mohan:
Handbook of Multimedia Information Security: Techniques and Applications. Springer 2019, ISBN 978-3-030-15886-6 [contents] - 2018
- [j20]Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, S. P. Ghrera, Anand Mohan:
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Future Gener. Comput. Syst. 86: 926-939 (2018) - [j19]Trailokya Nath Sasamal, Anand Mohan, Ashutosh Kumar Singh:
Efficient Design of Reversible Logic ALU Using Coplanar Quantum-Dot Cellular Automata. J. Circuits Syst. Comput. 27(2): 1850021:1-1850021:19 (2018) - [j18]Rohini Srivastava, Basant Kumar, Amit Kumar Singh, Anand Mohan:
Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multim. Tools Appl. 77(13): 16447-16459 (2018) - 2017
- [j17]Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, Mayank Dave, Vivek Kumar Singh, Pardeep Kumar, S. P. Ghrera, Pradeep Kumar Gupta, Anand Mohan:
Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications. Multim. Tools Appl. 76(5): 7563-7573 (2017) - 2016
- [j16]Ravi Kumar Patchmuthu, Alex Goh Kwang Leng, Ashutosh Kumar Singh, Anand Mohan:
Efficient Methodologies to Determine the Relevancy of Hanging Pages Using Stability Analysis. Cybern. Syst. 47(5): 376-391 (2016) - [j15]Amit Kumar Singh, Mayank Dave, Anand Mohan:
Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multim. Tools Appl. 75(14): 8381-8401 (2016) - [j14]Richa Pandey, Amit Kumar Singh, Basant Kumar, Anand Mohan:
Iris based secure NROI multiple eye image watermarking for teleophthalmology. Multim. Tools Appl. 75(22): 14381-14397 (2016) - 2015
- [j13]Ravi Kumar Patchmuthu, Ashutosh Kumar Singh, Anand Mohan:
Efficient methodologies to overcome the effects of hanging pages in search engine optimisation. Int. J. Web Eng. Technol. 10(2): 129-151 (2015) - [j12]Amit Kumar Singh, Basant Kumar, Mayank Dave, Anand Mohan:
Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel. Pers. Commun. 80(4): 1415-1433 (2015) - [j11]Amit Kumar Singh, Mayank Dave, Anand Mohan:
Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain. Wirel. Pers. Commun. 83(3): 2133-2150 (2015) - [c3]Arthur James Lowery, Jeffrey V. Rosenfeld, Philip M. Lewis, Damien Browne, Anand Mohan, Emma Brunton, Edwin Yan, Jerome J. Maller, Collette Mann, Ramesh Rajan, Marcello Rosa, Jeanette Pritchard:
Restoration of vision using wireless cortical implants: The Monash Vision Group project. EMBC 2015: 1041-1044 - 2014
- [j10]Alex Goh Kwang Leng, Ashutosh Kumar Singh, Ravi Kumar Patchmuthu, Anand Mohan:
Tprank: contend with Web Spam using Trust Propagation. Cybern. Syst. 45(4): 307-323 (2014) - [j9]Amit Kumar Singh, Mayank Dave, Anand Mohan:
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int. J. Electron. Secur. Digit. Forensics 6(4): 285-305 (2014) - 2013
- [j8]Harsh Vikram Singh, Suman Yadav, Anand Mohan:
Intellectual property right protection of image data using DCT and spread spectrum-based watermarking. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 218-228 (2013) - [c2]Amit Kumar Singh, Mayank Dave, Anand Mohan:
A Hybrid Algorithm for Image Watermarking against Signal Processing Attacks. MIWAI 2013: 235-246 - 2012
- [j7]Alex Goh Kwang Leng, Ravi Kumar Patchmuthu, Ashutosh Kumar Singh, Anand Mohan:
Link-Based Spam Algorithms in Adversarial Information Retrieval. Cybern. Syst. 43(6): 459-475 (2012) - 2011
- [j6]Harsh Vikram Singh, Suresh Rai, Anand Mohan, Surya Pal Singh:
Robust copyright marking using Weibull distribution. Comput. Electr. Eng. 37(5): 714-728 (2011) - [j5]David Fitrio, Suhardi Tjoa, Anand Mohan, Ronny Veljanovski, Andrew Berry, Goran Panjkovic:
A CMOS Analog Integrated Circuit for Pixel X-Ray Detector. J. Circuits Syst. Comput. 20(1): 71-87 (2011) - [j4]Basant Kumar, Harsh Vikram Singh, Surya Pal Singh, Anand Mohan:
Secure Spread-Spectrum Watermarking for Telemedicine Applications. J. Information Security 2(2): 91-98 (2011) - 2010
- [j3]Stuti Bazaj, Sachin Modi, Anand Mohan, Surya Pal Singh:
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients. Int. J. Adv. Comp. Techn. 2(2): 109-116 (2010)
2000 – 2009
- 2008
- [j2]Ashutosh Kumar Singh, Anand Mohan:
An Efficient Method for Generating Optimal OBDD of Boolean Functions. Comput. Inf. Sci. 1(2): 56-62 (2008) - [j1]Mohsen Hosamo, Surya Pal Singh, Anand Mohan:
Random Early Detection method for ABR service. Comput. Electr. Eng. 34(4): 290-308 (2008) - 2007
- [c1]Anand Mohan, Aladin Zayegh, Aleksandar Stojcevski:
A High Speed Analog to Digital Converter for Ultra Wide Band Applications. EUC Workshops 2007: 169-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint