default search action
Virendra Kumar
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Virendra Kumar, Shreeshail, K. S. Beenamole, Ravi Kumar Gangwar:
High Performance S-Band GaN T/R Module Using Hybrid Microwave Integrated Circuit. IEEE Access 12: 43089-43108 (2024) - [j19]Kountay Dwivedi, Ankit Rajpal, Sheetal Rajpal, Virendra Kumar, Manoj Agarwal, Naveen Kumar:
XL1R-Net: Explainable AI-driven improved L1-regularized deep neural architecture for NSCLC biomarker identification. Comput. Biol. Chem. 108: 107990 (2024) - [j18]Kountay Dwivedi, Ankit Rajpal, Sheetal Rajpal, Virendra Kumar, Manoj Agarwal, Naveen Kumar:
Enlightening the path to NSCLC biomarkers: Utilizing the power of XAI-guided deep learning. Comput. Methods Programs Biomed. 243: 107864 (2024) - [j17]Virendra Kumar, Surabhi Tiwari:
Čech L-Fuzzy Rough Proximity Spaces. New Math. Nat. Comput. 20(2): 567-581 (2024) - [j16]Alexandra Boldyreva, Virendra Kumar, Jiahao Sun:
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard. Proc. Priv. Enhancing Technol. 2024(4): 565-582 (2024) - [i9]Alexandra Boldyreva, Virendra Kumar, Jiahao Sun:
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard. IACR Cryptol. ePrint Arch. 2024: 1674 (2024) - 2023
- [j15]Sheetal Rajpal, Ankit Rajpal, Manoj Agarwal, Virendra Kumar, Ajith Abraham, Divya Khanna, Naveen Kumar:
XAI-CNVMarker: Explainable AI-based copy number variant biomarker discovery for breast cancer subtypes. Biomed. Signal Process. Control. 84: 104979 (2023) - [j14]Kountay Dwivedi, Ankit Rajpal, Sheetal Rajpal, Manoj Agarwal, Virendra Kumar, Naveen Kumar:
An explainable AI-driven biomarker discovery framework for Non-Small Cell Lung Cancer classification. Comput. Biol. Medicine 153: 106544 (2023) - [j13]Sheetal Rajpal, Ankit Rajpal, Arpita Saggar, Ashok K. Vaid, Virendra Kumar, Manoj Agarwal, Naveen Kumar:
XAI-MethylMarker: Explainable AI approach for biomarker discovery for breast cancer subtype classification using methylation data. Expert Syst. Appl. 225: 120130 (2023) - [c16]Amar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar:
Multi-agent Deep Q-Learning Based Navigation. AINA (2) 2023: 211-221 - 2022
- [c15]Amar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar:
Multi-agent Q-learning Based Navigation in an Unknown Environment. AINA (1) 2022: 330-340 - 2021
- [j12]Sheetal Rajpal, Manoj Agarwal, Virendra Kumar, Anamika Gupta, Naveen Kumar:
Triphasic DeepBRCA-A Deep Learning-Based Framework for Identification of Biomarkers for Breast Cancer Stratification. IEEE Access 9: 103347-103364 (2021) - [i8]Sheetal Rajpal, Virendra Kumar, Manoj Agarwal, Naveen Kumar:
Deep Learning Based Model for Breast Cancer Subtype Classification. CoRR abs/2111.03923 (2021) - 2020
- [j11]Dharmesh Singh, Virendra Kumar, Chandan J. Das, Anup Singh, Amit Mehndiratta:
Segmentation of prostate zones using probabilistic atlas-based method with diffusion-weighted MR images. Comput. Methods Programs Biomed. 196: 105572 (2020) - [j10]Indranath Chatterjee, Virendra Kumar, Bharti Rana, Manoj Agarwal, Naveen Kumar:
Identification of changes in grey matter volume using an evolutionary approach: an MRI study of schizophrenia. Multim. Syst. 26(4): 383-396 (2020) - [j9]Indranath Chatterjee, Virendra Kumar, Bharti Rana, Manoj Agarwal, Naveen Kumar:
Impact of ageing on the brain regions of the schizophrenia patients: an fMRI study using evolutionary approach. Multim. Tools Appl. 79(33-34): 24757-24779 (2020) - [c14]Anusha Gunturu, Ashok Kumar Reddy Chavva, Virendra Kumar:
Effects of Vehicular Blockage on Latency in 5G mm Wave Systems with Dynamic Point Selection. CCNC 2020: 1-6
2010 – 2019
- 2019
- [j8]Nak Eun Cho, Sushil Kumar, Virendra Kumar, V. Ravichandran, H. M. Srivastava:
Starlike Functions Related to the Bell Numbers. Symmetry 11(2): 219 (2019) - 2018
- [j7]Nak Eun Cho, Virendra Kumar, V. Ravichandran:
Sharp Bounds on the Higher Order Schwarzian Derivatives for Janowski Classes. Symmetry 10(8): 348 (2018) - [j6]Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy:
A Security Credential Management System for V2X Communications. IEEE Trans. Intell. Transp. Syst. 19(12): 3850-3871 (2018) - [i7]Benedikt Brecht, Dean Therriault, André Weimerskirch, William Whyte, Virendra Kumar, Thorsten Hehn, Roy Goudy:
A Security Credential Management System for V2X Communications. CoRR abs/1802.05323 (2018) - 2017
- [c13]Virendra Kumar, Jonathan Petit, William Whyte:
Binary hash tree based certificate access management for connected vehicles. WISEC 2017: 145-155 - [i6]Virendra Kumar, Jonathan Petit, William Whyte:
Binary Hash Tree based Certificate Access Management. IACR Cryptol. ePrint Arch. 2017: 744 (2017) - 2016
- [c12]Anugya, Virendra Kumar, Kamal Jain:
Site Suitability Evaluation for Urban Development Using Remote Sensing, GIS and Analytic Hierarchy Process (AHP). CVIP (2) 2016: 377-388 - 2015
- [c11]Virendra Kumar, Soumen Sen, Sankar Nath Shome, Shibendu Shekhar Roy:
Inverse kinematics of redundant serial manipulators using interval method in handling uncertainties. AIR 2015: 1:1-1:6 - [c10]William Whyte, Jonathan Petit, Virendra Kumar, John Moring, Richard Roy:
Threat and Countermeasures Analysis for WAVE Service Advertisement. ITSC 2015: 1061-1068 - 2014
- [j5]Samuel H. Hawkins, John N. Korecki, Yoganand Balagurunathan, Yuhua Gu, Virendra Kumar, Satrajit Basu, Lawrence O. Hall, Dmitry B. Goldgof, Robert A. Gatenby, Robert J. Gillies:
Predicting Outcomes of Nonsmall Cell Lung Cancer Using CT Image Features. IEEE Access 2: 1418-1426 (2014) - [j4]Yoganand Balagurunathan, Virendra Kumar, Yuhua Gu, Jongphil Kim, Hua Wang, Ying Liu, Dmitry B. Goldgof, Lawrence O. Hall, René Korn, Binsheng Zhao, Lawrence H. Schwartz, Satrajit Basu, Steven Eschrich, Robert A. Gatenby, Robert J. Gillies:
Test-Retest Reproducibility Analysis of Lung CT Image Features. J. Digit. Imaging 27(6): 805-823 (2014) - 2013
- [j3]Yuhua Gu, Virendra Kumar, Lawrence O. Hall, Dmitry B. Goldgof, Ching-Yen Li, René Korn, Claus Bendtsen, Emmanuel Rios Velazquez, Andre Dekker, Hugo J. W. L. Aerts, Philippe Lambin, Xiuli Li, Jie Tian, Robert A. Gatenby, Robert J. Gillies:
Automated delineation of lung tumors from CT images using a single click ensemble segmentation approach. Pattern Recognit. 46(3): 692-702 (2013) - [c9]William Whyte, André Weimerskirch, Virendra Kumar, Thorsten Hehn:
A security credential management system for V2V communications. VNC 2013: 1-8 - 2012
- [b1]Virendra Kumar:
Provable security support for kerberos (and beyond). Georgia Institute of Technology, Atlanta, GA, USA, 2012 - [c8]Alexandra Boldyreva, Virendra Kumar:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. CT-RSA 2012: 187-202 - [c7]Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody:
On Black-Box Reductions between Predicate Encryption Schemes. TCC 2012: 440-457 - [i5]Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based Encryption with Efficient Revocation. IACR Cryptol. ePrint Arch. 2012: 52 (2012) - [i4]Alexandra Boldyreva, Virendra Kumar:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. IACR Cryptol. ePrint Arch. 2012: 56 (2012) - 2011
- [j2]Alexandra Boldyreva, Virendra Kumar:
Provable-security analysis of authenticated encryption in Kerberos. IET Inf. Secur. 5(4): 207-219 (2011) - [c6]Satrajit Basu, Lawrence O. Hall, Dmitry B. Goldgof, Yuhua Gu, Virendra Kumar, Jung Choi, Robert J. Gillies, Robert A. Gatenby:
Developing a classifier model for lung tumors in CT-scan images. SMC 2011: 1306-1312 - [i3]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. CoRR abs/1111.3753 (2011) - 2010
- [c5]S. K. Das, D. Pal, S. Nandy, Virendra Kumar, S. N. Shome, B. Mahanti:
Control Architecture for AUV-150: A Systems Approach. FIRA 2010: 41-48 - [c4]S. N. Shome, S. Nandy, S. K. Das, D. Pal, Biswajit Mahanty, Virendra Kumar, Ranjit Ray, Debajyoti Banerji:
Autonomous Underwater Vehicle for 150m Depth-Development Phases and Hurdles Faced. FIRA 2010: 49-56
2000 – 2009
- 2008
- [c3]Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based encryption with efficient revocation. CCS 2008: 417-426 - 2007
- [c2]Alexandra Boldyreva, Virendra Kumar:
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. S&P 2007: 92-100 - [i2]Alexandra Boldyreva, Virendra Kumar:
Provable-Security Analysis of Authenticated Encryption in Kerberos. IACR Cryptol. ePrint Arch. 2007: 234 (2007) - 2006
- [j1]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. Comput. Secur. 25(2): 114-120 (2006) - 2005
- [c1]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. ITCC (1) 2005: 739-744 - 2004
- [i1]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. IACR Cryptol. ePrint Arch. 2004: 136 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint