default search action
Abhishek Kashyap
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Sandhya, Abhishek Kashyap:
A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos. Comput. J. 67(6): 2270-2285 (2024) - [j8]Sandhya, Abhishek Kashyap:
A novel method for real-time object-based copy-move tampering localization in videos using fine-tuned YOLO V8. Forensic Sci. Int. Digit. Investig. 48: 301663 (2024) - [j7]Sandhya, Abhishek Kashyap:
A comprehensive analysis of digital video forensics techniques and challenges. Iran J. Comput. Sci. 7(2): 359-380 (2024) - [c18]Abhishek Kashyap, Animesh Chakravarthy, Prathyush P. Menon:
Modeling and Detection of Cyber-Attacks on Highway Networks Using a 2D-LWR Model and Gaussian Processes. ACC 2024: 1764-1770 - 2023
- [j6]Abhishek Kashyap, Kapil Dev Tyagi, Vaibhav Bhushan Tyagi:
Robust and Optimized Algorithm for Detection of Copy-Rotate-Move Tempering. IEEE Access 11: 66626-66640 (2023) - [c17]Kashish Dhal, Abhishek Kashyap, Animesh Chakravarthy:
Robust Collision Avoidance of Quadric and Polygonal Surfaces Moving in Planar Environments. CDC 2023: 7117-7124 - [c16]Abhishek Kashyap, Kapil Dev Tyagi, Prameet Singh:
CRNN-based UAV Detection using Acoustic Signature. iSES 2023: 186-190 - 2022
- [j5]Abhishek Kashyap, B. Suresh, Hariom Gupta:
Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm. Comput. J. 65(4): 983-996 (2022) - [j4]Abhishek Kashyap, Animesh Chakravarthy, Prathyush P. Menon:
Detection of Cyber-Attacks in Automotive Traffic Using Macroscopic Models and Gaussian Processes. IEEE Control. Syst. Lett. 6: 1688-1693 (2022) - [i4]Kashish Dhal, Abhishek Kashyap, Animesh Chakravarthy:
Collision Avoidance of 3-Dimensional Objects in Dynamic Environments. CoRR abs/2203.09037 (2022) - 2021
- [c15]Abhishek Kashyap, Meysam Ghanavati, Animesh Chakravarthy, Prathyush P. Menon:
PDE-based Analysis of Automotive Cyber-Attacks in Imperfect Information Scenarios. ACC 2021: 1478-1484 - [c14]Abhishek Kashyap, Animesh Chakravarthy, Prathyush P. Menon:
Stability Analysis of Two-Species PDE Traffic Models in Cyber-Attack Scenarios. CDC 2021: 3330-3336 - [c13]Kashish Dhal, Abhishek Kashyap, Animesh Chakravarthy:
Collision Avoidance and Rendezvous of Quadric Surfaces Moving on Planar Environments. CDC 2021: 3569-3575 - 2020
- [j3]Abhishek Kashyap, B. Suresh, Hariom Gupta:
Detection of splicing forgery using differential evolution and wavelet decomposition. Comput. J. 63(11): 1727-1737 (2020) - [i3]Lima Agnel Tony, Shuvrangshu Jana, Varun V. P., Vidyadhara B. V, Mohitvishnu S. Gadde, Abhishek Kashyap, Rahul Ravichandran, Debasish Ghose:
Collaborative Tracking and Capture of Aerial Object using UAVs. CoRR abs/2010.01588 (2020)
2010 – 2019
- 2017
- [c12]Matthew P. Bowers, Chinmay V. Harmalkar, Ankur Agrawal, Abhishek Kashyap, Jonathan Tai, Marko B. Popovic:
Design and test of biologically inspired multi-fiber Hydro Muscle actuated ankle. ARSO 2017: 1-7 - [i2]Abhishek Kashyap, Rajesh Singh Parmar, Megha Agarwal, Hariom Gupta:
An Evaluation of Digital Image Forgery Detection Approaches. CoRR abs/1703.09968 (2017) - [i1]Abhishek Kashyap, Megha Agarwal, Hariom Gupta:
Detection of Copy-move Image forgery using SVD and Cuckoo Search Algorithm. CoRR abs/1704.00631 (2017) - 2011
- [j2]Abhishek Kashyap, Samir Khuller, Mark A. Shayman:
Relay placement for fault tolerance in wireless networks in higher dimensions. Comput. Geom. 44(4): 206-215 (2011)
2000 – 2009
- 2007
- [j1]Abhishek Kashyap, Kwangil Lee, Mehdi Kalantari, Samir Khuller, Mark A. Shayman:
Integrated topology control and routing in wireless optical mesh networks. Comput. Networks 51(15): 4237-4251 (2007) - [c11]Abhishek Kashyap, Mark A. Shayman:
Relay Placement and Movement Control for Realization of Fault-Tolerant Ad Hoc Networks. CISS 2007: 783-788 - [c10]Randeep Bhatia, Abhishek Kashyap, Li (Erran) Li:
The Power Balancing Problem in Energy Constrained Multi-Hop Wireless Networks. INFOCOM 2007: 553-561 - [c9]Vahid Tabatabaee, Abhishek Kashyap, Samrat Bhattacharjee, Richard J. La, Mark A. Shayman:
Robust Routing with Unknown Traffic Matrices. INFOCOM 2007: 2436-2440 - [c8]Abhishek Kashyap, Sudipta Sengupta, Randeep Bhatia, Murali S. Kodialam:
Two-phase routing, scheduling and power control for wireless mesh networks with variable traffic. SIGMETRICS 2007: 85-96 - 2006
- [b1]Abhishek Kashyap:
Robust design of wireless networks. University of Maryland, College Park, MD, USA, 2006 - [c7]Abhishek Kashyap, Bobby Bhattacharjee, Richard J. La, Mark A. Shayman, Vahid Tabatabaee:
Single-Path Routing of Time-varying Traffic. GLOBECOM 2006 - [c6]Abhishek Kashyap, Anuj Rawat, Mark A. Shayman:
Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks. GLOBECOM 2006 - [c5]Abhishek Kashyap, Samir Khuller, Mark A. Shayman:
Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006 - [c4]Abhishek Kashyap, Fangting Sun, Mark A. Shayman:
Relay placement for minimizing congestion in wireless backbone networks. WCNC 2006: 159-164 - 2005
- [c3]Abhishek Kashyap, Mark A. Shayman:
Routing and traffic engineering in hybrid RF/FSO networks. ICC 2005: 3427-3433 - [c2]Fangting Sun, Abhishek Kashyap, Mark A. Shayman:
Maximizing open capacity in mobile optical backbone networks using controllable mobile agents. ICCCN 2005: 153-158 - 2001
- [c1]Indraneel Chakraborty, Abhishek Kashyap, Apurva Kumar, Anupam Rastogi, Huzur Saran, Rajeev Shorey:
MAC scheduling policies with reduced power consumption and bounded packet delays for centrally controlled TDD wireless networks. ICC 2001: 1980-1984
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint