Adding Persuasive features in Graphical Password to increase the capacity of KBAM UD Yadav, PS Mohod 2013 IEEE International Conference ON Emerging Trends in Computing …, 2013 | 16 | 2013 |
Automated flower species identification by using deep convolution neural network S Bondre, U Yadav Intelligent Data Engineering and Analytics: Proceedings of the 9th …, 2022 | 13 | 2022 |
A novel automated depression detection technique using text transcript U Yadav, AK Sharma International Journal of Imaging Systems and Technology 33 (1), 108-122, 2023 | 12 | 2023 |
Review on Automated Depression Detection from audio visual clue using Sentiment Analysis U Yadav, AK Sharma 2021 Second International Conference on Electronics and Sustainable …, 2021 | 11 | 2021 |
Review of jamming attack using game theory DG Bhoyar, U Yadav 2017 International Conference on Innovations in Information, Embedded and …, 2017 | 11 | 2017 |
Data security using authenticated encryption and decryption algorithm for Android phones A Vichare, T Jose, J Tiwari, U Yadav 2017 International Conference on Computing, Communication and Automation …, 2017 | 8 | 2017 |
INTERNET OF THINGS: A REVIEW ON ARCHITECTURE, SECURITY THREATS AND COUNTERMEASURES P MAIDAMWAR, N CHAVHAN, UMA YADAV | 6 | 2018 |
Review of automated depression detection: Social posts, audio and video, open challenges and future direction U Yadav, AK Sharma, D Patil Concurrency and Computation: Practice and Experience 35 (1), e7407, 2023 | 5 | 2023 |
Identification of Disease by Using SVM Classifier S Khedikar, U Yadav International Journal of Advanced Research in Computer Science and Software …, 2017 | 5 | 2017 |
Detection of disease from radiology SV Khedikar, U Yadav 2017 International Conference on Innovations in Information, Embedded and …, 2017 | 5 | 2017 |
A novel approach to detect jamming attack by means of game theory D Bhoyar, U Yadav International Journal 7 (4), 2017 | 2 | 2017 |
Hybrid cryptography approach to secure the data in computing environment U Yadav, S Bondre 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 1 | 2021 |
Graphical Password Knowledge Based Authentication System Enhancement using Persuasive Technology U Yadav, S Sakure International Journal of Science and Research (IJSR) 4 (11), 5, 2015 | 1 | 2015 |
Automated Road anomaly detector in VANET by using Deep Learning SV Bondre, VD Bondre, U Yadav, B Thakare, J Nanwani 2023 OITS International Conference on Information Technology (OCIT), 963-968, 2023 | | 2023 |
Network Security in Evolving Networking Technologies: Developments and Future Directions U Yadav, A Sharma Evolving Networking Technologies: Developments and Future Directions, 75-95, 2023 | | 2023 |
PERSUASIVE TECHNOLOGY TO GENERATE SONGS PLAYLIST USING EMOTION BASED MUSIC PLAYER MU Yadav, MS Kharat | | 2021 |
AN AI&ML BASED APPLICATION FOR VISUALLY IMPAIRED PEOPLE U Yadav, S Bondre, P Maidamwar, P Khobragade International Journal of Engineering Applied Sciences and Technology 4 (7 …, 2019 | | 2019 |
UNINTERRUPTED CONNECTIVITY BETWEEN NODES TO EVADE FROM ACCIDENT AND TRAFFIC BLOCKAGE IN VANET UY Shweta Bondre IJCRT 6 (1), 2018 | | 2018 |
Enhancement of KBAM in Graphical Password using Persuasion PM Uma Yadav Journal of Computer Science and Engineering 17 (2), 2013 | | 2013 |