Vijay Anand

Orcid: 0000-0003-1544-4694

According to our database1, Vijay Anand authored at least 24 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A mathematical model for temperature-reducing potential of urban greenspaces.
Earth Sci. Informatics, December, 2023

Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate Competitions.
Proceedings of the ACM Conference on Global Computing Education Vol 1, 2023


2022
Fast High-Resolution Fingerprint Recognition using Domain-Knowledge Infused Global Descriptors.
Proceedings of the 18th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2022

2021
A Contactless Fingerprint Recognition System.
CoRR, 2021

2020
Pore-based indexing for fingerprints acquired using high-resolution sensors.
Pattern Anal. Appl., 2020

2019
Traffic aware field-based routing for wireless sensor networks.
Telecommun. Syst., 2019

CNN-based gender classification in near-infrared periocular images.
Pattern Anal. Appl., 2019

Pore detection in high-resolution fingerprint images using deep residual network.
J. Electronic Imaging, 2019

Cross-sensor Pore Detection in High-resolution Fingerprint Images using Unsupervised Domain Adaptation.
CoRR, 2019

PoreNet: CNN-based Pore Descriptor for High-resolution Fingerprint Recognition.
CoRR, 2019

Accredited Undergraduate Cybersecurity Degrees: Four Approaches.
Computer, 2019

Cybersecurity Program Accreditation: Benefits and Challenges.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Deep Convolutional Neural Network for Dot and Incipient Ridge Detection in High-resolution Fingerprints.
Proceedings of the 5th IEEE International Conference on Identity, 2019

2017
Pore based indexing for High-Resolution Fingerprints.
Proceedings of the IEEE International Conference on Identity, 2017

Partition based hash tree - An efficient certificate revocation system.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

2015
Sign language recognition through kinect based depth images and neural network.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Intrusion Detection: Tools, Techniques and Strategies.
Proceedings of the 2014 ACM SIGUCCS Annual Conference, 2014

A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods.
Proceedings of the Intelligent Information and Database Systems - 6th Asian Conference, 2014

2012
Security Policy Management Process within Six Sigma Framework.
J. Information Security, 2012

Security challenges in IT infrastructure for cybersecurity curriculum support.
Proceedings of the ACM Proceedings of the SIGUCCS Annual Conference, 2012

Superdistribution: Testability, security and management of digital applications.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

2011
Trusted computing architectures for a mobile IT infrastructure.
Proceedings of the ACM SIGUCCS Fall Conference on User Services 2011, 2011

2010
A multi-tier data mining workflow to analyze the age related shift from diglycosylated- to tetra-glycosylated-FSH secretion by the anterior pituitary.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010


  Loading...