dblp.uni-trier.dewww.uni-trier.de

Ashutosh Saxena

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
48 Benjamin Sapp, Ashutosh Saxena, Andrew Y. Ng: A Fast Data Collection and Augmentation Procedure for Object Recognition. AAAI 2008: 1402-1408
47 Ashutosh Saxena, Lawson L. S. Wong, Andrew Y. Ng: Learning Grasp Strategies with Partial Shape Information. AAAI 2008: 1491-1494
46 Ashutosh Saxena, Min Sun, Andrew Y. Ng: Make3D: Depth Perception from a Single Still Image. AAAI 2008: 1571-1576
45EEAshutosh Saxena: Dynamic authentication: Need than a choice. COMSWARE 2008: 214-218
44 Pradeep Kumar, Meena Singh, Ashutosh Saxena: HEMIN: A Cryptographic Approach for Private k-NN Classification. DMIN 2008: 500-505
43EEGeremy Heitz, Stephen Gould, Ashutosh Saxena, Daphne Koller: Cascaded Classification Models: Combining Models for Holistic Scene Understanding. NIPS 2008: 641-648
42EEAshutosh Saxena, Sung H. Chung, Andrew Y. Ng: 3-D Depth Reconstruction from a Single Still Image. International Journal of Computer Vision 76(1): 53-69 (2008)
2007
41 Vishal Pannala, Sibesh Bhattacharya, Ashutosh Saxena: Synthetic Data for Privacy Preserving Data Mining. DMIN 2007: 315-320
40EEAshutosh Saxena: Threshold SKI Protocol for ID-based Cryptosystems. IAS 2007: 65-70
39EEAshutosh Saxena, Min Sun, Andrew Y. Ng: 3-D Reconstruction from Sparse Views using Monocular Vision. ICCV 2007: 1-8
38EEAshutosh Saxena, Min Sun, Andrew Y. Ng: Learning 3-D Scene Structure from a Single Still Image. ICCV 2007: 1-8
37EEAshutosh Saxena, Jamie Schulte, Andrew Y. Ng: Depth Estimation Using Monocular and Stereo Cues. IJCAI 2007: 2197-2203
36 Sibesh Bhattacharya, Ashutosh Saxena: A model to secure data warehouse. IKE 2007: 25-30
35 Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla: An Efficient Authentication Protocol for GSM. Security and Management 2007: 65-69
34EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Dynamic ID-based Remote User Authentication Scheme CoRR abs/0712.2235: (2007)
33EEManik Lal Das, Ashutosh Saxena, Deepak B. Phatak: Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings CoRR abs/0712.3084: (2007)
32EEPhani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena: Identity Based Strong Designated Verifier Signature Scheme. Informatica, Lith. Acad. Sci. 18(2): 239-252 (2007)
2006
31EEMilind Engedy, Munaga V. N. K. Prasad, Ashutosh Saxena: A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. ICDIM 2006: 36-40
30EEG. Shailaja, K. Phani Kumar, Ashutosh Saxena: Universal Designated Multi Verifier Signature without Random Oracles. ICIT 2006: 168-171
29EEK. Phani Kumar, G. Shailaja, A. Kavitha, Ashutosh Saxena: Mutual Authentication and Key Agreement for GSM. ICMB 2006: 25
28EEAshutosh Saxena, Justin Driemeyer, Justin Kearns, Chioma Osondu, Andrew Y. Ng: Learning to Grasp Novel Objects Using Vision. ISER 2006: 33-42
27EEAshutosh Saxena, Justin Driemeyer, Justin Kearns, Andrew Y. Ng: Robotic Grasping of Novel Objects. NIPS 2006: 1209-1216
26EEManik Lal Das, Ashutosh Saxena, Deepak B. Phatak: Algorithms and Approaches of Proxy Signature: A Survey CoRR abs/cs/0612098: (2006)
25EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: A novel remote user authentication scheme using bilinear pairings. Computers & Security 25(3): 184-189 (2006)
24EERaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena: Identity Based Multisignatures. Informatica, Lith. Acad. Sci. 17(2): 177-186 (2006)
2005
23EEM. Choudary Gorantla, Ashutosh Saxena: An Efficient Certificateless Signature Scheme. CIS (2) 2005: 110-116
22EEM. Choudary Gorantla, Ashutosh Saxena: Verifiably Encrypted Signature Scheme Without Random Oracles. ICDCIT 2005: 357-363
21EEManik Lal Das, Ashutosh Saxena: SPAM: Secure Protocol for Authentication in Mobile-Communications. ICMB 2005: 23-27
20EEAshutosh Saxena, Manik Lal Das, Anurag Gupta: MMPS: A Versatile Mobile-to-Mobile Payment System. ICMB 2005: 400-405
19EEJeff Michels, Ashutosh Saxena, Andrew Y. Ng: High speed obstacle avoidance using monocular vision and reinforcement learning. ICML 2005: 593-600
18EERaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678
17EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403
16EEAshutosh Saxena, Gaurav Gupta, Vadim Gerasimov, Sébastien Ourselin: In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States. KES (4) 2005: 595-601
15EEAshutosh Saxena, Sung H. Chung, Andrew Y. Ng: Learning Depth from Single Monocular Images. NIPS 2005
14 M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena: An Effective Certificateless Signature Scheme Based on Bilinear Pairings. WOSIS 2005: 31-39
13 Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47
12EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing CoRR abs/cs/0505062: (2005)
11EERaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena: Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems CoRR abs/cs/0506015: (2005)
10EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. J. UCS 11(1): 122-149 (2005)
9EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: Hierarchical key management scheme using polynomial interpolation. Operating Systems Review 39(1): 40-47 (2005)
2004
8EESadybakasov Ulanbek, Ashutosh Saxena, Atul Negi: On Reduction of Bootstrapping Information Using Digital Multisignature. CIT 2004: 198-204
7EEAshutosh Saxena, Abhinav Gupta, Amitabha Mukerjee: Non-linear Dimensionality Reduction by Locally Linear Isomaps. ICONIP 2004: 1038-1043
6EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: On Gossip Codes and Traceability Schemes. ITCC (1) 2004: 772-777
5EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532
4EEManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Proxy Signature Scheme with Revocation. Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004)
2002
3EEKapali Viswanathan, Ashutosh Saxena: Towards Logically and Physically Secure Public-Key Infrastructures. INDOCRYPT 2002: 122-134
2EERavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati: Reed Solomon Codes for Digital Fingerprinting. INDOCRYPT 2002: 163-175
1998
1EEAshutosh Saxena, Suju M. George, P. Rambabu: Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network. International Journal on Artificial Intelligence Tools 7(4): 443-451 (1998)

Coauthor Index

1Sibesh Bhattacharya [36] [41]
2Sung H. Chung [15] [42]
3Manik Lal Das [4] [5] [9] [11] [13] [14] [17] [18] [20] [21] [24] [25] [26] [33] [34]
4Justin Driemeyer [27] [28]
5Milind Engedy [31]
6Raju Gangishetti [11] [13] [14] [18] [24]
7Suju M. George [1]
8Vadim Gerasimov [16]
9M. Choudary Gorantla [11] [13] [14] [18] [22] [23] [24]
10Stephen Gould [43]
11Ved Prakash Gulati [2] [4] [5] [6] [9] [10] [12] [13] [17] [18] [25] [34]
12Shailaja Gummadidala [32] [35]
13Abhinav Gupta [7]
14Anurag Gupta [20]
15Gaurav Gupta [16]
16Geremy Heitz [43]
17Phani Kumar Kancharla [32] [35]
18A. Kavitha [29]
19Justin Kearns [27] [28]
20Daphne Koller [43]
21K. Phani Kumar [29] [30]
22Pradeep Kumar [44]
23Jeff Michels [19]
24Amitabha Mukerjee [7]
25Atul Negi [8]
26Andrew Y. Ng [15] [19] [27] [28] [37] [38] [39] [42] [46] [47] [48]
27Chioma Osondu [28]
28Sébastien Ourselin [16]
29Vishal Pannala [41]
30Deepak B. Phatak [9] [25] [26] [33]
31Munaga V. N. K. Prasad [31]
32Arun K. Pujari [6] [10] [12]
33P. Rambabu [1]
34Benjamin Sapp [48]
35Jamie Schulte [37]
36G. Shailaja [29] [30]
37Meena Singh [44]
38Min Sun [38] [39] [46]
39Sadybakasov Ulanbek [8]
40Ravi Sankar Veerubhotla [2] [6] [10] [12]
41Kapali Viswanathan [3]
42Lawson L. S. Wong [47]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)