2008 | ||
---|---|---|
48 | Benjamin Sapp, Ashutosh Saxena, Andrew Y. Ng: A Fast Data Collection and Augmentation Procedure for Object Recognition. AAAI 2008: 1402-1408 | |
47 | Ashutosh Saxena, Lawson L. S. Wong, Andrew Y. Ng: Learning Grasp Strategies with Partial Shape Information. AAAI 2008: 1491-1494 | |
46 | Ashutosh Saxena, Min Sun, Andrew Y. Ng: Make3D: Depth Perception from a Single Still Image. AAAI 2008: 1571-1576 | |
45 | EE | Ashutosh Saxena: Dynamic authentication: Need than a choice. COMSWARE 2008: 214-218 |
44 | Pradeep Kumar, Meena Singh, Ashutosh Saxena: HEMIN: A Cryptographic Approach for Private k-NN Classification. DMIN 2008: 500-505 | |
43 | EE | Geremy Heitz, Stephen Gould, Ashutosh Saxena, Daphne Koller: Cascaded Classification Models: Combining Models for Holistic Scene Understanding. NIPS 2008: 641-648 |
42 | EE | Ashutosh Saxena, Sung H. Chung, Andrew Y. Ng: 3-D Depth Reconstruction from a Single Still Image. International Journal of Computer Vision 76(1): 53-69 (2008) |
2007 | ||
41 | Vishal Pannala, Sibesh Bhattacharya, Ashutosh Saxena: Synthetic Data for Privacy Preserving Data Mining. DMIN 2007: 315-320 | |
40 | EE | Ashutosh Saxena: Threshold SKI Protocol for ID-based Cryptosystems. IAS 2007: 65-70 |
39 | EE | Ashutosh Saxena, Min Sun, Andrew Y. Ng: 3-D Reconstruction from Sparse Views using Monocular Vision. ICCV 2007: 1-8 |
38 | EE | Ashutosh Saxena, Min Sun, Andrew Y. Ng: Learning 3-D Scene Structure from a Single Still Image. ICCV 2007: 1-8 |
37 | EE | Ashutosh Saxena, Jamie Schulte, Andrew Y. Ng: Depth Estimation Using Monocular and Stereo Cues. IJCAI 2007: 2197-2203 |
36 | Sibesh Bhattacharya, Ashutosh Saxena: A model to secure data warehouse. IKE 2007: 25-30 | |
35 | Ashutosh Saxena, Shailaja Gummadidala, Phani Kumar Kancharla: An Efficient Authentication Protocol for GSM. Security and Management 2007: 65-69 | |
34 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Dynamic ID-based Remote User Authentication Scheme CoRR abs/0712.2235: (2007) |
33 | EE | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak: Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings CoRR abs/0712.3084: (2007) |
32 | EE | Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena: Identity Based Strong Designated Verifier Signature Scheme. Informatica, Lith. Acad. Sci. 18(2): 239-252 (2007) |
2006 | ||
31 | EE | Milind Engedy, Munaga V. N. K. Prasad, Ashutosh Saxena: A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing. ICDIM 2006: 36-40 |
30 | EE | G. Shailaja, K. Phani Kumar, Ashutosh Saxena: Universal Designated Multi Verifier Signature without Random Oracles. ICIT 2006: 168-171 |
29 | EE | K. Phani Kumar, G. Shailaja, A. Kavitha, Ashutosh Saxena: Mutual Authentication and Key Agreement for GSM. ICMB 2006: 25 |
28 | EE | Ashutosh Saxena, Justin Driemeyer, Justin Kearns, Chioma Osondu, Andrew Y. Ng: Learning to Grasp Novel Objects Using Vision. ISER 2006: 33-42 |
27 | EE | Ashutosh Saxena, Justin Driemeyer, Justin Kearns, Andrew Y. Ng: Robotic Grasping of Novel Objects. NIPS 2006: 1209-1216 |
26 | EE | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak: Algorithms and Approaches of Proxy Signature: A Survey CoRR abs/cs/0612098: (2006) |
25 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: A novel remote user authentication scheme using bilinear pairings. Computers & Security 25(3): 184-189 (2006) |
24 | EE | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena: Identity Based Multisignatures. Informatica, Lith. Acad. Sci. 17(2): 177-186 (2006) |
2005 | ||
23 | EE | M. Choudary Gorantla, Ashutosh Saxena: An Efficient Certificateless Signature Scheme. CIS (2) 2005: 110-116 |
22 | EE | M. Choudary Gorantla, Ashutosh Saxena: Verifiably Encrypted Signature Scheme Without Random Oracles. ICDCIT 2005: 357-363 |
21 | EE | Manik Lal Das, Ashutosh Saxena: SPAM: Secure Protocol for Authentication in Mobile-Communications. ICMB 2005: 23-27 |
20 | EE | Ashutosh Saxena, Manik Lal Das, Anurag Gupta: MMPS: A Versatile Mobile-to-Mobile Payment System. ICMB 2005: 400-405 |
19 | EE | Jeff Michels, Ashutosh Saxena, Andrew Y. Ng: High speed obstacle avoidance using monocular vision and reinforcement learning. ICML 2005: 593-600 |
18 | EE | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ITCC (1) 2005: 674-678 |
17 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: Cryptanalysis and Improvement of a Multisignature Scheme. IWDC 2005: 398-403 |
16 | EE | Ashutosh Saxena, Gaurav Gupta, Vadim Gerasimov, Sébastien Ourselin: In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States. KES (4) 2005: 595-601 |
15 | EE | Ashutosh Saxena, Sung H. Chung, Andrew Y. Ng: Learning Depth from Single Monocular Images. NIPS 2005 |
14 | M. Choudary Gorantla, Raju Gangishetti, Manik Lal Das, Ashutosh Saxena: An Effective Certificateless Signature Scheme Based on Bilinear Pairings. WOSIS 2005: 31-39 | |
13 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: ID-based Serial Multisignature Scheme using Bilinear Pairings. WOSIS 2005: 40-47 | |
12 | EE | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing CoRR abs/cs/0505062: (2005) |
11 | EE | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena: Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems CoRR abs/cs/0506015: (2005) |
10 | EE | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing. J. UCS 11(1): 122-149 (2005) |
9 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak: Hierarchical key management scheme using polynomial interpolation. Operating Systems Review 39(1): 40-47 (2005) |
2004 | ||
8 | EE | Sadybakasov Ulanbek, Ashutosh Saxena, Atul Negi: On Reduction of Bootstrapping Information Using Digital Multisignature. CIT 2004: 198-204 |
7 | EE | Ashutosh Saxena, Abhinav Gupta, Amitabha Mukerjee: Non-linear Dimensionality Reduction by Locally Linear Isomaps. ICONIP 2004: 1038-1043 |
6 | EE | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari: On Gossip Codes and Traceability Schemes. ITCC (1) 2004: 772-777 |
5 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: A Novel Remote User Authentication Scheme Through Dynamic Login Identity. IWDC 2004: 532 |
4 | EE | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati: An Efficient Proxy Signature Scheme with Revocation. Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004) |
2002 | ||
3 | EE | Kapali Viswanathan, Ashutosh Saxena: Towards Logically and Physically Secure Public-Key Infrastructures. INDOCRYPT 2002: 122-134 |
2 | EE | Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati: Reed Solomon Codes for Digital Fingerprinting. INDOCRYPT 2002: 163-175 |
1998 | ||
1 | EE | Ashutosh Saxena, Suju M. George, P. Rambabu: Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network. International Journal on Artificial Intelligence Tools 7(4): 443-451 (1998) |