| 2008 |
| 48 | | Benjamin Sapp,
Ashutosh Saxena,
Andrew Y. Ng:
A Fast Data Collection and Augmentation Procedure for Object Recognition.
AAAI 2008: 1402-1408 |
| 47 | | Ashutosh Saxena,
Lawson L. S. Wong,
Andrew Y. Ng:
Learning Grasp Strategies with Partial Shape Information.
AAAI 2008: 1491-1494 |
| 46 | | Ashutosh Saxena,
Min Sun,
Andrew Y. Ng:
Make3D: Depth Perception from a Single Still Image.
AAAI 2008: 1571-1576 |
| 45 | EE | Ashutosh Saxena:
Dynamic authentication: Need than a choice.
COMSWARE 2008: 214-218 |
| 44 | | Pradeep Kumar,
Meena Singh,
Ashutosh Saxena:
HEMIN: A Cryptographic Approach for Private k-NN Classification.
DMIN 2008: 500-505 |
| 43 | EE | Geremy Heitz,
Stephen Gould,
Ashutosh Saxena,
Daphne Koller:
Cascaded Classification Models: Combining Models for Holistic Scene Understanding.
NIPS 2008: 641-648 |
| 42 | EE | Ashutosh Saxena,
Sung H. Chung,
Andrew Y. Ng:
3-D Depth Reconstruction from a Single Still Image.
International Journal of Computer Vision 76(1): 53-69 (2008) |
| 2007 |
| 41 | | Vishal Pannala,
Sibesh Bhattacharya,
Ashutosh Saxena:
Synthetic Data for Privacy Preserving Data Mining.
DMIN 2007: 315-320 |
| 40 | EE | Ashutosh Saxena:
Threshold SKI Protocol for ID-based Cryptosystems.
IAS 2007: 65-70 |
| 39 | EE | Ashutosh Saxena,
Min Sun,
Andrew Y. Ng:
3-D Reconstruction from Sparse Views using Monocular Vision.
ICCV 2007: 1-8 |
| 38 | EE | Ashutosh Saxena,
Min Sun,
Andrew Y. Ng:
Learning 3-D Scene Structure from a Single Still Image.
ICCV 2007: 1-8 |
| 37 | EE | Ashutosh Saxena,
Jamie Schulte,
Andrew Y. Ng:
Depth Estimation Using Monocular and Stereo Cues.
IJCAI 2007: 2197-2203 |
| 36 | | Sibesh Bhattacharya,
Ashutosh Saxena:
A model to secure data warehouse.
IKE 2007: 25-30 |
| 35 | | Ashutosh Saxena,
Shailaja Gummadidala,
Phani Kumar Kancharla:
An Efficient Authentication Protocol for GSM.
Security and Management 2007: 65-69 |
| 34 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
A Dynamic ID-based Remote User Authentication Scheme
CoRR abs/0712.2235: (2007) |
| 33 | EE | Manik Lal Das,
Ashutosh Saxena,
Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
CoRR abs/0712.3084: (2007) |
| 32 | EE | Phani Kumar Kancharla,
Shailaja Gummadidala,
Ashutosh Saxena:
Identity Based Strong Designated Verifier Signature Scheme.
Informatica, Lith. Acad. Sci. 18(2): 239-252 (2007) |
| 2006 |
| 31 | EE | Milind Engedy,
Munaga V. N. K. Prasad,
Ashutosh Saxena:
A Robust Wavelet Based Digital Watermarking Scheme Using Chaotic Mixing.
ICDIM 2006: 36-40 |
| 30 | EE | G. Shailaja,
K. Phani Kumar,
Ashutosh Saxena:
Universal Designated Multi Verifier Signature without Random Oracles.
ICIT 2006: 168-171 |
| 29 | EE | K. Phani Kumar,
G. Shailaja,
A. Kavitha,
Ashutosh Saxena:
Mutual Authentication and Key Agreement for GSM.
ICMB 2006: 25 |
| 28 | EE | Ashutosh Saxena,
Justin Driemeyer,
Justin Kearns,
Chioma Osondu,
Andrew Y. Ng:
Learning to Grasp Novel Objects Using Vision.
ISER 2006: 33-42 |
| 27 | EE | Ashutosh Saxena,
Justin Driemeyer,
Justin Kearns,
Andrew Y. Ng:
Robotic Grasping of Novel Objects.
NIPS 2006: 1209-1216 |
| 26 | EE | Manik Lal Das,
Ashutosh Saxena,
Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey
CoRR abs/cs/0612098: (2006) |
| 25 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings.
Computers & Security 25(3): 184-189 (2006) |
| 24 | EE | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena:
Identity Based Multisignatures.
Informatica, Lith. Acad. Sci. 17(2): 177-186 (2006) |
| 2005 |
| 23 | EE | M. Choudary Gorantla,
Ashutosh Saxena:
An Efficient Certificateless Signature Scheme.
CIS (2) 2005: 110-116 |
| 22 | EE | M. Choudary Gorantla,
Ashutosh Saxena:
Verifiably Encrypted Signature Scheme Without Random Oracles.
ICDCIT 2005: 357-363 |
| 21 | EE | Manik Lal Das,
Ashutosh Saxena:
SPAM: Secure Protocol for Authentication in Mobile-Communications.
ICMB 2005: 23-27 |
| 20 | EE | Ashutosh Saxena,
Manik Lal Das,
Anurag Gupta:
MMPS: A Versatile Mobile-to-Mobile Payment System.
ICMB 2005: 400-405 |
| 19 | EE | Jeff Michels,
Ashutosh Saxena,
Andrew Y. Ng:
High speed obstacle avoidance using monocular vision and reinforcement learning.
ICML 2005: 593-600 |
| 18 | EE | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems.
ITCC (1) 2005: 674-678 |
| 17 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
Cryptanalysis and Improvement of a Multisignature Scheme.
IWDC 2005: 398-403 |
| 16 | EE | Ashutosh Saxena,
Gaurav Gupta,
Vadim Gerasimov,
Sébastien Ourselin:
In Use Parameter Estimation of Inertial Sensors by Detecting Multilevel Quasi-static States.
KES (4) 2005: 595-601 |
| 15 | EE | Ashutosh Saxena,
Sung H. Chung,
Andrew Y. Ng:
Learning Depth from Single Monocular Images.
NIPS 2005 |
| 14 | | M. Choudary Gorantla,
Raju Gangishetti,
Manik Lal Das,
Ashutosh Saxena:
An Effective Certificateless Signature Scheme Based on Bilinear Pairings.
WOSIS 2005: 31-39 |
| 13 | | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
ID-based Serial Multisignature Scheme using Bilinear Pairings.
WOSIS 2005: 40-47 |
| 12 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
CoRR abs/cs/0505062: (2005) |
| 11 | EE | Raju Gangishetti,
M. Choudary Gorantla,
Manik Lal Das,
Ashutosh Saxena:
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems
CoRR abs/cs/0506015: (2005) |
| 10 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing.
J. UCS 11(1): 122-149 (2005) |
| 9 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati,
Deepak B. Phatak:
Hierarchical key management scheme using polynomial interpolation.
Operating Systems Review 39(1): 40-47 (2005) |
| 2004 |
| 8 | EE | Sadybakasov Ulanbek,
Ashutosh Saxena,
Atul Negi:
On Reduction of Bootstrapping Information Using Digital Multisignature.
CIT 2004: 198-204 |
| 7 | EE | Ashutosh Saxena,
Abhinav Gupta,
Amitabha Mukerjee:
Non-linear Dimensionality Reduction by Locally Linear Isomaps.
ICONIP 2004: 1038-1043 |
| 6 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati,
Arun K. Pujari:
On Gossip Codes and Traceability Schemes.
ITCC (1) 2004: 772-777 |
| 5 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
A Novel Remote User Authentication Scheme Through Dynamic Login Identity.
IWDC 2004: 532 |
| 4 | EE | Manik Lal Das,
Ashutosh Saxena,
Ved Prakash Gulati:
An Efficient Proxy Signature Scheme with Revocation.
Informatica, Lith. Acad. Sci. 15(4): 455-464 (2004) |
| 2002 |
| 3 | EE | Kapali Viswanathan,
Ashutosh Saxena:
Towards Logically and Physically Secure Public-Key Infrastructures.
INDOCRYPT 2002: 122-134 |
| 2 | EE | Ravi Sankar Veerubhotla,
Ashutosh Saxena,
Ved Prakash Gulati:
Reed Solomon Codes for Digital Fingerprinting.
INDOCRYPT 2002: 163-175 |
| 1998 |
| 1 | EE | Ashutosh Saxena,
Suju M. George,
P. Rambabu:
Interconnection Wire-Length Estimation in VLSI Standard Cell Placement Via Neural Network.
International Journal on Artificial Intelligence Tools 7(4): 443-451 (1998) |