default search action
Aditi Roy
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum:
OTK-based PUF CRP obfuscation for IoT device authentication. Microelectron. J. 144: 106070 (2024) - 2023
- [j11]Aditi Roy, Kokila Jagadeesh, Natarajan Ramasubramanian, B. Shameedha Begum:
Device-specific security challenges and solution in IoT edge computing: a review. J. Supercomput. 79(18): 20790-20825 (2023) - [c19]Kuber Reddy Gorantla, Aditi Roy:
Generalizable Solar Irradiation Prediction using Large Transformer Models with Sky Imagery. MVA 2023: 1-5 - 2022
- [j10]Peri Akiva, Benjamin Planche, Aditi Roy, Peter Oudemans, Kristin J. Dana:
Vision on the bog: Cranberry crop risk evaluation with deep learning. Comput. Electron. Agric. 203: 107444 (2022) - [c18]Aditi Roy, Kokila Jagadeesh, Ramasubramanian Natarajan, B. Shameedha Begum:
Random Number Generation for PKI Using Controlled Anderson PUF. PKIA 2022: 1-6 - 2021
- [c17]Ataollah Tajabadi, Aditi Roy, Marta Varela, Oleg V. Aslanidi:
Evolution of Epicardial Rotors into Breakthrough Waves During Atrial Fibrillation in 3D Canine Biatrial Model with Detailed Fibre Orientation. CinC 2021: 1-4 - [c16]Peri Akiva, Benjamin Planche, Aditi Roy, Kristin J. Dana, Peter Oudemans, Michael Mars:
AI on the Bog: Monitoring and Evaluating Cranberry Crop Risk. WACV 2021: 2492-2501 - 2020
- [j9]Aditi Roy, Marta Varela, Henry Chubb, Robert S. MacLeod, Jules C. Hancox, Tobias Schaeffter, Oleg V. Aslanidi:
Identifying locations of re-entrant drivers from patient-specific distribution of fibrosis in the left atrium. PLoS Comput. Biol. 16(9) (2020) - [c15]Amar Viswanathan Kannan, Dmitriy Fradkin, Ioannis Akrotirianakis, Tugba Kulahcioglu, Arquimedes Canedo, Aditi Roy, Shih-Yuan Yu, Arnav V. Malawade, Mohammad Abdullah Al Faruque:
Multimodal Knowledge Graph for Deep Learning Papers and Code. CIKM 2020: 3417-3420 - [c14]Ahmed Qureshi, Aditi Roy, Henry Chubb, Adelaide de Vecchi, Oleg V. Aslanidi:
Investigating Strain as a Biomarker for Atrial Fibrosis Quantified by Patient Cine MRI Data. CinC 2020: 1-4 - [c13]Aditi Roy, Ioannis Akrotirianakis, Amar Viswanathan Kannan, Dmitriy Fradkin, Arquimedes Canedo, Kaushik Koneripalli, Tugba Kulahcioglu:
Diag2graph: Representing Deep Learning Diagrams In Research Papers As Knowledge Graphs. ICIP 2020: 2581-2585 - [i4]Peri Akiva, Benjamin Planche, Aditi Roy, Kristin J. Dana, Peter Oudemans, Michael Mars:
AI on the Bog: Monitoring and Evaluating Cranberry Crop Risk. CoRR abs/2011.04064 (2020)
2010 – 2019
- 2019
- [j8]Toan Nguyen, Aditi Roy, Nasir D. Memon:
Kid on the phone! Toward automatic detection of children on mobile devices. Comput. Secur. 84: 334-348 (2019) - [c12]Aditi Roy, Nasir D. Memon, Arun Ross:
MasterPrint Attack Resistance: A Maximum Cover Based Approach for Automatic Fingerprint Template Selection. BTAS 2019: 1-9 - [c11]Marica Muffoletto, Xiao Fu, Aditi Roy, Marta Varela, Paul A. Bates, Oleg V. Aslanidi:
Development of a Deep Learning Method to Predict Optimal Ablation Patterns for Atrial Fibrillation. CIBCB 2019: 1-4 - [c10]Aditi Roy, Marta Varela, Henry Chubb, Robert S. MacLeod, Jules C. Hancox, Tobias Schaeffter, Mark D. O'Neill, Oleg V. Aslanidi:
Virtual Catheter Ablation of Target Areas Identified from Image-Based Models of Atrial Fibrillation. FIMH 2019: 11-19 - 2018
- [c9]Philip Bontrager, Aditi Roy, Julian Togelius, Nasir D. Memon, Arun Ross:
DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution*. BTAS 2018: 1-9 - [c8]Aditi Roy, Nasir D. Memon, Julian Togelius, Arun Ross:
Evolutionary Methods for Generating Synthetic MasterPrint Templates: Dictionary Attack in Fingerprint Recognition. ICB 2018: 39-46 - [c7]Bhaswati Saha, K. Sai Ram, Jayanta Mukhopadhyay, Aditi Roy, Anchit Navelkar:
Video Based Person Re-Identification by Re-Ranking Attentive Temporal Information in Deep Recurrent Convolutional Networks. ICIP 2018: 1663-1667 - [i3]Toan Nguyen, Aditi Roy, Nasir D. Memon:
Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices. CoRR abs/1808.01680 (2018) - 2017
- [j7]Aditi Roy, Nasir D. Memon, Arun Ross:
MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems. IEEE Trans. Inf. Forensics Secur. 12(9): 2013-2025 (2017) - [c6]Aditi Roy, Marta Varela, Oleg V. Aslanidi:
Image-Based Computational Evaluation of the Competing Effect of Atrial Wall Thickness and Fibrosis on Re-entrant Drivers for Atrial Arrhythmias. CinC 2017 - [i2]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based Multi-sensor Approach for Continuous Mobile Authentication. CoRR abs/1712.08305 (2017) - [i1]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. CoRR abs/1712.08307 (2017) - 2015
- [j6]Aditi Roy, Pratik Chattopadhyay, Shamik Sural, Jayanta Mukherjee, Gerhard Rigoll:
Modelling, synthesis and characterisation of occlusion in videos. IET Comput. Vis. 9(6): 821-830 (2015) - [c5]Dhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, Nasir D. Memon:
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass. Financial Cryptography Workshops 2015: 281-297 - [c4]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based multi-sensor approach for continuous mobile authentication. MILCOM 2015: 1311-1316 - 2014
- [j5]Pratik Chattopadhyay, Aditi Roy, Shamik Sural, Jayanta Mukhopadhyay:
Pose Depth Volume extraction from RGB-D streams for frontal gait recognition. J. Vis. Commun. Image Represent. 25(1): 53-63 (2014) - [c3]Aditi Roy, Tzipora Halevi, Nasir D. Memon:
An HMM-based behavior modeling approach for continuous mobile authentication. ICASSP 2014: 3789-3793 - 2012
- [j4]Aditi Roy, Shamik Sural, Jayanta Mukherjee:
A hierarchical method combining gait and phase of motion with spatiotemporal model for person re-identification. Pattern Recognit. Lett. 33(14): 1891-1901 (2012) - [j3]Aditi Roy, Shamik Sural, Jayanta Mukherjee:
Gait recognition using Pose Kinematics and Pose Energy Image. Signal Process. 92(3): 780-792 (2012) - 2011
- [j2]Aditi Roy, Shamik Sural, Jayanta Mukherjee, Gerhard Rigoll:
Occlusion detection and gait silhouette reconstruction from degraded scenes. Signal Image Video Process. 5(4): 415-430 (2011) - [c2]Aditi Roy, Shamik Sural, Jayanta Mukherjee, Arun K. Majumdar:
A hierarchical approach for content-based echocardiogram video indexing and retrieval. ICCCS 2011: 253-258
2000 – 2009
- 2008
- [j1]Aditi Roy, Shamik Sural, Jayanta Mukherjee, Arun K. Majumdar:
State-Based Modeling and Object Extraction From Echocardiogram Video. IEEE Trans. Inf. Technol. Biomed. 12(3): 366-376 (2008) - 2006
- [c1]Aditi Roy, Shamik Sural, Jayanta Mukherjee, Arun K. Majumdar:
Modeling of Echocardiogram Video Based on Views and States. ICVGIP 2006: 397-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint