default search action
D. Vijay Rao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Priyanka Gupta, Bhavya Pareek, Gaurav Singal, D. Vijay Rao:
Edge device based Military Vehicle Detection and Classification from UAV. Multim. Tools Appl. 81(14): 19813-19834 (2022) - [j6]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg, Neeraj Kumar:
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. ACM Trans. Internet Techn. 22(1): 1:1-1:27 (2022) - 2020
- [j5]Vasisht Duddu, N. Rajesh Pillai, D. Vijay Rao, Valentina Emilia Balas:
Fault tolerance of neural networks in adversarial settings. J. Intell. Fuzzy Syst. 38(5): 5897-5907 (2020) - [c11]Vasisht Duddu, D. Vijay Rao:
Quantifying (Hyper) Parameter Leakage in Machine Learning. BigMM 2020: 239-244 - [c10]Vasisht Duddu, D. Vijay Rao, Valentina Emilia Balas:
Towards Enhancing Fault Tolerance in Neural Networks. MobiQuitous 2020: 59-68
2010 – 2019
- 2019
- [c9]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha:
UAVs Reliable Transmission for Multicast Protocols in FANETs. IoTSMS 2019: 130-135 - [i5]Vasisht Duddu, D. Vijay Rao, Valentina Emilia Balas:
Adversarial Fault Tolerant Training for Deep Neural Networks. CoRR abs/1907.03103 (2019) - [i4]Vasisht Duddu, N. Rajesh Pillai, D. Vijay Rao, Valentina Emilia Balas:
Fault Tolerance of Neural Networks in Adversarial Settings. CoRR abs/1910.13875 (2019) - [i3]Vasisht Duddu, D. Vijay Rao:
Quantifying (Hyper) Parameter Leakage in Machine Learning. CoRR abs/1910.14409 (2019) - 2018
- [c8]Vasisht Duddu, Debasis Samanta, D. Vijay Rao:
Fuzzy Graph Modelling of Anonymous Networks. SOFA (2) 2018: 432-444 - [i2]Vasisht Duddu, Debasis Samanta, D. Vijay Rao, Valentina Emilia Balas:
Stealing Neural Networks via Timing Side Channels. CoRR abs/1812.11720 (2018) - 2017
- [j4]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Meenakshi Tripathi, Riti Kushwaha:
Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Networks 63: 115-128 (2017) - [j3]Gaurav Singal, Vijay Laxmi, D. Vijay Rao, Swati Todi, Manoj Singh Gaur:
Improved multicast routing in MANETs using link stability and route stability. Int. J. Commun. Syst. 30(11) (2017) - [j2]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao:
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Wirel. Networks 23(3): 663-679 (2017) - [i1]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha:
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges. CoRR abs/1708.09573 (2017) - 2016
- [c7]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Akka Zemmari:
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks. Wireless Days 2016: 1-6 - [p3]D. Vijay Rao:
Design and Development of Intelligent Military Training Systems and Wargames. Recent Advances in Computational Intelligence in Defense and Security 2016: 555-603 - 2014
- [c6]Abhay Bhadani, Ravi Shankar, D. Vijay Rao:
Towards an understanding of Intent-to-adopt M-Ticketing among Passengers of Indian Railways. AMCIS 2014 - [p2]D. Vijay Rao, V. V. S. Sarma:
A Computational Intelligence Approach to Software Component Repository Management. Innovations in Intelligent Machines (5) 2014: 109-132 - [p1]D. Vijay Rao, Dana Balas-Timar:
A Soft Computing Approach to Model Human Factors in Air Warfare Simulation System. Innovations in Intelligent Machines (5) 2014: 133-154 - 2013
- [c5]Shweta Singh, D. Vijay Rao:
Recognition and identification of target images using feature based retrieval in UAV missions. NCVPRIPG 2013: 1-4 - 2012
- [c4]Abhay Bhadani, Ravi Shankar, D. Vijay Rao:
A Computational Intelligence based Approach to Telecom Customer Classification for Value Added Services. BIC-TA (1) 2012: 181-192 - [c3]D. Vijay Rao, Ravi Shankar, Lazaros S. Iliadis, V. V. S. Sarma:
An Ontology Based Approach to Designing Adaptive Lesson Plans in Military Training Simulators. EANN 2012: 81-93 - 2011
- [c2]D. Vijay Rao, Lazaros S. Iliadis, Stefanos Spartalis:
A Neuro-Fuzzy Hybridization Approach to Model Weather Operations in a Virtual Warfare Analysis System. EANN/AIAI (1) 2011: 111-121 - 2010
- [c1]D. Vijay Rao, Jasleen Kaur:
A Fuzzy Rule-Based Approach to Design Game Rules in a Mission Planning and Evaluation System. AIAI 2010: 53-61
2000 – 2009
- 2003
- [j1]D. Vijay Rao, V. V. S. Sarma:
A rough-fuzzy approach for retrieval of candidate components for software reuse. Pattern Recognit. Lett. 24(6): 875-886 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint