Immediate Impact
70 standout
Citing Papers
A 3D Memristive Cubic Map With Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
2025 Standout
Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
2025 Standout
Works of Umashankar Rawat being referenced
IEHC: An efficient image encryption technique using hybrid chaotic map
2022
Image Forgery Detection Using Singular Value Decomposition with Some Attacks
2020
Author Peers
| Author | Last Decade | Papers | Cites | |||||
|---|---|---|---|---|---|---|---|---|
| Umashankar Rawat | 269 | 48 | 76 | 136 | 95 | 24 | 432 | |
| Jinqing Li | 246 | 36 | 38 | 118 | 64 | 39 | 422 | |
| Sundararaman Rajagopalan | 358 | 54 | 93 | 146 | 27 | 31 | 472 | |
| Satyabrata Roy | 197 | 58 | 73 | 207 | 188 | 27 | 476 | |
| Leo J. Guibas | 129 | 75 | 134 | 187 | 71 | 27 | 463 | |
| M. Brindha | 324 | 17 | 67 | 116 | 41 | 49 | 442 | |
| Jianfeng Zhao | 338 | 32 | 73 | 151 | 100 | 14 | 442 | |
| Zhijian Wang | 202 | 15 | 43 | 94 | 57 | 34 | 386 | |
| Mohammad Mazyad Hazzazi | 375 | 41 | 60 | 190 | 23 | 43 | 452 | |
| Ke Yuan | 304 | 50 | 93 | 128 | 21 | 24 | 389 | |
| Sofiane Kharbech | 245 | 69 | 66 | 148 | 22 | 18 | 389 |
All Works
Login with ORCID to disown or claim papers
Loading papers...