Data mining techniques AK Pujari Universities press, 2001 | 743 | 2001 |
N-gram analysis for computer virus detection DKS Reddy, AK Pujari Journal in computer virology 2, 231-239, 2006 | 170 | 2006 |
INDu: An Interval & Duration Network AK Pujari, G Vijaya Kumari, A Sattar Australasian Joint Conference on Artificial Intelligence, 291-303, 1999 | 124 | 1999 |
QROCK: A quick version of the ROCK algorithm for clustering of categorical data M Dutta, AK Mahanta, AK Pujari Pattern Recognition Letters 26 (15), 2364-2373, 2005 | 108 | 2005 |
Intrusion detection using text processing techniques with a kernel based similarity measure A Sharma, AK Pujari, KK Paliwal computers & security 26 (7-8), 488-495, 2007 | 107 | 2007 |
Q-coverage problem in wireless sensor networks M Chaudhary, AK Pujari Distributed Computing and Networking: 10th International Conference, ICDCN …, 2009 | 84 | 2009 |
An intelligent character recognizer for Telugu scripts using multiresolution analysis and associative memory AK Pujari, CD Naidu, MS Rao, BC Jinaga Image and Vision Computing 22 (14), 1221-1227, 2004 | 75* | 2004 |
Intrusion detection using text processing techniques with a binary-weighted cosine metric S Rawat, VP Gulati, AK Pujari, VR Vemuri Journal of Information Assurance and Security 1 (1), 43-50, 2006 | 69 | 2006 |
Recognition of Telugu characters using neural networks MB Sukhaswami, P Seetharamulu, AK Pujari International Journal of Neural Systems 6 (03), 317-357, 1995 | 68 | 1995 |
A modified Gabor function for content based image retrieval CS Sastry, M Ravindranath, AK Pujari, BL Deekshatulu Pattern Recognition Letters 28 (2), 293-300, 2007 | 60 | 2007 |
Virtual user approach for group recommender systems using precedence relations VR Kagita, AK Pujari, V Padmanabhan Information Sciences 294, 15-30, 2015 | 59 | 2015 |
Conformal matrix factorization based recommender system TVR Himabindu, V Padmanabhan, AK Pujari Information Sciences 467, 685-707, 2018 | 53 | 2018 |
Collaborative filtering using multiple binary maximum margin matrix factorizations V Kumar, AK Pujari, SK Sahu, VR Kagita, V Padmanabhan Information Sciences 380, 1-11, 2017 | 53 | 2017 |
New Malicious Code Detection Using Variable Length n-grams DKS Reddy, SK Dash, AK Pujari Information Systems Security: Second International Conference, ICISS 2006 …, 2006 | 51 | 2006 |
Volume intersection with optimal set of directions K Shanmukh, AK Pujari Pattern Recognition Letters 12 (3), 165-170, 1991 | 50 | 1991 |
Adaptive Naive Bayes method for masquerade detection SK Dash, KS Reddy, AK Pujari Security and Communication Networks 4 (4), 410-417, 2011 | 48 | 2011 |
On the use of singular value decomposition for a fast intrusion detection system S Rawat, AK Pujari, VP Gulati Electronic Notes in Theoretical Computer Science 142, 215-228, 2006 | 48 | 2006 |
Group preserving label embedding for multi-label classification V Kumar, AK Pujari, V Padmanabhan, VR Kagita Pattern Recognition 90, 23-34, 2019 | 44 | 2019 |
A new framework for reasoning about points, intervals and durations AK Pujari, A Sattar IJCAI, 1259-1267, 1999 | 42 | 1999 |
Episode based masquerade detection SK Dash, KS Reddy, AK Pujari Information Systems Security: First International Conference, ICISS 2005 …, 2005 | 39 | 2005 |