default search action
Ashu Sharma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Ashu Sharma
, Jayanta Kumar Ghosh, Saptarshi Kolay:
Reference data preparation for complex satellite image segmentation. IET Image Process. 14(4): 628-637 (2020) - [j3]Brinda Sampat
, Bala Prabhakar, Nilay Yajnik, Ashu Sharma:
Adoption of mobile fitness and dietary apps in India: an empirical study. Int. J. Bus. Inf. Syst. 35(4): 471-496 (2020) - [c3]Brinda Sampat
, Ashu Sharma, Bala Prabhakar:
Understanding Factors Influencing the Usage Intention of Mobile Pregnancy Applications. TDIT (1) 2020: 641-654
2010 – 2019
- 2019
- [j2]Ashu Sharma, Sanjay Kumar Sahay:
Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy. Int. J. Netw. Secur. 21(3): 409-417 (2019) - [j1]Anand Handa, Ashu Sharma, Sandeep K. Shukla:
Machine learning in cybersecurity: A review. WIREs Data Mining Knowl. Discov. 9(4) (2019) - [i8]Ashu Sharma, Sanjay Kumar Sahay:
Group-wise classification approach to improve Android malicious apps detection accuracy. CoRR abs/1904.02122 (2019) - [i7]Sanjay K. Sahay, Ashu Sharma:
A Survey on the Detection of Android Malicious Apps. CoRR abs/1905.13747 (2019) - 2018
- [i6]Ashu Sharma, Sanjay Kumar Sahay:
An investigation of the classifiers to detect android malicious apps. CoRR abs/1802.08611 (2018) - [i5]Ashu Sharma, Jayanta Kumar Ghosh, Saptarshi Kolay:
Fixation Data Analysis for High Resolution Satellite Images. CoRR abs/1805.00192 (2018) - 2017
- [c2]Ashu Sharma, Jayanta Kumar Ghosh:
A Bottom-Up Saliency-Based Segmentation for High-Resolution Satellite Images. CVIP (2) 2017: 169-180 - [c1]Preeti Khanna
, Ashu Sharma:
Integrating SCM with internet of things: implication on HR management. ICC 2017: 170:1-170:13 - 2016
- [i4]Ashu Sharma, Sanjay Kumar Sahay:
An effective approach for classification of advanced malware with high accuracy. CoRR abs/1606.06897 (2016) - [i3]Sanjay Kumar Sahay, Ashu Sharma:
Grouping the executables to detect malware with high accuracy. CoRR abs/1606.06908 (2016) - [i2]Ashu Sharma, Sanjay Kumar Sahay, Abhishek Kumar:
Improving the detection accuracy of unknown malware by partitioning the executables in groups. CoRR abs/1606.06909 (2016) - 2014
- [i1]Ashu Sharma, Sanjay Kumar Sahay:
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey. CoRR abs/1406.7061 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint