Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

University of Nebraska - Lincoln

Series

Bibliometric analysis

Publication Year

Articles 1 - 6 of 6

Full-Text Articles in Computer Engineering

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar Mar 2021

Analysis Of Recent Trends In Malware Attacks On Android Phone: A Survey Using Scopus Database, Sonali Kothari Tidke, Vijayshri Khedkar

Library Philosophy and Practice (e-journal)

In past few years, smartphone use has shifted from professional access to personal need. Smartphone has now become an essential requirement to perform day to day activities. This has made smartphones unsecured and vulnerable to cyber threats and malware attacks. This study is also focused on finding intersection between malware attacks and Android OS considering Android as the most widely used mobile OS. A comprehensive search is conducted on Scopus Database for peer-reviewed articles. The study is carried out on bibliometric data of the considered articles to generate a highly useful concept map.


A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R Feb 2021

A Bibliometric Analysis Of Plant Disease Classification With Artificial Intelligence Based On Scopus And Wos, Shivali Amit Wagle, Harikrishnan R

Library Philosophy and Practice (e-journal)

The maneuver of Artificial Intelligence (AI) techniques in the field of agriculture help in the classification of diseases. Early prediction of the disease benefits in taking relevant management steps. This is an important step towards controlling the disease growth that will yield good quality products to fulfill the global food demand. The main objective of this paper is to study the extent of research work done in this area of plant disease classification. The paper discusses the bibliometric analysis of plant disease classification with AI in Scopus and Web of Science core collection (WOS) database in analyzing the research by …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade Oct 2020

Bibliometric Survey On Biometric Iris Liveness Detection, Smita Khade, Dr.Swati Ahirrao, Dr. Sudeep Thepade

Library Philosophy and Practice (e-journal)

Authentication is an essential step for giving access to resources to authorized individuals and prevent leakage of confidential information. The traditional authentication systems like a pin, card, a password could not differentiate among the authorized users and fakers who have an illegal access to the system. Traditional authentication technique never alerts about the unwanted access to the system. The device that allows the automatic identification of an individual is known as a biometric system. It is not required to remember a password, card, and pin code in the Bio-metric system. Numerous biometric characteristics like the fingerprint, iris, palm print, face …


Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha Jan 2020

Bibliometric Analysis Of Passive Image Forgery Detection And Explainable Ai, Kalyani Dhananjay Kadam, Dr. Swati Ahirrao Ahirrao, Dr. Ketan Kotecha

Library Philosophy and Practice (e-journal)

Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using …