Personal Information
Organization / Workplace
Greater Memphis Area United States
Occupation
Post doc at North Carolina A&T
Industry
Education
Website
kishordgupta.com/
Tags
ml
nlp
blockchain
security
cyber
machine learning
artificial intelligence
adversarial machine learning
stylometry
ai
cryptocurrency
bitcoin
information security
software development
log analysis
software
vulnerability
distirubted system
authenication
software testing
network
computer
reinforcement learning
technology
genetic algorithm
intrusion detection
open data
consensus
barcode
map
virtual 3d
cryptojacking
protection
access control
attribute
role
authentication
protocol
trust
sdn
software defined network
ddos attack
byzantine
denial of service
social network
privacy big data
analysis
fake news
crowd source
social
agreement mutual exclusion
review system
collaborative filtering
fine grained
genetic algorithms
ga
fitness funcion
penalty function
review
code version
code commit
attack graph
markov chain
cvss
network vulnerability
risk assesment
revision
market analysis
code history
code
management
fuzzy
smarthome
iot
quick response code
ddos
qr
local blockchain
iota
byteball
dag
qr-code
merkle tree
monte carlo
shared
recommendation
forensics
deeplearning
time series
policy
snort
data mining
covid
newspaper
tsne
mnist
medical
healthcare
cnn
pca
lda
lsne
kmeans
clustering
lower dimensional feature
interpretable learning model
unidentifiable data
recommendation system
adversarial attacks and defense
deployed ml
mlops
dnn
aml
word2vec
zero shot
image classification
negative selection algorithm
computer science
rl
user-item interactions
neural network
reinforcement learning
power distribution
microgrid
malware
ransomware
rulebased
accuracy
explainability
file access
ledger
classification
malicious website
spark
performance
performance evaluation
apache spark
apache hadoop
cloud
language prcessing
stylo
deep
basic digital image concept
ieee
bias
alogirthm
hci
fake review detection
jaccard similarity
sentient analysis
natural language processing
review manipulation
hybrid
pow
pos
attack
51%
password
hashing
network reconfiguration.
See more
Presentations
(45)Likes
(1)Lecture 1 and 2 processes
Rushdi Shams
•
11 years ago
Personal Information
Organization / Workplace
Greater Memphis Area United States
Occupation
Post doc at North Carolina A&T
Industry
Education
Website
kishordgupta.com/
Tags
ml
nlp
blockchain
security
cyber
machine learning
artificial intelligence
adversarial machine learning
stylometry
ai
cryptocurrency
bitcoin
information security
software development
log analysis
software
vulnerability
distirubted system
authenication
software testing
network
computer
reinforcement learning
technology
genetic algorithm
intrusion detection
open data
consensus
barcode
map
virtual 3d
cryptojacking
protection
access control
attribute
role
authentication
protocol
trust
sdn
software defined network
ddos attack
byzantine
denial of service
social network
privacy big data
analysis
fake news
crowd source
social
agreement mutual exclusion
review system
collaborative filtering
fine grained
genetic algorithms
ga
fitness funcion
penalty function
review
code version
code commit
attack graph
markov chain
cvss
network vulnerability
risk assesment
revision
market analysis
code history
code
management
fuzzy
smarthome
iot
quick response code
ddos
qr
local blockchain
iota
byteball
dag
qr-code
merkle tree
monte carlo
shared
recommendation
forensics
deeplearning
time series
policy
snort
data mining
covid
newspaper
tsne
mnist
medical
healthcare
cnn
pca
lda
lsne
kmeans
clustering
lower dimensional feature
interpretable learning model
unidentifiable data
recommendation system
adversarial attacks and defense
deployed ml
mlops
dnn
aml
word2vec
zero shot
image classification
negative selection algorithm
computer science
rl
user-item interactions
neural network
reinforcement learning
power distribution
microgrid
malware
ransomware
rulebased
accuracy
explainability
file access
ledger
classification
malicious website
spark
performance
performance evaluation
apache spark
apache hadoop
cloud
language prcessing
stylo
deep
basic digital image concept
ieee
bias
alogirthm
hci
fake review detection
jaccard similarity
sentient analysis
natural language processing
review manipulation
hybrid
pow
pos
attack
51%
password
hashing
network reconfiguration.
See more