Credit card fraud detection using hidden markov model D Iyer, A Mohanpurkar, S Janardhan, D Rathod, A Sardeshmukh 2011 World Congress on Information and Communication Technologies, 1062-1066, 2011 | 38 | 2011 |
A traitor identification technique for numeric relational databases with distortion minimization and collusion avoidance AA Mohanpurkar, MS Joshi International Journal of Ambient Computing and Intelligence (IJACI) 7 (2 …, 2016 | 18 | 2016 |
Advanced pin entry method by resisting shoulder surfing attacks YK Mali, A Mohanpurkar 2015 International Conference on Information Processing (ICIP), 37-42, 2015 | 18 | 2015 |
Applying watermarking for copyright protection, traitor identification and joint ownership: A review AA Mohanpurkar, MS Joshi 2011 World Congress on Information and Communication Technologies, 1014-1019, 2011 | 13 | 2011 |
A fingerprinting technique for numeric relational databases with distortion minimization A Mohanpurkar, M Joshi 2015 International Conference on Computing Communication Control and …, 2015 | 10 | 2015 |
Load balancing strategy based on cloud partitioning concept MSD More, A Mohanpurkar Multidiscip J Res Eng Technol 2 (2), 424-431, 2015 | 6 | 2015 |
Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance A Mohanpurkar, M Joshi International Journal of Computer Applications 130 (5), 13-18, 2015 | 5 | 2015 |
Validation of deduplication in data using similarity measure V Wandhekar, A Mohanpurkar International Journal of Computer Applications 116 (21), 2015 | 5 | 2015 |
Proof of duplication detection in data by applying similarity strategies V Wandhekar, A Mohanpurkar 2015 International Conference on Information Processing (ICIP), 429-434, 2015 | 3 | 2015 |
The Effect of the Novel Anti-Collusion Fingerprinting Scheme on the Knowledge from Numeric Databases A Mohanpurkar, M Joshi International Journal of Scientific and Engineering Research 6 (12), 334-338, 2015 | 3 | 2015 |
Impact of elasticity on cloud systems P Baruah, A Mohanpurkar International Journal of Computer Applications 120 (14), 2015 | 2 | 2015 |
Safe Multi Keyword Ranked Search over Encrypted Cloud Data PH Unde, A Mohanpurkar Communications on Applied Electronics 5 (6), 11-15, 2016 | 1 | 2016 |
Review on agent based cloud computing PH Unde, A Mohanpurkar International Journal of Computer Applications 975, 8887, 2015 | 1 | 2015 |
Efficient query handling on big data in network using pattern matching algorithm: A review P Kale, A Mohanpurkar International Journal of Science and Research (IJSR) 3 (11), 2247-2250, 2014 | 1 | 2014 |
Review on record LINKAGE and deduplication based on suffix array indexing W Yamini, A Mohanpurkar International Journal of Computer Applications 108 (6), 2014 | 1 | 2014 |
A Survey on Secure Anti Collusion Mechanism with Distributed Storage in Cloud Computing S Kamble, A Mohanpurkar | | 2016 |
Multimedia Data Recommendation using Semantic Web Based Network Model P Bhosale, A Mohanpurkar | | 2016 |
Year of Publication: 2015 DR Sakhare, A Mohanpurkar | | 2015 |
Year of Publication: 2015 A Mohanpurkar, M Joshi | | 2015 |
A Review on Effective and Efficient Detection of Duplicates in Data V Wandhekar, A Mohanpurkar | | 2014 |