IJAET - Journal Papers

Identification Of An Account As Spammer

Authors :  Dr K.Nagarajan, Mr. V. Vinod Kumar , Mr. M. Mohammedkasim , Mr. T Prabu | Pages : 65-68

Medical Image Fusion Using Deep

Authors :   Abinaya K , S.Srinidhi, Abirami, M.Sangeetha, A P Swarnalatha | Pages : 59-64

Detect Professional Malicious User With Metric Learning In Recommender Systems

Authors :  HEMALATHA . M , SHANMUGAPRIYA.M | Pages : 54 - 58

Malicious Url Detection

Authors :  S.SHANMUGAPRIYA , PREMKUMAR .S | Pages : 50-53

Enabling Verifiable And Dynamic

Authors :  P.NATARAJAN , MOVIGA .B | Pages : 45-49

Data Integrity Audit Scheme Based

Authors :  M. THANGAVEL , R. SUNITHA | Pages : 38-44

Blockchain-based Decentralized

Authors :  HEMALATHA . M , SUBADHARSHINI P | Pages : 32-37

Dual Access Control For Cloud-based

Authors :  M.THANGAVEL , BHUVANESHWARI G | Pages : 27-31

Web Cloud Web-based Cloud Storage

Authors :  M.THANGAVEL , T. ABIRAMI | Pages : 19-26

Detect Professional Malicious

Authors :  M.HEMALATHA , M.SHANMUGA PRIYA | Pages : 14-18

Cyber Security Awareness In Online Education

Authors :  P. NATARAJAN , MAHENDRAN | Pages : 8-13

Documents Representing Fine Grained

Authors :  P. NATARAJAN , M. ILAMATHI | Pages : 1-7