default search action
Bhupendra Singh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Pradeep Rai, Bhupendra Singh, Ashok Ji Gupta:
On quantum and LCD codes from the cyclic codes over the ring $\mathbb {F}_q[u, v, w]/\langle u^3-u, v^2-v, w^2-w, uv, vu, uw, wu, vw-wv \rangle $. J. Appl. Math. Comput. 70(2): 1241-1262 (2024) - [j23]Pradeep Rai, Bhupendra Singh, Ashok Ji Gupta:
Quantum and LCD codes from skew constacyclic codes over a general class of non-chain rings. Quantum Inf. Process. 23(7): 276 (2024) - [j22]Amit Singh Nayal, Bhupendra Singh, Vrijesh Tripathi, Abhishek Tyagi:
Analyzing stress-strength reliability δ = P [U<V<W]: a Bayesian and frequentist perspective with Burr-XII distribution under progressive Type-II censoring. Int. J. Syst. Assur. Eng. Manag. 15(6): 2453-2472 (2024) - 2023
- [j21]Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur, Sudesh Kumar Mittal:
A Performance Analysis of Root-Converging Methods for Developing Post Quantum Cryptography Algorithms to Mitigate Key-Size-Based Attacks. Int. J. Perform. Eng. 19(4): 252 (2023) - [j20]Shantanu Todmal, Ashish Mule, Devang Bhagwat, Tanmoy Hazra, Bhupendra Singh:
Human face generation from textual description via style mapping and manipulation. Multim. Tools Appl. 82(9): 13579-13594 (2023) - [c8]Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur, Sudesh Kumar Mittal:
Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers. ICCCNT 2023: 1-6 - [i3]Rahul Mishra, Bhupendra Singh, Radhakrishnan Delhibabu:
Searching for S-boxes with better Diffusion using Evolutionary Algorithm. IACR Cryptol. ePrint Arch. 2023: 353 (2023) - 2022
- [j19]Bhupendra Singh, Shubhi Rathi, Gajraj Singh, Puneet Kumar Gupta:
A change-time hazard rate model and its goodness of fit. Int. J. Syst. Assur. Eng. Manag. 13(4): 1903-1912 (2022) - [j18]Bhupendra Singh, Gopal Singh Phartiyal:
Introducing ISAP and MATSS: Mental stress induced speech utterance procedure and obtained dataset. Speech Commun. 145: 1-9 (2022) - 2021
- [j17]Abhishek Tyagi, Neha Choudhary, Bhupendra Singh:
Reliability analysis of the dynamic system for the Chen model through sequential order statistics. Qual. Reliab. Eng. Int. 37(6): 2514-2534 (2021) - [i2]Bhupendra Singh, G. Athithan, Rajesh Pillai:
On extensions of the one-time-pad. IACR Cryptol. ePrint Arch. 2021: 298 (2021) - 2020
- [j16]Bhupendra Singh:
Automating the detection of Milk Boil through Sensors. Int. J. Syst. Syst. Eng. 10(3) (2020) - [j15]Bhupendra Singh, Amit Verma:
Automating the detection of milk boil through sensors. Int. J. Syst. Syst. Eng. 10(3) (2020)
2010 – 2019
- 2019
- [j14]Bhupendra Singh, Neelu Jyoti Ahuja:
Mining the treasure of palm leaf manuscripts through information retrieval techniques. Digit. Libr. Perspect. 35(3/4): 146-156 (2019) - [c7]Bhupendra Singh, Gaurav Gupta:
Analyzing Windows Subsystem for Linux Metadata to Detect Timestamp Forgery. IFIP Int. Conf. Digital Forensics 2019: 159-182 - [c6]Bhupendra Singh, Dirk Dahlhaus:
Weighted Robust Sage-Husa Adaptive Kalman Filtering for Angular Velocity Estimation. SPA 2019: 71-76 - 2018
- [j13]Bhupendra Singh, Upasna Singh:
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability. Comput. Secur. 74: 94-114 (2018) - [j12]Bimal Mandal, Bhupendra Singh, Sugata Gangopadhyay, Subhamoy Maitra, Vellaichamy Vetrivel:
On non-existence of bent-negabent rotation symmetric Boolean functions. Discret. Appl. Math. 236: 1-6 (2018) - [c5]Bhupendra Singh, Upasna Singh, Pankaj Sharma, Rajender Nath:
Recovery of Forensic Artifacts from Deleted Jump Lists. IFIP Int. Conf. Digital Forensics 2018: 51-65 - 2017
- [j11]Bhupendra Singh, Upasna Singh:
A forensic insight into Windows 10 Cortana search. Comput. Secur. 66: 142-154 (2017) - [j10]Bhupendra Singh, Neha Choudhary:
The exponentiated Perks distribution. Int. J. Syst. Assur. Eng. Manag. 8(2): 468-478 (2017) - [c4]Bhupendra Singh, Upasna Singh:
Program Execution Analysis using UserAssist Key in Modern Windows. SECRYPT 2017: 420-429 - 2016
- [j9]Bhupendra Singh, Upasna Singh:
A forensic insight into Windows 10 Jump Lists. Digit. Investig. 17: 1-13 (2016) - [j8]Sugata Gangopadhyay, Bhupendra Singh, Vellaichamy Vetrivel:
Investigations on cubic rotation symmetric bent functions. Electron. Notes Discret. Math. 56: 15-19 (2016) - [j7]Bhupendra Singh, Upasna Singh:
Leveraging the Windows Amcache.hve File in Forensic Investigations. J. Digit. Forensics Secur. Law 11(4): 37-54 (2016) - [c3]Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh:
Honeypot Deployment in Broadband Networks. ICISS 2016: 479-488 - [c2]Bhupendra Singh, Ravi Saharan, Gaurav Somani, Gaurav Gupta:
Secure File Deletion for Solid State Drives. IFIP Int. Conf. Digital Forensics 2016: 345-362 - 2015
- [c1]Abhinav Duhan, Bhupendra Singh, Mohd Zayed, Haneet Rana, Gagan Tiwari, Sanjeev Yadav:
A compact monopole wideband antenna for WiMAX/WLAN/BLUETOOTH/IEEE 802.11y services. IC3 2015: 314-317 - 2014
- [j6]Bhupendra Singh, Puneet Kumar Gupta:
Bayesian reliability estimation of a 1-out-of-k load-sharing system model. Int. J. Syst. Assur. Eng. Manag. 5(4): 562-576 (2014) - 2013
- [j5]Puneet Kumar Gupta, Bhupendra Singh:
Parameter estimation of Lindley distribution with hybrid censored data. Int. J. Syst. Assur. Eng. Manag. 4(4): 378-385 (2013) - 2012
- [j4]Bhupendra Singh, K. K. Sharma, Shubhi Rathi, Gajraj Singh:
A generalized log-normal distribution and its goodness of fit to censored data. Comput. Stat. 27(1): 51-67 (2012) - [j3]Bhupendra Singh, Puneet Kumar Gupta:
Load-sharing system model and its application to the real data set. Math. Comput. Simul. 82(9): 1615-1629 (2012)
2000 – 2009
- 2009
- [j2]Bhupendra Singh, K. K. Sharma, Anuj Kumar:
Analyzing the dynamic system model with discrete failure time distribution. Stat. Methods Appl. 18(4): 521-542 (2009) - [i1]Bhupendra Singh, Lexy Alexander, Sanjay Burman:
On Algebraic Relations of Serpent S-Boxes. IACR Cryptol. ePrint Arch. 2009: 38 (2009) - 2008
- [j1]Bhupendra Singh, K. K. Sharma, Anuj Kumar:
A classical and Bayesian estimation of a k-components load-sharing parallel system. Comput. Stat. Data Anal. 52(12): 5175-5185 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-06 22:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint