List of the publication: 2024
S.No. |
Name of Paper |
Journal Name |
Authors |
Year |
Impact Factor |
1 |
K-BEST subspace clustering: kernel-friendly block-diagonal embedded and similarity-preserving transformed subspace clustering |
PATTERN ANALYSIS AND APPLICATIONS |
Maggu, J; Goel, A |
2024 |
3.7 |
2 |
Generative adversarial imitation learning assisted virtual network embedding algorithm for space-air-ground integrated network |
COMPUTER COMMUNICATIONS |
Zhang, PY; Xu, ZY; Kumar, N; Wang, J; Tan, LZ; Almogren, A |
2024 |
4.5 |
3 |
Enhancing Road Traffic Prediction Using Data Preprocessing Optimization |
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS |
Garg, T; Kaur, G; Rana, PS; Cheng, XC |
2024 |
0.9 |
4 |
Improved Potato Crop Disease Classification Using Ensembled Convolutional Neural Network |
POTATO RESEARCH |
Singh, G; Kasana, G; Singh, K |
2024 |
2.3 |
5 |
Improving Hate Speech Classification Through Ensemble Learning and Explainable AI Techniques |
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
Garg, P; Sharma, MK; Kumar, P |
2024 |
2.6 |
6 |
Augmenting supply chain resilience through AI and big data |
BUSINESS PROCESS MANAGEMENT JOURNAL |
Singh, D; Sharma, A; Singh, RK; Rana, PS |
2024 |
4.5 |
7 |
An efficient ranking-based ensembled multiclassifier for neurodegenerative diseases classification using deep learning |
JOURNAL OF NEURAL TRANSMISSION |
Goyal, P; Rani, R; Singh, K |
2024 |
3.2 |
8 |
Self configuring mobile agent-based intrusion detection using hybrid optimized with Deep LSTM |
KNOWLEDGE-BASED SYSTEMS |
Kaur, P; Batra, S; Rana, PS |
2024 |
7.2 |
9 |
Robust evaluation of GPU compute instances for HPC and AI in the cloud: a TOPSIS approach with sensitivity, bootstrapping, and non-parametric analysis |
COMPUTING |
Kumar, M; Kaur, G; Rana, PS |
2024 |
3.3 |
10 |
TC-PAA: Deep Learning-Enabled QoS Enhancement Scheme for Cooperative Internet of Vehicles |
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY |
Adil, M; Song, HB; Kumar, N; Jan, MA; Nayak, A; Farouk, A; Jin, ZP |
2024 |
6.1 |
11 |
Joint Traffic Admission, Resource Allocation and Mode Selection Protocol for NOMA-Based D2D Users Underlaying Cellular Network for 5G and Beyond Networks |
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING |
Budhiraja, I; Kumar, N; Garg, D; Guizani, M; Kaddoum, G |
2024 |
6.7 |
12 |
Energy-Efficient Deployment and Resource Allocation for O-RAN-Enabled UAV-Assisted Communication |
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING |
Li, H; Tang, X; Zhai, DS; Zhang, RN; Li, B; Cao, HT; Kumar, N; Almogren, A |
2024 |
5.3 |
13 |
Partition Clustering in Complex Weighted Networks Using K-Cut Ranking and Krill-Herd Optimization |
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING |
Srivastava, V; Singh, SS; Jain, A |
2024 |
6.7 |
14 |
Deep-UEO: Empowering medical image registration with hybrid strategy based on deep learning and united equilibrium optimizer |
COMPUTERS & ELECTRICAL ENGINEERING |
Arora, P; Mehta, R; Ahuja, R |
2024 |
4 |
15 |
Effective weight optimization strategy for precise deep learning forecasting models using EvoLearn approach |
SCIENTIFIC REPORTS |
Bedi, J; Anand, A; Godara, S; Bana, RS; Faiz, MA; Marwaha, S; Parsad, R |
2024 |
3.8 |
16 |
Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning |
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS |
Li, YL; Zhang, PY; Kumar, N; Guizani, M; Wang, J; Kostromitin, KI; Wang, Y; Tan, LZ |
2024 |
7.7 |
17 |
Large-scale secure model learning and inference using synthetic data for IoT-based big data analytics |
COMPUTERS & ELECTRICAL ENGINEERING |
Tekchandani, P; Das, AK; Kumar, N |
2024 |
4 |
18 |
Robust page object detection network for heterogeneous document images |
INTERNATIONAL JOURNAL ON DOCUMENT ANALYSIS AND RECOGNITION |
Kawoosa, HS; Kanroo, MS; Rana, K; Goyal, P |
2024 |
1.8 |
19 |
A comprehensive survey of deep learning-based lightweight object detection models for edge devices |
ARTIFICIAL INTELLIGENCE REVIEW |
Mittal, P |
2024 |
10.7 |
20 |
A Differentially Privacy Assisted Federated Learning Scheme to Preserve Data Privacy for IoMT Applications |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT |
Barnawi, A; Chhikara, P; Tekchandani, R; Kumar, N; Alzahrani, B |
2024 |
4.7 |
21 |
A High Stability Clustering Scheme for the Internet of Vehicles |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT |
Chen, C; Si, JB; Li, H; Han, W; Kumar, N; Berretti, S; Wan, SH |
2024 |
4.7 |
22 |
Machine Learning in Metaverse Security: Current Solutions and Future Challenges |
ACM COMPUTING SURVEYS |
Otoum, Y; Gottimukkala, N; Kumar, N; Nayak, A |
2024 |
23.8 |
23 |
Social Network Analysis: A Survey on Process, Tools, and Application |
ACM COMPUTING SURVEYS |
Singh, SS; Muhuri, S; Mishra, S; Srivastava, D; Shakya, HK; Kumar, N |
2024 |
23.8 |
24 |
Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Bawa, S; Rana, PS; Tekchandani, R |
2024 |
3.6 |
25 |
Associated Probabilities' Aggregations in Fuzzy Collaborative Filtering Recommender System Prediction |
INTERNATIONAL JOURNAL OF FUZZY SYSTEMS |
Sirbiladze, G; Garg, H; Khutsishvili, I; Midodashvili, B; Gugunava, O |
2024 |
3.6 |
26 |
A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions |
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS |
Nain, M; Goyal, N; Dhurandher, SK; Dave, M; Verma, AK; Malik, A |
2024 |
1.7 |
27 |
Harnessing Fusion Modeling for Enhanced Breast Cancer Classification through Interpretable Artificial Intelligence and In-Depth Explanations |
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE |
Wani, NA; Kumar, R; Bedi, J |
2024 |
7.5 |
28 |
Enhancing healthcare security: Time-based authentication for privacy-preserving IoMT sensor monitoring framework leveraging blockchain technology |
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Sharma, A; Kaur, S; Singh, M |
2024 |
1.5 |
29 |
Deep attentive multimodal learning for food information enhancement via early-stage heterogeneous fusion |
VISUAL COMPUTER |
Saklani, A; Tiwari, S; Pannu, HS |
2024 |
3 |
30 |
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world |
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS |
Dabra, V; Kumari, S; Bala, A; Yadav, S |
2024 |
3.8 |
31 |
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles |
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS |
Verma, GK; Wani, NM; Rana, S; Kumar, N; Tiwari, A |
2024 |
3.8 |
32 |
Infrared and visible image fusion based on FUDPCNN and gravitational force operator |
SIGNAL IMAGE AND VIDEO PROCESSING |
Bansal, K; Kumar, V; Agrawal, C; Tripathy, S; Khera, SB; Singh, G; Panigrahy, C; Seal, A |
2024 |
2 |
33 |
Learning Models in Crowd Analysis: A Review |
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING |
Goel, S; Koundal, D; Nijhawan, R |
2024 |
9.7 |
34 |
Time series generative adversarial network for muscle force prognostication using statistical outlier detection |
EXPERT SYSTEMS |
Bansal, H; Chinagundi, B; Rana, PS; Kumar, N |
2024 |
3 |
35 |
Local search resource allocation algorithm for space-based backbone network in Deep Reinforcement Learning method |
AD HOC NETWORKS |
Zhang, PY; Cui, ZX; Kumar, N; Wang, J; Zhang, W; Tan, LZ |
2024 |
4.4 |
36 |
Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques |
COMPUTERS & ELECTRICAL ENGINEERING |
Mehmood, A; Shafique, A; Kumar, N; Bhutta, MN |
2024 |
4 |
37 |
A federated and transfer learning based approach for households load forecasting |
KNOWLEDGE-BASED SYSTEMS |
Singh, G; Bedi, J |
2024 |
7.2 |
38 |
Stochastic Performances of the Mathematical System Based on the Prevalence Prediction of Allergies |
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
Kumar, A; Rana, PS |
2024 |
2.6 |
39 |
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Gill, KS; Saxena, S; Sharma, A; Dhillon, A |
2024 |
3.6 |
40 |
A Novel Technique for Semantic Segmentation of Hyperspectral Images Using Multi-View Features |
APPLIED SCIENCES-BASEL |
Grewal, R; Kasana, G; Kasana, SS |
2024 |
2.5 |
41 |
Quantum-Social Network Analysis for Community Detection: A Comprehensive Review |
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS |
Muhuri, S; Singh, SS |
2024 |
4.5 |
42 |
An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing |
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE |
Zhang, HX; Cao, LY; Kumar, N; Zhang, JY; Zhang, PY; Wang, J |
2024 |
6.2 |
43 |
Analyzing fuzzy semantics of reviews for multi-criteria recommendations |
DATA & KNOWLEDGE ENGINEERING |
Boparai, NK; Aggarwal, H; Rani, R |
2024 |
2.7 |
44 |
Explainable AI-driven IoMT fusion: Unravelling techniques, opportunities, and challenges with Explainable AI in healthcare |
INFORMATION FUSION |
Wani, NA; Kumar, R; Mamta; Bedi, J; Rida, I |
2024 |
14.7 |
45 |
Air-to-Ground Integrated Internet of Vehicles Enhanced by LAPSs and RISs: Location, Power, and Phase Shift Optimization |
IEEE INTERNET OF THINGS JOURNAL |
He, YX; Huang, FH; Xu, Q; Wang, DW; Tolba, A; Yu, KP; Kumar, N; Leung, VCM |
2024 |
8.2 |
46 |
Diabetic retinopathy detection using supervised and unsupervised deep learning: a review study |
ARTIFICIAL INTELLIGENCE REVIEW |
Naz, H; Ahuja, NJ; Nijhawan, R |
2024 |
10.7 |
47 |
Structure based transmission estimation in single image dehazing |
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION |
Raikwar, S; Tapaswi, S; Sharma, RK |
2024 |
2.6 |
48 |
Empowering individuals with disabilities: a real-time, cost-effective, calibration-free assistive system utilizing eye tracking |
JOURNAL OF REAL-TIME IMAGE PROCESSING |
Chhimpa, GR; Kumar, A; Garhwal, S; Dhiraj |
2024 |
2.9 |
49 |
Prediction of Surface Roughness in Hybrid Magnetorheological Finishing of Silicon Using Machine Learning |
SILICON |
Srivastava, M; Singh, G; Verma, K; Pandey, PM; Rana, PS; Gupta, MK; Khanna, N |
2024 |
2.8 |
50 |
Multi-modal medical image fusion using improved dual-channel PCNN |
MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING |
Sinha, A; Agarwal, R; Kumar, V; Garg, N; Pundir, DS; Singh, H; Rani, R; Panigrahy, C |
2024 |
2.6 |
51 |
PAW: Prediction of wildlife animals using a robot under adverse weather conditions |
JOURNAL OF FIELD ROBOTICS |
Kaur, P; Kansal, S; Singh, VP |
2024 |
4.2 |
52 |
AiCareBreath: IoT-Enabled Location-Invariant Novel Unified Model for Predicting Air Pollutants to Avoid Related Respiratory Disease |
IEEE INTERNET OF THINGS JOURNAL |
Borah, J; Kumar, S; Kumar, N; Nadzir, MSM; Cayetano, MG; Ghayvat, H; Majumdar, S; Kumar, N |
2024 |
8.2 |
53 |
TokenGreen: A Versatile NFT Framework for Peer-to-Peer Energy Trading and Asset Ownership of Electric Vehicles |
IEEE INTERNET OF THINGS JOURNAL |
Naik, M; Singh, AP; Pradhan, NR; Kumar, N; Nayak, A; Guizani, M |
2024 |
8.2 |
54 |
ResUNet plus plus : a comprehensive improved UNet plus plus framework for volumetric semantic segmentation of brain tumor MR images |
EVOLVING SYSTEMS |
Kaur, A; Singh, Y; Chinagundi, B |
2024 |
2.7 |
55 |
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication |
AD HOC NETWORKS |
Verma, GK; Chamola, V; Kumar, N; Das, AK; Mishra, D |
2024 |
4.4 |
56 |
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud-Edge models |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Patel, YS; Townend, P; Singh, A; Östberg, PO |
2024 |
3.6 |
57 |
Cloud menu: Cloud based network analysis for disease-diet associations and recommendations |
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Toor, R; Chana, I |
2024 |
1.5 |
58 |
BEET: Blockchain Enabled Energy Trading for E-Mobility Oriented Electric Vehicles |
IEEE TRANSACTIONS ON MOBILE COMPUTING |
Bhawana; Kumar, S; Rathore, RS; Dohare, U; Kaiwartya, O; Lloret, J; Kumar, N |
2024 |
7.7 |
59 |
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities |
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING |
Gill, KS; Sharma, A; Saxena, S |
2024 |
9.7 |
60 |
A Transfer Learning Architecture to Detect Faulty Insulators in Powerlines |
IEEE TRANSACTIONS ON POWER DELIVERY |
Jain, N; Bedi, J; Anand, A; Godara, S |
2024 |
3.8 |
61 |
Energy-Aware Positioning Service Provisioning for Cloud-Edge-Vehicle Collaborative Network Based on DRL and Service Function Chain |
IEEE TRANSACTIONS ON MOBILE COMPUTING |
Zhang, PY; Zhang, Y; Kumar, N; Guizani, M; Barnawi, A; Zhang, W |
2024 |
7.7 |
62 |
Research on AUV dynamic obstacle avoidance planning based on rolling speed obstacle method |
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL |
Zhang, F; Wang, X; Tang, X; Kumar, N; Hu, Y; Hu, CL |
2024 |
1.7 |
63 |
Authenticating and securing healthcare records: A deep learning-based zero watermarking approach |
IMAGE AND VISION COMPUTING |
Anand, A; Bedi, J; Aggarwal, A; Khan, MA; Rida, I |
2024 |
4.2 |
64 |
GTFR: A Game Theory-Based Fuzzy Routing Protocol for WSNs |
IEEE SENSORS JOURNAL |
Gangwar, S; Yogita; Prasad, IB; Yadav, SS; Pal, V; Kumar, N |
2024 |
4.3 |
65 |
Transfer learning-enabled skin disease classification: the case of monkeypox detection |
MULTIMEDIA TOOLS AND APPLICATIONS |
Thorat, R; Gupta, A |
2024 |
3 |
66 |
Computation offloading techniques in edge computing: A systematic review based on energy, QoS and authentication |
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Kanupriya; Chana, I; Goyal, RK |
2024 |
1.5 |
67 |
Unveiling the Evolution of Enterprise Digital Innovation Strategies: Insights From US-Listed Companies' Annual Reports |
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS |
Bai, SZ; Tan, YB; Han, CJ; Yang, M; Gupta, BB; Arya, V; Kumar, N |
2024 |
4.5 |
68 |
An empirical approach to understand the role of emotions in code comprehension |
JOURNAL OF COMPUTER LANGUAGES |
Singh, D; Mishra, A; Aggarwal, A |
2024 |
1.7 |
69 |
A data decomposition and attention mechanism-based hybrid approach for electricity load forecasting |
COMPLEX & INTELLIGENT SYSTEMS |
Oqaibi, H; Bedi, J |
2024 |
5 |
70 |
A Deep-Learning-Integrated Blockchain Framework for Securing Industrial IoT |
IEEE INTERNET OF THINGS JOURNAL |
Aljuhani, A; Kumar, P; Alanazi, R; Albalawi, T; Taouali, O; Islam, AKMN; Kumar, N; Alazab, M |
2024 |
8.2 |
71 |
Global-and-Local Attention-Based Reinforcement Learning for Cooperative Behaviour Control of Multiple UAVs |
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY |
Chen, JC; Li, TY; Zhang, Y; You, T; Lu, YT; Tiwari, P; Kumar, N |
2024 |
6.1 |
72 |
An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Arora, P; Mehta, R; Ahuja, R |
2024 |
3.6 |
73 |
Reliable data transmission for a VANET-IoIT architecture: A DNN approach |
INTERNET OF THINGS |
Ghosh, J; Kumar, N; Al-Utaibi, KA; Sait, SM; Vo, V; So-In, C |
2024 |
6 |
74 |
Healthcare-CT: Solid PoD and Blockchain-Enabled Cyber Twin Approach for Healthcare 5.0 Ecosystems |
IEEE INTERNET OF THINGS JOURNAL |
Ghayvat, H; Zuhair, M; Shukla, N; Kumar, N |
2024 |
8.2 |
75 |
MIWET: Medical image watermarking using encryption and fusion technique |
COMPUTERS & ELECTRICAL ENGINEERING |
Anand, A; Bedi, J; Rida, I |
2024 |
4 |
76 |
Clinical utility of handheld fundus and smartphone-based camera for monitoring diabetic retinal diseases: a review study |
INTERNATIONAL OPHTHALMOLOGY |
Naz, H; Nijhawan, R; Ahuja, NJ |
2024 |
1.4 |
77 |
Real-time video surveillance based human fall detection system using hybrid haar cascade classifier |
MULTIMEDIA TOOLS AND APPLICATIONS |
Kaur, N; Rani, S; Kaur, S |
2024 |
3 |
78 |
Tomato ripeness and shelf-life prediction system using machine learning |
JOURNAL OF FOOD MEASUREMENT AND CHARACTERIZATION |
Goyal, K; Kumar, P; Verma, K |
2024 |
2.9 |
79 |
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks |
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS |
Zhang, PY; Yan, KK; Kumar, N; Tan, LZ; Guizani, M; Kostromitin, KI; Wang, J; Zhang, JY |
2024 |
7.7 |
80 |
Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things |
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY |
Dhasaratha, C; Hasan, MK; Islam, S; Khapre, S; Abdullah, S; Ghazal, TM; Alzahrani, AI; Alalwan, N; Vo, N; Akhtaruzzaman, M |
2024 |
8.4 |
81 |
An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Garg, S; Ahuja, R; Singh, R; Perl, I |
2024 |
3.6 |
82 |
RISE: Rubik's cube and image segmentation based secure medical images encryption |
MULTIMEDIA TOOLS AND APPLICATIONS |
Demla, K; Anand, A |
2024 |
3 |
83 |
Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT |
Cao, HT; Kumar, N; Yang, LX; Guizani, M; Yu, FR |
2024 |
4.7 |
84 |
A Hybrid Task Offloading and Resource Allocation Approach for Digital Twin-Empowered UAV-Assisted MEC Network Using Federated Reinforcement Learning for Future Wireless Network |
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS |
Consul, P; Budhiraja, I; Garg, D; Kumar, N; Singh, R; Almogren, AS |
2024 |
4.3 |
85 |
iDP: ML-driven diabetes prediction framework using deep-ensemble modeling |
NEURAL COMPUTING & APPLICATIONS |
Kumar, A; Bawa, S; Kumar, N |
2024 |
4.5 |
86 |
An efficient fine-grained searchable encryption for secure communication in IoT-based vehicular social networks |
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES |
Mamta; Sharma, S; Kumar, S |
2024 |
2.5 |
87 |
LEAF: A Federated Learning-Aware Privacy-Preserving Framework for Healthcare Ecosystem |
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT |
Patel, NP; Parekh, R; Amin, SA; Gupta, R; Tanwar, S; Kumar, N; Iqbal, R; Sharma, R |
2024 |
4.7 |
88 |
An intelligent machine learning-enabled cattle reclining risk mitigation technique using surveillance videos |
NEURAL COMPUTING & APPLICATIONS |
Saini, M; Singh, H; Sengupta, E; Aggarwal, A; Singh, H; Kumar, N |
2024 |
4.5 |
89 |
DREAM: Deep Learning-Based Recognition of Emotions From Multiple Affective Modalities Using Consumer-Grade Body Sensors and Video Cameras |
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS |
Sharma, A; Kumar, A |
2024 |
4.3 |
90 |
SecBoost: Secrecy-Aware Deep Reinforcement Learning Based Energy-Efficient Scheme for 5G HetNets |
IEEE TRANSACTIONS ON MOBILE COMPUTING |
Sharma, H; Kumar, N; Tekchandani, RK |
2024 |
7.7 |
91 |
Design of modified reference phase modulation based boost chopper fed fifteen level stepped DC link hybrid converter |
SCIENTIFIC REPORTS |
Uthirasamy, R; Kumar, SV; Ananth, C; David, S; Aggarwal, S; Ansar, SA; Mittal, N; Gupta, L; Gared, F |
2024 |
3.8 |
92 |
A multi-step electricity prediction model for residential buildings based on ensemble Empirical Mode Decomposition technique |
SCIENCE AND TECHNOLOGY FOR ENERGY TRANSITION |
Kaur, S; Bala, A; Parashar, A |
2024 |
1.5 |
93 |
OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Kaur, A; Saxena, S; Kumar, R |
2024 |
3.6 |
94 |
Localization in 3D Wireless Sensor Networks with Obstacle Consideration |
JOURNAL OF SENSORS |
Kumar, P; Mishra, S; Singh, S; Nikolovski, S; Louzazni, M |
2024 |
1.4 |
95 |
Corrosion inhibition analysis on cerium induced hydrophobic surface of Al-6061/SiC/Al2O3 hybrid composites |
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART B-JOURNAL OF ENGINEERING MANUFACTURE |
Sharma, VK; Kumar, P; Akhai, S; Kumar, V; Joshi, RS |
2024 |
1.9 |
96 |
A novel minutiae triangulation technique for non-invertible fingerprint template generation (Vol 186, 115832, 2021) |
EXPERT SYSTEMS WITH APPLICATIONS |
Trivedi, AK; Thounaojam, DM; Pal, S |
2024 |
7.5 |
97 |
Introduction to the special section on Biomedical Data and Image Analysis using Advanced Machine Learning Methods |
COMPUTERS & ELECTRICAL ENGINEERING |
Garg, G; Kaur, S |
2024 |
4 |
98 |
Artificial intelligence based cognitive state prediction in an e-learning environment using multimodal data |
MULTIMEDIA TOOLS AND APPLICATIONS |
Gupta, S; Kumar, P; Tekchandani, R |
2024 |
3 |
99 |
An amalgamation of cognitive aspects in software engineering: A content analysis |
EXPERT SYSTEMS WITH APPLICATIONS |
Kaur, K; Mishra, A; Chopra, P |
2024 |
7.5 |
100 |
An augmentation aided concise CNN based architecture for COVID-19 diagnosis in real time |
SCIENTIFIC REPORTS |
Kaur, BP; Singh, H; Hans, R; Sharma, SK; Kaushal, C; Hassan, MM; Shah, MA |
2024 |
3.8 |
101 |
Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Rani, R; Kumar, N; Khurana, M |
2024 |
3.6 |
102 |
A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Singh, G; Sengupta, P; Mehta, A; Bedi, J |
2024 |
3.6 |
103 |
Enhancing robustness and security of medical images through composite watermarking method |
SOFT COMPUTING |
Lakhani, A; Gupta, N; Anand, A |
2024 |
3.1 |
104 |
Ameliorating multimodal food classification using state of the art deep learning techniques |
MULTIMEDIA TOOLS AND APPLICATIONS |
Saklani, A; Tiwari, S; Pannu, HS |
2024 |
3 |
105 |
HBS-STACK: hierarchical biomarker selection and stacked ensemble model for biomarker identification and cancer prediction on multi-omics |
NEURAL COMPUTING & APPLICATIONS |
Dhillon, A; Singh, A; Bhalla, VK |
2024 |
4.5 |
106 |
A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems |
IEEE ACCESS |
Khan, MA; Ullah, I; Kumar, N; Afghah, F; Barb, G; Noor, F; Alqahtany, S |
2024 |
3.4 |
107 |
AgriResponse: A Real-Time Agricultural Query-Response Generation System for Assisting Nationwide Farmers |
IEEE ACCESS |
Godara, S; Bedi, J; Parsad, R; Singh, D; Bana, RS; Marwaha, S |
2024 |
3.4 |
108 |
GlucoBreath: An IoT, ML, and Breath-Based Non-Invasive Glucose Meter |
IEEE ACCESS |
Kapur, R; Kumar, Y; Sharma, R; Sharma, S; Singh, E; Rohilla, D; Kanwar, V; Kumar, B; Bhavsar, A; Dutt, V |
2024 |
3.4 |
109 |
H2CGAN: Manageable AI for Scene Understanding Tasks in Hazy/Rainy Environment |
IEEE ACCESS |
Mishra, P; Bhattacharya, J; Sharma, RK; Ramponi, G |
2024 |
3.4 |
110 |
TransResUNet: Revolutionizing Glioma Brain Tumor Segmentation Through Transformer-Enhanced Residual UNet |
IEEE ACCESS |
Rasool, N; Bhat, JI; Wani, NA; Ahmad, N; Alshara, M |
2024 |
3.4 |
111 |
KInsight: a Robust Framework for Masked Face Recognition |
BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY |
Sharma, S; Chaudhry, R; Tewari, D; Soreng, S; Kumar, S |
2024 |
1 |
112 |
A Self-Authenticating Multi-Tone Secret Sharing Scheme Using Meaningful Shares for Satellite Images |
IEEE ACCESS |
Sharma, S; Shivani, S; Saxena, N |
2024 |
3.4 |
113 |
SAAF-IoD: Secure and Anonymous Authentication Framework for the Internet of Drones |
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY |
Tanveer, M; Alasmary, H; Kumar, N; Nayak, A |
2024 |
6.1 |
114 |
FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system |
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING |
Verma, P; Gupta, A; Dangi, R; Choudhary, G; Dragoni, N; You, IL |
2024 |
0.7 |
115 |
ETSA-LP: ENSEMBLE TIME-SERIES APPROACH FOR LOAD PREDICTION IN CLOUD |
COMPUTING AND INFORMATICS |
Verma, S; Bala, A |
2024 |
0.7 |
116 |
Multilevel Class Token Transformer With Cross TokenMixer for Hyperspectral Images Classification |
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING |
Wang, LQ; Zheng, Z; Kumar, N; Wang, C; Guo, FM; Zhang, PY |
2024 |
7.5 |
117 |
Energy Allocation for Vehicle-to-Grid Settings: A Low-Cost Proposal Combining DRL and VNE |
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING |
Zhang, PY; Chen, N; Kumar, N; Abualigah, L; Guizani, M; Duan, YX; Wang, J; Wu, S |
2024 |
3 |
118 |
AI-assisted secure data transmission techniques for next-generation HetNets: A review |
COMPUTER COMMUNICATIONS |
Sharma, H; Sharma, G; Kumar, N |
2024 |
4.5 |
119 |
Post-Quantum Authentication Against Cyber-Physical Attacks in V2X-Based Autonomous Vehicle Platoon |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS |
Xu, DY; Yu, KP; Liu, L; Chen, GL; Kumar, N; Guizani, M; Ritcey, JA |
2024 |
7.9 |
120 |
A multilayered framework for diagnosis and classification of Alzheimer's disease using transfer learned Alexnet and LSTM |
NEURAL COMPUTING & APPLICATIONS |
Goyal, P; Rani, R; Singh, K |
2024 |
4.5 |
121 |
MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices |
COMPUTER COMMUNICATIONS |
Maiti, S; Misra, S; Mondal, A |
2024 |
4.5 |
122 |
Multi-objective based unbiased community identification in dynamic social networks |
COMPUTER COMMUNICATIONS |
Mishra, S; Singh, SS; Mishra, S; Biswas, B |
2024 |
4.5 |
123 |
Multi-Target-Aware Dynamic Resource Scheduling for Cloud-Fog-Edge Multi-Tier Computing Network |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS |
Zhang, PY; Chen, N; Xu, GJ; Kumar, N; Barnawi, A; Guizani, M; Duan, YX; Yu, KP |
2024 |
7.9 |
124 |
NRC-VABS: Normalized Reparameterized Conditional Variational Autoencoder with applied beam search in latent space for drug molecule design |
EXPERT SYSTEMS WITH APPLICATIONS |
Bhadwal, AS; Kumar, K; Kumar, N |
2024 |
7.5 |
125 |
Advancements in medical diagnosis and treatment through machine learning: A review |
EXPERT SYSTEMS |
Ahsan, M; Khan, A; Khan, KR; Sinha, BB; Sharma, A |
2024 |
3 |
126 |
Cloud-fog assisted human tracing and disaster evacuation framework |
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES |
Kaur, M; Kaur, PD; Sood, SK |
2024 |
2.5 |
127 |
Wave Height Prediction in Maritime Transportation Using Decomposition Based Learning |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS |
Sharma, T; Bedi, J; Anand, A; Aggarwal, A |
2024 |
7.9 |
128 |
Annotate and retrieve in vivo images using hybrid self-organizing map |
VISUAL COMPUTER |
Kaur, P; Malhi, A; Pannu, H |
2024 |
3 |
129 |
DeepXplainer: An interpretable deep learning based approach for lung cancer detection using explainable artificial intelligence |
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE |
Wani, NA; Kumar, R; Bedi, J |
2024 |
4.9 |
130 |
PREDICTING CARDIAC HEALTH USING SUB-COMPONENT OF A PHONOCARDIOGRAM |
JOURNAL OF MECHANICS IN MEDICINE AND BIOLOGY |
Arora, S; Jain, S; Chana, I |
2024 |
0.8 |
131 |
SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Arora, S; Rani, R; Saxena, N |
2024 |
3.6 |
132 |
OmicPredict: a framework for omics data prediction using ANOVA-Firefly algorithm for feature selection |
COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING |
Kaur, P; Singh, A; Chana, I |
2024 |
1.7 |
133 |
Efficient Auto-scaling for Host Load Prediction through VM migration in Cloud |
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Verma, S; Bala, A |
2024 |
1.5 |
134 |
A dimensionality reduction-based approach for secured color image watermarking |
SOFT COMPUTING |
Anand, A |
2024 |
3.1 |
135 |
BT-LPD: B+ Tree-Inspired Community-Based Link Prediction in Dynamic Social Networks |
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
Singh, SS; Muhuri, S; Srivastava, V |
2024 |
2.6 |
136 |
Sentiment analysis of linguistic cues to assist medical image classification |
MULTIMEDIA TOOLS AND APPLICATIONS |
Kaur, P; Malhi, AK; Pannu, HS |
2024 |
3 |
137 |
Micro-segmentation of retinal image lesions in diabetic retinopathy using energy-based fuzzy C-Means clustering (EFM-FCM) |
MICROSCOPY RESEARCH AND TECHNIQUE |
Naz, H; Nijhawan, R; Ahuja, NJ; Saba, T; Alamri, FS; Rehman, A |
2024 |
2 |
138 |
Finding correlation between diabetic retinopathy and diabetes during pregnancy based on computer-aided diagnosis: a review |
MULTIMEDIA TOOLS AND APPLICATIONS |
Ghosh, D; Chowdhury, K; Muhuri, S |
2024 |
3 |
139 |
NCGTM: A Noncooperative Game-Theoretic Model to Assist IDS in Cloud Environment |
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS |
Gill, KS; Saxena, S; Sharma, A |
2024 |
11.7 |
140 |
Border-hunting optimization for mobile agent-based intrusion detection with deep convolutional neural network |
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE |
Kaur, P; Batra, S; Rana, PS |
2024 |
1.5 |
141 |
Improving accuracy using ML/DL in vision based techniques of ISLR |
MULTIMEDIA TOOLS AND APPLICATIONS |
Singla, V; Bawa, S; Singh, J |
2024 |
3 |
142 |
A meta-heuristics based framework of cluster label optimization in MR images using stable random walk |
MULTIMEDIA TOOLS AND APPLICATIONS |
Srivastava, V; Singh, SS |
2024 |
3 |
143 |
Machine learning-based ensemble approach in prediction of lung cancer predisposition using XRCC1 gene polymorphism |
JOURNAL OF BIOMOLECULAR STRUCTURE & DYNAMICS |
Choudhary, A; Anand, A; Singh, A; Roy, P; Singh, N; Kumar, V; Sharma, S; Baranwal, M |
2024 |
2.7 |
144 |
GA-BiLSTM: an intelligent energy prediction and optimization approach for individual home appliances |
EVOLVING SYSTEMS |
Kaur, S; Bala, A; Parashar, A |
2024 |
2.7 |
145 |
Heuristic-based text segmentation of bilingual handwritten documents for Gurumukhi-Latin scripts |
MULTIMEDIA TOOLS AND APPLICATIONS |
Kaur, S; Bawa, S; Kumar, R |
2024 |
3 |
146 |
Deep learning based high performance classification architecture for low-altitude aerial images |
MULTIMEDIA TOOLS AND APPLICATIONS |
Mittal, P; Sharma, A; Singh, R |
2024 |
3 |
147 |
Hilbert curves-based location privacy technique for vehicular cloud networks |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Al-Balasmeh, H; Singh, M; Singh, R |
2024 |
3.6 |
148 |
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Mohit; Kaur, S; Singh, M |
2024 |
3.6 |
149 |
Enhanced spatio-temporal 3D CNN for facial expression classification in videos |
MULTIMEDIA TOOLS AND APPLICATIONS |
Khanna, D; Jindal, N; Rana, PS; Singh, H |
2024 |
3 |
150 |
ESDNN: A novel ensembled stack deep neural network for mango leaf disease classification and detection |
MULTIMEDIA TOOLS AND APPLICATIONS |
Gautam, V; Ranjan, RK; Dahiya, P; Kumar, A |
2024 |
3 |
151 |
VTnet plus Handcrafted based approach for food cuisines classification |
MULTIMEDIA TOOLS AND APPLICATIONS |
Nijhawan, R; Sinha, G; Batra, A; Kumar, M; Sharma, H |
2024 |
3 |
152 |
Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Kaur, J; Rani, R; Kalra, N |
2024 |
3.6 |
153 |
A nomadic multi-agent based privacy metrics for e-health care: a deep learning approach |
MULTIMEDIA TOOLS AND APPLICATIONS |
Dhasarathan, C; Shanmugam, M; Kumar, M; Tripathi, D; Khapre, S; Shankar, A |
2024 |
3 |
154 |
IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity |
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
Kumar, N; Srivastava, S |
2024 |
2.6 |
155 |
Automated Question and Answer Generation from Texts using Text-to-Text Transformers |
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING |
Goyal, R; Kumar, P; Singh, VP |
2024 |
2.6 |
156 |
Amalgamating Vehicular Networks With Vehicular Clouds, AI, and Big Data for Next-Generation ITS Services |
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS |
Rajput, NS; Singh, U; Dua, A; Kumar, N; Rodrigues, JJPC; Sisodia, S; Elhoseny, M; Lakys, Y |
2024 |
7.9 |
157 |
Approach for Detecting Junctions in Roundabout Using Map Data |
IETE JOURNAL OF RESEARCH |
Singh, R; Rana, PS; Jindal, N |
2024 |
1.3 |
158 |
An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation |
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS |
Arora, P; Mehta, R; Ahuja, R |
2024 |
3.6 |
159 |
Adaptive federated learning scheme for recognition of malicious attacks in an IoT network |
COMPUTING |
Chhikara, P; Tekchandani, R; Kumar, N |
2024 |
3.3 |
160 |
QEEG Predictors of Treatment Response in Major Depressive Disorder- A Replication Study from Northwest India |
CLINICAL EEG AND NEUROSCIENCE |
Singh, A; Arun, P; Singh, GP; Kaur, D; Kaur, S |
2024 |
1.6 |
161 |
Analysis of the Pertinence of Indian Women's Institutions in Collaborative Research |
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS |
Muhuri, S; Kumari, S; Namasudra, S; Kadry, S |
2024 |
4.5 |
162 |
Developer load balancing bug triage: Developed load balance |
EXPERT SYSTEMS |
Yadav, A; Baljon, M; Mishra, S; Singh, SK; Saxena, S; Sharma, SK |
2024 |
3 |
163 |
Fog-Enabled Secure and Efficient Fine-Grained Searchable Data Sharing and Management Scheme for IoT-Based Healthcare Systems |
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT |
Mamta; Gupta, BB; Lytras, MD |
2024 |
4.6 |
164 |
Amalgamation of blockchain and sixth-generation-envisioned responsive edge orchestration in future cellular vehicle-to-anything ecosystems: Opportunities and challenges |
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES |
Bhattacharya, P; Bodkhe, U; Zuhair, M; Rashid, M; Liu, X; Verma, A; Dewangan, RK |
2024 |
2.5 |
List of the publication: 2022
S.No. |
Name of Paper |
Journal Name |
Authors |
Year |
Impact Factor |
1 |
A comprehensive review on recent advancements in routing protocols for flying ad hoc networks |
Transactions on Emerging Telecommunications Technologies |
Malhotra A., Kaur S. |
2022 |
3.6 |
2 |
Hash-balanced binary tree–based public auditing in vehicular edge computing and networks |
International Journal of Communication Systems |
Liu M., Fan K., Kumar N., He D., Shi W. |
2022 |
2.1 |
3 |
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare |
IEEE Transactions on Emerging Topics in Computational Intelligence |
Zhou T., Shen J., He D., Vijayakumar P., Kumar N. |
2022 |
5.3 |
4 |
Blockchain for precision irrigation: Opportunities and challenges |
Transactions on Emerging Telecommunications Technologies |
Bodkhe U., Tanwar S., Bhattacharya P., Kumar N. |
2022 |
3.6 |
5 |
Leveraging energy-efficient load balancing algorithms in fog computing |
Concurrency and Computation: Practice and Experience |
Singh S.P., Kumar R., Sharma A., Nayyar A. |
2022 |
2 |
6 |
Hierarchical WSN protocol with fuzzy multi-criteria clustering and bio-inspired energy-efficient routing (FMCB-ER) |
Multimedia Tools and Applications |
Mehta D., Saxena S. |
2022 |
3.6 |
7 |
IoTPulse: machine learning-based enterprise health information system to predict alcohol addiction in Punjab (India) using IoT and fog computing |
Enterprise Information Systems |
Dhillon A., Singh A., Vohra H., Ellis C., Varghese B., Gill S.S. |
2022 |
4.4 |
8 |
Sanskrit to universal networking language EnConverter system based on deep learning and context-free grammar |
Multimedia Systems |
Sitender, Bawa S. |
2022 |
3.9 |
9 |
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments |
IEEE Systems Journal |
Chaudhry S.A., Farash M.S., Kumar N., Alsharif M.H. |
2022 |
4.4 |
10 |
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing |
IEEE Transactions on Dependable and Secure Computing |
Shen J., Yang H., Vijayakumar P., Kumar N. |
2022 |
7.3 |
11 |
ISHU: Interference Reduction Scheme for D2D Mobile Groups Using Uplink NOMA |
IEEE Transactions on Mobile Computing |
Budhiraja I., Kumar N., Tyagi S. |
2022 |
7.9 |
12 |
Third Eye: An Intelligent and Secure Route Planning Scheme for Critical Services Provisions in Internet of Vehicles Environment |
IEEE Systems Journal |
Sharma A., Kumar N. |
2022 |
4.4 |
13 |
Position Control of PMBLDC Motor Using SVR- and ANFIS-Based Controllers |
National Academy Science Letters |
Chopra V., Singh N.J., Kumar R., Sharma V. |
2022 |
1.1 |
14 |
Music mood and human emotion recognition based on physiological signals: a systematic review |
Multimedia Systems |
Chaturvedi V., Kaur A.B., Varshney V., Garg A., Chhabra G.S., Kumar M. |
2022 |
3.9 |
15 |
Predicting COVID-19 statistics using machine learning regression model: Li-MuLi-Poly |
Multimedia Systems |
Singh H., Bawa S. |
2022 |
3.9 |
16 |
PIN Inference Attack: A Threat to Mobile Security and Smartphone-Controlled Robots |
IEEE Sensors Journal |
Naval S., Pandey A., Gupta S., Singal G., Vinoba V., Kumar N. |
2022 |
4.3 |
17 |
Urban land cover and land use classification using multispectral sentinal-2 imagery |
Multimedia Tools and Applications |
Soni P.K., Rajpal N., Mehta R., Mishra V.K. |
2022 |
3.6 |
18 |
Tele-operation of an industrial robot by an arm exoskeleton for peg-in-hole operation using immersive environments |
Robotica |
Kansal S., Zubair M., Suthar B., Mukherjee S. |
2022 |
2.7 |
19 |
Multiple forgery detection and localization technique for digital video using PCT and NBAP |
Multimedia Tools and Applications |
Shelke, N.A., Kasana, S.S. |
2022 |
3.6 |
20 |
Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using an Improved CNN |
IEEE Transactions on Industrial Informatics |
Xu L., Zhou X., Tao Y., Liu L., Yu X., Kumar N. |
2022 |
12.3 |
21 |
RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones |
IEEE Internet of Things Journal |
Tanveer M., Khan A.U., Kumar N., Hassan M.M. |
2022 |
10.6 |
22 |
Food Adulteration Detection using Artificial Intelligence: A Systematic Review |
Archives of Computational Methods in Engineering |
Goyal K., Kumar P., Verma K. |
2022 |
9.7 |
23 |
Dynamically adaptive and diverse dual ensemble learning approach for handling concept drift in data streams |
Computational Intelligence |
Goel K., Batra S. |
2022 |
2.8 |
24 |
Fusion of AI techniques to tackle COVID-19 pandemic: models, incidence rates, and future trends |
Multimedia Systems |
Shah H., Shah S., Tanwar S., Gupta R., Kumar N. |
2022 |
3.9 |
25 |
EVBlocks: A Blockchain-Based Secure Energy Trading Scheme for Electric Vehicles underlying 5G-V2X Ecosystems |
Wireless Personal Communications |
Bhattacharya P., Tanwar S., Bodkhe U., Kumar A., Kumar N. |
2022 |
2.2 |
26 |
Cybertwin-Driven Resource Provisioning for IoE Applications at 6G-Enabled Edge Networks |
IEEE Transactions on Industrial Informatics |
Adhikari M., Munusamy A., Kumar N., Srirama S. |
2022 |
12.3 |
27 |
A Flexible Permission Ascription (FPA)-Based Blockchain Framework for Peer-to-Peer Energy Trading with Performance Evaluation |
IEEE Transactions on Industrial Informatics |
Pradhan N.R., Singh A.P., Kumar N., Hassan M.M., Roy D.S. |
2022 |
12.3 |
28 |
Multiple forgeries identification in digital video based on correlation consistency between entropy coded frames |
Multimedia Systems |
Shelke, N.A., Kasana, S.S. |
2022 |
3.9 |
29 |
Performance Evaluation of AODV and DSR Routing Protocols for Flying Ad hoc Network Using Highway Mobility Model |
Journal of Circuits, Systems and Computers |
Maakar S.K., Khurana M., Chakraborty C., Sinwar D., Srivastava D. |
2022 |
1.5 |
30 |
Faster Fog Computing Based Over-the-Air Vehicular Updates: A Transfer Learning Approach |
IEEE Transactions on Services Computing |
Al Maruf M., Singh A., Azim A., Auluck N. |
2022 |
8.1 |
31 |
Google Trends Data: A Potential New Tool for Monitoring the Opioid Crisis |
European Addiction Research |
Ghosh, A., Bisaga, A., Kaur, S., & Mahintamani, T. |
2022 |
3.9 |
32 |
Integrating Multihub Driven Attention Mechanism and Big Data Analytics for Virtual Representation of Visual Scenes |
IEEE Transactions on Industrial Informatics |
Yao Y., Gu B., Alazab M., Kumar N., Han Y. |
2022 |
12.3 |
33 |
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment |
IEEE Internet of Things Journal |
Saha R., Kumar G., Kumar N., Kim T.-H., Devgun T., Thomas R., Barnawi A. |
2022 |
10.6 |
34 |
Dynamic Virtual Network Embedding Algorithm Based on Graph Convolution Neural Network and Reinforcement Learning |
IEEE Internet of Things Journal |
Zhang P., Wang C., Kumar N., Zhang W., Liu L. |
2022 |
10.6 |
35 |
Space-Air-Ground Integrated Multi-Domain Network Resource Orchestration Based on Virtual Network Architecture: A DRL Method |
IEEE Transactions on Intelligent Transportation Systems |
Zhang P., Wang C., Kumar N., Liu L. |
2022 |
8.5 |
36 |
A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System |
IEEE Transactions on Intelligent Transportation Systems |
Kumar R., Kumar P., Tripathi R., Gupta G.P., Kumar N., Hassan M.M. |
2022 |
8.5 |
37 |
Quantitative estimation of soil properties using hybrid features and RNN variants |
Chemosphere |
Singh, S., Kasana, S.S. |
2022 |
8.8 |
38 |
B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G |
Vehicular Communications |
Gupta R., Tanwar S., Kumar N. |
2022 |
6.7 |
39 |
An Optimized Genetic Algorithm for Cluster Head Election Based on Movable Sinks and Adjustable Sensing Ranges in IoT-Based HWSNs |
IEEE Internet of Things Journal |
Nandan A.S., Singh S., Kumar R., Kumar N. |
2022 |
10.6 |
40 |
Bushfire Risk Detection Using Internet of Things: An Application Scenario |
IEEE Internet of Things Journal |
Nosouhi M.R., Sood K., Kumar N., Wevill T., Thapa C. |
2022 |
10.6 |
41 |
Toward Tailored Resource Allocation of Slices in 6G Networks with Softwarization and Virtualization |
IEEE Internet of Things Journal |
Cao H., Du J., Zhao H., Luo D.X., Kumar N., Yang L., Yu F.R. |
2022 |
10.6 |
42 |
Enhancement of image contrast using Selfish Herd Optimizer |
Multimedia Tools and Applications |
Guha R., Alam I., Bera S.K., Kumar N., Sarkar R. |
2022 |
3.6 |
43 |
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems |
IEEE Transactions on Intelligent Transportation Systems |
Wang K., Li F., Chen C.-M., Hassan M.M., Long J., Kumar N. |
2022 |
8.5 |
44 |
A Robust Access Control Protocol for the Smart Grid Systems |
IEEE Internet of Things Journal |
Tanveer M., Khan A.U., Kumar N., Naushad A., Chaudhry S.A. |
2022 |
10.6 |
45 |
Hiding patient information in medical images : an encrypted dual image reversible and secure patient data hiding algorithm for E-healthcare |
Multimedia Tools and Applications |
Bhardwaj R. |
2022 |
3.6 |
46 |
A Survey on Deep Learning Approaches to Medical Images and a Systematic Look up into Real-Time Object Detection |
Archives of Computational Methods in Engineering |
Kaur A., Singh Y., Neeru N., Kaur L., Singh A. |
2022 |
9.7 |
47 |
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges |
ACM Computing Surveys |
Zou J., He D., Zeadally S., Kumar N., Wang H., Choo K.R. |
2022 |
16.6 |
48 |
Deep learning-based multivariate resource utilization prediction for hotspots and coldspots mitigation in green cloud data centers |
Journal of Supercomputing |
Patel Y.S., Jaiswal R., Misra R. |
2022 |
3.3 |
49 |
To Secure the Communication in Powerful Internet of Things Using Innovative Post-Quantum Cryptographic Method |
Arabian Journal for Science and Engineering |
Kumari S., Singh M., Singh R., Tewari H. |
2022 |
2.9 |
50 |
Towards sustainable smart cities: A secure and scalable trading system for residential homes using blockchain and artificial intelligence |
Sustainable Cities and Society |
Samuel O., Javaid N., Alghamdi T.A., Kumar N. |
2022 |
11.7 |
51 |
Enhancing the Quantum Communication Channel Using a Novel Quantum Binary Salt Blowfish Strategy |
Wireless Personal Communications |
Kumari S. |
2022 |
2.2 |
52 |
An Effective Probabilistic Technique for DDoS Detection in OpenFlow Controller |
IEEE Systems Journal |
Maity P., Saxena S., Srivastava S., Sahoo K.S., Pradhan A.K., Kumar N. |
2022 |
4.4 |
53 |
Framework of data privacy preservation and location obfuscation in vehicular cloud networks |
Concurrency and Computation: Practice and Experience |
Al-Balasmeh H., Singh M., Singh R. |
2022 |
2 |
54 |
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain |
Cluster Computing |
Mohit M., Kaur S., Singh M. |
2022 |
4.4 |
55 |
Impact of multilayer ELM feature mapping technique on supervised and semi-supervised learning algorithms |
Soft Computing |
Roul R.K. |
2022 |
4.1 |
56 |
Multistep traffic speed prediction: A deep learning based approach using latent space mapping considering spatio-temporal dependencies |
Expert Systems with Applications |
Modi S., Bhattacharya J., Basak P. |
2022 |
8.5 |
57 |
IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis |
IEEE Internet of Things Journal |
Kumar R., Swarnkar M., Singal G., Kumar N. |
2022 |
10.6 |
58 |
Reinforcement learning based energy efficient protocol for wireless multimedia sensor networks |
Multimedia Tools and Applications |
Joshi U., Kumar R. |
2022 |
3.6 |
59 |
Autism spectrum disorder prediction by an explainable deep learning approach |
Computers, Materials and Continua |
Garg A., Parashar A., Barman D., Jain S., Singhal D., Masud M., Abouhawwash M. |
2022 |
3.1 |
60 |
An efficient approach for detecting anomalous events in real-time weather datasets |
Concurrency and Computation: Practice and Experience |
Arora S., Rani R., Saxena N. |
2022 |
2 |
61 |
State-of-the-Art Machine Learning Techniques for Diagnosis of Alzheimer’s Disease from MR-Images: A Systematic Review |
Archives of Computational Methods in Engineering |
Goyal P., Rani R., Singh K. |
2022 |
9.7 |
62 |
A hybrid deep neural network approach to estimate reference evapotranspiration using limited climate data |
Neural Computing and Applications |
Sharma G., Singh A., Jain S. |
2022 |
6 |
63 |
AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems |
IEEE Internet of Things Journal |
Das A.K., Bera B., Saha S., Kumar N., You I., Chao H.-C. |
2022 |
10.6 |
64 |
Intelligent Cooperative Collision Avoidance at Overtaking and Lane Changing Maneuver in 6G-V2X Communications |
IEEE Transactions on Vehicular Technology |
Prathiba S.B., Raja G., Kumar N. |
2022 |
6.8 |
65 |
A method for authenticating digital records for healthcare systems |
Sustainable Computing: Informatics and Systems |
Anand A., Singh A.K. |
2022 |
4.5 |
66 |
Obtaining crisp priorities for triangular and trapezoidal fuzzy judgments |
Computer Systems Science and Engineering |
Goyal R.K., Singh J., Kalra N., Parashar A., Singla G., Kaushal S. |
2022 |
2.2 |
67 |
QoS aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges |
ACM Transactions on Internet Technology |
Singal G., Laxmi V., Gaur M.S., Rao D.V., Kushwaha R., Garg D., Kumar N. |
2022 |
5.3 |
68 |
An ensembling model for early identification of at-risk students in higher education |
Computer Applications in Engineering Education |
Gupta A., Garg D., Kumar P. |
2022 |
2.9 |
69 |
An Ontology driven model for detection and classification of cardiac arrhythmias using ECG data |
Journal of Intelligent Information Systems |
Hooda D., Rani R. |
2022 |
3.4 |
70 |
Health Record Security Through Multiple Watermarking on Fused Medical Images |
IEEE Transactions on Computational Social Systems |
Anand A., Singh A.K. |
2022 |
5 |
71 |
A survey on artificial intelligence techniques for chronic diseases: open issues and challenges |
Artificial Intelligence Review |
Patel K., Mistry C., Mehta D., Thakker U., Tanwar S., Gupta R., Kumar N. |
2022 |
12 |
72 |
QoS Aware Uplink Scheduling for M2M Communication in LTE/LTE-A Network: A Game Theoretic Approach |
IEEE Transactions on Vehicular Technology |
Singh U., Dua A., Kumar N., Guizani M. |
2022 |
6.8 |
73 |
Transfer learning augmented enhanced memory network models for reference evapotranspiration estimation |
Knowledge-Based Systems |
Bedi J. |
2022 |
8.8 |
74 |
Efficient separable reversible data hiding algorithm for compressed 3D mesh models |
Biomedical Signal Processing and Control |
Bhardwaj R. |
2022 |
5.1 |
75 |
Cybertwin-Driven Federated Learning Based Personalized Service Provision for 6G-V2X |
IEEE Transactions on Vehicular Technology |
Prathiba S.B., Raja G., Anbalagan S., Gurumoorthy S., Kumar N., Guizani M. |
2022 |
6.8 |
76 |
Lattice-valued tree pushdown automata: Pumping lemma and closure properties |
International Journal of Approximate Reasoning |
Ghorani M., Garhwal S., Moghari S. |
2022 |
3.9 |
77 |
Exploring the alternatives to the conventional interference mitigation schemes for 5G wireless cellular communication network |
International Journal of Communication Systems |
Bindle A., Gulati T., Kumar N. |
2022 |
2.1 |
78 |
Bounding function for fast computation of transmission in single image dehazing |
Multimedia Tools and Applications |
Raikwar S.C., Tapaswi S., Chakraborty S. |
2022 |
3.6 |
79 |
Artificial intelligence research in agriculture: a review |
Online Information Review |
Sood A., Sharma R.K., Bhardwaj A.K. |
2022 |
3.1 |
80 |
Correction to: A hybrid deep neural network approach to estimate reference evapotranspiration using limited climate data (Neural Computing and Applications, (2022), 34, 5, (4013-4032), 10.1007/s00521-021-06661-9) |
Neural Computing and Applications |
Sharma G., Singh A., Jain S. |
2022 |
6 |
81 |
BUAKA-CS: Blockchain-enabled user authentication and key agreement scheme for crowdsourcing system |
Journal of Systems Architecture |
Wazid M., Das A.K., Hussain R., Kumar N., Roy S. |
2022 |
4.5 |
82 |
PF-DA: Pairing Free and Secure Data Aggregation for Energy Internet-Based Smart Meter-to-Grid Communication |
IEEE Transactions on Smart Grid |
Verma G.K., Gope P., Kumar N. |
2022 |
9.6 |
83 |
A real time cloud-based framework for glaucoma screening using EfficientNet |
Multimedia Tools and Applications |
Garg H., Gupta N., Agrawal R., Shivani S., Sharma B. |
2022 |
3.6 |
84 |
Hybrid SOM based cross-modal retrieval exploiting Hebbian learning |
Knowledge-Based Systems |
Kaur P., Malhi A.K., Pannu H.S. |
2022 |
8.8 |
85 |
Machine learning model for mapping of music mood and human emotion based on physiological signals |
Multimedia Tools and Applications |
Garg A., Chaturvedi V., Kaur A.B., Varshney V., Parashar A. |
2022 |
3.6 |
86 |
IBoNN: Intelligent Agent-based Internet of Medical Things framework for detecting brain response from Electroencephalography signal using Bag-of-Neural Network |
Future Generation Computer Systems |
Nandy S., Adhikari M., Chakraborty S., Alkhayyat A., Kumar N. |
2022 |
7.5 |
87 |
Dynamic Task Placement for Deadline-Aware IoT Applications in Federated Fog Networks |
IEEE Internet of Things Journal |
Sarkar I., Adhikari M., Kumar N., Kumar S. |
2022 |
10.6 |
88 |
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things |
ACM Transactions on Internet Technology |
Awan K.A., Ud Din I., Almogren A., Kumar N., Almogren A. |
2022 |
5.3 |
89 |
Correction to: A modified social spider algorithm for an efficient data dissemination in VANET (Environment, Development and Sustainability, (2022), 10.1007/s10668-021-01994-w) |
Environment, Development and Sustainability |
Shankar A., Dayalan R., Chakraborty C., Dhasarathan C., Kumar M. |
2022 |
4.9 |
90 |
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication |
Cluster Computing |
Kumar J.S., Gupta A., Tanwar S., Kumar N., Akleylek S. |
2022 |
4.4 |
91 |
Performance improvement of Deep Learning Models using image augmentation techniques |
Multimedia Tools and Applications |
Nagaraju M., Chawla P., Kumar N. |
2022 |
3.6 |
92 |
A Collaborative Computational Offloading Strategy for Latency-Sensitive Applications in Fog Networks |
IEEE Internet of Things Journal |
Sarkar I., Adhikari M., Kumar N., Kumar S. |
2022 |
10.6 |
93 |
DIDACE: Literature Mining and Exploration of Disease-Diet Associations |
Journal of Information Science and Engineering |
Toor R., Chana I. |
2022 |
1.1 |
94 |
Blockchain for IoV in 6G environment: review solutions and challenges |
Cluster Computing |
Shah K., Chadotra S., Tanwar S., Gupta R., Kumar N. |
2022 |
4.4 |
95 |
Hybrid Nature-Inspired Optimization and Encryption-Based Watermarking for E-Healthcare |
IEEE Transactions on Computational Social Systems |
Anand A., Singh A.K. |
2022 |
5 |
96 |
Modelling of Surface Roughness and Change in Out‐of‐Roundness of Tool during Electrical Discharge Machining with Cermet Tool Tip Using Machine Learning |
Processes |
Walia A.S., Srivastava V., Verma K. |
2022 |
3.5 |
97 |
Coalition Games for Performance Evaluation in 5G and beyond Networks: A Survey |
IEEE Access |
Singh U., Ramaswamy A., Dua A., Kumar N., Tanwar S., Sharma G., Davidson I.E., Sharma R. |
2022 |
3.9 |
98 |
BSense: A parallel Bayesian hyperparameter optimized Stacked ensemble model for breast cancer survival prediction |
Journal of Computational Science |
Kaur P., Singh A., Chana I. |
2022 |
3.3 |
99 |
CitEnergy: A BERT based model to analyse Citizens’ Energy-Tweets |
Sustainable Cities and Society |
Bedi J., Toshniwal D. |
2022 |
11.7 |
100 |
BC-EdgeFL: A Defensive Transmission Model Based on Blockchain-Assisted Reinforced Federated Learning in IIoT Environment |
IEEE Transactions on Industrial Informatics |
Zhang P., Hong Y., Kumar N., Alazab M., Alshehri M.D., Jiang C. |
2022 |
12.3 |
101 |
Special Issue on Artificial Intelligence, Edge, and Internet of Things for Smart Agriculture |
IEEE Micro |
Misra S., Kumar N. |
2022 |
3.6 |
102 |
A Security- and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems |
IEEE Transactions on Computational Social Systems |
Zhang P., Wang Y., Kumar N., Jiang C., Shi G. |
2022 |
5 |
103 |
A survey on event-driven and query-driven hierarchical routing protocols for mobile sink-based wireless sensor networks |
Journal of Supercomputing |
Jain S., Verma R.K., Pattanaik K.K., Shukla A. |
2022 |
3.3 |
104 |
Exploring diet associations with Covid-19 and other diseases: a Network Analysis–based approach |
Medical and Biological Engineering and Computing |
Toor R., Chana I. |
2022 |
3.2 |
105 |
Fast and lean encrypted Internet traffic classification |
Computer Communications |
Roy S., Shapira T., Shavitt Y. |
2022 |
6 |
106 |
Verifiable medical images for E-healthcare: A novel watermarking approach using robust bit-wise association of self-mutating offsprings of pixels |
Microprocessors and Microsystems |
Shivani S. |
2022 |
2.6 |
107 |
Kinematic and dynamic analysis of a dexterouse multi-fingered delta robot for object catching |
Robotica |
Kansal S., Mukherjee S. |
2022 |
2.7 |
108 |
MNERLP-MUL: Merged node and edge relevance based link prediction in multiplex networks |
Journal of Computational Science |
Mishra S., Singh S.S., Kumar A., Biswas B. |
2022 |
3.3 |
109 |
Stocks of year 2020: prediction of high variations in stock prices using LSTM |
Multimedia Tools and Applications |
Bathla G., Rani R., Aggarwal H. |
2022 |
3.6 |
110 |
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing |
Cluster Computing |
Singh S.P., Kumar R., Sharma A., Abawajy J.H., Kaur R. |
2022 |
4.4 |
111 |
State-of-the-art techniques using pre-operative brain MRI scans for survival prediction of glioblastoma multiforme patients and future research directions |
Clinical and Translational Imaging |
Kaur G., Rana P.S., Arora V. |
2022 |
2.1 |
112 |
Multimodal Biometric for Person Identification Using Deep Learning Approach |
Wireless Personal Communications |
Sharma A., Jindal N., Thakur A., Rana P.S., Garg B., Mehta R. |
2022 |
2.2 |
113 |
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare |
IEEE Internet of Things Journal |
Singh S., Nandan A.S., Malik A., Kumar R., Awasthi L.K., Kumar N. |
2022 |
10.6 |
114 |
Explainable Information Retrieval using Deep Learning for Medical images |
Computer Science and Information Systems |
Singh A., Pannu H.S., Malhi A. |
2022 |
1.4 |
115 |
Quantifying prognosis severity of COVID-19 patients from deep learning based analysis of CT chest images |
Multimedia Tools and Applications |
Rana A., Singh H., Mavuduru R., Pattanaik S., Rana P.S. |
2022 |
3.6 |
116 |
Performance Analysis at different millimetre wave frequencies for indoor shopping complex and outdoor UAV applications towards 5G |
Microprocessors and Microsystems |
Gupta A., Vardhan A.V.H., Tanwar S., Kumar N., Singh A. |
2022 |
2.6 |
117 |
S2RC: A multi-objective route planning and charging slot reservation approach for electric vehicles considering state of traffic and charging station |
Journal of King Saud University - Computer and Information Sciences |
Kumar A., Kumar R., Aggarwal A. |
2022 |
6.9 |
118 |
A Multi-Objective Optimization Scheme for Job Scheduling in Sustainable Cloud Data Centers |
IEEE Transactions on Cloud Computing |
Kaur K., Garg S., Aujla G.S., Kumar N., Zomaya A.Y. |
2022 |
6.5 |
119 |
Quantum computing challenges in the software industry. A fuzzy AHP-based approach |
Information and Software Technology |
Awan U., Hannola L., Tandon A., Goyal R.K., Dhir A. |
2022 |
3.9 |
120 |
An efficient front-to-back depth-buffer algorithm for real-time rendering of partially occluded game objects in absence of GPU |
Concurrency and Computation: Practice and Experience |
Shivani S. |
2022 |
2 |
121 |
An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems |
IEEE Internet of Things Journal |
Shamshad S., Mahmood K., Hussain S., Garg S., Das A.K., Kumar N., Rodrigues J.J.P.C. |
2022 |
10.6 |
122 |
MS2GAH: Multi-label semantic supervised graph attention hashing for robust cross-modal retrieval |
Pattern Recognition |
Duan Y., Chen N., Zhang P., Kumar N., Chang L., Wen W. |
2022 |
8 |
123 |
Deep Reinforcement Learning-Based Traffic Light Scheduling Framework for SDN-Enabled Smart Transportation System |
IEEE Transactions on Intelligent Transportation Systems |
Kumar N., Mittal S., Garg V., Kumar N. |
2022 |
8.5 |
124 |
Aspect-based Sentiment Analysis using Dependency Parsing |
ACM Transactions on Asian and Low-Resource Language Information Processing |
Rani S., Kumar P. |
2022 |
2 |
125 |
Extracting the Relationships among Students Based on Accessing Pattern of Digital Learning Attributes |
IEEE Transactions on Learning Technologies |
Muhuri S., Mukhopadhyay D. |
2022 |
3.7 |
126 |
A Blockchain-based Framework for Privacy Preservation of Electronic Health Records (EHRs) |
Transactions on Emerging Telecommunications Technologies |
Kaur J., Rani R., Kalra N. |
2022 |
3.6 |
127 |
INTERLINK: A Digital Twin-Assisted Storage Strategy for Satellite-Terrestrial Networks |
IEEE Transactions on Aerospace and Electronic Systems |
Zhao L., Wang C., Zhao K., Tarchi D., Wan S., Kumar N. |
2022 |
4.4 |
128 |
A meta-heuristic-based energy efficient route modeling for EV on non-identical road surfaces |
Neural Computing and Applications |
Kumar A., Kumar R., Aggarwal A. |
2022 |
6 |
129 |
Time series sentiment analysis (SA) of relief operations using social media (SM) platform for efficient resource management |
International Journal of Disaster Risk Reduction |
Bhullar G., Khullar A., Kumar A., Sharma A., Pannu H.S., Malhi A. |
2022 |
5 |
130 |
ChaseMe: A Heuristic Scheme for Electric Vehicles Mobility Management on Charging Stations in a Smart City Scenario |
IEEE Transactions on Intelligent Transportation Systems |
Kumar N., Chaudhry R., Kaiwartya O., Kumar N. |
2022 |
8.5 |
131 |
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid |
IEEE Transactions on Dependable and Secure Computing |
Verma G., Gope P., Saxena N., Kumar N. |
2022 |
7.3 |
132 |
Face mask detection in COVID-19: a strategic review |
Multimedia Tools and Applications |
Vibhuti, Jindal N., Singh H., Rana P.S. |
2022 |
3.6 |
133 |
Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions |
Cluster Computing |
Kaur S., Bala A., Parashar A. |
2022 |
4.4 |
134 |
A novel fusion based convolutional neural network approach for classification of COVID-19 from chest X-ray images |
Biomedical Signal Processing and Control |
Sharma A., Singh K., Koundal D. |
2022 |
5.1 |
135 |
FLP-ID: Fuzzy-based link prediction in multiplex social networks using information diffusion perspective |
Knowledge-Based Systems |
Singh S.S., Srivastva D., Kumar A., Srivastava V. |
2022 |
8.8 |
136 |
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles |
Computer Communications |
Bhattacharya P., Shukla A., Tanwar S., Kumar N., Sharma R. |
2022 |
6 |
137 |
TransLearn: A clustering based knowledge transfer strategy for improved time series forecasting |
Knowledge-Based Systems |
Kohli G.S., Kaur P., Singh A., Bedi J. |
2022 |
8.8 |
138 |
VaCoChain: Blockchain-Based 5G-Assisted UAV Vaccine Distribution Scheme for Future Pandemics |
IEEE Journal of Biomedical and Health Informatics |
Verma A., Bhattacharya P., Zuhair M., Tanwar S., Kumar N. |
2022 |
7.7 |
139 |
A Survey Towards Decision Support System on Smart Irrigation Scheduling Using Machine Learning approaches |
Archives of Computational Methods in Engineering |
Saggi M.K., Jain S. |
2022 |
9.7 |
140 |
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development |
Multimedia Tools and Applications |
Verma A., Saha R., Kumar N., Kumar G., Tai-Hoon-Kim |
2022 |
3.6 |
141 |
A taxonomy of energy optimization techniques for smart cities: Architecture and future directions |
Expert Systems |
Tanwar S., Popat A., Bhattacharya P., Gupta R., Kumar N. |
2022 |
3.3 |
142 |
Hybrid optimisation-based robust watermarking using denoising convolutional neural network |
Soft Computing |
Mahto D.K., Anand A., Singh A.K. |
2022 |
4.1 |
143 |
Vision-based kinematic analysis of the Delta robot for object catching |
Robotica |
Kansal S., Mukherjee S. |
2022 |
2.7 |
144 |
Robotic Process Automation use cases in academia and early implementation experiences |
IET Software |
Gupta A., Prabhat P., Sawhney S., Gupta R., Tanwar S., Kumar N., Shabaz M. |
2022 |
1.6 |
145 |
A Novel Channel Model and Optimal Power Control Schemes for Mobile mmWave Two-Tier Networks |
IEEE Access |
Ghosh J., Haci H., Kumar N., Al-Utaibi K.A., Sait S.M., So-In C. |
2022 |
3.9 |
146 |
Developer load balancing bug triage: Developed load balance |
Expert Systems |
Yadav A., Baljon M., Mishra S., Singh S.K., Saxena S., Sharma S.K. |
2022 |
3.3 |
147 |
Performance Evaluation of Cooperative OMA and NOMA Systems in 6G Deployment Scenarios |
Sensors |
Jain P., Gupta A., Kumar N., Joshi G.P., Cho W. |
2022 |
3.9 |
148 |
Improved method of optimization-based ECG signal watermarking |
Journal of Electronic Imaging |
Sharma N., Singh O.P., Anand A., Singh A.K. |
2022 |
1.1 |
149 |
RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario |
Future Generation Computer Systems |
Zhang P., Gan P., Kumar N., Hsu C.-H., Shen S., Li S. |
2022 |
7.5 |
150 |
VASE: Smart glasses for the visually impaired |
Journal of Ambient Intelligence and Smart Environments |
Sharma S., Kalra N., Gupta L., Varma N., Agrawal S., Verma V. |
2022 |
1.7 |
151 |
Erosion model for abrasive water jet machining of composite materials |
Journal of the Brazilian Society of Mechanical Sciences and Engineering |
Dhanawade A., Wazarkar S., Kumar S. |
2022 |
2.2 |
152 |
Enhanced reversible and secure patient data hiding algorithm based on cellular automata |
Multimedia Tools and Applications |
Bhardwaj R. |
2022 |
3.6 |
153 |
Modified valence aware dictionary for sentiment reasoning classifier for detection and classification of Covid-19 related rumors from social media data streams |
Concurrency and Computation: Practice and Experience |
Arora S., Rani R., Saxena N. |
2022 |
2 |
154 |
QAOVDetect: A Novel Syllogistic Model with Quantized and Anchor Optimized Approach to Assist Visually Impaired for Animal Detection using 3D Vision |
Cognitive Computation |
Manjari K., Verma M., Singal G., Kumar N. |
2022 |
5.4 |
155 |
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks |
IEEE Transactions on Intelligent Transportation Systems |
Tan H., Zheng W., Vijayakumar P., Sakurai K., Kumar N. |
2022 |
8.5 |
156 |
D2BGAN: A Dark to Bright Image Conversion Model for Quality Enhancement and Analysis Tasks Without Paired Supervision |
IEEE Access |
Bhattacharya J., Modi S., Gregorat L., Ramponi G. |
2022 |
3.9 |
157 |
Machine learning approach for software defect prediction using multi-core parallel computing |
Automated Software Engineering |
Parashar A., Kumar Goyal R., Kaushal S., Kumar Sahana S. |
2022 |
3.4 |
158 |
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges |
Cluster Computing |
Rani R., Khurana M., Kumar A., Kumar N. |
2022 |
4.4 |
159 |
DeepEvap: Deep reinforcement learning based ensemble approach for estimating reference evapotranspiration |
Applied Soft Computing |
Sharma G., Singh A., Jain S. |
2022 |
8.7 |
160 |
MB-MaaS: Mobile Blockchain-based Mining-as-a-Service for IIoT environments |
Journal of Parallel and Distributed Computing |
Bhattacharya P., Patel F., Tanwar S., Kumar N., Sharma R. |
2022 |
3.8 |
161 |
Survivable virtual network embedding algorithm considering multiple node failure in IIoT environment |
Journal of Network and Computer Applications |
Zhang P., Gan P., Kumar N., Jiang C., Liu F., Zhang L. |
2022 |
8.7 |
162 |
Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services |
IEEE Transactions on Cloud Computing |
Panchal G., Samanta D., Das A.K., Kumar N., Choo K.-K.R. |
2022 |
6.5 |
163 |
PERFECT: Positional-Forgery Resistant Traffic Gap Estimation for Connected Intersection Management |
IEEE Transactions on Vehicular Technology |
Anand S., Raja G., Kumar N., Narayanan R., Raja A., Karthik K.B.V. |
2022 |
6.8 |
164 |
Deep CNN based online image deduplication technique for cloud storage system |
Multimedia Tools and Applications |
Kaur R., Bhattacharya J., Chana I. |
2022 |
3.6 |
165 |
Machine learning based analysis of learner-centric teaching of punjabi grammar with multimedia tools in rural indian environment |
Multimedia Tools and Applications |
Kumar V., Dhingra G., Saxena N., Malhotra R. |
2022 |
3.6 |
166 |
Manifold Preserving Features and Regression for Semantic Labelling in High Dimensional Images |
Wireless Personal Communications |
Srivastava V., Singh S.S., Biswas B. |
2022 |
2.2 |
167 |
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment |
Peer-to-Peer Networking and Applications |
Algubili B.H.T., Kumar N., Lu H., Yassin A.A., Boussada R., Mohammed A.J., Liu H. |
2022 |
4.2 |
168 |
Correction to: A meta-heuristic-based energy efficient route modeling for EV on nonidentical road surfaces (Neural Computing and Applications, (2022), 34, 18, (15575-15588), 10.1007/s00521-022-07205-5) |
Neural Computing and Applications |
Kumar A., Kumar R., Aggarwal A. |
2022 |
6 |
169 |
TRAP: task-resource adaptive pairing for efficient scheduling in fog computing |
Cluster Computing |
Kaur N., Kumar A., Kumar R. |
2022 |
4.4 |
170 |
A Deep-Q Learning Scheme for Secure Spectrum Allocation and Resource Management in 6G Environment |
IEEE Transactions on Network and Service Management |
Bhattacharya P., Patel F., Alabdulatif A., Gupta R., Tanwar S., Kumar N., Sharma R. |
2022 |
5.3 |
171 |
Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review |
Physical Communication |
Sharma H., Kumar N., Tekchandani R. |
2022 |
2.2 |
172 |
Analysis of the Pertinence of Indian Women’s Institutions in Collaborative Research |
IEEE Transactions on Computational Social Systems |
Muhuri S., Kumari S., Namasudra S., Kadry S. |
2022 |
5 |
173 |
Guest Editorial: Special Section on Edge Intelligence for Industrial Internet of Things |
IEEE Transactions on Industrial Informatics |
Garg S., Rathee G., Kumar N., Rawat D.B. |
2022 |
12.3 |
174 |
A comprehensive survey on software-defined networking for smart communities |
International Journal of Communication Systems |
Chaudhary R., Aujla G.S., Kumar N., Chouhan P.K. |
2022 |
2.1 |
175 |
A system for electric vehicle’s energy-aware routing in a transportation network through real-time prediction of energy consumption |
Complex and Intelligent Systems |
Modi S., Bhattacharya J. |
2022 |
5.8 |
176 |
FHC-NDS: Fuzzy Hierarchical Clustering of Multiple Nominal Data Streams |
IEEE Transactions on Fuzzy Systems |
Sangma J.W., Rani Y., Pal V., Kumar N., Kushwaha R. |
2022 |
11.9 |
177 |
An efficient handover mechanism for 5G networks using hybridization of LSTM and SVM |
Multimedia Tools and Applications |
Kaur G., Goyal R.K., Mehta R. |
2022 |
3.6 |
178 |
<italic>SanJeeVni</italic>: Secure UAV-envisioned Massive Vaccine Distribution for COVID-19 Underlying 6G Network |
IEEE Sensors Journal |
Verma A., Bhattacharya P., Saraswat D., Tanwar S., Kumar N., Sharma R. |
2022 |
4.3 |
179 |
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things |
Journal of Information Security and Applications |
Gupta A., Tripathi M., Muhuri S., Singal G., Kumar N. |
2022 |
5.6 |
180 |
Computational investigation of the tumor position and ambient conditions on magnetic nanoparticle thermo-therapy |
Thermal Science and Engineering Progress |
Nain S., Kumar N., Kumar Avti P. |
2022 |
4.8 |
181 |
Computational Medical Image Reconstruction Techniques: A Comprehensive Review |
Archives of Computational Methods in Engineering |
Gothwal R., Tiwari S., Shivani S. |
2022 |
9.7 |
182 |
Binary Drone Squadron Optimization Approaches for Feature Selection |
IEEE Access |
Singh H., Sharma S., Khurana M., Kaur M., Lee H.-N. |
2022 |
3.9 |
183 |
Fully Homomorphic Enabled Secure Task Offloading and Scheduling System for Transport Applications |
IEEE Transactions on Vehicular Technology |
Lakhan A., Mohammed M.A., Garcia-Zapirain B., Nedoma J., Martinek R., Tiwari P., Kumar N. |
2022 |
6.8 |
184 |
REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things |
IEEE Internet of Things Journal |
Tanveer M., Alkhayyat A., Khan A.U., Kumar N., Alharbi A.G. |
2022 |
10.6 |
185 |
Throughput Guarantees for Multi-Cell Wireless Powered Communication Networks With Non-Orthogonal Multiple Access |
IEEE Transactions on Vehicular Technology |
Huang L., Nan R., Chi K., Hua Q., Yu K., Kumar N., Guizani M. |
2022 |
6.8 |
186 |
Non-invasive Single Channel integration model for fetal ECG extraction and sustainable fetal healthcare using wavelet framework |
Multimedia Tools and Applications |
Singh R., Rajpal N., Mehta R. |
2022 |
3.6 |
187 |
Combating Fake News: Stakeholder Interventions and Potential Solutions |
IEEE Access |
Gupta A., Kumar N., Prabhat P., Gupta R., Tanwar S., Sharma G., Bokoro P.N., Sharma R. |
2022 |
3.9 |
188 |
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices |
Knowledge-Based Systems |
Kumari S., Singh M., Singh R., Tewari H. |
2022 |
8.8 |
189 |
Advanced computing and communication technologies for Internet of Drones |
Computer Communications |
Kumar N., Aujla G.S., Obaidat M.S., Lu R., Guo S. |
2022 |
6 |
190 |
SDH: Secure Data Hiding in Fused Medical Image for Smart Healthcare |
IEEE Transactions on Computational Social Systems |
Anand A., Singh A.K. |
2022 |
5 |
191 |
Spark map reduce based framework for seismic facies classification |
Journal of Applied Geophysics |
Bedi J., Toshniwal D. |
2022 |
2 |
192 |
Mining Sequential Learning Trajectories with Hidden Markov Models for Early Prediction of At-Risk Students in E-Learning Environments |
IEEE Transactions on Learning Technologies |
Gupta A., Garg D., Kumar P. |
2022 |
3.7 |
193 |
STOWP: A light-weight deep residual network integrated windowing strategy for storage workload prediction in cloud systems |
Engineering Applications of Artificial Intelligence |
Bedi J., Patel Y.S. |
2022 |
8 |
194 |
ELP: Link prediction in social networks based on ego network perspective |
Physica A: Statistical Mechanics and its Applications |
Mishra S., Singh S.S., Kumar A., Biswas B. |
2022 |
3.3 |
195 |
Block-CPS: Blockchain and Non-Cooperative Game-Based Data Pricing Scheme for Car Sharing |
IEEE Internet of Things Journal |
Kakkar R., Gupta R., Dahman Alshehri M., Tanwar S., Dua A., Kumar N. |
2022 |
10.6 |
196 |
Anti-phishing technique based on dynamic image captcha using multi secret sharing scheme |
Journal of Visual Communication and Image Representation |
Arora A., Garg H., Shivani S. |
2022 |
2.6 |
197 |
AgriMine: A Deep Learning integrated Spatio-temporal analytics framework for diagnosing nationwide agricultural issues using farmers’ helpline data |
Computers and Electronics in Agriculture |
Godara S., Toshniwal D., Parsad R., Bana R.S., Singh D., Bedi J., Jhajhria A., Dabas J.P.S., Marwaha S. |
2022 |
8.3 |
198 |
Machine learning based framework for network intrusion detection system using stacking ensemble technique |
Indian Journal of Engineering and Materials Sciences |
Parashar A., Saggu K.S., Garg A. |
2022 |
0.9 |
199 |
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices |
Computer Networks |
Kumari S., Singh M., Singh R., Tewari H. |
2022 |
5.6 |
200 |
Hybrid deep learning techniques for estimation of daily crop evapotranspiration using limited climate data |
Computers and Electronics in Agriculture |
Sharma G., Singh A., Jain S. |
2022 |
8.3 |
201 |
Facial emotion recognition based real-time learner engagement detection system in online learning context using deep learning models |
Multimedia Tools and Applications |
Gupta S., Kumar P., Tekchandani R.K. |
2022 |
3.6 |
202 |
An Edge Filter Based Approach of Neural Style Transfer to the Image Stylization |
IEEE Access |
Bagwari S., Choudhary K., Raikwar S., Nijhawan R., Kumar S., Shah M.A. |
2022 |
3.9 |
203 |
Predicting clothing attributes with CNN and SURF based classification model |
Multimedia Tools and Applications |
Kaur N., Pandey S. |
2022 |
3.6 |
204 |
EEG Based Emotion Recognition: A Tutorial and Review |
ACM Computing Surveys |
Li X., Zhang Y., Tiwari P., Song D., Hu B., Yang M., Zhao Z., Kumar N., Marttinen P. |
2022 |
16.6 |
205 |
Structure preserving loss function for single image super resolution |
Displays |
Tuli N., Chandra Raikwar S., Alahmadi M.D., Alghamdi W., Singh H., Singh Rana P. |
2022 |
4.3 |
206 |
A comprehensive review on landmine detection using deep learning techniques in 5G environment: open issues and challenges |
Neural Computing and Applications |
Barnawi A., Budhiraja I., Kumar K., Kumar N., Alzahrani B., Almansour A., Noor A. |
2022 |
6 |
207 |
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model |
Cluster Computing |
Garg S., Ahuja R., Singh R., Perl I. |
2022 |
4.4 |
208 |
LaMeta: An efficient locality aware metadata management technique for an ultra-large distributed storage system |
Journal of King Saud University - Computer and Information Sciences |
Singh H.J., Bawa S. |
2022 |
6.9 |
209 |
An Efficient Approach for Accident Severity Classification in Smart Transportation System |
Arabian Journal for Science and Engineering |
Kaur R., Roul R.K., Batra S. |
2022 |
2.9 |
210 |
A Systematic Review on Biomarker Identification for Cancer Diagnosis and Prognosis in Multi-omics: From Computational Needs to Machine Learning and Deep Learning |
Archives of Computational Methods in Engineering |
Dhillon A., Singh A., Bhalla V.K. |
2022 |
9.7 |
211 |
PETS: P2P Energy Trading Scheduling Scheme for Electric Vehicles in Smart Grid Systems |
IEEE Transactions on Intelligent Transportation Systems |
Aggarwal S., Kumar N. |
2022 |
8.5 |
212 |
Parameter adaptive unit-linking dual-channel PCNN based infrared and visible image fusion |
Neurocomputing |
Panigrahy C., Seal A., Mahato N.K. |
2022 |
6 |
213 |
Smart parking space detection under hazy conditions using convolutional neural networks: a novel approach |
Multimedia Tools and Applications |
Satyanath G., Sahoo J.K., Roul R.K. |
2022 |
3.6 |
214 |
An overview of violence detection techniques: current challenges and future directions |
Artificial Intelligence Review |
Mumtaz N., Ejaz N., Habib S., Mohsin S.M., Tiwari P., Band S.S., Kumar N. |
2022 |
12 |
215 |
Mitigating Jamming Attack in 5 G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach |
IEEE Transactions on Vehicular Technology |
Sharma H., Kumar N., Tekchandani R. |
2022 |
6.8 |
216 |
Vision-Based Semantic Segmentation in Scene Understanding for Autonomous Driving: Recent Achievements, Challenges, and Outlooks |
IEEE Transactions on Intelligent Transportation Systems |
Muhammad K., Hussain T., Ullah H., Ser J.D., Rezaei M., Kumar N., Hijji M., Bellavista P., De Albuquerque V.H.C. |
2022 |
8.5 |
217 |
Swarm of UAVs for Network Management in 6G: A Technical Review |
IEEE Transactions on Network and Service Management |
Khan M.A., Kumar N., Mohsan S.A.H., Khan W.U., Nasralla M.M., Alsharif M.H., Zywiolek J., Ullah I. |
2022 |
5.3 |
218 |
An interval type-2 fuzzy ontological model: Predicting water quality from sensory data |
Concurrency and Computation: Practice and Experience |
Hooda D., Rani R. |
2022 |
2 |
219 |
GWLBC: Gray Wolf Optimization Based Load Balanced Clustering for Sustainable WSNs in Smart City Environment |
Sensors |
Singh S., Nikolovski S., Chakrabarti P. |
2022 |
3.9 |
220 |
Effective electrocardiogram steganography for secured patient information transmission based on most significant bit planes prediction |
Multimedia Tools and Applications |
Bhardwaj R. |
2022 |
3.6 |
221 |
OCTRA-5G: Osmotic computing based task scheduling and resource allocation framework for 5G |
Concurrency and Computation: Practice and Experience |
Kaur A., Kumar R., Saxena S. |
2022 |
2 |
222 |
An improved reversible data hiding method in encrypted domain for E-healthcare |
Multimedia Tools and Applications |
Bhardwaj R. |
2022 |
3.6 |
223 |
Surface-based brain morphometry in schizophrenia vs. cannabis-induced psychosis: A controlled comparison |
Journal of Psychiatric Research |
Ghosh A., Kaur S., Shah R., Oomer F., Avasthi A., Ahuja C.K., Basu D., Nehra R., Khandelwal N. |
2022 |
4.8 |
224 |
Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things |
IEEE Access |
Ullah I., Alomari A., Abdullah A.M., Kumar N., Alsirhani A., Noor F., Hussain S., Khan M.A. |
2022 |
3.9 |
225 |
ALPS: An Adaptive Link-State Perception Scheme for Software-Defined Vehicular Networks |
IEEE Transactions on Vehicular Technology |
Lin N., Zhao D., Zhao L., Hawbani A., Guizani M., Kumar N. |
2022 |
6.8 |
226 |
Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots |
IEEE Journal on Selected Areas in Communications |
Yang Y., Wang W., Yin Z., Xu R., Zhou X., Kumar N., Alazab M., Gadekallu T.R. |
2022 |
16.4 |
227 |
Spectral graph theory-based virtual network embedding for vehicular fog computing: A deep reinforcement learning architecture |
Knowledge-Based Systems |
Chen N., Zhang P., Kumar N., Hsu C.-H., Abualigah L., Zhu H. |
2022 |
8.8 |
228 |
EDCSuS: Sustainable Edge Data Centers as a Service in SDN-Enabled Vehicular Environment |
IEEE Transactions on Sustainable Computing |
Aujla G.S., Kumar N., Garg S., Kaur K., Ranjan R. |
2022 |
3.9 |
229 |
A vision towards integrated 6G communication networks: Promising technologies, architecture, and use-cases |
Physical Communication |
Jain P., Gupta A., Kumar N. |
2022 |
2.2 |
230 |
Blockchain-Enabled Cybersecurity Efficient IIOHT Cyber-Physical System for Medical Applications |
IEEE Transactions on Network Science and Engineering |
Lakhan A., Mohammed M.A., Nedoma J., Martinek R., Tiwari P., Kumar N. |
2022 |
6.6 |
231 |
Hyperspectral image segmentation: a comprehensive survey |
Multimedia Tools and Applications |
Grewal, R., Kasana, S.S., Kasana, G. |
2022 |
3.6 |
232 |
Latency-Energy Tradeoff in Connected Autonomous Vehicles: A Deep Reinforcement Learning Scheme |
IEEE Transactions on Intelligent Transportation Systems |
Budhiraja I., Kumar N., Sharma H., Elhoseny M., Lakys Y., Rodrigues J.J.P.C. |
2022 |
8.5 |
233 |
A Conditional Privacy Preserving Heterogeneous Signcryption Scheme for Internet of Vehicles |
IEEE Transactions on Vehicular Technology |
Ullah I., Khan M.A., Kumar N., Abdullah A.M., AlSanad A.A., Noor F. |
2022 |
6.8 |
234 |
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications |
IEEE Transactions on Services Computing |
Bansal M., Chana I., Clarke S. |
2022 |
8.1 |
235 |
Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media |
Applied Soft Computing |
Jyothsna Devi K., Singh P., Thakkar H.K., Kumar N. |
2022 |
8.7 |
236 |
Nonlinear kernel based feature maps for blur-sensitive unsharp masking of JPEG images |
IET Image Processing |
Bhattacharya J., Marsi S., Ramponi G. |
2022 |
2.3 |
237 |
Dynamic SFC Embedding Algorithm Assisted by Federated Learning in Space-Air-Ground Integrated Network Resource Allocation Scenario |
IEEE Internet of Things Journal |
Zhang P., Zhang Y., Kumar N., Guizani M. |
2022 |
10.6 |
238 |
AI-based fruit identification and quality detection system |
Multimedia Tools and Applications |
Goyal K., Kumar P., Verma K. |
2022 |
3.6 |
239 |
Design and analysis of DDoS mitigating network architecture |
International Journal of Information Security |
Swati, Roy S., Singh J., Mathew J. |
2022 |
3.2 |
240 |
Extracting Radiomic features from pre-operative and segmented MRI scans improved survival prognosis of glioblastoma Multiforme patients through machine learning: a retrospective study |
Multimedia Tools and Applications |
Kaur G., Rana P.S., Arora V. |
2022 |
3.6 |
241 |
QEEG Predictors of Treatment Response in Major Depressive Disorder- A Replication Study from Northwest India |
Clinical EEG and Neuroscience |
Singh, A., Arun, P., Singh, G. P., Kaur, D., & Kaur, S. |
2022 |
2 |
242 |
Efficient dynamic key-aggregate cryptosystem for secure and flexible data sharing |
Concurrency and Computation: Practice and Experience |
Pareek G., Maiti S. |
2022 |
2 |
243 |
FIMBISAE: A Multimodal Biometric Secured Data Access Framework for Internet of Medical Things Ecosystem |
IEEE Internet of Things Journal |
Ahmed T., Samima S., Zuhair M., Ghayvat H., Khan M.A., Kumar N. |
2022 |
10.6 |
244 |
Deep Reinforcement Learning Algorithm for Latency-Oriented IIoT Resource Orchestration |
IEEE Internet of Things Journal |
Zhang P., Zhang Y., Kumar N., Hsu C. |
2022 |
10.6 |
245 |
Deep AI-powered Cyber Threat Analysis in IIoT |
IEEE Internet of Things Journal |
Bibi I., Akhunzada A., Kumar N. |
2022 |
10.6 |
246 |
Blockchain-Based Co-Operative Caching for Secure Content Delivery in CCN-Enabled V2G Networks |
IEEE Transactions on Vehicular Technology |
Miglani A., Kumar N. |
2022 |
6.8 |
247 |
Dynamic Partitioning and Popularity based Caching for Optimized Performance in content-centric fog networks: DPPCOP |
Pervasive and Mobile Computing |
Kumar S., Tiwari R. |
2022 |
4.3 |
248 |
Distributed Deep Reinforcement Learning Assisted Resource Allocation Algorithm for Space-Air-Ground Integrated Networks |
IEEE Transactions on Network and Service Management |
Zhang P., Li Y., Kumar N., Chen N., Hsu C., Barnawi A. |
2022 |
5.3 |
249 |
A Comprehensive Study of Deep Learning-based Covert Communication |
ACM Transactions on Multimedia Computing, Communications and Applications |
Anand A., Kumar Singh A. |
2022 |
5.1 |
Publications in Conference: 2022
Sr. No. |
Name of the teacher |
Title of the paper |
Name of the conference |
Name of the publisher |
1 |
Dr. Karun Verma |
Green Energy-Based Efficient IoT Sensor Network for Small Farms |
International Congress of Electrical and Computer Engineering 2022 |
Springer |
2 |
Dr. Suresh Chandra Raikwar |
A Review: The study and Analysis of Neural Style Transfer of Image |
International Conference on |
International Association for Pattern Recognition, Springer |
3 |
Dr. Rajendra Roul |
A novel modified , harmonic mean combined with Cohesion score for Multi-document summarization |
ICDCIT-2022 |
Springer |
4 |
Dr. Shruti Aggarwal |
Attendance Management System using Facial Recognition |
3rd International Conference on Intelligent Engineering and Management |
IEEE |
5 |
Dr. Shruti Aggarwal |
Bitcoin-Blockchain Technology: Security Perspective |
3rd International Conference on Intelligent Engineering and Management |
IEEE |
6 |
Dr. Shruti Aggarwal |
Research Analysis of Trends in e-Learning and Medical Maintenance |
International Conference on Electronics and Renewable Systems, (ICEARS 2022), Tuticorin, India, 16-18, March 2022, |
|
7 |
Dr. Shruti Aggarwal |
A Systematic Review of Research Direction on Network Control System in Wireless Sensor Network |
8th International Conference on Advanced Computing and Communication Systems (ICACCS 2022) |
|
8 |
Dr. Shruti Aggarwal |
Research Trends in Artificial Intelligence and Nature Inspired Techniques |
International conference on Recent Trends in Machine Learning, IOT, Smart Cities & Applications, ICMISC 2022 |
|
9 |
Dr. Shruti Aggarwal |
Research trends in routing protocol for wireless sensor network |
5th International Conference on Innovative Computing and Communication (ICICC 2022), |
|
10 |
Dr. Shruti Aggarwal |
A Custom Digitization and DWT Based Blind Image Steganography |
1st International Conference on Computational Intelligence for Engineering and Management Applications (CIEMA) – 2022 |
|
11 |
Dr. Shruti Aggarwal |
The Sphere of Quantum Computing: Principles and Applications |
(International Conference on “Contemporary Innovations in Mechanical Engineering |
|
12 |
Dr. Shruti Aggarwal |
Examining Effectiveness of Performance Analysis of Agile Transformation |
(International Conference on “Contemporary Innovations in Mechanical Engineering |
|
13 |
Dr. Shruti Aggarwal |
Measuring the moderation effect of age and gender on user’s intentions towards cloud computing in India |
(International Conference on “Contemporary Innovations in Mechanical Engineering |
|
14 |
Dr. Shivendra Shivani |
An Efficient Self-embedding Fragile Watermarking Scheme Based on Neighborhood Relationship |
ICICV-2021 |
Springer CCIS |
15 |
Dr. Ashutosh Mishra |
Early Prediction of Alzheimer Disease using Ensemble learning |
2nd International Conference on Machine Learning and Big Data Analytics (ICMLBDA) 2022 |
Springer |
16 |
Dr. Ravinder Kumar |
Evaluating Generative Adversarial Networks for Gurumukhi handwritten Character Recognition(CR) |
MISP |
Springer |
17 |
Dr.Ravinder Kumar |
Bilingual documents text line extraction using Conditional GANs |
ICMLBDA 2022 |
Springer |
18 |
Dr. Rinkle Rani, Dr. Nidhi Kalra |
Prediction of Attention Deficit Hyperactivity Disorder (ADHD) using machine learning techniques based on classification of EEG signal |
8th International Conference on Advanced Computing and Communication Systems (ICACCS) |
IEEE |
19 |
Dr. Rinkle Rani Dr. Nidhi Kalra |
Detection and Characterization of Attention Deficit Hyperactivity Disorder using Ensemble Learning |
3rd International Conference on Internet of Things (ICIoT2022) |
Springer |
20 |
Dr.Rinkle Rani Dr. Nidhi Kalra |
Analysis and Prediction of COVID-19 Disease using Machine Learning Techniques |
Thirteenth International Conference on Advances in Communication, Network, and Computing – CNC 2022 |
Grenze Scientific Society |
21 |
Dr. Raman Kumar Goyal |
CPU Burst-Time Estimation using Machine Learning |
2022 IEEE Delhi Section Conference (DELCON) |
IEEE |
22 |
Dr.Anshu Parashar Dr. Nidhi Kalra |
An exploration of machine learning and deep learning techniques for offensive text detection in social media- a systematic review |
5 th International Conference on Innovative Computing and Communication (ICICC-2022) |
Springer |
23 |
Dr. Seema Wazarkar |
Multimodality for NLP-Centered Applications: Resources, Advances and Frontiers |
Language Resources and Evaluation Conference |
European Language Resources Association (ELRA) |
24 |
Dr. Seema Wazarkar, Dr. Nidhi Kalra |
Social Image Content Analysis for Fashion using Deep Learning |
AIC 2022 |
IEEE |
25 |
Dr.Nidhi Kalra |
Hand Gesture Recognition using 3D CNN and Computer Interfacing |
6th International Conference on Inventive Systems and Control |
Springer |
26 |
Dr.Nidhi Kalra Dr. Seemu Sharma |
Sentiment analysis of Twitter data during Farmers' Protest in India through Machine Learning |
International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq |
IEEE |
27 |
Dr. Chinmaya Panigrahy |
A simplified parameter adaptive DCPCNN based medical image fusion |
International Conference on Communication and Artificial Intelligence |
Springer |
28 |
Dr Jatin Bedi |
Raccoons at SemEval-2022 Task 11: Leveraging Concatenated Word Embeddings for Named Entity Recognition |
NAACL|SEMEVAL |
Association for Computational Linguistics |
29 |
Dr. Seema Bawa |
Bilingual Documents Text line extraction using conditional GAN |
International Conference on Machine Learning and Big Data Analytics (ICMLBDA 2022) |
Springer |
30 |
Dr. Seema Bawa |
Evaluating Generative Adversarial Networks for Gurumukhi handwritten Character Recognition (CR) |
Machine Intelligence and Signal processing (MISP 2022) |
Springer |
Publications in conference: 2021
Sr. No. |
Name of the teacher |
Title of the paper |
Title of the proceedings of the conference |
Name of the conference |
Name of the publisher |
1 |
Dr. Jasvinder Pal singh |
A Study of CRM Solution Using Salesforce |
Global Emerging Innovation Summit (GEIS-2021) |
Global Emerging Innovation Summit (GEIS-2021) |
Bentham Books |
2 |
Dr. Varun Srivastava |
A Novel Convolutional Neural Network Based Segmentation Model For Lung Ct-Scan Images Affected By Covid 19. |
Lect. Notes in Electrical Eng., Vol. 936 |
4th International Conference on Futuristic Trends in Networks and Computing Technologies |
Springer Nature |
3 |
Dr Jatin Bedi |
ARGUABLY at ComMA@ ICON: Detection of Multilingual Aggressive, Gender Biased, and Communally Charged Tweets using Ensemble and Fine-Tuned IndicBERT |
Proceedings of the 18th International Conference on Natural Language Processing: Shared Task on Multilingual Gender Biased and Communal Language Identification |
ICON 2021 |
|
4 |
Dr.Anshu Parashar |
A Blockchain-based Approach for Educators’ Profile Management and Reward system |
International Conference on Computing Sciences (ICCS) |
International Conference on Computing Sciences (ICCS) |
IEEE |
5 |
Dr. Raman Kumar Goyal, Dr. Rajesh Mehta |
A color image watermarking in the frequency domain using a teaching-learning optimization algorithm |
IEEE proceedings of 2021 Sixth International Conference on Image Information Processing (ICIIP) |
2021 Sixth International Conference on Image Information Processing (ICIIP) |
IEEE |
6 |
Dr. Shreelekha Pandey |
Hybrid Approaches for Brain Tumor Detection in MR Images |
Communications in Computer and Information Science |
International Conference on Advances in Computing and Data Sciences 2019 |
Springer |
7 |
Dr. Jhilik Bhattacharya |
A Hybrid Approach for Scene Matching used for Autonomous vehicles |
IEEE International Conference on Communications Workshops |
ICC Workshops |
IEEE |
8 |
Dr. Manju Khurana |
Optimized Z-Buffer Using Divide and Conquer |
Innovations in Computational Intelligence and Computer Vision. Advances in Intelligent Systems and Computing |
Innovations in Computational Intelligence and Computer Vision. Advances in Intelligent Systems and Computing |
Springer, Singapore |
9 |
Tanya Garg |
E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud |
IoT and Analytics for Sensor Networks(Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 244) |
ICWSNUCA 2021(International Conference on works, Ubiquitous Computing and Applications 2021 Wireless Sensor Net |
SPRINGER |
10 |
Dr. Rinkle Rani |
A Novel Framework for Distributed Stream Processing and Analysis of Twitter Data |
International Conference on Innovative Computing and Communication (ICICC-2020) |
International Conference on Innovative Computing and Communication (ICICC-2020) |
Springer |
11 |
Dr. Anupam Garg |
An Approach for Offline Handwritten Character Shape Reconstruction Using Contour and Morphological Techniques |
Advanced Computing and Intelligent Technologies |
2021 International Conference on Advanced Computing and Intelligent Technologies (ICACIT2021) |
Springer |
12 |
Dr. Amrita Kaur |
An approach for Offline Handwritten character shape reconstruction using Contour and Morphological techniques |
Advance computing and Intelligent technologies |
2021 International Conference on Advanced Computing and Intelligent Technologies (ICACIT2021) |
Springer |
13 |
Dr. Varun Srivastava |
Classification of brain tumor images using enhanced deep learning based methodologies |
Lecture notes in Networks and Systems |
International Conference on Data Science and Application |
Springer |
14 |
Dr. Varun Srivastava |
A survey of various wavelet-based image retrieval techniques and tuning of hyperparameters |
Proceedings of Second Doctoral Symposium on Computational Intelligence |
Second Doctoral Symposium on Computational Intelligence |
Springer |
15 |
Dr. Neeraj Kumar |
I2UTS: An IoT based Intelligent Urban Traffic System |
HPSR 2021 |
HPSR 2021, June 7-10, 2021. |
Elsevier |
16 |
Dr. Neeraj Kumar |
HTFM: Hybrid Traffic-Flow Forecasting Model for Intelligent Vehicular Ad hoc Networks |
ICC 2021 |
ICC 2021 |
IEEE |
17 |
Dr. Neeraj Kumar |
Interference Mitigation and Secrecy Ensured for NOMA-Based D2D Communications Under Imperfect CSI |
ICC 2021 |
ICC 2021 |
Elsevier |
18 |
Dr. Neeraj Kumar |
MedBlock: An AI-enabled and Blockchain-driven Medical Healthcare System for COVID-19. |
ICC-2021 |
ICC |
IEEE |
19 |
Dr. Neeraj Kumar |
A Secure Scalable Authentication Protocol for Access Network Communications using ECC. |
ICC Workshops 2021: 1-6 |
ICC |
IEEE |
20 |
Dr. Neeraj Kumar |
Res6Edge: An Edge-AI Enabled Resource Sharing Scheme for C-V2X Communications towards 6G |
IWCMC 2021: 149-154 |
IWCMC 2021 |
IEEE |
21 |
Dr. Shruti Aggarwal |
Women Empowerment in IT |
National Conference on Sustainable Society: Gender Equality and Women Empowerment |
National Conference on Sustainable Society: Gender Equality and Women Empowerment |
|
22 |
Dr. Shruti Aggarwal |
Scientometric Analysis of Research Trends in Clustering and Nature Inspired Techniques |
3rd International Conference (online) on “Innovation in Communication, Computing and Sciences” (ICCS 2021 |
3rd International Conference (online) on “Innovation in Communication, Computing and Sciences” (ICCS 2021 |
|
23 |
Dr. Shruti Aggarwal |
Systematic Literature Review of Nature Inspired Hybrid Bat Algorithms |
INDO-US Conference on Communication, Automation And Power Engineering, Chandigarh University |
INDO-US Conference on Communication, Automation And Power Engineering, Chandigarh University |
|
24 |
Dr. Shruti Aggarwal |
Research Trends in Routing Protocol for Wireless Sensor Network |
International Conference on Innovative Computing and Communication |
International Conference on Innovative Computing and Communication |
|
25 |
Dr. Shruti Aggarwal |
Application Based Categorization of Datasets for Implementing Data Mining Techniques |
Global Conference for Advancement in Technology, IEEE GCAT, 2021 |
Global Conference for Advancement in Technology, IEEE GCAT, 2021 |
IEEE |
26 |
Dr. Shruti Aggarwal |
Multi Disease Prediction Based on Combined Deep Reinforcement Boltzmann Machines |
International Conference on Advancements in Computation and Computer Technologies, Chandigarh University |
International Conference on Advancements in Computation and Computer Technologies, Chandigarh University |
|
27 |
Dr. Shruti Aggarwal |
Malware and Communication Network in Cyber Security |
10th International Conference on Computing, Communication and Sensor Networks |
10th International Conference on Computing, Communication and Sensor Networks |
|
28 |
Dr. Shruti Aggarwal |
Scope and Challenges of Artificial Intelligencies in Health Care of India |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES |
|
29 |
Dr. Shruti Aggarwal |
Medical Insurance Cost Prediction Using Machine Learning Algorithms |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES), |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES), |
|
30 |
Dr. Shruti Aggarwal |
Meta-Analysis of Nature Inspired Hybrid Cuckoo Algorithm |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES) |
International Conference on Cyber Technologies and Emerging Sciences (ICCTES) |
|
31 |
Dr. Shruti Aggarwal |
A Performed Optimized Load Balancing Genetic Approach Technique in Cloud Environment |
International Conference on Recent Trends in Communication and Intelligent Systems, 10-11 December, 2021, Pages 269-280, Springer, Published in July, 2022 |
International Conference on Recent Trends in Communication and Intelligent Systems, 10-11 December, 2021, Pages 269-280, Springer, Published in July, 2022 |
|
32 |
Dr. Shruti Aggarwal |
Research Trends in Image Processing and Defect Detections |
Doctoral Symposium on Computational Intelligence, (DoSCI-2022), Communicated On 14th December, 2021, |
Doctoral Symposium on Computational Intelligence, (DoSCI-2022), Communicated On 14th December, 2021, |
|
Publications in conference: 2020
Sr. No. |
Name of the teacher |
Title of the paper |
Title of the proceedings of the conference |
Name of the conference |
Name of the publisher |
1 |
Dr Sharad Saxena |
Osmotic Computing and Related Challenges: A Survey |
IEEE Xplore |
Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC) |
IEEE |
2 |
Dr Sharad Saxena |
Swarm Intelligence based Hierarchical Routing Protocols Study in WSNs |
PDGC |
Sixth International Conference on Parallel, Distributed and Grid Computing |
IEEE |
3 |
Dr. Suresh Chandra Raikwar |
An Enhanced Depth Approximation Model for Haze Removal using Single Image |
Lecture Notes in Electrical Engineering |
Electrical and Electronic Engineering |
Springer |
4 |
Dr. Suresh Chandra Raikwar |
Accurate and Robust Atmospheric Light Estimation for Single Image Dehazing |
IEEE Uttar Pradesh Section Conference on Electrical, Electronics and Computer Engineering |
IEEE Uttar Pradesh Section Conference on Electrical, Electronics and Computer Engineering |
IEEE |
5 |
Dr. Manju Khurana |
MirGAN: Medical Image Reconstruction using Generative Adversarial Networks |
Computing, Communication and Security (ICCCS) |
Computing, Communication and Security (ICCCS) |
IEEE |
6 |
Dr. Tanya Garg |
Big Data Analytics: Applications, Challenges & Future Directions |
ICRITO 2020 |
ICRITO 2020 (IEEE SCOPUS INDEXED CONFERENCE) |
IEEE XPLORE |
7 |
Dr. Raman Singh |
Framework for a Decentralized Web |
(ITNAC) |
2020 30th International Telecommunication Networks and Applications Conference (ITNAC) |
IEEE |
8 |
Dr. Mamta |
Metadata Security Measures for Protecting Confidential Information on the Cloud |
Lecture Notes in Computer Science, vol 12575 |
CInternational Conference on Computational Data and Social Networks |
Springer |
9 |
Dr. Rinkle Rani |
Semantic Driven Healthcare Monitoring and Disease Detection Framework from Heterogeneous Sensor Data |
IEEE International Conference on Parallel Distributed and Grid Computing (PDGC- 2020) |
IEEE International Conference on Parallel Distributed and Grid Computing (PDGC- 2020) |
IEEE |
10 |
Dr. Rinkle Rani |
An optimal Multi-Criteria Decision-Making Framework to select best Multispecialty Hospital for surgery |
IEEE International Conference on Parallel Distributed and Grid Computing (PDGC- 2020) |
IEEE International Conference on Parallel Distributed and Grid Computing (PDGC- 2020) |
IEEE |
11 |
Dr. Geeta Kasana |
Color Image Watermarking In DCT Domain using SVR |
ICSADL 2020 : International Conference on Sentimental Analysis and Deep Learning |
ICSADL 2020 : International Conference on Sentimental Analysis and Deep Learning |
Springer |
12 |
Dr. Harkiran Kaur |
Enhanced Economy Based Smart Parking System Using Machine Learning |
Proceedings of Industry Interactive Innovations in Science, Engineering & Technology (I3SET2K19) |
INTERNATIONAL CONFERENCE ON INDUSTRY INTERACTIVE INNOVATIONS IN SCIENCE, ENGINEERING AND TECHNOLOGY |
SSRN |
13 |
Dr. Varun Srivastava |
A Feature-Based kinship verification technique using convolutional neural network |
International Conference on Data Sciences, Security and Applications |
International Conference on Data Sciences, Security and Applications |
Springer |
14 |
Dr. Gaurav Mishra |
An efficient graph based trust-aware recommendation system |
Machine learning, Image Processing, Network Security and Data Science |
International Conference on Machine learning, Image Processing, Network Security and Data Science (MIND 2020) |
Springer |
15 |
Dr. Shreelekha Pandey |
An Efficient Hybrid Approach for Brain Tumor Detection in MR Images using Hadoop-MapReduce |
Int’l Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) |
Int’l Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) |
IEEE |
16 |
Dr. Neeraj Kumar |
Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical Perspective. |
CCNC 2020: 1-6 |
CCNC |
IEEE |
17 |
Dr. Neeraj Kumar |
UnRest: Underwater Reliable Acoustic Communication for Multimedia Streaming |
GLOBECOM 2020: 1-6 |
GLOBECOM |
IEEE |
18 |
Dr. Neeraj Kumar |
CPNDD: Content Placement Approach in Content Centric Networking. |
ICC 2020: 1-6 |
ICC 2020 |
IEEE |
19 |
Dr. Neeraj Kumar |
Energy Efficient Mode Selection Scheme for Wireless Powered D2D Communications with NOMA Underlaying UAV. |
INFOCOM Workshops 2020: 877-882 |
INFOCOM |
IEEE |
20 |
Dr. Neeraj Kumar |
An Edge-Fog Computing Framework for Cloud of Things in Vehicle to Grid Environment |
WoWMoM 2020: 354-359 |
WoWMoM |
IEEE |
21 |
Dr. Neeraj Kumar |
Energy management scheme for wireless powered D2D users with NOMA underlaying full duplex UAV. |
2nd ACM MobiCom Workshop |
MobiCom Workshop |
ACM |
22 |
Dr. Husanbir Singh Pannu |
Deep learning-based explainable target classification for synthetic aperture radar images |
13th International Conference on Human System Interaction (HSI). IEEE, 2020. Japan |
13th International Conference on Human System Interaction (HSI). IEEE, 2020. Japan |
IEEE |
23 |
Dr. Ashima Anand |
RDWT-SVD-Firefly Based Dual Watermarking Technique for Medical Images (Workshop Paper) |
2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM) |
2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM) |
IEEE |
S.No. |
Name of Paper |
Journal Name |
Authors |
Year |
Impact Factor |
1 |
SANSUNL: A Sanskrit to UNL Enconverter System |
IETE Journal of Research |
Sitender, Bawa S. |
2021 |
1.5 |
2 |
Quantum Programming Language: A Systematic Review of Research Topic and Top Cited Languages |
Archives of Computational Methods in Engineering |
Garhwal S., Ghorani M., Ahmad A. |
2021 |
9.7 |
3 |
Sign Language Recognition Systems: A Decade Systematic Literature Review |
Archives of Computational Methods in Engineering |
Wadhawan A., Kumar P. |
2021 |
9.7 |
4 |
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications |
IEEE Transactions on Network Science and Engineering |
Bhattacharya P., Tanwar S., Bodkhe U., Tyagi S., Kumar N. |
2021 |
6.6 |
5 |
State-of-the-Art Segmentation Techniques and Future Directions for Multiple Sclerosis Brain Lesions |
Archives of Computational Methods in Engineering |
Kaur A., Kaur L., Singh A. |
2021 |
9.7 |
6 |
Network Analysis as a Computational Technique and Its Benefaction for Predictive Analysis of Healthcare Data: A Systematic Review |
Archives of Computational Methods in Engineering |
Toor R., Chana I. |
2021 |
9.7 |
7 |
A Systematic Review of Hidden Markov Models and Their Applications |
Archives of Computational Methods in Engineering |
Mor B., Garhwal S., Kumar A. |
2021 |
9.7 |
8 |
CoMHisP: A Novel Feature Extractor for Histopathological Image Classification Based on Fuzzy SVM with Within-Class Relative Density |
IEEE Transactions on Fuzzy Systems |
Kumar A., Singh S.K., Saxena S., Singh A.K., Shrivastava S., Lakshmanan K., Kumar N., Singh R.K. |
2021 |
11.9 |
9 |
Improving neural machine translation for low-resource Indian languages using rule-based feature extraction |
Neural Computing and Applications |
Singh M., Kumar R., Chana I. |
2021 |
6 |
10 |
Machine Translation Systems for Indian Languages: Review of Modelling Techniques, Challenges, Open Issues and Future Research Directions |
Archives of Computational Methods in Engineering |
Singh M., Kumar R., Chana I. |
2021 |
9.7 |
11 |
Compound TCP Performance for Industry 4.0 WiFi: A Cognitive Federated Learning Approach |
IEEE Transactions on Industrial Informatics |
Pokhrel S.R., Singh S. |
2021 |
12.3 |
12 |
A Sanskrit-to-English machine translation using hybridization of direct and rule-based approach |
Neural Computing and Applications |
Sitender, Bawa S. |
2021 |
6 |
13 |
Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors |
Visual Computer |
Kukreja, S., Kasana, G., Kasana, S.S. |
2021 |
3.5 |
14 |
The Number of Confirmed Cases of Covid-19 by using Machine Learning: Methods and Challenges |
Archives of Computational Methods in Engineering |
Ahmad A., Garhwal S., Ray S.K., Kumar G., Malebary S.J., Barukab O.M. |
2021 |
9.7 |
15 |
Online handwriting recognition systems for Indic and non-Indic scripts: a review |
Artificial Intelligence Review |
Singh H., Sharma R.K., Singh V.P. |
2021 |
12 |
16 |
Real-time cheating immune secret sharing for remote sensing images |
Journal of Real-Time Image Processing |
Shivani S., Patel S.C., Arora V., Sharma B., Jolfaei A., Srivastava G. |
2021 |
3 |
17 |
Cuckoo inspired stacking ensemble framework for content-based cybercrime detection in online social networks |
Transactions on Emerging Telecommunications Technologies |
Singh A., Kaur M. |
2021 |
3.6 |
18 |
SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks |
Transactions on Emerging Telecommunications Technologies |
Bhardwaj V., Kaur N., Vashisht S., Jain S. |
2021 |
3.6 |
19 |
Blockchain-Based Massive Data Dissemination Handling in IIoT Environment |
IEEE Network |
Kumari A., Tanwar S., Tyagi S., Kumar N. |
2021 |
9.3 |
20 |
A Blockchain-Based Proxy Re-Encryption with Equality Test for Vehicular Communication Systems |
IEEE Transactions on Network Science and Engineering |
Chen B., He D., Kumar N., Wang H., Choo K.-K.R. |
2021 |
6.6 |
21 |
Image watermarking using soft computing techniques: A comprehensive survey |
Multimedia Tools and Applications |
Singh O.P., Singh A.K., Srivastava G., Kumar N. |
2021 |
3.6 |
22 |
Collaboratively augmented UIP – Filtered RIP with relevancy mapping for personalization of web search |
Information Sciences |
Goel S., Kumar R. |
2021 |
8.1 |
23 |
A Pre-processing framework for spectral classification of hyperspectral images |
Multimedia Tools and Applications |
Singh, S., Kasana, S.S. |
2021 |
3.6 |
24 |
A Probabilistic Data Structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles |
IEEE Transactions on Intelligent Transportation Systems |
Garg S., Singh A., Aujla G.S., Kaur S., Batra S., Kumar N. |
2021 |
8.5 |
25 |
An ensemble approach to outlier detection using some conventional clustering algorithms |
Multimedia Tools and Applications |
Saha A., Chatterjee A., Ghosh S., Kumar N., Sarkar R. |
2021 |
3.6 |
26 |
EEG-Based Pathology Detection for Home Health Monitoring |
IEEE Journal on Selected Areas in Communications |
Muhammad G., Hossain M.S., Kumar N. |
2021 |
16.4 |
27 |
Blockchain-Envisioned Softwarized Multi-Swarming UAVs to Tackle COVID-I9 Situations |
IEEE Network |
Gupta R., Kumari A., Tanwar S., Kumar N. |
2021 |
9.3 |
28 |
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges |
Peer-to-Peer Networking and Applications |
Khatri S., Vachhani H., Shah S., Bhatia J., Chaturvedi M., Tanwar S., Kumar N. |
2021 |
4.2 |
29 |
URJA: Usage Jammer as a Resource Allocation for Secure Transmission in a CR-NOMA-Based 5G Femtocell System |
IEEE Systems Journal |
Budhiraja I., Kumar N., Tyagi S., Tanwar S., Obaidat M.S. |
2021 |
4.4 |
30 |
Behavioral reasoning theory (BRT) perspectives on E-waste recycling and management |
Journal of Cleaner Production |
Dhir A., Koshta N., Goyal R.K., Sakashita M., Almotairi M. |
2021 |
11.1 |
31 |
Convolutional neural network–bagged decision tree: a hybrid approach to reduce electric vehicle’s driver’s range anxiety by estimating energy consumption in real-time |
Soft Computing |
Modi S., Bhattacharya J., Basak P. |
2021 |
4.1 |
32 |
Effect of COVID-19 outbreak on urban health and environment |
Air Quality, Atmosphere and Health |
Girdhar A., Kapur H., Kumar V., Kaur M., Singh D., Damasevicius R. |
2021 |
5.1 |
33 |
A comprehensive survey on passive techniques for digital video forgery detection |
Multimedia Tools and Applications |
Shelke, N.A., Kasana, S.S. |
2021 |
3.6 |
34 |
Topic modeling combined with classification technique for extractive multi-document text summarization |
Soft Computing |
Roul R.K. |
2021 |
4.1 |
35 |
An enhanced reversible patient data hiding algorithm for E-healthcare |
Biomedical Signal Processing and Control |
Bhardwaj R. |
2021 |
5.1 |
36 |
Diagnosis of Parkinson’s disease using deep CNN with transfer learning and data augmentation |
Multimedia Tools and Applications |
Kaur S., Aggarwal H., Rani R. |
2021 |
3.6 |
37 |
CTRL –CapTuRedLight: a novel feature descriptor for online Assamese numeral recognition |
Multimedia Tools and Applications |
Ghosh S., Chatterjee A., Sen S., Kumar N., Sarkar R. |
2021 |
3.6 |
38 |
Secrecy Rate Maximization in Virtual-MIMO Enabled SWIPT for 5G Centric IoT Applications |
IEEE Systems Journal |
Jaiswal A., Kumar S., Kaiwartya O., Kumar N., Song H., Lloret J. |
2021 |
4.4 |
39 |
Blockchain-based efficient communication for food supply chain industry: Transparency and traceability analysis for sustainable business |
International Journal of Communication Systems |
Tayal A., Solanki A., Kondal R., Nayyar A., Tanwar S., Kumar N. |
2021 |
2.1 |
40 |
Two-level pruning based ensemble with abstained learners for concept drift in data streams |
Expert Systems |
Goel K., Batra S. |
2021 |
3.3 |
41 |
Security and privacy solutions in edge envisioned connected things environment |
Transactions on Emerging Telecommunications Technologies |
Aujla G.S., Kumar N., Sikdar B., Choo K.-K.R. |
2021 |
3.6 |
42 |
Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications |
Journal of Information Security and Applications |
Bhavin M., Tanwar S., Sharma N., Tyagi S., Kumar N. |
2021 |
5.6 |
43 |
Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT |
IEEE Internet of Things Journal |
Vinoth R., Deborah L.J., Vijayakumar P., Kumar N. |
2021 |
10.6 |
44 |
S-shaped versus V-shaped transfer functions for binary Manta ray foraging optimization in feature selection problem |
Neural Computing and Applications |
Ghosh K.K., Guha R., Bera S.K., Kumar N., Sarkar R. |
2021 |
6 |
45 |
An intelligent energy efficient storage system for cloud based big data applications |
Simulation Modelling Practice and Theory |
Arora S., Bala A. |
2021 |
4.2 |
46 |
A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System through UAV Speed Control |
IEEE Transactions on Intelligent Transportation Systems |
Li X., Tan J., Liu A., Vijayakumar P., Kumar N., Alazab M. |
2021 |
8.5 |
47 |
Federated Learning Meets Human Emotions: A Decentralized Framework for Human-Computer Interaction for IoT Applications |
IEEE Internet of Things Journal |
Chhikara P., Singh P., Tekchandani R., Kumar N., Guizani M. |
2021 |
10.6 |
48 |
Blockchain for Diamond Industry: Opportunities and Challenges |
IEEE Internet of Things Journal |
Thakker U., Patel R., Tanwar S., Kumar N., Song H. |
2021 |
10.6 |
49 |
ξboost: An AI-Based Data Analytics Scheme for COVID-19 Prediction and Economy Boosting |
IEEE Internet of Things Journal |
Vekaria D., Kumari A., Tanwar S., Kumar N. |
2021 |
10.6 |
50 |
Understanding research trends in android malware research using information modelling techniques |
Computers, Materials and Continua |
Singh J., Gera T., Ali F., Thakur D., Singh K., Kwak K.-S. |
2021 |
3.1 |
51 |
An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices |
IEEE Internet of Things Journal |
Chhikara P., Tekchandani R., Kumar N., Obaidat M.S. |
2021 |
10.6 |
52 |
Fe-TiO2 composite beads driven hybrid process of photocatalysis and photo-Fenton for the degradation of isoproturon |
Comptes Rendus Chimie |
Talwar S., Shandil A., Verma A.K., Basu S., Garhwal S. |
2021 |
1.6 |
53 |
SWIPT-Enabled D2D Communication Underlaying NOMA-Based Cellular Networks in Imperfect CSI |
IEEE Transactions on Vehicular Technology |
Budhiraja I., Kumar N., Tyagi S., Tanwar S., Guizani M. |
2021 |
6.8 |
54 |
A detailed introduction of different beamforming techniques used in 5G |
International Journal of Communication Systems |
Bindle A., Gulati T., Kumar N. |
2021 |
2.1 |
55 |
Improved search space shrinking for medical image retrieval using capsule architecture and decision fusion |
Expert Systems with Applications |
Bhattacharya J., Bhatia T., Pannu H.S. |
2021 |
8.5 |
56 |
CDP-UA: Cognitive Data Processing Method Wearable Sensor Data Uncertainty Analysis in the Internet of Things Assisted Smart Medical Healthcare Systems |
IEEE Journal of Biomedical and Health Informatics |
Manogaran G., Alazab M., Song H., Kumar N. |
2021 |
7.7 |
57 |
Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems |
IEEE Sensors Journal |
Vangala A., Bera B., Saha S., Das A.K., Kumar N., Park Y. |
2021 |
4.3 |
58 |
Deep-Reinforcement-Learning-Based Proportional Fair Scheduling Control Scheme for Underlay D2D Communication |
IEEE Internet of Things Journal |
Budhiraja I., Kumar N., Tyagi S. |
2021 |
10.6 |
59 |
Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyond |
IEEE Network |
Sood K., Karmakar K.K., Varadharajen V., Kumar N., Xiang Y., Yu S. |
2021 |
9.3 |
60 |
BIoTHR: Electronic Health Record Servicing Scheme in IoT-Blockchain Ecosystem |
IEEE Internet of Things Journal |
Ray P.P., Chowhan B., Kumar N., Almogren A. |
2021 |
10.6 |
61 |
Fuzzy Detection System for Rumors through Explainable Adaptive Learning |
IEEE Transactions on Fuzzy Systems |
Guo Z., Yu K., Jolfaei A., Bashir A.K., Almagrabi A.O., Kumar N. |
2021 |
11.9 |
62 |
HeDI: Healthcare Device Interoperability for IoT-Based e-Health Platforms |
IEEE Internet of Things Journal |
Pathak N., Misra S., Mukherjee A., Kumar N. |
2021 |
10.6 |
63 |
OPSA: an optimized prediction based scheduling approach for scientific applications in cloud environment |
Cluster Computing |
Kaur G., Bala A. |
2021 |
4.4 |
64 |
A Systematic Review of Applications of Machine Learning in Cancer Prediction and Diagnosis |
Archives of Computational Methods in Engineering |
Sharma A., Rani R. |
2021 |
9.7 |
65 |
MIMVOGUE: modeling Indian music using a variable order gapped HMM |
Multimedia Tools and Applications |
Mor B., Garhwal S., Kumar A. |
2021 |
3.6 |
66 |
Quote examiner: verifying quoted images using web-based text similarity |
Multimedia Tools and Applications |
Banerjee S., Kaur S., Kumar P. |
2021 |
3.6 |
67 |
Computational Techniques and Tools for Omics Data Analysis: State-of-the-Art, Challenges, and Future Directions |
Archives of Computational Methods in Engineering |
Kaur P., Singh A., Chana I. |
2021 |
9.7 |
68 |
Green computing in IoT: Time slotted simultaneous wireless information and power transfer |
Computer Communications |
Jaiswal A., Kumar S., Kaiwartya O., Prasad M., Kumar N., Song H. |
2021 |
6 |
69 |
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles |
IEEE Transactions on Dependable and Secure Computing |
Gulati A., Aujla G.S., Chaudhary R., Kumar N., Obaidat M.S., Benslimane A. |
2021 |
7.3 |
70 |
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review |
Computer Communications |
Ray P.P., Kumar N. |
2021 |
6 |
71 |
Blockchain-based scheme for the mobile number portability |
Journal of Information Security and Applications |
Shah J., Agarwal S., Shukla A., Tanwar S., Tyagi S., Kumar N. |
2021 |
5.6 |
72 |
Blockchain-assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges |
IET Communications |
Gupta R., Nair A., Tanwar S., Kumar N. |
2021 |
1.6 |
73 |
Chaotic sequence and opposition learning guided approach for data clustering |
Pattern Analysis and Applications |
Singh T., Saxena N. |
2021 |
3.9 |
74 |
Joint optimization of service chain caching and task offloading in mobile edge computing |
Applied Soft Computing |
Peng K., Nie J., Kumar N., Cai C., Kang J., Xiong Z., Zhang Y. |
2021 |
8.7 |
75 |
Storage as a service in Fog computing: A systematic review |
Journal of Systems Architecture |
Rani R., Kumar N., Khurana M., Kumar A., Barnawi A. |
2021 |
4.5 |
76 |
Twitter for disaster relief through sentiment analysis for COVID-19 and natural hazard crises |
International Journal of Disaster Risk Reduction |
Behl S., Rao A., Aggarwal S., Chadha S., Pannu H.S. |
2021 |
5 |
77 |
An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks |
IEEE Transactions on Vehicular Technology |
Khan M.A., Ullah I., Kumar N., Oubbati O.S., Qureshi I.M., Noor F., Ullah Khanzada F. |
2021 |
6.8 |
78 |
Ensemble Technique for Toxicity Prediction of Small Drug Molecules of the Antioxidant Response Element Signalling Pathway |
Computer Journal |
Gupta V.K., Rana P.S. |
2021 |
1.4 |
79 |
SCBS: A Short Certificate-Based Signature Scheme with Efficient Aggregation for Industrial-Internet-of-Things Environment |
IEEE Internet of Things Journal |
Verma G.K., Kumar N., Gope P., Singh B.B., Singh H. |
2021 |
10.6 |
80 |
Backscatter-Enabled Efficient V2X Communication with Non-Orthogonal Multiple Access |
IEEE Transactions on Vehicular Technology |
Khan W.U., Jameel F., Kumar N., Jantti R., Guizani M. |
2021 |
6.8 |
81 |
A Survey on IoT Big Data: Current Status, 13 V's Challenges, and Future Directions |
ACM Computing Surveys |
Bansal M., Chana I., Clarke S. |
2021 |
16.6 |
82 |
An intrusion detection system using optimized deep neural network architecture |
Transactions on Emerging Telecommunications Technologies |
Ramaiah M., Chandrasekaran V., Ravi V., Kumar N. |
2021 |
3.6 |
83 |
A Blockchain and Edge-Computing-Based Secure Framework for Government Tender Allocation |
IEEE Internet of Things Journal |
Hassija V., Chamola V., Krishna D.N.G., Kumar N., Guizani M. |
2021 |
10.6 |
84 |
Recognition of online handwritten Gurmukhi characters using recurrent neural network classifier |
Soft Computing |
Singh H., Sharma R.K., Singh V.P., Kumar M. |
2021 |
4.1 |
85 |
EDL-COVID: Ensemble Deep Learning for COVID-19 Case Detection from Chest X-Ray Images |
IEEE Transactions on Industrial Informatics |
Tang S., Wang C., Nie J., Kumar N., Zhang Y., Xiong Z., Barnawi A. |
2021 |
12.3 |
86 |
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges |
IEEE Access |
Jayalaxmi P., Saha R., Kumar G., Kumar N., Kim T.-H. |
2021 |
3.9 |
87 |
Comparative analysis on cross-modal information retrieval: A review |
Computer Science Review |
Kaur P., Pannu H.S., Malhi A.K. |
2021 |
12.9 |
88 |
Gait recognition based on vision systems: A systematic survey |
Journal of Visual Communication and Image Representation |
Kumar M., Singh N., Kumar R., Goel S., Kumar K. |
2021 |
2.6 |
89 |
Reconciliation based key exchange schemes using lattices: a review |
Telecommunication Systems |
Dabra V., Bala A., Kumari S. |
2021 |
2.5 |
90 |
LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices |
IEEE Systems Journal |
Dabra V., Bala A., Kumari S. |
2021 |
4.4 |
91 |
Blockchain-Based UAV Path Planning for Healthcare 4.0: Current Challenges and the Way Ahead |
IEEE Network |
Aggarwal S., Kumar N., Alhussein M., Muhammad G. |
2021 |
9.3 |
92 |
Förster resonance energy transfer (FRET) and applications thereof (Anal. Methods (2020) 12 (5532–5550) DOI: 10.1039/D0AY01961E) |
Analytical Methods |
Kaur A., Kaur P., Ahuja S. |
2021 |
3.1 |
93 |
Energy-Delay Tradeoff Scheme for NOMA-Based D2D Groups with WPCNs |
IEEE Systems Journal |
Budhiraja I., Kumar N., Tyagi S. |
2021 |
4.4 |
94 |
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks |
Peer-to-Peer Networking and Applications |
Reebadiya D., Rathod T., Gupta R., Tanwar S., Kumar N. |
2021 |
4.2 |
95 |
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System |
ACM Transactions on Internet Technology |
Peng C., He D., Chen J., Kumar N., Khan M.K. |
2021 |
5.3 |
96 |
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications |
ACM Transactions on Internet Technology |
Peng C., Chen J., Vijayakumar P., Kumar N., He D. |
2021 |
5.3 |
97 |
Stamantic clustering: Combining statistical and semantic features for clustering of large text datasets |
Expert Systems with Applications |
Mehta V., Bawa S., Singh J. |
2021 |
8.5 |
98 |
Road Centerline Extraction From VHR Images Using SVM and Multi-Scale Maximum Response Filter |
Journal of the Indian Society of Remote Sensing |
Soni P.K., Rajpal N., Mehta R. |
2021 |
2.5 |
99 |
An empiric analysis of wavelet-based feature extraction on deep learning and machine learning algorithms for arrhythmia classification |
International Journal of Interactive Multimedia and Artificial Intelligence |
Singh R., Rajpal N., Mehta R. |
2021 |
3.6 |
100 |
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones |
IEEE Systems Journal |
Hussain S., Chaudhry S.A., Alomari O.A., Alsharif M.H., Khan M.K., Kumar N. |
2021 |
4.4 |
101 |
An enhanced energy proficient clustering (EEPC) algorithm for relay selection in heterogeneous WSNs |
Ad Hoc Networks |
Guleria K., Verma A.K., Goyal N., Sharma A.K., Benslimane A., Singh A. |
2021 |
4.8 |
102 |
An Energy-Efficient Cache Localization Technique for D2D Communication in IoT Environment |
IEEE Internet of Things Journal |
Prerna D., Tekchandani R., Kumar N., Tanwar S. |
2021 |
10.6 |
103 |
Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment |
IEEE Transactions on Industrial Informatics |
Zheng W., Lai C.-F., He D., Kumar N., Chen B. |
2021 |
12.3 |
104 |
DCNN-GA: A Deep Neural Net Architecture for Navigation of UAV in Indoor Environment |
IEEE Internet of Things Journal |
Chhikara P., Tekchandani R., Kumar N., Chamola V., Guizani M. |
2021 |
10.6 |
105 |
Post-processing algorithms for the formation of online handwritten Gurmukhi character/akshara |
Journal of Intelligent and Fuzzy Systems |
Singh H., Sharma R.K., Malarvel M. |
2021 |
2 |
106 |
A minimization algorithm for fuzzy top-down tree automata over lattices |
Journal of Intelligent and Fuzzy Systems |
Ghorani M., Garhwal S. |
2021 |
2 |
107 |
Cloud computing-based framework for breast cancer diagnosis using extreme learning machine |
Diagnostics |
Lahoura V., Singh H., Aggarwal A., Sharma B., Mohammed M.A., Damaševičius R., Kadry S., Cengiz K. |
2021 |
3.6 |
108 |
Green Computing in Software Defined Social Internet of Vehicles |
IEEE Transactions on Intelligent Transportation Systems |
Kumar N., Chaudhry R., Kaiwartya O., Kumar N., Ahmed S.H. |
2021 |
8.5 |
109 |
Blockchain for decentralized multi-drone to combat COVID-19 and future pandemics: Framework and proposed solutions |
Transactions on Emerging Telecommunications Technologies |
Alsamhi S.H., Lee B., Guizani M., Kumar N., Qiao Y., Liu X. |
2021 |
3.6 |
110 |
BLWN: Blockchain-Based Lightweight Simplified Payment Verification in IoT-Assisted e-Healthcare |
IEEE Systems Journal |
Ray P.P., Kumar N., Dash D. |
2021 |
4.4 |
111 |
Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases |
IEEE Systems Journal |
Ray P.P., Dash D., Salah K., Kumar N. |
2021 |
4.4 |
112 |
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks with IoT Notion |
IEEE Systems Journal |
Wu F., Li X., Xu L., Vijayakumar P., Kumar N. |
2021 |
4.4 |
113 |
Mitigating the impact of adversarial attacks in very deep networks |
Applied Soft Computing |
Hassanin M., Radwan I., Moustafa N., Tahtali M., Kumar N. |
2021 |
8.7 |
114 |
Resource-Ability Assisted Service Function Chain Embedding and Scheduling for 6G Networks with Virtualization |
IEEE Transactions on Vehicular Technology |
Cao H., Du J., Zhao H., Luo D.X., Kumar N., Yang L., Yu F.R. |
2021 |
6.8 |
115 |
S. I: hybridization of neural computing with nature-inspired algorithms |
Neural Computing and Applications |
Pandey H.M., Bessis N., Kumar N., Chaudhary A. |
2021 |
6 |
116 |
Indian Sign Language Generation System |
Computer |
Sugandhi, Kumar P., Kaur S. |
2021 |
2.2 |
117 |
NHCDRA: a non-uniform hierarchical clustering with dynamic route adjustment for mobile sink based heterogeneous wireless sensor networks |
Wireless Networks |
Jain S.K., Venkatadari M., Shrivastava N., Jain S., Verma R.K. |
2021 |
3 |
118 |
EDVWDD: Event-Driven Virtual Wheel-based Data Dissemination for Mobile Sink-Enabled Wireless Sensor Networks |
Journal of Supercomputing |
Jain S., Pattanaik K.K., Verma R.K., Shukla A. |
2021 |
3.3 |
119 |
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs |
IEEE Internet of Things Journal |
Wang C., Huang R., Shen J., Liu J., Vijayakumar P., Kumar N. |
2021 |
10.6 |
120 |
Quantum learning-enabled green communication for next-generation wireless systems |
IEEE Transactions on Green Communications and Networking |
Jaiswal A., Kumar S., Kaiwartya O., Kashyap P.K., Kanjo E., Kumar N., Song H. |
2021 |
4.8 |
121 |
Blockchain-envisioned UAV communication using 6G networks: Open issues, use cases, and future directions |
IEEE Internet of Things Journal |
Aggarwal S., Kumar N., Tanwar S. |
2021 |
10.6 |
122 |
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications |
IEEE Transactions on Industrial Informatics |
Wazid M., Das A.K., Kumar N., Alazab M. |
2021 |
12.3 |
123 |
Privacy-preserving implicit authentication protocol using cosine similarity for internet of things |
IEEE Internet of Things Journal |
Wei F., Vijayakumar P., Kumar N., Zhang R., Cheng Q. |
2021 |
10.6 |
124 |
Prediction based task scheduling approach for floodplain application in cloud environment |
Computing |
Kaur G., Bala A. |
2021 |
3.7 |
125 |
Auto-scaling techniques for IoT-based cloud applications: a review |
Cluster Computing |
Verma S., Bala A. |
2021 |
4.4 |
126 |
Correction to: EDVWDD: Event‑Driven Virtual Wheel‑based Data Dissemination for Mobile Sink‑Enabled Wireless Sensor Networks (The Journal of Supercomputing, (2021), 77, 10, (11432-11457), 10.1007/s11227-021-03714-7) |
Journal of Supercomputing |
Jain S., Pattanaik K.K., Verma R.K., Shukla A. |
2021 |
3.3 |
127 |
Security preservation in industrial medical CPS using Chebyshev map: An AI approach |
Future Generation Computer Systems |
Qi R., Ji S., Shen J., Vijayakumar P., Kumar N. |
2021 |
7.5 |
128 |
Blockchain-Envisioned Trusted Random Oracles for IoT-Enabled Probabilistic Smart Contracts |
IEEE Internet of Things Journal |
Patel N.S., Bhattacharya P., Patel S.B., Tanwar S., Kumar N., Song H. |
2021 |
10.6 |
129 |
Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications |
IEEE Transactions on Industrial Informatics |
Abdel-Basset M., Mohamed R., Elhoseny M., Bashir A.K., Jolfaei A., Kumar N. |
2021 |
12.3 |
130 |
An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function |
IEEE Transactions on Smart Grid |
Badar H.M.S., Qadri S., Shamshad S., Ayub M.F., Mahmood K., Kumar N. |
2021 |
9.6 |
131 |
PFIN: An Efficient Particle Filter-Based Indoor Navigation Framework for UAVs |
IEEE Transactions on Vehicular Technology |
Raja G., Suresh S., Anbalagan S., Ganapathisubramaniyan A., Kumar N. |
2021 |
6.8 |
132 |
Federated Learning and Autonomous UAVs for Hazardous Zone Detection and AQI Prediction in IoT Environment |
IEEE Internet of Things Journal |
Chhikara P., Tekchandani R., Kumar N., Guizani M., Hassan M.M. |
2021 |
10.6 |
133 |
Deep neural network hyper-parameter tuning through twofold genetic approach |
Soft Computing |
Kumar P., Batra S., Raman B. |
2021 |
4.1 |
134 |
A fusion framework based on cepstral domain features from phonocardiogram to predict heart health status |
Journal of Mechanics in Medicine and Biology |
Arora S., Jain S., Chana I. |
2021 |
0.8 |
135 |
State-of-the-Art Survey of Quantum Cryptography |
Archives of Computational Methods in Engineering |
Kumar A., Garhwal S. |
2021 |
9.7 |
136 |
Blockchain-based royalty contract transactions scheme for Industry 4.0 supply-chain management |
Information Processing and Management |
Mehta D., Tanwar S., Bodkhe U., Shukla A., Kumar N. |
2021 |
8.6 |
137 |
Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI |
Journal of Information Security and Applications |
Gupta R., Tanwar S., Kumar N. |
2021 |
5.6 |
138 |
GCMD: Genetic Correlation Multi-Domain Virtual Network Embedding Algorithm |
IEEE Access |
Zhang P., Pang X., Kibalya G., Kumar N., He S., Zhao B. |
2021 |
3.9 |
139 |
Efficient Fruit Grading System Using Spectrophotometry and Machine Learning Approaches |
IEEE Sensors Journal |
Chopra H., Singh H., Bamrah M.S., Mahbubani F., Verma A., Hooda N., Rana P.S., Singla R.K., Singh A.K. |
2021 |
4.3 |
140 |
Early Collision Detection for Massive Random Access in Satellite-Based Internet of Things |
IEEE Transactions on Vehicular Technology |
Zhen L., Zhang Y., Yu K., Kumar N., Barnawi A., Xie Y. |
2021 |
6.8 |
141 |
An improved separable reversible patient data hiding algorithm for E-healthcare |
Multimedia Tools and Applications |
Bhardwaj R. |
2021 |
3.6 |
142 |
A high payload reversible data hiding algorithm for homomorphic encrypted absolute moment block truncation coding compressed images |
Multimedia Tools and Applications |
Bhardwaj R. |
2021 |
3.6 |
143 |
Machine learning based framework for classification of children with adhd and healthy controls |
Intelligent Automation and Soft Computing |
Parashar A., Kalra N., Singh J., Goyal R.K. |
2021 |
2 |
144 |
Blockchain and 5G integrated softwarized UAV network management: Architecture, solutions, and challenges |
Physical Communication |
Gupta R., Tanwar S., Kumar N. |
2021 |
2.2 |
145 |
An Energy-Efficient Modified Metaheuristic Inspired Algorithm for Disaster Management System Using WSNs |
IEEE Sensors Journal |
Singh S., Nandan A.S., Malik A., Kumar N., Barnawi A. |
2021 |
4.3 |
146 |
A hybrid weighted fuzzy approach for brain tumor segmentation using MR images |
Neural Computing and Applications |
Chahal P.K., Pandey S. |
2021 |
6 |
147 |
Blockchain-based framework for secured storage, sharing, and querying of electronic healthcare records |
Concurrency and Computation: Practice and Experience |
Kaur J., Rani R., Kalra N. |
2021 |
2 |
148 |
An Adaptive Fuzzy-Based Clustering and Bio-Inspired Energy Efficient Hierarchical Routing Protocol for Wireless Sensor Networks |
Wireless Personal Communications |
Saxena S., Mehta D. |
2021 |
2.2 |
149 |
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles |
IEEE Transactions on Intelligent Transportation Systems |
Wei F., Zeadally S., Vijayakumar P., Kumar N., He D. |
2021 |
8.5 |
150 |
A systematic review on task scheduling in Fog computing: Taxonomy, tools, challenges, and future directions |
Concurrency and Computation: Practice and Experience |
Kaur N., Kumar A., Kumar R. |
2021 |
2 |
151 |
Artificial intelligence-enabled Internet of Things-based system for COVID-19 screening using aerial thermal imaging |
Future Generation Computer Systems |
Barnawi A., Chhikara P., Tekchandani R., Kumar N., Alzahrani B. |
2021 |
7.5 |
152 |
Energy Consumption Minimization Scheme for NOMA-Based Mobile Edge Computation Networks Underlaying UAV |
IEEE Systems Journal |
Budhiraja I., Kumar N., Tyagi S., Tanwar S. |
2021 |
4.4 |
153 |
A Systematic Review on NOMA Variants for 5G and beyond |
IEEE Access |
Budhiraja I., Kumar N., Tyagi S., Tanwar S., Han Z., Piran M.J., Suh D.Y. |
2021 |
3.9 |
154 |
GA-UNet: UNet-based framework for segmentation of 2D and 3D medical images applicable on heterogeneous datasets |
Neural Computing and Applications |
Kaur A., Kaur L., Singh A. |
2021 |
6 |
155 |
Routing protocols & unmanned aerial vehicles autonomous localization in flying networks |
International Journal of Communication Systems |
Khan I.U., Shah S.B.H., Wang L., Aziz M.A., Stephan T., Kumar N. |
2021 |
2.1 |
156 |
Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications |
IEEE Internet of Things Journal |
Guo Z., Shen Y., Bashir A.K., Imran M., Kumar N., Zhang D., Yu K. |
2021 |
10.6 |
157 |
Data clustering using moth-flame optimization algorithm |
Sensors |
Singh T., Saxena N., Khurana M., Singh D., Abdalla M., Alshazly H. |
2021 |
3.9 |
158 |
FedDPGAN: Federated Differentially Private Generative Adversarial Networks Framework for the Detection of COVID-19 Pneumonia |
Information Systems Frontiers |
Zhang L., Shen B., Barnawi A., Xi S., Kumar N., Wu Y. |
2021 |
5.9 |
159 |
Automated DDOS attack detection in software defined networking |
Journal of Network and Computer Applications |
Ahuja N., Singal G., Mukhopadhyay D., Kumar N. |
2021 |
8.7 |
160 |
Fuzzy Logic in Surveillance Big Video Data Analysis |
ACM Computing Surveys |
Muhammad K., Obaidat M.S., Hussain T., Ser J.D., Kumar N., Tanveer M., Doctor F. |
2021 |
16.6 |
161 |
An optimized Generative Adversarial Network based continuous sign language classification |
Expert Systems with Applications |
Elakkiya R., Vijayakumar P., Kumar N. |
2021 |
8.5 |
162 |
Transfer learning-based approach for detecting COVID-19 ailment in lung CT scan |
Computers in Biology and Medicine |
Arora V., Ng E.Y.-K., Leekha R.S., Darshan M., Singh A. |
2021 |
7.7 |
163 |
Load-based node ranked low-energy adaptive clustering hierarchy: An enhanced energy-efficient algorithm for cluster head selection in wireless sensor networks |
Concurrency and Computation: Practice and Experience |
Mehta D., Saxena S. |
2021 |
2 |
164 |
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments |
Journal of Information Security and Applications |
Dabra V., Bala A., Kumari S. |
2021 |
5.6 |
165 |
eDiaPredict: An Ensemble-based Framework for Diabetes Prediction |
ACM Transactions on Multimedia Computing, Communications and Applications |
Singh A., Dhillon A., Kumar N., Hossain M.S., Muhammad G., Kumar M. |
2021 |
5.1 |
166 |
PROTECTOR: An optimized deep learning-based framework for image spam detection and prevention |
Future Generation Computer Systems |
Makkar A., Kumar N. |
2021 |
7.5 |
167 |
Deep learning-based bird eye view social distancing monitoring using surveillance video for curbing the COVID-19 spread |
Neural Computing and Applications |
Magoo R., Singh H., Jindal N., Hooda N., Rana P.S. |
2021 |
6 |
168 |
An optimized framework for surgical team selection |
Computers, Materials and Continua |
Petwal H., Rani R. |
2021 |
3.1 |
169 |
Quantum walk and its application domains: A systematic review |
Computer Science Review |
Kadian K., Garhwal S., Kumar A. |
2021 |
12.9 |
170 |
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review |
Computer Communications |
Miglani A., Kumar N. |
2021 |
6 |
171 |
Guest Editorial Introduction to the Special Issue on Deep Learning Models for Safe and Secure Intelligent Transportation Systems |
IEEE Transactions on Intelligent Transportation Systems |
Jolfaei A., Kumar N., Chen M., Kant K. |
2021 |
8.5 |
172 |
Driving Style Recognition System Using Smartphone Sensors Based on Fuzzy Logic |
Computers, Materials and Continua |
Kalra N., Goyal R.K., Parashar A., Singh J., Singla G. |
2021 |
3.1 |
173 |
Cross-layer interference management scheme for d2d mobile users using noma |
IEEE Systems Journal |
Budhiraja I., Kumar N., Tyagi S. |
2021 |
4.4 |
174 |
Estimation of minimum color channel using difference channel in single image Dehazing |
Multimedia Tools and Applications |
Raikwar S.C., Tapaswi S. |
2021 |
3.6 |
175 |
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments |
IEEE Systems Journal |
Gupta D.S., Islam S.K.H., Obaidat M.S., Vijayakumar P., Kumar N., Park Y. |
2021 |
4.4 |
176 |
An efficient reversible and secure patient data hiding algorithm for E-healthcare |
Multimedia Tools and Applications |
Bhardwaj R., Singh A. |
2021 |
3.6 |
177 |
An Anonymous Certificateless Signcryption Scheme for Internet of Health Things |
IEEE Access |
Ullah I., Alkhalifah A., Rehman S.U., Kumar N., Khan M.A. |
2021 |
3.9 |
178 |
Improved recognition results of offline handwritten Gurumukhi characters using hybrid features and adaptive boosting |
Soft Computing |
Kumar M., Jindal M.K., Sharma R.K., Jindal S.R., Singh H. |
2021 |
4.1 |
179 |
A CNN-based scheme for COVID-19 detection with emergency services provisions using an optimal path planning |
Multimedia Systems |
Barnawi A., Chhikara P., Tekchandani R., Kumar N., Boulares M. |
2021 |
3.9 |
180 |
A Survey on LTE/LTE-A Radio Resource Allocation Techniques for Machine-to-Machine Communication for B5G Networks |
IEEE Access |
Singh U., Dua A., Tanwar S., Kumar N., Alazab M. |
2021 |
3.9 |
181 |
An energy efficient scheme for wpcn-noma based device-to-device communication |
IEEE Transactions on Vehicular Technology |
Budhiraja I., Kumar N., Tyagi S., Tanwar S., Han Z. |
2021 |
6.8 |
182 |
Neural Style Palette: A Multimodal and Interactive Style Transfer from a Single Style Image |
IEEE Transactions on Multimedia |
Virtusio J.J., Ople J.J.M., Tan D.S., Tanveer M., Kumar N., Hua K.-L. |
2021 |
7.3 |
183 |
Security Enhanced Sentence Similarity Computing Model Based on Convolutional Neural Network |
IEEE Access |
Sun Q., Huang X., Kibalya G., Kumar N., Kumar S.V.N.S., Zhang P., Xie D. |
2021 |
3.9 |
184 |
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment |
ACM Transactions on Internet Technology |
Chaudhry S.A., Irshad A., Yahya K., Kumar N., Alazab M., Zikria Y.B. |
2021 |
5.3 |
185 |
ALPHA: An Anonymous Orthogonal Code-Based Privacy Preserving Scheme for Industrial Cyber-Physical Systems |
IEEE Transactions on Industrial Informatics |
Ali W., Din I.U., Almogren A., Kumar N. |
2021 |
12.3 |
186 |
A comprehensive review on blockchain and Internet of Things in healthcare |
Transactions on Emerging Telecommunications Technologies |
Sharma A., Kaur S., Singh M. |
2021 |
3.6 |
187 |
An Efficient Blockchain-Based Authentication Scheme for Energy-Trading in V2G Networks |
IEEE Transactions on Industrial Informatics |
Aggarwal S., Kumar N., Gope P. |
2021 |
12.3 |
188 |
Securing Internet of Drones with Identity-Based Proxy Signcryption |
IEEE Access |
Khan M.A., Shah H., Rehman S.U., Kumar N., Ghazali R., Shehzad D., Ullah I. |
2021 |
3.9 |
189 |
KiRTi: A Blockchain-Based Credit Recommender System for Financial Institutions |
IEEE Transactions on Network Science and Engineering |
Patel S.B., Bhattacharya P., Tanwar S., Kumar N. |
2021 |
6.6 |
190 |
Big data analytics for energy consumption prediction in smart grid using genetic algorithm and long short term memory |
Computing and Informatics |
Kumari S., Kumar N., Rana P.S. |
2021 |
0.7 |
191 |
Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges |
IEEE Network |
Zhang P., Wang C., Kumar N., Jiang C., Lu Q., Choo K.-K.R., Rodrigues J.J.P.C. |
2021 |
9.3 |
192 |
SDN-Enabled Adaptive Broadcast Timer for Data Dissemination in Vehicular Ad Hoc Networks |
IEEE Transactions on Vehicular Technology |
Bhatia J., Dave J., Bhavsar M., Tanwar S., Kumar N. |
2021 |
6.8 |
193 |
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment |
IEEE Transactions on Smart Grid |
Ahmed S., Shamshad S., Ghaffar Z., Mahmood K., Kumar N., Parizi R.M., Choo K.-K.R. |
2021 |
9.6 |
194 |
A Consortium Blockchain-Based Energy Trading for Demand Response Management in Vehicle-to-Grid |
IEEE Transactions on Vehicular Technology |
Aggarwal S., Kumar N. |
2021 |
6.8 |
195 |
Comments on 'Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation' |
IEEE Transactions on Information Forensics and Security |
Peng S., Zhao L., Kumar N. |
2021 |
6.8 |
196 |
Communication-Efficient Offloading for Mobile-Edge Computing in 5G Heterogeneous Networks |
IEEE Internet of Things Journal |
Zhou P., Shen K., Kumar N., Zhang Y., Hassan M.M., Hwang K. |
2021 |
10.6 |
197 |
EnFlow: An Energy-Efficient Fast Flow Forwarding Scheme for Software-Defined Networks |
IEEE Transactions on Intelligent Transportation Systems |
Chaudhary R., Kumar N. |
2021 |
8.5 |
198 |
Hybrid Machine Learning Models for Predicting Types of Human T-cell Lymphotropic Virus |
IEEE/ACM Transactions on Computational Biology and Bioinformatics |
Sharma G., Rana P.S., Bawa S. |
2021 |
4.5 |
199 |
Privacy-Aware Autonomous Valet Parking: Towards Experience Driven Approach |
IEEE Transactions on Intelligent Transportation Systems |
Pokhrel S.R., Qu Y., Nepal S., Singh S. |
2021 |
8.5 |
200 |
Smart Secure Sensing for IoT-Based Agriculture: Blockchain Perspective |
IEEE Sensors Journal |
Vangala A., Das A.K., Kumar N., Alazab M. |
2021 |
4.3 |
201 |
CT image reconstruction using NLMfuzzyCD regularization method |
Current Medical Imaging |
Devi M., Singh S., Tiwari S. |
2021 |
1.4 |
202 |
A review on social spam detection: Challenges, open issues, and future directions |
Expert Systems with Applications |
Rao S., Verma A.K., Bhatia T. |
2021 |
8.5 |
203 |
Security in Next Generation Mobile Payment Systems: A Comprehensive Survey |
IEEE Access |
Ahmed W., Rasool A., Javed A.R., Kumar N., Gadekallu T.R., Jalil Z., Kryvinska N. |
2021 |
3.9 |
204 |
Distance transform based text-line extraction from unconstrained handwritten document images |
Expert Systems with Applications |
Bera S.K., Kundu S., Kumar N., Sarkar R. |
2021 |
8.5 |
205 |
Ensemble learning-based prediction of contentment score using social multimedia in education |
Multimedia Tools and Applications |
Kaur M., Mehta H., Randhawa S., Sharma P.K., Park J.H. |
2021 |
3.6 |
206 |
CASE-CF: Context Aware Smart Epidemic Control Framework |
New Generation Computing |
Gill H.K., Sehgal V.K., Verma A.K. |
2021 |
2.6 |
207 |
Energy and SLA-driven MapReduce Job Scheduling Framework for Cloud-based Cyber-Physical Systems |
ACM Transactions on Internet Technology |
Kaur K., Garg S., Kaddoum G., Kumar N. |
2021 |
5.3 |
208 |
Secure rotation invariant face detection system for authentication |
Computers, Materials and Continua |
Verma A., Baljon M., Mishra S., Kaur I., Saini R., Saxena S., Sharma S.K. |
2021 |
3.1 |
209 |
Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks |
IEEE Transactions on Green Communications and Networking |
Gupta R., Patel M.M., Tanwar S., Kumar N., Zeadally S. |
2021 |
4.8 |
210 |
Breast cancer detection from histopathology images using modified residual neural networks |
Biocybernetics and Biomedical Engineering |
Gupta V., Vasudev M., Doegar A., Sambyal N. |
2021 |
6.4 |
211 |
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things |
ACM Transactions on Internet Technology |
Shahid H., Shah M.A., Almogren A., Khattak H.A., Din I.U., Kumar N., Maple C. |
2021 |
5.3 |
212 |
Screening of COVID-19 Patients Using Deep Learning and IoT Framework |
Computers, Materials and Continua |
Kaushik H., Singh D., Tiwari S., Kaur M., Jeong C.-W., Nam Y., Khan M.A. |
2021 |
3.1 |
213 |
Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram |
Computers, Materials and Continua |
Arora V., Verma K., Leekha R.S., Lee K., Choi C., Gupta T., Bhatia K. |
2021 |
3.1 |
214 |
Bottom-boosting differential evolution based digital image security analysis |
Journal of Information Security and Applications |
Ghai D., Tiwari S., Das N.N. |
2021 |
5.6 |
215 |
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction |
ACM Transactions on Internet Technology |
Wang W., Chen J., Zhang Y., Gong Z., Kumar N., Wei W. |
2021 |
5.3 |
216 |
A deep transfer learning based model for automatic detection of COVID-19 from chest X-rays |
Turkish Journal of Electrical Engineering and Computer Sciences |
Chhikara P., Gupta P., Singh P., Bhatia T. |
2021 |
1.1 |
217 |
Prediction of tool shape in electrical discharge machining of en31 steel using machine learning techniques |
Metals |
Walia A.S., Srivastava V., Rana P.S., Somani N., Gupta N.K., Singh G., Pimenov D.Y., Mikolajczyk T., Khanna N. |
2021 |
2.9 |
218 |
Cancer cell profiling using image moments and neural networks with model agnostic explainability: A case study of breast cancer histopathological (breakhis) database |
Mathematics |
Kaplun D., Krasichkov A., Chetyrbok P., Oleinikov N., Garg A., Pannu H.S. |
2021 |
2.4 |
219 |
Efficient multi-objective differential-evolution-based clustering protocol |
Sadhana - Academy Proceedings in Engineering Sciences |
Joshi U., Kumar R. |
2021 |
1.6 |
220 |
When Blockchain Meets Edge Intelligence: Trusted and Security Solutions for Consumers |
IEEE Network |
Gupta R., Reebadiya D., Tanwar S., Kumar N., Guizani M. |
2021 |
9.3 |
221 |
A Hybrid Deep Reinforcement Learning for Autonomous Vehicles Smart-Platooning |
IEEE Transactions on Vehicular Technology |
Prathiba S.B., Raja G., Dev K., Kumar N., Guizani M. |
2021 |
6.8 |
222 |
SecGreen: Secrecy Ensured Power Optimization Scheme for Software-Defined Connected IoV |
IEEE Transactions on Mobile Computing |
Chaudhary R., Kumar N. |
2021 |
7.9 |
223 |
Vision-based force distribution analysis for object catching |
Journal of Electronic Imaging |
Kansal S. |
2021 |
1.1 |
224 |
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management |
IEEE Transactions on Network and Service Management |
Lutfiyya H., Birke R., Casale G., Dhamdhere A., Hwang J., Inoue T., Kumar N., Puthal D., Zincir-Heywood N. |
2021 |
5.3 |
225 |
Guest Editorial Special Issue on Artificial Intelligence-Based Sensors for Next Generation IoT Applications |
IEEE Sensors Journal |
Sah Tyagi S.K., Wei W., Piuri V., Mukhopadhyay S.C., Striegel A., Elloumi O., Zeadally S., Wang W., Kumar N. |
2021 |
4.3 |
226 |
A novel approach to optimize the production cost of railway coaches of India using situational-based composite triangular and trapezoidal fuzzy LPP models |
Complex and Intelligent Systems |
Kumar R., Dhiman G., Kumar N., Chandrawat R.K., Joshi V., Kaur A. |
2021 |
5.8 |
227 |
Preface |
International Journal of Ad Hoc and Ubiquitous Computing |
Kumar N., Rho S., Alazab M. |
2021 |
0.7 |
228 |
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks |
IEEE Transactions on Intelligent Transportation Systems |
Lin C., He D., Huang X., Kumar N., Choo K.-K.R. |
2021 |
8.5 |
229 |
Design and Development of SODAR Antenna Structure |
Mapan - Journal of Metrology Society of India |
Kumar N., Soni K., Agarwal R. |
2021 |
1 |
230 |
AKN-FGD: Adaptive Kohonen Network based Fine-grained Detection of LDoS Attacks |
IEEE Transactions on Dependable and Secure Computing |
Tang D., Wang X., Li X., Vijayakumar P., Kumar N. |
2021 |
7.3 |
231 |
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios |
IEEE Transactions on Dependable and Secure Computing |
Sood K., Nosouhi M.R., Kumar N., Gaddam A., Feng B., Yu S. |
2021 |
7.3 |
232 |
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data |
IEEE Transactions on Emerging Topics in Computing |
Chen B., Wu L., Kumar N., Choo K.-K.R., He D. |
2021 |
5.9 |
233 |
Guest Editorial: Introduction to the Special Section on Intelligence-Empowered Collaboration among Space, Air, Ground, and Sea Mobile Networks towards B5G |
IEEE Transactions on Network Science and Engineering |
Zhao L., Kumar N., Wu C., Hu J., Al-Dubai A. |
2021 |
6.6 |
234 |
Path Planning for Energy Management of Smart Maritime Electric Vehicles: A Blockchain-Based Solution |
IEEE Transactions on Intelligent Transportation Systems |
Barnawi A., Aggarwal S., Kumar N., Alghazzawi D.M., Alzahrani B., Boulares M. |
2021 |
8.5 |
235 |
An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications[Formula presented] |
Expert Systems with Applications |
Bhardwaj R., Aggarwal A. |
2021 |
8.5 |
236 |
WEClustering: word embeddings based text clustering technique for large datasets |
Complex and Intelligent Systems |
Mehta V., Bawa S., Singh J. |
2021 |
5.8 |
237 |
Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text |
Complex and Intelligent Systems |
Shekhar S., Garg H., Agrawal R., Shivani S., Sharma B. |
2021 |
5.8 |
238 |
Multiple-ensemble methods for prediction of Alzheimer disease |
International Journal of Data Mining and Bioinformatics |
Singh D., Mishra A. |
2021 |
0.3 |
S.No. |
Name of Paper |
Journal Name |
Authors |
Year |
Impact Factor |
1 |
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment |
IEEE Transactions on Dependable and Secure Computing |
Wazid M., Das A.K., Odelu V., Kumar N., Susilo W. |
2020 |
7.3 |
2 |
A graph-based model to improve social trust and influence for social recommendation |
Journal of Supercomputing |
Bathla G., Aggarwal H., Rani R. |
2020 |
3.3 |
3 |
An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem |
Pattern Recognition Letters |
Bhardwaj R., Aggarwal A. |
2020 |
5.1 |
4 |
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities |
Future Generation Computer Systems |
Jindal A., Kumar N., Singh M. |
2020 |
7.5 |
5 |
Cloud Centric Authentication for Wearable Healthcare Monitoring System |
IEEE Transactions on Dependable and Secure Computing |
Jangirala S., Das A.K., Kumar N., Rodrigues J.J.P.C. |
2020 |
7.3 |
6 |
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM |
Future Generation Computer Systems |
Jindal A., Kumar N., Singh M. |
2020 |
7.5 |
7 |
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems |
Future Generation Computer Systems |
Challa S., Das A.K., Gope P., Kumar N., Wu F., Vasilakos A.V. |
2020 |
7.5 |
8 |
Cyber forensics framework for big data analytics in IoT environment using machine learning |
Multimedia Tools and Applications |
Chhabra G.S., Singh V.P., Singh M. |
2020 |
3.6 |
9 |
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things |
IEEE Transactions on Dependable and Secure Computing |
Srinivas J., Das A.K., Wazid M., Kumar N. |
2020 |
7.3 |
10 |
A Comprehensive Review on Image Encryption Techniques |
Archives of Computational Methods in Engineering |
Kaur M., Kumar V. |
2020 |
9.7 |
11 |
Aspect-based sentiment analysis using deep networks and stochastic optimization |
Neural Computing and Applications |
Kumar R., Pannu H.S., Malhi A.K. |
2020 |
6 |
12 |
A Systematic Literature Review on Computational Musicology |
Archives of Computational Methods in Engineering |
Mor B., Garhwal S., Kumar A. |
2020 |
9.7 |
13 |
SP-J48: a novel optimization and machine-learning-based approach for solving complex problems: special application in software engineering for detecting code smells |
Neural Computing and Applications |
Kaur A., Jain S., Goel S. |
2020 |
6 |
14 |
A survey of mono- and multi-lingual character recognition using deep and shallow architectures: indic and non-indic scripts |
Artificial Intelligence Review |
Kaur S., Bawa S., Kumar R. |
2020 |
12 |
15 |
Performance evaluation of classifiers for the recognition of offline handwritten Gurmukhi characters and numerals: a study |
Artificial Intelligence Review |
Kumar M., Jindal M.K., Sharma R.K., Jindal S.R. |
2020 |
12 |
16 |
A comparative review of meta-heuristic approaches to optimize the SLA violation costs for dynamic execution of cloud services |
Soft Computing |
Kumar A., Bawa S. |
2020 |
4.1 |
17 |
MH-CACA: multi-objective harmony search-based coverage aware clustering algorithm in WSNs |
Enterprise Information Systems |
Singh S., Kumar P. |
2020 |
4.4 |
18 |
Efficient content retrieval in fog zone using Nano-Caches |
Concurrency and Computation: Practice and Experience |
Singh S.P., Kumar R., Sharma A. |
2020 |
2 |
19 |
A survey: ICT enabled energy efficiency techniques for big data applications |
Cluster Computing |
Arora S., Bala A. |
2020 |
4.4 |
20 |
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing |
IEEE Systems Journal |
Jia X., He D., Kumar N., Choo K.-K.R. |
2020 |
4.4 |
21 |
Sandpiper optimization algorithm: a novel approach for solving real-life engineering problems |
Applied Intelligence |
Kaur A., Jain S., Goel S. |
2020 |
5.3 |
22 |
A novel voting ensemble model for spatial prediction of landslides using GIS |
International Journal of Remote Sensing |
Sachdeva S., Bhatia T., Verma A.K. |
2020 |
3.4 |
23 |
Efficient data management and control over WSNs using SDN-enabled aerial networks |
International Journal of Communication Systems |
Sayeed M.A., Kumar R., Sharma V. |
2020 |
2.1 |
24 |
Probabilistic data structures for big data analytics: A comprehensive review |
Knowledge-Based Systems |
Singh A., Garg S., Kaur R., Batra S., Kumar N., Zomaya A.Y. |
2020 |
8.8 |
25 |
Estimation of energy consumption of electric vehicles using Deep Convolutional Neural Network to reduce driver's range anxiety |
ISA Transactions |
Modi S., Bhattacharya J., Basak P. |
2020 |
7.3 |
26 |
SoTaRePo: Society-Tag Relationship Protocol based architecture for UIP construction |
Expert Systems with Applications |
Goel S., Kumar R. |
2020 |
8.5 |
27 |
Blockchain data-based cloud data integrity protection mechanism |
Future Generation Computer Systems |
Wei P., Wang D., Zhao Y., Tyagi S.K.S., Kumar N. |
2020 |
7.5 |
28 |
Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges |
Mechanical Systems and Signal Processing |
Mistry I., Tanwar S., Tyagi S., Kumar N. |
2020 |
8.4 |
29 |
Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing |
Concurrency and Computation: Practice and Experience |
Bhatia T., Verma A.K., Sharma G. |
2020 |
2 |
30 |
En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment |
Journal of Parallel and Distributed Computing |
Garg S., Kaur K., Batra S., Aujla G.S., Morgan G., Kumar N., Zomaya A.Y., Ranjan R. |
2020 |
3.8 |
31 |
Phase Space Reconstruction of EEG Signals for Classification of ADHD and Control Adults |
Clinical EEG and Neuroscience |
Kaur, S., Singh, S., Arun, P., Kaur, D., & Bajaj, M. |
2020 |
2 |
32 |
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart home |
Journal of Supercomputing |
Kaur M., Kaur G., Sharma P.K., Jolfaei A., Singh D. |
2020 |
3.3 |
33 |
Detection Framework for Content-Based Cybercrime in Online Social Networks Using Metaheuristic Approach |
Arabian Journal for Science and Engineering |
Singh A., Kaur M. |
2020 |
2.9 |
34 |
A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications |
Future Generation Computer Systems |
Garg S., Kaur K., Batra S., Kaddoum G., Kumar N., Boukerche A. |
2020 |
7.5 |
35 |
Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges |
Computer Communications |
Aggarwal S., Kumar N. |
2020 |
6 |
36 |
Optimizing Fraudulent Firm Prediction Using Ensemble Machine Learning: A Case Study of an External Audit |
Applied Artificial Intelligence |
Hooda N., Bawa S., Rana P.S. |
2020 |
2.8 |
37 |
Trust management in social Internet of Things: A taxonomy, open issues, and challenges |
Computer Communications |
Chahal R.K., Kumar N., Batra S. |
2020 |
6 |
38 |
Automating fake news detection system using multi-level voting model |
Soft Computing |
Kaur S., Kumar P., Kumaraguru P. |
2020 |
4.1 |
39 |
An intelligent optimization-based traffic information acquirement approach to software-defined networking |
Computational Intelligence |
Huo L., Jiang D., Lv Z., Singh S. |
2020 |
2.8 |
40 |
Word sense disambiguation for Punjabi language using deep learning techniques |
Neural Computing and Applications |
Singh V., Kumar P. |
2020 |
6 |
41 |
Security of vehicular ad-hoc networks: A comprehensive survey |
Computers and Security |
Malhi A.K., Batra S., Pannu H.S. |
2020 |
5.6 |
42 |
Writer identification system for pre-segmented offline handwritten Devanagari characters using k-NN and SVM |
Soft Computing |
Dargan S., Kumar M., Garg A., Thakur K. |
2020 |
4.1 |
43 |
Statistical vertical reduction-based data abridging technique for big network traffic dataset |
International Journal of Communication Systems |
Garg S., Singh R., Obaidat M.S., Bhalla V.K., Sharma B. |
2020 |
2.1 |
44 |
Drug sensitivity prediction framework using ensemble and multi-task learning |
International Journal of Machine Learning and Cybernetics |
Sharma A., Rani R. |
2020 |
5.6 |
45 |
Design and exploration of load balancers for fog computing using fuzzy logic |
Simulation Modelling Practice and Theory |
Singh S.P., Sharma A., Kumar R. |
2020 |
4.2 |
46 |
Application of fuzzy-genetic and regularization random forest (FG-RRF): Estimation of crop evapotranspiration (ETc) for maize and wheat crops |
Agricultural Water Management |
Saggi M.K., Jain S. |
2020 |
6.7 |
47 |
Human Arthritis Analysis in Fog Computing Environment Using Bayesian Network Classifier and Thread Protocol |
IEEE Consumer Electronics Magazine |
Tanwar S., Vora J., Kaneriya S., Tyagi S., Kumar N., Sharma V., You I. |
2020 |
4.5 |
48 |
Novel similarity measure-based random forest for fingerprint recognition using dual-tree complex wavelet transform and ring projection |
Modern Physics Letters B |
Kaur H., Kaur G., Pannu H.S. |
2020 |
1.9 |
49 |
Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review |
Computer Communications |
Saharan S., Bawa S., Kumar N. |
2020 |
6 |
50 |
A middleware approach for reliable resource selection on Internet-of-Things |
International Journal of Communication Systems |
Bharti M., Saxena S., Kumar R. |
2020 |
2.1 |
51 |
Intelligent content-based cybercrime detection in online social networks using cuckoo search metaheuristic approach |
Journal of Supercomputing |
Singh A., Kaur M. |
2020 |
3.3 |
52 |
Deep learning-based sign language recognition system for static signs |
Neural Computing and Applications |
Wadhawan A., Kumar P. |
2020 |
6 |
53 |
Semiautomatic Road Extraction Framework Based on Shape Features and LS-SVM from High-Resolution Images |
Journal of the Indian Society of Remote Sensing |
Soni P.K., Rajpal N., Mehta R. |
2020 |
2.5 |
54 |
Improved color attenuation prior based image de-fogging technique |
Multimedia Tools and Applications |
Kansal, I., Kasana, S.S. |
2020 |
3.6 |
55 |
Improvement in prediction of antigenic epitopes using stacked generalisation: An ensemble approach |
IET Systems Biology |
Khanna D., Rana P.S. |
2020 |
2.3 |
56 |
Ensembled machine learning framework for drug sensitivity prediction |
IET Systems Biology |
Sharma A., Rani R. |
2020 |
2.3 |
57 |
Blockchain for Internet of Energy management: Review, solutions, and challenges |
Computer Communications |
Miglani A., Kumar N., Chamola V., Zeadally S. |
2020 |
6 |
58 |
An efficient and provable certificate-based proxy signature scheme for IIoT environment |
Information Sciences |
Verma G.K., Singh B.B., Kumar N., Obaidat M.S., He D., Singh H. |
2020 |
8.1 |
59 |
An Expert Approach for Data Flow Prediction: Case Study of Wireless Sensor Networks |
Wireless Personal Communications |
Sandhu J.K., Verma A.K., Rana P.S. |
2020 |
2.2 |
60 |
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs |
Wireless Personal Communications |
Goyal N., Dave M., Verma A.K. |
2020 |
2.2 |
61 |
Machine learning ensemble for neurological disorders |
Neural Computing and Applications |
Kaur H., Malhi A.K., Pannu H.S. |
2020 |
6 |
62 |
Machine learning based crop water demand forecasting using minimum climatological data |
Multimedia Tools and Applications |
Sidhu R.K., Kumar R., Rana P.S. |
2020 |
3.6 |
63 |
A context sensitive security framework for Enterprise multimedia placement in fog computing environment |
Multimedia Tools and Applications |
Gill H.K., Sehgal V.K., Verma A.K. |
2020 |
3.6 |
64 |
Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding |
Multidimensional Systems and Signal Processing |
Bhardwaj R., Aggarwal A. |
2020 |
2.5 |
65 |
Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem |
IEEE Transactions on Industrial Informatics |
Zomaya A.Y., Kumar N., Rodrigues J.J.P.C., Aujla G.S. |
2020 |
12.3 |
66 |
Secure Real-Time Traffic Data Aggregation with Batch Verification for Vehicular Cloud in VANETs |
IEEE Transactions on Vehicular Technology |
Shen J., Liu D., Chen X., Li J., Kumar N., Vijayakumar P. |
2020 |
6.8 |
67 |
Efficient and Secure Anonymous Authentication with Location Privacy for IoT-Based WBANs |
IEEE Transactions on Industrial Informatics |
Vijayakumar P., Obaidat M.S., Azees M., Islam S.K.H., Kumar N. |
2020 |
12.3 |
68 |
An efficient smart parking pricing system for smart city environment: A machine-learning based approach |
Future Generation Computer Systems |
Saharan S., Kumar N., Bawa S. |
2020 |
7.5 |
69 |
Deep-Learning-Based Small Surface Defect Detection via an Exaggerated Local Variation-Based Generative Adversarial Network |
IEEE Transactions on Industrial Informatics |
Lian J., Jia W., Zareapoor M., Zheng Y., Luo R., Jain D.K., Kumar N. |
2020 |
12.3 |
70 |
Energy Management for Cyber-Physical Cloud Systems |
Future Generation Computer Systems |
Kumar N., Vasilakos A.V., Choo K.-K.R., Yang L.T. |
2020 |
7.5 |
71 |
Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges |
Computer Communications |
Prerna D., Tekchandani R., Kumar N. |
2020 |
6 |
72 |
Software defined solutions for sensors in 6G/IoE |
Computer Communications |
Lv Z., Kumar N. |
2020 |
6 |
73 |
Speaker Classification with Support Vector Machine and Crossover-Based Particle Swarm Optimization |
International Journal of Pattern Recognition and Artificial Intelligence |
Kaur R., Sharma R.K., Kumar P. |
2020 |
1.5 |
74 |
GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot |
Computers and Security |
Gill K.S., Saxena S., Sharma A. |
2020 |
5.6 |
75 |
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model |
Computer Communications |
Gupta R., Tanwar S., Tyagi S., Kumar N. |
2020 |
6 |
76 |
A novel deep neural networks based path prediction |
Cluster Computing |
Joshi U., Kumar R. |
2020 |
4.4 |
77 |
Convolutional neural networks for 5G-enabled Intelligent Transportation System: A systematic review |
Computer Communications |
Sirohi D., Kumar N., Rana P.S. |
2020 |
6 |
78 |
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system |
Science China Information Sciences |
Lin C., He D., Zeadally S., Kumar N., Choo K.-K.R. |
2020 |
8.8 |
79 |
Energy and Latency Aware Resource Management for Solar Powered Cellular Networks |
IEEE Network |
Chamola V., Hassija V., Sikdar B., Kumar N., Ansari N. |
2020 |
9.3 |
80 |
A Heuristic-Based Appliance Scheduling Scheme for Smart Homes |
IEEE Transactions on Industrial Informatics |
Jindal A., Bhambhu B.S., Singh M., Kumar N., Naik K. |
2020 |
12.3 |
81 |
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks |
Computer Communications |
Alladi T., Chamola V., Naren, Kumar N. |
2020 |
6 |
82 |
Dynamically updated diversified ensemble-based approach for handling concept drift |
Turkish Journal of Electrical Engineering and Computer Sciences |
Goel K., Batra S. |
2020 |
1.1 |
83 |
An efficient bi-layer content based image retrieval system |
Multimedia Tools and Applications |
Singh S., Batra S. |
2020 |
3.6 |
84 |
Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram |
Information and Software Technology |
Arora V., Singh M., Bhatia R. |
2020 |
3.9 |
85 |
Detecting clickbaits using two-phase hybrid CNN-LSTM biterm model |
Expert Systems with Applications |
Kaur S., Kumar P., Kumaraguru P. |
2020 |
8.5 |
86 |
An efficient deep learning-based scheme for web spam detection in IoT environment |
Future Generation Computer Systems |
Makkar A., Kumar N. |
2020 |
7.5 |
87 |
Guest Editorial: Energy Management, Protocols, and Security for the Next-Generation Networks and Internet of Things |
IEEE Transactions on Industrial Informatics |
Singh S., Sheng Q.Z., Benkhelifa E., Lloret J. |
2020 |
12.3 |
88 |
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function |
IEEE Transactions on Vehicular Technology |
Bansal G., Naren N., Chamola V., Sikdar B., Kumar N., Guizani M. |
2020 |
6.8 |
89 |
Enhancing dependability of wireless sensor network under flooding attack: A machine learning perspective |
International Journal of Ad Hoc and Ubiquitous Computing |
Sandhu J.K., Verma A.K., Rana P.S. |
2020 |
0.7 |
90 |
Blockchain technology toward green IoT: Opportunities and challenges |
IEEE Network |
Sharma P.K., Kumar N., Park J.H. |
2020 |
9.3 |
91 |
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks |
Neural Computing and Applications |
Kaur S., Singh M. |
2020 |
6 |
92 |
An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers |
IEEE Systems Journal |
Kaur K., Garg S., Kumar N., Aujla G.S., Choo K.-K.R., Obaidat M.S. |
2020 |
4.4 |
93 |
CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs |
IEEE Systems Journal |
Verma G.K., Singh B.B., Kumar N., He D. |
2020 |
4.4 |
94 |
An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain |
Multimedia Tools and Applications |
Mehta R., Gupta K., Yadav A.K. |
2020 |
3.6 |
95 |
Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model |
IEEE Transactions on Network Science and Engineering |
Hassija V., Bansal G., Chamola V., Kumar N., Guizani M. |
2020 |
6.6 |
96 |
An innovative two-stage data compression scheme using adaptive block merging technique |
Integration |
Vohra H., Singh A., Gill S.S. |
2020 |
1.9 |
97 |
A Coordinated Framework of DG Allocation and Operating Strategy in Distribution System for Configuration Management under Varying Loading Patterns |
Electric Power Components and Systems |
Kumar P., Ali I., Thomas M.S., Singh S. |
2020 |
1.5 |
98 |
DAIS: dynamic access and integration services framework for cloud-oriented storage systems |
Cluster Computing |
Kumar A., Bawa S. |
2020 |
4.4 |
99 |
An efficient data integrity auditing protocol for cloud computing |
Future Generation Computer Systems |
Garg N., Bawa S., Kumar N. |
2020 |
7.5 |
100 |
BlockSDN: Blockchain as a Service for Software Defined Networking in Smart City Applications |
IEEE Network |
Aujla G.S., Singh M., Bose A., Kumar N., Han G., Buyya R. |
2020 |
9.3 |
101 |
Ranking-based triplet loss function with intra-class mean and variance for fine-grained classification tasks |
Soft Computing |
Bhattacharya J., Sharma R.K. |
2020 |
4.1 |
102 |
CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment |
IEEE Internet of Things Journal |
Verma G.K., Singh B.B., Kumar N., Chamola V. |
2020 |
10.6 |
103 |
FPGA for 5G: Re-configurable hardware for next generation communication |
IEEE Wireless Communications |
Chamola V., Patra S., Kumar N., Guizani M. |
2020 |
12.9 |
104 |
Whale Optimization Algorithm with Applications to Resource Allocation in Wireless Networks |
IEEE Transactions on Vehicular Technology |
Pham Q.-V., Mirjalili S., Kumar N., Alazab M., Hwang W.-J. |
2020 |
6.8 |
105 |
Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects |
Journal of Network and Computer Applications |
Ghosh A., Gupta S., Dua A., Kumar N. |
2020 |
8.7 |
106 |
Occupational safety evaluation index-based obstacles prediction for manufacturing industries |
Modern Physics Letters B |
Singh S., Kaur M., Bahl A., Uppal R.S. |
2020 |
1.9 |
107 |
A forefront to machine translation technology: deployment on the cloud as a service to enhance QoS parameters |
Soft Computing |
Singh M., Kumar R., Chana I. |
2020 |
4.1 |
108 |
AutoTrustRec: Recommender System with Social Trust and Deep Learning using AutoEncoder |
Multimedia Tools and Applications |
Bathla G., Aggarwal H., Rani R. |
2020 |
3.6 |
109 |
Blockchain for 5G: A Prelude to Future Telecommunication |
IEEE Network |
Praveen G., Chamola V., Hassija V., Kumar N. |
2020 |
9.3 |
110 |
Hyper-parameter optimization of deep learning model for prediction of Parkinson’s disease |
Machine Vision and Applications |
Kaur S., Aggarwal H., Rani R. |
2020 |
3.3 |
111 |
A survey on brain tumor detection techniques for MR images |
Multimedia Tools and Applications |
Chahal P.K., Pandey S., Goel S. |
2020 |
3.6 |
112 |
Blockchain for Industry 4.0: A comprehensive review |
IEEE Access |
Bodkhe U., Tanwar S., Parekh K., Khanpara P., Tyagi S., Kumar N., Alazab M. |
2020 |
3.9 |
113 |
Stochastic neural networks for cryptocurrency price prediction |
IEEE Access |
Jay P., Kalariya V., Parmar P., Tanwar S., Kumar N., Alazab M. |
2020 |
3.9 |
114 |
Deep learning based image classification for intestinal hemorrhage |
Multimedia Tools and Applications |
Pannu H.S., Ahuja S., Dang N., Soni S., Malhi A.K. |
2020 |
3.6 |
115 |
Cross-Layer Energy Based Clustering Technique for Heterogeneous Wireless Sensor Networks |
Wireless Personal Communications |
Randhawa S., Jain S. |
2020 |
2.2 |
116 |
Analytical review of clustering techniques and proximity measures |
Artificial Intelligence Review |
Mehta V., Bawa S., Singh J. |
2020 |
12 |
117 |
Guest editorial: Deep learning for 3D reconstruction |
IET Image Processing |
Lv Z., Wang X., Khan S., Kumar N. |
2020 |
2.3 |
118 |
On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment |
IEEE Transactions on Vehicular Technology |
Sutrala A.K., Bagga P., Das A.K., Kumar N., Rodrigues J.J.P.C., Lorenz P. |
2020 |
6.8 |
119 |
Blockchain and AI amalgamation for energy cloud management: Challenges, solutions, and future directions |
Journal of Parallel and Distributed Computing |
Kumari A., Gupta R., Tanwar S., Kumar N. |
2020 |
3.8 |
120 |
Hybrid frameworks for flexible job shop scheduling |
International Journal of Advanced Manufacturing Technology |
Bharti P., Jain S. |
2020 |
3.4 |
121 |
Facial Sentiment Analysis Using AI Techniques: State-of-the-Art, Taxonomies, and Challenges |
IEEE Access |
Patel K., Mehta D., Mistry C., Gupta R., Tanwar S., Kumar N., Alazab M. |
2020 |
3.9 |
122 |
TBCS: A Trust Based Clustering Scheme for Secure Communication in Flying Ad-Hoc Networks |
Wireless Personal Communications |
Singh K., Verma A.K. |
2020 |
2.2 |
123 |
PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System |
IEEE Systems Journal |
Verma G.K., Singh B.B., Kumar N., Kaiwartya O., Obaidat M.S. |
2020 |
4.4 |
124 |
White-Box Implementation of Shamir's Identity-Based Signature Scheme |
IEEE Systems Journal |
Feng Q., He D., Wang H., Kumar N., Choo K.-K.R. |
2020 |
4.4 |
125 |
GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System |
IEEE Transactions on Services Computing |
Jindal A., Aujla G.S., Kumar N., Villari M. |
2020 |
8.1 |
126 |
S3A: Smart Station Search Assistance for Electric Vehicle?A Step Toward Smart City |
IEEE Consumer Electronics Magazine |
Goel S., Kumar R., Kumar A., Malhotra R. |
2020 |
4.5 |
127 |
Internet of Things (IoT), Applications and Challenges: A Comprehensive Review |
Wireless Personal Communications |
Khanna A., Kaur S. |
2020 |
2.2 |
128 |
Speeded-up Convolution Neural Network for classification tasks using multiscale 2-dimensional decomposition |
Neurocomputing |
Bhattacharya J., Ramponi G. |
2020 |
6 |
129 |
An improved artificial electric field algorithm for multi-objective optimization |
Processes |
Petwal H., Rani R. |
2020 |
3.5 |
130 |
BloCkEd: Blockchain-based secure data processing framework in edge envisioned V2X environment |
IEEE Transactions on Vehicular Technology |
Aujla G.S., Singh A., Singh M., Sharma S., Kumar N., Choo K.-K.R. |
2020 |
6.8 |
131 |
RGIM: An integrated approach to improve QoS in AODV, DSR and DSDV routing protocols for FANETS using the chain mobility model |
Computer Journal |
Kaur P., Singh A., Gill S.S. |
2020 |
1.4 |
132 |
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments |
IEEE Access |
Ali Z., Hussain S., Rehman R.H.U., Munshi A., Liaqat M., Kumar N., Chaudhry S.A. |
2020 |
3.9 |
133 |
An efficient clustering algorithm for mixed dataset of postoperative surgical records |
International Journal of Computational Intelligence Systems |
Petwal H., Rani R. |
2020 |
2.9 |
134 |
Blockchain-based identity management systems: A review |
Journal of Network and Computer Applications |
Liu Y., He D., Obaidat M.S., Kumar N., Khan M.K., Raymond Choo K.-K. |
2020 |
8.7 |
135 |
SPAMI: A cognitive spam protector for advertisement malicious images |
Information Sciences |
Makkar A., Kumar N., Zomaya A.Y., Dhiman S. |
2020 |
8.1 |
136 |
MAC protocols for unmanned aerial vehicle ecosystems: Review and challenges |
Computer Communications |
Vashisht S., Jain S., Aujla G.S. |
2020 |
6 |
137 |
MCH-EOR: Multi-objective Cluster Head Based Energy-aware Optimized Routing algorithm in Wireless Sensor Networks |
Sustainable Computing: Informatics and Systems |
Mehta D., Saxena S. |
2020 |
4.5 |
138 |
Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography |
Multimedia Tools and Applications |
Kukreja, S., Kasana, G., Kasana, S.S. |
2020 |
3.6 |
139 |
BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN |
IEEE Transactions on Industrial Informatics |
Singh A., Batra S., Aujla G.S., Kumar N., Yang L.T. |
2020 |
12.3 |
140 |
Vision-based personalized Wireless Capsule Endoscopy for smart healthcare: Taxonomy, literature review, opportunities and challenges |
Future Generation Computer Systems |
Muhammad K., Khan S., Kumar N., Del Ser J., Mirjalili S. |
2020 |
7.5 |
141 |
A reliable and cost-efficient code dissemination scheme for smart sensing devices with mobile vehicles in smart cities |
Sustainable Cities and Society |
Singh P., Kaur A., Kumar N. |
2020 |
11.7 |
142 |
A swarm intelligence-based quality of service aware resource allocation for clouds |
International Journal of Ad Hoc and Ubiquitous Computing |
Kumar A., Sharma A., Kumar R. |
2020 |
0.7 |
143 |
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users with Imperfect CSI |
IEEE Transactions on Vehicular Technology |
Budhiraja I., Kumar N., Tyagi S., Tanwar S., Guizani M. |
2020 |
6.8 |
144 |
Potential of generative adversarial net algorithms in image and video processing applications– a survey |
Multimedia Tools and Applications |
Sharma A., Jindal N., Rana P.S. |
2020 |
3.6 |
145 |
A new framework for intensification of energy efficiency in commercial and residential use by imposing social, technical and environmental constraints |
Sustainable Cities and Society |
Kumar P., Thanki D.V., Singh S., Nikolovski S. |
2020 |
11.7 |
146 |
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems |
International Journal of Communication Systems |
Tanwar S., Kaneriya S., Kumar N., Zeadally S. |
2020 |
2.1 |
147 |
Kinematic Viscosity Prediction of Nanolubricants Employed in Heavy Earth Moving Machinery Using Machine Learning Techniques |
International Journal of Precision Engineering and Manufacturing |
Sharma G., Kotia A., Ghosh S.K., Rana P.S., Bawa S., Ali M.K.A. |
2020 |
1.9 |
148 |
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey |
Computers and Security |
Shi S., He D., Li L., Kumar N., Khan M.K., Choo K.-K.R. |
2020 |
5.6 |
149 |
Local Statistics-based Speckle Reducing Bilateral Filter for Medical Ultrasound Images |
Mobile Networks and Applications |
Singh K., Sharma B., Singh J., Srivastava G., Sharma S., Aggarwal A., Cheng X. |
2020 |
3.8 |
150 |
A taxonomy of blockchain-enabled softwarization for secure UAV network |
Computer Communications |
Kumari A., Gupta R., Tanwar S., Kumar N. |
2020 |
6 |
151 |
A taxonomy of AI techniques for 6G communication networks |
Computer Communications |
Sheth K., Patel K., Shah H., Tanwar S., Gupta R., Kumar N. |
2020 |
6 |
152 |
AdaptFlow: Adaptive Flow Forwarding Scheme for Software-Defined Industrial Networks |
IEEE Internet of Things Journal |
Aujla G.S., Singh A., Kumar N. |
2020 |
10.6 |
153 |
Deepfakes: Temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory |
Journal of Electronic Imaging |
Kaur S., Kumar P., Kumaraguru P. |
2020 |
1.1 |
154 |
When Blockchain Meets Smart Grid: Secure Energy Trading in Demand Response Management |
IEEE Network |
Kumari A., Gupta R., Tanwar S., Tyagi S., Kumar N. |
2020 |
9.3 |
155 |
Machine Learning-Based Student's Native Place Identification for Real-Time |
IEEE Access |
Verma C., Stoffova V., Illes Z., Tanwar S., Kumar N. |
2020 |
3.9 |
156 |
Latency Evaluation of SDFGs on Heterogeneous Processors Using Timed Automata |
IEEE Access |
Rajadurai S., Alazab M., Kumar N., Gadekallu T.R. |
2020 |
3.9 |
157 |
An Effective Approach for Noise Robust and Rotation Invariant Handwritten Character Recognition Using Zernike Moments Features and Optimal Similarity Measure |
Applied Artificial Intelligence |
Singh C., Aggarwal A. |
2020 |
2.8 |
158 |
A novel approach for detecting roundabouts in maps based on analysis of core map data |
Multimedia Tools and Applications |
Singh R., Rana P.S., Jindal N. |
2020 |
3.6 |
159 |
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial Institutions |
Journal of Information Security and Applications |
Patel M.M., Tanwar S., Gupta R., Kumar N. |
2020 |
5.6 |
160 |
PARC: Placement Availability Resilient Controller Scheme for Software-Defined Datacenters |
IEEE Transactions on Vehicular Technology |
Chaudhary R., Kumar N. |
2020 |
6.8 |
161 |
Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things |
IEEE Transactions on Vehicular Technology |
Li X., Xu M., Vijayakumar P., Kumar N., Liu X. |
2020 |
6.8 |
162 |
Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment |
IEEE Transactions on Vehicular Technology |
Bera B., Saha S., Das A.K., Kumar N., Lorenz P., Alazab M. |
2020 |
6.8 |
163 |
Automated full-field polarization-sensitive optical coherence tomography diagnostic systems for breast cancer |
Applied Optics |
Kansal S., Bhattacharya J., Srivastava V. |
2020 |
1.9 |
164 |
Customized NOMA and Sector Model for Battery Efficient beyond 5G Green Networks |
IEEE Network |
Jain P., Gupta A., Tanwar S., Kumar N. |
2020 |
9.3 |
165 |
A Lightweight Privacy-Preserving Authentication Protocol for VANETs |
IEEE Systems Journal |
Li X., Liu T., Obaidat M.S., Wu F., Vijayakumar P., Kumar N. |
2020 |
4.4 |
166 |
Designing of fog based FBCMI2E Model using machine learning approaches for intelligent communication systems |
Computer Communications |
Singh S.P., Sharma A., Kumar R. |
2020 |
6 |
167 |
HEALTH of THINGS MODEL for CLASSIFYING HUMAN HEART SOUND SIGNALS USING CO-OCCURRENCE MATRIX and SPECTROGRAM |
Journal of Mechanics in Medicine and Biology |
Arora V., Ng E.Y.-K., Leekha R.S., Verma K., Gupta T., Srinivasan K. |
2020 |
0.8 |
168 |
DeTrAs: deep learning-based healthcare framework for IoT-based assistance of Alzheimer patients |
Neural Computing and Applications |
Sharma S., Dudeja R.K., Aujla G.S., Bali R.S., Kumar N. |
2020 |
6 |
169 |
Sign Language Generation System Based on Indian Sign Language Grammar |
ACM Transactions on Asian and Low-Resource Language Information Processing |
Sugandhi, Kumar P., Kaur S. |
2020 |
2 |
170 |
Energy-Efficient Workflow Scheduling Using Container-Based Virtualization in Software-Defined Data Centers |
IEEE Transactions on Industrial Informatics |
Ranjan R., Thakur I.S., Aujla G.S., Kumar N., Zomaya A.Y. |
2020 |
12.3 |
171 |
Generative adversarial network-convolution neural network based breast cancer classification using optical coherence tomographic images |
Laser Physics |
Kansal S., Goel S., Bhattacharya J., Srivastava V. |
2020 |
1.2 |
172 |
Pharmacrypt: Blockchain for critical pharmaceutical industry to counterfeit drugs |
Computer |
Saxena N., Thomas I., Gope P., Burnap P., Kumar N. |
2020 |
2.2 |
173 |
Optimized time synchronized multilayer mac protocol for wsn using relay nodes |
Ad-Hoc and Sensor Wireless Networks |
Khurana M., Shivani S., Tiwari S., Sharma B., Obaidat M.S., Hsiao K.-F. |
2020 |
0.9 |
174 |
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party |
Journal of Information Security and Applications |
Mishra D., Dharminder D., Yadav P., Sreenivasa Rao Y., Vijayakumar P., Kumar N. |
2020 |
5.6 |
175 |
Long short-term memory neural network-based multi-level model for smart irrigation |
Modern Physics Letters B |
Sidhu R.K., Kumar R., Rana P.S. |
2020 |
1.9 |
176 |
A novel astrophysics-based framework for prediction of binding affinity of glucose binder |
Modern Physics Letters B |
Kondabala R., Kumar V., Ali A., Kaur M. |
2020 |
1.9 |
177 |
An IoT and Edge Computing Based Framework for Charge Scheduling and EV Selection in V2G Systems |
IEEE Transactions on Vehicular Technology |
Chamola V., Sancheti A., Chakravarty S., Kumar N., Guizani M. |
2020 |
6.8 |
178 |
Safeguarding unmanned aerial systems: An approach for identifying malicious aerial nodes |
IET Communications |
Sayeed M.A., Kumar R., Sharma V. |
2020 |
1.6 |
179 |
Hybrid Microgrid Many-Objective Sizing Optimization with Fuzzy Decision |
IEEE Transactions on Fuzzy Systems |
Cao B., Dong W., Lv Z., Gu Y., Singh S., Kumar P. |
2020 |
11.9 |
180 |
Realizing the Potential of Internet of Things for Smart Tourism with 5G and AI |
IEEE Network |
Wang W., Kumar N., Chen J., Gong Z., Kong X., Wei W., Gao H. |
2020 |
9.3 |
181 |
DwaRa: A Deep Learning-Based Dynamic Toll Pricing Scheme for Intelligent Transportation Systems |
IEEE Transactions on Vehicular Technology |
Shukla A., Bhattacharya P., Tanwar S., Kumar N., Guizani M. |
2020 |
6.8 |
182 |
Toward Energy-Oriented Optimization for Green Communication in Sensor Enabled IoT Environments |
IEEE Systems Journal |
Kumar S., Kaiwartya O., Rathee M., Kumar N., Lloret J. |
2020 |
4.4 |
183 |
Förster resonance energy transfer (FRET) and applications thereof |
Analytical Methods |
Kaur A., Kaur P., Ahuja S. |
2020 |
3.1 |
184 |
IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges |
IEEE Access |
Anand P., Singh Y., Selwal A., Alazab M., Tanwar S., Kumar N. |
2020 |
3.9 |
185 |
DSCD: Delay Sensitive Cross-Domain Virtual Network Embedding Algorithm |
IEEE Transactions on Network Science and Engineering |
Zhang P., Pang X., Bi Y., Yao H., Pan H., Kumar N. |
2020 |
6.6 |
186 |
STAR: SLA-aware Autonomic Management of Cloud Resources |
IEEE Transactions on Cloud Computing |
Singh S., Chana I., Buyya R. |
2020 |
6.5 |