S.No | Title | Year | Publications | Index |
---|---|---|---|---|
1 | Secure Encrypted Word Proximity Retrieval Framework for Outsourced Relational Database Backed Applications | 2022 | Springer | Scopus |
2 | Privacy Preserving Semantic-Aware Multi-keyword Ranked Dynamic Search Over Encrypted Data | 2021 | Springer | Scopus |
3 | Stateless Key Management Scheme for Proxy-Based Encrypted Databases | 2021 | Springer | Scopus |
4 | Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric | 2021 | Springer | Scopus |
5 | Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data | 2021 | Springer | Scopus |
6 | A compact analytical survey on task scheduling in cloud computing environment | 2021 | IJETT | Scopus |
7 | Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases | 2020 | InderScience | Scopus |
8 | A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases | 2019 | InderScience | Scopus |
9 | Fuzzy-Based Integration of Security and Trust in Distributed Computing | 2019 | Springer | Scopus |
10 | Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data | 2018 | IEEE | Scopus |
11 | Usage of DHS and De-duplicating Encrypted Data using ABE & ECC for Secured Cloud Environment | 2018 | IEEE | Scopus |
12 | A study on impact of untrustworthy and older recommendations over T-Grid computational model | 2018 | Springer | Scopus |
13 | Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs | 2018 | IEEE | Scopus |
14 | A survey on client side and server side approaches to secure web applications | 2017 | IEEE | Scopus |
15 | Experimental results on multi-key searchable encryption technique with different elliptic curves and app designing | 2017 | IJAIT | Scopus |
16 | A novel proximity based searchable encryption scheme using referential dissimilarity | 2017 | IEEE | Scopus |
17 | Improving network lifetime in WSN s based on maximum residual energy | 2021 | INCET | Scopus |
18 | Pulmonary CT Images Segmentation using CNN and UNet Models of Deep Learning | 2020 | IEEE | Scopus |
19 | Analysis and implementation of a parallel computing cluster for solving computational problems in data analytics | 2020 | ICCCS | Scopus |
20 | Energy efficient load balancing approach for multipath routing protocol in ad hoc network | 2019 | ICACCP | Scopus |
21 | Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images | 2019 | ICISC | Scopus |
22 | Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit | 2018 | ICCSP | Scopus |
23 | Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolutional Network | 2018 | ICCSP | Scopus |
24 | Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs | 2018 | ICISC | Scopus |
25 | Design and implementation of GPU-based matrix chain multiplication using C++AMP | 2017 | ICECCT | Scopus |
26 | A Study of Automated Evaluation of Student s Examination Paper using Machine Learning Techniques | 2021 | ICCCIS | Scopus |
27 | Feature Impact on Sentiment Extraction of TEnglish Code-Mixed Movie Tweets | 2021 | SIST | Scopus |
28 | Heart Disease Prediction Using Extended KNN (E-KNN) | 2021 | SIST | Scopus |
29 | Heart disease prediction using extended KNN(E-knn) | 2020 | IJATCSE | Scopus |
30 | Sentiment Extraction from Bilingual Code Mixed Social Media Text | 2020 | AISE | Scopus |
31 | Topical and trust based page ranking using automatic seed selection | 2017 | IEEE | Scopus |
32 | A contextual deep clustering based intrusion detection method for cloud | 2019 | IJAST | Scopus |
33 | Detection of intrusion using hybrid feature selection and flexible rule based machine learning | 2019 | IJETT | Scopus |
34 | Analysis on Malware Issues in Online Social Networking Sites (SNS) | 2019 | ICACCS | Scopus |
35 | Optimized key management scheme for sensor networks using genetic algorithm | 2019 | Springer | Scopus |
36 | A review on application security management using web application security standards | 2019 | AISC | Scopus |
37 | Survey on design challenges and analysis of service architecture of DRM | 2017 | ICEI | Scopus |
38 | Prediction of epileptic seizure classification using third-order cumulants and sparse autoencoder | 2021 | ITAIT | Scopus |
39 | Multi-Objective Feature Selection Method by Using ACO with PSO Algorithm for Breast Cancer Detection | 2021 | IJIES | Scopus |
40 | Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model | 2021 | IJICS | Scopus |
41 | Bat-Grey Wolf Optimizer and kernel mapping for automatic incremental clustering | 2020 | IJMSSC | Scopus |
42 | An efficient cryptanalysis scheme for secure data storage system in cloud using optimal dual encryption algorithm | 2020 | IJSOI | Scopus |
43 | Particle Grey Wolf Optimizer (PGWO) Algorithm and Semantic Word Processing for Automatic Text Clustering | 2019 | IJUFKBS | Scopus |
44 | Design and implementation of a hacker detection scheme: A network security measure in heterogeneous WSN | 2019 | Lecture Notes in Networks and Systems | Scopus |
45 | A secure and computational-efficient multicast key distribution for wireless networks | 2019 | ICISC | Scopus |
46 | Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway | 2018 | ICCCS | Scopus |
47 | Estimating software reliability using ant colony optimization technique with salesman problem for software process | 2018 | IJATCSE | Scopus |
48 | Attacker evidence system in WSN | 2018 | CCIS | Scopus |
49 | Investigation on email text mining techniques and tools | 2018 | IJMTT | Scopus |
50 | Automation of component selection process for designing of reusable components using drag and drop mechanism | 2017 | ICISC | Scopus |
51 | Task-Scheduling Algorithms in Cloud Environment | 2017 | Springer | Scopus |
S.No | Title | Year | Publications | Index |
---|---|---|---|---|
1 | Optimizing resource scheduling based on extended particle swarm optimization in fog computing environments | 2020 | WILEY | SCI |
2 | Hybrid Artificial Bee Colony and Monarchy Butterfly Optimization Algorithm (HABC-MBOA)-based cluster head selection for WSN | 2019 | Journal of King Saud University – Computer and Information Sciences | SCI-E |