Piyush Kumar Shukla

Orcid: 0000-0002-3715-3882

According to our database1, Piyush Kumar Shukla authored at least 59 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AI-Enabled Trajectory Optimization of Logistics UAVs With Wind Impacts in Smart Cities.
IEEE Trans. Consumer Electron., February, 2024

On Federated Learning-Oriented q-Rung Picture Fuzzy TOPSIS/VIKOR Decision-Making Approach in Electronic Marketing Strategic Plans.
IEEE Trans. Consumer Electron., February, 2024

Industry 5.0 Enablers in Consumer Electronics Market Assessment Under T-Spherical Fuzzy Integrated Decision-Making Approach.
IEEE Trans. Consumer Electron., February, 2024

Biomedical signal to image conversion and classification using flexible deep learning techniques.
Int. J. Bus. Intell. Data Min., 2024

2023
Resource allocation and network pricing based on double auction in mobile edge computing.
J. Cloud Comput., December, 2023

Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare.
Comput. Commun., December, 2023

Optimal path selection using reinforcement learning based ant colony optimization algorithm in IoT-Based wireless sensor networks with 5G technology.
Comput. Commun., December, 2023

IoT-Based Federated Learning Model for Hypertensive Retinopathy Lesions Classification.
IEEE Trans. Comput. Soc. Syst., August, 2023

Lightweight authentication scheme for massive MIMO on Internet of Things connectivity.
Phys. Commun., June, 2023

Multidomain blockchain-based intelligent routing in UAV-IoT networks.
Comput. Commun., May, 2023

Optimization assisted bidirectional gated recurrent unit for healthcare monitoring system in big-data.
Appl. Soft Comput., May, 2023

Fuzzified power allocation scheme for relay network.
Phys. Commun., April, 2023

An efficient image encryption technique based on two-level security for internet of things.
Multim. Tools Appl., February, 2023

An Advanced EEG Motion Artifacts Eradication Algorithm.
Comput. J., February, 2023

Design of a high-performance advanced phase locked loop with high stability external loop filter.
IET Circuits Devices Syst., January, 2023

Enhanced framework for COVID-19 prediction with computed tomography scan images using dense convolutional neural network and novel loss function.
Comput. Electr. Eng., January, 2023

Novel framework based on deep learning and cloud analytics for smart patient monitoring and recommendation (SPMR).
J. Ambient Intell. Humaniz. Comput., 2023

Energy efficient architecture for mitigating the hot-spot problem in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2023

BSeVS - A Smart e-Voting System based on Blockchain Technology.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Salp Swarm Optimization-Based Clustering Algorithm (SSOCA) in Adaptive FANET to Improve QoS for Disaster Response Operations.
Wirel. Pers. Commun., 2022

Correction to: Attack Resilient and Efficient Protocol Based on Greedy Perimeter Coordinator Routing - Mobility Awareness for Preventing the Attack in the VANET.
Wirel. Pers. Commun., 2022

Attack Resilient and Efficient Protocol based on Greedy Perimeter Coordinator Routing - Mobility Awareness for Preventing the Attack in the VANET.
Wirel. Pers. Commun., 2022

AES Based White Box Cryptography in Digital Signature Verification.
Sensors, 2022

Automatic segmentation of plant leaves disease using min-max hue histogram and k-mean clustering.
Multim. Tools Appl., 2022

Correction to: Bunch graph based dimensionality reduction using auto-encoder for character recognition.
Multim. Tools Appl., 2022

Bunch graph based dimensionality reduction using auto-encoder for character recognition.
Multim. Tools Appl., 2022

Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain.
IACR Cryptol. ePrint Arch., 2022

A novel routing protocol based on grey wolf optimization and Q learning for wireless body area network.
Expert Syst. Appl., 2022

Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain.
CoRR, 2022

Ubiquitous and smart healthcare monitoring frameworks based on machine learning: A comprehensive review.
Artif. Intell. Medicine, 2022

2021
An Intelligent Session Key-Based Hybrid Lightweight Image Encryption Algorithm Using Logistic-Tent Map and Crossover Operator for Internet of Multimedia Things.
Wirel. Pers. Commun., 2021

Deep Bidirectional Classification Model for COVID-19 Disease Infected Patients.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

Computer Vision for Human-Computer Interaction Using Noninvasive Technology.
Sci. Program., 2021

CBO-IE: A Data Mining Approach for Healthcare IoT Dataset Using Chaotic Biogeography-Based Optimization and Information Entropy.
Sci. Program., 2021

Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover.
Multim. Tools Appl., 2021

Session key based fast, secure and lightweight image encryption algorithm.
Multim. Tools Appl., 2021

Reformist Framework for Improving Human Security for Mobile Robots in Industry 4.0.
Mob. Inf. Syst., 2021

Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning.
Mob. Inf. Syst., 2021

Approach for Collision Minimization and Enhancement of Power Allocation in WSNs.
J. Sensors, 2021

Taxonomy on EEG Artifacts Removal Methods, Issues, and Healthcare Applications.
J. Organ. End User Comput., 2021

A Novel Machine Learning Model to Predict the Staying Time of International Migrants.
Int. J. Artif. Intell. Tools, 2021

2020
Effective watermarking technique using optimal discrete wavelet transform and sanitization technique.
Multim. Tools Appl., 2020

Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN).
Comput. Commun., 2020

2019
Energy Efficient Gravitational Search Algorithm and Fuzzy Based Clustering With Hop Count Based Routing For Wireless Sensor Network.
Multim. Tools Appl., 2019

Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA).
J. Medical Syst., 2019

A Review on Various Features and Techniques of Crop Yield Prediction Using Geo-Spatial Data.
Int. J. Organ. Collect. Intell., 2019

Opinion on Different Classification Algorithms Used in Internet of Things Environment for Large Data Set.
Int. J. Organ. Collect. Intell., 2019

Assessment on Different Classification Algorithms Used in Internet of Things Applications.
Int. J. Organ. Collect. Intell., 2019

2018
Mobility-Aware GPCR-MA for Vehicular Ad hoc Routing Protocol for Highways Scenario.
Int. J. Organ. Collect. Intell., 2018

2016
An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing.
Entropy, 2016

2015
Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing.
Entropy, 2015

2009
Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks
CoRR, 2009

Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 Encryption.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos Based Feedback Technique.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Survey for Designing Attack Resilient and Adaptive Medium Access Control Protocol for Wireless Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

An Adaptive Medium Access Control Protocol for Computer Network.
Proceedings of the First International Conference on Computational Intelligence, 2009

Multiple Subgroup Data Compression Technique Based on Huffman Coding.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008


  Loading...