Shekhar Verma

Orcid: 0000-0003-3460-2707

According to our database1, Shekhar Verma authored at least 135 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MAC: a meta-learning approach for feature learning and recombination.
Pattern Anal. Appl., June, 2024

2023
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud.
J. Supercomput., October, 2023

Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud.
J. Supercomput., September, 2023

Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain.
Peer Peer Netw. Appl., September, 2023

Blockchain-based conditional privacy-preserving authentication scheme in VANETs.
Multim. Tools Appl., July, 2023

Strike off removal in Indic scripts with transfer learning.
Neural Comput. Appl., June, 2023

Semi-supervised learning with dropouts.
Expert Syst. Appl., April, 2023

PSCLS: provably secure certificateless signature scheme for IoT device on cloud.
J. Supercomput., March, 2023

Curvature Regularized Similarity Based Ricci Flow Embedding.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Low-rank GAT: toward robust quantification of neighborhood influence.
Neural Comput. Appl., February, 2023

P2LBS: Privacy Provisioning in Location-Based Services.
IEEE Trans. Serv. Comput., 2023

Parzen Window Approximation on Riemannian Manifold.
Pattern Recognit., 2023

Equitable-FL: Federated Learning with Sparsity for Resource-Constrained Environment.
CoRR, 2023

FAM: fast adaptive meta-learning.
CoRR, 2023

Deep Learning Techniques in Extreme Weather Events: A Review.
CoRR, 2023

Learning to Learn with Indispensable Connections.
CoRR, 2023

2022
A Survey of Oblivious Transfer Protocol.
ACM Comput. Surv., January, 2022

Anonymous and Linkable Location-Based Services.
IEEE Trans. Veh. Technol., 2022

CP2EH: a comprehensive privacy-preserving e-health scheme over cloud.
J. Supercomput., 2022

EP2LBS: efficient privacy-preserving scheme for location-based services.
J. Supercomput., 2022

Searchable encryption on the cloud: a survey.
J. Supercomput., 2022

DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for VANET.
IEEE Trans. Intell. Transp. Syst., 2022

Linkable Privacy-Preserving Scheme for Location-Based Services.
IEEE Trans. Intell. Transp. Syst., 2022

Data visualization through non linear dimensionality reduction using feature based Ricci flow embedding.
Multim. Tools Appl., 2022

A secure searchable encryption scheme for cloud using hash-based indexing.
J. Comput. Syst. Sci., 2022

Graph attention autoencoder inspired CNN based brain tumor classification using MRI.
Neurocomputing, 2022

Hybrid Model using Feature Extraction and Non-linear SVM for Brain Tumor Classification.
CoRR, 2022

Adaptive Prototypical Networks.
CoRR, 2022

Efficient and privacy-preserving location-based services over the cloud.
Clust. Comput., 2022

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme.
Clust. Comput., 2022

2021
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD.
Wirel. Pers. Commun., 2021

iHRNL: Iterative Hessian-based manifold regularization mechanism for localization in WSN.
J. Supercomput., 2021

HSIC-based affinity measure for learning on graphs.
Pattern Anal. Appl., 2021

A rotation based regularization method for semi-supervised learning.
Pattern Anal. Appl., 2021

An efficient and light weight polynomial multiplication for ideal lattice-based cryptography.
Multim. Tools Appl., 2021

Comparative Analysis of Intelligent Driving and Safety Assistance Systems Using YOLO and SSD Model of Deep Learning.
Int. J. Inf. Syst. Model. Des., 2021

DEIT: Dempster Shafer Theory-based edge-centric Internet of Things-specific trust model.
Trans. Emerg. Telecommun. Technol., 2021

A comprehensive survey on authentication and privacy-preserving schemes in VANETs.
Comput. Sci. Rev., 2021

Anonymity on blockchain based e-cash protocols - A survey.
Comput. Sci. Rev., 2021

Cross-covariance based affinity for graphs.
Appl. Intell., 2021

2020
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs.
Wirel. Pers. Commun., 2020

Efficient and Secure Location-Based Services Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

Efficient Lattice-Based Ring Signature for Message Authentication in VANETs.
IEEE Syst. J., 2020

PoEWAL: A lightweight consensus mechanism for blockchain in IoT.
Pervasive Mob. Comput., 2020

Interpreting SVM for medical images using Quadtree.
Multim. Tools Appl., 2020

Regularization on a rapidly varying manifold.
Int. J. Mach. Learn. Cybern., 2020

Temporal Differential Privacy in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2020

Parzen Window Approximation on Riemannian Manifold.
CoRR, 2020

KATE: Kalman Trust Estimator for Internet of Drones.
Comput. Commun., 2020

Private computation of the Schulze voting method over the cloud.
Clust. Comput., 2020

GCN with Clustering Coefficients and Attention Module.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Ensemble Based Graph Convolutional Network for Semi Supervised Learning.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

Regularized Deep Convolutional Generative Adversarial Network.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

DP-ANN: A new Differential Private Artificial Neural Network with Application on Health data (Workshop Paper).
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

2019
MPMAC: Clustering Based MAC Protocol for VANETs.
Wirel. Pers. Commun., 2019

Differentially Private Location Privacy Preservation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2019

A new patch and stitch algorithm for localization in wireless sensor networks.
Wirel. Networks, 2019

Node Scheduling and Compressed Sampling for Event Reporting in WSNs.
IEEE Trans. Netw. Sci. Eng., 2019

ODECS: An On-Demand Explosion-Based Compressed Sensing Using Random Walks in Wireless Sensor Networks.
IEEE Syst. J., 2019

Accurate Detection of Important Events in WSNs.
IEEE Syst. J., 2019

Vulnerabilities on Hyperledger Fabric.
Pervasive Mob. Comput., 2019

Optimal manifold neighborhood and kernel width for robust non-linear dimensionality reduction.
Knowl. Based Syst., 2019

An Efficient Framework Using Normalized Dominance Operator for Multi-Objective Evolutionary Algorithms.
Int. J. Swarm Intell. Res., 2019

Trust computation using fuzzy analyser.
Int. J. Inf. Technol. Commun. Convergence, 2019

A review of multi-objective optimisation and decision making using evolutionary algorithms.
Int. J. Bio Inspired Comput., 2019

2018
DBCS: A Decomposition Based Compressive Sensing for Event Oriented Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

Corona Based Optimal Node Deployment Distribution in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

Low cost localization using Nyström extended locally linear embedding.
Pattern Recognit. Lett., 2018

Secure and lightweight multi user searchable encryption scheme.
J. Intell. Fuzzy Syst., 2018

Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks.
Comput. Secur., 2018

2017
Wireless Sensor Networks Localization Using Progressive Isomap.
Wirel. Pers. Commun., 2017

Trust computation in VANET using TOEFV.
Int. J. Trust. Manag. Comput. Commun., 2017

Mining of yield components and other associated quantitative traits in various crops.
Int. J. Bioinform. Res. Appl., 2017

An energy efficient approach for corona based wireless sensor network.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Flip Error Elimination and Core Map Selection in Patch and Stitch Algorithms for Localization in Wireless Sensor Network.
Proceedings of the 7th International Conference on Computer and Communication Technology, 2017

2015
Using trust for lightweight communication in VANETs.
Int. J. Artif. Intell. Soft Comput., 2015

An Aggregation Based Approach with Pareto Ranking in Multiobjective Genetic Algorithm.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2014
Privacy Provisioning in Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

Privacy in wireless sensor networks using ring signature.
J. King Saud Univ. Comput. Inf. Sci., 2014

Secure pay while on move toll collection using VANET.
Comput. Stand. Interfaces, 2014

A SINR Based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN).
Proceedings of the 2014 International Conference on Information Technology, 2014

2013
Cluster Based RSU Centric Channel Access for VANETs.
Trans. Comput. Sci., 2013

Practicability of HFE Scheme for Wireless Sensor Network.
Trans. Comput. Sci., 2013

Intersection Attack on Anonymity in VANET.
Trans. Comput. Sci., 2013

Privacy preserving mutual authentication in WiMAX.
Int. J. Inf. Technol. Commun. Convergence, 2013

GMCA: a greedy multilevel clustering algorithm for data gathering in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2013

Performance analysis of multivariate cryptosystem schemes for wireless sensor network.
Comput. Electr. Eng., 2013

Network Connectivity in VANETs.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Authentication in Cloud Computing Environment Using Two Factor Authentication.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey.
Proceedings of the Intelligent Computing, 2013

2012
Safety of Lane Change Maneuver Through A Priori Prediction of Trajectory Using Neural Networks.
Netw. Protoc. Algorithms, 2012

Model-based verification of privacy preserving authentication protocol for VANETs.
Int. J. Inf. Technol. Commun. Convergence, 2012

Enhanced SDMA for VANET Communication.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Neural Network Based Lane Change Trajectory Prediction in Autonomous Vehicles.
Trans. Comput. Sci., 2011

Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks.
Trans. Comput. Sci., 2011

Secure toll collection in VANETs.
Int. J. Inf. Technol. Commun. Convergence, 2011

An optimised gene selection approach using wavelet power spectrum.
Int. J. Bioinform. Res. Appl., 2011

Feasibility of Rainbow Signature for Broadcast Authentication in Sensor Networks.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Nature-Inspired Fault Tolerant Area Monitoring in Sensor Network.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Comparison of reactive and proactive routing protocols for different mobility conditions in WSN.
Proceedings of the 2011 International Conference on Communication, 2011

2010
NPT Based Video Watermarking with Non-overlapping Block Matching.
Trans. Comput. Sci., 2010

One Anchor Distance and Angle Based Multi - Hop Adaptive Iterative Localization Algorithm for Wireless Sensor Networks.
Int. J. Grid High Perform. Comput., 2010

Intelligent Industrial Data Acquisition and Energy Monitoring using Wireless Sensor Networks.
Int. J. Grid High Perform. Comput., 2010

Mechanism for Privacy Preservation in VANETS.
Int. J. Grid High Perform. Comput., 2010

Two-phase clustering based aggregation of sensor data.
Int. J. Data Min. Model. Manag., 2010

Maximising anonymity of a vehicle.
Int. J. Auton. Adapt. Commun. Syst., 2010

Designing interactive presentation systems for classrooms.
Proceedings of the 28th Annual International Conference on Design of Communication, 2010

Infrastructure Aided Privacy Preserving-Authentication in VANETs.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Viability of multivariate cryptosystems for WSN.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

CMAC: A cluster based MAC protocol for VANETs.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Pruned-AZB for reduced complexity block matching in video compression.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.
Trans. Comput. Sci., 2009

A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks.
J. Networks, 2009

Dynamic Multi-level Hierarchal Clustering Approach for Wireless Sensor Networks.
Proceedings of the UKSim'11, 2009

Robust Watermarking of Image in the Transform Domain Using Edge Detection.
Proceedings of the UKSim'11, 2009

AODV Routing Protocol with Selective Flooding.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Profile based Mobility Model for Vehicular ad- hoc Networks.
Proceedings of the World Congress on Nature & Biologically Inspired Computing, 2009

Haste induced behavior and VANET communication.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2009

A Heuristic for Minimum Connected Dominating Set with Local Repair for Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Networks, 2009

MAIL: Multi-Hop Adaptive Iterative Localization for Wireless Sensor Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

Wireless Sensor Network Based Industrial Monitoring & Diagnostic System.
Proceedings of the First International Conference on Computational Intelligence, 2009

Pseudonym Based Mechanism for Sustaining Privacy in VANETs.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Maximizing anonymity of a vehicle through pseudonym updation.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

Image Index Based Digital Watermarking Techniqu for Ownership Claim and Buyer Fingerprinting.
Proceedings of the Advances in Electrical Engineering and Computational Science, 2008

Stable and Energy Efficient Routing for Mobile Adhoc Networks.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Clustering approach to data aggregation in wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

Power Aware Routing to Support Real Time Traffic in Mobile Adhoc Networks.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

QoS-Based Pure Adaptive Routing in MANETs.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Digital Watermarking Technique for Ownership Claim using Buyer Signature.
Proceedings of the 2008 International Conference on Security & Management, 2008

Optimizing Pseudonym Updation for Anonymity in VANETS.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
Finding Cliques of a Graph using Prime Numbers
CoRR, 2006

Feature selection using Haar wavelet power spectrum.
BMC Bioinform., 2006

MCDS Based Multicasting in Mobile Adhoc Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

2005
Watermark Based Digital Rights Management.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2002
Service level agreements in IP networks.
Inf. Manag. Comput. Secur., 2002


  Loading...