Adarsh Kumar
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
An Efficient Data Sharing Scheme Using MultiTransaction Mode Consortium Blockchain for Smart Healthcare.
Int. J. Syst. Syst. Eng., 2025
2024
Wind speed prediction and insight for generalized predictive modeling framework: a comparative study for different artificial intelligence models.
Neural Comput. Appl., August, 2024
2023
SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.
Artif. Intell. Rev., December, 2023
SN Comput. Sci., September, 2023
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023
Internet Technol. Lett., 2023
From Words to Music: A Study of Subword Tokenization Techniques in Symbolic Music Generation.
CoRR, 2023
Blockchain for Patient Data Integrity: Decentralised Storage and Retrieval in Modern Healthcare Systems.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023
Comparative Studies of Stochastic Techniques to Minimize the Cost of Biomass Supply Networks.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023
FedBeam: Federated learning based privacy preserved localization for mass-Beamforming in 5GB.
Proceedings of the International Conference on Information Networking, 2023
GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers.
Proceedings of the Artificial Intelligence in Music, Sound, Art and Design, 2023
2022
Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda.
Veh. Commun., 2022
Softw. Pract. Exp., 2022
A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system.
Simul. Model. Pract. Theory, 2022
Secur. Priv., 2022
J. Circuits Syst. Comput., 2022
Int. J. Web Inf. Syst., 2022
Int. J. Grid Util. Comput., 2022
An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games.
IEEE Access, 2022
A Robust NIfTI Image Authentication Framework Based on DST and Multi-Scale Otsu Thresholding.
IEEE Access, 2022
CounterGeDi: A Controllable Approach to Generate Polite, Detoxified and Emotional Counterspeech.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
2021
A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management.
Veh. Commun., 2021
A multidimensional-multilayered anomaly detection in RFID-sensor integrated internet of things network.
Int. J. Cloud Comput., 2021
Uncertainties evaluation and analysis using quantitative technique for a software project.
Int. J. Ad Hoc Ubiquitous Comput., 2021
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic.
Future Gener. Comput. Syst., 2021
Digital device-based active learning approach using virtual community classroom during the COVID-19 pandemic.
Comput. Appl. Eng. Educ., 2021
IEEE Access, 2021
Team Phoenix at WASSA 2021: Emotion Analysis on News Stories with Pre-Trained Language Models.
Proceedings of the Eleventh Workshop on Computational Approaches to Subjectivity, 2021
Adversities are all you need: Classification of self-reported breast cancer posts on Twitter using Adversarial Fine-tuning.
Proceedings of the Sixth Social Media Mining for Health Workshop and Shared Task, 2021
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021
Proceedings of the 22nd International Society for Music Information Retrieval Conference, 2021
Proceedings of the Combating Online Hostile Posts in Regional Languages during Emergency Situation, 2021
Proceedings of the Digital Transformation and Emerging Technologies for Fighting COVID-19 Pandemic: Innovative Approaches, 2021
2020
Lightweight Proof of Game (LPoG): A Proof of Work (PoW)'s Extended Lightweight Consensus Algorithm for Wearable Kidneys.
Sensors, 2020
Sensors, 2020
Correction to: A multi‑target approach for discovery of antiviral compounds against dengue virus from green tea.
Netw. Model. Anal. Health Informatics Bioinform., 2020
A multi-target approach for discovery of antiviral compounds against dengue virus from green tea.
Netw. Model. Anal. Health Informatics Bioinform., 2020
A novel heuristic simulation-optimization method for critical infrastructure in smart transportation systems.
Int. J. Commun. Syst., 2020
A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City.
IEEE Access, 2020
A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes.
IEEE Access, 2020
2018
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs.
Proceedings of the Intelligent Systems Design and Applications, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
2017
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things.
Int. J. Adv. Intell. Paradigms, 2017
2016
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs.
Int. J. Netw. Secur., 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
Proceedings of the Ninth International Conference on Contemporary Computing, 2016
2014
KSII Trans. Internet Inf. Syst., 2014
Int. J. Commun. Networks Inf. Secur., 2014
Cost and performance analysis of server-centric authentication protocol in supply chain management.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014
2013
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs).
Proceedings of the Sixth International Conference on Contemporary Computing, 2013
2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks.
Proceedings of the Contemporary Computing - 5th International Conference, 2012
2009
Proceedings of the 35. International Computer Measurement Group Conference, 2009