Anshuman Singh

Orcid: 0000-0003-2705-6453

According to our database1, Anshuman Singh authored at least 31 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Performance Analysis of NR 5G Cellular Vehicle to Everything Communication in Mode 3.
Wirel. Pers. Commun., July, 2024

A Stress-Cognizant Optimal Battery Dispatch Framework for Multimarket Participation.
IEEE Trans. Ind. Informatics, May, 2024

Degradation-Infused Energy Portfolio Allocation Framework: Risk-Averse Fair Storage Participation.
CoRR, 2024

Nanophotonic Phased Array XY Hamiltonian Solver.
CoRR, 2024

Chance-Constrained Optimization for Flexibility Provision From the Local Energy Communities Using Logit-Based Regression.
IEEE Access, 2024

2023
An approach to optimize performance of controller in networked control system.
Int. J. Syst. Assur. Eng. Manag., October, 2023

Conformal Group Recommender System.
CoRR, 2023

Unveiling Latent Spaces with Variational Autoencoders.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

2022
A Differential Epidemic Model for Information, Misinformation, and Disinformation in Online Social Networks: COVID-19 Vaccination.
Int. J. Semantic Web Inf. Syst., January, 2022

Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions.
Int. J. Semantic Web Inf. Syst., 2022

Transforming healthcare through a digital revolution: A review of digital healthcare technologies and solutions.
Frontiers Digit. Health, 2022

Fair CRISP-DM: Embedding Fairness in Machine Learning (ML) Development Life Cycle.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Prognosticating the effect on Unemployment rate in the post-pandemic India via Time-Series Forecasting and Least Squares Approximation.
Pattern Recognit. Lett., 2021

Humans and Robots: A Mutually Inclusive Relationship in a Contagious World.
Int. J. Autom. Comput., 2021

Using gamification to rationalize excessive use of mobile devices among children and adolescents.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Design and Optimization of Microstrip Patch Antenna for UWB Applications Using Moth-Flame Optimization Algorithm.
Wirel. Pers. Commun., 2020

Advanced soft computing techniques for predicting soil compression coefficient in engineering project: a comparative study.
Eng. Comput., 2020

Predicting groundwater depth fluctuations using deep learning, extreme learning machine and Gaussian process: a comparative study.
Earth Sci. Informatics, 2020

A Two-Layer Framework with Battery Temperature Optimal Control and Network Optimal Power Flow.
CoRR, 2020

Developments and clinical evaluations of robotic exoskeleton technology for human upper-limb rehabilitation.
Adv. Robotics, 2020

2017
Swarm Robots in a Closed Loop Visual Odometry System by Using Visible Light Communication.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2017

2015
HydroSense: A self-powered wireless device for monitoring water usage in hotel showers.
Proceedings of the 2015 IEEE Global Humanitarian Technology Conference, 2015

Dimensional scalability of supervised and unsupervised concept drift detection: An empirical study.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2013
VILO: a rapid learning nearest-neighbor classifier for malware triage.
J. Comput. Virol. Hacking Tech., 2013

2012
Deployable Classifiers for Malware Detection.
Proceedings of the Information Systems, Technology and Management, 2012

Tracking concept drift in malware families.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

2011
Game-theoretic design of an information exchange model for detecting packed malware.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

On deployable adversarial classification models.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Context-sensitive analysis without calling-context.
High. Order Symb. Comput., 2010

Context-sensitive analysis of obfuscated x86 executables.
Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2010

2005
Secure Two-Party Context Free Language Recognition.
Proceedings of the Distributed Computing and Internet Technology, 2005


  Loading...