Ashish Singh

Orcid: 0000-0003-4486-3636

According to our database1, Ashish Singh authored at least 75 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Forecasting Bitcoin Prices Using Deep Learning for Consumer-Centric Industrial Applications.
IEEE Trans. Consumer Electron., February, 2024

A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry.
IEEE Trans. Consumer Electron., February, 2024

DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography.
Frontiers Comput. Sci., February, 2024

Trust management in online computing environment: a complete review.
J. Ambient Intell. Humaniz. Comput., January, 2024

Skin lesion classification using modified deep and multi-directional invariant handcrafted features.
J. Netw. Comput. Appl., 2024

KODA: A Data-Driven Recursive Model for Time Series Forecasting and Data Assimilation using Koopman Operators.
CoRR, 2024

Torus-Shaped Quantum Plasmonic Nano-Antenna Array for Optical Near-Field Communication.
IEEE Access, 2024

Tracklet-based Explainable Video Anomaly Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
BFSF: A secure IoT based framework for smart farming using blockchain.
Sustain. Comput. Informatics Syst., December, 2023

Imaging phenotypes predict overall survival in glioma more accurate than basic demographic and cell mutation profiles.
Comput. Methods Programs Biomed., December, 2023

Secure fine grained access control for telecare medical communication system.
Telecommun. Syst., September, 2023

DPPT : A differential privacy preservation technique for cyber-physical system.
Comput. Electr. Eng., July, 2023

A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario.
ACM J. Data Inf. Qual., June, 2023

Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model.
Mob. Networks Appl., April, 2023

TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms.
Clust. Comput., April, 2023

TrIDS: an intelligent behavioural trust based IDS for smart healthcare system.
Clust. Comput., April, 2023

Edge computing based secure health monitoring framework for electronic healthcare system.
Clust. Comput., April, 2023

Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine.
Clust. Comput., April, 2023

Fast and robust video-based exercise classification via body pose tracking and scalable multivariate time series classifiers.
Data Min. Knowl. Discov., March, 2023

A blockchain-enabled security framework for smart agriculture.
Comput. Electr. Eng., March, 2023

Healthcare Data Security Using Lightweight Protocol for Cyber Physical System.
IEEE Trans. Netw. Sci. Eng., 2023

Guest Editorial: Cybersecurity Intelligence in the Healthcare System.
IEEE Trans. Ind. Informatics, 2023

An Image Security Model Based on Chaos and DNA Cryptography for IIoT Images.
IEEE Trans. Ind. Informatics, 2023

Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning.
IEEE Trans. Ind. Informatics, 2023

Redefining food safety traceability system through blockchain: findings, challenges and open issues.
Multim. Tools Appl., 2023

Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing.
IEEE Internet Things J., 2023

A blockchain-enabled security management framework for mobile edge computing.
Int. J. Netw. Manag., 2023

COVID-19 Disease Prediction Using Weighted Ensemble Transfer Learning.
Int. J. Interact. Multim. Artif. Intell., 2023

FigCaps-HF: A Figure-to-Caption Generative Framework and Benchmark with Human Feedback.
CoRR, 2023

An Examination of Wearable Sensors and Video Data Capture for Human Exercise Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

Inv-Senet: Invariant Self Expression Network for Clustering Under Biased Data.
Proceedings of the IEEE International Conference on Acoustics, 2023

Secure Authentication Protocols For Internet Of Things (Iot) Devices.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

Calories Burned Prediction Using Machine Learning.
Proceedings of the 6th International Conference on Contemporary Computing and Informatics, 2023

EVAL: Explainable Video Anomaly Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
A lightweight block cipher technique for IoT based E-healthcare system security.
Multim. Tools Appl., 2022

Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN.
J. Circuits Syst. Comput., 2022

Cyberbullying detection: an ensemble learning approach.
Int. J. Comput. Sci. Eng., 2022

Inv-SENnet: Invariant Self Expression Network for clustering under biased data.
CoRR, 2022

A smart secure healthcare monitoring system with Internet of Medical Things.
Comput. Electr. Eng., 2022

A deep autoencoder approach for detection of brain tumor images.
Comput. Electr. Eng., 2022

From Batch Processing to Real Time Analytics: Running Presto® at Scale.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
Proposal and analysis of relative stability in mixed CNT bundle for sub-threshold interconnects.
Integr., 2021

Machine Learning Approaches for Type 2 Diabetes Prediction and Care Management.
CoRR, 2021

Securing smart healthcare system with edge computing.
Comput. Secur., 2021

2020
An adaptive mutual trust based access control model for electronic healthcare system.
J. Ambient Intell. Humaniz. Comput., 2020

Integrative radiomic analysis for pre-surgical prognostic stratification of glioblastoma patients: from advanced to basic MRI protocols.
Proceedings of the Medical Imaging 2020: Image-Guided Procedures, 2020

2019
ITrust: identity and trust based access control model for healthcare system security.
Multim. Tools Appl., 2019

Trust based access control model for securing electronic healthcare system.
J. Ambient Intell. Humaniz. Comput., 2019

An improved privacy preservation technique in health-cloud.
ICT Express, 2019

A Secure Access Control Model for E-health Cloud.
Proceedings of the TENCON 2019, 2019

Current Status of the Use of Machine Learning and Magnetic Resonance Imaging in the Field of Neuro-Radiomics.
Proceedings of the Radiomics and Radiogenomics in Neuro-oncology, 2019

Half&Half: New Tasks and Benchmarks for Studying Visual Common Sense.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Automatic Adaptation of Object Detectors to New Domains Using Self-Training.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019


2018
Unsupervised Hard Example Mining from Videos for Improved Object Detection.
Proceedings of the Computer Vision - ECCV 2018, 2018

2017
Truncated Equilateral Triangular Microstrip Antenna With and Without Superstrate.
Wirel. Pers. Commun., 2017

Moving object detection using modified temporal differencing and local fuzzy thresholding.
J. Supercomput., 2017

A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Cloud security issues and challenges: A survey.
J. Netw. Comput. Appl., 2017

Delay and Frequency Investigations in Coupled MLGNR Interconnects.
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017

Secure Group Communication in Wireless Network Using Bilinear Pairing.
Proceedings of the 7th International Conference on Computer and Communication Technology, 2017

2016
Design of Low-Power High-Gain Operational Amplifier for Bio-Medical Applications.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks.
Proceedings of the Computer Information Systems and Industrial Management, 2016

2015
Compact dualband rectangular microstrip patch antenna for 2.4/5.12-GHz wireless applications.
Wirel. Networks, 2015

2014
Analysis of L-probe Proximity Fed Annular Ring Patch Antenna for Wireless Applications.
Wirel. Pers. Commun., 2014

Analysis of F-shape microstrip line fed dualband antenna for WLAN applications.
Wirel. Networks, 2014

Compact notch loaded half disk patch antenna for dualband operation.
Ann. des Télécommunications, 2014

2013
Ultra Wideband Co-planer Microstrip Patch Antenna for Wireless Applications.
Wirel. Pers. Commun., 2013

An interface for remote robotic manipulator control that reduces task load and fatigue.
Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication, 2013

A Dog Tail for Utility Robots: Exploring Affective Properties of Tail Movement.
Proceedings of the Human-Computer Interaction - INTERACT 2013, 2013

A dog tail for communicating robotic states.
Proceedings of the ACM/IEEE International Conference on Human-Robot Interaction, 2013

2012
Animal-inspired human-robot interaction: a robotic tail for communicating state.
Proceedings of the International Conference on Human-Robot Interaction, 2012

2011
Perception-Based Design for Tele-presence.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

2010
Liver segmentation from registered multiphase CT data sets with EM clustering and GVF level set.
Proceedings of the Medical Imaging 2010: Image Processing, 2010

2005
Database Access Design for E-Business - A Case Study.
Proceedings of the Advances in Data Management 2005, 2005


  Loading...