2025
Blockchain-Enabled Secure Collaborative Model Learning Using Differential Privacy for IoT-Based Big Data Analytics.
IEEE Trans. Big Data, February, 2025
2024
Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2024
Scalable computing for large-scale multimedia data analytics.
J. Intell. Inf. Syst., June, 2024
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024
Mitigation of atmospheric losses using dual-polarized 16-QAM MIMO technique in free-space optical system in various weather conditions.
Int. J. Commun. Syst., 2024
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface.
Comput. Electr. Eng., 2024
2023
Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ".
Cyber Secur. Appl., December, 2023
AI-based wavelet and stacked deep learning architecture for detecting coronavirus (COVID-19) from chest X-ray images.
Comput. Electr. Eng., May, 2023
An SOA-RBFNN approach for the system modelling of optimal energy management in grid-connected smart grid system.
Artif. Intell. Rev., May, 2023
Effective College English Teaching Based on Teacher-student Interactive Model.
ACM Trans. Asian Low Resour. Lang. Inf. Process., March, 2023
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
Timestamp Based OTP and Enhanced RSA Key Exchange Scheme with SIT Encryption to Secure IoT Devices.
J. Cyber Secur. Mobil., 2023
2022
Blockchain-based consensus algorithm for solving security issues in distributed internet of things.
Int. J. Electron. Bus., 2022
Public key encryption with equality test for Industrial Internet of Things system in cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022
College music education and teaching based on AI techniques.
Comput. Electr. Eng., 2022
Guest Editorial: Introduction to the special section on security and privacy in the big data era (VSI-spbd).
Comput. Electr. Eng., 2022
2021
An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks.
Wirel. Networks, 2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking.
Inf. Syst. Frontiers, 2021
Psychological Perceptual Analysis Based on Dance Therapy Using Artificial Intelligence Techniques.
Int. J. Artif. Intell. Tools, 2021
GCACS-IoD: A certificate based generic access control scheme for Internet of drones.
Comput. Networks, 2021
PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications.
IEEE Access, 2021
2020
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things.
Int. J. Commun. Syst., 2020
Effective user preference mining-based personalised movie recommendation system.
Int. J. Comput. Aided Eng. Technol., 2020
Type-specific classification of bronchogenic carcinomas using bi-layer mutated particle swarm optimisation.
Int. J. Comput. Aided Eng. Technol., 2020
2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019
Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.
Mob. Networks Appl., 2019
Bio-inspired cryptosystem with DNA cryptography and neural networks.
J. Syst. Archit., 2019
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019
A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019
A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019
Efficient Spectrum Management Techniques for Cognitive Radio Networks for Proximity Service.
IEEE Access, 2019
Probability-Based Centralized Device for Spectrum Handoff in Cognitive Radio Networks.
IEEE Access, 2019
2018
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers.
J. Supercomput., 2018
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments.
IEEE Trans. Ind. Informatics, 2018
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography.
J. Ambient Intell. Humaniz. Comput., 2018
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018
Modification of AES using genetic algorithms for high-definition image encryption.
Int. J. Intell. Syst. Technol. Appl., 2018
Consistent and effective energy utilisation of node model for securing data in wireless sensor networks.
Int. J. Grid Util. Comput., 2018
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment.
Future Gener. Comput. Syst., 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring.
Future Gener. Comput. Syst., 2018
Introduction to the special section on Big data and IoT in e-healthcare.
Comput. Electr. Eng., 2018
2017
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2017
Wireless and Mobile Networks: Security and Privacy Issues.
J. Electr. Comput. Eng., 2017
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion.
Int. J. Imaging Syst. Technol., 2017
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server.
Comput. Electr. Eng., 2017
An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017
Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities".
Proceedings of the Mathematics and Computing - Third International Conference, 2017
2016
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks.
Secur. Commun. Networks, 2016
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks.
Secur. Commun. Networks, 2016
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks.
Secur. Commun. Networks, 2016
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.
J. Medical Syst., 2016
Remote user authentication scheme using smart card: a review.
Int. J. Internet Protoc. Technol., 2016
2015
A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2015
2014
A secure remote user mutual authentication scheme using smart cards.
J. Inf. Secur. Appl., 2014