Ayan Kumar Das

According to our database1, Ayan Kumar Das authored at least 25 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Secured LEACH Protocol (BSLEACH).
Wirel. Pers. Commun., September, 2024

Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication.
J. Supercomput., May, 2024

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor.
J. Supercomput., January, 2024

Miner Selection in an Internet of Medical Things Framework using Fuzzy Logic.
Appl. Soft Comput., 2024

2023
MSHRP: Mobile Sink Based Limited Hop Routing Protocol for Wireless Sensor Networks.
Wirel. Pers. Commun., November, 2023

Deep-CoV: An integrated deep learning model to detect COVID-19 using chest X-ray and CT images.
Comput. Intell., April, 2023

2022
BSSFFS: blockchain-based sybil-secured smart forest fire surveillance.
J. Ambient Intell. Humaniz. Comput., 2022

MACP: Multifactor Authentication using Physical Unclonable Function and Fuzzy Extractor based Chebyshev Polynomial for Industrial Internet of Things devices.
Trans. Emerg. Telecommun. Technol., 2022

Energy-efficient fuzzy data offloading for IoMT.
Comput. Networks, 2022

2021
PAFF: predictive analytics on forest fire using compressed sensing based localized Ad Hoc wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2021

<i>K</i>-anonymity scheme for privacy preservation in location-based services on IoT environment.
Int. J. Autom. Control., 2021

UIDS: a unified intrusion detection system for IoT environment.
Evol. Intell., 2021

2020
EEFFL: energy efficient data forwarding for forest fire detection using localization technique in wireless sensor network.
Wirel. Networks, 2020

UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices.
Comput. Secur., 2020

An integrated rule based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset.
Clust. Comput., 2020

A Novel Broadcast Network Design for Routing in Mobile Ad-Hoc Network.
IEEE Access, 2020

Blockchain-Based Sybil-Secure Data Transmission (SSDT) IoT Framework for Smart City Applications.
Proceedings of the Evolution in Computational Intelligence, 2020

2017
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
Cluster-based energy-aware routing scheme (CBEARS) for wireless sensor network.
Int. J. Sens. Networks, 2016

2015
The Design of Hierarchical Routing Protocol for Wireless Sensor Network.
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2014
Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network.
Proceedings of the Security in Computing and Communications, 2014

2013
Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
MERCC: Multiple Events Routing with Congestion Control for WSN.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
A New Energy Efficient Approach Towards WASN Routing with Modified QCS Protocol
CoRR, 2011

A Novel Power-Balanced Routing Scheme for WSN.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011


  Loading...