B. N. Jagdale

Orcid: 0000-0002-7224-0025

Affiliations:
  • Dr. Vishwanath Karad MIT World Peace University, Pune, India


According to our database1, B. N. Jagdale authored at least 14 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mapreduce framework based sentiment analysis of twitter data using hierarchical attention network with chronological leader algorithm.
Soc. Netw. Anal. Min., December, 2024

Privacy-aware quantum convolutional neural network for blockchain-based IoT health care data.
Intell. Decis. Technol., 2024

2023
Optimal Cluster-Based Topology and Deep LSTM-Based Prediction Method for Data Reduction in IoT.
J. Uncertain Syst., September, 2023

Multi-Objective Optimization Model and Hierarchical Attention Networks for Mutation Testing.
Int. J. Swarm Intell. Res., 2023

Optimized key generation-based privacy preserving data mining model for secure data publishing.
Adv. Eng. Softw., 2023

2022
A novel authentication and authorization scheme in P2P networking using location-based privacy.
Evol. Intell., 2022

2021
Optimisation driven-based secure routing in MANET using atom whale optimisation algorithm.
Int. J. Commun. Networks Distributed Syst., 2021

WSHO: Energy and Trust Aware Protocol Using Whale Spotted Hyena Optimization Algorithm in IoT Integrated WSN.
Ad Hoc Sens. Wirel. Networks, 2021

2020
Adaptive-atom whale optimization algorithm using autonomous mobile ad hoc network for energy-efficient multipath routing.
Int. J. Model. Simul. Sci. Comput., 2020

Monarch-EWA: Monarch-Earthworm-Based Secure Routing Protocol in IoT.
Comput. J., 2020

2019
Privacy Aware Monitoring of Mobile Users in Sensor Networks Environment.
Int. J. Interact. Mob. Technol., 2019

2014
Myself: Local perturbation for location privacy in LBS applications.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Survey and Review of Location Privacy Techniques in Location Based Services.
Proceedings of the 6th International Conference on Emerging Trends in Engineering and Technology, 2013

2011
Elliptic Curve Cryptography for Smart Phone OS.
Proceedings of the Advances in Computing and Communications, 2011


  Loading...