Balachandra Muniyal
Orcid: 0000-0002-4839-0082Affiliations:
- Manipal Academy of Higher Education, Manipal Institute of Technology, Department of Information and Communication Technology, India
According to our database1,
Balachandra Muniyal
authored at least 31 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever-evolving relationships.
IET Commun., October, 2024
Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata.
IEEE Access, 2024
FedDSL: A Novel Client Selection Method to Handle Statistical Heterogeneity in Cross-Silo Federated Learning Using Flower Framework.
IEEE Access, 2024
IEEE Access, 2024
2023
Identity resilience in the digital health ecosystem: A key recovery-enabled framework.
Comput. Biol. Medicine, December, 2023
Int. J. Wirel. Inf. Networks, September, 2023
Identity - Attribute Inference in Online Social Network(s) Using Bio-Inspired Algorithms and Machine Learning Approaches.
J. Mobile Multimedia, 2023
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders.
J. Cyber Secur. Mobil., 2023
2022
J. Cyber Secur. Mobil., 2022
Comput. Electr. Eng., 2022
Proceedings of the Applications and Techniques in Information Security, 2022
Proceedings of the Applications and Techniques in Information Security, 2022
2021
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification.
Int. J. Commun. Networks Inf. Secur., 2021
Proceedings of the Applications and Techniques in Information Security, 2021
2020
Enhanced Human Action Recognition Using Fusion of Skeletal Joint Dynamics and Structural Features.
J. Robotics, 2020
2019
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card.
IEEE Access, 2019
2018
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list.
Inf. Secur. J. A Glob. Perspect., 2018
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the Applications and Techniques in Information Security, 2018
2017
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
An investigation of classification algorithms for intrusion detection system - A quantitative approach.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
2012
Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies
CoRR, 2012
2010
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures.
Proceedings of the Information Processing and Management, 2010