Balamurugan Balusamy

Orcid: 0000-0003-2805-4951

Affiliations:
  • Galgotias University, School of Computer Science and Engineering, Greater Noida, India


According to our database1, Balamurugan Balusamy authored at least 52 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Energy-efficient cluster head selection in wireless sensor networks-based internet of things (IoT) using fuzzy-based Harris hawks optimization.
Telecommun. Syst., September, 2024

Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks.
J. Supercomput., August, 2024

A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT.
Future Internet, July, 2024

Feature subset selection using heuristic and metaheuristic approaches for diabetes prediction on a binary encoded dataset.
Int. J. Model. Simul. Sci. Comput., June, 2024

Design control and management of intelligent and autonomous nanorobots with artificial intelligence for Prevention and monitoring of blood related diseases.
Eng. Appl. Artif. Intell., 2024

Evaluation of performance enhancement in Ethereum fraud detection using oversampling techniques.
Appl. Soft Comput., 2024

An Explainable AI framework for credit evaluation and analysis.
Appl. Soft Comput., 2024

IMNMAGN: Integrative Multimodal Approach for Enhanced Detection of Neurodegenerative Diseases Using Fusion of Multidomain Analysis With Graph Networks.
IEEE Access, 2024

Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning With Genetic Adaptive Strategies.
IEEE Access, 2024

2023
Optimal feature selection for malware detection in cyber physical systems using graph convolutional network.
Comput. Electr. Eng., May, 2023

Artificial intelligence enabled Luong Attention and Hosmer Lemeshow Regression Window-based attack detection in 6G.
Int. J. Commun. Syst., 2023

2022
Multiscale deep network based multistep prediction of high-dimensional time series from power transmission systems.
Trans. Emerg. Telecommun. Technol., 2022

Transformer anomaly detection based on time-frequency domain software-hardware cooperative analysis.
Trans. Emerg. Telecommun. Technol., 2022

A Succinct Summary of the Solar MPPT Utilizing a Diverse Optimizing Compiler.
Proceedings of the 5th International Conference on Contemporary Computing and Informatics, 2022

2021
Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks.
IEEE Trans. Engineering Management, 2021

Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks.
Int. J. Mach. Learn. Cybern., 2021

Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions.
Math. Comput. Simul., 2021

A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence.
Int. J. Mob. Comput. Multim. Commun., 2021

Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks.
Trans. Emerg. Telecommun. Technol., 2021

2020
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Improving End-Users Utility in Software-Defined Wide Area Network Systems.
IEEE Trans. Netw. Serv. Manag., 2020

Artificial intelligence inspired energy and spectrum aware cluster based routing protocol for cognitive radio sensor networks.
J. Parallel Distributed Comput., 2020

Energy-aware multipath routing protocol for internet of things using network coding techniques.
Int. J. Grid Util. Comput., 2020

Analysing control plane scalability issue of software defined wide area network using simulated annealing technique.
Int. J. Grid Util. Comput., 2020

An intrusion detection scheme based on the ensemble of discriminant classifiers.
Comput. Electr. Eng., 2020

An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks.
IEEE Access, 2020

Chapter Seven - The growing role of integrated and insightful big and real-time data analytics platforms.
Adv. Comput., 2020

Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT).
Neural Comput. Appl., 2019

An optimized hierarchical encryption technique for tamper recognition.
Multim. Tools Appl., 2019

A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019

Hybrid model for security-aware cluster head selection in wireless sensor networks.
IET Wirel. Sens. Syst., 2019

Students university healthy lifestyle practice: quantitative analysis.
Health Inf. Sci. Syst., 2019

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks.
IEEE Access, 2019

2018
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Survey of energy drink consumption and adverse health effects in Lebanon.
Health Inf. Sci. Syst., 2018

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018

Analysis of performance measures to improve the quality of service in cloud based e-government web portal.
Electron. Gov. an Int. J., 2018

A framework for smart traffic management using hybrid clustering techniques.
Clust. Comput., 2018

A Fuzzy Based Hybrid Firefly Optimization Technique for Load Balancing in Cloud Datacenters.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2018

2017
A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System.
Int. J. Netw. Secur., 2017

Providing efficient user management for large-scale enterprise by achieving high scalability over cloud.
Int. J. Internet Protoc. Technol., 2017

Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC.
Int. J. High Perform. Comput. Netw., 2017

Simplified and efficient framework for managing roles in cloud-based transaction processing systems using attribute-based encryption.
Int. J. Comput. Sci. Eng., 2017

Ant colony-based load balancing and fault recovery for cloud computing environment.
Int. J. Adv. Intell. Paradigms, 2017

Availability modeling for multi-tier cloud environment.
Intell. Autom. Soft Comput., 2017

Time efficient secure DNA based access control model for cloud computing environment.
Future Gener. Comput. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2015
Collective advancements on access control scheme for multi-authority cloud storage system.
Int. J. Grid Util. Comput., 2015

Shamir's key based confidentiality on cloud data storage.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Secured fast prediction of cloud data stream with balanced load factor using Ensemble Tree Classification.
Proceedings of the 2015 International Conference on Advances in Computing, 2015


  Loading...