Brij B. Gupta
Orcid: 0000-0003-4929-4698Affiliations:
- National Institute of Technology Kurukshetra, India
- Indian Institute of Technology Roorkee, India (PhD)
According to our database1,
Brij B. Gupta
authored at least 431 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on nitkkr.ac.in
On csauthors.net:
Bibliography
2025
Cyber Secur. Appl., 2025
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
Enhanced Virtual Try-On in the Metaverse Leveraging Unet Model for Improved Cloth Detection.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024
Trapezoidal fuzzy number methodology for prioritising the predictors of social media addiction.
Enterp. Inf. Syst., September, 2024
PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network.
IEEE Trans. Comput. Soc. Syst., August, 2024
A systematic data-driven approach for targeted marketing in enterprise information system.
Enterp. Inf. Syst., August, 2024
Guest Editorial Special Issue on Future Trends and Transition in Connected and Autonomous Transportation With Artificial Intelligence and Robotics.
IEEE Trans Autom. Sci. Eng., July, 2024
Sensors, July, 2024
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks.
IET Cyper-Phys. Syst.: Theory & Appl., June, 2024
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2024
A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J., May, 2024
Features level sentiment mining in enterprise systems from informal text corpus using machine learning techniques.
Enterp. Inf. Syst., May, 2024
Navigating the security landscape of large language models in enterprise information systems.
Enterp. Inf. Syst., April, 2024
Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024
Secure and Privacy-Preserving Decentralized Federated Learning for Personalized Recommendations in Consumer Electronics Using Blockchain and Homomorphic Encryption.
IEEE Trans. Consumer Electron., February, 2024
A novel Cumulative Indicator score using Indicator averaging for optimizing local business websites of enterprise systems.
Enterp. Inf. Syst., February, 2024
A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic.
Neural Comput. Appl., January, 2024
IEEE Trans. Engineering Management, 2024
Fog-Enabled Secure and Efficient Fine-Grained Searchable Data Sharing and Management Scheme for IoT-Based Healthcare Systems.
IEEE Trans. Engineering Management, 2024
Leveraging Probabilistic Optimization for Digital Transformation Maturity Evaluation of Construction Enterprises.
IEEE Trans. Engineering Management, 2024
J. Ind. Inf. Integr., 2024
A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024
Int. J. Intell. Networks, 2024
Prioritizing user requirements for digital products using explainable artificial intelligence: A data-driven analysis on video conferencing apps.
Future Gener. Comput. Syst., 2024
Cyber Secur. Appl., 2024
Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments.
Cyber Secur. Appl., 2024
A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols.
Comput. Electr. Eng., 2024
Thai-language chatbot security: Detecting instruction attacks with XLM-RoBERTa and Bi-GRU.
Comput. Electr. Eng., 2024
CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications.
Comput. Electr. Eng., 2024
Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption.
Comput. Electr. Eng., 2024
Fuzzy logic and biometric-based lightweight cryptographic authentication for metaverse security.
Appl. Soft Comput., 2024
Deep Learning Model for Driver Behavior Detection in Cyber-Physical System-Based Intelligent Transport Systems.
IEEE Access, 2024
Securing NetSoftIoT Environments with Enhanced Attack Detection Using RandomForest and LSTM in SDN.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024
Intelligent FaultEdge: AI-Driven Fault-Tolerant Edge Framework for Smart Grid Monitoring in IoT.
Proceedings of the 12th IEEE International Conference on Intelligent Systems, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Revolutionizing Healthcare Systems: Synergistic Multimodal Ensemble Learning & Knowledge Transfer for Lung Cancer Delineation & Taxonomy.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Autoencoders Based Optimized Deep Learning Model for the Detection of Cyber Attack in IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Enhancing Email Security in Consumer Electronics with a Hybrid Deep Learning Approach.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Towards Sustainable Consumer Electronics: DL-based SoH and RUL Prediction for E-Waste Reduction.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Deep Learning and Big Data Integration with Cuckoo Search Optimization for Robust Phishing Attack Detection.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Enhancing Intrusion Detection in Software Defined Networks with Optimized Feature Selection and Logistic Regression.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Secure Integration of Internet of Things with Cloud Computing Using Optimized Feature Selection and Convolutional Neural Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Optimal Machine Learning Approach for EEG Eye-State Classification in Metaverse Environment.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Lightweight Deep Learning Model and Genetic Algorithm Based Optimal Phishing Website Detection.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
Efficient DDoS Attack Detection through Lightweight Deep Learning Model in Cloud Computing Environment.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
Deep Neural Network Framework for the Identification of Smoking Events in 6G and Cloud-Enabled Smart Cities.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
World Scientific Series on Future Computing Paradigms and Applications 1, WorldScientific, ISBN: 9789811257131, 2024
World Scientific Series on Future Computing Paradigms and Applications 2, WorldScientific, ISBN: 9789811255991, 2024
2023
IEEE Trans. Vis. Comput. Graph., December, 2023
Personal Mobility in Metaverse With Autonomous Vehicles Using Q-Rung Orthopair Fuzzy Sets Based OPA-RAFSI Model.
IEEE Trans. Intell. Transp. Syst., December, 2023
Determination of Critical Edges in Air Route Network Using Modified Weighted Sum Method and Grey Relational Analysis.
IEEE Trans. Intell. Transp. Syst., December, 2023
Evaluating the Sustainable COVID-19 Vaccination Framework of India Using Recurrent Neural Networks.
Wirel. Pers. Commun., November, 2023
Analysis of cutting-edge technologies for enterprise information system and management.
Enterp. Inf. Syst., November, 2023
A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities.
Sensors, October, 2023
Lights, Camera, Metaverse!: Eliciting Intention to Use Industrial Metaverse, Organizational Agility, and Firm Performance.
J. Glob. Inf. Manag., October, 2023
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023
Clust. Comput., October, 2023
Novel Graph-Based Machine Learning Technique to Secure Smart Vehicles in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., August, 2023
Co-Design Dedicated System for Efficient Object Tracking Using Swarm Intelligence-Oriented Search Strategies.
Sensors, July, 2023
IoT-based health monitoring system to handle pandemic diseases using estimated computing.
Neural Comput. Appl., July, 2023
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures.
J. Ambient Intell. Humaniz. Comput., July, 2023
A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare.
Future Gener. Comput. Syst., July, 2023
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023
A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing.
IEEE Internet Things J., June, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
IEEE Trans. Consumer Electron., May, 2023
IEEE Trans. Consumer Electron., May, 2023
Secure authentication and privacy-preserving blockchain for industrial internet of things.
Comput. Electr. Eng., May, 2023
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023
The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023
Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS).
Neural Comput. Appl., March, 2023
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system.
Enterp. Inf. Syst., March, 2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
Identity-Based Authentication Mechanism for Secure Information Sharing in the Maritime Transport System.
IEEE Trans. Intell. Transp. Syst., February, 2023
Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms.
Telecommun. Syst., February, 2023
GAN-Siamese Network for Cross-Domain Vehicle Re-Identification in Intelligent Transport Systems.
IEEE Trans. Netw. Sci. Eng., 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Ind. Informatics, 2023
Deep Network-Enabled Haze Visibility Enhancement for Visual IoT-Driven Intelligent Transportation Systems.
IEEE Trans. Ind. Informatics, 2023
Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology.
Soft Comput., 2023
Cyberbullying in the Metaverse: A Prescriptive Perception on Global Information Systems for User Protection.
J. Glob. Inf. Manag., 2023
Building the Metaverse: Design Considerations, Socio-Technical Elements, and Future Research Directions of Metaverse.
J. Glob. Inf. Manag., 2023
Analysis of the Role of Global Information Management in Advanced Decision Support Systems (DSS) for Sustainable Development.
J. Glob. Inf. Manag., 2023
Metaverse integration alternatives of connected autonomous vehicles with self-powered sensors using fuzzy decision making model.
Inf. Sci., 2023
Secure Decision Approach for Internet of Healthcare Things Smart-System-Based Blockchain.
IEEE Internet Things J., 2023
A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions.
Inf., 2023
A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet.
Int. J. Semantic Web Inf. Syst., 2023
A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques.
Int. J. Semantic Web Inf. Syst., 2023
Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities.
Int. J. Semantic Web Inf. Syst., 2023
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments.
Int. J. Softw. Sci. Comput. Intell., 2023
Int. J. Inf. Secur. Priv., 2023
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network.
Int. J. Inf. Sec., 2023
Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection.
Int. J. Intell. Syst., 2023
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset.
Int. J. Intell. Networks, 2023
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds.
Int. J. Cloud Appl. Comput., 2023
Comput. Secur., 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the Tenth International Conference on Software Defined Systems, 2023
A Deep CNN-based Framework for Distributed Denial of Services (DDoS) Attack Detection in Internet of Things (IoT).
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
Hyperdimensional Consumer Pattern Analysis with Quantum Neural Architectures using Non-Hermitian Operators.
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023
Proceedings of the 5th International Conference on Information Management & Machine Intelligence, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023
A Secure Blockchain-Based Authentication Control Framework for Cyber-Physical-Social System (CPSS) Big Data.
Proceedings of the IEEE Global Communications Conference, 2023
Machine Learning-Based DDoS Mitigation Framework for Unmanned Aerial Vehicles (UAV) Environment Using Software-Defined Networks (SDN).
Proceedings of the IEEE Global Communications Conference, 2023
Recent Research on Artificial Intelligence, Machine Learning, and Deep Learning in Consumer Electronics Technology.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
A DDoS Attack Detection System for Industry 5.0 using Digital Twins and Machine Learning.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
Proceedings of the Edge Computing - EDGE 2023, 2023
Proceedings of the Computational Data and Social Networks - 12th International Conference, 2023
Revolutionizing Human-Machine Interaction through Hand Gesture Recognition in 6G-Enabled Metaverse Environments.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023
2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022
Machine learning algorithms for smart and intelligent healthcare system in Society 5.0.
Int. J. Intell. Syst., December, 2022
Ensemble feature selection for multi-label text classification: An intelligent order statistics approach.
Int. J. Intell. Syst., December, 2022
An efficient hardware supported and parallelization architecture for intelligent systems to overcome speculative overheads.
Int. J. Intell. Syst., December, 2022
A methodological framework for extreme climate risk assessment integrating satellite and location based data sets in intelligent systems.
Int. J. Intell. Syst., December, 2022
A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems.
Int. J. Intell. Syst., December, 2022
A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques.
Int. J. Intell. Syst., December, 2022
A comprehensive analysis of blockchain and its applications in intelligent systems based on IoT, cloud and social media.
Int. J. Intell. Syst., December, 2022
ACM Trans. Internet Techn., November, 2022
Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0.
Wirel. Networks, 2022
ACM Trans. Internet Techn., 2022
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities.
ACM Trans. Internet Techn., 2022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022
A Fine-Grained Access Control and Security Approach for Intelligent Vehicular Transport in 6G Communication System.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Renewable Energy Re-Distribution via Multiscale IoT for 6G-Oriented Green Highway Management.
IEEE Trans. Intell. Transp. Syst., 2022
Guest Editorial Artificial Intelligence and Deep Learning for Intelligent and Sustainable Traffic and Vehicle Management (VANETs).
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
SDN-Assisted Safety Message Dissemination Framework for Vehicular Critical Energy Infrastructure.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks.
Telecommun. Syst., 2022
IEEE Trans. Aerosp. Electron. Syst., 2022
An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model.
Pattern Recognit. Lett., 2022
Neural Comput. Appl., 2022
Building a knowledge graph by using cross-lingual transfer method and distributed MinIE algorithm on apache spark.
Neural Comput. Appl., 2022
Neural Comput. Appl., 2022
Multim. Syst., 2022
J. Web Eng., 2022
A Robust Authentication System With Application Anonymity in Multiple Identity Smart Cards.
J. Inf. Technol. Res., 2022
XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks.
J. Circuits Syst. Comput., 2022
Guest Editorial: Deep Learning Assisted Visual IoT Technologies for Critical Infrastructure Protection.
IEEE Internet Things Mag., 2022
Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment.
IEEE Internet Things J., 2022
Multiagent Federated Reinforcement Learning for Secure Incentive Mechanism in Intelligent Cyber-Physical Systems.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions.
Int. J. Semantic Web Inf. Syst., 2022
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study.
Int. J. Semantic Web Inf. Syst., 2022
Multiobjective whale optimization algorithm-based feature selection for intelligent systems.
Int. J. Intell. Syst., 2022
Blockchain technology with its application in medical and healthcare systems: A survey.
Int. J. Intell. Syst., 2022
CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT using Machine Learning.
Int. J. Interact. Multim. Artif. Intell., 2022
Future Gener. Comput. Syst., 2022
GreenCloudNet++: Simulation framework for energy efficient and secure, green job scheduling in geographically distributed data centers.
Trans. Emerg. Telecommun. Technol., 2022
A survey of phishing attack techniques, defence mechanisms and open research challenges.
Enterp. Inf. Syst., 2022
Enterp. Inf. Syst., 2022
A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense.
Comput. Secur., 2022
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system.
Comput. Secur., 2022
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers.
Comput. Electr. Eng., 2022
Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach.
Big Data Res., 2022
A Deep Learning Approach to Protecting Cultural Heritage Buildings Through IoT-Based Systems.
Proceedings of the 2022 IEEE International Conference on Smart Computing, 2022
Proceedings of the IEEE International Conference on Consumer Electronics, 2022
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022
A Novel Approach of Securing Medical Cyber Physical Systems (MCPS) from DDoS Attacks.
Proceedings of the Big Data Intelligence and Computing, 2022
Proceedings of the Big Data Intelligence and Computing, 2022
2021
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms.
Wirel. Networks, 2021
J. Comput. Virol. Hacking Tech., 2021
A Multimodal, Multimedia Point-of-Care Deep Learning Framework for COVID-19 Diagnosis.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images.
ACM Trans. Internet Techn., 2021
Adaptive Feature Selection and Construction for Day-Ahead Load Forecasting Use Deep Learning Method.
IEEE Trans. Netw. Serv. Manag., 2021
Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things.
IEEE Trans. Green Commun. Netw., 2021
Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller.
Telecommun. Syst., 2021
A secure and efficient key agreement framework for critical energy infrastructure using mobile device.
Telecommun. Syst., 2021
Developing a Vietnamese Tourism Question Answering System Using Knowledge Graph and Deep Learning.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021
Correction to: A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021
Soft Comput., 2021
Extended-Range Prediction Model Using NSGA-III Optimized RNN-GRU-LSTM for Driver Stress and Drowsiness.
Sensors, 2021
Handling Data Heterogeneity in Electricity Load Disaggregation via Optimized Complete Ensemble Empirical Mode Decomposition and Wavelet Packet Transform.
Sensors, 2021
A trust infrastructure based authentication method for clustered vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2021
A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack.
Mob. Networks Appl., 2021
Int. J. Mach. Learn. Cybern., 2021
Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model.
J. Parallel Distributed Comput., 2021
A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server.
J. Organ. End User Comput., 2021
J. Inf. Technol. Res., 2021
Harness the Global Impact of Big Data in Nurturing Social Entrepreneurship: A Systematic Literature Re view.
J. Glob. Inf. Manag., 2021
Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems.
J. Glob. Inf. Manag., 2021
Inf. Process. Manag., 2021
IEEE Internet Things J., 2021
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.
IEEE Internet Things J., 2021
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System.
IEEE CAA J. Autom. Sinica, 2021
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense.
Future Gener. Comput. Syst., 2021
Enterp. Inf. Syst., 2021
Comput. Syst. Sci. Eng., 2021
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things.
Comput. Commun., 2021
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment.
Comput. Commun., 2021
Comput. Electr. Eng., 2021
Multiple features based approach for automatic fake news detection on social networks using deep learning.
Appl. Soft Comput., 2021
An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities.
Appl. Soft Comput., 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
A Novel Approach for Fake Comments and Reviews Detection on the Online Social Networks.
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Proceedings of International Conference on Smart Systems and Advanced Computing, 2021
Clustering based Rewarding Algorithm to Detect Adversaries in Federated Machine Learning based IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Mitigating Botnet based DDoS Attacks by Selecting Incentivized Cooperating ISPs for Risk Transfer.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021
The early detection of malicious communication with DNS traffic through the use of simple features.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021
A Big Data and Deep Learning based Approach for DDoS Detection in Cloud Computing Environment.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021
Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021
2020
IEEE Trans. Sustain. Comput., 2020
IEEE Trans. Serv. Comput., 2020
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment.
Soft Comput., 2020
Pattern Recognit. Lett., 2020
Secure Fine-Grained Keyword Search With Efficient User Revocation and Traitor Tracing in the Cloud.
J. Organ. End User Comput., 2020
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure.
J. Organ. End User Comput., 2020
J. Inf. Technol. Res., 2020
J. Inf. Technol. Res., 2020
A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures.
J. Glob. Inf. Manag., 2020
Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags.
Int. J. Semantic Web Inf. Syst., 2020
Int. J. Inf. Comput. Secur., 2020
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN.
Int. J. Inf. Comput. Secur., 2020
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks.
Int. J. E Serv. Mob. Appl., 2020
Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications.
Int. J. Embed. Syst., 2020
Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles.
Int. J. Embed. Syst., 2020
An internet-of-things-based security scheme for healthcare environment for robust location privacy.
Int. J. Comput. Sci. Eng., 2020
A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection.
Enterp. Inf. Syst., 2020
An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud.
Concurr. Comput. Pract. Exp., 2020
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols.
Concurr. Comput. Pract. Exp., 2020
Comput. Secur., 2020
ICO, 2020
Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning Environment.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
IEEE Trans. Sustain. Comput., 2019
Soft Computing-Based EEG Classification by Optimal Feature Selection and Neural Networks.
IEEE Trans. Ind. Informatics, 2019
A novel coverless information hiding method based on the average pixel value of the sub-images.
Multim. Tools Appl., 2019
Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank prior.
Multim. Tools Appl., 2019
Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques.
Multim. Tools Appl., 2019
Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis.
Multim. Tools Appl., 2019
An efficient employment of internet of multimedia things in smart and future agriculture.
Multim. Tools Appl., 2019
J. Univers. Comput. Sci., 2019
J. Inf. Technol. Res., 2019
ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor.
J. Inf. Technol. Res., 2019
A machine learning based approach for phishing detection using hyperlinks information.
J. Ambient Intell. Humaniz. Comput., 2019
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions.
J. Ambient Intell. Humaniz. Comput., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment.
J. Ambient Intell. Humaniz. Comput., 2019
Efficient fingerprint matching on smart cards for high security and privacy in smart systems.
Inf. Sci., 2019
A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019
IEEE Internet Things J., 2019
A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network.
Int. J. Inf. Technol. Web Eng., 2019
A novel ECC-based lightweight authentication protocol for internet of things devices.
Int. J. High Perform. Comput. Netw., 2019
Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches.
Int. J. E Serv. Mob. Appl., 2019
Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search.
Int. J. E Serv. Mob. Appl., 2019
Classification of various attacks and their defence mechanism in online social networks: a survey.
Enterp. Inf. Syst., 2019
A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network.
Concurr. Comput. Pract. Exp., 2019
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment.
Clust. Comput., 2019
Comput. Electr. Eng., 2019
Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism.
Comput. Electr. Eng., 2019
IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Towards detection of phishing websites on client-side using machine learning based approach.
Telecommun. Syst., 2018
Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommun. Syst., 2018
Telecommun. Syst., 2018
Sustain. Comput. Informatics Syst., 2018
Introduction to special issue on recent advances on sustainability for green cloud and fog computing.
Sustain. Comput. Informatics Syst., 2018
Soft Comput., 2018
Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multim. Tools Appl., 2018
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multim. Tools Appl., 2018
Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing.
Multim. Tools Appl., 2018
XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Parallel Distributed Comput., 2018
The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018
J. Comput. Sci., 2018
Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews.
J. Comput. Sci., 2018
J. Ambient Intell. Humaniz. Comput., 2018
Plague of cross-site scripting on web applications: a review, taxonomy and challenges.
Int. J. Web Based Communities, 2018
Int. J. Netw. Virtual Organisations, 2018
Int. J. Inf. Commun. Technol., 2018
Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation.
Int. J. Inf. Comput. Secur., 2018
Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks.
Int. J. Inf. Comput. Secur., 2018
Int. J. E Serv. Mob. Appl., 2018
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices.
Int. J. E Serv. Mob. Appl., 2018
Petri net-based verification of security protocol implementation in software evolution.
Int. J. Embed. Syst., 2018
Int. J. Cloud Appl. Comput., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings.
Future Gener. Comput. Syst., 2018
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Gener. Comput. Syst., 2018
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Trans. Emerg. Telecommun. Technol., 2018
SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurr. Comput. Pract. Exp., 2018
IEEE Commun. Mag., 2018
Comput. Electr. Eng., 2018
Appl. Soft Comput., 2018
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018
Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things.
IEEE Access, 2018
Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks.
IEEE Access, 2018
Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Economic incentive based solution against distributed denial of service attacks for IoT customers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
2017
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
J. Supercomput., 2017
Internet of surveillance: a cloud supported large-scale wireless surveillance system.
J. Supercomput., 2017
Secur. Commun. Networks, 2017
Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
Int. J. Syst. Assur. Eng. Manag., 2017
Neural Comput. Appl., 2017
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Comput. Appl., 2017
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multim. Tools Appl., 2017
Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations.
Multim. Tools Appl., 2017
Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing.
Int. J. Web Serv. Res., 2017
J. Real Time Image Process., 2017
Int. J. Embed. Syst., 2017
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud.
Int. J. Cloud Appl. Comput., 2017
Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges.
Int. J. Cloud Appl. Comput., 2017
A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
Int. J. Adv. Intell. Paradigms, 2017
Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Gener. Comput. Syst., 2017
Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017
Comput. J., 2017
Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017
Ann. des Télécommunications, 2017
A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone.
IEEE Access, 2017
Efficient Large-scale Medical Data (eHealth Big Data) Analytics in Internet of Things.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017
2016
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
Secur. Commun. Networks, 2016
JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities.
Secur. Commun. Networks, 2016
A novel approach to protect against phishing attacks at client side using auto-updated white-list.
EURASIP J. Inf. Secur., 2016
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Inf. Secur., 2016
An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
2015
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015
PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015
2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
2013
Proceedings of the Mining Social Networks and Security Informatics, 2013
Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
CoRR, 2013
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013
2012
Int. J. Netw. Secur., 2012
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012
J. Comput. Inf. Technol., 2012
2011
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the European Intelligence and Security Informatics Conference, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
Int. J. Multim. Intell. Secur., 2010
2009
Inf. Secur. J. A Glob. Perspect., 2009
2008
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008