Deepak Puthal
Orcid: 0000-0002-8332-278X
According to our database1,
Deepak Puthal
authored at least 195 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence.
IEEE Trans. Netw. Serv. Manag., June, 2024
IEEE Consumer Electron. Mag., March, 2024
IEEE Consumer Electron. Mag., March, 2024
IEEE Consumer Electron. Mag., January, 2024
IEEE Trans. Engineering Management, 2024
Special issue on collaborative edge computing for secure and scalable Internet of Things.
Softw. Pract. Exp., 2024
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow.
Future Gener. Comput. Syst., 2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024
Guest Editorial: Special issue on trustworthy machine learning for behavioural and social computing.
CAAI Trans. Intell. Technol., 2024
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
2023
IEEE Commun. Stand. Mag., December, 2023
IEEE Consumer Electron. Mag., July, 2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023
Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT.
ACM Trans. Sens. Networks, May, 2023
Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment.
IEEE Consumer Electron. Mag., May, 2023
IET Networks, March, 2023
Comput. Intell., February, 2023
IEEE Trans. Netw. Sci. Eng., 2023
EasyChain: an IoT-friendly blockchain for robust and energy-efficient authentication.
Frontiers Blockchain, 2023
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Fortified-Edge 2.0: Machine Learning based Monitoring and Authentication of PUF-Integrated Secure Edge Data Center.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023
A 2-Colorable DODAG Structured Hybrid Mode of Operations Architecture for RPL Protocol to Reduce Communication Overhead.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023
Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023
Privacy-aware Adaptive Collaborative Learning Approach for Distributed Edge Networks.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain Storage.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
A Hybrid Encryption Approach using DNA-Based Shift Protected Algorithm and AES for Edge-Cloud System Security.
Proceedings of the OITS International Conference on Information Technology, 2023
SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Netw. Serv. Manag., 2022
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network.
J. Supercomput., 2022
Guest Editorial Special Issue on Computational Intelligence in Big Graph Data Management.
IEEE Trans. Emerg. Top. Comput. Intell., 2022
SN Comput. Sci., 2022
A Systematic Review on Healthcare Artificial Intelligent Conversational Agents for Chronic Conditions.
Sensors, 2022
A fuzzy rule-based efficient hospital bed management approach for coronavirus disease-19 infected patients.
Neural Comput. Appl., 2022
Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".
Inf. Syst. Frontiers, 2022
Toward Advanced UAV Communications: Properties, Research Challenges, and Future Potential.
IEEE Internet Things Mag., 2022
Int. J. Comput. Appl. Technol., 2022
A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems.
Future Internet, 2022
IEEE Intell. Syst., 2022
Privacy-preserving cooperative localization in vehicular edge computing infrastructure.
Concurr. Comput. Pract. Exp., 2022
IEEE Consumer Electron. Mag., 2022
Comput. Electr. Eng., 2022
Big Data Cogn. Comput., 2022
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022
PharmaChain 2.0: A Blockchain Framework for Secure Remote Monitoring of Drug Environmental Parameters in Pharmaceutical Cold Supply Chain.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022
PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022
Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the OITS International Conference on Information Technology, 2022
PharmaChain 3.0: Blockchain Integrated Efficient QR Code Mechanism for Pharmaceutical Supply Chain.
Proceedings of the OITS International Conference on Information Technology, 2022
2021
Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management.
IEEE Trans. Netw. Serv. Manag., 2021
AI-Enabled Fingerprinting and Crowdsource-Based Vehicle Localization for Resilient and Safe Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Running Industrial Workflow Applications in a Software-Defined Multicloud Environment Using Green Energy Aware Scheduling Algorithm.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Computers, 2021
Integration of Internet of Things and blockchain toward portability and low-energy consumption.
Trans. Emerg. Telecommun. Technol., 2021
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey.
ACM Comput. Surv., 2021
IEEE Consumer Electron. Mag., 2021
IEEE Consumer Electron. Mag., 2021
IEEE Consumer Electron. Mag., 2021
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021
Multilevel Color Image Segmentation using Modified Fuzzy Entropy and Cuckoo Search Algorithm.
Proceedings of the 30th IEEE International Conference on Fuzzy Systems, 2021
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Software Defined Internet of Things Security: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2020
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks.
Veh. Commun., 2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Netw. Serv. Manag., 2020
ACM Trans. Cyber Phys. Syst., 2020
IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments.
Softw. Pract. Exp., 2020
IoTSim-SDWAN: A simulation framework for interconnecting distributed datacenters over Software-Defined Wide Area Network (SD-WAN).
J. Parallel Distributed Comput., 2020
J. Parallel Distributed Comput., 2020
PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things.
IEEE Internet Things J., 2020
ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT.
IEEE Internet Things J., 2020
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks.
Future Gener. Comput. Syst., 2020
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control.
Future Gener. Comput. Syst., 2020
PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks.
CoRR, 2020
PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE).
IEEE Consumer Electron. Mag., 2020
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020
McPoRA: A Multi-chain Proof of Rapid Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems.
Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020
Proceedings of the IEEE Congress on Evolutionary Computation, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.
IEEE Wirel. Commun., 2019
IEEE Wirel. Commun., 2019
PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things.
IEEE Trans. Consumer Electron., 2019
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019
Secur. Commun. Networks, 2019
J. Parallel Distributed Comput., 2019
Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Orchestrating Development Lifecycle of Machine Learning Based IoT Applications: A Survey.
CoRR, 2019
IoTSim-Edge: A Simulation Framework for Modeling the Behaviour of IoT and Edge Computing Environments.
CoRR, 2019
Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
Concurr. Comput. Pract. Exp., 2019
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World.
IEEE Commun. Surv. Tutorials, 2019
Computing, 2019
IEEE Consumer Electron. Mag., 2019
Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart Environments.
IEEE Consumer Electron. Mag., 2019
Comput. Electr. Eng., 2019
IEEE Access, 2019
A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios.
IEEE Access, 2019
PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT).
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Algorithmic Aspects of Cloud Computing - 5th International Symposium, 2019
2018
J. Supercomput., 2018
Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications.
IEEE Trans. Ind. Informatics, 2018
Sustain. Comput. Informatics Syst., 2018
Accurate Traffic Flow Prediction in Heterogeneous Vehicular Networks in an Intelligent Transport System Using a Supervised Non-Parametric Classifier.
Sensors, 2018
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
Mob. Networks Appl., 2018
On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
J. Syst. Softw., 2018
J. Parallel Distributed Comput., 2018
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics.
Future Gener. Comput. Syst., 2018
Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure.
IEEE Commun. Surv. Tutorials, 2018
Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels.
Comput. Networks, 2018
IEEE Commun. Mag., 2018
Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need.
IEEE Consumer Electron. Mag., 2018
Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices.
IEEE Consumer Electron. Mag., 2018
IEEE Consumer Electron. Mag., 2018
Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems.
IEEE Consumer Electron. Mag., 2018
IEEE Consumer Electron. Mag., 2018
A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018
Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018
Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment.
IEEE Access, 2018
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the International Conference on Information Technology, 2018
Proceedings of the International Conference on Information Technology, 2018
Proceedings of the Australasian Computer Science Week Multiconference, 2018
2017
PhD thesis, 2017
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017
J. Supercomput., 2017
DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embed. Comput. Syst., 2017
A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017
Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks.
IEEE Consumer Electron. Mag., 2017
Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electron. Mag., 2017
MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Private matching and set intersection computation in multi-agent and industrial control systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017
Proceedings of the 2017 International Conference on Information Technology, 2017
Proceedings of the 2017 International Conference on Information Technology, 2017
2016
IEEE Cloud Comput., 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015
2014
CoRR, 2014
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013