Gaurav Choudhary

Orcid: 0000-0003-3378-2945

According to our database1, Gaurav Choudhary authored at least 38 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Deep Learning-Based Hybrid CNN-LSTM Model for Location-Aware Web Service Recommendation.
Neural Process. Lett., October, 2024

HVDFusion: an effective fusion framework based on Hilbert vibration decomposition for multi-focal and multi-sensor images.
Signal Image Video Process., September, 2024

Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation.
Future Internet, August, 2024

FC-CACPHS: fog-cloud assisted context-aware framework for cyber-physical healthcare system.
Int. J. Ad Hoc Ubiquitous Comput., 2024

2023
Mathematical modeling and simulation of multi-focus image fusion techniques using the effect of image enhancement criteria: a systematic review and performance evaluation.
Artif. Intell. Rev., November, 2023

Blockchain-Based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices.
IEEE J. Biomed. Health Informatics, February, 2023

Fake Base Station Detection and Localization in 5G Network: A Proof of Concept.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

On the Possibility of Estimating Myocardial Fiber Architecture from Cardiac Strains.
Proceedings of the Functional Imaging and Modeling of the Heart, 2023

2022
Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network.
Sensors, 2022

Study and Investigation on 5G Technology: A Systematic Review.
Sensors, 2022

Emerging Cyber Security Challenges after COVID Pandemic: A Survey.
J. Internet Serv. Inf. Secur., 2022

ML-Based 5G Network Slicing Security: A Comprehensive Survey.
Future Internet, 2022

Cyber security challenges in aviation communication, navigation, and surveillance.
Comput. Secur., 2022

Software-Defined Network Based Secure Internet-Enabled Video Surveillance System.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

DyBAnd: Dynamic Behavior Based Android Malware Detection.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Improvised Model for Blockchain in Distributed Cloud Environment.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Sandbox Environment for Real Time Malware Analysis of IoT Devices.
Proceedings of the Computing Science, Communication and Security, 2022

2021
TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System.
IEEE J. Biomed. Health Informatics, 2021

De-LADY: Deep learning based Android malware detection using Dynamic features.
J. Internet Serv. Inf. Secur., 2021

An Assistive Tool For Fileless Malware Detection.
Proceedings of the 2021 World Automation Congress, 2021

Forensic Analysis of Fitness Applications on Android.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Fingerprint Defender: Defense Against Browser-Based User Tracking.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Future Applications of Blockchain in Education Sector: A Semantic Review.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

A Multi-Controller Authentication approach for SDN.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

2020
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems.
IEEE Trans. Netw. Serv. Manag., 2020

2019
5G wireless P2MP backhaul security protocol: an adaptive approach.
EURASIP J. Wirel. Commun. Netw., 2019

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks.
CoRR, 2019

Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol.
Comput. Electr. Eng., 2019

2018
An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
Sensors, 2018

Security of 5G-Mobile Backhaul Networks: A Survey.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

A Survey on the Security of Pervasive Online Social Networks (POSNs).
J. Internet Serv. Inf. Secur., 2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives.
CoRR, 2018

Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications.
CoRR, 2018

Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT).
IEEE Access, 2018

On IoT Misbehavior Detection in Cyber Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2012
Plagiarism detection in text using Vector Space Model.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012


  Loading...