Gulshan Kumar
Orcid: 0000-0001-8013-6140
According to our database1,
Gulshan Kumar
authored at least 100 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Clust. Comput., November, 2024
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval.
Clust. Comput., September, 2024
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT).
IEEE Internet Things J., July, 2024
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities.
Clust. Comput., July, 2024
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things.
Clust. Comput., June, 2024
Internet Things, April, 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments.
Veh. Commun., 2024
IEEE Trans. Dependable Secur. Comput., 2024
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks.
IEEE Internet Things J., 2024
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects.
Eng. Appl. Artif. Intell., 2024
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems.
Eng. Appl. Artif. Intell., 2024
Smart monitoring solution for dengue infection control: A digital twin-inspired approach.
Comput. Methods Programs Biomed., 2024
IEEE Access, 2024
IEEE Access, 2024
2023
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023
Comput. Secur., September, 2023
Comput. Commun., September, 2023
IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms.
Comput. J., January, 2023
Dynamic routing approach for enhancing source location privacy in wireless sensor networks.
Wirel. Networks, 2023
IEEE Trans. Serv. Comput., 2023
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023
IoT-inspired machine learning-assisted sedentary behavior analysis in smart healthcare industry.
J. Ambient Intell. Humaniz. Comput., 2023
Int. J. Netw. Manag., 2023
Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system.
Int. J. Commun. Syst., 2023
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023
2022
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic.
Veh. Commun., 2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022
J. Netw. Comput. Appl., 2022
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022
DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022
Comput. Electr. Eng., 2022
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022
Proceedings of the Workshop on Artificial Intelligence (WAI 2022) Co-located with Computing Congress (CC 2022), Chennai, India,January 28, 2022
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022
Validation of Dozee, a Ballistocardiography-based Device, for Contactless and Continuous Heart Rate and Respiratory Rate Measurement.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022
Classification of Sleep-Wake State in Ballistocardiogram system based on Deep Learning.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network.
Proceedings of the Algorithms, Computing and Mathematics Conference 2022 (ACM 2022), Hybrid Event, Chennai, India, August 29, 2022
2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges.
Soft Comput., 2021
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma.
J. Netw. Comput. Appl., 2021
A fuzzy computational approach for selecting interdependent projects using prioritized criteria.
J. Intell. Fuzzy Syst., 2021
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks.
Int. J. Inf. Comput. Secur., 2021
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021
A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021
CoRR, 2021
Secure Device-to-Device communications for 5G enabled Internet of Things applications.
Comput. Commun., 2021
Comput. Electr. Eng., 2021
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021
Proceedings of the 30th IEEE International Conference on Robot & Human Interactive Communication, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020
MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review.
J. Supercomput., 2020
J. Supercomput., 2020
IEEE Syst. J., 2020
Video-assisted smart health monitoring for affliction determination based on fog analytics.
J. Biomed. Informatics, 2020
J. Inf. Secur. Appl., 2020
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020
Classification Of Sleep-Wake State In A Ballistocardiogram System Based On Deep Learning.
CoRR, 2020
CoRR, 2020
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020
IEEE Access, 2020
Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments.
IEEE Access, 2020
2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019
Sensors, 2019
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019
IEEE Access, 2019
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019
2018
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio.
Wirel. Commun. Mob. Comput., 2018
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN.
Int. J. Inf. Secur. Priv., 2018
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018
2017
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks.
Mob. Inf. Syst., 2017
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2017
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs.
J. Netw. Comput. Appl., 2017
2015
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015
Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence.
Int. J. Cyber Behav. Psychol. Learn., 2015
2012
Secur. Commun. Networks, 2012
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review.
Appl. Comput. Intell. Soft Comput., 2012
2011
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer
CoRR, 2011
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher.
Proceedings of the Security Technology, 2011
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
2010
The use of artificial intelligence based techniques for intrusion detection: a review.
Artif. Intell. Rev., 2010