Himanshu Upadhyay

Orcid: 0000-0002-2958-0526

According to our database1, Himanshu Upadhyay authored at least 21 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Quantum LSTM-based approach to cyber threat detection in virtual environment.
J. Supercomput., January, 2025

2024
AI-based detection and identification of low-level nuclear waste: a comparative analysis.
Neural Comput. Appl., November, 2024

Evaluating Trust Management Frameworks for Wireless Sensor Networks.
Sensors, May, 2024

2023
A Blockchain-Facilitated Secure Sensing Data Processing and Logging System.
IEEE Access, 2023

Virtualization and Validation of Emulated STM-32 Blue Pill Using the QEMU Open-Source Framework.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Vision Transformer-Based Emotion Detection in HCI for Enhanced Interaction.
Proceedings of the Intelligent Human Computer Interaction - 15th International Conference, 2023

2022
Cloudlet-enabled wireless body area networks (WBANs): a systematic review, architecture, and research directions for QoS improvement.
Int. J. Syst. Assur. Eng. Manag., 2022

Evaluation of the trends in jobs and skill-sets using data analytics: a case study.
J. Big Data, 2022

Algorithmic Analysis of Automatic Attendance System Using Facial Recognition: A Revolutionary Approach for Future Education.
Int. J. Decis. Support Syst. Technol., 2022

A Multi-layered Deep Learning Approach for Human Stress Detection.
Proceedings of the Intelligent Human Computer Interaction, 2022

Ada-Thres: An Adaptive Thresholding Method To Mitigate The False Alarms.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Knowledge Extraction in Digit Recognition Using MNIST Dataset: Evolution in Handwriting Analysis.
Int. J. Knowl. Manag., 2021

Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle.
Future Internet, 2021

Design and Implementation of a Blockchain-Enabled Secure Sensing Data Processing and Logging System.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

2020
File integrity monitoring tools: Issues, challenges, and solutions.
Concurr. Comput. Pract. Exp., 2020

Learning-based models to detect runtime phishing activities using URLs.
Proceedings of the ICCDA 2020: The 4th International Conference on Compute and Data Analysis, 2020

2019
Deep learning approach to detect malicious attacks at system level: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

2018
Machine Learning Approach for Malware Detection Using Random Forest Classifier on Process List Data Structure.
Proceedings of the 2nd International Conference on Information System and Data Mining, 2018

Windows Virtualization Architecture For Cyber Threats Detection.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
Design of Virtualization Framework to Detect Cyber Threats in Linux Environment.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017


  Loading...