Inshil Doh
Orcid: 0000-0003-2814-2070
According to our database1,
Inshil Doh
authored at least 58 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Blockchain and differential privacy-based data processing system for data security and privacy in urban computing.
Comput. Commun., 2024
2023
Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System.
Proceedings of the International Conference on Information Networking, 2023
2022
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market.
IEEE Access, 2022
Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing.
IEEE Access, 2022
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022
2021
J. Netw. Comput. Appl., 2021
IEEE Access, 2021
Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement.
Proceedings of the International Conference on Information Networking, 2021
2020
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET.
J. Commun. Networks, 2020
Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network.
IEEE Access, 2020
Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment.
Proceedings of the 2020 International Conference on Information Networking, 2020
Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020
2019
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System.
IEEE Access, 2019
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System.
Proceedings of the 33rd International Conference on Information Networking, 2019
SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
2018
Comput. Sci. Inf. Syst., 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Authorization based on mobile whitelist in devices for device-to-device communications.
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018
2017
Automated parking lot management system using embedded robot type smart car based on wireless sensors.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Securing information flow in content delivery networks with visual and quantum cryptography.
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
2015
Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks.
IEEE Trans. Veh. Technol., 2015
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intell. Autom. Soft Comput., 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
Proceedings of the 2015 International Conference on Information Networking, 2015
2014
Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning.
Int. J. Distributed Sens. Networks, 2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Math. Comput. Model., 2013
Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems.
Trans. Emerg. Telecommun. Technol., 2013
Comput. Sci. Inf. Syst., 2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mob. Inf. Syst., 2011
2009
Int. J. Comput. Sci. Appl., 2009
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
Int. J. Comput. Sci. Appl., 2009
2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Networking, 2006
Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network.
Proceedings of the High Performance Computing and Communications, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
2005
Proceedings of the New Trends in Computer Networks, 2005