K. Selvamani

According to our database1, K. Selvamani authored at least 14 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DAD: Domain Adversarial Defense System Against DDoS Attacks in Cloud.
IEEE Trans. Netw. Serv. Manag., 2022

A novel data aggregation using multi objective based male lion optimization algorithm (DA-MOMLOA) in wireless sensor network.
J. Ambient Intell. Humaniz. Comput., 2022

2020
Optimal Resource allocation in NOMA-based M2M communication using Hybrid Rider Optimization with FireFly: Power Saving Strategy of IoT.
Int. J. Commun. Syst., 2020

Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing.
CoRR, 2020

An efficient energy-aware routing scheme for cloud-assisted MANETs in 5G.
Ad Hoc Networks, 2020

2019
Cluster Head Selection Framework for Risk Awareness Enabled IoT Networks Using Ant Lion Optimisation Approach.
Wirel. Pers. Commun., 2019

Subunit sign modeling framework for continuous sign language recognition.
Comput. Electr. Eng., 2019

2018
Enhanced dynamic programming approach for subunit modelling to handle segmentation and recognition ambiguities in sign language.
J. Parallel Distributed Comput., 2018

2017
Extricating Manual and Non-Manual Features for Subunit Level Medical Sign Modelling in Automatic Sign Language Classification and Recognition.
J. Medical Syst., 2017

2014
An enhanced model for effective recognition and segmentation of SLG in dynamic video sequence using boosted learning algorithm.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

An intelligent agent based privacy preserving model for Web Service security.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

An energy efficient multipath routing scheme by preventing threats in Wireless Sensor Networks.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2012
A secure key transfer protocol for group communication
CoRR, 2012

2010
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side
CoRR, 2010


  Loading...