L. Jegatha Deborah
Orcid: 0000-0001-8069-3801
According to our database1,
L. Jegatha Deborah
authored at least 39 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Two-Stage Differential Privacy Scheme for Federated Learning Based on Edge Intelligence.
IEEE J. Biomed. Health Informatics, June, 2024
2023
Pers. Ubiquitous Comput., December, 2023
Secure session key pairing and a lightweight key authentication scheme for liable drone services.
Cyber Secur. Appl., December, 2023
Optimized traffic flow prediction based on cluster formation and reinforcement learning.
Int. J. Commun. Syst., August, 2023
An efficient key agreement and authentication protocol for secure communication in industrial IoT applications.
J. Ambient Intell. Humaniz. Comput., March, 2023
2022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022
Imaging based cervical cancer diagnostics using small object detection - generative adversarial networks.
Multim. Tools Appl., 2022
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception.
Int. J. Softw. Sci. Comput. Intell., 2022
An Improvement of Yield Production Rate for Crops by Predicting Disease Rate Using Intelligent Decision Systems.
Int. J. Softw. Sci. Comput. Intell., 2022
Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication.
Int. J. Cloud Appl. Comput., 2022
Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning.
Comput. J., 2022
2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain.
J. Syst. Archit., 2021
Inf. Syst. Frontiers, 2021
IEEE Internet Things J., 2021
Enhanced Learning Experiences Based on Regulatory Fit Theory Using Affective State Detection.
Int. J. Semantic Web Inf. Syst., 2021
An improved public transportation system for effective usage of vehicles in intelligent transportation system.
Int. J. Commun. Syst., 2021
Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children.
Comput. J., 2021
2020
J. Organ. End User Comput., 2020
2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018
Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018
Comput. Electr. Eng., 2018
2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017
Comput. Electr. Eng., 2017
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016
An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
Artif. Intell. Rev., 2014
2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013
2012
Int. J. Intell. Inf. Technol., 2012
2011
Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011