Lalit Kumar Awasthi

Orcid: 0000-0001-8396-9025

According to our database1, Lalit Kumar Awasthi authored at least 99 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DBTSF-VSOD: a decision-based two-stage framework for video salient object detection.
Int. J. Multim. Inf. Retr., December, 2024

A machine learning-based ensemble model for securing the IoT network.
Clust. Comput., November, 2024

Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment.
Trans. Emerg. Telecommun. Technol., October, 2024

An energy-efficient black widow-based adaptive VM placement approach for cloud computing.
Clust. Comput., July, 2024

LBATSM: Load Balancing Aware Task Selection and Migration Approach in Fog Computing Environment.
IEEE Syst. J., June, 2024

6G-Enabled Ultra-Reliable Low Latency Communication for Industry 5.0: Challenges and Future Directions.
IEEE Commun. Stand. Mag., June, 2024

Balanced Grouping Scheme for Efficient Clustering in WSN with Multilevel Heterogeneity.
Wirel. Pers. Commun., April, 2024

Data Dissemination Framework for Optimizing Overhead in IoT-Enabled Systems Using Tabu-RPL.
SN Comput. Sci., April, 2024

A dual-stream encoder-decoder network with attention mechanism for saliency detection in video(s).
Signal Image Video Process., April, 2024

Integrating semantic similarity with Dirichlet multinomial mixture model for enhanced web service clustering.
Knowl. Inf. Syst., April, 2024

A voting-based novel spatio-temporal fusion framework for video saliency using transfer learning mechanism.
Int. J. Multim. Inf. Retr., March, 2024

Schema generation for document stores using workload-driven approach.
J. Supercomput., February, 2024

Machine learning in agriculture: a review of crop management applications.
Multim. Tools Appl., February, 2024

Query-based denormalization using hypergraph (QBDNH): a schema transformation model for migrating relational to NoSQL databases.
Knowl. Inf. Syst., January, 2024

Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions.
J. Ambient Intell. Smart Environ., 2024

Spatiotemporal Feature Fusion for Video Summarization.
IEEE Multim., 2024

Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs.
Forensic Sci. Int. Digit. Investig., 2024

Enhanced Hybrid Congestion Mitigation Strategy for '6LoWPAN-RPL based patient-centric IoHT'.
Comput. Networks, 2024

2023
A review of deep learning techniques used in agriculture.
Ecol. Informatics, November, 2023

A Comprehensive review of '<i>Internet of Healthcare Things</i>': Networking aspects, technologies, services, applications, challenges, and security concerns.
Comput. Sci. Rev., November, 2023

WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding.
Future Gener. Comput. Syst., August, 2023

Candidate project selection in cross project defect prediction using hybrid method.
Expert Syst. Appl., May, 2023

Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions.
Eng. Appl. Artif. Intell., April, 2023

Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network.
Wirel. Pers. Commun., March, 2023

A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification.
Multim. Tools Appl., March, 2023

Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges.
IEEE Internet Things J., February, 2023

Next-generation forensic investigation framework for smart refrigerators: acquiring and analysing digital traces in IoT embedded devices.
Int. J. Embed. Syst., 2023

Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review.
ACM Comput. Surv., 2023

Key Generation using Pseudorandom Number Generator.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

A workload-driven approach for automatic schema generation for document stores.
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023

2022
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare.
IEEE Internet Things J., 2022

Human pose estimation using deep learning: review, methodologies, progress and future research directions.
Int. J. Multim. Inf. Retr., 2022

A range based node localization scheme with hybrid optimization for underwater wireless sensor network.
Int. J. Commun. Syst., 2022

Secure authentication and session key management scheme for Internet of Vehicles.
Trans. Emerg. Telecommun. Technol., 2022

A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation.
Comput. Sci. Rev., 2022

Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted 'Internet of Healthcare Things' network.
Comput. Commun., 2022

Ob-EID: Obstacle aware event information dissemination for SDN enabled vehicular network.
Comput. Networks, 2022

Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection.
Clust. Comput., 2022

Energy-aware scientific workflow scheduling in cloud environment.
Clust. Comput., 2022

Database Migration Tools: From RDB to NoSQL Database.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2022

2021
Unified model towards Scalability in Software Defined Networks.
Int. J. Next Gener. Comput., 2021

Empirical risk assessment of attack graphs using time to compromise framework.
Int. J. Inf. Comput. Secur., 2021

HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems.
Eng. Comput., 2021

An ensemble approach for optimization of penetration layout in wide area networks.
Comput. Commun., 2021

Pr-CAI: Priority based-Context Aware Information scheduling for SDN-based vehicular network.
Comput. Networks, 2021

Learning-based hybrid routing for scalability in software defined networks.
Comput. Networks, 2021

An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs.
Appl. Soft Comput., 2021

Comparative Study of Topic Modeling and Word Embedding Approaches for Web Service Clustering.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation.
Inf. Process. Manag., 2020

Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation.
Expert Syst. Appl., 2020

Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization.
Eng. Appl. Artif. Intell., 2020

AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks.
Comput. Commun., 2020

2019
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation.
Int. J. Grid Util. Comput., 2019

Laman: A supervisor controller based scalable framework for software defined networks.
Comput. Networks, 2019

2018
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks.
Int. J. Web Serv. Res., 2018

Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities.
Comput. Secur., 2018

Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Incentive based scheme for improving data availability in vehicular ad-hoc networks.
Wirel. Networks, 2017

A critical survey of live virtual machine migration techniques.
J. Cloud Comput., 2017

2016
Priority based efficient data scheduling technique for VANETs.
Wirel. Networks, 2016

GRAB: Greedy Forwarding with Routing Along Boundaries in Wireless Sensor Networks.
Int. J. Next Gener. Comput., 2016

Minimal Marking of Trap-Regions for Efficient Greedy Forwarding in WSNs.
Int. J. Next Gener. Comput., 2016

2015
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks.
Wirel. Networks, 2015

Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review.
Int. J. Next Gener. Comput., 2015

2014
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2014

Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems.
Int. J. Commun. Networks Distributed Syst., 2014

Cooperative Cache Replacement Policy for MANETs.
Int. J. Adv. Pervasive Ubiquitous Comput., 2014

2013
Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework.
Int. J. Commun. Networks Distributed Syst., 2013

A Proposal for SMS Security Using NTRU Cryptosystem.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2012
Integrated Push Pull Algorithm with Accomplishment Assurance in VANETs.
Int. J. Next Gener. Comput., 2012

Cache Replacement in Mobile Adhoc Networks.
Int. J. Distributed Syst. Technol., 2012

2011
A Distributed Weighted Cluster Based Routing Protocol for MANETs.
Wirel. Sens. Netw., 2011

Performance Tradeoff with Routing Protocols for Radio Models in Wireless Sensor Networks.
Wirel. Eng. Technol., 2011

Enhancing Data Availability in MANETs with Cooperative Caching.
Int. J. Mob. Comput. Multim. Commun., 2011

Cooperative Caching in Mobile Ad Hoc Networks.
Int. J. Mob. Comput. Multim. Commun., 2011

Peers-for-peers (P4P): an efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications.
Int. J. Commun. Networks Distributed Syst., 2011

Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives.
Comput. Informatics, 2011

NILDD: nearest intersection location dependent dissemination of traffic information in VANETs.
Proceedings of the 2011 International Conference on Communication, 2011

A cooperative caching strategy in mobile ad hoc networks based on clusters.
Proceedings of the 2011 International Conference on Communication, 2011

Improving Fading-Aware Routing with Circular Cache Layers in Wireless Sensor Networks.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Efficient VANET-Based Traffic Information Dissemination Using Centralized Fixed Infrastructure.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Data Mining Techniques for Prefetching in Mobile Ad Hoc Networks.
Proceedings of the High Performance Architecture and Grid Computing, 2011

Distributed Localization for Anisotropic Sensor Networks Using Spatial Clustering.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Cache Invalidation for Location Dependent and Independent Data in IVANETS.
Proceedings of the Advances in Computing and Communications, 2011

2010
A Containment-Based Security Model for Cycle-Stealing P2P Applications.
Inf. Secur. J. A Glob. Perspect., 2010

IndNet: towards a peer-to-peer community network that connects the information technology industry and academia in India.
Int. J. Netw. Virtual Organisations, 2010

Toward a Quality-of-Service Framework for Peer-to-Peer Applications.
Int. J. Distributed Syst. Technol., 2010

PArch: a cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival.
Int. J. Bus. Inf. Syst., 2010

A weighted checkpointing protocol for mobile distributed systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Realistic Approach towards Quantitative Analysis and Simulation of EEHC-Based Routing for Wireless Sensor Networks
CoRR, 2010

2009
Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions.
Proceedings of the Contemporary Computing - Second International Conference, 2009

Interactions of Mitoxantrone and its Analogues with DNA Tetramer Sequences- A Molecular Modeling Study.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2008
NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networks.
Proceedings of the 16th International Conference on Networks, 2008

Enhanced AODV routing protocol for Ad hoc networks.
Proceedings of the 16th International Conference on Networks, 2008

Secure Thyself: Securing Individual Peers in Collaborative Peer-to-Peer Environments.
Proceedings of the 2008 International Conference on Grid Computing & Applications, 2008

2007
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach.
Int. J. Inf. Comput. Secur., 2007

Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

P4P: Ensuring Fault-Tolerance for Cycle-Stealing P2P applications.
Proceedings of the 2007 International Conference on Grid Computing & Applications, 2007


  Loading...