Manu Vardhan
Orcid: 0000-0003-2944-7896
According to our database1,
Manu Vardhan
authored at least 40 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
MTJNet: Multi-task joint learning network for advancing medicinal plant and leaf classification.
Knowl. Based Syst., 2024
Enhancing Plant Pathology with CNNs: A Hierarchical Approach for Accurate Disease Identification.
Proceedings of the 13th International Conference on Software and Computer Applications, 2024
2023
Plutchik Wheel of Emotion and Machine Learning-Based Hybrid Sentiment Analysis for the Hindi Language with Minimum Dependency on High Computation Resources.
SN Comput. Sci., November, 2023
Multicore based least confidence query sampling strategy to speed up active learning approach for named entity recognition.
Computing, May, 2023
2021
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks.
Wirel. Pers. Commun., 2021
Active learning approach using a modified least confidence sampling strategy for named entity recognition.
Prog. Artif. Intell., 2021
J. Internet Serv. Inf. Secur., 2021
Uncertainty query sampling strategies for active learning of named entity recognition task.
Intell. Decis. Technol., 2021
Digit. Investig., 2021
Clust. Comput., 2021
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection.
Clust. Comput., 2021
Proceedings of the 2021 World Automation Congress, 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
2020
Incorporating evolutionary computation for securing wireless network against cyberthreats.
J. Supercomput., 2020
Gene selection for cancer types classification using novel hybrid metaheuristics approach.
Swarm Evol. Comput., 2020
A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication.
J. Intell. Fuzzy Syst., 2020
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection.
Evol. Intell., 2020
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure.
Comput. Networks, 2020
Open Comput. Sci., 2020
Proceedings of the Computing Science, Communication and Security, 2020
2019
J. Intell. Fuzzy Syst., 2019
Inf. Sci., 2019
A New Hybrid Feature Subset Selection Framework Based on Binary Genetic Algorithm and Information Theory.
Int. J. Comput. Intell. Appl., 2019
Distributed Ledger Technology based Property Transaction System with Support for IoT Devices.
Int. J. Cloud Appl. Comput., 2019
2018
J. Intell. Fuzzy Syst., 2018
Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server.
J. Intell. Fuzzy Syst., 2018
Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis.
Int. J. Inf. Secur. Priv., 2018
2017
Privacy preserving, verifiable and efficient outsourcing algorithm for regression analysis to a malicious cloud.
J. Intell. Fuzzy Syst., 2017
2016
Cost Effective Genetic Algorithm for Workflow Scheduling in Cloud Under Deadline Constraint.
IEEE Access, 2016
2014
A Versatile Approach for the Estimation of Software Development Effort Based on SRS Document.
Int. J. Softw. Eng. Knowl. Eng., 2014
2013
TBFR: a threshold-based file replication approach for increased file availability and its formal verification.
Int. J. Inf. Commun. Technol., 2013
2012
Proceedings of the Contemporary Computing - 5th International Conference, 2012
Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services.
Proceedings of the Contemporary Computing - 5th International Conference, 2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012
Proceedings of the Sixth International Conference on Complex, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012