Mayank Dave

Orcid: 0000-0003-4748-0753

Affiliations:
  • National Institute of Technology, Kurukshetra, Haryana, India


According to our database1, Mayank Dave authored at least 73 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DepressionFeature: Underlying ontology for user-specific depression analysis.
J. Supercomput., January, 2025

2024
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks.
Telecommun. Syst., April, 2024

Correction to: Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data.
New Gener. Comput., March, 2024

Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data.
New Gener. Comput., March, 2024

RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation.
Trans. Emerg. Telecommun. Technol., January, 2024

A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions.
Int. J. Commun. Syst., 2024

Deep Knowledge-Infusion For Explainable Depression Detection.
CoRR, 2024

Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation.
Comput. Secur., 2024

2023
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack.
Comput. Secur., December, 2023

Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique.
SN Comput. Sci., November, 2023

Mitigation of DDoS Attack Using Moving Target Defense in SDN.
Wirel. Pers. Commun., 2023

Privacy and security improvement in UAV network using blockchain.
Int. J. Commun. Networks Distributed Syst., 2023

2022
Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain.
Wirel. Pers. Commun., 2022

Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics.
Wirel. Pers. Commun., 2022

Analysis, Detection, and Classification of Android Malware using System Calls.
CoRR, 2022

Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain.
CoRR, 2022

Manual Prompt Generation For Language Model Probing.
Proceedings of the Semantic Web Challenge on Knowledge Base Construction from Pre-trained Language Models 2022 co-located with the 21st International Semantic Web Conference (ISWC2022), 2022

2021
Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking.
Wirel. Pers. Commun., 2021

An attack resistant key predistribution scheme for wireless sensor networks.
J. King Saud Univ. Comput. Inf. Sci., 2021

2020
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs.
Wirel. Pers. Commun., 2020

Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense.
CoRR, 2020

Voting-based intrusion detection framework for securing software-defined networks.
Concurr. Comput. Pract. Exp., 2020

Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning.
Proceedings of the Intelligent Computing, 2020

2019
Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends.
Wirel. Pers. Commun., 2019

Data aggregation in underwater wireless sensor network: Recent approaches and issues.
J. King Saud Univ. Comput. Inf. Sci., 2019

Software-defined Networking-based DDoS Defense Mechanisms.
ACM Comput. Surv., 2019

Securing User Access at IoT Middleware Using Attribute Based Access Control.
Proceedings of the 10th International Conference on Computing, 2019

Improving Result Diversity Using Query Term Proximity in Exploratory Search.
Proceedings of the Big Data Analytics - 7th International Conference, 2019

2018
Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN.
Wirel. Pers. Commun., 2018

A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks.
Int. J. Commun. Syst., 2018

A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security.
Int. J. Commun. Syst., 2018

2017
A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks.
Soft Comput., 2017

Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications.
Multim. Tools Appl., 2017

Malware Detection Approach for Android systems Using System Call Logs.
CoRR, 2017

Energy Efficient Rekeying Protocol for Wireless Sensor and Actor Networks.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

2016
BIIR: A Beacon Information Independent VANET Routing Algorithm with Low Broadcast Overhead.
Wirel. Pers. Commun., 2016

Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

Semantic approach for Web service classification using machine learning and measures of semantic relatedness.
Serv. Oriented Comput. Appl., 2016

Hybrid technique for robust and imperceptible multiple watermarking using medical images.
Multim. Tools Appl., 2016

A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN.
Int. J. Commun. Networks Distributed Syst., 2016

Fuzzy-BPN Based Improved Technique for Color Image Watermarking.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
Robust and Imperceptible Dual Watermarking for Telemedicine Applications.
Wirel. Pers. Commun., 2015

Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain.
Wirel. Pers. Commun., 2015

Relay node placement to heal partitioned wireless sensor networks.
Comput. Electr. Eng., 2015

Google based hybrid approach for discovering services.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

2014
A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs.
Wirel. Pers. Commun., 2014

Mobility Models and their Affect on Data Aggregation and Dissemination in Vehicular Networks.
Wirel. Pers. Commun., 2014

Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine.
Int. J. Electron. Secur. Digit. Forensics, 2014

Hybrid cognitive model for semantic discovery and selection of services.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

2013
Network Partitioning Recovery Mechanisms in WSANs: a Survey.
Wirel. Pers. Commun., 2013

A Framework For Handling Local Broadcast Storm Using Probabilistic Data Aggregation In VANET.
Wirel. Pers. Commun., 2013

Performance evaluation of sequentially combined heterogeneous feature streams for Hindi speech recognition system.
Telecommun. Syst., 2013

Antecedence Graph Approach to Checkpointing for Fault Tolerance in Mobile Agent Systems.
IEEE Trans. Computers, 2013

A Hybrid Algorithm for Image Watermarking against Signal Processing Attacks.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2013

Performance evaluation of ant based routing protocol for WSNs with Heterogeneous nodes under different radio propagation models.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Filterbank optimization for robust ASR using GA and PSO.
Int. J. Speech Technol., 2012

Integration of multiple acoustic and language models for improved Hindi speech recognition system.
Int. J. Speech Technol., 2012

Novel Monitoring Mechanism for Distributed System Software Using Mobile Agents.
Proceedings of the Intelligent Informatics, 2012

2011
Acoustic modeling problem for automatic speech recognition system: advances and refinements (Part II).
Int. J. Speech Technol., 2011

Acoustic modeling problem for automatic speech recognition system: conventional methods (Part I).
Int. J. Speech Technol., 2011

Reducing Network Overhead with Common Junction Methodology.
Int. J. Mob. Comput. Multim. Commun., 2011

Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network
CoRR, 2011

A Comparative Study of Various Routing Protocols in VANET
CoRR, 2011

2010
Model of Real Time Architecture for Data Placement in Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

Ant colony based rule generation for reusable software component retrieval.
ACM SIGSOFT Softw. Eng. Notes, 2010

Tied Mixture Modeling in Hindi Speech Recognition System.
Proceedings of the Information and Communication Technologies - International Conference, 2010

2009
Change Management and Software Reuse Supportive 'Genetic Information System Development and Maintenance' Model.
Int. J. Softw. Eng. Knowl. Eng., 2009

Load Balanced Routing Mechanisms for Mobile Ad Hoc Networks.
Int. J. Commun. Netw. Syst. Sci., 2009

Simulation of Power Efficient Region Based Approach for Query Processing in Wireless Sensor Networks.
Proceedings of the Second International Conference on Emerging Trends in Engineering & Technology, 2009

2008
Implementing a Speech Recognition System Interface for Indian Languages.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

Weighted load balanced routing protocol for MANET.
Proceedings of the 16th International Conference on Networks, 2008

2006
Retrieval of Most Relevant Reusable Component Using Genetic Algorithms.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006


  Loading...