Nanhay Singh

Orcid: 0000-0002-3303-1386

According to our database1, Nanhay Singh authored at least 17 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TransNet: a comparative study on breast carcinoma diagnosis with classical machine learning and transfer learning paradigm.
Multim. Tools Appl., March, 2024

2023
A hybrid intelligently initialized particle swarm optimizer with weight factored binary gray wolf optimizer for mitigation of security issues in Internet of Things and sensor nodes.
Concurr. Comput. Pract. Exp., February, 2023

Toward intelligent resource management in dynamic Fog Computing-based Internet of Things environment with Deep Reinforcement Learning: A survey.
Int. J. Commun. Syst., 2023

Feature optimization using a two-tier hybrid optimizer in an Internet of Things network.
Int. J. Appl. Math. Comput. Sci., 2023

2022
An approach for predicting missing links in social network using node attribute and path information.
Int. J. Syst. Assur. Eng. Manag., 2022

Analysis of Security-Based Access Control Models for Cloud Computing.
Int. J. Cloud Appl. Comput., 2022

Gravitational search algorithm-driven missing links prediction in social networks.
Concurr. Comput. Pract. Exp., 2022

Multilevel authentication protocol for enabling secure communication in Internet of Things.
Concurr. Comput. Pract. Exp., 2022

Analysis of recent advancements in support vector machine.
Concurr. Comput. Pract. Exp., 2022

Fog-GMFA-DRL: Enhanced deep reinforcement learning with hybrid grey wolf and modified moth flame optimization to enhance the load balancing in the fog-IoT environment.
Adv. Eng. Softw., 2022

2021
Survey on Machine Learning and Deep Learning Applications in Breast Cancer Diagnosis.
Cogn. Comput., 2021

2017
SECSIX: security engine for CSRF, SQL injection and XSS attacks.
Int. J. Syst. Assur. Eng. Manag., 2017

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures.
J. Inf. Process. Syst., 2017

2016
Analysis of Message Propagation for Intelligent Disaster Management through Vehicular Cloud Network.
ICTCS, 2016

2013
Detection of Web-Based Attacks by Analyzing Web Server Log Files.
Proceedings of the Intelligent Computing, 2013

Enhancing the performance of web proxy server through cluster based prefetching techniques.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Feasibility Evaluation of VANET using Directional-Location Aided Routing (D-LAR) Protocol
CoRR, 2012


  Loading...