Pandi Vijayakumar

Orcid: 0000-0001-5451-8946

Affiliations:
  • University College of Engineering Tindivanam, Anna University, India


According to our database1, Pandi Vijayakumar authored at least 162 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2024

HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024

A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments.
IEEE Internet Things J., September, 2024

A Two-Stage Differential Privacy Scheme for Federated Learning Based on Edge Intelligence.
IEEE J. Biomed. Health Informatics, June, 2024

A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J., May, 2024

A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT.
IEEE Trans. Ind. Informatics, March, 2024

Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning.
IEEE Trans. Consumer Electron., February, 2024

Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder.
IEEE Trans. Inf. Forensics Secur., 2024

Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024

Deep Fingerprinting Data Learning Based on Federated Differential Privacy for Resource-Constrained Intelligent IoT Systems.
IEEE Internet Things J., 2024

Two-Phase Sparsification With Secure Aggregation for Privacy-Aware Federated Learning.
IEEE Internet Things J., 2024

A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024

SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs.
Digit. Commun. Networks, 2024

A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols.
Comput. Electr. Eng., 2024

An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid.
Comput. Electr. Eng., 2024

Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption.
Comput. Electr. Eng., 2024

Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface.
Comput. Electr. Eng., 2024

2023
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

A Multinode Collaborative Decision-Making Scheme for Privacy Protection in IIoT.
IEEE Trans. Ind. Informatics, December, 2023

Secure session key pairing and a lightweight key authentication scheme for liable drone services.
Cyber Secur. Appl., December, 2023

Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy.
Clust. Comput., December, 2023

Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023

Optimized traffic flow prediction based on cluster formation and reinforcement learning.
Int. J. Commun. Syst., August, 2023

A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare.
Future Gener. Comput. Syst., July, 2023

Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023

Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs.
IEEE Trans. Intell. Transp. Syst., June, 2023

SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023

Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing.
ACM Trans. Sens. Networks, May, 2023

Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023

A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023

The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023

Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS).
Neural Comput. Appl., March, 2023

Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023

Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023

Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems.
IEEE Internet Things J., February, 2023

Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System.
IEEE Trans. Netw. Sci. Eng., 2023

AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Anonymous Authentication Scheme for Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023

Fault-Tolerant Data Aggregation with Error-Checking for Smart Grids.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., 2022

A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs.
ACM Trans. Internet Techn., 2022

An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022

An Anonymous Batch Authentication and Key Exchange Protocols for 6G Enabled VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System.
IEEE Trans. Ind. Informatics, 2022

A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022

An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022

SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management.
IEEE Trans. Green Commun. Netw., 2022

Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Service Chain Caching and Workload Scheduling in Mobile Edge Computing.
IEEE Syst. J., 2022

An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model.
Pattern Recognit. Lett., 2022

Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs.
IEEE Internet Things J., 2022

MUD-Based Behavioral Profiling Security Framework for Software-Defined IoT Networks.
IEEE Internet Things J., 2022

Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception.
Int. J. Softw. Sci. Comput. Intell., 2022

Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication.
Int. J. Cloud Appl. Comput., 2022

A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022

A location-based privacy-preserving oblivious sharing scheme for indoor navigation.
Future Gener. Comput. Syst., 2022

Multiscale deep network based multistep prediction of high-dimensional time series from power transmission systems.
Trans. Emerg. Telecommun. Technol., 2022

Transformer anomaly detection based on time-frequency domain software-hardware cooperative analysis.
Trans. Emerg. Telecommun. Technol., 2022

The Application of the Blockchain Technology in Voting Systems: A Review.
ACM Comput. Surv., 2022

FTPS: Efficient fault-tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy.
Concurr. Comput. Pract. Exp., 2022

Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022

RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022

A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health.
Proceedings of the IEEE Global Communications Conference, 2022

2021
An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks.
Wirel. Networks, 2021

Enabling Sustainable Energy for Smart Environment Using 5G Wireless Communication and Internet of Things.
IEEE Wirel. Commun., 2021

An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs.
IEEE Trans. Veh. Technol., 2021

Efficient Distributed Decryption Scheme for IoT Gateway-based Applications.
ACM Trans. Internet Techn., 2021

An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021

Profile Matching for IoMT: A Verifiable Private Set Intersection Scheme.
IEEE J. Biomed. Health Informatics, 2021

COVID-19: Automatic Detection of the Novel Coronavirus Disease From CT Images Using an Optimized Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion.
IEEE Syst. J., 2021

IoT-Enabled Light Intensity-Controlled Seamless Highway Lighting System.
IEEE Syst. J., 2021

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021

BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021

Introduction to the special issue on "Biometrics in Smart Cities: Techniques and Applications (BI_SCI)".
Pattern Recognit. Lett., 2021

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021

Blockchain-based batch authentication protocol for Internet of Vehicles.
J. Syst. Archit., 2021

COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking.
Inf. Syst. Frontiers, 2021

Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things.
IEEE Internet Things J., 2021

Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT.
IEEE Internet Things J., 2021

The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic.
IEEE Internet Things J., 2021

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021

An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities.
Int. J. Distributed Sens. Networks, 2021

Security preservation in industrial medical CPS using Chebyshev map: An AI approach.
Future Gener. Comput. Syst., 2021

Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities.
Trans. Emerg. Telecommun. Technol., 2021

An optimized Generative Adversarial Network based continuous sign language classification.
Expert Syst. Appl., 2021

Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021

An efficient combined deep neural network based malware detection framework in 5G environment.
Comput. Networks, 2021

AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021

Blockchain Based Architecture and Solution for Secure Digital Payment System.
Proceedings of the ICC 2021, 2021

PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021

2020
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios.
Wirel. Commun. Mob. Comput., 2020

Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020

Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things.
IEEE Trans. Veh. Technol., 2020

A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks.
IEEE Trans. Sustain. Comput., 2020

Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020

Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020

A Lightweight Privacy-Preserving Authentication Protocol for VANETs.
IEEE Syst. J., 2020

Intelligent e-learning system based on fuzzy logic.
Neural Comput. Appl., 2020

Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security.
Multim. Tools Appl., 2020

A practical group blind signature scheme for privacy protection in smart grid.
J. Parallel Distributed Comput., 2020

A Novel Trust Model for Secure Group Communication in Distributed Computing.
J. Organ. End User Comput., 2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party.
J. Inf. Secur. Appl., 2020

Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020

BUA: A Blockchain-based Unlinkable Authentication in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019

Sustainable Computing Based Deep Learning Framework for Writing Research Manuscripts.
IEEE Trans. Sustain. Comput., 2019

A Dependable Time Series Analytic Framework for Cyber-Physical Systems of IoT-based Smart Grid.
ACM Trans. Cyber Phys. Syst., 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Secure big data communication for energy efficient intra-cluster in WSNs.
Inf. Sci., 2019

A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019

MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019

Secure Online Examination System for e-learning.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018

A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018

Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018

A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018

Nth Order Binary Encoding with Split-Protocol.
Int. J. Rough Sets Data Anal., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

Dissection of the experimental outcome of split-protocol.
Int. J. Adv. Intell. Paradigms, 2018

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018

Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018

A provably secure password-based anonymous authentication scheme for wireless body area networks.
Comput. Electr. Eng., 2018

A new SmartSMS protocol for secure SMS communication in m-health environment.
Comput. Electr. Eng., 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017

Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud.
J. Inf. Sci. Eng., 2017

An Efficient Authentication Scheme for Mobile Cloud Computing Services.
J. Inf. Sci. Eng., 2017

Time efficient secure DNA based access control model for cloud computing environment.
Future Gener. Comput. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017

An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017

Security on "A Lightweight Authentication Scheme with User Untraceability".
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Secur. Commun. Networks, 2016

An intelligent CRF based feature selection for effective intrusion detection.
Int. Arab J. Inf. Technol., 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Chinese remainder theorem based centralised group key management for secure multicast communication.
IET Inf. Secur., 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013

Centralized key distribution protocol using the greatest common divisor method.
Comput. Math. Appl., 2013

2011
Error Detection and Correction for Distributed Group Key Agreement Protocol
CoRR, 2011

Key Distribution Protocol for Secure Multicast with Reduced Communication Delay.
Proceedings of the Active Media Technology - 7th International Conference, 2011

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011


  Loading...