Pandi Vijayakumar
Orcid: 0000-0001-5451-8946Affiliations:
- University College of Engineering Tindivanam, Anna University, India
According to our database1,
Pandi Vijayakumar
authored at least 162 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs.
IEEE Trans. Intell. Transp. Syst., September, 2024
HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems.
IEEE Trans. Green Commun. Netw., September, 2024
A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments.
IEEE Internet Things J., September, 2024
A Two-Stage Differential Privacy Scheme for Federated Learning Based on Edge Intelligence.
IEEE J. Biomed. Health Informatics, June, 2024
A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J., May, 2024
IEEE Trans. Ind. Informatics, March, 2024
Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024
Next-Generation Consumer Electronics Data Auditing Scheme Toward Cloud-Edge Distributed and Resilient Machine Learning.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Designing access control security protocol for Industry 4.0 using Blockchain-as-a-Service.
Secur. Priv., 2024
Deep Fingerprinting Data Learning Based on Federated Differential Privacy for Resource-Constrained Intelligent IoT Systems.
IEEE Internet Things J., 2024
Two-Phase Sparsification With Secure Aggregation for Privacy-Aware Federated Learning.
IEEE Internet Things J., 2024
A lightweight network for abdominal multi-organ segmentation based on multi-scale context fusion and dual self-attention.
Inf. Fusion, 2024
Digit. Commun. Networks, 2024
A novel generative adversarial network-based fuzzing cases generation method for industrial control system protocols.
Comput. Electr. Eng., 2024
An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid.
Comput. Electr. Eng., 2024
Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption.
Comput. Electr. Eng., 2024
Bioinspired molecular communications system for targeted drug delivery with IoBNT-based sustainable biocyber interface.
Comput. Electr. Eng., 2024
2023
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023
IEEE Trans. Ind. Informatics, December, 2023
Secure session key pairing and a lightweight key authentication scheme for liable drone services.
Cyber Secur. Appl., December, 2023
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy.
Clust. Comput., December, 2023
Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
Inf. Sci., October, 2023
Optimized traffic flow prediction based on cluster formation and reinforcement learning.
Int. J. Commun. Syst., August, 2023
A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare.
Future Gener. Comput. Syst., July, 2023
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing.
Future Gener. Comput. Syst., July, 2023
Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs.
IEEE Trans. Intell. Transp. Syst., June, 2023
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023
ACM Trans. Sens. Networks, May, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services.
Pattern Recognit. Lett., April, 2023
The NITRDrone Dataset to Address the Challenges for Road Extraction from Aerial Images.
J. Signal Process. Syst., March, 2023
Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS).
Neural Comput. Appl., March, 2023
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing.
IEEE J. Biomed. Health Informatics, February, 2023
IEEE Internet Things J., February, 2023
Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE INFOCOM 2023, 2023
SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Veh. Technol., 2022
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs.
ACM Trans. Internet Techn., 2022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022
SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Soc. Syst., 2022
IEEE Syst. J., 2022
An improved entity recognition approach to cyber-social knowledge provision of intellectual property using a CRF-LSTM model.
Pattern Recognit. Lett., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception.
Int. J. Softw. Sci. Comput. Intell., 2022
Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication.
Int. J. Cloud Appl. Comput., 2022
A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022
Future Gener. Comput. Syst., 2022
Multiscale deep network based multistep prediction of high-dimensional time series from power transmission systems.
Trans. Emerg. Telecommun. Technol., 2022
Transformer anomaly detection based on time-frequency domain software-hardware cooperative analysis.
Trans. Emerg. Telecommun. Technol., 2022
ACM Comput. Surv., 2022
FTPS: Efficient fault-tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy.
Concurr. Comput. Pract. Exp., 2022
Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system.
Comput. Commun., 2022
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022
RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022
A Privacy-preserving Data Transmission Protocol with Constant Interactions in E-health.
Proceedings of the IEEE Global Communications Conference, 2022
2021
An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks.
Wirel. Networks, 2021
Enabling Sustainable Energy for Smart Environment Using 5G Wireless Communication and Internet of Things.
IEEE Wirel. Commun., 2021
IEEE Trans. Veh. Technol., 2021
ACM Trans. Internet Techn., 2021
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE J. Biomed. Health Informatics, 2021
COVID-19: Automatic Detection of the Novel Coronavirus Disease From CT Images Using an Optimized Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion.
IEEE Syst. J., 2021
IEEE Syst. J., 2021
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021
Introduction to the special issue on "Biometrics in Smart Cities: Techniques and Applications (BI_SCI)".
Pattern Recognit. Lett., 2021
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021
J. Syst. Archit., 2021
COVID_SCREENET: COVID-19 Screening in Chest Radiography Images Using Deep Transfer Stacking.
Inf. Syst. Frontiers, 2021
Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021
An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities.
Int. J. Distributed Sens. Networks, 2021
Future Gener. Comput. Syst., 2021
Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities.
Trans. Emerg. Telecommun. Technol., 2021
An optimized Generative Adversarial Network based continuous sign language classification.
Expert Syst. Appl., 2021
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs.
Comput. Stand. Interfaces, 2021
An efficient combined deep neural network based malware detection framework in 5G environment.
Comput. Networks, 2021
AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021
2020
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios.
Wirel. Commun. Mob. Comput., 2020
Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks.
IEEE Trans. Sustain. Comput., 2020
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020
Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020
IEEE Syst. J., 2020
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security.
Multim. Tools Appl., 2020
J. Parallel Distributed Comput., 2020
J. Organ. End User Comput., 2020
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party.
J. Inf. Secur. Appl., 2020
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019
Sustainable Computing Based Deep Learning Framework for Writing Research Manuscripts.
IEEE Trans. Sustain. Comput., 2019
A Dependable Time Series Analytic Framework for Cyber-Physical Systems of IoT-based Smart Grid.
ACM Trans. Cyber Phys. Syst., 2019
Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019
Inf. Sci., 2019
A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment.
Int. J. E Health Medical Commun., 2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
2018
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
Multim. Tools Appl., 2018
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
Multim. Tools Appl., 2018
Provably Secure Identity-Based Signcryption Scheme for Crowdsourced Industrial Internet of Things Environments.
IEEE Internet Things J., 2018
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications.
IEEE Internet Things J., 2018
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018
Int. J. Adv. Intell. Paradigms, 2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018
Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018
A provably secure password-based anonymous authentication scheme for wireless body area networks.
Comput. Electr. Eng., 2018
Comput. Electr. Eng., 2018
2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017
Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud.
J. Inf. Sci. Eng., 2017
J. Inf. Sci. Eng., 2017
Time efficient secure DNA based access control model for cloud computing environment.
Future Gener. Comput. Syst., 2017
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017
Comput. Electr. Eng., 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
An Extensive Review and Possible Attack on the Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017
Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service .
Proceedings of the 2nd International Conference on Internet of Things, 2017
2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016
An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Int. Arab J. Inf. Technol., 2016
2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Chinese remainder theorem based centralised group key management for secure multicast communication.
IET Inf. Secur., 2014
2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013
Comput. Math. Appl., 2013
2011
CoRR, 2011
Proceedings of the Active Media Technology - 7th International Conference, 2011
Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011