Punam Bedi

Orcid: 0000-0002-6007-7961

According to our database1, Punam Bedi authored at least 156 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A sentiment-guided session-aware recommender system.
J. Supercomput., December, 2024

Session-aware recommender system using double deep reinforcement learning.
J. Intell. Inf. Syst., April, 2024

Deep learning based active image steganalysis: a review.
Int. J. Syst. Assur. Eng. Manag., March, 2024

USteg-DSE: Universal quantitative Steganalysis framework using Densenet merged with Squeeze & Excitation net.
Signal Process. Image Commun., 2024

Incorporation of Two-Fold Trust in Group Recommender System to Handle Popularity Bias.
SN Comput. Sci., 2024

CGM: A hybrid model for forecasting future stock price.
Proceedings of the International Symposium on Computing and Intelligent Systems (SCI 2024), 2024

2023
Empowering reciprocal recommender system using contextual bandits and argumentation based explanations.
World Wide Web (WWW), September, 2023

A Survey on Intrusion Detection and Prevention Systems.
SN Comput. Sci., September, 2023

Generating Popularity-Aware Reciprocal Recommendations Using Siamese Bi-Directional Gated Recurrent Units Network.
Vietnam. J. Comput. Sci., August, 2023

SPYIPv6: Locating Covert Data in One or a Combination of IPv6 Header Field(s).
IEEE Access, 2023

Predator-Prey PSO based Weapon deployment in Constructive Simulation.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

Smart Contract based Skill Verification System for Recruitment.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

2022
Estimating cover image for universal payload region detection in stego images.
J. King Saud Univ. Comput. Inf. Sci., 2022

A contextual-bandit approach for multifaceted reciprocal recommendations in online dating.
J. Intell. Inf. Syst., 2022

Enhancing system robustness of active products using trust based collaboration.
J. Intell. Fuzzy Syst., 2022

CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems.
Comput. Secur., 2022

Detecting and Locating Storage-Based Covert Channels in Internet Protocol Version 6.
IEEE Access, 2022

2021
Prediction of COVID-19 Trend in India and Its Four Worst-Affected States Using Modified SEIRD and LSTM Models.
SN Comput. Sci., 2021

Multi-class blind steganalysis using deep residual networks.
Multim. Tools Appl., 2021

Trust and fuzzy inference based cross domain serendipitous item recommendations (TFCDSRS).
J. Intell. Fuzzy Syst., 2021

LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system.
Comput. Networks, 2021

I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems.
Appl. Intell., 2021

Trust and Distrust based Cross-domain Recommender System.
Appl. Artif. Intell., 2021

2020
Combining trust and reputation as user influence in cross domain group recommender system (CDGRS).
J. Intell. Fuzzy Syst., 2020

GMACO-P: GPU assisted Preemptive MACO algorithm for enabling Smart Transportation.
CoRR, 2020

Projections for COVID-19 spread in India and its worst affected five states using the Modified SEIRD and LSTM models.
CoRR, 2020

2019
Parameter Tuning in MACO for Actual Road Conditions.
Wirel. Pers. Commun., 2019

Parallel context-aware multi-agent tourism recommender system.
Int. J. Comput. Sci. Eng., 2019

FS-CARS: fast and scalable context-aware news recommender system using tensor factorisation.
Int. J. Comput. Sci. Eng., 2019

Multilayer ensemble of ELMs for image steganalysis with multiple feature sets.
Int. J. Comput. Sci. Eng., 2019

2018
Community based Hashtag Recommender System (CHRS) for twitter.
J. Intell. Fuzzy Syst., 2018

Parallel proactive cross domain context aware recommender system.
J. Intell. Fuzzy Syst., 2018

High performance adaptive traffic control for efficient response in vehicular ad hoc networks.
Int. J. Comput. Sci. Eng., 2018

Trust and reputation-based multi-agent recommender system.
Int. J. Comput. Sci. Eng., 2018

An improved hybrid ant particle optimization (IHAPO) algorithm for reducing travel time in VANETs.
Appl. Soft Comput., 2018

Blind Quantitative Steganalysis using SVD Features.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

E-waste Management Using Blockchain based Smart Contracts.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
Reducing waiting time with parallel preemptive algorithm in VANETs.
Veh. Commun., 2017

Improving the quality of web applications with web specific goal driven requirements engineering.
Int. J. Syst. Assur. Eng. Manag., 2017

A fuzzy hybrid recommender system.
J. Intell. Fuzzy Syst., 2017

CCFRS - Community based Collaborative Filtering Recommender System.
J. Intell. Fuzzy Syst., 2017

Developing content-based recommender system using Hadoop Map Reduce.
J. Intell. Fuzzy Syst., 2017

Preemptive MACO (MACO-P) Algorithm for Reducing Travel Time in VANETs.
Appl. Artif. Intell., 2017

GPU accelerated preemptive HAPO (GHAPO-P) for reducing trip time in VANETS.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Community detection in social networks.
WIREs Data Mining Knowl. Discov., 2016

Safeguarding Buyers with Attack-Resilient Reputation Parameters.
J. Theor. Appl. Electron. Commer. Res., 2016

Goals and scenarios based web requirements engineering.
Comput. Syst. Sci. Eng., 2016

Local binary pattern operator based steganography in wavelet domain.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Parallel context aware recommender system using GPU and JCuda.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

A preemptive hybrid ant particle optimization (HAPO-P) algorithm for smart transportation.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

CBCARS: Content boosted context-aware recommendations using tensor factorization.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

ELM based imputation-boosted proactive recommender systems.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2L-DWTS - Steganography technique based on second level DWT.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Argumentation-enabled interest-based personalised recommender system.
J. Exp. Theor. Artif. Intell., 2015

Steganography using Cuckoo Optimized Wavelet Coefficients.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

MACO: Modified ACO for reducing travel time in VANETs.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

StegTrack: Tracking images with hidden content.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

MR-VSM: Map Reduce based vector Space Model for user profiling-an empirical study on News data.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Handling cold start problem in Recommender Systems by using Interaction Based Social Proximity factor.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

User interest expansion using spreading activation for generating recommendations.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

A preemptive approach to reduce average queue length in VANETs.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Reducing Travel Time in VANETs with Parallel Implementation of MACO (Modified ACO).
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015

FS-EHS: Harmony Search Based Feature Selection Algorithm for Steganalysis Using ELM.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2015

ATSOT: Adaptive Traffic Signal Using mOTes.
Proceedings of the Databases in Networked Information Systems, 2015

2014
Evaluation of web-specific goal oriented requirements language models with quantitative reasoning.
ACM SIGSOFT Softw. Eng. Notes, 2014

An empirical evaluation of cross project priority prediction.
Int. J. Syst. Assur. Eng. Manag., 2014

Trust-based access control for collaborative systems.
J. Exp. Theor. Artif. Intell., 2014

Empowering recommender systems using trust and argumentation.
Inf. Sci., 2014

Improving Trustworthiness in E-Market Using Attack Resilient Reputation Modeling.
Int. J. Intell. Inf. Technol., 2014

A dynamic personalised product pricing strategy using multiple attributes in agent mediated e-market - a neural approach.
Int. J. Inf. Decis. Sci., 2014

Trusted and load-balanced ant-based routing in mobile ad hoc networks.
Int. J. Artif. Intell. Soft Comput., 2014

Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm.
Expert Syst. Appl., 2014

A Proposed Framework for Group-Based Multi-Criteria Recommendations.
Appl. Artif. Intell., 2014

FS-SDS: Feature selection for JPEG steganalysis using stochastic diffusion search.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Use of Big Data technology in Vehicular Ad-hoc Networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

SAPRS: Situation-Aware Proactive Recommender system with explanations.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

MARST: Multi-Agent Recommender System for e-Tourism Using Reputation Based Collaborative Filtering.
Proceedings of the Databases in Networked Information Systems - 9th International Workshop, 2014

2013
Threat-oriented security framework in risk management using multiagent system.
Softw. Pract. Exp., 2013

Mitigating multi-threats optimally in proactive threat management.
ACM SIGSOFT Softw. Eng. Notes, 2013

Trust and context view-based knowledge sharing in MANets.
Int. J. Trust. Manag. Comput. Commun., 2013

Generation of web recommendations using implicit user feedback and normalised mutual information.
Int. J. Knowl. Web Intell., 2013

Novel approaches for classification based on Cuckoo Search Strategy.
Int. J. Hybrid Intell. Syst., 2013

Stigmergic agent-based adaptive content sequencing in an e-learning environment.
Int. J. Adv. Intell. Paradigms, 2013

Evaluating Reputation Systems for Agent Mediated e-Commerce
CoRR, 2013

Focused crawling of tagged web resources using ontology.
Comput. Electr. Eng., 2013

Using PSO in a spatial domain based image hiding scheme with distortion tolerance.
Comput. Electr. Eng., 2013

Steganalysis for JPEG Images Using Extreme Learning Machine.
Proceedings of the IEEE International Conference on Systems, 2013

Weighted difference entropy based similarity measure at two levels in a recommendation framework.
Proceedings of the International Conference on Advances in Computing, 2013

Multi-class JPEG Steganalysis using Extreme Learning Machine.
Proceedings of the International Conference on Advances in Computing, 2013

Distributed multi-agent reputation framework for interactions in e-market.
Proceedings of the FUZZ-IEEE 2013, 2013

Modeling user preferences in a hybrid recommender system using type-2 fuzzy sets.
Proceedings of the FUZZ-IEEE 2013, 2013

Multi-agent system for intelligent watermarking of fingerprint images.
Proceedings of the FUZZ-IEEE 2013, 2013

An Empirical Validation of the Complexity of Code Changes and Bugs in Predicting the Release Time of Open Source Software.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
A Multi-Threaded Semantic Focused Crawler.
J. Comput. Sci. Technol., 2012

Securing Fingerprint Images Using PSO-Based Wavelet Domain Watermarking.
Inf. Secur. J. A Glob. Perspect., 2012

Building Socially-Aware E-Learning Systems Through Knowledge Management.
Int. J. Knowl. Manag., 2012

Securing Fingerprint Images Through PSO Based Robust Facial Watermarking.
Int. J. Inf. Secur. Priv., 2012

Home security surveillance system using multi-robot system.
Int. J. Comput. Appl. Technol., 2012

Trust based recommender system using ant colony for trust computation.
Expert Syst. Appl., 2012

Collaborative Personalized Web Recommender System using Entropy based Similarity Measure
CoRR, 2012

A Dynamic Model for Sharing Reputation of Sellers among Buyers for Enhancing Trust in Agent Mediated e-market
CoRR, 2012

Minutiae Extraction from Fingerprint Images - a Review
CoRR, 2012

Trust enabled Argumentation Based Recommender System.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Informal eLearning using Multi Agent Systems.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

An opinion-based framework for designing socially aware e-learning systems.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Predicting the priority of a reported bug using machine learning techniques and cross project validation.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Refinement of recommendations based on user preferences.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

WSDL-TC: Collaborative customization of web services.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Classification of RSS feed news items using ontology.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Mobile process groups based device/service discovery and interoperability in MANets.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Securing fingerprint images using a hybrid technique.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Predicting attribute based user trustworthiness for access control of resources.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

A Situation-Aware Proactive Recommender System.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Intelligent wavelet domain watermarking of fingerprint images.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

Extending BPEL for WSDL-Temporal based Web services.
Proceedings of the 12th International Conference on Hybrid Intelligent Systems, 2012

2011
High Scent Web Page Recommendations Using Fuzzy Rough Set Attribute Reduction.
Trans. Rough Sets, 2011

Layered security architecture for threat management using multi-agent system.
ACM SIGSOFT Softw. Eng. Notes, 2011

MASPTA-O: Multiagent System Planning to Avoid Threats Optimally.
Inf. Secur. J. A Glob. Perspect., 2011

Ranking Tagged Resources Using Social Semantic Relevance.
Int. J. Inf. Retr. Res., 2011

Adaptive Content Sequencing for e-Learning Courses Using Ant Colony Optimization.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

A Fuzzy Trust Model for Argumentation-Based Recommender Systems.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

MPG_AbTR: Ant Based Trusted Routing in MANets Using Mobile Process Groups.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

GOREWEB Framework for Goal Oriented Requirements Engineering of Web Applications.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

FCHC: A Social Semantic Focused Crawler.
Proceedings of the Advances in Computing and Communications, 2011

Using PSO in Image Hiding Scheme Based on LSB Substitution.
Proceedings of the Advances in Computing and Communications, 2011

2010
Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010

Negotiation using Argumentation for Location based E-Commerce in a Multi Agent Society.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

An Application of Multi-Person Decision-Making Model for Negotiating and Prioritizing Requirements in Agent-Oriented Paradigm.
Proceedings of the International Conference on Data Storage and Data Engineering, 2010

2009
Use of Fuzzy Rough Set Attribute Reduction in High Scent Web Page Recommendations.
Proceedings of the Rough Sets, 2009

BDI Planning Approach to Distributed Multiagent Based Semantic Search Engine.
Proceedings of the Distributed Computing, 2009

Using Web Mining to Generate Recommendations: A Website Recommender.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Diseases and Pests Identification in Crops - A Semantic Web Approach.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Trust based Personalized Ecommerce System for Farmers.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Identifying Security Requirements Hybrid Technique.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Avoiding Threats Using Multi Agent System Planning for Web Based Systems.
Proceedings of the Computational Collective Intelligence. Semantic Web, 2009

Fingerprint Image Enhancement Using Type-2 Fuzzy Sets.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Personalized Tag Recommendations to Enhance User's Perception.
Proceedings of the ARTCom 2009, 2009

Threat Mitigation, Monitoring and Management Plan - A New Approach in Risk Management.
Proceedings of the ARTCom 2009, 2009

A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks.
Proceedings of the ARTCom 2009, 2009

2008
Trust based prioritization of Quality Attributes.
Int. Arab J. Inf. Technol., 2008

Improving Information Retrieval Precision by Finding Related Queries with Similar Information Need Using Information Scent.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Finding Hubs and Authorities using Information Scent to Improve the Information Retrieval precision.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

A Novel Framework for Enhancing Images Corrupted by Impulse Noise Using Type-II Fuzzy Sets.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Exploring the Interdependencies among Communication, Knowledgeability and Performance of Multi-agent Systems.
Proceedings of the World Congress on Engineering, 2007

Prioritizing Quality Specifications of Multi-agent Systems.
Proceedings of the World Congress on Engineering, 2007

Trust Based Recommender System for Semantic Web.
Proceedings of the IJCAI 2007, 2007

Optimal Partner Selection Model for Cooperation.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

2006
Trust Aware Usability.
J. Inf. Technol. Tour., 2006

Multi Dimension Quality Model of MAS.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

2005
Prioritizing Web Usability Attributes Using Intuitionistic Fuzzy Sets.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

Using Fuzzy Clustering to Determine Trust based Recommendations.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

Framework for Ontology Based Expert Systems : Disease & Pests Identification in Crops - A Case Study.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005

Trust Based Recommender System.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005

Using Fuzzy Clustering to Determine Agent Reputation.
Proceedings of The 2005 International Conference on Data Mining, 2005

HISE- An Algorithmic Approach To Evolve a Usable Website.
Proceedings of The 2005 International Conference on Human-Computer Interaction, 2005


  Loading...