Sabu M. Thampi

Orcid: 0000-0001-6453-5520

Affiliations:
  • Institute of Information Technology and Management Kerala (IIITM-K), Trivandrum, India
  • Rajagiri School of Engineering and Technology, Cochin, India
  • LBS Institute of Technology for Women, Trivandrum, Kerala, India


According to our database1, Sabu M. Thampi authored at least 88 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones.
Veh. Commun., 2024

Misinformation detection in social networks using emotion analysis and user behavior analysis.
Pattern Recognit. Lett., 2024

2023
A location-aware physical unclonable function and Chebyshev map-based mutual authentication mechanism for internet of surveillance drones.
Concurr. Comput. Pract. Exp., 2023

Detection and Hardening Strategies to Secure an Enterprise Network.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
A trust management framework using forest fire model to propagate emergency messages in the Internet of Vehicles (IoV).
Veh. Commun., 2022

Combinatorial Analysis for Securing IoT-Assisted Industry 4.0 Applications From Vulnerability-Based Attacks.
IEEE Trans. Ind. Informatics, 2022

A Psychologically Inspired Fuzzy Cognitive Deep Learning Framework to Predict Crowd Behavior.
IEEE Trans. Affect. Comput., 2022

Cognitive AI for Mitigation of Misinformation in Online Social Networks.
IT Prof., 2022

2021
A psychologically-inspired fuzzy-based approach for user personality prediction in rumor propagation across social networks.
J. Intell. Fuzzy Syst., 2021

A multimodal deep fusion graph framework to detect social distancing violations and FCGs in pandemic surveillance.
Eng. Appl. Artif. Intell., 2021

Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis.
Connect. Sci., 2021

PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks.
Proceedings of the Ubiquitous Security - First International Conference, 2021

A Cognitive IoT Smart Surveillance Framework for Crowd Behavior Analysis.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic.
Mob. Networks Appl., 2020

Soft computing and intelligent systems: techniques and applications.
J. Intell. Fuzzy Syst., 2020

Application of Cognitive Computing for Smart Crowd Management.
IT Prof., 2020

2019
Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things.
Pervasive Mob. Comput., 2019

Nighttime visual refinement techniques for surveillance video: a review.
Multim. Tools Appl., 2019

A nature - inspired approach based on Forest Fire model for modeling rumor propagation in social networks.
J. Netw. Comput. Appl., 2019

Soft computing and intelligent systems: techniques and applications.
J. Intell. Fuzzy Syst., 2019

Unsupervised anomaly detection in underwater acoustic sensor networks.
J. Intell. Fuzzy Syst., 2019

"Think Before You Post": A Cognitive Psychological Approach for Limiting Bullying in Social Media.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Securing Smart Healthcare Systems from Vulnerability Exploitation.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

2018
Evaluating color and texture features for forgery localization from illuminant maps.
Multim. Tools Appl., 2018

An author-specific-model-based authorship analysis using psycholinguistic aspects and style word patterns.
J. Intell. Fuzzy Syst., 2018

Soft computing and intelligent systems: Techniques and applications.
J. Intell. Fuzzy Syst., 2018

A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations.
IEEE Access, 2018

Linguistic Feature Based Filtering Mechanism for Recommending Posts in a Social Networking Group.
IEEE Access, 2018

A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

A Deep Learning Approach to Predict Crowd Behavior Based on Emotion.
Proceedings of the Smart Multimedia - First International Conference, 2018

2017
Self-organized night video enhancement for surveillance systems.
Signal Image Video Process., 2017

Recolorizing dark regions to enhance night surveillance video.
Multim. Tools Appl., 2017

Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives.
J. Netw. Comput. Appl., 2017

Digital image forgery detection using compact multi-texture representation.
J. Intell. Fuzzy Syst., 2017

Special issue on soft computing and intelligent systems: Tools, techniques and applications.
J. Intell. Fuzzy Syst., 2017

A fuzzy fusion approach to enlighten the illuminated regions of night surveillance videos.
J. Intell. Fuzzy Syst., 2017

Predicting cancer subtypes from microarray data using semi-supervised fuzzy C-means algorithm.
J. Intell. Fuzzy Syst., 2017

Fault-resilient localization for underwater sensor networks.
Ad Hoc Networks, 2017

Detecting Spliced Face Using Texture Analysis.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Authorship Analysis of Social Media Contents Using Tone and Personality Features.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Fine-Grained, Multi-key Search Control in Multi-user Searchable Encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Privacy Preserving and Safety-Aware Semi-supervised Model for Dissecting Cancer Samples.
Proceedings of the Computational Collective Intelligence - 9th International Conference, 2017

2016
Simulation Tools for Underwater Sensor Networks: A Survey.
Netw. Protoc. Algorithms, 2016

Mutual Authentication Based on HECC for RFID Implant Systems.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Encryption Scheme Based on Hyperelliptic Curve Cryptography.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2015
Introduction to the special issue on Cognitive Radio Networks.
Comput. Electr. Eng., 2015

Hallmarking Author Style from Short Texts by Multi-Classifier Using Enhanced Feature Set.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Detecting spliced face in a group photo using PCA.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

Secure communication in mobile underwater wireless sensor networks.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Unsupervised gene selection using particle swarm optimization and k-means.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015

2014
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps.
Proceedings of the Security in Computing and Communications, 2014

A Novel Disease Outbreak Prediction Model for Compact Spatial-Temporal Environments.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Classifying Sonar Signals Using an Incremental Data Stream Mining Methodology with Conflict Analysis.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Location-Based Mutual and Mobile Information Navigation System: Lemmings.
Proceedings of the Intelligent Distributed Computing, 2014

2013
A Review on P2P Video Streaming
CoRR, 2013

Introduction to the special issue on Recent Developments in Computing and Communications.
Comput. Electr. Eng., 2013

Discriminating most urgent trajectories in a road network using density based online clustering.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Special Issue on Advances in Computing and Communications.
Netw. Protoc. Algorithms, 2012

Survey on Distributed Data Mining in P2P Networks
CoRR, 2012

Cache based approach for improving location based query processing in mobile environment.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Hexagonal groups based key management using deployment knowledge in wireless sensor networks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Sybil resilient identity distribution in P2P networks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

2011
An ACO Algorithm for Effective Cluster Head Selection
CoRR, 2011

Securing Biometric Images using Reversible Watermarking
CoRR, 2011

Mobile Query Processing-Taxonomy, Issues and Challenges.
Proceedings of the Advances in Computing and Communications, 2011

Enhancement of BARTERCAST Using Reinforcement Learning to Effectively Manage Freeriders.
Proceedings of the Advances in Computing and Communications, 2011

Improving Hadoop Performance in Handling Small Files.
Proceedings of the Advances in Computing and Communications, 2011

Anonymous and Secured Communication Using OLSR in MANET.
Proceedings of the Advances in Computing and Communications, 2011

2010
SURVEY OF SEARCH AND REPLICATION SCHEMES IN UNSTRUCTURED P2P NETWORKS.
Netw. Protoc. Algorithms, 2010

"Q-Feed" - An Effective Solution for the Free-Riding Problem in Unstructured P2P Networks.
Int. J. Digit. Multim. Broadcast., 2010

Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks
CoRR, 2010

Survey of Search and Replication Schemes in Unstructured P2P Networks
CoRR, 2010

An Enhanced Search Technique for Managing Partial Coverage and Free Riding in P2P Networks
CoRR, 2010

2009
Introduction to Distributed Systems
CoRR, 2009

Introduction to Bioinformatics
CoRR, 2009

Swarm Intelligence
CoRR, 2009

Review of Replication Schemes for Unstructured P2P Networks
CoRR, 2009

2008
An Introduction to Knowledge Management
CoRR, 2008

Mobile Agents for Content-Based WWW Distributed Image Retrieval
CoRR, 2008

Information Hiding Techniques: A Tutorial Review
CoRR, 2008

Q-learning based collaborative load balancing using distributed search for unstructured P2P networks.
Proceedings of the LCN 2008, 2008

2007
A System for Predicting Subcellular Localization of Yeast Genome Using Neural Network
CoRR, 2007

Performance Comparison of Persistence Frameworks
CoRR, 2007

A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem
CoRR, 2007

Autonomous Data Replication Using Q-Learning for Unstructured P2P Networks.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

2005
An Agent Based Peer-to-Peer Network with Thesaurus Based Searching, and Load Balancing.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Steganography Based WWW Distributed Image Retrieval with Mobile Agents
CoRR, 2004


  Loading...