T. Gireesh Kumar

Orcid: 0000-0002-6313-3850

According to our database1, T. Gireesh Kumar authored at least 24 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Community detection of trajectory data for location-based facility recommendation system.
Int. J. Inf. Commun. Technol., 2024

A Multi-class Classification for Detection of IoT Network Attacks Using Machine Learning Models.
Proceedings of the Distributed Computing and Intelligent Technology, 2024

2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023

A vision system to assist visually challenged people for face recognition using multi-task cascaded convolutional neural network (MTCNN) and local binary pattern (LBP).
J. Ambient Intell. Humaniz. Comput., 2023

Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm.
Int. J. Adv. Intell. Paradigms, 2023

An early malware threat detection model using Conditional Tabular Generative Adversarial Network.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2021
An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation.
Int. J. Intell. Syst. Technol. Appl., 2021

A Multi Class Classification for Detection of IoT Botnet Malware.
Proceedings of the Computing Science, Communication and Security, 2021

2020
Future Engineering Curricula: Balancing Domain Competence with CPS Readiness.
IEEE Des. Test, 2020

2019
String-Based Feature Representation for Trajectory Clustering.
Int. J. Embed. Real Time Commun. Syst., 2019

Ransomware Analysis Using Reverse Engineering.
Proceedings of the Advances in Computing and Data Sciences, 2019

2017
Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions.
J. Commun., 2017

An Improved Approach for Securing Document Images Using Dual Cover.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2017

2016
A Framework for Dynamic Malware Analysis Based on Behavior Artifacts.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

Frontier Based Multi Robot Area Exploration Using Prioritized Routing.
Proceedings of the 30th European Conference on Modelling and Simulation, 2016

2014
A Novel Cloud Based NIDPS for Smartphones.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2011
Steganalysis for Calibrated and Lower Embedded Uncalibrated Images.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2011

Cognitive Environment for Pervasive Learners.
Proceedings of the Advances in Computing and Communications, 2011

A Survey on Digital Image Steganographic Methods.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

Tracking of Nose Tip: An Alternative for Mouse.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

2008
Agent Based Ground Flight Control Using Type-2 Fuzzy Logic and Hybrid Ant Colony Optimization to a Dynamic Environment.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008


  Loading...