Umesh Kumar Lilhore

Orcid: 0000-0001-6073-3773

According to our database1, Umesh Kumar Lilhore authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimizing protein sequence classification: integrating deep learning models with Bayesian optimization for enhanced biological analysis.
BMC Medical Informatics Decis. Mak., December, 2024

Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation.
J. Cloud Comput., December, 2024

Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach.
Peer Peer Netw. Appl., November, 2024

A systematic literature review for load balancing and task scheduling techniques in cloud computing.
Artif. Intell. Rev., October, 2024

Unveiling the prevalence and risk factors of early stage postpartum depression: a hybrid deep learning approach.
Multim. Tools Appl., August, 2024

A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm.
Clust. Comput., August, 2024

An adaptive mobility-aware secure handover and scheduling protocol for Earth Observation (EO) communication using fog computing.
Earth Sci. Informatics, June, 2024

A smart waste classification model using hybrid CNN-LSTM with transfer learning for sustainable environment.
Multim. Tools Appl., March, 2024

A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning.
Comput. Secur., January, 2024

Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency.
PeerJ Comput. Sci., 2024

2023
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing.
J. Cloud Comput., December, 2023

Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree.
J. Cloud Comput., December, 2023

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree.
J. Cloud Comput., December, 2023

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning.
Sensors, September, 2023

An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering.
Sensors, September, 2023

Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model.
Array, September, 2023

Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Trans. Emerg. Telecommun. Technol., June, 2023

ProRE: An ACO- based programmer recommendation model to precisely manage software bugs.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain.
IEEE Access, 2023

2022
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022

A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method.
Sensors, 2022

A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2022

Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205.
Comput. Electr. Eng., 2022

A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography.
Comput. Electr. Eng., 2022

2012
A New Approach to Overcome Problem of Congestion in Wireless Networks.
Proceedings of the Intelligent Informatics, 2012


  Loading...