Virendra Kumar

Orcid: 0000-0001-9159-4833

According to our database1, Virendra Kumar authored at least 39 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Čech L-Fuzzy Rough Proximity Spaces.
New Math. Nat. Comput., July, 2024

<i>XL<sub>1</sub>R-Net</i>: Explainable AI-driven improved L1-regularized deep neural architecture for NSCLC biomarker identification.
Comput. Biol. Chem., February, 2024

Enlightening the path to NSCLC biomarkers: Utilizing the power of XAI-guided deep learning.
Comput. Methods Programs Biomed., January, 2024

Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard.
Proc. Priv. Enhancing Technol., 2024

High Performance S-Band GaN T/R Module Using Hybrid Microwave Integrated Circuit.
IEEE Access, 2024

2023
XAI-MethylMarker: Explainable AI approach for biomarker discovery for breast cancer subtype classification using methylation data.
Expert Syst. Appl., September, 2023

XAI-CNVMarker: Explainable AI-based copy number variant biomarker discovery for breast cancer subtypes.
Biomed. Signal Process. Control., July, 2023

An explainable AI-driven biomarker discovery framework for Non-Small Cell Lung Cancer classification.
Comput. Biol. Medicine, February, 2023

Multi-agent Deep Q-Learning Based Navigation.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Multi-agent Q-learning Based Navigation in an Unknown Environment.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Deep Learning Based Model for Breast Cancer Subtype Classification.
CoRR, 2021

Triphasic DeepBRCA-A Deep Learning-Based Framework for Identification of Biomarkers for Breast Cancer Stratification.
IEEE Access, 2021

2020
Impact of ageing on the brain regions of the schizophrenia patients: an fMRI study using evolutionary approach.
Multim. Tools Appl., 2020

Identification of changes in grey matter volume using an evolutionary approach: an MRI study of schizophrenia.
Multim. Syst., 2020

Segmentation of prostate zones using probabilistic atlas-based method with diffusion-weighted MR images.
Comput. Methods Programs Biomed., 2020

Effects of Vehicular Blockage on Latency in 5G mm Wave Systems with Dynamic Point Selection.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Starlike Functions Related to the Bell Numbers.
Symmetry, 2019

2018
A Security Credential Management System for V2X Communications.
IEEE Trans. Intell. Transp. Syst., 2018

Sharp Bounds on the Higher Order Schwarzian Derivatives for Janowski Classes.
Symmetry, 2018

2017
Binary Hash Tree based Certificate Access Management.
IACR Cryptol. ePrint Arch., 2017

Binary hash tree based certificate access management for connected vehicles.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

2016
Site Suitability Evaluation for Urban Development Using Remote Sensing, GIS and Analytic Hierarchy Process (AHP).
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
Threat and Countermeasures Analysis for WAVE Service Advertisement.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

Inverse kinematics of redundant serial manipulators using interval method in handling uncertainties.
Proceedings of the 2015 Conference on Advances In Robotics, 2015

2014
Test-Retest Reproducibility Analysis of Lung CT Image Features.
J. Digit. Imaging, 2014

Predicting Outcomes of Nonsmall Cell Lung Cancer Using CT Image Features.
IEEE Access, 2014

2013
Automated delineation of lung tumors from CT images using a single click ensemble segmentation approach.
Pattern Recognit., 2013

A security credential management system for V2V communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2012
Provable security support for kerberos (and beyond).
PhD thesis, 2012

A New Pseudorandom Generator from Collision-Resistant Hash Functions.
IACR Cryptol. ePrint Arch., 2012

Identity-based Encryption with Efficient Revocation.
IACR Cryptol. ePrint Arch., 2012

On Black-Box Reductions between Predicate Encryption Schemes.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

2011
Provable-security analysis of authenticated encryption in Kerberos.
IET Inf. Secur., 2011

Developing a classifier model for lung tumors in CT-scan images.
Proceedings of the IEEE International Conference on Systems, 2011

2010
Autonomous Underwater Vehicle for 150m Depth-Development Phases and Hurdles Faced.
Proceedings of the Trends in Intelligent Robotics - 13th FIRA Robot World Congress, 2010

Control Architecture for AUV-150: A Systems Approach.
Proceedings of the Trends in Intelligent Robotics - 13th FIRA Robot World Congress, 2010

2007
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
A new protocol to counter online dictionary attacks.
Comput. Secur., 2006

2004
CompChall: Addressing Password Guessing Attacks.
IACR Cryptol. ePrint Arch., 2004


  Loading...