1 |
Secure Encrypted Word Proximity Retrieval Framework for Outsourced Relational Database Backed Applications |
2022 |
Springer |
Scopus |
2 |
Privacy Preserving Semantic-Aware Multi-keyword Ranked Dynamic Search Over Encrypted Data |
2021 |
Springer |
Scopus |
3 |
Stateless Key Management Scheme for Proxy-Based Encrypted Databases |
2021 |
Springer |
Scopus |
4 |
Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric |
2021 |
Springer |
Scopus |
5 |
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data |
2021 |
Springer |
Scopus |
6 |
A compact analytical survey on task scheduling in cloud computing environment |
2021 |
IJETT |
Scopus |
7 |
Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases |
2020 |
InderScience |
Scopus |
8 |
A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases |
2019 |
InderScience |
Scopus |
9 |
Fuzzy-Based Integration of Security and Trust in Distributed Computing |
2019 |
Springer |
Scopus |
10 |
Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data |
2018 |
IEEE |
Scopus |
11 |
Usage of DHS and De-duplicating Encrypted Data using ABE & ECC for Secured Cloud Environment |
2018 |
IEEE |
Scopus |
12 |
A study on impact of untrustworthy and older recommendations over T-Grid computational model |
2018 |
Springer |
Scopus |
13 |
Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs |
2018 |
IEEE |
Scopus |
14 |
A survey on client side and server side approaches to secure web applications |
2017 |
IEEE |
Scopus |
15 |
Experimental results on multi-key searchable encryption technique with different elliptic curves and app designing |
2017 |
IJAIT |
Scopus |
16 |
A novel proximity based searchable encryption scheme using referential dissimilarity |
2017 |
IEEE |
Scopus |
17 |
Improving network lifetime in WSN s based on maximum residual energy |
2021 |
INCET |
Scopus |
18 |
Pulmonary CT Images Segmentation using CNN and UNet Models of Deep Learning |
2020 |
IEEE |
Scopus |
19 |
Analysis and implementation of a parallel computing cluster for solving computational problems in data analytics |
2020 |
ICCCS |
Scopus |
20 |
Energy efficient load balancing approach for multipath routing protocol in ad hoc network |
2019 |
ICACCP |
Scopus |
21 |
Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images |
2019 |
ICISC |
Scopus |
22 |
Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit |
2018 |
ICCSP |
Scopus |
23 |
Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolutional Network |
2018 |
ICCSP |
Scopus |
24 |
Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs |
2018 |
ICISC |
Scopus |
25 |
Design and implementation of GPU-based matrix chain multiplication using C++AMP |
2017 |
ICECCT |
Scopus |
26 |
A Study of Automated Evaluation of Student s Examination Paper using Machine Learning Techniques |
2021 |
ICCCIS |
Scopus |
27 |
Feature Impact on Sentiment Extraction of TEnglish Code-Mixed Movie Tweets |
2021 |
SIST |
Scopus |
28 |
Heart Disease Prediction Using Extended KNN (E-KNN) |
2021 |
SIST |
Scopus |
29 |
Heart disease prediction using extended KNN(E-knn) |
2020 |
IJATCSE |
Scopus |
30 |
Sentiment Extraction from Bilingual Code Mixed Social Media Text |
2020 |
AISE |
Scopus |
31 |
Topical and trust based page ranking using automatic seed selection |
2017 |
IEEE |
Scopus |
32 |
A contextual deep clustering based intrusion detection method for cloud |
2019 |
IJAST |
Scopus |
33 |
Detection of intrusion using hybrid feature selection and flexible rule based machine learning |
2019 |
IJETT |
Scopus |
34 |
Analysis on Malware Issues in Online Social Networking Sites (SNS) |
2019 |
ICACCS |
Scopus |
35 |
Optimized key management scheme for sensor networks using genetic algorithm |
2019 |
Springer |
Scopus |
36 |
A review on application security management using web application security standards |
2019 |
AISC |
Scopus |
37 |
Survey on design challenges and analysis of service architecture of DRM |
2017 |
ICEI |
Scopus |
38 |
Prediction of epileptic seizure classification using third-order cumulants and sparse autoencoder |
2021 |
ITAIT |
Scopus |
39 |
Multi-Objective Feature Selection Method by Using ACO with PSO Algorithm for Breast Cancer Detection |
2021 |
IJIES |
Scopus |
40 |
Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model |
2021 |
IJICS |
Scopus |
41 |
Bat-Grey Wolf Optimizer and kernel mapping for automatic incremental clustering |
2020 |
IJMSSC |
Scopus |
42 |
An efficient cryptanalysis scheme for secure data storage system in cloud using optimal dual encryption algorithm |
2020 |
IJSOI |
Scopus |
43 |
Particle Grey Wolf Optimizer (PGWO) Algorithm and Semantic Word Processing for Automatic Text Clustering |
2019 |
IJUFKBS |
Scopus |
44 |
Design and implementation of a hacker detection scheme: A network security measure in heterogeneous WSN |
2019 |
Lecture Notes in Networks and Systems |
Scopus |
45 |
A secure and computational-efficient multicast key distribution for wireless networks |
2019 |
ICISC |
Scopus |
46 |
Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway |
2018 |
ICCCS |
Scopus |
47 |
Estimating software reliability using ant colony optimization technique with salesman problem for software process |
2018 |
IJATCSE |
Scopus |
48 |
Attacker evidence system in WSN |
2018 |
CCIS |
Scopus |
49 |
Investigation on email text mining techniques and tools |
2018 |
IJMTT |
Scopus |
50 |
Automation of component selection process for designing of reusable components using drag and drop mechanism |
2017 |
ICISC |
Scopus |
51 |
Task-Scheduling Algorithms in Cloud Environment |
2017 |
Springer |
Scopus |