Faculty Publications

In last five years, more than 500 research papers have been published by Department faculty and students in reputed conferences and Journals. Department faculty members are also empaneled as reviewers on many prestigious research journals of IEEE, Elsevier, ACM, Wiley, Springer & many more. The details of publications & citations for last four years is given below:

Some of the recent publications :

Book Chapter Publications

 

  1. Verma, S., & Jain, A. K. (2022). A Survey on Sentiment Analysis Techniques for Twitter. In Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (pp. 57-90). IGI Global.
  2. Aditi Zear & Virender Ranga, “Trajectory Tracking Control of Unmanned Aerial Vehicle for Autonomous Applications“, Lecture Notes in Networks and Systems (Springer),April 2020, pp. 421-430.
  3. Sonam Bhardwaj, Rochak Swami, & Mayank Dave (2021), “Forensic Investigation-Based Framework for SDN Using Blockchain”, In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, pp. 74-98, IGI Global, DOI: 10.4018/978-1-7998-7589-5.ch004
  4. Rochak Swami, Mayank Dave, Virender Ranga, Nikhil Tripathi, Abhijith Kalayil Shaji & Avani Sharma (2021), “Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)”, In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, pp. 35-58, IGI Global, doi: 10.4018/978-1-7998-7589-5.ch002.
  5. Sonam Bhardwaj, Rochak Swami & Mayank Dave (2021), “Forensic Investigation-Based Framework for SDN Using Blockchain”, In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, pp. 74-98, IGI Global, DOI: 10.4018/978-1-7998-7589-5.ch004
  6. Rochak Swami, Mayank Dave, Virender Ranga, Nikhil Tripathi, Abhijith Kalayil Shaji & Avani Sharma (2021), “Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)”, In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, pp. 35-58, IGI Global, doi: 10.4018/978-1-7998-7589-5.ch002.
  7. Priyanka Ahlawat and Mayank Dave (2021), “An Efficient Key Management Solution to Node Capture Attack for WSN, In: Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies, Eds: Brij B. Gupta, Nadia Nedjah, pp. 167-180, CRC Press, doi: 10.1201/9781003031352-11.
  8. Rekha, and Garg Ritu. “Existing Enabling Technologies and Solutions for Energy Management in IoT, Book chapter in “Energy Conservation for IoT Devices: Concepts, Paradigms and Solutions, Springer 2020.
  9. Swami, R., Dave, M., & Ranga, V. (2020). DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN. In P. Ahlawat, & M. Dave (Eds.), Security and Privacy Issues in Sensor Networks and IoT, pp. 193-214. Hershey, PA, USA: IGI Global. doi:10.4018/978-1-7998-0373-7.ch008.
  10. Tarandeep, Bhushan, K., (2020). Load Balancing in Cloud through Task Scheduling. In Recent Trends in Communication and Intelligent Systems (pp. 195-204), Springer, Singapore.
  11. Paharia, B., & Bhushan, K. (2020). A Comprehensive Review of Distributed Denial of Service (DDoS) Attacks in Fog Computing Environment. In Handbook of Computer Networks and Cyber Security (pp. 493-524). Springer, Cham.
  12. Priyanka Ahlawat, Security and Privacy Issues in Sensor Networks and IoT, IGI global, 2020.
  13. Rekha & Garg Ritu. “Existing Enabling Technologies and Solutions for Energy Management in IoT”, Book chapter in “Energy Conservation for IoT Devices: Concepts, Paradigms and Solutions, Springer 2020.
  14. Amit Rathee & Jitender Kumar Chhabra, “Identification and Construction of Reusable Components from Object-Oriented Legacy Systems using various Software Artifact”, book chapter no 8 in CRC Book titled “CITASEP-2020: Computational Intelligence Techniques and their Applications to Software Engineering Problems” 2020, p 111-136.
  15. Verma & R. K. Aggarwal, “Neighborhood-Based Collaborative Recommendations: An Introduction,” in Applications of Machine Learning, P. Johri, J. K. Verma, and S. Paul, Eds. Singapore: Springer Singapore, 2020, pp. 91–110.
  16. Ubale & A. K. Jain, “Survey on DDoS Attacks Techniques and Solutions in Software Defined Network,” In book: Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 2020, (Multimedia Systems and Applications, Springer).
  17. Dua, M., Mudgal, A., Bhakar, M., Dhiman, P., & Choudhary, B. (2020). K-Means and DNN-Based Novel Approach to Human Identification in Low Resolution Thermal Imagery. In Sarfraz, M. (Ed.), Advancements in Computer Vision Applications in Intelligent Systems and Multimedia Technologies (pp. 25-37). IGI Global. https://doi.org/10.4018/978-1-7998-4444-0.ch002.
  18. Agrawal, S., & Ahlawat, P. (2020). Key Management Schemes in Internet of Things: A Matrix Approach. In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario’s(pp. 381-400). Springer, Cham.
  19. Nehal A., & Ahlawat, P. (2020). 5G for IoT: Between Reality and Friction. In Fundamental and Supportive Technologies for 5G Mobile Networks(pp. 1-23). IGI Global.
  20. Kumar & R. K. Aggarwal (2020). “A Time Delay Neural Network Acoustic Modeling for Hindi Speech Recognition”, In Advances in Data and Information Sciences (pp. 425-432). Springer, Singapore.
  21. Nidhi Sharma & R.K Aggarwal. “Ontology as a Tool to Enable Health Internet of things viable 5G Communication Networks” in “Ontology Based Information Retrieval for Health Care Systems” (WILEY Publishers Since 1807).
  22. Sakshi Singhal, & Virender Ranga,  “Passive Authentication Image Forgery Detection Using Multilayer CNN”, In: Marriwala N., Tripathi C.C., Kumar D., Jain S. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol. 140. Springer, Singapore, 29 September 2020, https://doi.org/10.1007/978-981-15-7130-5_18.
  23. Parul Singh & Virender Ranga,  “Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment”, In: Marriwala N., Tripathi C.C., Kumar D., Jain S. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol. 140. Springer, Singapore, 29 September 2020, https://doi.org/10.1007/978-981-15-7130-5_38.
  24. Rochak Swami, Mayank Dave & Virender Ranga, “Towards utilizing Blockchain for countering Distributed Denial-of-Service (DDoS)”, in Handbook of Research on Blockchain-Enabled Privacy and Access Control (IGI Global), accepted, Nov 2020.
  25. Amit Rathee & Jitender Kumar Chhabra, “Identification and Construction of Reusable Components from Object-Oriented Legacy Systems using various Software Artifact”, CRC Book titled “CITASEP-2020: Computational Intelligence Techniques and their Applications to Software Engineering Problems” Mar 2020, Chapter-8, pp 111-136.
  26. Gulihar, P., & Gupta, B. B. (2020). Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks. In Handbook of Computer Networks and Cyber Security (pp. 421-443). Springer, Cham.
  27. Gupta, B. B., & Quamara, M. (2020). Internet of Things Security: Principles, Applications, Attacks, and Countermeasures. CRC Press.
  28. Narayan, S., & Gupta, B. B. (2020). Study of Smartcards Technology: Structure, Standards, Threats, Solutions, and Applications. In Handbook of Research on Intrusion Detection Systems (pp. 341-356). IGI Global.
  29. Chaturvedi, C., & Gupta, B. B. (2020). Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions. In Handbook of Research on Intrusion Detection Systems (pp. 306-325). IGI Global.
  30. Tewari, A. & Gupta, B.B., 2020. An analysis of provable security frameworks for RFID security. In Handbook of computer networks and cyber security (pp. 635-651). Springer, Cham.
  31. Gupta, B.B., Sahoo, S.R., Bhatia, V., Arafat, A. & Setia, A., 2020. Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs. In Handbook of Research on Intrusion Detection Systems (pp. 237-262). IGI Global.
  32. Rochak Swami, Mayank Dave & Virender Ranga (2020), “DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN”, In: Research Anthology on Combating Denial-of-Service Attacks, pp. 248-264, IGI Global, doi: 10.4018/978-1-7998-5348-0.ch013.
  33. Swami, R., Dave, M., &Ranga, V. (2020). DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN. In P. Ahlawat, & M. Dave (Eds.), Security and Privacy Issues in Sensor Networks and IoT, pp. 193-214. Hershey, PA, USA: IGI Global. doi:10.4018/978-1-7998-0373-7.ch008.
  34. G.K. Verma Machine Learning, Image Processing, Network Security and Data Sciences Second International Conference, MIND 2020, Silchar, India, July 30 – 31, 2020, Proceedings, Part-I.
  35. G.K. Verma “Machine Learning, Image Processing, Network Security and Data Sciences” Second International Conference, MIND 2020, Silchar, India, July 30 – 31, 2020, Proceedings, Part II.
  36. Sachan P. & Singh, V., A Unified Framework for Co-located Event Detection in Twitter, in Data Science & Its Applications (CRC Books).
  37. Patel, J., & Singh. V, Query Morphing: a novel for Data Exploration, in Smart Innovations in Big Data Analytics and Internet of Things for Good Living (IGI).
  38. Rekha and Ritu Garg, “Existing Enabling Technologies and Solutions for Energy Management in IoT”, Book chapter in “Energy Conservation for IoT Devices: Concepts, Paradigms and Solutions, Springer 2019.
  39. Ubale and A. K. Jain, “Survey on DDoS Attacks Techniques and Solutions in Software Defined Network,” In book: Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 2019, Multimedia Systems and Applications, Springer.
  40. Bhumika Pahariaand & Kriti Bhushan, “Fog Computing: Concepts, Applications, and Countermeasures against Security Attacks”, In Handbook of Research on Cloud Computing and Big Data Applications in IoT (pp. 302-329), IGI Global, 2019.
  41. K. Mahana and R.K. Aggarwal, “Secure Data Deduplication of Encrypted Data in Cloud”, In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 196-212). IGI Global, 2019.
  42. Gopal Singh Kushwah and Virender Ranga, “Distributed Denial of Service Attacks and Defense in Cloud Computing”, Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, IGI Global, 41-59, 2019.
  43. Anshu Devi, Ramesh Kait and Virender Ranga, “Security Challenges in Fog Computing”, Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, IGI Global, 41-59, 2019.
  44. K. Verma, J.S. Lather and A. Kaushal,“MatConvNet-Based Fast Method for Cervical MR Images Classification”, In: Verma N., Ghosh A.(eds) Computational Intelligence: Theories, Applications and Future Directions – Volume II. Advances in Intelligent Systems and Computing, vol. 799. Springer, Singapore, 2019.
  45. Mrinaal Malhotra, Jitender Kumar Chhabra,”Systematic Review of Dependencies in Source Code of Software and Their Categorization”, Lecture Notes in Networks and Systems, vol 46, 2019, p 771-78, Jan 2019.
  46. Amit Rathee, Jitender Kumar Chhabra, “Improving Cohesion of A Software System by Performing Usage Pattern Based Clustering”, Procedia CS, Volume 125, 2018, Pages 740–746, 2018.
  47. Priyanka Ahlawat and Mayank Dave, “Key Management in WSN Security: An Attacker’s Perspective”, Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization. IGI Global, Pages 303-325, 2019.
  48. Goel and A. K. Jain, “Overview of Smartphone Security: Attack and Defense Techniques,” In book: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 2018, CRC Press (Taylor & Francis group).
  49. Patel Jay and Vikram Singh, Query Morphing, “A Proximity-Based Approach for Data Exploration”, from Natural to Artificial Intelligence: Algorithms and Applications, 147, 2018.
  50. Vishal Pasricha and R. K. Aggarwal, “End-to-end Acoustic Modeling using Convolutional Neural Networks,” in Intelligent Speech Signal Processing, edited by Nilanjan Dey, Elsevier 2018.
  51. Vishal Pasricha and R. K. Aggarwal, “Convolutional Neural Networks for Raw Speech Recognition,” in from Natural to Artificial Intelligence Algorithms and Applications in IntechOpen, 2018, DOI: 10.5772/intechopen.80026.
  52. B. Gupta, “Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives”, CRC Press, Nov 2018.
  53. Chaudhary and B.B.Gupta, S. Gupta, “Defending the OSN-Based Web Applications from XSS Attacks Using Dynamic JavaScript Code and Content Isolation”, In: Kapur P., Kumar U., Verma A. (eds) Quality, IT and Business Operations. Springer Proceedings in Business and Economics. Springer, Singapore, 2018.

 

National and International Journals (SCI/SCIE/Scopus)

  1. Ankit K Jain, Brij B Gupta, Kamaljeet Kaur, and Piyush Bhutani (2022), “A content and URL analysis‐based efficient approach to detect smishing SMS in intelligent systems”, International Journal of Intelligent Systems.
  2. Anshul Kumar, Ankit Kumar Jain, “Emotion detection in psychological texts by fine-tuning BERT using emotion–cause pair extraction” International Journal of Speech Technology, Volume 25, pages 727-743.
  3. Ankit Kumar Jain, Ninmoy Debnath, Arvind Kumar Jain, (2022) “ APuML: An Efficient Approach to Detect Mobile Phishing Webpages using Machine Learning, “ Wireless Personal Communications, Volume 125, pages 3227–3248.
  4. Puchala, S. P. R., Chhabra, J. K., & Rathee, A. (2022). Ensemble clustering based approach for software architecture recovery. International Journal of Information Technology, 1-7. (Scopus)
  5. Prajapati, V., & Gupta, B. B. (2022). A Robust Authentication System with Application Anonymity in Multiple Identity Smart Cards. Journal of Information Technology Research (JITR), 15(1), 1-21. (Scopus)
  6. Puchala, S. P. R., Chhabra, J. K., & Rathee, A. (2022). Software Architecture Recovery Using Integrated Dependencies Based on Structural, Semantic, and Directory Information. International Journal of Information System Modeling and Design (IJISMD), 13(1), 1-20. (Scopus)
  7. Surabhi, & Jain, A. K. (2022). Twitter sentiment analysis on Indian Government schemes using machine learning models. International Journal of Swarm Intelligence, 7(1), 39-52, Inderscience.
  8. Amit Rathee, Jitender Kumar Chhabra, “Feature-Based Critical Components Identification in Multimedia Software”, Multimedia Tools and Applications (Special Issue on Multimedia Software Engineering: Challenges and Opportunities), (SCI, IF: 2.5) Accepted, 2021.
  9. Amit Rathee, Jitender Kumar Chhabra, “Extraction and Evaluation of Software Components from Object-Oriented Artifacts”, Informatica (Scopus), Vol 45, No 1, Mar 2021, p 171-172.
  10. Pankaj Upadhyay, Jitender Kumar Chhabra, “Multilevel Thresholding Based Image Segmentation Using New Multistage Hybrid Optimization Algorithm”, Journal of Ambient Intelligence and Humanized Computing (SCI, IF: 7.1); Vol 12Jan 2021, 1081–1098.
  11. K. Jain & B. B. Gupta (2021). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 1-39.
  12. Pankaj, S., & Dua, M. (2021). A novel To CC map and two-level scrambling-based medical image encryption technique. Network Modeling Analysis in Health Informatics and Bioinformatics, 10(1), 1-19. (Scopus)
  13. Kumar, A., Jain, A. K., & Dua, M. (2021). A comprehensive taxonomy of security and privacy issues in RFID. Complex & Intelligent Systems, 7(3), 1327-1347.
  14. Mittal, A., & Dua, M. (2021). Automatic speaker verification systems and spoof detection techniques: review and analysis. International Journal of Speech Technology, 1-30 (Scopus).
  15. Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177. (SCIE)
  16. Kumar, A., & Jain, A. K. (2021). Mutual authentication protocol for low cost passive tag in RFID system. International Journal of Information Technology, 13(3), 1209-1215. (Scopus)
  17. Kumar Birthriya, S., & Jain, A. K. (2021). A Comprehensive Survey of Phishing Email Detection and Protection Techniques. Information Security Journal: A Global Perspective, 1-30.(Scopus)
  18. Rani, R., & Garg, R. (2021). Pareto based ant lion optimizer for energy efficient scheduling in cloud environment. Applied Soft Computing, 113, 107943.
  19. Rani, R., & Garg, R. (2021). A Survey of Thermal Management in Cloud Data Centre: Techniques and Open Issues. Wireless Personal Communications, 118(1), 679-713.
  20. Gupta, S., Garg, R., Gupta, N., Alnumay, W. S., Ghosh, U., & Sharma, P. K. (2021). Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks. Journal of Information Security and Applications, 58, 102768.
  21. Rani, R., & Garg, R. (2021). Energy efficient task scheduling using adaptive PSO for cloud computing. International Journal of Reasoning-based Intelligent Systems, 13(2), 50-58.
  22. K. Jain & B. B. Gupta, “A survey of phishing attack techniques, defense mechanisms and open research challenges”, Enterprise Information Systems, Taylor & Francis, 2021, (SCI Index).
  23. Kumar, A. K. Jain & M. Dua, “A comprehensive taxonomy of security and privacy issues in RFID,” Complex & Intelligent Systems, Springer, 2021, (SCI Index).
  24. Kumar, & A. K. Jain, “Mutual authentication protocol for low cost passive tag in RFID system,” International Journal of Information Technology, Springer, 2021, (Accepted, In Proceeding) (Scopus Index).
  25. Kadyan, V., Dua, M. & Dhiman, P. Enhancing accuracy of long contextual dependencies for Punjabi speech recognition system using deep LSTM. Int J Speech Technol (2021). https://doi.org/10.1007/s10772-021-09814-2 (Scopus Indexed).
  26. Dua, M., Jain, C. & Kumar, S. LSTM and CNN based ensemble approach for spoof detection task in automatic speaker verification systems. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-021-02960-0 (SCI Indexed).
  27. Kumar, A., Jain, A. K., & Dua, M. (2021). A comprehensive taxonomy of security and privacy issues in RFID. Complex & Intelligent Systems, 1-21. https://doi.org/10.1007/s40747-021-00280-6 (SCI Indexed).
  28. Gupta, S., Garg, R., Gupta, N., Alnumay, W. S., Ghosh, U., & Sharma, P. K. (2021). Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks. Journal of Information Security and Applications, 58, 102768, Elsevier (SCI).
  29. Rani, R., & Garg, R. (2021). A Survey of Thermal Management in Cloud Data Centre: Techniques and Open Issues. Wireless Personal Communications, 1-35, Springer (SCI).
  30. Garg, G., & Garg, R. (2021). Brain Tumor Detection and Classification based on Hybrid Ensemble Classifier. arXiv preprint arXiv:2101.00216.
  31. Kumar & R. K. Aggarwal (2021) “An exploration of semi-supervised and language-adversarial transfer learning using hybrid acoustic model for hindi speech recognition”, Journal of Reliable Intelligent Environments. (ACCEPTED) (Scopus Indexed).
  32. Kumar, R. K. Aggarwal (2021) “An Investigation of Multilingual TDNN-BLSTM Acoustic Modeling for Hindi Speech Recognition”, International Journal of Sensors, Wireless Communications and Control. (ACCEPTED)  (Scopus Indexed).
  33. Kumar & R. K. Aggarwal (2021) “Discriminatively trained continuous Hindi speech recognition using integrated acoustic features and recurrent neural network language modeling”, Journal of Intelligent Systems, 30(1), 165-179. (Scopus Indexed).
  34. Achala Shakya, Mantosh Biswas, & Mahesh Pal, “Parametric Study of CNN based Remote Sensing Image Classification,” International Journal of Remote Sensing, Taylor & Francis (Imp. 2.976), Vol. 42, No. 7, pp. 2663-2685, 2021.
  35. Sahoo, Somya Ranjan, & B. B. Gupta. “Multiple features based approach for automatic fake news detection on social networks using deep learning.” Applied Soft Computing 100 (2021): 106983.
  36. Rochak Swami, Mayank Dave & Virender Ranga, “Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking”, Wireless Personal Communications (Springer) (SCI Indexed, Impact Factor= 1.247), November 2020, Online Feb 2021, doi:10.1007/s11277-021-08127-6.
  37. Gopal Singh Kushwah & Virender Ranga, “Optimized extreme learning machine for detecting DDoS attacks in cloud computing”, Computers & Security (Elsevier), accepted, March 2021, (SCI Indexed, Impact Factor= 3.579).
  38. Harshita Bhilwaria, Virender Ranga & Anirudh Gargi “Critical Power Analysis for Control Path of a CAT-M based Edge Device”, International Journal of Information Technology (Springer), accepted, March 2021, (Scopus-Indexed).
  39. Janardan Kumar Verma & Virender Ranga, Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope”, Journal of Intelligent & Robotic Systems, accepted, March 2021, (SCI Indexed, Impact Factor= 2.520).
  40. Gupta, B. B., & Narayan, S. (2021). A key-based mutual authentication framework for mobile contactless payment system using authentication server. Journal of Organizational and End User Computing (JOEUC), 33(2), 1-16.(SCIE)
  41. Verma, A. Sharma, K. K. Jain, & S. Adlakha, “Digital Assistant with Augmented Reality,” in ICT Systems and Sustainability, Springer, 2021, pp. 395–404.
  42. Kamta & V. Verma, “Accuracy Analysis of Similarity Measures in Surprise Framework,” in Evolutionary Computing and Mobile Sustainable Networks, 2021, pp. 861–873.
  43. B. Gupta and Megha Quamara, “A Taxonomy of various Attacks on Smart Card based Applications and Countermeasures,” CCPE, Wiley, (2021), Concurrency and Computation: Practice and Experience, 33(7), 1-1. (SCIE)
  44. Mittal, A., & Dua, M. (2021). Static–dynamic features and hybrid deep learning models based spoof detection system for ASV. Complex & Intelligent Systems, 1-14. (SCIE)
  45. Amarjeet, Anshu Parashar & J.K. Chhabra, “Restructuring object-oriented software systems using various aspects of class information”, Arabian Journal for Science and Engineering (Springer, SCI, Scopus, IF 1.51), Accepted, June 2020.
  46. Gopal Singh Kushwah & Virender Ranga, “Voting Extreme Learning Machine based Distributed Denial of Service Attack Detection in Cloud Computing”, Journal of Information Security and Applications (Elsevier) (SCI Indexed, Impact Factor= 1.537) accepted, April 2020.
  47. Abhishek Verma & Virender Ranga, “CoSec-RPL: Detection of Copycat Attacks in RPL based 6LoWPANs using Outlier Analysis”, Telecommunication Systems (Springer) (SCI-Indexed, Impact Factor=1.707),accepted April 2020, https://doi.org/10.1007/s11235-020-00674-w.
  48. Amarjeet Prajapati, Anshu Parashar, Jitender Kumar Chhabra, Restructuring Object-Oriented Software Systems Using Various Aspects of Class Information. Arab Journal of  Science and  Engg (SCI, IF:1.47), Vol 45, 10433–10457, July 2020, https://doi.org/10.1007/s13369-020-04785-z.
  49. Amarjeet, Jitender Kumar Chhabra, “Information-Theoretic Remodularization of Object-Oriented Software Systems”, Information System Frontiers (SCI, IF 3.23)Vol 22, Aug 2020, p 863-880.
  50. Nitin Goyal, Mayank Dave, & Anil Kumar Verma, “SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs,” Wireless Personal Communications, vol. 113, pp. 1–15, 2020, (SCI, IF-0.951), DOI: 10.1007/s11277-020-07175-8.
  51. K. Jain, D. Goel. S Agarwal, Y. Singh, & G. Bajaj, “Predicting Spam Messages Using Back Propagation Neural Network” Wireless Personal Communications, vol. 110, no. 1, pp. 403-422, 2020. (SCIE)
  52. Vishwakarma, R., & Jain, A. K. (2020). A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommunication systems, 73(1), 3-25. (SCIE)
  53. K. Jain, S. K. Yadav& N. Choudhary, “A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques,” International Journal of E-Services and Mobile Applications (IJESMA), vol. 12, no. 1, pp. 21-38, 2020.(Scopus).
  54. Divya Garg and Gyanendra Kumar Verma, “Emotion Recognition in Valence-Arousal Space from Multi-channel EEG data and Wavelet based Deep Learning Framework (SCOPUS)”, Procedia Computer Science, Vol. 171, Pages 857-867, Elsevier, Jan. 2020.
  55. Ahlawat, P., & Dave, M. (2020). Secure Path Key Establishment Schemes Based on Random Key Management for WSN. Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 1-13.1.
  56. Rani, R., & Garg, R. (2020). Power and Temperature-Aware Workflow Scheduling Considering Deadline Constraint in Cloud. Arabian Journal for Science and Engineering, 1-17.
  57. Sharma, M., & Garg, R. (2020). An artificial neural network based approach for energy efficient task scheduling in cloud data centers. Sustainable Computing: Informatics and Systems, 26, 100373. (SCIE)
  58. Sharma, M., & Garg, R. (2020). HIGA: Harmony-inspired genetic algorithm for rack-aware energy-efficient task scheduling in cloud data centers. Engineering Science and Technology, an International Journal; 23(1), 211-224, Elsevier (SCI).
  59. Garg, R., & Garg, N. (2020). Energy Management in a Multi-Source Energy Harvesting IoT System. Journal of Information Technology Research (JITR), 13(2), 42-59 (IGI Global, Scopus.
  60. Rani, R., & Garg, R. (2020). Power and temperature-aware workflow scheduling considering deadline constraint in cloud. Arabian Journal for Science and Engineering, 45(12), 10775-10791.
  61. Sharma, M., & Garg, R. (2020). An artificial neural network based approach for energy efficient task scheduling in cloud data centers. Sustainable Computing: Informatics and Systems, 26, 100373, Elsevier (SCI).
  62. Sharma, M., & Garg, R. (2020). HIGA: Harmony-inspired genetic algorithm for rack-aware energy-efficient task scheduling in cloud data centers. Engineering Science and Technology, an International Journal; 23(1), 211-224, Elsevier (SCI).
  63. Garg, R., & Garg, N. (2020). Energy Management in a Multi-Source Energy Harvesting IoT System. Journal of Information Technology Research (JITR), 13(2), 42-59 (IGI Global, Scopus.
  64. Arora, G., Maheshwari, P., Aggarwal, S., Garg, R., & Rani, R. (2020, May). Multi-Objective Scheduling Based on Ant Lion Optimizer in Cloud. In International Conference on Wireless Intelligent and Distributed Environment for Communication (pp. 159-169). Springer, Cham.
  65. Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging Ontology Formulation of Optimized Internet of Things (IOT) Services with Cloud Computing. In Soft Computing: Theories and Applications (pp. 31-52). Springer, Singapore (Book Chapter).
  66. Arora, G., Maheshwari, P., Aggarwal, S., Garg, R., & Rani, R. (2020, May). Multi-Objective Scheduling Based on Ant Lion Optimizer in Cloud. In International Conference on Wireless Intelligent and Distributed Environment for Communication (pp. 159-169). Springer, Cham.
  67. Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging Ontology Formulation of Optimized Internet of Things (IOT) Services with Cloud Computing. In Soft Computing: Theories and Applications (pp. 31-52). Springer, Singapore (Book Chapter).
  68. Barik, T., & Singh, V. (2020). AQtpUIR: Adaptive query term proximity based user information retrieval. Journal of Information and Optimization Sciences, 41(6), 1479-1497.
  69. Rochak Swami, Mayank Dave & Virender Ranga, “Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking”, Wireless Personal Communications, Springer, Online Feb 2021,
  70. Rochak Swami, Mayank Dave & Virender Ranga, “Voting‐based intrusion detection framework for securing software‐defined networks”, Concurrency and Computation – Practice and Experience,
  71. Priyanka Ahlawat & Mayank Dave, “Secure Path Key Establishment Schemes Based on Random Key Management for WSN,” Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2020,
  72. Nitin Goyal, Mayank Dave, & Anil Kumar Verma, “SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs,” Wireless Personal Communications, vol. 113, pp. 1–15, 2020, (SCI, IF-0.951), doi: 10.1007/s11277-020-07175-8.
  73. K. Jain, D. Goel. S Agarwal, Y. Singh, & G. Bajaj, “Predicting Spam Messages Using Back Propagation Neural Network” Wireless Personal Communications, vol. 110, no. 1, pp. 403-422, 2020, (SCI Index).
  74. Vishwakarma & A. K. Jain, “A survey of DDoS attacking techniques and defense mechanisms in the IoT network,” Telecommunication Systems, vol. 73, pp. 3-25. 2020, (SCI Index).
  75. K. Jain, S. K. Yadav, & N. Choudhary, “A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques,” International Journal of E-Services and Mobile Applications (IJESMA), vol. 12, no. 1, pp. 21-38, 2020. (Scopus Index)
  76. K. Jain and B. B. Gupta, “Phishing Attack Detection using Search Engine and Heuristics based Technique,” Journal of Information Technology Research (JITR), Vol. 13, No. 2, pp. 94-109, 2020, (Scopus Index).
  77. K. Jain, et al., “PhishKaPe: A Content Based Approach to Escape Phishing Attacks,” Procedia Computer Science, Vol. 171, 2020, pp. 1102-1109, (Scopus Indexed).
  78. Dua, M., Singla, R., Raj, S., & Jangra, A. (2020). Deep CNN models-based ensemble approach to driver drowsiness detection. Neural Computing and Applications, 1-14. https://doi.org/10.1007/s00521-020-05209-7 (SCI Indexed).
  79. Dua, M., Makhija, D., Manasa, P.Y.L., & Mishra, P (2020). A CNN–RNN–LSTM Based Amalgamation for Alzheimer ’s disease Detection. J. Med. Biol. Eng. https://doi.org/10.1007/s40846-020-00556-1 (SCI Indexed).
  80. Mohit Dua, Pawandeep Singh Sethi, Vinam Agrawal and Raghav Chawla, “Performance Analysis of various Front-end and Back End Amalgamations for Noise-robust DNN-based ASR”, Recent Advances in Computer Science and Communications (2020) 13:1. https://doi.org/10.2174/2666255813999200730225301 (Scopus Indexed).
  81. Dua, M., Suthar, A., Garg, A., & Garg, V. (2020). An ILM cosine transform based improved approach to image encryption. Complex & Intelligent Systems, 1-17. https://doi.org/10.1007/s40747-020-00201-z (SCI Indexed).
  82. Rani, R., & Garg, R. (2020). Power and temperature-aware workflow scheduling considering deadline constraint in cloud. Arabian Journal for Science and Engineering, 45(12), 10775-10791, Springer (SCI).
  83. Sharma, M., & Garg, R. (2020). An artificial neural network based approach for energy efficient task scheduling in cloud data centers. Sustainable Computing: Informatics and Systems, 100373. (Elsevier, SCI).
  84. Garg, R., & Garg, N. (2020). Energy Management in a Multi-Source Energy Harvesting IoT System. Journal of Information Technology Research (JITR), 13(2), 42-59, IGI global (Scopus).
  85. Kumar & R. K. Aggarwal (2020) “A hybrid CNN-LiGRU acoustic modeling using raw waveform sincnet for Hindi ASR”, Computer Science, 21(4). (Scopus Indexed).
  86. Kumar & R. K. Aggarwal (2020) “Hindi speech recognition using time delay neural network acoustic modeling with i-vector adaptation”, International Journal of Speech Technology, 1-12. (Scopus Indexed).
  87. Monika Sharma & Mantosh Biswas, “RILBP-WGCN: Classification of Hyperspectral Remote Sensing Image via Rotation-Invariant Local Binary Pattern-Based Weighted Generalized Closest Neighbour,” Journal of Supercomputing, Springer, Communicated, (Imp. 2.469), accepted, pp. 1-31, 2020.
  88. Ashpreet Kaur & M. Biswas, “Impulse Noise Detection and Removal Method Based on Modified Weighted Median,” International Journal of Software Innovation (IJSI), IGI Global, Vol. 8, Issue 2, pp. 38-53, 2020.
  89. Ashpreet Kaur & M. Biswas, “Modified Directional and Fuzzy Based Median Filter for Salt-and-Pepper Noise Reduction in Color Image,” Solid State Technology, United States, Vol. 63, Issue 5, pp. 4033-4053, 2020.
  90. Achala Shakya, Mantosh Biswas & Mahesh Pal, “CNN based fusion and classification of SAR and optical data,” International Journal of Remote Sensing, Taylor & Francis (Imp. 2.976), Vol. 41, No. 22, pp. 8839-8861, 2020.
  91. Virender Ranga, Shivam Gupta, Priyansh Agrawal & Jyoti Meena, “Pathological Analysis of Blood Cells Using Deep Learning Techniques”, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science) (Bentham Science),  accepted, (Scopus-Indexed), July 2020.
  92. Abhishek Verma & Virender Ranga, “The Impact of Copycat Attack on RPL based 6LoWPAN Networks in Internet of Things Computing”, Computing (Springer), accepted, October 2020, (SCI-Indexed, Impact Factor=2.258).
  93. Parul Singh &Virender Ranga, “Attacks and Intrusion detection in Cloud Computing using an Ensemble Learning based Approach”, International Journal of Information Technology (Springer), accepted, Nov 2020, (Scopus-Indexed).
  94. Aditi Zear & Virender Ranga, “Distributed Partition Detection and Recovery using UAV in Wireless Sensor and Actor Networks”, Kuwait Journal of Science, Accepted, Dec 24, 2020, (SCI-Indexed, Impact Factor=0.517).
  95. Amarjeet Prajapati, Anshu Parashar & Jitender Kumar Chhabra, Restructuring Object-Oriented Software Systems Using Various Aspects of Class Information. Arab Journal of Science and  Engg (Springer SCI, IF:1.47), Vol 45, 10433–10457, July 2020, https://doi.org/10.1007/s13369-020-04785-z.
  96. Amarjeet & Jitender Kumar Chhabra, “Information-Theoretic Modularization of Object-Oriented Software Systems”, Information System Frontiers (Springer, SCI, IF 3.23), vol 22, Aug 2020, p 863-880.
  97. Pankaj Upadhyay & Jitender Kumar Chhabra, “Multilevel Thresholding Based Image Segmentation Using New Multistage Hybrid Optimization Algorithm”, Journal of Ambient Intelligence and Humanized Computing (Springer, SCI, Scopus, IF: 4.59);online on 29-5-2020, https://doi.org/10.1007/s12652-020-02143-3.
  98. Gupta, B. B., & Gulihar, P. (2020). Taxonomy of Payment Structures and Economic Incentive Schemes in Internet. Journal of Information Technology Research (JITR), 13(1), 150-166.
  99. Gupta, B. B., & Quamara, M. (2020). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946.(SCIE)
  100. Gupta, B. B., & Quamara, M. (2020). Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles. International Journal of Embedded Systems, 12(4), 414-423.
  101. Gupta, B. B., & Quamara, M. (2020). Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications. International Journal of Embedded Systems, 13(1), 40-49.
  102. Gupta, B. B., & Narayan, S. (2020). A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures. Journal of Global Information Management (JGIM), 28(4), 135-159.
  103. Dahiya, Amrita, & B. B. Gupta. “Multi attribute auction based incentivized solution against DDoS attacks.” Computers & Security 92 (2020): 101763.
  104. Tewari, Aakanksha, & B. B. Gupta. “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework.” Future generation computer systems 108 (2020): 909-920.
  105. Dahiya, A & Gupta, B.B. A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack. Mobile NetwAppl (2020). https://doi.org/10.1007/s11036-020-01665-6.
  106. Verma & R. K. Aggarwal, “A comparative analysis of similarity measures akin to the Jaccard index in collaborative recommendations: empirical and theoretical perspective,” Soc. Netw. Anal. Min., vol. 10, no. 1, 2020.
  107. Verma & R. K. Aggarwal, “Neighborhood-Based Collaborative Recommendations: An Introduction,” in Applications of Machine Learning, P. Johri, J. K. Verma, and S. Paul, Eds. Singapore: Springer Singapore, 2020, pp. 91–110.
  108. Rochak Swami, Virender Ranga and Mayank Dave, “Software-defined Networking-based DDoS Defense Mechanisms”, Journal of ACM Computing Surveys (CSUR), Vol. 52, Issue 2, May 2019, Article No. 28, doi: 10.1145/3301614.
  109. Nitin Goyal, Mayank Dave and Anil Kumar Verma, “Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends”, Wireless Personal Communications, 104, issue 3, pp. 995–1022, Feb. 2019, Springer, doi: 10.1007/s11277-018-6064-z .
  110. Priyanka Ahlawat and Mayank Dave, “An attack resistant key pre distribution scheme for wireless sensor networks”, Journal of King Saud University – Computer and Information Sciences, Elseiver, vol. 31, issue 1, pp. 1–13, Jan 2019, doi: 1016/j.jksuci.2018.03.002.
  111. Parmar, N., & Ranga, V. (2019). Performance analysis of WebRTC and SIP for video conferencing. Int. J. Innov. Technol. Explor. Eng.(IJITEE), 8(9S), 679-686. (Scopus)
  112. Mohan Sharma and Ritu Garg, “HIGA: Harmony-Inspired Genetic Algorithm for Rack-Aware Energy-Efficient Task Scheduling in Cloud Data Centers, Engineering Science and Technology”, an International Journal, Elsevier (Scopus) https://doi.org/10.1016/j.jestch.2019.03.009, 2019.
  113. Ritu Garg and M. Mittal, “Reliability and Energy Efficient workflow scheduling in Cloud Environment”, Cluster Computing, 1-15, Springer (SCI)https://doi.org/10.1007/s10586-019-02911-7, 2019.
  114. Neha Garg and Ritu Garg, “Energy Management in Multi-Source Energy Harvesting IoT System”, Journal of Information Technology Research (JITR), IGI global (Scopus) Accepted, 2019.
  115. Soni, A., & Ranga, V. (2019). API features individualizing of web services: REST and SOAP. International Journal of Innovative Technology and Exploring Engineering, 8(9), 664-671. (Scopus)
  116. Ritu Garg and Neha Shukla, “Energy Efficient Level-by-Level Scheduling for Multiple Workflows in Cloud”, International Journal of Software Innovation (IJSI), Vol 7 (3), IGI Global, 2019 (Scopus), 2019.
  117. K. Jain and B. B. Gupta, “Phishing Attack Detection using Search Engine and Heuristics based Technique,” Journal of Information Technology Research (JITR), IGI Global, 2019 (Accepted, In press).
  118. K. Jain and B. B. Gupta, “A Machine Learning based Approach for Phishing Detection using Hyperlinks Information,” Journal of Ambient Intelligence & Humanized Computing, 2019, Springer, https://doi.org/10.1007/s12652-018-0798-(SCI- Indexed).
  119. K. Jain, S.K. Yadav, and Neha Choudhary, “A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques”, International Journal of E-Services and Mobile Applications, 2019, IGI Global (Accepted, In press).
  120. Kriti Bhushan and B.B. Gupta, “Distributed denial of service (DDoS) attack mitigation in software-defined network (SDN)-based cloud computing environment”, Journal of Ambient Intelligence and Humanized Computing, 10(5), 1985-1997, 2019.
  121. Gokul, Ritu, Garg. (2019). Multi-level QR code with Hill Climbed Encrypted Public Level for Secured Message Transfer, Int. J. Innov. Technol. Explor. Eng.(IJITEE), 8. 380-384. (Scopus)
  122. Garg, R., & Shukla, N. (2019). Energy Efficient Level by Level Scheduling for Multiple Workflows in Cloud. International Journal of Software Innovation (IJSI), 7(3), 102-117. (Scopus)
  123. Chanda, M. (2019). Plant diseases classification using feature reduction, BPNN and PSO. International Journal of Software Engineering and Computer Systems, 5(2), 90-103.
  124. Mamta Kayest and Sanjay Kumar Jain, “An Incremental Learning approach for the Text Categorization using Hybrid Optimization”, International Journal of Intelligent Computing and Cybernetics (to appear, online available), June 2019,Emerald Insight Scopus, DOI: 10.1108/IJICC-12-2018-0170.
  125. Mamta Kayest and Sanjay Kumar Jain, “Optimization driven Cluster based Indexing and matching for the Document Retrieval”, Journal of King Saud University – Computer and Information Sciences (to appear, online available), Elsevier Science Scopus.
  126. Amit Rathee and Jitender Kumar Chhabra, “Reusability in Multimedia Software Using Structural and Lexical Dependencies”, Multimedia Tools and Applications (Springer, SCI), Feb 2019, online, https://doi.org/10.1007/s11042-019-7382-1.
  127. Amarjeet and Jitender Kumar Chhabra, “Information-Theoretic Re modularization of Object-Oriented Software Systems”, Information System Frontiers (Springer, SCI, IF 3.23), online, Jan 2019,
  128. Anshu Parashar and Jitender Kumar Chhabra, “Assessing Impact of Class Change by Mining Class Associations”, International Arab Journal of Information Technology (SCI), Vol 16, No 1, Jan 2019, Pages 98-107.
  129. Amarjeet and Jitender Kumar Chhabra, “MaDHS: Many-objective Discrete Harmony Search to Improve Existing Package Design”, Computational Intelligence (Wiley, SCI), Volume 35, Issue1, February 2019, p 98-123.
  130. Amit Rathee and Jitender Kumar Chhabra, “A Multi-Objective Search Based Approach to Identify Reusable Software Components”, Journal of Computer Languages (Elsevier, SCI), Accepted, Jan 2019.
  131. Bakshi A, Patel AK. Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. Journal of Information Security and Applications, June 2019;46:281-95, DOI:https://doi.org/10.1016/j.jisa.2019.03.004.
  132. Ankit Kumar Jain and B.B.Gupta, “Two-level authentication approach to protect from phishing attacks in real time”, Journal of Ambient Intelligence and Humanized Computing, 9(6), 1783-1796, 2019.
  133. Al-Ayyoub, M., Al-andoli, M., Jararweh, Y., Smadi, M., & Gupta, B, “Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism”, Computers & Electrical Engineering, 74, 533-546, 2019.
  134. Singh, V. (2019). An Overview of User-Interactions in Exploratory Search: Theoretical Foundations, Techniques, and Research Issues. International Journal of Business Information Systems, 32(4), 25-48. (Scopus)
  135. Kamta, S., & Verma, V. (2019). A Survey on Graph-Based Collaborative Filtering Techniques in Recommender Systems. International Journal of Knowledge Based Computer System, 7(2), 1-7.
  136. Singh, V. (2019). Predicting Search Intent Based on In-Search Context for Exploratory Search. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(3), 53-75.  (Scopus)
  137. Singh, V. (2019). Visual Task Characterization for Exploratory Search. International Journal of Information Systems and Social Change (IJISSC), 11(3), 14-37. (INSPEC).
  138. Priyanka Ahlawat and Mayank Dave, “Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN”, Wireless Personal Communications, 99, issue 4, pp 1541–1568, April 2018, Springer, doi:10.1007/s11277-018-5291-7.
  139. Priyanka Ahlawat and Mayank Dave, “A Cost‐Effective Attack Matrix Based Key Management Scheme with Dominance Key Set for Wireless Sensor Network Security”, International Journal of Communication Systems, vol. 31, issue 12, June 2018, doi: 1002/dac.3713.
  140. Ritu Garg and Neha Shukla, “Energy Efficient Scheduling for Multiple Workflows in Cloud Environment”, International Journal of Information Technology and Web Engineering (IJITWE), 13(3), 14-34, IGI global (Scopus), 2018.
  141. Chaudhary, Kriti Bhushan and B.B. Gupta, “Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing”, International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61-83, 2018.
  142. Singhal, P. Sharma, R.K. Aggarwal & V. Passricha (2018) “A Global Survey on Data Deduplication,” International Journal of Grid and High Performance Computing (IJGHPC), 10(4), 43-66. (Scopus Indexed).
  143. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Performance Evaluation of Hindi Speech Recognition System using Optimized Filterbanks,” Engineering Science and Technology, an International Journal, Elsevier, 21(3), 389-398.(Scopus Indexed), 2018.
  144. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Discriminatively Trained Continuous Hindi Speech Recognition System using Interpolated Recurrent Neural Network Language Modelling,” Neural Computing and Applications, Springer, 1-9. (SCI Indexed), 2018.
  145. Mohit Dua, R. K. Aggarwal and Mantosh Biswas,“GFCC based Discriminatively Trained Noise Robust Continuous ASR System for Hindi Language,” Journal of Ambient Intelligence and Humanized Computing, Springer, 1-14, Published online, May 7, 2018, (SCI Indexed).
  146. Mohit Dua, R. K. Aggarwal and Mantosh Biswas,“Discriminative Training using Noise Robust Integrated Features and Refined HMM Modelling,” Journal of Intelligent Systems, Degryuter Published Online: 2018-02-20 | DOI: https://doi.org/10.1515/jisys-2017-0618, (Scopus Indexed), 2018.
  147. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Optimizing Integrated Features for Hindi Automatic Speech Recognition System,” Journal of Intelligent Systems, Degryuter, 2018. (Accepted) (Scopus Indexed).
  148. Rehani, N., Garg, R. (2018). Meta-heuristic based reliable and green workflow scheduling in cloud computing. International Journal of System Assurance Engineering and Management 9811–820.(Scopus)
  149. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Performance Evaluation of Hindi Continuous ASR System using Discriminatively Trained Noise Robust Features”, International Journal of Information and Computer Security, Inderscience, 2018, in forthcoming articles. (Scopus Indexed).
  150. Nath, R.K. Aggarwal and Y. Singh, “Adaptive Neuro-Fuzzy Inference System based Vertical Handover Decision in MANET,” Journal of Advanced Research in Dynamical and Control Systems, vol 10,1414-1423. (Scopus-Indexed), 2018.
  151. Nath, R.K. Aggarwal and Y. Singh, “Enhanced Media Independent Handover for Vertical Handover decision in MANET,” International Journal of Intelligent Enterprises, 2018(Accepted). (Scopus Indexed).
  152. Nath, R.K. Aggarwal and Y. Singh, “Elliptic Curve Cryptography Based Secure Vertical Handover for MANET,” International Journal of Smart Sensing and Intelligent Systems (accepted). (Scopus Indexed), 2018.
  153. Vishal Passricha and R.K. Aggarwal, “Convolution Support Vector Machines for Speech Recognition,” International Journal of Speech Technology, Springer Verlag, Published online, Dec 11, 2018. (Scopus Indexed).
  154. Singhal, V. Passricha, P. Sharma and R.K. Aggarwal, ” Multi-level Region-of-Interest CNNs for End to End Speech Recognition” Journal of Ambient Intelligence and Humanized Computing, Springer, Published online, Nov 29, 2018. (SCI Indexed).
  155. Passricha and R.K. Aggarwal, “A Hybrid of Deep CNN and Bi-Directional LSTM for Automatic Speech Recognition,” Journal of Intelligent Systems (JISYS), (Accepted), 2018, Publisher Degryuter. (Scopus Indexed).
  156. Virender Kadyan, Archana Mantri, R. K. Aggarwal and Amitoj Singh, “A Comparative Study of Deep Neural Network Based Punjabi-ASR System,” International Journal of Speech Technology, Springer Verlag, Published online, Dec, 2018. (Scopus Indexed).
  157. Bisht, Mohit Dua and S. Dua, “A Novel Approach to Encrypt Multiple Images Using Multiple Chaotic Maps and Chaotic Discrete Fractional Random Transform,” Journal of Ambient Intelligence and Humanized Computing, Springer,2018,
  158. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Optimizing Integrated Features for Hindi Automatic Speech Recognition System,” Journal of Intelligent Systems,Degryuter, 2018, DOI:https://doi.org/10.1515/jisys-2018-0057
  159. Bisht, Mohit Dua andSheetal, “A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.” Journal of Intelligent Systems, Springer, Degryuter. https://doi.org/10.1515/jisys-2018-0365 (Scopus Indexed), 2019.
  160. Gita Donkal, Gyanendra K. Verma, “A multimodal fusion based framework to reinforce IDS for securing Big Data environment using Spark”, Journal of Information Security and Applications, Elsevier, [Scopus], Vol.43, December 2018, Pages1-11,DOI:https://doi.org/10.1016/j.jisa.2018.10.001.
  161. Gyanendra K. Verma, Pragya Gupta , “Wild Animal Detection from Highly Cluttered Images using a Deep Convolutional Neural Network”, International Journal of Computational Intelligence and Applications (IJCIA), World scientific [Scopus], DOI:https://doi.org/10.1142/S1469026818500219, Oct 2018.
  162. Abhishek Verma and Virender Ranga, “On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques”, Pertanika Journal of Science & Technology (JST) (Scopus, WoS-Indexed), vol. 26, issue 3, July 2018.
  163. Abhishek Verma and Virender Ranga, “Analysis of Routing Attacks on RPL based 6LoWPAN Networks”, International Journal of Grid and Distributed Computing, (Scopus, WoS-Indexed), vol. 11, no. 8, pp. 43-56, Aug 2018.
  164. Virender Ranga, Nikita Yadav and Pulkit Garg, “American sign language FINGERSPELLING using Hybrid discrete wavelet transform-Gabor filter and Convolutional neural network”, Journal of Engineering Science and Technology (JESTEC) (Scopus, WoS-Indexed), vol. 13, issue 9, September 2018.
  165. Gaurav Kumar and Virender Ranga, “Swarm Intelligence-based Partitioned Recovery in Wireless Sensor Networks”, Journal of Telecommunications and Information Technology (Scopus-Indexed), vol. 3, August 2018.
  166. Virender Ranga and D. Rohila, “Parametric Analysis of Heart Attack Prediction Using Machine Learning Techniques”, International Journal of Grid and Distributed Computing (Scopus-Indexed), vol. 11, no. 4, pp. 37-48, April 2018.
  167. Ravi Singh and Virender Ranga, “Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset”, International Journal of Control and Automation, (Scopus-Indexed), vol. 11, no. 5, pp. 11-24, May 2018.
  168. Gaurav Kumar Verma and Virender Ranga, “Whale Optimizer to Repair Partitioned Heterogeneous Wireless Sensor Networks”, International Journal of Grid and Distributed Computing, (Scopus, WoS-Indexed), vol. 11, no. 5, pp. 11-28, May 2018.
  169. Utkarsh Pundir and Virender Ranga, “A New Centralized Solution for Multi-event Wireless Sensor and Actor Networks”, International Journal of Advanced Science and Technology,(Scopus-Indexed), vol. 116, pp. 59-74, July 2018.
  170. Bharti Sinha, A.K.Singh and P. Saini, “Failure detectors for crash faults in cloud”, Journal of Ambient Intelligence and Humanized Computing, 1-9, 2018, https://doi.org/10.1007/s12652-018-1121-8.
  171. Amarjeet and Jitender Kumar Chhabra, “A Particle Swarm Optimization-Based Heuristic for Software Module Clustering Problem”, Arabian Journal for Science and Engineering (Springer, SCI), Volume 43, Issue 12, Dec 2018, p 7083–7094.
  172. Mrinaal Malhotra and Jitender Kumar Chhabra, “Micro Level Source Code Summarization of Optimal Set of Object Oriented Classes”, Webology (Scopus), Volume 15, Number 2, Dec 2018, Pages 113-132.
  173. Amit Rathee and Jitender Kumar Chhabra, “Clustering for Software Remodularization by Using Structural, Conceptual and Evolutionary Features”, Journal of Universal Computer Science (SCI), vol. 24, no. 12, Dec 2018, Pages 1731-1757.
  174. Amarjeet and Jitender Kumar Chhabra, “Many objective Artificial Bee Colony Algorithm for Large Scale Software Module Clustering Problem”, Soft Computing (Springer, SCI, IF 2.37), Volume 22, Issue 19, Oct 2018, p 6341–6361.
  175. Amarjeet and Jitender Kumar Chhabra, TA-ABC: Two-Archive Artificial Bee Colony for Multi-objective Software Module Clustering Problem, Journal of Intelligent Systems (Scopus), Vol 27, Issue 4, Oct 2018, p 619-641.
  176. Amarjeet and Jitender Kumar Chhabra, “Optimizing Software Modularity with Minimum Possible Variations”. Journal of Intelligent Systems (Scopus, ESCI), Accepted, Oct 2018.
  177. Goel, D., & Jain, A. K. (2018). Mobile phishing attacks and defence mechanisms: State of art and open research challenges. Computers & Security, 73, 519-544 (SCIE).
  178. Arvind Bakshi and A. K. Patel, “Secure Authentication, Privacy and Integrity in Telemedicine using Visual Cryptography. International Journal of Advanced Science and Technology Vol.117 (2018), pp.11-28, DOI: http://dx.doi.org/10.14257/ijast.2018.117.02.
  179. B. Gupta and Megha Quamara, “An Overview of Internet of Things (IoT): Architectural Aspects, Challenges, and Protocols” Concurrency and Computation: Practice and Experience, Wiley, 2018.
  180. Akanksha Tewari and B. B. Gupta, “Security, Privacy and Trust of different Layers in Internet-of-things (IoTs) Framework”,” FGCS, Elsevier, 2018.
  181. Shashank Gupta, B.B. Gupta and Pooja Chaudhary, “A Client-Server JavaScript Code Rewriting-Based Framework to Detect the XSS Worms from Online Social Network,” CCPE, Wiley, 2018.
  182. Kriti Bhushan, B. B. Gupta, “Distributed Denial of Service (DDoS) Attack Mitigation in Software Defined Network (SDN) based Cloud Computing Environment” AIHC, Springer, 2018, (SCI).
  183. Kriti Bhushan, B. B. Gupta, “Network Flow Analysis for Detection and Mitigation of Fraudulent Resource Consumption (FRC) Attacks in multimedia cloud computing,” Multimedia Tools and Applications, 2018.
  184. Ankit Kumar Jain and B. B. Gupta, “Towards Detection of Phishing Websites on Client-side using Machine Learning based Approach”. Telecommunication Systems, Springer, 2018.
  185. Ankit Kumar Jain and B.B.Gupta, “A machine learning based approach for phishing detection using hyperlinks information”, Journal of Ambient Intelligence and Humanized Computing, 10(5), 2015-2028.
  186. Vasileios A. Memos, Kostas E. Psannis, Yotaka Ishibashi, Byung Gyu Kim and B.B. Gupta, “An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework”, Journal of Future Generation Computer Systems, Volume 83, June 2018, Pages 619-628, Elseiver, DOI: https://doi.org/10.1016/j.future.2017.04.039.
  187. Andreas P. Plageras, Kostas E. Psannis, Christos Stergiou, Haoxiang Wang and B.B. Gupta, “Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings”, Journal of Future Generation Computer Systems, Volume 82, May 2018, Pages 349-357, DOI: https://doi.org/10.1016/j.future.2017.09.082.
  188. Zhang, Z., and B.B. Gupta, “Social media security and trustworthiness: overview and new direction”, Future Generation Computer Systems, 86, 914-925, Volume 86, September 2018, Pages 914-925, Sept. 2018.
  189. Stergiou, C., Psannis, K. E., Kim, B. G. and Gupta, B., “ Secure integration of IoT and cloud computing”, Future Generation Computer Systems, 78, 964-975, Elseiver, 2018.
  190. Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems.
  191. Al-Ayyoub, M., Rabab’ah, A., Jararweh, Y., Al-Kabi, M. N., & Gupta, B. B., “Studying the controversy in online crowds interactions”, Applied Soft Computing, 66, 557-563, 2018.
  192. Stergiou, C., Psannis, K. E., Gupta, B. B., &Ishibashi, Y., “Security, privacy & efficiency of sustainable cloud computing for big data & IoT”, Sustainable Computing: Informatics and Systems, 19, 174-184, 2018.

 

Conference Publications

National and International Conferences

  1. Verma, N., & Singh, V. (2022). Query-Based Data Valuation Strategy: An Exploratory View. In Proceedings of International Conference on Data Science and Applications (pp. 687-702). Springer, Singapore.
  2. P.R. Puchala, J.K .Chhabra & A. Rathee (2022). Ensemble clustering based approach for software architecture recovery. In Proceedings of International Journal of Information Technology. Springer
  3. P.R. Puchala, J.K .Chhabra & A.Rathee (2022). Software Architecture Recovery Using Integrated Dependencies Based on Structural, Semantic, and Directory Information. In Proceedings of International Journal of Information System Modeling and Design (IJISMD). IGI Global
  4. Vanwani, D., & Murmu, M. K. (2022). A Bio-Inspired-Based Degree Constrained MST Algorithm for Cognitive Radio Networks. In Information and Communication Technology for Competitive Strategies (ICTCS 2020) (pp. 1-13). Springer, Singapore.
  5. Gupta R.R., Ranga V. (2021) Comparative Study of Different Reduced Precision Techniques in Deep Neural Network. In: Tiwari S., Suryani E., Ng A.K., Mishra K.K., Singh N. (eds) Proceedings of International Conference on Big Data, Machine Learning and their Applications. Lecture Notes in Networks and Systems, vol 150. Springer, Singapore.
  6. Vishal Gaba & V. Verma (2021). Sentiment Analysis Of Twitter Data Using Machine Learning Approaches. In Proceedings of International Conference on Soft Computing and its Engineering Applications (icSoftComp2021), Springer.
  7. Vishal Gaba & V. Verma (2021). Topic Popularity Prediction Using Similarity Graph on Twitter. In Proceedings of International Conference on Cyber Technologies and Emerging Sciences (ICCTES). LNNS Springer.
  8. Birthriya, S. K., & Jain, A. K. (2021). Analysis for Malicious URLs Using Machine Learning and Deep Learning Approaches. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences (pp. 797-807). Springer, Singapore.
  9. Kashyap, A., & Jain, A. K. (2021). Analysis of Machine Learning and Deep Learning Approaches for DDoS Attack Detection on Internet of Things Network. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences (pp. 967-975). Springer, Singapore.
  10. Garg, R., & Sangwan, O. P. (2021). Hybrid classifier for brain tumor detection and classification. In Artificial Intelligence and Speech Technology (pp. 239-245). CRC Press.
  11. Kamta & V. Verma, “Accuracy Analysis of Similarity Measures in Surprise Framework,” in Evolutionary Computing and Mobile Sustainable Networks, 2021, pp. 861–873.
  12. Rochak Swami, Mayank Dave & Virender Ranga, “Addressing Spoofed DDoS Attacks in Software-defined Networking”, 6th International Conference for Convergence in Technology (I2CT), IEEE Bombay Section, April 2-4, 2021, Pune, India.
  13. Jindal, N. Sharma, & V. Verma, “Joyful Jaccard: An Analysis of Jaccard-based Similarity Measures in Collaborative Recommendations,” in International Conference on Artificial Intelligence and Sustainable Engineering (AISE-2020), 2021.
  14. Sahoo S.R., Gupta B.B. (2021) Real-Time Detection of Fake Account in Twitter Using Machine-Learning Approach. In: Gao XZ., Tiwari S., Trivedi M., Mishra K. (eds) Advances in Computational Intelligence and Communication Technology. Advances in Intelligent Systems and Computing, vol 1086. Springer, Singapore. https://doi.org/10.1007/978-981-15-1275-9_13
  15. Jindal, N. Sharma, & V. Verma “Joyful Jaccard: An Analysis of Jaccard-based Similarity Measures in Collaborative Recommendations” in International Conference on Artificial Intelligence and Sustainable Engineering (AISE-2020), 01/2021, NIT Goa, Springer.
  16. Neha Verma & Singh, V., A novel Query-based Data-valuation Strategy, 5th International Conference on Advances in Computing and Data Sciences (ICACDS 2021), April 23-24, 2021, Springer (CCIS), KBGTCOE, Maharashtra, India.
  17. Neha Verma& Singh, V., Query-based Data-Valuation Strategy: an exploratory view, International Conference on Data Science and Applications (ICDSA 2021), April 10-14, 202, Springer (CIS), 1Jadavpur University, Kolkata, WB, India.
  18. Aditi Zear & Virender Ranga, “Trajectory Tracking Control of Unmanned Aerial Vehicle for Autonomous Applications”, Lecture Notes in Networks and Systems (Springer), April 2020, pp. 421-430.
  19. Ali, I., &Dua, M. (2020). Smile Detection Using Data Amalgamation. Procedia Computer Science, 167, 979-986. https://doi.org/10.1016/j.procs.2020.03.397 (Scopus Indexed).
  20. Manvi Breja & Sanjay Kumar Jain “Causality for Question Answering” in International Conference on Computational Linguistics and Intelligent Systems (COLINS 2020). Volume I, 884-893: Main Conference, Lviv, Ukraine, April 23-24, 2020, CEUR Workshop Proceedings, CEUR-WS.org 2020.
  21. Kunal Kishan Sehra & Mayank Dave Privacy Preserving Data Aggregation in Wireless Body Sensor Network, Proceedings of the 2nd International Conference on IoT, Social, Mobile, Analytics & Cloud in Computational Vision & Bio-Engineering (ISMAC-CVB 2020), Elsevier SSRN, Oct 29-30, 2020, Tuticorin, India, doi:10.2139/ssrn.3734802.
  22. Sonam Bhardwaj, & Mayank Dave “SQL Injection Attack Detection, Evidence Collection, and Notifying System Using Standard Intrusion Detection System in Network Forensics”, Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing, IEM-ICDC 2020, Sept 25-27, 2020, Lecture Notes on Data Engineering and Communications Technologies (LNDECT, volume 62), pp. 681-692, April 2021, Springer, Singapore, doi: 10.1007/978-981-33-4968-1_53.
  23. Vibhu Garg, Madhur Bansal, A. Sanjana & Mayank Dave, “Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning”, Computing Conference, July 16-17, 2020, London, UK, pp. 161-173, SAI 2020, Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1230), Springer Cham, 2020, Print ISBN 978-3-030-52242-1, doi: 10.1007/978-3-030-52243-8_13
  24. Ankita Khot &. Mayank Dave, “Position Falsification Misbehavior Detection in VANETs”, In: Marriwala N., Tripathi C.C., Kumar D., Jain S. (eds), In: International Conference on Mobile Radio Communications 5G Network (MRCN-2020), Kurukshetra, July 13-15, 2020, pp. 487-499, LNNS, vol. 140, Online Sept 2020, Springer, Singapore, doi:10.1007/978-981-15-7130-5_39.
  25. Aman Kashyap & Ankit Kumar Jain, “Analysis of Machine Learning and Deep Learning Approaches for DDoS Attack Detection on Internet of Things Network” Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences, NIT Kurukshetra, INDIA, 01-03 May 2020.
  26. Santosh Kumar Birthriya & Ankit Kumar Jain, “Analysis for Malicious URLs Using Machine Learning and Deep Learning Approaches, Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences, NIT Kurukshetra, INDIA, 01-03 May 2020.
  27. Nancharla, B. K., & Dua, M. (2020, June). An Image Encryption using Intertwining Logistic map and Enhanced Logistic Map. In 2020 5th International Conference on Communication and Electronics Systems (ICCES) (pp. 1309-1314). IEEE. 10.1109/ICCES48766.2020.9138102.
  28. Talluri, P., & Dua, M. (2020, June). Low-resolution Human Identification in thermal imagery. In 2020 5th International Conference on Communication and Electronics Systems (ICCES) (pp. 1283-1287). IEEE.
  29. Ankit Kumar & Rajesh Kumar Aggarwal, “Bi-lingual TDNN-LSTM Acoustic Modeling for Limited Resource Hindi and Marathi Language ASR,” 25th International Symposium on Frontiers of Research in Speech and Music (FRSM 2020), National Institute of Technology, Silchar,8–9 October 2020.
  30. Abhishek Verma & Virender Ranga, “Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks”, Science and Information ConferenceSAI 2020: Intelligent Computing, pp 415-426, July 2020.
  31. Gopal Singh Kushwah and Virender Ranga, “DDoS attacks detection in cloud computing using ANN and Imperialistic competitive algorithm”, International conference on sustainable and innovative solutions for current challenges in engineering and technology (ICSISCET-2020), Gwalior, India, accepted, December 2020.
  32. Rochak Swami, Mayank Dave and Virender Ranga, “Addressing Spoofed DDoS Attacks in Software-defined Networking”, 6th International Conference for Convergence in Technology (I2CT), accepted, April 2021.
  33. Narayan, S., Gupta, B. B., Hsu, C. H., & Choi, C. (2020). A Secure Framework for Contactless Smartcards using Authentication Server to Prevent Relay Attack.
  34. Sahoo, S.R. & Gupta, B.B., et al., 2020, December. Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs). In International Conference on Computational Data and Social Networks (pp. 321-332). Springer, Cham.
  35. Gupta, B.B., Chui, K.T. & Psannis, K., 2020, December. Metadata Security Measures for Protecting Confidential Information on the Cloud. In International Conference on Computational Data and Social Networks (pp. 398-410). Springer, Cham.
  36. Verma, A. Gupta, & S. Kumawat, “Sentiment Analysis for Movie Ratings using Deep Learning,” in International Conference on Intelligent Computing and Communication, 2020, no. 4th.
  37. G Verma & A Kumar, Image Compression Using Deep Learning Based Multi-structure Feature Map and K-Means Clustering International Conference on Machine Learning, Image Processing, Network Security and Data Sciences,2020.
  38. Ankit Singh & Sanjay Kumar Jain “A Personalized Cancer Diagnosis using Machine Learning Models Based on Big Data” I-SMAC 2020 : 4thInternational Conference on I-SMAC (IoT in Social, Mobile, Analytics, and Cloud), Oct 7- 9, 2020.
  39. Manvi Breja & Sanjay Kumar Jain “Causality for Question Answering” in International Conference on Computational Linguistics and Intelligent Systems (COLINS 2020). Volume I, 884-893: Main Conference, Lviv, Ukraine, April 23-24, 2020, CEUR Workshop Proceedings, CEUR-WS.org 2020.
  40. Verma, A. Gupta, & S. Kumawat “Sentiment Analysis for Movie Ratings using Deep Learning” in International Conference on Intelligent Computing and Communication, Dayananda Sagar University,Bengaluru, Springer, 10/2020.
  41. Kamta & V. Verma “Accuracy Analysis of Similarity Measures in Surprise Framework” in International Conference On Evolutionary Computing And Mobile Sustainable Networks, Bangalore, Sir M Visvesvaraya Institute of Technology (Sir MVIT), 08/2020, Springer, https://doi.org/10.1007/978-981-15-5258-8_80.
  42. Verma, A. Sharma, K. K. Jain, & S. Adlakha “Digital Assistant with Augmented Reality” in ICT Systems and Sustainability, Springer, 12/2020, https://doi.org/10.1007/978-981-15-8289-9_38.
  43. Chanderdeep Kumar& Singh V. (2020). Adapting Hamming Space for Similarity Search. In Proceedings of 5th International Conference on Information and Communication Technology for Competitive Strategies (ICTCS-2020). Springer (LNNS), India
  44. Barik, T., & Singh, V. (2020, July). Placing Query Term Proximity in Search Context. In International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (pp. 1-16). Springer, Singapore.
  45. Soni, A., Ranga, V., &Jadhav, S. (2020). MockRest—A Generic Approach for Automated Mock Framework for REST APIs Generation. In Inventive Communication and Computational Technologies (pp. 237-255). Springer, Singapore.
  46. Deepanshi Senger & Anoop Kumar Patel (2020). Penalty Based Path Management. In Proceedings of International Conference on Inventive Communication and Computational Technologies (ICICCT 2020). India
  47. Tirthankar Barik & Singh, V., Adapting Query Term Proximity for Interactive Information Search , 3rd International Conference on Computing Informatics and Networks (ICCIN 2020), July 2020, Springer (CCIS), BPIT, New Delhi, India.
  48. Pooja Garg, L. Dodeja, Priyanka Ahlawat and Mayank Dave., “Hybrid Color Image Watermarking Algorithm Based on DSWT-DCT-SVD and Arnold Transform”, In Advances in Signal Processing and Communication. Lecture Notes in Electrical Engineering, vol 526. Springer, doi:https://doi.org/10.1007/978-981-13-2553-3_31, 2019.
  49. Rekha Rani and Ritu Garg, “State-of-the-Art Energy-Efficient Thermal-Aware Scheduling in Cloud”, In: Fong S., Akashe S., Mahalle P. (eds) Information and Communication Technology for Competitive Strategies. Lecture Notes in Networks and Systems, vol 40. Springer, Singapore, 2019.
  50. Jahnvi and Ritu Garg, “Internet of Energy: Deep Learning based Load Prediction in Smart Grid”, International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT-2019).
  51. Kathpal, C., & Garg, R. (2019). Reliability-Aware Green Scheduling Algorithm in Cloud Computing. In Ambient Communications and Computer Systems (pp. 421-431). Springer, Singapore.
  52. Das, B. K., & Garg, R. (2019, July). Security of cloud storage based on extended hill cipher and homomorphic encryption. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 515-520). IEEE.
  53. Rekha Panihar and Ritu Garg, “Optimized Energy Efficiency using PSO in Internet of Things”, International Conference on Intelligent Machines (ICIM 2019). Baba Farid Group of Institutions. Bathinda, India, March 15-16, 2019, IETE Springer Series.
  54. Vishwakarma, R., & Jain, A. K. (2019, April). A honeypot with machine learning based detection framework for defending IoT based botnet DDoS attacks. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1019-1024). IEEE.
  55. Shivagunde, S., & Biswas, M. (2019, July). Saliency guided image super-resolution using PSO and MLP based interpolation in wavelet domain. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 613-620). IEEE.
  56. Saini, A., & Biswas, M. (2019, April). Object detection in underwater image by detecting edges using adaptive thresholding. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 628-632). IEEE.
  57. Shivagunde, S., & Biswas, M. (2019, April). Single image super-resolution based on modified interpolation method using MLP and DWT. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 212-219). IEEE.
  58. Chanda, M., & Biswas, M. (2019, April). Plant disease identification and classification using back-propagation neural network with particle swarm optimization. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1029-1036). IEEE.
  59. Sharma, B., & Dave, M. (2019, July). Robust hybrid image and audio watermarking using cyclic codes and Arnold transform. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 309-315). IEEE.
  60. Kumar and Vikram, “An Automatic Intent Modeling Algorithm for Interactive Data Exploration”, In Computational Intelligence in Data Mining-Volume 1 (pp. 459-470). Springer, New Delhi, 2019.
  61. Patel, Jay and Vikram Singh, “Query Morphing: A Proximity-Based Data Exploration for Query Reformulation. In Computational Intelligence”, Theories, Applications and Future Directions-Volume I (pp. 247-259). Springer, Singapore, 2019.
  62. Rutuja Wankhedkar and Sanjay Kumar Jain,“A Brief Survey on Techniques Used in Discovering Time Series Motifs” Presented in ICAEEC-2019”, International Conference on “Advances in Electronics, Electrical & Computational Intelligence, Indian Institute of Information Technology, Allahabad Prayagraj, India, May 31-June 1, 2019.
  63. Ishita Bajaj and Rajesh Kumar Aggarwal, “Steganography Using HTML Web Pages as a Carrier: A Survey”,2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019).
  64. Ishita Bajaj and Rajesh Kumar Aggarwal, “RSA Secured Web Based Steganography Employing HTML Space Codes And Compression Technique”, International Conference on Intelligent Computing and Control Systems (ICICCS 2019), IEEE, 2019.
  65. Saif Ali Khan, R.K Aggarwal and Shashidhar Kulkarni, “Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data”, 5thIEEE International Conference on Advance Computing and Communications System ICACCS 2019, 16thMarch 2019.
  66. Saif Ali Khan, R.K Aggarwal and Shashidhar Kulkarni, “Encryption Schemes of Cloud Computing: A Review”,5thIEEE International Conference on Advance Computing and Communications System ICACCS 2019,16thMarch 2019.
  67. Saddam Khan and R. K. Aggarwal, “Efficient Mutual Authentication mechanism to Secure Internet of Things (IoT)” ComitCon-2019: International Conference on Machine Learning, Big Data, Cloud and Parallel Computing. IEEE, MRIIRS Faridabad, February 2019.
  68. Saddam Khan and R. K. Aggarwal, “Lightweight RFID Authentication Mechanism to Secure Internet of Things (IoT)”, in Proceedings of the ACTN-2019: 2nd National Conference on Advanced Communication Technologies and Networks. MNIT Jaipur, June 2019.
  69. K. Mahana and R.K. Aggarwal, “Image Steganography: Analysis & Evaluation of Secret Communication” in International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM-2019) [SSRN-Elsevier] during February 26-28, 2019 at Amity University, Jaipur (Scopus-Indexed).
  70. K. Mahana and R.K. Aggarwal (2019), “ Foggy Image Enhancement using Modified Adaptive Histogram Equalization and Guided Filter” in 1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (MIND-2019) during March 3-4, 2019 at NIT, Kurukshetra (Scopus-Indexed).
  71. Divya Mamgai, Sonali Brodiya, Rohit Kumar and Mohit Dua, “An Improved Automated Question Answering System from Lecture Videos”, Proceedings of 2nd International Conference on Communication, Computing and Networking, Springer, Singapore, 2019, https://doi.org/10.1007/978-981-13-1217-5_64 (ISI Indexed).
  72. Rohilla, D., & Murmu, M. K. (2019, July). A Distributed Minimum Spanning Tree Based on all Best Swap Edges in CRN. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 1520-1523). IEEE.
  73. Lata, K., Dave, M., & Nishanth, K. N. (2019, June). Image-to-image translation using generative adversarial network. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 186-189). IEEE.
  74. Lata, K., Dave, M., & KN, N. (2019, February). Data augmentation using generative adversarial network. In Proceedings of 2nd International Conference on Advanced Computing and Software Engineering (ICACSE).
  75. Sharma, B., & Dave, M. (2019, June). Robust Hybrid Watermarking using Image and Audio against Synchronization Attacks. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 162-166). IEEE.
  76. Nehal, A., & Ahlawat, P. (2019, June). Securing iot applications with op-tee from hardware level os. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 1441-1444). IEEE.
  77. Kumar, S., & Murmu, M. K. (2019, July). A Dynamic Coordinator Election Algorithm in Cognitive Radio Networks. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 690-695). IEEE.
  78. Bakshi and A.K.Patel, “Halftoning Algorithm Using Pull-Based Error Diffusion Technique”, in International Conference on Innovative Computing and Communications 2019 (pp. 411-419). Springer, Singapore (Best Paper Award).
  79. Kunal Vohra and Mayank Dave, “Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption”, Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 20-21 April 2018, IEEE, Coimbatore, India, doi: 10.1109/ICICCT.2018.8473045.
  80. Deepshikha and Mayank Dave, “A Real-Time Application Solution in Data Centre Networking Using SDN”, 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), 11-12 July 2018, IEEE, Coimbatore, India, doi: 10.1109/ICIRCA.2018.8596782.
  81. Deepshikha and Mayank Dave, “An Efficient Traffic Management Solution in Data Centre Networking Using SDN”, 2018 International Conference on Power Energy, Environment and Intelligent Control (PEEIC), 13-14 April 2018, IEEE, Greater Noida, India, doi: 10.1109/PEEIC.2018.8665589.
  82. Priyanka Ahlawat and Mayank Dave, “An attack model based highly secure key management scheme for wireless sensor networks” Journal on Procedia Computer Science, vol. 125, 2018, pp. 201-207, DOI: https://doi.org/10.1016/j.procs.2017.12.028.
  83. Kunal Vohra and Mayank Dave, “Multi-Authority Attribute Based Data Access Control in Fog Computing”, Journal on Procedia Computer Science, Volume 132, Pages 1449-1457, Elseiver, June 2018, DOI: https://doi.org/10.1016/j.procs.2018.05.078.
  84. Avinash Tulasi and Mayank Dave, “Key Aggregate Cryptography Based Solution for Dynamic Ownership Management in Fog Infrastructures”, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 20-21 April 2018, IEEE, Coimbatore, India, DOI: 10.1109/ICICCT.2018.8473080.
  85. Nitin Goyal, Mayank Dave and A.K.Verma, “Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks”, In Woungang I., Dhurandher S. (eds) International Conference on Wireless, Intelligent, and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol. 18. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-75626-4_20.
  86. Rekha Rani and Ritu Garg,“Power Aware Scheduling in Cloud using Ant Colony Optimization”, International Journal of Computational Intelligence & IoT, 1(2), In ICCIIOT-2018, SSRN, Elsevier.
  87. Rekha Panihar and Ritu Garg, “Energy Management in WSN: A State of Art”, International Conference on Intelligent Data Communication Technologies and Internet of Things, ICICI 2018, Springer, LNDECT.
  88. Chesta Kathpal and Ritu Garg, “Reliability Aware Green Scheduling Algorithm in Cloud Computing”, in proceedings of International Conference on Recent Advancements in Computer, Communication and Computational Sciences (August 10-11, RACCCS- 2018), Springer AISC.
  89. Neha Garg and Ritu Garg, “Multi-Source Energy Harvesting System for Sensor Nodes”, in proceedings of 2nd International Conference on Advanced Informatics for Computing Research, ICAICR-2018, Springer CCIS.
  90. Mohan Sharma and Ritu Garg, “Whale-Genetic Optimization Algorithm for Energy Efficient Task Scheduling in Cloud Computing”,In International Conference on “Advanced Engineering Optimization Through Intelligent Techniques (AEOTIT)” during 03-05 August 2018.Springer (AISC)
  91. Mrinaal Malhotra and Jitender Kumar Chhabra, “Class Level Code Summarization Based On Dependencies and Micro patterns”, International conference on Inventive Communication and Computational Technologies, Coimbatore, accepted and to appear in IEEE Explore, 2018.
  92. Ujjawala Yati and M. Biswas, “Dual Discrete Wavelet Transform Based Image Fusion Using Averaging Principal Component,” International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E-2018), University of Allahabad, India, Springer, pp. 1-10, 2018.
  93. Aditya Gautam and M. Biswas, “Whale Optimization Algorithm based Edge Detection for Noisy Image,” International Conference on Intelligent Computing and Control Systems ( ICCS 2018), Vaigai College Engineering, Madurai, India, IEEEXplore, pp. 1878-1883, 2018.
  94. Shashanka Kalita and M. Biswas, “Hyperspectral Image Classification Using Modified Convolutional Neural Network,” International Conference on Intelligent Computing and Control Systems ( ICCS 2018), Vaigai College Engineering, Madurai, India, IEEEXplore, pp. 1884-1889, 2018.
  95. Kumar and Vikram Singh, “What’s on Your Mind: Automatic Intent Modeling for Data Exploration”, In Advances in Data and Information Sciences (pp. 65-75), Springer, Singapore, 2018.
  96. Patel Jay and Vikram Singh, “Query morphing: A proximity-based approach for data exploration and query reformulation”, In International Conference on Mining Intelligence and Knowledge Exploration (pp. 261-273). Springer, Cham, 2018.
  97. Bhumika Paharia and Kriti Bhushan, “Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture”, In 9thInternational Conference on Computing, Communication and Networking Technologies (ICCCNT-July 2018) (pp. 1-7). IEEE.
  98. Kriti Bhushan and B.B.Gupta, “Hypothesis test for low-rate DDoS attack detection in cloud computing environment”, Procedia computer science, 132, 947-955, 2018.
  99. Bhumika Paharia and Kriti Bhushan, “DDoS Detection and Mitigation in Cloud via FogFiter: A Defence Mechanism”, In 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7), IEEE, July 2018.
  100. Manvi Breja and Sanjay Kumar Jain, “Analysis of Why-type Questions for Question Answering System”, AI*QA Workshop in conjunction with European Conference on Advances in Databases and Information Systems, ADBIS 2018, Sept 2-5, 2018, Springer, CCIS Vol. 909, pp 265-273.
  101. Priyanka Jariha and Sanjay Kumar Jain, “CEAM: A Model to Deal with Long Tail Problem in Recommender System”, International Conference on Intelligent Computing and Sustainable System (ICICSS 2018) Coimbatore, IEEE, Sept 20-21, 2018.
  102. Priyanka Jariha and Sanjay Kumar Jain, “A state-of-the-art Recommender Systems: An Overview of Concepts, Methodology and Challenges”, 2ndInternational Conference on Inventive Communication and Computational Technologies (ICICCT 2018) Coimbatore, IEEE, April 20-21, 2018.
  103. Ratna Kumari and Sanjay Kumar Jain, “A brief survey on exploratory search systems”, 3rdInternational Conference on Microelectronics, Computing & Communication Systems (MCCS – 2018), at Ranchi on May 12-13, Springer, 2018.
  104. Suman Garg and Sanjay Kumar Jain, “A Brief Survey On Mass Based Dissimilarity Measures”, International Conference on Innovative Computing and Communications, ICICC-2018, LNNS, vol 56, pp 387-395,
  105. Ruchi Gupta, R.K. Aggarwal and Minakshi Sharma, “Novel Technique for Prediction Analysis in Data Mining”, in International Conference on Inventive Research in Computing Applications, ICIRCA, IEEE, RVS College of Engineering and Technology, July 11-12, 2018, Coimbatore.
  106. Aqbal Waris and R.K. Aggarwal, “Optimization of Deep Neural Network for Automatic Speech Recognition “International Conference on Inventive Research in Computing Applications (ICIRCA 2018), IEEE, 6 June 2018.
  107. Sourabh Kumar and Rajesh Kumar Aggarwal, “Augmented Handwritten Devanagari digit recognition using Convolutional Autoencoder”, IEEE International Conference on Inventive Research in Computing Applications (ICIRCA 2018), R.V.S College of Engineering, Coimbatore, India,11-12 July 2018.
  108. Sourabh Kumar and Rajesh Kumar Aggarwal, “Object Recognition using Sparse Autoencoder with Convolutional Neural Network”, IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics And Cloud) (ISMAC 2018), SCAD Institute of Technology, Coimbatore, India,2018.
  109. Jaroli, A. Bisht, M. Dua and S. Dua, “A Color Image Encryption Using Four Dimensional Differential Equations and Arnold Chaotic Map”, IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 869-876), 2018, DOI: https://doi.org/10.1109/ICIRCA.2018.8597310 (Scopus Indexed).
  110. Jaroli, A. Bisht, M. Dua and S. Dua, “Symmetric Multiple Image Encryption Using Multiple New One-Dimensional Chaotic Functions and Two-Dimensional Cat Man”, In 2018 IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 676-682). 10.1109/ICIRCA.2018.8597245 (Scopus Indexed), July 2018.
  111. Singh and Mohit Dua, “Website Attacks: Challenges and Preventive Methodologies” In 2018 IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 381-387). 10.1109/ICIRCA.2018.8597259 (Scopus Indexed), July 2018.
  112. Anamika Dhillon and G.K.Verma, “Wild Animal Detection from Highly Cluttered Forest Images Using Deep Residual”, International Conference on Intelligent Human Computer Interaction, 230-238, 2018.
  113. Donkal and G.K.Verma, “Securing Big Data Ecosystem with NSGA-II and Gradient Boosted Trees Based NIDS Using Spark”, 2018 Second International Conference on Intelligent Computing and Control.
  114. Bakshi and A.K. Patel, “A Novel Error Diffusion Algorithm for Halftoning Greyscale Image Using Pull Based Method”, In2018 International Conference on Communication and Signal Processing (ICCSP) 2018 Apr 3 (pp. 0305-0311). IEEE.
  115. Tewari and B. B. Gupta, “A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography (ECC),” Confluence 2018.
  116. Shashank Gupta and B. B. Gupta, “SFC: A Three Layer Smart Phone-Fog-Cloud Framework for Defending against JavaScript Code Injection Vulnerabilities on OSN,” Confluence 2018, 2018.
  117. B. Gupta and Megha Quamara, “Multi-layered Cloud and Fog based Secure Integrated Transmission and Storage Framework for IoT based Applications,” SPIN 2018, 2018.
  118. Kriti Bhushan and B. B. Gupta, “Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment,” SPIN 2018, 2018.
  119. Prachi Gulihar and B. B. Gupta, “Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache Servers,” ICAICR 2018, Shimla, India, 2018.
  120. B. Gupta and Megha Quamara, “An Identity based Access Control and Mutual Authentication Framework for Distributed Cloud Computing Services in IoT Environment using Smart Cards,” ICCIDS2018, 2018.
  121. B.B. Gupta and Megha Quamara, “A Dynamic Security Policies Generation Model for Access Control in Smart Card based Applications,” 10th CCS 2018 conference, Italy, 2018.
 Address
National Institute of Technology, Kurukshetra - 136119,
Haryana (India)
 Phone
+01744-233208
 Email
test@nitkkr.ac.in