National Institute Of Technology,Kurukshetra

 

In last five years, more than 500 research papers have been published by Department faculty and students in reputed conferences and Journals. Department faculty members are also empaneled as reviewers on many prestigious research journals of IEEE, Elsevier, ACM, Wiley, Springer & many more. The details of publications & citations for last four years is given below:

 

 

   Year   

Total no. Publications

Total no. Citations

Total no. Books/Book Chapters

2019

101 1800+ 7

2018

157 1600+ 16

2017

92

900

2

2016

115

750

7

2015

69

375

3

2014

50

345

1

 

Some of the recent publications :

 

Book Chapter Publications

  1. Rekha and Ritu Garg, “Existing Enabling Technologies and Solutions for Energy Management in IoT”, Book chapter in "Energy Conservation for IoT Devices: Concepts, Paradigms and Solutions, Springer 2019. 

  2. D. Goel and A. K. Jain, “Overview of Smartphone Security: Attack and Defense Techniques,” In book: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 2018, CRC Press (Taylor & Francis group).

  3. T. Ubale and A. K. Jain, “Survey on DDoS Attacks Techniques and Solutions in Software Defined Network,” In book: Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 2019, Multimedia Systems and Applications, Springer.

  4. Patel Jay andVikram Singh, Query Morphing,“A Proximity-Based Approach for Data Exploration”, from Natural to Artificial Intelligence: Algorithms and Applications, 147, 2018.

  5. Bhumika PahariaandKriti Bhushan, “Fog Computing: Concepts, Applications, and Countermeasures against Security Attacks”, In Handbook of Research on Cloud Computing and Big Data Applications in IoT (pp. 302-329), IGI Global, 2019.

  6. Vishal Pasricha and R. K. Aggarwal, “End-to-end Acoustic Modeling using Convolutional Neural Networks,” in Intelligent Speech Signal Processing, edited by Nilanjan Dey, Elsevier 2018.

  7. Vishal Pasricha and R. K. Aggarwal, "Convolutional Neural Networks for Raw Speech Recognition," in from Natural to Artificial Intelligence Algorithms and Applications in IntechOpen, 2018, DOI: 10.5772/intechopen.80026.

  8.  S. K. Mahana and R.K. Aggarwal, “Secure Data Deduplication of Encrypted Data in Cloud”, In Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization (pp. 196-212). IGI Global, 2019.

  9. Gopal Singh Kushwah and Virender Ranga, "Distributed Denial of Service Attacks and Defense in Cloud Computing", Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, IGI Global, 41-59, 2019.

  10. Anshu Devi, Ramesh Kait and Virender Ranga, "Security Challenges in Fog Computing", Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, IGI Global, 41-59, 2019.

  11. G.K.Verma, J.S. Lather and A. Kaushal,“MatConvNet-Based Fast Method for Cervical MR Images Classification”, In: Verma N., Ghosh A.(eds) Computational Intelligence: Theories, Applications and Future Directions - Volume II. Advances in Intelligent Systems and Computing, vol. 799. Springer, Singapore, 2019.

  12. Mrinaal Malhotra, Jitender Kumar Chhabra,”Systematic Review of Dependencies in Source Code of Software and Their Categorization”, Lecture Notes in Networks and Systems, vol  46, 2019, p 771-78, Jan 2019.

  13. Amit Rathee, Jitender Kumar Chhabra, “Improving Cohesion of A Software System by Performing Usage Pattern Based Clustering", Procedia CS, Volume 125, 2018, Pages 740–746, 2018.

  14. Priyanka Ahlawat and Mayank Dave, “Key Management in WSN Security: An Attacker's Perspective”, Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization. IGI Global, Pages 303-325, 2019.

  15. B.B.Gupta, “Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives”, CRC Press, Nov 2018.

  16. P. Chaudhary and B.B.Gupta, S. Gupta, “Defending the OSN-Based Web Applications from XSS Attacks Using Dynamic JavaScript Code and Content Isolation”,  In: Kapur P., Kumar U., Verma A. (eds) Quality, IT and Business Operations. Springer Proceedings in Business and Economics. Springer, Singapore, 2018.

 

Journal Publications

 

National and International Journals (SCI/SCIE/Scopus)

  1. Rochak Swami, Virender Ranga and Mayank Dave, “Software-defined Networking-based DDoS Defense Mechanisms”, Journal of ACM Computing Surveys (CSUR), Vol. 52, Issue 2, May 2019, Article No. 28, doi: 10.1145/3301614.

  2. Nitin Goyal, Mayank Dave and Anil Kumar Verma, “Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends”, Wireless Personal Communications, vol. 104, issue 3, pp. 995–1022, Feb. 2019, Springer,  doi: 10.1007/s11277-018-6064-z .

  3. Priyanka Ahlawat and Mayank Dave, “ An attack resistant key predistribution scheme for wireless sensor networks”, Journal of King Saud University - Computer and Information Sciences, Elseiver,vol. 31, issue 1, pp. 1–13, Jan 2019, doi: 10.1016/j.jksuci.2018.03.002.

  4. Priyanka Ahlawat and Mayank Dave, “Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN”, Wireless Personal Communications, vol. 99, issue 4, pp 1541–1568, April 2018, Springer, doi:10.1007/s11277-018-5291-7.

  5. Priyanka Ahlawat and Mayank Dave, “A Cost?Effective Attack Matrix Based Key Management Scheme with Dominance Key Set for Wireless Sensor Network Security”, International Journal of Communication Systems, vol. 31, issue 12, June 2018, doi: 10.1002/dac.3713. 

  6. Ankit Kumar Jain, Diksha Goel, Sanjli Agarwal, Yukta Singh, and Gaurav Bajaj, “Predicting Spam Messages Using Back Propagation Neural Network,” Wireless Personal Communications, 2019, doi: https://doi.org/10.1007/s11277-019-06734-y

  7. Ruchi Vishwakarma, and Ankit Kumar Jain, “A survey of DDoS attacking techniques and defence mechanisms in the IoT network,” Telecommunication Systems, doi: https://doi.org/10.1007/s11235-019-00599-z

  8. Mohan Sharma and Ritu Garg, “HIGA: Harmony-Inspired Genetic Algorithm for Rack-Aware Energy-Efficient Task Scheduling in Cloud Data Centers, Engineering Science and Technology”, an International Journal, Elsevier (Scopus) https://doi.org/10.1016/j.jestch.2019.03.009, 2019.

  9. Ritu Garg and M. Mittal, “Reliability and Energy Efficient workflow scheduling in Cloud Environment”, Cluster Computing, 1-15, Springer (SCI)https://doi.org/10.1007/s10586-019-02911-7, 2019. 

  10. Neha Garg and Ritu Garg,“Energy Management in Multi-Source Energy Harvesting IoT System”, Journal of Information Technology Research (JITR), IGI global (Scopus) Accepted, 2019.

  11. Ritu Garg and Neha Shukla, “Energy Efficient Level-by-Level Scheduling for Multiple Workflows in Cloud”, International Journal of Software Innovation (IJSI), Vol 7 (3), IGI Global, 2019 (Scopus), 2019.

  12. Ritu Garg and Neha Shukla, “Energy Efficient Scheduling for Multiple Workflows in Cloud Environment”, International Journal of Information Technology and Web Engineering (IJITWE), 13(3), 14-34, IGI global (Scopus), 2018.

  13. A. K. Jain and B. B. Gupta, “Phishing Attack Detection using Search Engine and Heuristics based Technique,” Journal of Information Technology Research (JITR), IGI Global, 2019.

  14. A. K. Jain and B. B. Gupta, “A Machine Learning based Approach for Phishing Detection using Hyperlinks Information,” Journal of Ambient Intelligence & Humanized Computing, 2019, Springer, https://doi.org/10.1007/s12652-018-0798-(SCI- Indexed).

  15. A. K. Jain, S.K. Yadav, and Neha Choudhary, “A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques”, International Journal of E-Services and Mobile Applications, 2019, IGI Global.

  16. Kriti Bhushan and B.B. Gupta, “Distributed denial of service (DDoS) attack mitigation in software-defined network (SDN)-based cloud computing environment”, Journal of Ambient Intelligence and Humanized Computing, 10(5), 1985-1997, 2019.

  17. D. Chaudhary, Kriti Bhushan and B.B. Gupta, “Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing”, International Journal of E-Services and Mobile Applications (IJESMA), 10(3), 61-83, 2018.

  18. Mamta Kayest and Sanjay Kumar Jain, “An Incremental Learning approach for the Text Categorization using Hybrid Optimization”, International Journal of Intelligent Computing and Cybernetics (to appear, online available), June 2019,Emerald Insight Scopus, DOI: 10.1108/IJICC-12-2018-0170.

  19. Mamta Kayest and Sanjay Kumar Jain, "Optimization driven Cluster based Indexing and matching for the Document Retrieval", Journal of King Saud University - Computer and Information Sciences (to appear, online available), Elsevier Science Scopus.

  20. S. Singhal, P. Sharma, R.K. Aggarwal & V. Passricha (2018) "A Global Survey on Data Deduplication," International Journal of Grid and High Performance Computing (IJGHPC), 10(4), 43-66. (Scopus Indexed).

  21. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Performance Evaluation of Hindi Speech Recognition System using Optimized Filterbanks,” Engineering Science and Technology, an International Journal, Elsevier, 21(3), 389-398.(Scopus Indexed), 2018.

  22. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Discriminatively Trained Continuous Hindi Speech Recognition System using Interpolated Recurrent Neural Network Language Modelling,” Neural Computing and Applications, Springer, 1-9. (SCI Indexed), 2018.

  23. Mohit Dua, R. K. Aggarwal and Mantosh Biswas,“GFCC based Discriminatively Trained Noise Robust Continuous ASR System for Hindi Language,” Journal of Ambient Intelligence and Humanized Computing, Springer, 1-14, Published online, May 7, 2018, (SCI Indexed).

  24. Mohit Dua, R. K. Aggarwal and Mantosh Biswas,“Discriminative Training using Noise Robust Integrated Features and Refined HMM Modelling,” Journal of Intelligent Systems, Degryuter Published Online: 2018-02-20 | DOI: https://doi.org/10.1515/jisys-2017-0618, (Scopus Indexed), 2018.

  25. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Optimizing Integrated Features for Hindi Automatic Speech Recognition System,” Journal of Intelligent Systems, Degryuter, 2018. (Accepted) (Scopus Indexed).

  26. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Performance Evaluation of Hindi Continuous ASR System using Discriminatively Trained Noise Robust Features”, International Journal of Information and Computer Security, Inderscience, 2018, in forthcoming articles. (Scopus Indexed).

  27. J. Nath, R.K. Aggarwal and Y. Singh, "Adaptive Neuro-Fuzzy Inference System based Vertical Handover Decision in MANET,” Journal of Advanced Research in Dynamical and Control Systems, vol 10,1414-1423. (Scopus-Indexed), 2018.

  28. J. Nath, R.K. Aggarwal and Y. Singh, "Enhanced Media Independent Handover for Vertical Handover decision in MANET," International Journal of Intelligent Enterprises, 2018(Accepted). (Scopus Indexed).

  29. J. Nath, R.K. Aggarwal and Y. Singh, "Elliptic Curve Cryptography Based Secure Vertical Handover for MANET,” International Journal of Smart Sensing and Intelligent Systems (accepted). (Scopus Indexed), 2018.

  30. Vishal Passricha and R.K. Aggarwal, "Convolution Support Vector Machines for Speech Recognition," International Journal of Speech Technology, Springer Verlag, Published online, Dec 11, 2018. (Scopus Indexed).

  31. S. Singhal, V.  Passricha, P. Sharma and R.K. Aggarwal, " Multi-level Region-of-Interest CNNs for End to End Speech Recognition" Journal of Ambient Intelligence and Humanized Computing, Springer, Published online, Nov 29, 2018. (SCI Indexed).

  32. V. Passricha and R.K. Aggarwal, "A Hybrid of Deep CNN and Bi-Directional LSTM for Automatic Speech Recognition," Journal of Intelligent Systems (JISYS), (Accepted), 2018, Publisher Degryuter. (Scopus Indexed).

  33. Virender Kadyan, Archana Mantri, R. K. Aggarwal and Amitoj Singh, "A Comparative Study of Deep Neural Network Based Punjabi-ASR System," International Journal of Speech Technology, Springer Verlag, Published online, Dec, 2018. (Scopus Indexed).

  34. A. Bisht, Mohit Dua and S. Dua, “A Novel Approach to Encrypt Multiple Images Using Multiple Chaotic Maps and Chaotic Discrete Fractional Random Transform,” Journal of Ambient Intelligence and Humanized Computing, Springer,2018,DOI:https://doi.org/10.1007/s12652-018-1072-0(SCI Indexed).

  35. Mohit Dua, R. K. Aggarwal and Mantosh Biswas, “Optimizing Integrated Features for Hindi Automatic Speech Recognition System,” Journal of Intelligent Systems, Degryuter, 2018, DOI:https://doi.org/10.1515/jisys-2018-0057(Scopus Indexed).

  36. A. Bisht, Mohit Dua andSheetal, “A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.” Journal of Intelligent Systems, Springer, Degryuter. https://doi.org/10.1515/jisys-2018-0365 (Scopus Indexed), 2019.

  37. Gita Donkal, Gyanendra K. Verma, “A multimodal fusion based framework to reinforce IDS for securing Big Data environment using Spark”, Journal of Information Security and Applications, Elsevier, [Scopus], Vol.43, December 2018, Pages1-11,DOI:https://doi.org/10.1016/j.jisa.2018.10.001.

  38. Gyanendra K. Verma, Pragya Gupta , “Wild Animal Detection from Highly Cluttered Images using a Deep Convolutional Neural Network”, International Journal of Computational Intelligence and Applications (IJCIA), World scientific [Scopus],DOI:https://doi.org/10.1142/S1469026818500219, Oct 2018. 

  39. Abhishek Verma and Virender Ranga, "On evaluation of Network Intrusion Detection Systems: Statistical analysis of CIDDS-001 dataset using Machine Learning Techniques", Pertanika Journal of Science & Technology (JST) (Scopus, WoS-Indexed), vol. 26, issue 3, July 2018.

  40. Abhishek Verma and Virender Ranga, "Analysis of Routing Attacks on RPL based 6LoWPAN Networks", International Journal of Grid and Distributed Computing, (Scopus, WoS-Indexed), vol.  11, no. 8, pp. 43-56, Aug 2018.

  41. Virender Ranga, Nikita Yadav and Pulkit Garg, "American sign language FINGERSPELLING using Hybrid discrete wavelet transform-Gabor filter and Convolutional neural network", Journal of Engineering Science and Technology (JESTEC) (Scopus, WoS-Indexed), vol. 13, issue 9, September 2018.

  42. Gaurav Kumar and Virender Ranga, "Swarm Intelligence-based Partitioned Recovery in Wireless Sensor Networks", Journal of Telecommunications and Information Technology (Scopus-Indexed), vol. 3, August 2018.

  43. Virender Ranga and D. Rohila, "Parametric Analysis of Heart Attack Prediction Using Machine Learning Techniques", International Journal of Grid and Distributed Computing (Scopus-Indexed), vol. 11, no. 4, pp. 37-48, April 2018.

  44. Ravi Singh and Virender Ranga, "Performance Evaluation of Machine Learning Classifiers on Internet of Things Security Dataset", International Journal of Control and Automation, (Scopus-Indexed), vol. 11, no. 5, pp. 11-24, May 2018.

  45. Gaurav Kumar Verma and Virender Ranga, "Whale Optimizer to Repair Partitioned Heterogeneous Wireless Sensor Networks", International Journal of Grid and Distributed Computing, (Scopus, WoS-Indexed), vol. 11, no. 5, pp. 11-28, May 2018.

  46. Utkarsh Pundir and Virender Ranga, "A New Centralized Solution for Multi-event Wireless Sensor and Actor Networks", International Journal of Advanced Science and Technology,(Scopus-Indexed), vol. 116, pp. 59-74,  July 2018.

  47. Bharti Sinha, A.K.SinghandP. Saini, “Failure detectors for crash faults in cloud”, Journal of Ambient Intelligence and Humanized Computing, 1-9, 2018, https://doi.org/10.1007/s12652-018-1121-8.

  48. Amarjeet and Jitender Kumar Chhabra, "MaDHS: Many-objective Discrete Harmony Search to Improve Existing Package Design", Computational Intelligence (Wiley, SCI), Volume 35, Issue1, February 2019, p 98-123.

  49. Amit Rathee and Jitender Kumar Chhabra, "Reusability in Multimedia Software Using Structural and Lexical Dependencies", Multimedia Tools and Applications (Springer, SCI), Feb 2019, online, https://doi.org/10.1007/s11042-019-7382-1.

  50. Amarjeet and Jitender Kumar Chhabra, "Information-Theoretic Remodularization of Object-Oriented Software Systems", Information System Frontiers (Springer, SCI, IF 3.23), online, Jan 2019, https://doi.org/10.1007/s10796-019-09897-y.

  51. Anshu Parashar and Jitender Kumar Chhabra, “Assessing Impact of Class Change by Mining Class Associations”, International Arab Journal of Information Technology (SCI), Vol 16, No 1, Jan 2019, Pages 98-107.

  52. Amit Rathee and Jitender Kumar Chhabra, "A Multi-Objective Search Based Approach to Identify Reusable Software Components", Journal of Computer Languages (Elsevier, SCI), Accepted, Jan 2019.

  53. Amarjeet and Jitender Kumar Chhabra, "A Particle Swarm Optimization-Based Heuristic for Software Module Clustering Problem", Arabian Journal for Science and Engineering (Springer, SCI), Volume 43, Issue 12, Dec 2018, p 7083–7094.

  54. Mrinaal Malhotra and Jitender Kumar Chhabra, "Micro Level Source Code Summarization of Optimal Set of Object Oriented Classes", Webology (Scopus), Volume 15, Number 2, Dec 2018, Pages 113-132.

  55. Amit Rathee and Jitender Kumar Chhabra, "Clustering for Software Remodularization by Using Structural, Conceptual and Evolutionary Features", Journal of Universal Computer Science (SCI), vol. 24, no. 12, Dec 2018, Pages 1731-1757.

  56. Amarjeet and  Jitender Kumar Chhabra, “Many objective Artificial Bee Colony Algorithm for Large Scale Software Module Clustering Problem”, Soft Computing (Springer, SCI, IF 2.37), Volume 22, Issue 19, Oct 2018, p 6341–6361.

  57. Amarjeet and Jitender Kumar Chhabra, TA-ABC: Two-Archive Artificial Bee Colony for Multi-objective Software Module Clustering Problem, Journal of Intelligent Systems (Scopus), Vol 27, Issue 4, Oct 2018, p 619-641.

  58. Amarjeet and Jitender Kumar Chhabra, “Optimizing Software Modularity with Minimum Possible Variations". Journal of Intelligent Systems (Scopus, ESCI), Accepted, Oct 2018.

  59. Bakshi A, Patel AK. Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. Journal of Information Security and Applications, June 2019;46:281-95, DOI:https://doi.org/10.1016/j.jisa.2019.03.004.

  60. Arvind Bakshi andA.K.Patel, “Secure Authentication, Privacy and Integrity in Telemedicine using Visual Cryptography. International Journal of Advanced Science and Technology Vol.117 (2018), pp.11-28, DOI: http://dx.doi.org/10.14257/ijast.2018.117.02.

  61. B. B. Gupta and Megha Quamara, “An Overview of Internet of Things (IoT): Architectural Aspects, Challenges, and Protocols" Concurrency and Computation: Practice and Experience, Wiley, 2018.

  62. Akanksha Tewari and B. B. Gupta, “Security, Privacy and Trust of different Layers in Internet-of-things (IoTs) Framework”,” FGCS, Elsevier, 2018.

  63. Shashank Gupta, B.B. Gupta and Pooja Chaudhary, “A Client-Server JavaScript Code Rewriting-Based Framework to Detect the XSS Worms from Online Social Network,” CCPE, Wiley, 2018.

  64. Kriti Bhushan, B. B. Gupta, “Distributed Denial of Service (DDoS) Attack Mitigation in Software Defined Network (SDN) based Cloud Computing Environment” AIHC, Springer, 2018, (SCI).

  65. Kriti Bhushan, B. B. Gupta, "Network Flow Analysis for Detection and Mitigation of Fraudulent Resource Consumption (FRC) Attacks in multimedia cloud computing,” Multimedia Tools and Applications, 2018. 

  66. Ankit Kumar Jain and B. B. Gupta, "Towards Detection of Phishing Websites on Client-side using Machine Learning based Approach". Telecommunication Systems, Springer, 2018. 

  67. B. B. Gupta and Megha Quamara, “A Taxonomy of various Attacks on Smart Card based Applications and Countermeasures,” CCPE, Wiley, 2018.

  68. Ankit Kumar Jain and B.B.Gupta, “A machine learning based approach for phishing detection using hyperlinks information”, Journal of Ambient Intelligence and Humanized Computing, 10(5), 2015-2028.

  69. Ankit Kumar Jain and B.B.Gupta, “Two-level authentication approach to protect from phishing attacks in real time”, Journal of Ambient Intelligence and Humanized Computing, 9(6), 1783-1796, 2019.

  70. Vasileios A. Memos, Kostas E. Psannis, YotakaIshibashi, ByungGyu Kim and B.B.Gupta, “An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework”, Journal of Future Generation Computer Systems, Volume 83, June 2018, Pages 619-628, Elseiver, DOI: https://doi.org/10.1016/j.future.2017.04.039.

  71. Andreas P.Plageras, Kostas E. Psannis,ChristosStergiou, HaoxiangWang and B.B.Gupta, “Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings”, Journal of Future Generation Computer Systems, Volume 82, May 2018, Pages 349-357, DOI: https://doi.org/10.1016/j.future.2017.09.082.

  72. Zhang, Z., andB.B.Gupta, B. B.,“Social media security and trustworthiness: overview and new direction”, Future Generation Computer Systems, 86, 914-925, Volume 86, September 2018, Pages 914-925, Sept. 2018.

  73. Stergiou, C., Psannis, K. E., Kim, B. G.and Gupta, B., “ Secure integration of IoT and cloud computing”, Future Generation Computer Systems, 78, 964-975, Elseiver, 2018.

  74. Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems.

  75. Al-Ayyoub, M., Rabab’ah, A., Jararweh, Y., Al-Kabi, M. N., & Gupta, B. B., “Studying the controversy in online crowds interactions”, Applied Soft Computing, 66, 557-563, 2018.

  76. Stergiou, C., Psannis, K. E., Gupta, B. B., &Ishibashi, Y., “Security, privacy & efficiency of sustainable cloud computing for big data & IoT”, Sustainable Computing: Informatics and Systems, 19, 174-184, 2018.

  77. Al-Ayyoub, M., Al-andoli, M., Jararweh, Y., Smadi, M., & Gupta, B, “Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism”, Computers & Electrical Engineering, 74, 533-546, 2019.

  78. Singh, V. (2019). An Overview of User-Interactions in Exploratory Search: Theoretical Foundations, Techniques, and Research Issues. International Journal of Business Information Systems, 32(4), 25-48. (Scopus)

 

  1.  Singh, V. (2019). Predicting Search Intent Based on In-Search Context for Exploratory Search. International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 11(3), 53-75.  (Scopus)

  2.   Singh, V. (2019). Visual Task Characterization for Exploratory Search. International Journal of Information Systems and Social Change (IJISSC), 11(3), 14-37. (INSPEC).

 

Conference Publications

National and International Conferences

  1. Kunal Vohra and Mayank Dave, “Securing Fog and Cloud Communication Using Attribute Based Access Control and Re-encryption”, Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 20-21 April 2018, IEEE, Coimbatore, India, doi: 10.1109/ICICCT.2018.8473045. 

  2. Deepshikha and Mayank Dave, “A Real-Time Application Solution in Data Center Networking Using SDN”, 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), 11-12 July 2018, IEEE, Coimbatore, India, doi: 10.1109/ICIRCA.2018.8596782.

  3. Pooja Garg, L. Dodeja, Priyanka Ahlawat and Mayank Dave., “Hybrid Color Image Watermarking Algorithm Based on DSWT-DCT-SVD and Arnold Transform”, In Advances in Signal Processing and Communication. Lecture Notes in Electrical Engineering, vol 526. Springer, doi:https://doi.org/10.1007/978-981-13-2553-3_31, 2019.

  4. Deepshikha and Mayank Dave, “An Efficient Traffic Management Solution in Data Center Networking Using SDN”, 2018 International Conference on Power Energy, Environment and Intelligent Control (PEEIC), 13-14 April 2018, IEEE, Greater Noida, India, doi: 10.1109/PEEIC.2018.8665589.

  5. Priyanka Ahlawat and Mayank Dave, “An attack model based highly secure key management scheme for wireless sensor networks” Journal on Procedia Computer Science, vol. 125, 2018, pp. 201-207, DOI: https://doi.org/10.1016/j.procs.2017.12.028.

  6. Kunal Vohra and Mayank Dave, “Multi-Authority Attribute Based Data Access Control in Fog Computing”, Journal on Procedia Computer Science, Volume 132, Pages 1449-1457, Elseiver, June 2018, DOI: https://doi.org/10.1016/j.procs.2018.05.078.

  7. Avinash Tulasi and Mayank Dave, “Key Aggregate Cryptography Based Solution for Dynamic Ownership Management in Fog Infrastructures”, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 20-21 April 2018, IEEE, Coimbatore, India, DOI: 10.1109/ICICCT.2018.8473080.

  8. Nitin Goyal, Mayank Dave andA.K.Verma, “Adaptive Error Control Technique for Cluster-Based Underwater Wireless Sensor Networks”, InWoungang I., Dhurandher S. (eds) International Conference on Wireless, Intelligent, and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 18. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-75626-4_20.

  9. Rekha Rani and Ritu Garg,“Power Aware Scheduling in Cloud using Ant Colony Optimization”, International Journal of Computational Intelligence & IoT, 1(2), In ICCIIOT-2018, SSRN, Elsevier.

  10. Rekha Rani and Ritu Garg, “State-of-the-Art Energy-Efficient Thermal-Aware Scheduling in Cloud”, In: Fong S., Akashe S., Mahalle P. (eds) Information and Communication Technology for Competitive Strategies. Lecture Notes in Networks and Systems, vol 40. Springer, Singapore, 2019.

  11. Jahnvi and Ritu Garg, “Internet of Energy: Deep Learning based Load Prediction in Smart Grid”, International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT-2019).

  12. Rekha Panihar and Ritu Garg, “Optimized Energy Efficiency using PSO in Internet of Things”,International Conference on Intelligent Machines (ICIM 2019). Baba Farid Group of Institutions. Bathinda, India, March 15-16, 2019, IETE Springer Series.

  13. Rekha Panihar and Ritu Garg,“Energy Management in WSN: A State of Art”,International Conference on Intelligent Data Communication Technologies and Internet of Things, ICICI 2018, Springer, LNDECT.

  14. Chesta Kathpal and Ritu Garg, “Reliability Aware Green Scheduling Algorithm in Cloud Computing”, in proceedings of International Conference on Recent Advancements in Computer, Communication and Computational Sciences (August 10-11, RACCCS- 2018), Springer AISC.

  15. Neha Garg and Ritu Garg, “Multi-Source Energy Harvesting System for Sensor Nodes”, in proceedings of 2nd International Conference on Advanced Informatics for Computing Research, ICAICR-2018, Springer CCIS.

  16. Mohan Sharma and Ritu Garg,“Whale-Genetic Optimization Algorithm for Energy Efficient Task Scheduling in Cloud Computing”,In International Conference on "Advanced Engineering Optimization Through Intelligent Techniques (AEOTIT)" during 03-05 August 2018.Springer (AISC)

  17. Mrinaal Malhotra and Jitender Kumar Chhabra, “Class Level Code Summarization Based On Dependencies and Micro patterns”, International conference on Inventive Communication and Computational Technologies, Coimbatore, accepted and to appear in IEEE Explore, 2018.

  18. Ujjawala Yati and M. Biswas, “Dual Discrete Wavelet Transform Based Image Fusion Using Averaging Principal Component,” International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E-2018), University of Allahabad, India, Springer, pp. 1-10, 2018.

  19. Aditya Gautam and M. Biswas, “Whale Optimization Algorithm based Edge Detection for Noisy Image,” International Conference on Intelligent Computing and Control Systems ( ICCS 2018), Vaigai College Engineering, Madurai, India, IEEEXplore, pp. 1878-1883, 2018.

  20. Shashanka Kalita and M. Biswas, “Hyperspectral Image Classification Using Modified Convolutional Neural Network,” International Conference on Intelligent Computing and Control Systems ( ICCS 2018), Vaigai College Engineering, Madurai, India, IEEEXplore, pp. 1884-1889, 2018.

  21. V. Kumar and Vikram, “An Automatic Intent Modeling Algorithm for Interactive Data Exploration”, In Computational Intelligence in Data Mining-Volume 1 (pp. 459-470). Springer, New Delhi, 2019. 

  22. Patel, Jay and Vikram Singh, “Query Morphing: A Proximity-Based Data Exploration for Query Reformulation. In Computational Intelligence”, Theories, Applications and Future Directions-Volume I (pp. 247-259). Springer, Singapore, 2019.

  23. V. Kumar and Vikram Singh, “What’s on Your Mind: Automatic Intent Modeling for Data Exploration”, In Advances in Data and Information Sciences (pp. 65-75), Springer, Singapore, 2018. 

  24. Patel Jay and Vikram Singh, “Query morphing: A proximity-based approach for data exploration and query reformulation”, In International Conference on Mining Intelligence and Knowledge Exploration (pp. 261-273). Springer, Cham, 2018.

  25. Bhumika Paharia and Kriti Bhushan, “Fog Computing as a Defensive Approach Against Distributed Denial of Service (DDoS): A Proposed Architecture”, In 9thInternational Conference on Computing, Communication and Networking Technologies (ICCCNT-July 2018) (pp. 1-7). IEEE.

  26. Kriti Bhushan and B.B.Gupta, “Hypothesis test for low-rate DDoS attack detection in cloud computing environment”, Procedia computer science, 132, 947-955, 2018. 

  27. Bhumika Paharia and Kriti Bhushan, “DDoS Detection and Mitigation in Cloud via FogFiter: A Defence Mechanism”, In 9thInternational Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7), IEEE, July 2018.

  28. Rutuja Wankhedkar and Sanjay Kumar Jain,“A Brief Survey on Techniques Used in Discovering Time Series Motifs" Presented in ICAEEC-2019”, International Conference on “Advances in Electronics, Electrical & Computational Intelligence, Indian Institute of Information Technology, Allahabad Prayagraj, India, May 31-June 1, 2019.

  29. Manvi Breja and Sanjay Kumar Jain, “Analysis of Why-type Questions for Question Answering System”, AI*QA Workshop in conjunction with European Conference on Advances in Databases and Information Systems, ADBIS 2018, Sept 2-5, 2018, Springer, CCIS Vol. 909, pp 265-273.

  30. Priyanka Jariha and Sanjay Kumar Jain, “CEAM: A Model to Deal with Long Tail Problem in Recommender System”, International Conference on Intelligent Computing and Sustainable System (ICICSS 2018) Coimbatore, IEEE, Sept 20-21, 2018.

  31. Priyanka Jariha and Sanjay Kumar Jain, “A state-of-the-art Recommender Systems: An Overview of Concepts, Methodology and Challenges”, 2ndInternational Conference on Inventive Communication and Computational Technologies (ICICCT 2018) Coimbatore, IEEE, April 20-21, 2018.

  32. Ratna Kumari and Sanjay Kumar Jain, “A brief survey on exploratory search systems”, 3rdInternational Conference on Microelectronics, Computing & Communication Systems (MCCS - 2018), at Ranchi on May 12-13, Springer, 2018.

  33. Suman Garg and Sanjay Kumar Jain, “A Brief Survey On Mass Based Dissimilarity Measures”, International Conference on Innovative Computing and Communications, ICICC-2018, LNNS, vol 56, pp 387-395, Springer.

  34. Ruchi Gupta, R.K. Aggarwal and Minakshi Sharma, “Novel Technique for Prediction Analysis in Data Mining”, in International Conference on Inventive Research in Computing Applications, ICIRCA, IEEE, RVS College of Engineering and Technology, July 11-12, 2018, Coimbatore.

  35. Aqbal Waris and R.K. Aggarwal, “Optimization of Deep Neural Network for Automatic Speech Recognition “International Conference on Inventive Research in Computing Applications (ICIRCA 2018), IEEE, 6 June 2018.

  36. Sourabh Kumar and Rajesh Kumar Aggarwal, “Augmented Handwritten Devanagari digit recognition using Convolutional Autoencoder”, IEEE International Conference on Inventive Research in Computing Applications (ICIRCA 2018), R.V.S College of Engineering, Coimbatore, India,11-12 July 2018.

  37. Sourabh Kumar and Rajesh Kumar Aggarwal, “Object Recognition using Sparse Autoencoder with Convolutional Neural Network”, IEEE International Conference on I-SMAC (IoT in Social, Mobile, Analytics And Cloud) (ISMAC 2018), SCAD Institute of Technology, Coimbatore, India,2018. 

  38. Ishita Bajaj and Rajesh Kumar Aggarwal, “Steganography Using HTML Web Pages as a Carrier: A Survey”,2nd International Conference on Advanced Computing and Software Engineering (ICACSE-2019).

  39. Ishita Bajaj and Rajesh Kumar Aggarwal, “RSA Secured Web Based Steganography Employing HTML Space Codes And Compression Technique”, International Conference on Intelligent Computing and Control Systems (ICICCS 2019), IEEE, 2019.

  40. Saif Ali Khan,R.K Aggarwal and Shashidhar Kulkarni,“Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data”, 5thIEEE International Conference on Advance Computing and Communications System ICACCS 2019, 16th March 2019.

  41. Saif Ali Khan,R.K Aggarwal and Shashidhar Kulkarni,“Encryption Schemes of Cloud Computing:A Review”,5thIEEE International Conference on Advance Computing and Communications System ICACCS 2019,16thMarch 2019.

  42. Saddam Khan and R. K. Aggarwal, “Efficient Mutual Authentication mechanism to Secure Internet of Things (IoT)” ComitCon-2019: International Conference on Machine Learning, Big Data, Cloud and Parallel Computing. IEEE, MRIIRS Faridabad, February 2019.

  43. Saddam Khan and R. K. Aggarwal, “Lightweight RFID Authentication Mechanism to Secure Internet of Things (IoT)”, in Proceedings of the ACTN-2019: 2nd National Conference on Advanced Communication Technologies and Networks. MNIT Jaipur, June 2019.

  44. S. K. Mahana and R.K. Aggarwal, “Image Steganography: Analysis & Evaluation of Secret Communication” in International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM-2019) [SSRN-Elsevier] during February 26-28, 2019 at Amity University, Jaipur (Scopus-Indexed).

  45. S.K. Mahana and R.K. Aggarwal (2019), “ Foggy Image Enhancement using Modified Adaptive Histogram Equalization and Guided Filter” in 1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (MIND-2019) during March 3-4, 2019 at NIT, Kurukshetra (Scopus-Indexed).

  46. DivyaMamgai, SonaliBrodiya, Rohit Kumar and Mohit Dua, “An Improved Automated Question Answering System from Lecture Videos”, Proceedings of 2nd International Conference on Communication, Computing and Networking, Springer, Singapore, 2019, https://doi.org/10.1007/978-981-13-1217-5_64 (ISI Indexed).

  47. P. Jaroli, A. Bisht, M. Dua and S. Dua, “A Color Image Encryption Using Four Dimensional Differential Equations and Arnold Chaotic Map”, IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 869-876), 2018, DOI: https://doi.org/10.1109/ICIRCA.2018.8597310 (Scopus Indexed).

  48. P. Jaroli, A. Bisht, M. Dua and S. Dua, “Symmetric Multiple Image Encryption Using Multiple New One-Dimensional Chaotic Functions and Two-Dimensional Cat Man”, In 2018 IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 676-682). 10.1109/ICIRCA.2018.8597245 (Scopus Indexed), July 2018.

  49. H.Singh and Mohit Dua, “Website Attacks: Challenges and Preventive Methodologies” In 2018 IEEE International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 381-387). 10.1109/ICIRCA.2018.8597259 (Scopus Indexed), July 2018.

  50. Anamika Dhillon and G.K.Verma, “Wild Animal Detection from Highly Cluttered Forest Images Using Deep Residual”, International Conference on Intelligent Human Computer Interaction, 230-238, 2018.

  51. G. Donkal and G.K.Verma, “Securing Big Data Ecosystem with NSGA-II and Gradient Boosted Trees Based NIDS Using Spark”, 2018 Second International Conference on Intelligent Computing and Control.

  52. A. Bakshi andA.K.Patel, “A Novel Error Diffusion Algorithm for Halftoning Greyscale Image Using Pull Based Method”, In2018 International Conference on Communication and Signal Processing (ICCSP) 2018 Apr 3 (pp. 0305-0311). IEEE.

  53. A. Bakshi and A.K.Patel, “Halftoning Algorithm Using Pull-Based Error Diffusion Technique”, inInternational Conference on Innovative Computing and Communications 2019 (pp. 411-419). Springer, Singapore (Best Paper Award).

  54. A. Tewari and B. B. Gupta, “A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography (ECC),” Confluence 2018. 

  55. Shashank Gupta and B. B. Gupta, “SFC: A Three Layer Smart Phone-Fog-Cloud Framework for Defending against JavaScript Code Injection Vulnerabilities on OSN,” Confluence 2018, 2018.

  56. B. B. Gupta and Megha Quamara, “Multi-layered Cloud and Fog based Secure Integrated Transmission and Storage Framework for IoT based Applications,” SPIN 2018, 2018.

  57. Kriti Bhushan and B. B. Gupta, “Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment,” SPIN 2018, 2018.

  58. Prachi Gulihar and B. B. Gupta, “Cooperative Mitigation of DDoS Attacks Using an Optimized Auction Scheme on Cache Servers,” ICAICR 2018, Shimla, India, 2018. 

  59. B. B. Gupta and Megha Quamara, “An Identity based Access Control and Mutual Authentication Framework for Distributed Cloud Computing Services in IoT Environment using Smart Cards,” ICCIDS2018, 2018. 

  60. B. B. Gupta and Megha Quamara, “A Dynamic Security Policies Generation Model for Access Control in Smart Card based Applications,” 10th CCS 2018 conference, Italy, 2018.

 

 

NIT Kurukshetra is one of the premier technical institutes of the country. Founded in 1963 as Regional Engineering College Kurukshetra, the institute was rechristened as National Institute of Technology on June 26, 2002.