displayNone
banner

Publications

Journal Article

  • Detecting and visualizing hate speech in social media: A cyber Watchdog for surveillance Expert Systems with Applications, vol. 161 Art. no. 113725. Dec. 2020 doi: 10.1016/j.eswa.2020.113725
  • Translating Morphologically Rich Indian Languages under Zero-Resource Conditions ACM Transactions on Asian and Low-Resource Language Information Processing, vol. 19, no. 6 Art. no. 85. Oct. 2020 doi: 10.1145/3407912
  • Computational characterization of plasma transport across magnetic filter in ROBIN using PIC-MCC simulation Fusion Engineering and Design, vol. 151 Art. no. 111402. Feb. 2020 doi: 10.1016/j.fusengdes.2019.111402
  • Algorithm for fairness in schedule lengths of sink-rooted trees in multi-sink heterogeneous wireless sensor networks International Journal of Information Technology (Singapore), vol. 12, no. 4 pp. 1117-1132 Dec. 2020. doi: 10.1007/s41870-020-00490-0
  • IoT-enabled Low Power Environment Monitoring System for prediction of PM2.5 Pervasive and Mobile Computing, vol. 67 Art. no. 101175. Sep. 2020 doi: 10.1016/j.pmcj.2020.101175
  • Design of prominent SET-based high performance computing system IET Circuits, Devices and Systems vol. 14, no. 2 pp. 159-167 Mar. 2020. doi: 10.1049/iet-cds.2019.0166
  • A provable secure key-escrow-free identity-based signature scheme without using secure channel at th... Sādhanā vol. 44, no. 6, Jun. 2019, pp. 1-9 . 10.1007/s12046-019-1117-x
  • Detection of Node Capture Attack in Wireless Sensor Networks IEEE Systems Journal vol. 13, no. 1, Mar. 2019, pp. 238-247, IEEE, 22 Aug. 2018. 10.1109/JSYST.2018.2863229
  • Privacy-preserving targeted online advertising International Journal of Social Computing and Cyber-Physical Systems (IJSCCPS) vol. 2, no. 2, 14 Jun. 2019, pp. 132-145. 10.1504/IJSCCPS.2019.100196
  • Privacy Preserving Searchable Encryption with Fine-grained Access Control IEEE Transactions on Cloud Computing 2019 10.1109/TCC.2019.2892116
Back to Top