S.No |
Title |
Year |
Publications |
Index |
1 |
Secure Encrypted Word Proximity Retrieval Framework for Outsourced Relational Database Backed Applications |
2022 |
Springer |
Scopus |
2 |
Privacy Preserving Semantic-Aware Multi-keyword Ranked Dynamic Search Over Encrypted Data |
2021 |
Springer |
Scopus |
3 |
Stateless Key Management Scheme for Proxy-Based Encrypted Databases |
2021 |
Springer |
Scopus |
4 |
Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric |
2021 |
Springer |
Scopus |
5 |
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data
|
2021 |
Springer |
Scopus |
6 |
A compact analytical survey on task scheduling in cloud computing environment
|
2021 |
IJETT |
Scopus |
7 |
Cryptographic key management scheme for supporting multi-user SQL queries over encrypted databases
|
2020 |
InderScience |
Scopus |
8 |
A secure, fast insert and efficient search order preserving encryption scheme for outsourced databases
|
2019 |
InderScience |
Scopus |
9 |
Fuzzy-Based Integration of Security and Trust in Distributed Computing
|
2019 |
Springer |
Scopus |
10 |
Privacy Preserving Dynamically Indexed Multi-Phrase Search over Encrypted Data
|
2018 |
IEEE |
Scopus |
11 |
Usage of DHS and De-duplicating Encrypted Data using ABE & ECC for Secured Cloud Environment
|
2018 |
IEEE |
Scopus |
12 |
A study on impact of untrustworthy and older recommendations over T-Grid computational model
|
2018 |
Springer |
Scopus |
13 |
Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs |
2018 |
IEEE |
Scopus |
14 |
A survey on client side and server side approaches to secure web applications
|
2017 |
IEEE |
Scopus |
15 |
Experimental results on multi-key searchable encryption technique with different elliptic curves and app designing |
2017 |
IJAIT |
Scopus |
16 |
A novel proximity based searchable encryption scheme using referential dissimilarity |
2017 |
IEEE |
Scopus |
17 |
Improving network lifetime in WSN's based on maximum residual energy |
2021 |
INCET |
Scopus |
18 |
Pulmonary CT Images Segmentation using CNN and UNet Models of Deep Learning |
2020 |
IEEE |
Scopus |
19 |
Analysis and implementation of a parallel computing cluster for solving computational problems in data analytics |
2020 |
ICCCS |
Scopus |
20 |
Energy efficient load balancing approach for multipath routing protocol in ad hoc network |
2019 |
ICACCP |
Scopus |
21 |
Comprehensive Review of Automatic Lung Segmentation Techniques on Pulmonary CT Images |
2019 |
ICISC |
Scopus |
22 |
Design and Implementation of ConvNet for Handwritten Digits Classification on Graphical Processing Unit
|
2018 |
ICCSP |
Scopus |
23 |
Automatic Lung Segmentation on Thoracic CT Scans Using U-Net Convolutional Network
|
2018 |
ICCSP |
Scopus |
24 |
Parallel implementation of cryptographic algorithm: AES using OpenCL on GPUs
|
2018 |
ICISC |
Scopus |
25 |
Design and implementation of GPU-based matrix chain multiplication using C++AMP
|
2017 |
ICECCT |
Scopus |
26 |
A Study of Automated Evaluation of Student's Examination Paper using Machine Learning Techniques
|
2021 |
ICCCIS |
Scopus |
27 |
Feature Impact on Sentiment Extraction of TEnglish Code-Mixed Movie Tweets
|
2021 |
SIST |
Scopus |
28 |
Heart Disease Prediction Using Extended KNN (E-KNN)
|
2021 |
SIST |
Scopus |
29 |
Heart disease prediction using extended KNN(E-knn)
|
2020 |
IJATCSE |
Scopus |
30 |
Sentiment Extraction from Bilingual Code Mixed Social Media Text
|
2020 |
AISE |
Scopus |
31 |
Topical and trust based page ranking using automatic seed selection
|
2017 |
IEEE |
Scopus |
32 |
A contextual deep clustering based intrusion detection method for cloud
|
2019 |
IJAST |
Scopus |
33 |
Detection of intrusion using hybrid feature selection and flexible rule based machine learning
|
2019 |
IJETT |
Scopus |
34 |
Analysis on Malware Issues in Online Social Networking Sites (SNS)
|
2019 |
ICACCS |
Scopus |
35 |
Optimized key management scheme for sensor networks using genetic algorithm
|
2019 |
Springer |
Scopus |
36 |
A review on application security management using web application security standards
|
2019 |
AISC |
Scopus |
37 |
Survey on design challenges and analysis of service architecture of DRM
|
2017 |
ICEI |
Scopus |
38 |
Prediction of epileptic seizure classification using third-order cumulants and sparse autoencoder
|
2021 |
ITAIT |
Scopus |
39 |
Multi-Objective Feature Selection Method by Using ACO with PSO Algorithm for Breast Cancer Detection
|
2021 |
IJIES |
Scopus |
40 |
Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model
|
2021 |
IJICS |
Scopus |
41 |
Bat-Grey Wolf Optimizer and kernel mapping for automatic incremental clustering
|
2020 |
IJMSSC |
Scopus |
42 |
An efficient cryptanalysis scheme for secure data storage system in cloud using optimal dual encryption algorithm
|
2020 |
IJSOI |
Scopus |
43 |
Particle Grey Wolf Optimizer (PGWO) Algorithm and Semantic Word Processing for Automatic Text Clustering
|
2019 |
IJUFKBS |
Scopus |
44 |
Design and implementation of a hacker detection scheme: A network security measure in heterogeneous WSN
|
2019 |
Lecture Notes in Networks and Systems |
Scopus |
45 |
A secure and computational-efficient multicast key distribution for wireless networks
|
2019 |
ICISC |
Scopus |
46 |
Approving Psycho-Neuro-Computer Systems to prevent (Systemic Vs Individualistic Perspective) Cybercrimes in Information Highway
|
2018 |
ICCCS |
Scopus |
47 |
Estimating software reliability using ant colony optimization technique with salesman problem for software process
|
2018 |
IJATCSE |
Scopus |
48 |
Attacker evidence system in WSN
|
2018 |
CCIS |
Scopus |
49 |
Investigation on email text mining techniques and tools
|
2018 |
IJMTT |
Scopus |
50 |
Automation of component selection process for designing of reusable components using drag and drop mechanism
|
2017 |
ICISC |
Scopus |
51 |
Task-Scheduling Algorithms in Cloud Environment
|
2017 |
Springer |
Scopus |