36 results on '"Raman Singh"'
Search Results
2. Hilbert curves-based location privacy technique for vehicular cloud networks.
3. Deep learning based high performance classification architecture for low-altitude aerial images.
4. GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model.
5. Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network.
6. Data and Location Privacy of Smart Devices over Vehicular Cloud Computing.
7. Blockchain-enabled End-to-End Encryption for Instant Messaging Applications.
8. A Blockchain-Based Authentication Mechanism for Enhanced Security.
9. SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain.
10. On the performance evaluation of object classification models in low altitude aerial data.
11. A Feature Pyramid Based Multi-stage Framework for Object Detection in Low-altitude UAV Images.
12. Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey.
13. Network Augmentation by Dynamically Splitting the Switching Function in SDN.
14. Adaptive Flow-Level Scheduling for the IoT MAC.
15. Framework for a Decentralized Web.
16. Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment.
17. Framework of data privacy preservation and location obfuscation in vehicular cloud networks.
18. Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network.
19. Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload.
20. Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS.
21. Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload.
22. Blockchain-Enabled End-to-End Encryption for Instant Messaging Applications.
23. Dilated convolution based RCNN using feature fusion for Low-Altitude aerial objects.
24. Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain.
25. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.
26. Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices.
27. A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices.
28. Framework for a Decentralized Web.
29. Statistical vertical reduction-based data abridging technique for big network traffic dataset.
30. Internet attacks and intrusion detection system: A review of the literature.
31. Guest editorial: Introduction to the Special Section on Load Balancing of Sensory Data for IoT Deep Learning Applications with Edge/Fog Computing (VSI-lbdl).
32. Adaptive flow-level scheduling for the IoT MAC.
33. An intrusion detection system using network traffic profiling and online sequential extreme learning machine.
34. A Reference Dataset for Network Traffic Activity Based Intrusion Detection System.
35. Deep learning-based object detection in low-altitude UAV datasets: A survey.
36. Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.