Adarsh Kumar

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.
Artif. Intell. Rev., December, 2023

AutoCov22: A Customized Deep Learning Framework for COVID-19 Detection.
SN Comput. Sci., September, 2023

Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023

Secure quantum computing for healthcare sector: A short analysis.
Secur. Priv., 2023

Demystifying quantum blockchain for healthcare.
Secur. Priv., 2023

Role of cybersecurity and Blockchain in battlefield of things.
Internet Technol. Lett., 2023

ShredGP: Guitarist Style-Conditioned Tablature Generation.
CoRR, 2023

From Words to Music: A Study of Subword Tokenization Techniques in Symbolic Music Generation.
CoRR, 2023

Revolutionizing Modern Networks: Advances in AI, Machine Learning, and Blockchain for Quantum Satellites and UAV-based Communication.
CoRR, 2023

Blockchain for Patient Data Integrity: Decentralised Storage and Retrieval in Modern Healthcare Systems.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

Comparative Studies of Stochastic Techniques to Minimize the Cost of Biomass Supply Networks.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

FedBeam: Federated learning based privacy preserved localization for mass-Beamforming in 5GB.
Proceedings of the International Conference on Information Networking, 2023

GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers.
Proceedings of the Artificial Intelligence in Music, Sound, Art and Design, 2023

2022
Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda.
Veh. Commun., 2022

Quantum computing: A taxonomy, systematic review and future directions.
Softw. Pract. Exp., 2022

A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system.
Simul. Model. Pract. Theory, 2022

Securing the future internet of things with post-quantum cryptography.
Secur. Priv., 2022

Cybersecurity for Battlefield of Things - A Comprehensive Review.
J. Circuits Syst. Comput., 2022

A deep neural network-based approach for fake news detection in regional language.
Int. J. Web Inf. Syst., 2022

A security analysis of lightweight consensus algorithm for wearable kidney.
Int. J. Grid Util. Comput., 2022

Secure Quantum Computing for Healthcare Sector: A Short Analysis.
CoRR, 2022

An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games.
IEEE Access, 2022

A Robust NIfTI Image Authentication Framework Based on DST and Multi-Scale Otsu Thresholding.
IEEE Access, 2022

CounterGeDi: A Controllable Approach to Generate Polite, Detoxified and Emotional Counterspeech.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management.
Veh. Commun., 2021

A multidimensional-multilayered anomaly detection in RFID-sensor integrated internet of things network.
Int. J. Cloud Comput., 2021

Uncertainties evaluation and analysis using quantitative technique for a software project.
Int. J. Ad Hoc Ubiquitous Comput., 2021

A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic.
Future Gener. Comput. Syst., 2021

Quantum Artificial Intelligence for the Science of Climate Change.
CoRR, 2021

Digital device-based active learning approach using virtual community classroom during the COVID-19 pandemic.
Comput. Appl. Eng. Educ., 2021

Blended Learning Tools and Practices: A Comprehensive Analysis.
IEEE Access, 2021

Survey of Promising Technologies for Quantum Drones and Networks.
IEEE Access, 2021

Blockchain and Autonomous Vehicles: Recent Advances and Future Directions.
IEEE Access, 2021

Team Phoenix at WASSA 2021: Emotion Analysis on News Stories with Pre-Trained Language Models.
Proceedings of the Eleventh Workshop on Computational Approaches to Subjectivity, 2021

Adversities are all you need: Classification of self-reported breast cancer posts on Twitter using Adversarial Fine-tuning.
Proceedings of the Sixth Social Media Mining for Health Workshop and Shared Task, 2021

Reducing False Prediction On COVID-19 Detection Using Deep Learning.
Proceedings of the 64th IEEE International Midwest Symposium on Circuits and Systems, 2021

DadaGP: A Dataset of Tokenized GuitarPro Songs for Sequence Models.
Proceedings of the 22nd International Society for Music Information Retrieval Conference, 2021

Hostility Detection in Hindi Leveraging Pre-trained Language Models.
Proceedings of the Combating Online Hostile Posts in Regional Languages during Emergency Situation, 2021

Drones Combat COVID-19 Epidemic: Innovating and Monitoring Approach.
Proceedings of the Digital Transformation and Emerging Technologies for Fighting COVID-19 Pandemic: Innovative Approaches, 2021

2020
Lightweight Proof of Game (LPoG): A Proof of Work (PoW)'s Extended Lightweight Consensus Algorithm for Wearable Kidneys.
Sensors, 2020

An Overview of IoT Sensor Data Processing, Fusion, and Analysis Techniques.
Sensors, 2020

Correction to: A multi‑target approach for discovery of antiviral compounds against dengue virus from green tea.
Netw. Model. Anal. Health Informatics Bioinform., 2020

A multi-target approach for discovery of antiviral compounds against dengue virus from green tea.
Netw. Model. Anal. Health Informatics Bioinform., 2020

A novel heuristic simulation-optimization method for critical infrastructure in smart transportation systems.
Int. J. Commun. Syst., 2020

A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City.
IEEE Access, 2020

A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes.
IEEE Access, 2020

2018
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs.
Proceedings of the Intelligent Systems Design and Applications, 2018

An Efficient Outlier Detection Mechanism for RFID-Sensor Integrated MANET.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things.
Int. J. Adv. Intell. Paradigms, 2017

2016
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs.
Int. J. Netw. Secur., 2016

JIIT-edu: An android application for college faculty.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

A simulation annealing based anti-collision protocol for RFID tag identification.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

Simulation and cost analysis of group authentication protocols.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

Analysis of DCNS anti-collision protocol with contiguous channel allocation.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

Intuitionistic fuzzy ant colony optimization for course sequencing in E-learning.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

2014
Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs.
KSII Trans. Internet Inf. Syst., 2014

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks.
Int. J. Commun. Networks Inf. Secur., 2014

Cost and performance analysis of server-centric authentication protocol in supply chain management.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

2013
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs).
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

2009
Mantras, Astras & Shastras for ITSM Transformation.
Proceedings of the 35. International Computer Measurement Group Conference, 2009


  Loading...