Awadhesh Kumar Singh

According to our database1, Awadhesh Kumar Singh authored at least 64 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-based proof-of-authenticity frameworks for Explainable AI.
Multim. Tools Appl., April, 2024

2023
Termination detection in cloud.
Int. J. Syst. Assur. Eng. Manag., December, 2023

Explaining Sarcasm of Tweets using Attention Mechanism.
Scalable Comput. Pract. Exp., November, 2023

EEG-Based Emotion Recognition Using Quantum Machine Learning.
SN Comput. Sci., September, 2023

A review of Deep Learning based methods for Affect Analysis using Physiological Signals.
Multim. Tools Appl., July, 2023

Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures.
J. Ambient Intell. Humaniz. Comput., July, 2023

Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology.
Soft Comput., 2023

A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network.
Int. J. Inf. Sec., 2023

2022
How Blockchain Can Automate KYC: Systematic Review.
Wirel. Pers. Commun., 2022

Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks.
Telecommun. Syst., 2022

A hybrid approach towards reduced checkpointing overhead in cloud-based applications.
Peer-to-Peer Netw. Appl., 2022

XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks.
J. Circuits Syst. Comput., 2022

Modified Transformer Architecture to Explain Black Box Models in Narrative Form.
Int. J. Semantic Web Inf. Syst., 2022

A bio-inspired backbone formation protocol in cognitive radio networks.
Int. J. Commun. Syst., 2022

Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense.
Comput. Secur., 2022

A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives.
Comput. Secur., 2022

Securing heterogeneous embedded devices against XSS attack in intelligent IoT system.
Comput. Secur., 2022

Cognitive XSS Defensive Approach to Secure Smart Devices.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

2021
A localized algorithm for clustering in cognitive radio networks.
J. King Saud Univ. Comput. Inf. Sci., 2021

Light weight approach for secure backbone construction for MANETs.
J. King Saud Univ. Comput. Inf. Sci., 2021

Blockchain based audit trailing of XAI decisions: Storing on IPFS and Ethereum Blockchain.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
An efficient algorithm for backbone construction in cognitive radio networks.
Int. J. Commun. Syst., 2020

Security Issues in Cognitive Radio Ad Hoc Networks.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Fault Tolerant Routing Protocol in Cognitive Radio Networks.
Wirel. Pers. Commun., 2019

Speedy leader election to avoid application discontinuity in cognitive radio networks.
Telecommun. Syst., 2019

Failure detectors for crash faults in cloud.
J. Ambient Intell. Humaniz. Comput., 2019

A bio-inspired leader election protocol for cognitive radio networks.
Clust. Comput., 2019

2018
An election algorithm to ensure the high availability of leader in large mobile ad hoc networks.
Int. J. Parallel Emergent Distributed Syst., 2018

2017
A Leader Election Protocol for Cognitive Radio Networks.
Wirel. Pers. Commun., 2017

A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks.
J. King Saud Univ. Comput. Inf. Sci., 2017

2016
A survey on 5G: The next generation of mobile communication.
Phys. Commun., 2016

A hierarchical virtual backbone construction protocol for mobile ad hoc networks.
J. King Saud Univ. Comput. Inf. Sci., 2016

2015
Movement-Based Checkpointing and Message Logging for Recovery in MANETs.
Wirel. Pers. Commun., 2015

Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks.
J. King Saud Univ. Comput. Inf. Sci., 2015

Mobility and Energy Conscious Clustering Protocol for Wireless Networks.
CoRR, 2015

Authentication and privacy preserving message transfer scheme for vehicular ad hoc networks (VANETs).
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
Multi-objective workflow grid scheduling using ε-fuzzy dominance sort based discrete particle swarm optimization.
J. Supercomput., 2014

A Leader-Based k-Local Mutual Exclusion Algorithm Using Token for MANETs.
J. Inf. Sci. Eng., 2014

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks.
J. Inf. Process. Syst., 2014

On detecting termination in cognitive radio networks.
Int. J. Netw. Manag., 2014

Hash-based Byzantine fault tolerant agreement with enhanced view consistency.
Int. J. Commun. Networks Distributed Syst., 2014

2013
Log Based Recovery with Low Overhead for Large Mobile Computing Systems.
J. Inf. Sci. Eng., 2013

2012
Reference Point Based Multi-Objective Optimization to Workflow Grid Scheduling.
Int. J. Appl. Evol. Comput., 2012

2011
Message efficient global snapshot recording using a self stabilizing spanning tree in a MANET.
Int. J. Commun. Networks Inf. Secur., 2011

Multi-objective Workflow Grid Scheduling Based on Discrete Particle Swarm Optimization.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2011

Elite Leader Finding Algorithm for MANETs.
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011

Democratic Leader Finding Algorithm for Large Mobile Ad Hoc Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments.
Proceedings of the High Performance Architecture and Grid Computing, 2011

Message efficient leader finding algorithm for mobile ad hoc networks.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Trivial solution for a non-trivial problem in MANETs.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

DMX in MANETs: major research trends since 2004.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

Efficient fault tolerant consensus using preemptive token.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

2010
A Contrast Enhancement-Based Filter for Removal of Random Valued Impulse Noise.
IEEE Signal Process. Lett., 2010

An Improved Quorum-Based Algorithm for Extended GME Problem in Distributed Systems.
J. Inf. Sci. Eng., 2010

A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

Specifying Fault-Tolerance Using Split Precondition Logic.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

Impulse Noise Removal from Color Images Using Adaptive Neuro-fuzzy Impulse Detector.
Proceedings of the Contemporary Computing - Third International Conference, 2010

2009
A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

An Index-Based Mobile Checkpointing and Recovery Algorithm.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

2008
A Randomized Approach to Bound Jayanti's Mutual Exclusion Algorithm.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

2005
Specifying Mobile Network using a wp-like Formal Approach.
Rev. Colomb. de Computación, 2005

2004
Adding the leads-to operator to Dijkstra's calculus.
ACM SIGPLAN Notices, 2004

Verifying Mutual Exclusion and Liveness Properties with Split Preconditions.
J. Comput. Sci. Technol., 2004


  Loading...