Celestine Iwendi
Orcid: 0000-0003-4350-3911
According to our database1,
Celestine Iwendi
authored at least 50 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Grid Comput., June, 2024
2023
Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds.
Big Data, October, 2023
Blockchain-based multi-layered federated extreme learning networks in connected vehicles.
Expert Syst. J. Knowl. Eng., July, 2023
Multim. Syst., June, 2023
SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.
Expert Syst. J. Knowl. Eng., June, 2023
Exploratory data analysis, classification, comparative analysis, case severity detection, and internet of things in COVID-19 telemonitoring for smart hospitals.
J. Exp. Theor. Artif. Intell., May, 2023
IEEE Trans. Intell. Transp. Syst., April, 2023
Int. J. Netw. Manag., 2023
2022
A futuristic approach to generate random bit sequence using dynamic perturbed chaotic system.
Turkish J. Electr. Eng. Comput. Sci., January, 2022
A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications.
IEEE Trans. Ind. Informatics, 2022
Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring.
Sensors, 2022
An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.
Sensors, 2022
Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain.
Sensors, 2022
A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis.
Pattern Recognit. Lett., 2022
Multim. Syst., 2022
Optimal Coordination of PSS and SSSC Controllers in Power System Using Ant Colony Optimization Algorithm.
J. Circuits Syst. Comput., 2022
A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization.
IEEE Internet Things J., 2022
Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model.
Int. J. Inf. Technol. Decis. Mak., 2022
Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning.
IET Image Process., 2022
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems.
Comput. Commun., 2022
Building construction based on video surveillance and deep reinforcement learning using smart grid power system.
Comput. Electr. Eng., 2022
Comput. Ind. Eng., 2022
2021
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures.
ACM Trans. Internet Techn., 2021
Optimal soft error mitigation in wireless communication using approximate logic circuits.
Sustain. Comput. Informatics Syst., 2021
Softw. Pract. Exp., 2021
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.
Secur. Commun. Networks, 2021
Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2021
Comput. Electr. Eng., 2021
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing.
IEEE Access, 2021
2020
Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition.
Sensors, 2020
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.
Sensors, 2020
Int. J. Distributed Sens. Networks, 2020
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.
Comput. Commun., 2020
Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings.
IEEE Access, 2020
Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model.
IEEE Access, 2020
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.
IEEE Access, 2020
Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation.
IEEE Access, 2020
2019
Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability.
Sensors, 2019
EAI Endorsed Trans. Energy Web, 2019
Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems.
IEEE Access, 2019
Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment.
IEEE Access, 2019
2018
IEEE Access, 2018
Proceedings of the IECON 2018, 2018
Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique.
Proceedings of the IECON 2018, 2018
Analysis of frequency characteristic of surface permanent magnet synchronous machine.
Proceedings of the IEEE International Conference on Industrial Technology, 2018
Proceedings of the IEEE International Conference on Industrial Technology, 2018
2011
Proceedings of the AFRICON 2011, 2011