Celestine Iwendi

Orcid: 0000-0003-4350-3911

According to our database1, Celestine Iwendi authored at least 50 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CIA Security for Internet of Vehicles and Blockchain-AI Integration.
J. Grid Comput., June, 2024

Secure Supervised Learning-Based Smart Home Authentication Framework.
CoRR, 2024

2023
Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds.
Big Data, October, 2023

Blockchain-based multi-layered federated extreme learning networks in connected vehicles.
Expert Syst. J. Knowl. Eng., July, 2023

Cyberbullying detection solutions based on deep learning architectures.
Multim. Syst., June, 2023

SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.
Expert Syst. J. Knowl. Eng., June, 2023

Exploratory data analysis, classification, comparative analysis, case severity detection, and internet of things in COVID-19 telemonitoring for smart hospitals.
J. Exp. Theor. Artif. Intell., May, 2023

A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas.
IEEE Trans. Intell. Transp. Syst., April, 2023

Blockchain-inspired lightweight trust-based system in vehicular networks.
Int. J. Netw. Manag., 2023

2022
A futuristic approach to generate random bit sequence using dynamic perturbed chaotic system.
Turkish J. Electr. Eng. Comput. Sci., January, 2022

A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications.
IEEE Trans. Ind. Informatics, 2022

Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring.
Sensors, 2022

An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.
Sensors, 2022

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain.
Sensors, 2022

A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis.
Pattern Recognit. Lett., 2022

Classification of COVID-19 individuals using adaptive neuro-fuzzy inference system.
Multim. Syst., 2022

Optimal Coordination of PSS and SSSC Controllers in Power System Using Ant Colony Optimization Algorithm.
J. Circuits Syst. Comput., 2022

A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization.
IEEE Internet Things J., 2022

Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model.
Int. J. Inf. Technol. Decis. Mak., 2022

Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning.
IET Image Process., 2022

AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems.
Comput. Commun., 2022

Covid-19 fake news sentiment analysis.
Comput. Electr. Eng., 2022

Building construction based on video surveillance and deep reinforcement learning using smart grid power system.
Comput. Electr. Eng., 2022

Use of regional computing to minimize the social big data effects.
Comput. Ind. Eng., 2022

2021
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures.
ACM Trans. Internet Techn., 2021

Optimal soft error mitigation in wireless communication using approximate logic circuits.
Sustain. Comput. Informatics Syst., 2021

A metaheuristic optimization approach for energy efficiency in the IoT networks.
Softw. Pract. Exp., 2021

TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.
Secur. Commun. Networks, 2021

Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system.
Trans. Emerg. Telecommun. Technol., 2021

Field-programmable gate arrays in a low power vision system.
Comput. Electr. Eng., 2021

Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing.
IEEE Access, 2021

2020
Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition.
Sensors, 2020

The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.
Sensors, 2020

Realizing Efficient Security and Privacy in IoT Networks.
Sensors, 2020

A review on classification of imbalanced data for wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.
Comput. Commun., 2020

Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings.
IEEE Access, 2020

Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model.
IEEE Access, 2020

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.
IEEE Access, 2020

Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation.
IEEE Access, 2020

2019
Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability.
Sensors, 2019

A Survey on Energy-Aware Wireless Sensor Routing Protocols.
EAI Endorsed Trans. Energy Web, 2019

Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems.
IEEE Access, 2019

Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment.
IEEE Access, 2019

2018
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique.
IEEE Access, 2018

An ACO-KMT Energy Efficient Routing Scheme for Sensed-IoT Network.
Proceedings of the IECON 2018, 2018

Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique.
Proceedings of the IECON 2018, 2018

Analysis of frequency characteristic of surface permanent magnet synchronous machine.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

ACO based key management routing mechanism for WSN security and data collection.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

2011
Power consumption trade-off analysis in an OFDM communication chain.
Proceedings of the AFRICON 2011, 2011


  Loading...