Deepak Kumar Sharma

Orcid: 0000-0001-6117-3464

According to our database1, Deepak Kumar Sharma authored at least 88 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AI-enabled trust-based routing protocol for social opportunistic IoT networks.
Trans. Emerg. Telecommun. Technol., April, 2024

Residual networks for text-independent speaker identification: Unleashing the power of residual learning.
J. Inf. Secur. Appl., February, 2024

RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment.
Int. J. Inf. Sec., February, 2024

End-to-end Multi-modal Low-resourced Speech Keywords Recognition Using Sequential Conv2D Nets.
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2024

2023
Modeling Distributed and Configurable Hierarchical Blockchain over SDN and Fog-Based Networks for Large-Scale Internet of Things.
J. Grid Comput., December, 2023

A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes.
Trans. Emerg. Telecommun. Technol., November, 2023

RF-BBFT: a random forest based multimedia big data routing technique for social opportunistic IoT networks.
Multim. Tools Appl., October, 2023

A Framework for Online Hate Speech Detection on Code-mixed Hindi-English Text and Hindi Text in Devanagari.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2023

Fuzzy Controller-empowered Autoencoder Framework for anomaly detection in Cyber Physical Systems.
Comput. Electr. Eng., May, 2023

Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks.
Mob. Networks Appl., April, 2023

Clustering Based Routing Protocol for Wireless Sensor Networks Using the Concept of Zonal Division of Network Field.
J. Signal Process. Syst., March, 2023

AHDNN: Attention-Enabled Hierarchical Deep Neural Network Framework for Enhancing Security of Connected and Autonomous Vehicles.
J. Circuits Syst. Comput., March, 2023

A Novel Lightweight Deep Learning-Based Histopathological Image Classification Model for IoMT.
Neural Process. Lett., February, 2023

Enforcing Intelligent Learning-Based Security in Internet of Everything.
IEEE Internet Things J., February, 2023

Optimized Resource Allocation in IoT Using Fuzzy Logic and Bio-Inspired Algorithms.
Wirel. Pers. Commun., 2023

Intrusion Detection System for IoE-Based Medical Networks.
J. Database Manag., 2023

Role of cybersecurity and Blockchain in battlefield of things.
Internet Technol. Lett., 2023

ACCO: adaptive congestion control protocol for opportunistic networks.
Int. J. Wirel. Mob. Comput., 2023

Blockchain for Patient Data Integrity: Decentralised Storage and Retrieval in Modern Healthcare Systems.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

Misbehavior Detection in Cooperative Intelligent Transportation Systems using Temporal Fusion Transformer.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

Cryptanalysis of an Authentication Scheme for WSN within an IoT Environment.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

2022
Trajectory optimization for the UAV assisted data collection in wireless sensor networks.
Wirel. Networks, 2022

Blockchain Tree Powered Green Communication for Efficient and Sustainable Connected Autonomous Vehicles.
IEEE Trans. Green Commun. Netw., 2022

LSTM-Based Energy-Efficient Wireless Communication With Reconfigurable Intelligent Surfaces.
IEEE Trans. Green Commun. Netw., 2022

Task-specific image summaries using semantic information and self-supervision.
Soft Comput., 2022

Modified minimum spanning tree based vertical fragmentation, allocation and replication approach in distributed multimedia databases.
Multim. Tools Appl., 2022

An approach to adding simple interface as security gateway architecture for IoT device.
Multim. Tools Appl., 2022

A Local Betweenness Centrality Based Forwarding Technique for Social Opportunistic IoT Networks.
Mob. Networks Appl., 2022

Distributed probability density based multi-objective routing for Opp-IoT networks enabled by machine learning.
J. Intell. Fuzzy Syst., 2022

An Opportunistic Approach for Cloud Service-Based IoT Routing Framework Administering Data, Transaction, and Identity Security.
IEEE Internet Things J., 2022

Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review.
Frontiers Big Data, 2022

Early prediction and monitoring of sepsis using sequential long short term memory model.
Expert Syst. J. Knowl. Eng., 2022

LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks.
Expert Syst. J. Knowl. Eng., 2022

Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems.
Comput. Commun., 2022

Evaluation of Assocation Rule-based Routing Protocol for OppNet.
Mechatron. Syst. Control., 2022

Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model.
Open Comput. Sci., 2022

Explainable Artificial Intelligence for Cybersecurity.
Comput. Electr. Eng., 2022

A tree classifier based network intrusion detection model for Internet of Medical Things.
Comput. Electr. Eng., 2022

Data driven predictive maintenance applications for industrial systems with temporal convolutional networks.
Comput. Ind. Eng., 2022

2021
HiLSeR: Hierarchical learning-based sectionalised routing paradigm for pervasive communication and Resource efficiency in opportunistic IoT network.
Sustain. Comput. Informatics Syst., 2021

DDoS prevention architecture using anomaly detection in fog-empowered networks.
J. Ambient Intell. Smart Environ., 2021

Computational Intelligence and IoT-Enabled COVID-19 Response: Technology Landscape.
IEEE Internet Things Mag., 2021

Deep learning assisted COVID-19 detection using full CT-scans.
Internet Things, 2021

A multidimensional-multilayered anomaly detection in RFID-sensor integrated internet of things network.
Int. J. Cloud Comput., 2021

Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions.
Trans. Emerg. Telecommun. Technol., 2021

GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks.
Comput. Commun., 2021

Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks.
Ad Hoc Networks, 2021

2020
RLProph: a dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks.
Wirel. Networks, 2020

Lightweight Proof of Game (LPoG): A Proof of Work (PoW)'s Extended Lightweight Consensus Algorithm for Wearable Kidneys.
Sensors, 2020

Neural network-based routing protocol for opportunistic networks with intelligent water drop optimization.
Int. J. Commun. Syst., 2020

Latency-aware reinforced routing for opportunistic networks.
IET Commun., 2020

Security vs. Flexibility: Striking a Balance in the Pandemic Era.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Establishing Reliability for Efficient Routing in Opportunistic Networks.
Scalable Comput. Pract. Exp., 2019

Bonding Based Technique for message forwarding in Social Opportunistic Network.
Scalable Comput. Pract. Exp., 2019

Supernode routing: a grid-based message passing scheme for sparse opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2019

kROp: k-Means clustering based routing protocol for opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2019

GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks.
Int. J. Adv. Intell. Paradigms, 2019

GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks.
Comput. Commun., 2019

A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

FLBCR: Fuzzy Logic Based Clustering Routing Protocol.
Proceedings of the 10th International Conference on Computing, 2019

2018
Poisson's probability-based Q-Routing techniques for message forwarding in opportunistic networks.
Int. J. Commun. Syst., 2018

A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks.
Int. J. Commun. Syst., 2018

An Energy Efficient Routing Protocol for Wireless Internet-of-Things Sensor Networks.
CoRR, 2018

Direct Perceptive Routing Protocol for Opportunistic Networks.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

2017
An energy-efficient history-based routing scheme for opportunistic networks.
Int. J. Commun. Syst., 2017

GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017

Evaluation of parameters and techniques for genetic algorithm based channel allocation in Cognitive Radio Networks.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

KNNR: K-nearest neighbour classification based routing protocol for opportunistic networks.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

A game theory based secure model against Black hole attacks in Opportunistic Networks.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

SEIR: A Stackelberg game based approach for energy-aware and incentivized routing in selfish Opportunistic Networks.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
A priority based message forwarding scheme for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2016

EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks.
J. Supercomput., 2015

2014
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks.
J. Supercomput., 2014

Business Rules for Business Governance.
Proceedings of the ICEIS 2014, 2014

Automatic construction of process template from business rule.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks.
J. Internet Serv. Inf. Secur., 2013

Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

A Framework for Business Rules.
Proceedings of the Advances in Conceptual Modeling, 2013

HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A Neuro-Fuzzy Technique for Implementing the Half-Adder Circuit Using the CANFIS Model
CoRR, 2012

DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model
CoRR, 2012

A Metric for the Activeness of a Class
CoRR, 2012

Application of Fuzzy Mathematics to Speech-to-Text Conversion by Elimination of Paralinguistic Content
CoRR, 2012

A Metric for the Activeness of a Distributed Object Oriented Component Library
CoRR, 2012

Performance analysis of various routing protocols (proactive and reactive) for random mobility models of Adhoc networks.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
Performance evaluation of various routing protocols in Opportunistic Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011


  Loading...