Deepthi P. Pattathil

Orcid: 0000-0003-2295-7455

Affiliations:
  • National Institute of Technology Calicut, Kerala, India


According to our database1, Deepthi P. Pattathil authored at least 45 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs.
Trans. Emerg. Telecommun. Technol., October, 2023

Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network.
ACM Trans. Priv. Secur., August, 2023

Efficient on-site confirmatory testing for atrial fibrillation with derived 12-lead ECG in a wireless body area network.
J. Ambient Intell. Humaniz. Comput., 2023

User Clustering and Optimum Bandwidth Allocation for Down link Multi-Carrier NOMA.
Proceedings of the IEEE Region 10 Conference, 2023

2022
Index Coded - NOMA in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2022

Embedded Index Coding With Consecutive Side Information in Vehicle to Vehicle Communication.
IEEE Trans. Veh. Technol., 2022

Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network.
IEEE Access, 2022

Optimal Index Code Design for IC-NOMA Transmission in VANETs.
Proceedings of the 96th Vehicular Technology Conference, 2022

Index Coded Modulation in Network to Vehicle (N2V) Communication.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

A Novel Scheme for Adversarial Training to Improve the Robustness of DNN Against White Box Attacks.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

Secure Integer Comparison Protocol For ML-based Disease Diagnosis In MHN With Energy Efficient Edge Computing.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

2021
Index Coded PSK Modulation in Vehicle to Vehicle Communication.
IEEE Trans. Veh. Technol., 2021

Collusion resistant secret sharing scheme for secure data storage and processing over cloud.
J. Inf. Secur. Appl., 2021

Physical Layer Security in Power Domain NOMA through Key Extraction.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
Index Coding in Vehicle to Vehicle Communication.
IEEE Trans. Veh. Technol., 2020

Adaptive Compressive Video Coding for Embedded Camera Sensors: Compressed Domain Motion and Measurements Estimation.
IEEE Trans. Mob. Comput., 2020

Design and Analysis of Compressive Sensing-Based Lightweight Encryption Scheme for Multimedia IoT.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby.
IET Inf. Secur., 2020

2019
An efficient scheme for secure domain medical image fusion over cloud.
Multim. Tools Appl., 2019

A secure regenerating code-based cloud storage with efficient integrity verification.
Int. J. Commun. Syst., 2019

A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks.
Int. J. Commun. Syst., 2019

Plug and play self-configurable IoT gateway node for telemonitoring of ECG.
Comput. Biol. Medicine, 2019

2018
Rate-distortion analysis of structured sensing matrices for block compressive sensing of images.
Signal Process. Image Commun., 2018

Fast BCS-FOCUSS and DBCS-FOCUSS with augmented Lagrangian and minimum residual methods.
J. Vis. Commun. Image Represent., 2018

Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network.
Comput. Networks, 2018

2017
Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size.
Wirel. Pers. Commun., 2017

Block compressive sensing: Individual and joint reconstruction of correlated images.
J. Vis. Commun. Image Represent., 2017

FPGA implementation of highly secure, hardware-efficient QC-LDPC code-based nonlinear cryptosystem for wireless sensor networks.
Int. J. Commun. Syst., 2017

2016
Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks.
J. Inf. Secur. Appl., 2016

Light Weight Key Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Low complexity secure encoding and joint decoding for distributed compressive sensing WSNs.
Proceedings of the 2016 3rd International Conference on Recent Advances in Information Technology (RAIT), 2016

2015
A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code.
Secur. Commun. Networks, 2015

A key management technique based on elliptic curves for static wireless sensor networks.
Secur. Commun. Networks, 2015

Audio security through compressive sampling and cellular automata.
Multim. Tools Appl., 2015

An audio encryption technique through compressive sensing and Arnold transform.
Int. J. Trust. Manag. Comput. Commun., 2015

Optimized hardware design and implementation of EC based key management scheme for WSN.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code.
Proceedings of the Security in Computing and Communications, 2014

PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing.
Proceedings of the Security in Computing and Communications, 2014

Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Compressive Sensing Based Audio Scrambling Using Arnold Transform.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2012
An expeditious chaos based digital image encryption algorithm.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2009
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions.
Comput. Secur., 2009

New stream ciphers based on elliptic curve point multiplication.
Comput. Commun., 2009

Implementation and analysis of stream ciphers based on the elliptic curves.
Comput. Electr. Eng., 2009

Design and analysis of a highly secure stream cipher based on linear feedback shift register.
Comput. Electr. Eng., 2009


  Loading...