G. Sudha Sadasivam

Orcid: 0000-0001-6845-1869

According to our database1, G. Sudha Sadasivam authored at least 34 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Semantic integration of heterogeneous healthcare data based on hybrid root linked health record ontology.
Earth Sci. Informatics, September, 2023

Privacy-aware network embedding-based ensemble for social recommendation.
J. Supercomput., May, 2023

Multimodal prediction of breast cancer using radiogenomics and clinical trials with decision fusion.
J. Intell. Fuzzy Syst., 2023

2022
Semantic Integration of Heterogeneous Data Sources Using Ontology-Based Domain Knowledge Modeling for Early Detection of COVID-19.
SN Comput. Sci., 2022

Multimodal screening for dyslexia using anatomical and functional MRI data.
J. Comput. Methods Sci. Eng., 2022

Requirements analysis of security and privacy of mobile payments - Indian context.
Int. J. Mob. Commun., 2022

2021
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead.
J. Cyber Secur. Mobil., 2021

Budget optimized dynamic virtual machine provisioning in hybrid cloud using fuzzy analytic hierarchy process.
Expert Syst. Appl., 2021

Privacy preserving hybrid recommender system based on deep learning.
Turkish J. Electr. Eng. Comput. Sci., 2021

Utility-Based Differentially Private Recommendation System.
Big Data, 2021

Event Prediction for Network Edge Devices using Log Analysis.
Proceedings of the 5th International Conference on Computer, 2021

SafeXAI: Explainable AI to Detect Adversarial Attacks in Electronic Medical Records.
Proceedings of the Intelligent Data Engineering and Analytics, 2021

2019
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties.
Mob. Networks Appl., 2019

Privacy of Big Data: A Review.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
An Approach for End-to-End (E2E) Security of 5G Applications.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
Personalized News Article Recommendation with Novelty Using Collaborative Filtering Based Rough Set Theory.
Mob. Networks Appl., 2017

Privacy Preserving Fuzzy Association Rule Mining in Data Clusters Using Particle Swarm Optimization.
Int. J. Intell. Inf. Technol., 2017

A novel feature selection based on apriori property and correlation analysis for protein sequence classification using MapReduce.
Int. J. Data Min. Bioinform., 2017

2016
Corporate governance fraud detection from annual reports using big data analytics.
Int. J. Big Data Intell., 2016

2014
Enhanced AOMDV for energy conservation in hybrid ad hoc networks.
Int. J. Inf. Commun. Technol., 2014

Annotation-based document classification using shuffled frog leaping algorithm.
Int. J. Comput. Sci. Eng., 2014

2013
Hypergraph-based Wikipedia search with semantics.
Int. J. Web Sci., 2013

2012
A Novel Triangle Centroid Authentication Protocol for Cloud Environment.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Dynamic Ontology Construction for E-Trading.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2010
A novel approach to Multiple Sequence Alignment using hadoop data grids.
Int. J. Bioinform. Res. Appl., 2010

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment
CoRR, 2010

A novel parallel hybrid PSO-GA using MapReduce to schedule jobs in Hadoop data grids.
Proceedings of the Second World Congress on Nature & Biologically Inspired Computing, 2010

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security.
Proceedings of the Information Processing and Management, 2010

2009
An Efficient Approach to Task Scheduling in Computational Grids.
Int. J. Comput. Sci. Appl., 2009

2007
Stub Code Optimization in CORBA-Based Distributed Embedded Applications.
Int. J. Comput. Their Appl., 2007

2006
A Novel Real Time Scheduling Frame-work for CORBA-Based Applications.
J. Object Technol., 2006

A Grid-Based Approach to Paraloading using Mirrored CORBA Servers.
Trans. SDPS, 2006

2003
Design and Implementation of a Static Bridge between com and CORBA Distributed Objects.
Trans. SDPS, 2003

2002
Design and Implementation of a Componentised IDL Compiler.
Trans. SDPS, 2002


  Loading...