Gautam Srivastava

According to our database1, Gautam Srivastava authored at least 149 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Suspicious activity detection using deep learning in secure assisted living IoT environments.
J. Supercomput., 2021

Fast and Accurate Convolution Neural Network for Detecting Manufacturing Data.
IEEE Trans. Ind. Informatics, 2021

Editorial: Applications of Fuzzy Systems in Data Science and Big Data.
IEEE Trans. Fuzzy Syst., 2021

Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

An Evolutionary Model to Mine High Expected Utility Patterns From Uncertain Databases.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Information Granulation-Based Community Detection for Social Networks.
IEEE Trans. Comput. Soc. Syst., 2021

A Scalable Platform to Collect, Store, Visualize, and Analyze Big Data in Real Time.
IEEE Trans. Comput. Soc. Syst., 2021

DEDC: Sustainable data communication for cognitive radio sensors in the Internet of Things.
Sustain. Comput. Informatics Syst., 2021

Root causing, detecting, and fixing flaky tests: State of the art and future roadmap.
Softw. Pract. Exp., 2021

A graph-based convolutional neural network stock price prediction with leading indicators.
Softw. Pract. Exp., 2021

A load balance multi-scheduling model for OpenCL kernel tasks in an integrated cluster.
Soft Comput., 2021

Mining of High-Utility Patterns in Big IoT-based Databases.
Mob. Networks Appl., 2021

Contour Feature Extraction of Medical Image Based on Multi-Threshold Optimization.
Mob. Networks Appl., 2021

Fuzzy high-utility pattern mining in parallel and distributed Hadoop framework.
Inf. Sci., 2021

FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021

HUNA: A Method of Hierarchical Unsupervised Network Alignment for IoT.
IEEE Internet Things J., 2021

A Response-Aware Traffic Offloading Scheme Using Regression Machine Learning for User-Centric Large-Scale Internet of Things.
IEEE Internet Things J., 2021

Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments.
IEEE Internet Things J., 2021

Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection.
Inf. Fusion, 2021

Guest editorial.
Int. J. Pervasive Comput. Commun., 2021

Hiding sensitive information in eHealth datasets.
Future Gener. Comput. Syst., 2021

Efficient and reliable forensics using intelligent edge computing.
Future Gener. Comput. Syst., 2021

A survey on security and privacy of federated learning.
Future Gener. Comput. Syst., 2021

Genetically Optimized Prediction of Remaining Useful Life.
CoRR, 2021

SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles.
Comput. Networks, 2021

A Machine Learning Model for Data Sanitization.
Comput. Networks, 2021

Efficient and Privacy-Preserving Medical Research Support Platform Against COVID-19: A Blockchain-Based Approach.
IEEE Consumer Electron. Mag., 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

An ensemble model for intrusion detection in the Internet of Softwarized Things.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

A Blockchain-Based Energy Trading Scheme for Electric Vehicles.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
The Future of Blockchain Technology in Healthcare Internet of Things Security.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Immutable and Secure IP Address Protection Using Blockchain.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A Software Defined Network Based Fuzzy Normalized Neural Adaptive Multipath Congestion Control for the Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2020

Data storage security for the Internet of Things.
J. Supercomput., 2020

Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020

Defensive Modeling of Fake News Through Online Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

A Framework for Automatic Categorization of Social Data Into Medical Domains.
IEEE Trans. Comput. Soc. Syst., 2020

Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention.
Sensors, 2020

Realizing Efficient Security and Privacy in IoT Networks.
Sensors, 2020

Using Twitter for diabetes community analysis.
Netw. Model. Anal. Health Informatics Bioinform., 2020

Automatic recognition algorithm of traffic signs based on convolution neural network.
Multim. Tools Appl., 2020

Local Statistics-based Speckle Reducing Bilateral Filter for Medical Ultrasound Images.
Mob. Networks Appl., 2020

Property of Self-Similarity Between Baseband and Modulated Signals.
Mob. Networks Appl., 2020

Cost optimization of secure routing with untrusted devices in software defined networking.
J. Parallel Distributed Comput., 2020

An efficient algorithm for fuzzy frequent itemset mining.
J. Intell. Fuzzy Syst., 2020

Swarm intelligence and ant colony optimization in accounting model choices.
J. Intell. Fuzzy Syst., 2020

Two-stage data encryption using chaotic neural networks.
J. Intell. Fuzzy Syst., 2020

Security and privacy of UAV data using blockchain technology.
J. Inf. Secur. Appl., 2020

An incentive-aware blockchain-based solution for internet of fake media things.
Inf. Process. Manag., 2020

Enterprise Human Resource Quality Management Model based on Grey Relational Analysis.
Int. J. Perform. Eng., 2020

Generalized M<sub>m, r</sub>-Network: A Case for Fixed Message Dimensions.
IEEE Commun. Lett., 2020

Hybrid genetic algorithm and a fuzzy logic classifier for heart disease diagnosis.
Evol. Intell., 2020

Content Delivery Networks: State of the Art, Trends, and Future Roadmap.
ACM Comput. Surv., 2020

An Incentive Based Approach for COVID-19 using Blockchain Technology.
CoRR, 2020

The Homophily Principle in Social Network Analysis.
CoRR, 2020

Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey.
CoRR, 2020

An efficient public key secure scheme for cloud and IoT security.
Comput. Commun., 2020

A bidirectional congestion control transport protocol for the internet of drones.
Comput. Commun., 2020

Green communication in IoT networks using a hybrid optimization algorithm.
Comput. Commun., 2020

N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.
Comput. Commun., 2020

Remaining useful life prediction based on state assessment using edge computing on deep learning.
Comput. Commun., 2020

A game theoretic analysis of resource mining in blockchain.
Clust. Comput., 2020

Deep learning disease prediction model for use with intelligent robots.
Comput. Electr. Eng., 2020

Ensemble sparse representation-based cyber threat hunting for security of smart cities.
Comput. Electr. Eng., 2020

Call for Special Issue Papers: Multimedia Big Data Analytics for Engineering Education.
Big Data, 2020

Hybridization of cognitive computing for food services.
Appl. Soft Comput., 2020

Cryptocurrency malware hunting: A deep Recurrent Neural Network approach.
Appl. Soft Comput., 2020

Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired Boiler.
IEEE Access, 2020

Analysis of Dimensionality Reduction Techniques on Big Data.
IEEE Access, 2020

Wireless Transmitter Identification Based on Device Imperfections.
IEEE Access, 2020

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.
IEEE Access, 2020

Testing the Causal Map Builder on Amazon Alexa.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Budget Feasible Roadside Unit Allocation Mechanism in Vehicular Ad-Hoc Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A Light Blockchain-Powered Privacy-Preserving Organization Scheme for Ride Sharing Services.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Secure Cattle Stock Infrastructure for the Internet of Things using Blockchain.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

A Performance Evaluation of TCP BBRv2 Alpha.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

A Graph Based Approach to Automate Essay Evaluation.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Tracing the Source of Fake News using a Scalable Blockchain Distributed Network.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Blockchain Technology and Neural Networks for the Internet of Medical Things.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Determining Sufficient Volume of Data for Analysis with Statistical Framework.
Proceedings of the Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices, 2020

Efficient Mining of Pareto-Front High Expected Utility Patterns.
Proceedings of the Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices, 2020

A PSO-Based Sanitization Process with Multi-thresholds Model.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Fake Review Classification Using Supervised Machine Learning.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Deep Neural Networks for Detecting Real Emotions Using Biofeedback and Voice.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Efficient Mining of Non-Dominated High Quantity-Utility Patterns.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

Multi-agent Architecture for Internet of Medical Things.
Proceedings of the Artificial Intelligence and Soft Computing, 2020

Making Sense of Blockchain for AI Deepfakes Technology.
Proceedings of the IEEE Globecom Workshops, 2020

An Incentive Based Approach for COVID-19 planning using Blockchain Technology.
Proceedings of the IEEE Globecom Workshops, 2020

An Empirical Evaluation of AI Deep Explainable Tools.
Proceedings of the IEEE Globecom Workshops, 2020

Mining Multiple Fuzzy Frequent Patterns with Compressed List Structures.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Expanding Cybersecurity Knowledge Through an Indigenous Lens: A First Look.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

High-Utility Pattern Mining in Hadoop Environments.
Proceedings of the IEEE International Conference on Big Data, 2020

Fuzzy High-Utility Pattern Mining based on the Hadoop Framework.
Proceedings of the IEEE International Conference on Big Data, 2020

Mining High-Utility Sequential Patterns in Uncertain Databases.
Proceedings of the IEEE International Conference on Big Data, 2020

A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Big Data Application for Security of Renewable Energy Resources.
Proceedings of the Handbook of Big Data Privacy., 2020

Anomaly Detection in Cyber-Physical Systems Using Machine Learning.
Proceedings of the Handbook of Big Data Privacy., 2020

A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection.
Proceedings of the Handbook of Big Data Privacy., 2020

Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach.
Proceedings of the Handbook of Big Data Privacy., 2020

RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features.
Proceedings of the Handbook of Big Data Privacy., 2020

Active Spectral Botnet Detection Based on Eigenvalue Weighting.
Proceedings of the Handbook of Big Data Privacy., 2020

Enhancing Network Security Via Machine Learning: Opportunities and Challenges.
Proceedings of the Handbook of Big Data Privacy., 2020

2019
Generalized Mittag-Leffler Input Stability of the Fractional Differential Equations.
Symmetry, 2019

Sufficiency Criterion for A Subfamily of Meromorphic Multivalent Functions of Reciprocal Order with Respect to Symmetric Points.
Symmetry, 2019

Geometric Properties of Certain Classes of Analytic Functions Associated with a <i>q</i>-Integral Operator.
Symmetry, 2019

A Node Density Control Learning Method for the Internet of Things.
Sensors, 2019

A Decentralized Privacy-Preserving Healthcare Blockchain for IoT.
Sensors, 2019

A Privacy-Enhancing Framework for Internet of Things Services.
IACR Cryptol. ePrint Arch., 2019

A Secure Publish/Subscribe Protocol for Internet of Things.
IACR Cryptol. ePrint Arch., 2019

Optimization of Big Data Scheduling in Social Networks.
Entropy, 2019

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM.
Cryptogr., 2019

Statistical Descriptors-based Automatic Fingerprint Identification: Machine Learning Approaches.
CoRR, 2019

A study of multivalent q-starlike functions connected with circular domain.
CoRR, 2019

A Novel Auto-Focus Method for Image Processing Using Laser Triangulation.
IEEE Access, 2019

Green Internet of Things Application of a Medical Massage Robot With System Interruption.
IEEE Access, 2019

Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques.
IEEE Access, 2019

ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City.
IEEE Access, 2019

Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices.
IEEE Access, 2019

Green Communication Protocol with Geolocation.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Enabling TCP Pacing using Programmable Data Plane Switches.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

MQTTg: An Android Implementation.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Optimized Blockchain Model for Internet of Things based Healthcare Applications.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Where's @Waldo?: Finding Users on Twitter.
Proceedings of the Artificial Intelligence and Soft Computing, 2019

Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Blockchain Education.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Light and Secure Healthcare Blockchain for IoT Medical Devices.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

Vertex-weighted measures for link prediction in hashtag graphs.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Analyzing use of Twitter by diabetes online community.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Anonymization and De-anonymization of Social Network Data.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Bitcoin Mining: A Game Theoretic Analysis.
IACR Cryptol. ePrint Arch., 2018

Differential Cryptanalysis in ARX Ciphers, Applications to LEA.
IACR Cryptol. ePrint Arch., 2018

Green Communication with Geolocation.
CoRR, 2018

Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain.
CoRR, 2018

Differential Cryptanalysis of Round-Reduced LEA.
IEEE Access, 2018

Gauging Ecliptic Sentiment.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

MQTT-G: A Publish/Subscribe Protocol with Geolocation.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

The Addition of Geolocation to Sensor Networks.
Proceedings of the 13th International Conference on Software Technologies, 2018

Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

PHANTOM Protocol as the New Crypto-Democracy.
Proceedings of the Computer Information Systems and Industrial Management, 2018

2014
Anonymization and De-anonymization of Social Network Data.
Encyclopedia of Social Network Analysis and Mining, 2014

Label-bag based Graph Anonymization via Edge Addition.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

2013
Complexity of social network anonymization.
Soc. Netw. Anal. Min., 2013

Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes.
Soc. Netw. Anal. Min., 2013

2011
Social Network Anonymization via Edge Addition.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

Social Network Privacy for Attribute Disclosure Attacks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

k-Anonymization of Social Networks by Vertex Addition.
Proceedings of the ADBIS 2011, 2011


  Loading...