Gulshan Kumar

Orcid: 0000-0003-0026-149X

According to our database1, Gulshan Kumar authored at least 86 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GREPHRO: Nature-inspired optimization duo for Internet-of-Things.
Internet Things, April, 2024

PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks.
IEEE Access, 2024

2023
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
Comput. Secur., September, 2023

COUNT: Blockchain framework for resource accountability in e-healthcare.
Comput. Commun., September, 2023

IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms.
Comput. J., January, 2023

Dynamic routing approach for enhancing source location privacy in wireless sensor networks.
Wirel. Networks, 2023

A Blockchain Framework in Post-Quantum Decentralization.
IEEE Trans. Serv. Comput., 2023

Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023

IoT-inspired machine learning-assisted sedentary behavior analysis in smart healthcare industry.
J. Ambient Intell. Humaniz. Comput., 2023

Blockchain-inspired lightweight trust-based system in vehicular networks.
Int. J. Netw. Manag., 2023

Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system.
Int. J. Commun. Syst., 2023

Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023

2022
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic.
Veh. Commun., 2022

DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022

A survey and taxonomy of consensus protocols for blockchains.
J. Syst. Archit., 2022

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022

A survey on security challenges and solutions in the IOTA.
J. Netw. Comput. Appl., 2022

Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things.
IEEE Internet Things J., 2022

Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022

DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022

A deep learning-based intrusion detection system for in-vehicle networks.
Comput. Electr. Eng., 2022

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022

Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

Validation of Dozee, a Ballistocardiography-based Device, for Contactless and Continuous Heart Rate and Respiratory Rate Measurement.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

Classification of Sleep-Wake State in Ballistocardiogram system based on Deep Learning.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

Spatial Relation Graph and Graph Convolutional Network for Object Goal Navigation.
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022

PoSC: Combined Score for Consensus in Intemet-of-Things Applications.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network.
Proceedings of the Algorithms, Computing and Mathematics Conference 2022 (ACM 2022), Hybrid Event, Chennai, India, August 29, 2022

2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges.
Soft Comput., 2021

Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma.
J. Netw. Comput. Appl., 2021

A fuzzy computational approach for selecting interdependent projects using prioritized criteria.
J. Intell. Fuzzy Syst., 2021

Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks.
Int. J. Inf. Comput. Secur., 2021

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021

A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021

Proof of Reference(PoR): A unified informetrics based consensus mechanism.
CoRR, 2021

A weighted unified informetrics based on Scopus and WoS.
CoRR, 2021

Secure Device-to-Device communications for 5G enabled Internet of Things applications.
Comput. Commun., 2021

An intelligent algorithmically generated domain detection system.
Comput. Electr. Eng., 2021

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021

A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021

GCExp: Goal-Conditioned Exploration for Object Goal Navigation.
Proceedings of the 30th IEEE International Conference on Robot & Human Interactive Communication, 2021

Knocking on Tangle's Doors: Security Analysis of IOTA Ports.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Towards An Enhanced Reputation System for IOTA's Coordicide.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020

MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review.
J. Supercomput., 2020

An improved ensemble approach for effective intrusion detection.
J. Supercomput., 2020

A Lattice Signcrypted Secured Localization in Wireless Sensor Networks.
IEEE Syst. J., 2020

SunPy: A Python package for Solar Physics.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
J. Open Source Softw., 2020

Video-assisted smart health monitoring for affliction determination based on fog analytics.
J. Biomed. Informatics, 2020

A Lightweight Signcryption Method for Perception Layer in Internet-of-Things.
J. Inf. Secur. Appl., 2020

A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020

Classification Of Sleep-Wake State In A Ballistocardiogram System Based On Deep Learning.
CoRR, 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0.
IEEE Access, 2020

Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments.
IEEE Access, 2020

2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019

Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks.
Sensors, 2019

Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019

Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications.
IEEE Access, 2019

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019

A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019

2018
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio.
Wirel. Commun. Mob. Comput., 2018

RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018

Cybercrimes: A Proposed Taxonomy and Challenges.
J. Comput. Networks Commun., 2018

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN.
Int. J. Inf. Secur. Priv., 2018

An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018

2017
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks.
Mob. Inf. Syst., 2017

Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2017

An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs.
J. Netw. Comput. Appl., 2017

2015
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence.
Int. J. Cyber Behav. Psychol. Learn., 2015

2012
An information theoretic approach for feature selection.
Secur. Commun. Networks, 2012

The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review.
Appl. Comput. Intell. Soft Comput., 2012

2011
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer
CoRR, 2011

X-ray view on a Class using Conceptual Analysis in Java Environment
CoRR, 2011

An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher.
Proceedings of the Security Technology, 2011

A novel evaluation function for feature selection based upon information theory.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

AI based supervised classifiers: an analysis for intrusion detection.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

2010
The use of artificial intelligence based techniques for intrusion detection: a review.
Artif. Intell. Rev., 2010


  Loading...