Inshil Doh

Orcid: 0000-0003-2814-2070

According to our database1, Inshil Doh authored at least 57 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy Enhanced Federated Learning Utilizing Differential Privacy and Interplanetary File System.
Proceedings of the International Conference on Information Networking, 2023

2022
Cell Based Raft Algorithm for Optimized Consensus Process on Blockchain in Smart Data Market.
IEEE Access, 2022

Hierarchical Blockchain-Based Group and Group Key Management Scheme Exploiting Unmanned Aerial Vehicles for Urban Computing.
IEEE Access, 2022

Cloud Security Issues and Log-based Proactive Strategy.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
Selective blockchain system for secure and efficient D2D communication.
J. Netw. Comput. Appl., 2021

Efficient and Secure Blockchain System for Digital Content Trading.
IEEE Access, 2021

Improved Raft Algorithm exploiting Federated Learning for Private Blockchain performance enhancement.
Proceedings of the International Conference on Information Networking, 2021

2020
AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET.
J. Commun. Networks, 2020

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network.
IEEE Access, 2020

Design of Blockchain System for Protection of Personal Information in Digital Content Trading Environment.
Proceedings of the 2020 International Conference on Information Networking, 2020

Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security.
Proceedings of the 22nd International Conference on Advanced Communication Technology, 2020

2019
On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System.
IEEE Access, 2019

Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System.
Proceedings of the 33rd International Conference on Information Networking, 2019

SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word.
Comput. Sci. Inf. Syst., 2018

Dynamic Group Key Management for Efficient Fog Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Authorization based on mobile whitelist in devices for device-to-device communications.
Proceedings of the 2018 International Conference on Information Networking, 2018

RMBC: Randomized mesh blockchain using DBFT consensus algorithm.
Proceedings of the 2018 International Conference on Information Networking, 2018

Secure medical image-sharing mechanism based on visual cryptography in EHR system.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Evolving neural network intrusion detection system for MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

Customized embedded system design for lower limb rehabilitation patients.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2017
Secure and structured IoT smart grid system management.
Int. J. Web Grid Serv., 2017

Automated parking lot management system using embedded robot type smart car based on wireless sensors.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Lightweight Authentication for Distributed Mobile P2P Communications.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Enhanced password processing scheme based on visual cryptography and OCR.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system.
Soft Comput., 2016

Authentication for Mobile Open IPTV Service Security.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Securing information flow in content delivery networks with visual and quantum cryptography.
Proceedings of the 2016 International Conference on Information Networking, 2016

An anonymous IP-based privacy protection routing mechanism for CDNi.
Proceedings of the 2016 International Conference on Information Networking, 2016

2015
Radio Resource Management Scheme for Relieving Interference to MUEs in Relay-Based Cellular Networks.
IEEE Trans. Veh. Technol., 2015

Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security.
Intell. Autom. Soft Comput., 2015

Secure Authentication for Structured Smart Grid System.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An efficient defense mechanism for spoofed IP attack in SDN based CDNi.
Proceedings of the 2015 International Conference on Information Networking, 2015

Key management mechanism in ALTO/SDN based CDNi architecture.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Hierarchical Aggregation of Uncertain Sensor Data for M2M Wireless Sensor Network Using Reinforcement Learning.
Int. J. Distributed Sens. Networks, 2014

Pairwise and group key setup mechanism for secure machine-to-machine communication.
Comput. Sci. Inf. Syst., 2014

Multi-defense Mechanism against DDoS in SDN Based CDNi.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Service Security for Smart Grid System.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
Code updates based on minimal backbone and group key management for secure sensor networks.
Math. Comput. Model., 2013

Adaptive time division duplexing configuration mode selection mechanism for accommodating asymmetric traffic in time division long term evolution-advanced systems.
Trans. Emerg. Telecommun. Technol., 2013

Key management approach for secure mobile open IPTV service.
Comput. Sci. Inf. Syst., 2013

Secure Aggregation and Attack Detection for Smart Grid System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
An Improved Security Approach Based on Kerberos for M2M Open IPTV System.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Group Key Management for Secure Mobile IPTV Service.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Distributed authentication mechanism for secure channel establishment in ubiquitous medical sensor networks.
Mob. Inf. Syst., 2011

2009
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network.
Int. J. Comput. Sci. Appl., 2009

Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
Int. J. Comput. Sci. Appl., 2009

2006
A Key Management Based on Multiple Regression in Hierarchical Sensor Network.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Security Enhancement Mechanism for Ad-Hoc OLSR Protocol.
Proceedings of the Information Networking, 2006

Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network.
Proceedings of the High Performance Computing and Communications, 2006

Key Establishment and Authentication Mechanism for Secure Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Cluster-based Security Mechanism for Sensor Network Communication.
Proceedings of the New Trends in Computer Networks, 2005


  Loading...