Jay Prakash

Orcid: 0000-0002-6235-9735

According to our database1, Jay Prakash authored at least 48 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET.
Soft Comput., March, 2024

A blockchain enabled reversible data hiding based on image smoothing and interpolation.
Multim. Tools Appl., March, 2024

2023
Question answering over knowledge graphs using BERT based relation mapping.
Expert Syst. J. Knowl. Eng., December, 2023

Multi-modal for Energy Optimization and Intrusion Detection in Wireless Sensor Networks.
Wirel. Pers. Commun., November, 2023

An Effective Biomedical Named Entity Recognition by Handling Imbalanced Data Sets Using Deep Learning and Rule-Based Methods.
SN Comput. Sci., September, 2023

Energy-Efficient Void Size Adaptable Graded Greedy Gradient Approach to Bypass Holes in Wireless Sensor Network.
Wirel. Pers. Commun., August, 2023

Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of "Things" with "UAV" possibilities and tests.
Artif. Intell. Rev., March, 2023

Techniques, Answers, and Real-World UAV Implementations for Precision Farming.
Wirel. Pers. Commun., 2023

Intelligent Fertilizer Recommendations to Improve Crop Yield Using Wireless Sensor Network.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Correction to: Edge Enhancement by Noise Suppression in HSI Color Model of UAV Video with Adaptive Thresholding.
Wirel. Pers. Commun., 2022

Edge Enhancement by Noise Suppression in HSI Color Model of UAV Video with Adaptive Thresholding.
Wirel. Pers. Commun., 2022

CDF based dual transform approach for UAV video visual enhancement in RGB model.
Int. J. Syst. Assur. Eng. Manag., 2022

A seamless second-factor verification as a mobility-service for future commute stations.
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022

Player Recommendation System for Fantasy Premier League using Machine Learning.
Proceedings of the 19th International Joint Conference on Computer Science and Software Engineering, 2022

Shakespeer: Verifying the Co-presence of Smart Devices and Users via Vibration.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Rating Ease of Readability using Transformers.
Proceedings of the 14th International Conference on Computer and Automation Engineering, 2022

An Effective Implementation of Detection and Retrieval Property of Episodic Memory.
Proceedings of the 2022 The 6th International Conference on Advances in Artificial Intelligence, 2022

ScSer: Supervised Contrastive Learning for Speech Emotion Recognition using Transformers.
Proceedings of the 15th International Conference on Human System Interaction, 2022

2021
Future FANET with application and enabling techniques: Anatomization and sustainability issues.
Comput. Sci. Rev., 2021

AgriAuth: sensor collaboration and corroboration for data confidence in smart farms.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Emotion Detection Using Bi-directional LSTM with an Effective Text Pre-processing Method.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Countering Concurrent Login Attacks in "Just Tap" Push-based Authentication: A Redesign and Usability Evaluations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Multi-objective materialized view selection using NSGA-II.
Int. J. Syst. Assur. Eng. Manag., 2020

Multi-objective materialized view selection using MOGA.
Int. J. Syst. Assur. Eng. Manag., 2020

Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults.
CoRR, 2020

On the Insecurities of Mobile D2D File Sharing Applications.
CoRR, 2020

Process skew: fingerprinting the process for anomaly detection in industrial control systems.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

EarSense: earphones as a teeth activity sensor.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Role of Antenna in Flying Adhoc Networks Communication: Provocation and Open Issues.
Proceedings of the Intelligent Systems Design and Applications, 2020

2019
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology.
IEEE Trans. Inf. Forensics Secur., 2019

Gravitational search algorithm and K-means for simultaneous feature selection and data clustering: a multi-objective approach.
Soft Comput., 2019

Integrating fitness predator optimizer with multi-objective PSO for dynamic partitional clustering.
Prog. Artif. Intell., 2019

A Multi-Objective Approach for Materialized View Selection.
Int. J. Oper. Res. Inf. Syst., 2019

Multi-Objective Materialized View Selection Using Improved Strength Pareto Evolutionary Algorithm.
Int. J. Artif. Intell. Mach. Learn., 2019

RF based entropy sources for jamming resilience: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

STEAR: Robust Step Counting from Earables.
Proceedings of the 1st International Workshop on Earable Computing, 2019

2018
Hybrid Gbest-guided Artificial Bee Colony for hard partitional clustering.
Int. J. Syst. Assur. Eng. Manag., 2018

Self-Controlled Jamming Resilient Design Using Physical Layer Secret Keys.
CoRR, 2018

2017
Distributed Query Plan Generation using Bacterial Foraging Optimization.
Int. J. Knowl. Syst. Sci., 2017

WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
NSABC: Non-dominated sorting based multi-objective artificial bee colony algorithm and its application in data clustering.
Neurocomputing, 2016

Distributed Query Plan Generation Using Firefly Algorithm.
Int. J. Organ. Collect. Intell., 2016

2015
An effective multiobjective approach for hard partitional clustering.
Memetic Comput., 2015

2014
Evolutionary and Swarm Intelligence Methods for Partitional Hard Clustering.
Proceedings of the 2014 International Conference on Information Technology, 2014

2012
An Effective Hybrid Method Based on DE, GA, and K-means for Data Clustering.
Proceedings of the Second International Conference on Soft Computing for Problem Solving, 2012

Partitional Algorithms for Hard Clustering Using Evolutionary and Swarm Intelligence Methods: A Survey.
Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012), 2012


  Loading...