Karan Singh

Orcid: 0000-0002-6992-1655

Affiliations:
  • Jawaharlal Nehru University, New Delhi, India


According to our database1, Karan Singh authored at least 41 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs.
Wirel. Pers. Commun., February, 2024

Iterative enhancement fusion-based cascaded model for detection and localization of multiple disease from CXR-Images.
Expert Syst. Appl., 2024

2023
A new approach to simulate the dynamic behavior of particulate matter using a canny edge detector embedded PIV algorithm.
Vis. Comput., September, 2023

A Novel Approach for Continuous Authentication of Mobile Users Using Reduce Feature Elimination (RFE): A Machine Learning Approach.
Mob. Networks Appl., April, 2023

RTM: Realistic Weight-Based Reliable Trust Model for Large Scale WSNs.
Wirel. Pers. Commun., March, 2023

2022
A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach.
Wirel. Pers. Commun., 2022

Correction to: AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.
J. Supercomput., 2022

AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems.
J. Supercomput., 2022

Certificateless Aggregated Signcryption Scheme (CLASS) for Cloud-Fog Centric Industry 4.0.
IEEE Trans. Ind. Informatics, 2022

Joint beacon frequency and beacon transmission power adaptation for internet of vehicles.
Trans. Emerg. Telecommun. Technol., 2022

2021
A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment.
J. Supercomput., 2021

EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication.
Sustain. Comput. Informatics Syst., 2021

URASP: An ultralightweight RFID authentication scheme using permutation operation.
Peer-to-Peer Netw. Appl., 2021

A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks.
Peer-to-Peer Netw. Appl., 2021

Compressive sensing based routing and data reconstruction scheme for IoT based WSNs.
J. Intell. Fuzzy Syst., 2021

ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs.
Future Gener. Comput. Syst., 2021

ETAS: An Efficient Trust Assessment Scheme for BANs.
IEEE Access, 2021

2020
Cluster Based Localization Scheme with Backup Node in Underwater Wireless Sensor Network.
Wirel. Pers. Commun., 2020

An Efficient Compressive Sensing Routing Scheme for Internet of Things Based Wireless Sensor Networks.
Wirel. Pers. Commun., 2020

Green communication in sensor enabled IoT: integrated physics inspired meta-heuristic optimization based approach.
Wirel. Networks, 2020

Grey Wolf based compressive sensing scheme for data gathering in IoT based heterogeneous WSNs.
Wirel. Networks, 2020

Image correlation method to simulate physical characteristic of particulate matter.
Int. J. Syst. Assur. Eng. Manag., 2020

Recommender Systems Using Collaborative Tagging.
Int. J. Data Warehous. Min., 2020

Energy efficient optimized rate based congestion control routing in wireless sensor network.
J. Ambient Intell. Humaniz. Comput., 2020

Single rate based extended logarithmic multicast congestion control.
J. Ambient Intell. Humaniz. Comput., 2020

2019
Lightweight Security Scheme for Internet of Things.
Wirel. Pers. Commun., 2019

GWRA: grey wolf based reconstruction algorithm for compressive sensing signals.
PeerJ Comput. Sci., 2019

Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications.
J. Netw. Comput. Appl., 2019

Optimising compressive sensing matrix using Chicken Swarm Optimisation algorithm.
IET Wirel. Sens. Syst., 2019

An Intelligent Scheme for Continuous Authentication of Smartphone Using Deep Auto Encoder and Softmax Regression Model Easy for User Brain.
IEEE Access, 2019

Heuristic Search Based Localization in Mobile Computational Grid.
IEEE Access, 2019

Delimitated Anti Jammer Scheme for Internet of Vehicle: Machine Learning Based Security Approach.
IEEE Access, 2019

A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks.
IEEE Access, 2019

2018
Modeling and Analysis of Worm Propagation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

Smart Grid Internet of Things.
Mob. Networks Appl., 2018

Congestion control in wireless sensor networks by hybrid multi-objective optimization algorithm.
Comput. Networks, 2018

2017
Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network.
Wirel. Pers. Commun., 2017

2016
Challenging Issues of Video Surveillance System Using Internet of Things in Cloud Environment.
Proceedings of the Advances in Computing and Data Sciences, 2016

QoS and QoE in Wireless Multicast Communication.
Proceedings of the Advances in Computing and Data Sciences, 2016

2014
Efficient Multicast Congestion Control.
Wirel. Pers. Commun., 2014

2013
Integrated Approach for Multicast Source Authentication and Congestion Control.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013


  Loading...