L. Jegatha Deborah
Orcid: 0000-0001-8069-3801
  According to our database1,
  L. Jegatha Deborah
  authored at least 39 papers
  between 2011 and 2024.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2024
A Two-Stage Differential Privacy Scheme for Federated Learning Based on Edge Intelligence.
    
  
    IEEE J. Biomed. Health Informatics, June, 2024
    
  
  2023
    Pers. Ubiquitous Comput., December, 2023
    
  
Secure session key pairing and a lightweight key authentication scheme for liable drone services.
    
  
    Cyber Secur. Appl., December, 2023
    
  
Optimized traffic flow prediction based on cluster formation and reinforcement learning.
    
  
    Int. J. Commun. Syst., August, 2023
    
  
An efficient key agreement and authentication protocol for secure communication in industrial IoT applications.
    
  
    J. Ambient Intell. Humaniz. Comput., March, 2023
    
  
  2022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
    
  
    IEEE Trans. Netw. Sci. Eng., 2022
    
  
Imaging based cervical cancer diagnostics using small object detection - generative adversarial networks.
    
  
    Multim. Tools Appl., 2022
    
  
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception.
    
  
    Int. J. Softw. Sci. Comput. Intell., 2022
    
  
An Improvement of Yield Production Rate for Crops by Predicting Disease Rate Using Intelligent Decision Systems.
    
  
    Int. J. Softw. Sci. Comput. Intell., 2022
    
  
Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication.
    
  
    Int. J. Cloud Appl. Comput., 2022
    
  
Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning.
    
  
    Comput. J., 2022
    
  
  2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
    
  
    Secur. Commun. Networks, 2021
    
  
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain.
    
  
    J. Syst. Archit., 2021
    
  
    Inf. Syst. Frontiers, 2021
    
  
    IEEE Internet Things J., 2021
    
  
Enhanced Learning Experiences Based on Regulatory Fit Theory Using Affective State Detection.
    
  
    Int. J. Semantic Web Inf. Syst., 2021
    
  
An improved public transportation system for effective usage of vehicles in intelligent transportation system.
    
  
    Int. J. Commun. Syst., 2021
    
  
Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children.
    
  
    Comput. J., 2021
    
  
  2020
    J. Organ. End User Comput., 2020
    
  
  2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
    
  
    Future Gener. Comput. Syst., 2019
    
  
    Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
    
  
  2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
    
  
    Future Gener. Comput. Syst., 2018
    
  
Key management and key distribution for secure group communication in mobile and cloud network.
    
  
    Future Gener. Comput. Syst., 2018
    
  
    Comput. Electr. Eng., 2018
    
  
  2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
    
  
    IEEE Trans. Intell. Transp. Syst., 2017
    
  
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
    
  
    Clust. Comput., 2017
    
  
    Comput. Electr. Eng., 2017
    
  
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
    
  
    Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
    
  
    Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
    
  
  2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
    
  
    IEEE Trans. Intell. Transp. Syst., 2016
    
  
An effective key distribution for secure internet pay-TV using access key hierarchies.
    
  
    Secur. Commun. Networks, 2016
    
  
    Secur. Commun. Networks, 2016
    
  
  2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
    
  
    Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
    
  
  2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
    
  
    Artif. Intell. Rev., 2014
    
  
  2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
    
  
    KSII Trans. Internet Inf. Syst., 2013
    
  
  2012
    Int. J. Intell. Inf. Technol., 2012
    
  
  2011
    Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011