L. Jegatha Deborah

Orcid: 0000-0001-8069-3801

According to our database1, L. Jegatha Deborah authored at least 38 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Intelligent personalised learning system based on emotions in e-learning.
Pers. Ubiquitous Comput., December, 2023

Secure session key pairing and a lightweight key authentication scheme for liable drone services.
Cyber Secur. Appl., December, 2023

Optimized traffic flow prediction based on cluster formation and reinforcement learning.
Int. J. Commun. Syst., August, 2023

An efficient key agreement and authentication protocol for secure communication in industrial IoT applications.
J. Ambient Intell. Humaniz. Comput., March, 2023

2022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng., 2022

Imaging based cervical cancer diagnostics using small object detection - generative adversarial networks.
Multim. Tools Appl., 2022

Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception.
Int. J. Softw. Sci. Comput. Intell., 2022

An Improvement of Yield Production Rate for Crops by Predicting Disease Rate Using Intelligent Decision Systems.
Int. J. Softw. Sci. Comput. Intell., 2022

Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication.
Int. J. Cloud Appl. Comput., 2022

Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning.
Comput. J., 2022

2021
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.
Secur. Commun. Networks, 2021

A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain.
J. Syst. Archit., 2021

Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19.
Inf. Syst. Frontiers, 2021

Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT.
IEEE Internet Things J., 2021

Enhanced Learning Experiences Based on Regulatory Fit Theory Using Affective State Detection.
Int. J. Semantic Web Inf. Syst., 2021

An improved public transportation system for effective usage of vehicles in intelligent transportation system.
Int. J. Commun. Syst., 2021

Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children.
Comput. J., 2021

2020
Intelligent e-learning system based on fuzzy logic.
Neural Comput. Appl., 2020

A Novel Trust Model for Secure Group Communication in Distributed Computing.
J. Organ. End User Comput., 2020

2019
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud.
Future Gener. Comput. Syst., 2019

Secure Online Examination System for e-learning.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

2018
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2018

Key management and key distribution for secure group communication in mobile and cloud network.
Future Gener. Comput. Syst., 2018

A new SmartSMS protocol for secure SMS communication in m-health environment.
Comput. Electr. Eng., 2018

2017
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks.
Clust. Comput., 2017

An efficient secure communication for healthcare system using wearable devices.
Comput. Electr. Eng., 2017

Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2016

An effective key distribution for secure internet pay-TV using access key hierarchies.
Secur. Commun. Networks, 2016

An efficient group key agreement protocol for secure P2P communication.
Secur. Commun. Networks, 2016

2015
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Learning styles assessment and theoretical origin in an E-learning scenario: a survey.
Artif. Intell. Rev., 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013

2012
Deontic Logic Based Ontology Alignment Technique for E-Learning.
Int. J. Intell. Inf. Technol., 2012

2011
Visualizing Domain Ontology using Enhanced Anaphora Resolution Algorithm
CoRR, 2011

Ontology Construction Using Computational Linguistics for E-Learning.
Proceedings of the Visual Informatics: Sustaining Research and Innovations, 2011


  Loading...