Manu Vardhan

Orcid: 0000-0003-2944-7896

According to our database1, Manu Vardhan authored at least 38 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Plutchik Wheel of Emotion and Machine Learning-Based Hybrid Sentiment Analysis for the Hindi Language with Minimum Dependency on High Computation Resources.
SN Comput. Sci., November, 2023

Multicore based least confidence query sampling strategy to speed up active learning approach for named entity recognition.
Computing, May, 2023

2021
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks.
Wirel. Pers. Commun., 2021

Active learning approach using a modified least confidence sampling strategy for named entity recognition.
Prog. Artif. Intell., 2021

De-LADY: Deep learning based Android malware detection using Dynamic features.
J. Internet Serv. Inf. Secur., 2021

Uncertainty query sampling strategies for active learning of named entity recognition task.
Intell. Decis. Technol., 2021

BLADE: Robust malware detection against obfuscation in android.
Digit. Investig., 2021

A survey of android application and malware hardening.
Comput. Sci. Rev., 2021

Blockchain-based e-cheque clearing framework with trust based consensus mechanism.
Clust. Comput., 2021

Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection.
Clust. Comput., 2021

An Assistive Tool For Fileless Malware Detection.
Proceedings of the 2021 World Automation Congress, 2021

Forensic Analysis of Fitness Applications on Android.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

2020
Incorporating evolutionary computation for securing wireless network against cyberthreats.
J. Supercomput., 2020

Gene selection for cancer types classification using novel hybrid metaheuristics approach.
Swarm Evol. Comput., 2020

A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication.
J. Intell. Fuzzy Syst., 2020

Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection.
Evol. Intell., 2020

An effect of chaos grasshopper optimization algorithm for protection of network infrastructure.
Comput. Networks, 2020

Distributed Denial-of-Service Prediction on IoT Framework by Learning Techniques.
Open Comput. Sci., 2020

Signature Based Malicious Behavior Detection in Android.
Proceedings of the Computing Science, Communication and Security, 2020

2019
Blockchain based e-Cheque Clearing Framework.
Scalable Comput. Pract. Exp., 2019

A hybrid framework for optimal feature subset selection.
J. Intell. Fuzzy Syst., 2019

A new hybrid wrapper TLBO and SA with SVM approach for gene expression data.
Inf. Sci., 2019

A New Hybrid Feature Subset Selection Framework Based on Binary Genetic Algorithm and Information Theory.
Int. J. Comput. Intell. Appl., 2019

Distributed Ledger Technology based Property Transaction System with Support for IoT Devices.
Int. J. Cloud Appl. Comput., 2019

2018
Neighbour teaching learning based optimization for global optimization problems.
J. Intell. Fuzzy Syst., 2018

Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server.
J. Intell. Fuzzy Syst., 2018

Privacy Preserving and Efficient Outsourcing Algorithm to Public Cloud: A Case of Statistical Analysis.
Int. J. Inf. Secur. Priv., 2018

2017
Privacy preserving, verifiable and efficient outsourcing algorithm for regression analysis to a malicious cloud.
J. Intell. Fuzzy Syst., 2017

2016
Cost Effective Genetic Algorithm for Workflow Scheduling in Cloud Under Deadline Constraint.
IEEE Access, 2016

2014
A Versatile Approach for the Estimation of Software Development Effort Based on SRS Document.
Int. J. Softw. Eng. Knowl. Eng., 2014

2013
TBFR: a threshold-based file replication approach for increased file availability and its formal verification.
Int. J. Inf. Commun. Technol., 2013

2012
File Replication and Dereplication of Replica's in Distributed Environment.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

Authentication and Authorization Interface Using Security Service Level Agreements for Accessing Cloud Services.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

A demand based fault tolerant file replication model for clouds.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A Transparent Service Replication Mechanism for Clouds.
Proceedings of the Sixth International Conference on Complex, 2012

Load Balancing in Cluster Using BLCR Checkpoint/Restart.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

On the Fly File Dereplication Mechanism.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012


  Loading...