Narendra S. Chaudhari

Orcid: 0000-0003-3018-400X

Affiliations:
  • Visvesvaraya National Institute of Technology, Nagpur, India


According to our database1, Narendra S. Chaudhari authored at least 110 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Novel Approach to Hide Sensitive Association Rules by Introducing Transaction Affinity.
Comput. Informatics, 2023

2022
SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network.
Wirel. Pers. Commun., 2022

Fingerprint classification system using CNN.
Multim. Tools Appl., 2022

SPSR-VCP: secure and privacy preserving SignRecryption in vehicular cyber physical systems.
J. Ambient Intell. Humaniz. Comput., 2022

A Distinguished Method for Network Intrusion Detection using Random Initialized Viterbi Algorithm in Hidden Markov Model.
Proceedings of the OITS International Conference on Information Technology, 2022

2021
ISAG: IoT-enabled and Secrecy Aware Group-based handover scheme for e-health services in M2M communication network.
Future Gener. Comput. Syst., 2021

Predictive Analytics for Recognizing Human Activities Using Residual Network and Fine-Tuning.
Proceedings of the Big Data Analytics - 9th International Conference, 2021

2020
A Tree Based Novel Approach for Graph Coloring Problem Using Maximal Independent Set.
Wirel. Pers. Commun., 2020

BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2020

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.
IEEE Trans. Dependable Secur. Comput., 2020

EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups.
Peer-to-Peer Netw. Appl., 2020

2019
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks.
Peer-to-Peer Netw. Appl., 2019

PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network.
Peer-to-Peer Netw. Appl., 2019

Pragmatic Sensory Data Semantics With Service-Oriented Computing.
J. Organ. End User Comput., 2019

Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check.
J. Ambient Intell. Humaniz. Comput., 2019

SRGH: A secure and robust group-based handover AKA protocol for MTC in LTE-A networks.
Int. J. Commun. Syst., 2019

An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher.
Int. J. Appl. Metaheuristic Comput., 2019

Anonymous roaming authentication protocol for wireless network with backward unlinkability and natural revocation.
Ann. des Télécommunications, 2019

Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit.
Ad Hoc Networks, 2019

2018
A Proxy Signature Based Efficient and Robust Handover AKA Protocol for LTE/LTE-A Networks.
Wirel. Pers. Commun., 2018

DGBES: Dynamic Group Based Efficient and Secure Authentication and Key Agreement Protocol for MTC in LTE/LTE-A Networks.
Wirel. Pers. Commun., 2018

A novel cuckoo search technique for solving discrete optimization problems.
Int. J. Syst. Assur. Eng. Manag., 2018

A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem.
Int. J. Syst. Assur. Eng. Manag., 2018

A study on vulnerability and presentation attack detection in palmprint verification system.
Pattern Anal. Appl., 2018

Uncertainty in sensor data acquisition for SOA system.
Neural Comput. Appl., 2018

Analyzing the role of interfaces in enterprise service bus: A middleware epitome for service-oriented systems.
Comput. Stand. Interfaces, 2018

SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network.
IEEE Access, 2018

SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups.
IEEE Access, 2018

SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Re-encrypting secure and efficient routing in VANET groups using sharable clouds.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

An efficient handover AKA protocol for wireless network using Chameleon Hash function.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

2017
The Performance Metric for Enterprise Service Bus (ESB) in SOA system: Theoretical underpinnings and empirical illustrations for information processing.
Inf. Syst., 2017

Online URL Classification for Large-Scale Streaming Environments.
IEEE Intell. Syst., 2017

An Improved Genetic Algorithm for Developing Deterministic OTP Key Generator.
Complex., 2017

Secure algorithms for SAKA protocol in the GSM network.
Proceedings of the 10th IFIP Wireless and Mobile Networking Conference, 2017

Histogram of oriented gradients based presentation attack detection in dorsal hand-vein biometric system.
Proceedings of the Fifteenth IAPR International Conference on Machine Vision Applications, 2017

2016
Authentication Protocol for an IoT-Enabled LTE Network.
ACM Trans. Internet Techn., 2016

2015
ES-AKA: An Efficient and Secure Authentication and Key Agreement Protocol for UMTS Networks.
Wirel. Pers. Commun., 2015

On the Performance Improvement of Devanagari Handwritten Character Recognition.
Appl. Comput. Intell. Soft Comput., 2015

Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks.
Proceedings of the Network and System Security - 9th International Conference, 2015

A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Analysis of the improved knapsack cipher.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
Secure-AKA: An Efficient AKA Protocol for UMTS Networks.
Wirel. Pers. Commun., 2014

EasySMS: A Protocol for End-to-End Secure Transmission of SMS.
IEEE Trans. Inf. Forensics Secur., 2014

SecureSMS: A secure SMS protocol for VAS and other applications.
J. Syst. Softw., 2014

Design of efficient packing system using genetic algorithm based on hyper heuristic approach.
Adv. Eng. Softw., 2014

Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Parallelization of RNA secondary structure prediction algorithm on multicore.
Proceedings of the 7th ACM India Computing Conference, 2014

2013
An enhanced NPA protocol for secure communications in GSM network.
Int. J. Secur. Networks, 2013

Analytical Observations on Knapsack Cipher 0/255.
CoRR, 2013

Selection of Efficient Crossover Operator in Metaheuristic Approach for 2D Strip Packing.
Proceedings of the IEEE International Conference on Systems, 2013

An Efficient Batch Verification Protocol for Value Added Services.
Proceedings of the IEEE International Conference on Systems, 2013

Hybrid Approach for 2D Strip Packing Problem Using Genetic Algorithm.
Proceedings of the Advances in Computational Intelligence, 2013

Facial Expression Recognition Using Local Binary Patterns with Different Distance Measures.
Proceedings of the Intelligent Computing, 2013

2012
Relevance vector machine based infinite decision agent ensemble learning for credit risk analysis.
Expert Syst. Appl., 2012

Enhanced traffic aware LSP selection method in MPLS networks.
Proceedings of the Ninth International Conference on Wireless and Optical Communications Networks, 2012

A performance analysis of network under SYN-flooding attack.
Proceedings of the Ninth International Conference on Wireless and Optical Communications Networks, 2012

Information extraction from semi-structured and un-structured documents using probabilistic context free grammar inference.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

Incremental Discovery of Sequential Pattern from Semi-structured Document Using Grammatical Inference.
Proceedings of the Distributed Computing and Internet Technology, 2012

An analytical approach for column generation for one-dimensional cutting stock problem.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A secure approach for SMS in GSM network.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
Two Approaches for Hamiltonian Circuit Problem using Satisfiability.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

An Efficient method for the Devnagri handwritten vowel recognition.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

An Intelligent Network for handwritten Devnagri Digit recognition using Structural features.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

Handling the Problem of Code Bloating to Enhance the Performance of Classifier Designed Using Genetic Programming.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

Formulation of 3-Clustering as a 3-SAT Problem.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

3-CNF-Satisfiability in Polynomial Time.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

Infinite Decision Agent Ensemble Learning System for Credit Risk Analysis.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

2010
Selecting useful features for personal credit risk analysis.
Int. J. Bus. Inf. Syst., 2010

A novel SVM based approach for noisy data elemination.
Proceedings of the 11th International Conference on Control, 2010

Binary Neural Network Classifier and it's bound for the number of hidden layer neurons.
Proceedings of the 11th International Conference on Control, 2010

Construction of classifier with feature selection based on genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Segmented-Memory Recurrent Neural Networks.
IEEE Trans. Neural Networks, 2009

Language Structure Using Fuzzy Similarity.
IEEE Trans. Fuzzy Syst., 2009

Study of Topological Property of Interconnection Networks and its Mapping to Sparse Matrix Model.
Int. J. Comput. Sci. Appl., 2009

Constructive Semi-Supervised Classification Algorithm and Its Implement in Data Mining.
Proceedings of the Pattern Recognition and Machine Intelligence, 2009

Improved Genetic Programming Based Multiclass Classifier Using a New Crossover Operator.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

An Improved Model for Learning Context-Free Grammars Based on Tree Automata.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

2008
Feature Extraction Using Fuzzy Rule Based System.
Int. J. Comput. Sci. Appl., 2008

Hierarchical Pathfinding and AI-Based Learning Approach in Strategy Game Design.
Int. J. Comput. Games Technol., 2008

Strategic Team AI Path Plans: Probabilistic Pathfinding.
Int. J. Comput. Games Technol., 2008

Efficient Incremental Model for Learning Context-Free Grammars from Positive Structural Examples.
Proceedings of the Artificial Intelligence: Theories, 2008

On Learning Context-Free Grammars Using Skeletons.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Performance evaluation of SVM based semi-supervised classification algorithm.
Proceedings of the 10th International Conference on Control, 2008

A multiclass classifier using Genetic Programming.
Proceedings of the 10th International Conference on Control, 2008

2007
Cascaded Bidirectional Recurrent Neural Networks for Protein Secondary Structure Prediction.
IEEE ACM Trans. Comput. Biol. Bioinform., 2007

An Effective Model for Context-Free Grammar Inference.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

On Construction of Multi-class Binary Neural Networks.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

2006
Bidirectional segmented-memory recurrent neural network for protein secondary structure prediction.
Soft Comput., 2006

A fast modified constructive-covering algorithm for binary multi-layer neural networks.
Neurocomputing, 2006

Hierarchical Reinforcement Learning Model for Military Simulations.
Proceedings of the International Joint Conference on Neural Networks, 2006

Hard-limiter Neuron based Turing Machine Simulation with Constant Time Read/Write Operation.
Proceedings of the International Joint Conference on Neural Networks, 2006

Computational Capabilities of Soft-Computing Frameworks: An Overview.
Proceedings of the Ninth International Conference on Control, 2006

Alignment Based Similarity Measure for Grammar Learning.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

Statistical Analysis of Long-Range Interactions in Proteins.
Proceedings of the 2006 International Conference on Bioinformatics & Computational Biology, 2006

2005
Neural-Network-Based Smart Sensor Framework Operating in a Harsh Environment.
EURASIP J. Adv. Signal Process., 2005

Profile Based Alignment Learning System For Language Inference.
Proceedings of the ISCA 14th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2005

Design of a Virtual Shopping Mall: Some Observations.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2004
An approach for construction of Boolean neural networks based on geometrical expansion.
Neurocomputing, 2004

Capturing Long-Term Dependencies for Protein Secondary Structure Prediction.
Proceedings of the Advances in Neural Networks, 2004

Learning Long-Term Dependencies in Segmented Memory Recurrent Neural Networks.
Proceedings of the Advances in Neural Networks, 2004

Improvement of Bidirectional Recurrent Neural Network for Learning Long-Term Dependencies.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Rule Extraction Framework Using Rough Sets and Neural Networks.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

Recurrent Neural Networks for Learning Mixed k<sup>th</sup>-Order Markov Chains.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

A novel digital image watermarking scheme using blind source separation.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Binary Neural Network Training Algorithms Based on Linear Sequential Learning.
Int. J. Neural Syst., 2003

Classification Automaton and Its Construction Using Learning.
Proceedings of the Advances in Artificial Intelligence, 2003

1996
Knowledge representation using fuzzy deduction graphs.
IEEE Trans. Syst. Man Cybern. Part B, 1996

Formulation and Analysis of Parallel Context-Free Recognition and Parsing on a PRAM Model.
Parallel Comput., 1996

1994
Efficient Parallel Recognition of Context-Free Languages.
Parallel Comput., 1994


  Loading...