Neerendra Kumar

Orcid: 0000-0002-6609-8974

According to our database1, Neerendra Kumar authored at least 14 papers between 2016 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
A real-time intelligent intrusion detection framework for robotic system cybersecurity.
Peer Peer Netw. Appl., February, 2026

QFTN : A Quantum-Inspired Federated Trust Negotiation Framework for Secure Data Exchange in IoRT.
Secur. Priv., 2026

2025
LSFRS: a lightweight framework for efficient and secure communication in IoT-based robotic surveillance.
Clust. Comput., October, 2025

A systematic review on cybersecurity of robotic systems: vulnerabilities trends, threats, attacks, challenges, and proposed framework.
Int. J. Inf. Sec., June, 2025

Optimized Intrusion Detection Approach for Cyber-Physical System Using Meta-Learning With Stacked Generalization: An Ensemble Learning Inspired Approach.
Secur. Priv., 2025

2024
Blockchain-Empowered Secure Data Communication for UAV.
SN Comput. Sci., December, 2024

Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps.
J. King Saud Univ. Comput. Inf. Sci., 2024

2023
Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review.
Int. J. Artif. Intell. Tools, March, 2023

Image Geo-Site Estimation Using Convolutional Auto-Encoder and Multi-Label Support Vector Machine.
Inf., January, 2023

2022
Approaches and Challenges in Internet of Robotic Things.
Future Internet, 2022

Data Exchange Techniques for Internet of Robotic Things: Recent Developments.
IEEE Access, 2022

2020
Robot Navigation in Unknown and Dynamic Environment
PhD thesis, 2020

2018
Laser Scan Matching in Robot Navigation.
Proceedings of the 12th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2018

2016
Robot obstacle avoidance using bumper event.
Proceedings of the 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2016


  Loading...