Niyati Baliyan

Orcid: 0000-0002-2019-5381

According to our database1, Niyati Baliyan authored at least 27 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MLChain: a privacy-preserving model learning framework using blockchain.
Int. J. Inf. Sec., February, 2024

2023
Remembering past and predicting future: a hybrid recurrent neural network based recommender system.
J. Ambient Intell. Humaniz. Comput., December, 2023

ShillDetector: a binary grey wolf optimization technique for detection of shilling profiles.
J. Ambient Intell. Humaniz. Comput., February, 2023

Temporal Analysis of Privacy Enhancing Technology Traffic Using Deep Learning.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Hilarious or Hidden? Detecting Sarcasm in Hinglish Tweets using BERT-GRU.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
MalVulDroid: Tracing Vulnerabilities from Malware in Android using Natural Language Processing.
J. Web Eng., 2022

M2VMapper: Malware-to-Vulnerability mapping for Android using text processing.
Expert Syst. Appl., 2022

Efficient and Effective Static Android Malware Detection Using Machine Learning.
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
Grey wolf optimization with fuzzy logic for energy-efficient communication in wireless sensor network-based Internet of Things scenario.
Int. J. Commun. Syst., 2021

Comparative analysis of Android and iOS from security viewpoint.
Comput. Sci. Rev., 2021

Android security assessment: A review, taxonomy and research gap study.
Comput. Secur., 2021

Related Blogs' Summarization With Natural Language Processing.
Comput. J., 2021

2020
Bi-MARS: A Bi-clustering based Memetic Algorithm for Recommender Systems.
Appl. Soft Comput., 2020

Machine Learning Based Android Vulnerability Detection: A Roadmap.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
A Study of Recent Recommender System Techniques.
Int. J. Knowl. Syst. Sci., 2019

A novel parallel classifier scheme for vulnerability detection in Android.
Comput. Electr. Eng., 2019

Memetic Algorithm based Similarity Metric for Recommender System.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

Hadoop based Analysis and Visualization of Diabetes Data through Tableau.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019

2018
Semantic Web-Based Systems - Quality Assessment Models
Springer Briefs in Computer Science, Springer, ISBN: 978-981-10-7699-2, 2018

SWAQ: a Semantic Web Application Quality Evaluation Framework.
J. Exp. Theor. Artif. Intell., 2018

2017
Ontology Cohesion and Coupling Metrics.
Int. J. Semantic Web Inf. Syst., 2017

2016
A Hierarchical Fuzzy System for Quality Assessment of Semantic Web Application as a Service.
ACM SIGSOFT Softw. Eng. Notes, 2016

Towards measurement of structural complexity for ontologies.
Int. J. Web Eng. Technol., 2016

A Behavioral Metrics Suite for Modular Ontologies.
ICTCS, 2016

2014
Analysing cohesion and coupling for modular ontologies.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Towards software engineering paradigm for software as a service.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
A fuzzy model for high-level clones in software.
ACM SIGSOFT Softw. Eng. Notes, 2013


  Loading...