M. Poongodi

Orcid: 0000-0001-6801-6138

Affiliations:
  • Hamad Bin Khalifa University, Doha, Qatar
  • Vellore Institute of Technology, Chennai, India (former)
  • Anna University, Chennai, India (PhD)


According to our database1, M. Poongodi authored at least 35 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing.
J. Cloud Comput., December, 2023

Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Intrusion detection system using distributed multilevel discriminator in GAN for IoT system.
Trans. Emerg. Telecommun. Technol., November, 2023

Image and audio caps: automated captioning of background sounds and images using deep learning.
Multim. Syst., October, 2023

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning.
Sensors, September, 2023

An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering.
Sensors, September, 2023

Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Trans. Emerg. Telecommun. Technol., June, 2023

SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.
Expert Syst. J. Knowl. Eng., June, 2023

2022
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform.
ACM Trans. Internet Techn., 2022

A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method.
Sensors, 2022

Correction to: Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods.
Pers. Ubiquitous Comput., 2022

Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML.
Int. J. Inf. Technol. Web Eng., 2022

Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology.
Int. J. Inf. Technol. Web Eng., 2022

Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network.
Int. J. Inf. Technol. Web Eng., 2022

A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2022

5G based Blockchain network for authentic and ethical keyword search engine.
IET Commun., 2022

Peer-to-peer trust management in intelligent transportation system: An Aumann's agreement theorem based approach.
ICT Express, 2022

A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework.
Comput. Commun., 2022

Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205.
Comput. Electr. Eng., 2022

A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography.
Comput. Electr. Eng., 2022

2021
Smart healthcare in smart cities: wireless patient monitoring system using IoT.
J. Supercomput., 2021

Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT.
Sensors, 2021

Global cryptocurrency trend prediction using social media.
Inf. Process. Manag., 2021

The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic.
IEEE Access, 2021

Network Augmentation by Dynamically Splitting the Switching Function in SDN.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Prediction of the price of Ethereum blockchain cryptocurrency in an industrial finance system.
Comput. Electr. Eng., 2020

Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities.
Proceedings of the 3rd IEEE 5G World Forum, 2020

2019
Recommendation model based on trust relations & user credibility.
J. Intell. Fuzzy Syst., 2019

Chat-bot-based natural language interface for blogs and information networks.
Int. J. Web Based Communities, 2019

Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics.
IEEE Access, 2019

DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET.
IEEE Access, 2019

2015
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET.
Clust. Comput., 2015

2014
A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks.
Int. J. Inf. Secur. Priv., 2014


  Loading...