Prabhat Kumar

Orcid: 0000-0001-9945-7702

Affiliations:
  • National Institute of Technology Raipur, Department of Information Technology, India
  • National Institute of Technology Patna, Department of Computer Science and Engineering, India (PhD 2014)


According to our database1, Prabhat Kumar authored at least 50 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A meta-learning framework for recommending CNN models for plant disease identification tasks.
Comput. Electron. Agric., April, 2023

Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks.
Peer Peer Netw. Appl., March, 2023

A Spherical Band-based DV-Hop localization technique for three-dimensional wireless sensor network.
Phys. Commun., February, 2023

Ensemble Based Feature Extraction and Deep Learning Classification Model with Depth Vision.
Comput. Informatics, 2023

2022
A community-based hierarchical user authentication scheme for Industry 4.0.
Softw. Pract. Exp., 2022

A Smart Trust Based Approach for Sybil Node Detection in Online Social Networks.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Android application behavioural analysis for data leakage.
Expert Syst. J. Knowl. Eng., 2021

2020
Defensive Modeling of Fake News Through Online Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Performance evaluation of classification methods with PCA and PSO for diabetes.
Netw. Model. Anal. Health Informatics Bioinform., 2020

A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs.
J. Ambient Intell. Humaniz. Comput., 2020

Feature based video stabilization based on boosted HAAR Cascade and representative point matching algorithm.
Image Vis. Comput., 2020

Test optimisation: an approach based on modified algorithm for software network.
Int. J. Adv. Intell. Paradigms, 2020

Privacy issues of android application permissions: A literature review.
Trans. Emerg. Telecommun. Technol., 2020

Optimizing Online Shopping using Genetic Algorithm.
Proceedings of the 3rd International Conference on Information and Computer Technologies, 2020

2019
A load balancing virtual level routing (LBVLR) using mobile mule for large sensor networks.
J. Supercomput., 2019

Localization in three-dimensional wireless sensor networks: a survey.
J. Supercomput., 2019

Architecting user-centric internet of things for smart agriculture.
Sustain. Comput. Informatics Syst., 2019

An extensive evaluation of search-based software testing: a review.
Soft Comput., 2019

A Pattern-Based Multi-Factor Authentication System.
Scalable Comput. Pract. Exp., 2019

RNN based online handwritten word recognition in Devanagari and Bengali scripts using horizontal zoning.
Pattern Recognit., 2019

SensDroid: Analysis for Malicious Activity Risk of Android Application.
Multim. Tools Appl., 2019

Enhanced approach for test suite optimisation using genetic algorithm.
Int. J. Comput. Aided Eng. Technol., 2019

Impact of internet of things (IoT) in disaster management: a task-technology fit perspective.
Ann. Oper. Res., 2019

Enhancement and De-Noising of OCT Image by Adaptive Wavelet Thresholding Method.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

Image Processing Based Automated Glaucoma Detection Techniques and Role of De-Noising: A Technical Survey.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

2018
Correction to: An Energy Efficient Protocol to Mitigate Hot Spot Problem Using Unequal Clustering in WSN.
Wirel. Pers. Commun., 2018

An Energy Efficient Protocol to Mitigate Hot Spot Problem Using Unequal Clustering in WSN.
Wirel. Pers. Commun., 2018

Optimized test suites for automated testing using different optimization techniques.
Soft Comput., 2018

Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features.
Int. J. Inf. Syst. Model. Des., 2018

Models for the Detection of Malicious Intent People in Society.
Int. J. Digit. Crime Forensics, 2018

EM and EM'-index sequence: Construction and application in scientific assessment of scholars.
CoRR, 2018

Corrections to: A Survey on Successors of Leach Protocol.
IEEE Access, 2018

Spam Review Detection Using Ensemble Machine Learning.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

RNN Based Online Handwritten Word Recognition in Devanagari Script.
Proceedings of the 16th International Conference on Frontiers in Handwriting Recognition, 2018

2017
Privacy Analysis of Android Applications: State-of-art and Literary Assessment.
Scalable Comput. Pract. Exp., 2017

An Effective Meta-Heuristic Cuckoo Search Algorithm for Test Suite Optimization.
Informatica (Slovenia), 2017

Localization in Wireless Sensor Networks Using Soft Computing Approach.
Int. J. Inf. Secur. Priv., 2017

Empirical Evaluation of Hill Climbing Algorithm.
Int. J. Appl. Metaheuristic Comput., 2017

A Survey on Successors of LEACH Protocol.
IEEE Access, 2017

A Load Balancing Cross Clustering Approach in Wireless Sensor Network.
Proceedings of the 7th International Conference on Computer and Communication Technology, 2017

Fake Order Mitigation: A Profile Based Mechanism.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

Consumer Satisfaction Rating System Using Sentiment Analysis.
Proceedings of the Digital Nations - Smart Cities, Innovation, and Sustainability, 2017

User Adoption of Cashless Services in Indian Context - A Preliminary Analysis.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
A Novel Approach for Software Test Data Generation using Cuckoo Algorithm.
ICTCS, 2016

Predicting Stock Movements using Social Network.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

Controlling and Mitigating Targeted Socio-Economic Attacks.
Proceedings of the Social Media: The Good, the Bad, and the Ugly, 2016

2015
Understanding the Adoption of Mobile Internet in the Saudi Arabian Context: Results from a Descriptive Analysis.
Proceedings of the Open and Big Data Management and Innovation, 2015

2014
Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2012
IP based services.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

A Comprehensive Study on Multifactor Authentication Schemes.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012


  Loading...