Priyanka Singh

Orcid: 0000-0003-0841-1544

According to our database1, Priyanka Singh authored at least 111 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization.
Expert Syst. Appl., February, 2024

Estimation of regional-scale near real time reference evapotranspiration using remote sensing and weather data to improve agriculture advisory.
Earth Sci. Informatics, February, 2024

Integration of statistical parameters-based colour-texture descriptors for radar remote sensing image retrieval applications.
Int. J. Comput. Sci. Eng., 2024

Advancing Brain Tumor Classification: Exploring Two Deep Learning Architectures for Improved Accuracy.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme.
J. Inf. Secur. Appl., December, 2023

Adaptive neural network control of DC-DC power converter.
Expert Syst. Appl., November, 2023

Swarm-based hybrid optimization algorithms: an exhaustive analysis and its applications to electricity load and price forecasting.
Soft Comput., October, 2023

An image forensic technique based on JPEG ghosts.
Multim. Tools Appl., April, 2023

Reliable and cost effective all-optical wireless architecture for a broadband access network.
JOCN, 2023

PP-JPEG: A Privacy-Preserving JPEG Image-Tampering Localization.
J. Imaging, 2023

Feed-Forward Deep Neural Network (FFDNN)-Based Deep Features for Static Malware Detection.
Int. J. Intell. Syst., 2023

Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare.
IEEE Access, 2023

On the Optimal Assignment of Mirror Element in UAV and OIRS-Assisted OWC based Architecture.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

BATFL: Battling Backdoor Attacks in Federated Learning.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

RAFT: Evaluating Federated Learning Resilience Against Threats.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023

PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Performance Analysis of DCO-OFDM based UWOC System under Varying Underwater Channel Conditions.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
EESSMT: An Energy Efficient Hybrid Scheme for Securing Mobile Ad hoc Networks Using IoT.
Wirel. Pers. Commun., 2022

QoS-Aware Reliable Architecture for Broadband Fiber-Wireless Access Networks.
IEEE Syst. J., 2022

Exploiting deep and hand-crafted features for texture image retrieval using class membership.
Pattern Recognit. Lett., 2022

Chaos follow the leader algorithm: Application to data classification.
J. Comput. Sci., 2022

Exploiting linguistic information from Nepali transcripts for early detection of Alzheimer's disease using natural language processing and machine learning techniques.
Int. J. Hum. Comput. Stud., 2022

Detection of AI Synthesized Hindi Speech.
CoRR, 2022

Minimized feature overhead malware detection machine learning model employing MRMR-based ranking.
Concurr. Comput. Pract. Exp., 2022

Clairvoyant: AdaBoost with Cost-Enabled Cost-Sensitive Classifier for Customer Churn Prediction.
Comput. Intell. Neurosci., 2022

Factor Prioritization for Effectively Implementing DevOps in Software Development Organizations: A SWOT-AHP Approach.
Axioms, 2022

Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media.
Appl. Soft Comput., 2022

PRMS: Design and Development of Patients' E-Healthcare Records Management System for Privacy Preservation in Third Party Cloud Platforms.
IEEE Access, 2022

Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT.
IEEE Access, 2022

Targeted Clean-Label Poisoning Attacks on Federated Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

Data Poisoning Attack by Label Flipping on SplitFed Learning.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2022

Cost Effective Hybrid FSO-Wireless Architecture for Broadband Access Network.
Proceedings of the International Conference on Optical Network Design and Modeling, 2022

XAIForCOVID-19: A Comparative Analysis of Various Explainable AI Techniques for COVID-19 Diagnosis Using Chest X-Ray Images.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022

2021
Computational approach to clinical diagnosis of diabetes disease: a comparative study.
Multim. Tools Appl., 2021

Role of Maximum Entropy and Citizen Science to Study Habitat Suitability of Jacobin Cuckoo in Different Climate Change Scenarios.
ISPRS Int. J. Geo Inf., 2021

Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness.
Entropy, 2021

Using Deep Learning Techniques and Inferential Speech Statistics for AI Synthesised Speech Recognition.
CoRR, 2021

Explainable AI: current status and future directions.
CoRR, 2021

SSS-PRNU: Privacy-Preserving PRNU Based Camera Attribution using Shamir Secret Sharing.
CoRR, 2021

An ensemble approach to meta-heuristic algorithms: Comparative analysis and its applications.
Comput. Ind. Eng., 2021

SHELBRS: Location-Based Recommendation Services Using Switchable Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Role of Citizens in the Development of Smart Cities: Benefit of Citizen's Feedback for Improving Quality of Service.
Proceedings of the 10th International Conference on Smart Cities and Green ICT Systems, 2021

Detection of AI-Synthesized Speech Using Cepstral & Bispectral Statistics.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

Robust Homomorphic Video Hashing.
Proceedings of the 4th IEEE International Conference on Multimedia Information Processing and Retrieval, 2021

A Comparative Study of Machine Learning and NLP Techniques for Uses of Stop Words by Patients in Diagnosis of Alzheimer's Disease.
Proceedings of the International Joint Conference on Neural Networks, 2021

Application of Mutation Operators on Grey Wolf Optimizer.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

An Image Forensic Technique Based on SIFT Descriptors and FLANN Based Matching.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Travel Recommendation System Using Content and Collaborative Filtering - A Hybrid Approach.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Reversible and Secured Image Watermarking Technique for IoMT Healthcare.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

Effect of Environmental Conditions on PRNU.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
PPContactTracing: A Privacy-Preserving Contact Tracing Protocol for COVID-19 Pandemic.
CoRR, 2020

A Forensic Technique to Detect Copy-Move Forgery Based on Image Statistics.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

Data-Driven Approach based on Feature Selection Technique for Early Diagnosis of Alzheimer's Disease.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Detecting Alzheimer's Disease by Exploiting Linguistic Information from Nepali Transcript.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Secured Cross Layered Watermark Embedding For Digital Image Authentication Using IWT - SVD.
Proceedings of the 15th IEEE International Conference on Industrial and Information Systems, 2020

Smart City Development: Positioning Citizens in the Service Life Cycle (Citizens as Primary Customer).
Proceedings of the 4th International Conference on Computer-Human Interaction Research and Applications, 2020

Self-centeredness of Generalized Petersen Graphs.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2020

2019
Recovering tampered regions in encrypted video using POB number system.
Signal Process. Image Commun., 2019

Prostate Cancer Classification Based on Best First Search and Taguchi Feature Selection Method.
Proceedings of the Image and Video Technology - 9th Pacific-Rim Symposium, 2019

MEDICAL IMAGE WATERMARKING FOR AUTHENTICATION, CONFIDENTIALITY, TAMPER DETECTION AND RECOVERY.
Proceedings of the 10th International Conference on Computing, 2019

Robust Homomorphic Image Hashing.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Smart Cities and Associated Risks: Technical v/s Non-technical Perspective.
Proceedings of the 3rd International Conference on Computer-Human Interaction Research and Applications, 2019

2018
Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud.
IEEE Trans. Circuits Syst. Video Technol., 2018

A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares.
Signal Process., 2018

Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system.
Multim. Tools Appl., 2018

Reversible data hiding based on Shamir's secret sharing for color images over cloud.
Inf. Sci., 2018

Don't just sign use brain too: A novel multimodal approach for user identification and verification.
Inf. Sci., 2018

FPR using machine learning with multi-feature method.
IET Image Process., 2018

A robust blind watermarking scheme for ownership assertion of multi-band satellite images.
Int. Arab J. Inf. Technol., 2018

Secure data deduplication using secret sharing schemes over cloud.
Future Gener. Comput. Syst., 2018

Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents.
Displays, 2018

Writer identification using texture features: A comparative study.
Comput. Electr. Eng., 2018

SecureCMerge: Secure PDF Merging over Untrusted Servers.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

GeoSClean: Secure Cleaning of GPS Trajectory Data Using Anomaly Detection.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

Client Side Secure Image Deduplication Using DICE Protocol.
Proceedings of the IEEE 1st Conference on Multimedia Information Processing and Retrieval, 2018

CARTOONNET: Caricature Recognition of Public Figures.
Proceedings of 3rd International Conference on Computer Vision and Image Processing - CVIP 2018, Jabalpur, India, September 29, 2018

2017
Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System.
ACM Trans. Multim. Comput. Commun. Appl., 2017

A secure image sharing scheme based on SVD and Fractional Fourier Transform.
Signal Process. Image Commun., 2017

Prediction of advertisement preference by fusing EEG response and sentiment analysis.
Neural Networks, 2017

A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform.
Multim. Tools Appl., 2017

A secured robust watermarking scheme based on majority voting concept for rightful ownership assertion.
Multim. Tools Appl., 2017

A self recoverable dual watermarking scheme for copyright protection and integrity verification.
Multim. Tools Appl., 2017

Rotation and script independent text detection from video frames using sub pixel mapping.
J. Vis. Commun. Image Represent., 2017

On self-centeredness of tensor product of some graphs.
Electron. Notes Discret. Math., 2017

A Deep Learning Frame-Work for Recognizing Developmental Disorders.
Proceedings of the 2017 IEEE Winter Conference on Applications of Computer Vision, 2017

S3Email: A method for securing emails from service providers.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

DICE: A dual integrity convergent encryption protocol for client side secure data deduplication.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication.
Proceedings of the 9th International Conference on Computer and Automation Engineering, 2017

GeoSecure: Towards secure outsourcing of GPS data over cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Using linked data in purposive social networks.
PhD thesis, 2016

Amino acid sequence determination, in silico tertiary structure prediction and anticancer activity assessment of l-glutaminase from <i>Bacillus cereus</i>.
Netw. Model. Anal. Health Informatics Bioinform., 2016

An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection.
Multim. Tools Appl., 2016

A region adaptive robust watermarking scheme based on homogeneity analysis.
Int. Arab J. Inf. Technol., 2016

Using Semantics to Search Answers for Unanswered Questions in Q&A Forums.
Proceedings of the 25th International Conference on World Wide Web, 2016

Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system.
Proceedings of the Tenth Indian Conference on Computer Vision, 2016

2015
Intelligent Parking Management System Using RFID.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2014
Comparative analysis of controllers designed for pure integral complex delayed process model.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Structural modeling and simulation studies of human cyclooxygenase (COX) isozymes with selected terpenes: Implications in drug designing and development.
Comput. Biol. Medicine, 2013

Linked data in crowdsourcing purposive social network.
Proceedings of the 22nd International World Wide Web Conference, 2013

Reachability Verification of Rhapsody Statecharts.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A hybrid DCT-SVD based robust watermarking scheme for copyright protection.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

2012
A region specific robust watermarking scheme based on singular value decomposition.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Modeling impact of bypass diodes on photovoltaic cell performance under partial shading.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

2011
Synote: development of a Web-based tool for synchronized annotations.
New Rev. Hypermedia Multim., 2011

A portable neuroprosthesis for applications in gait rehabilitations with stroke patients.
Int. J. Medical Eng. Informatics, 2011

Modeling of Random Shading Effects in Solar Cells.
Proceedings of the 21st International Conference on Systems Engineering (ICSEng 2011), 2011

Distributed Human Computation Framework for Linked Data Co-reference Resolution.
Proceedings of the Semantic Web: Research and Applications, 2011

2009
A Drosophila systems model of pentylenetetrazole induced locomotor plasticity responsive to antiepileptic drugs.
BMC Syst. Biol., 2009

Synote: enhancing multimedia e-learning with synchronised annotation.
Proceedings of the first ACM international workshop on Multimedia technologies for distance learning, 2009


  Loading...