Raman Singh

Orcid: 0000-0002-6839-5454

According to our database1, Raman Singh authored at least 30 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep learning based high performance classification architecture for low-altitude aerial images.
Multim. Tools Appl., February, 2024

2023
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model.
Clust. Comput., December, 2023

Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS.
Sensors, July, 2023

Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload.
Future Internet, May, 2023

Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network.
Future Internet, March, 2023

Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network.
Int. Arab J. Inf. Technol., 2023

2022
On the performance evaluation of object classification models in low altitude aerial data.
J. Supercomput., 2022

Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey.
Softw. Pract. Exp., 2022

Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain.
Sensors, 2022

Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.
Sensors, 2022

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices.
Knowl. Based Syst., 2022

A Feature Pyramid Based Multi-stage Framework for Object Detection in Low-altitude UAV Images.
Int. J. Artif. Intell. Tools, 2022

Dilated convolution based RCNN using feature fusion for Low-Altitude aerial objects.
Expert Syst. Appl., 2022

Framework of data privacy preservation and location obfuscation in vehicular cloud networks.
Concurr. Comput. Pract. Exp., 2022

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices.
Comput. Networks, 2022

Blockchain-enabled End-to-End Encryption for Instant Messaging Applications.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

Data and Location Privacy of Smart Devices over Vehicular Cloud Computing.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

2021
Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment.
J. Ambient Intell. Smart Environ., 2021

Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload.
CoRR, 2021

Guest editorial: Introduction to the Special Section on Load Balancing of Sensory Data for IoT Deep Learning Applications with Edge/Fog Computing (VSI-lbdl).
Comput. Electr. Eng., 2021

Network Augmentation by Dynamically Splitting the Switching Function in SDN.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Deep learning-based object detection in low-altitude UAV datasets: A survey.
Image Vis. Comput., 2020

Statistical vertical reduction-based data abridging technique for big network traffic dataset.
Int. J. Commun. Syst., 2020

Framework for a Decentralized Web.
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020

Adaptive Flow-Level Scheduling for the IoT MAC.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Integration of WSN with IoT Applications: A Vision, Architecture, and Future Challenges.
Proceedings of the Integration of WSN and IoT for Smart Cities, 2020

2017
Internet attacks and intrusion detection system: A review of the literature.
Online Inf. Rev., 2017

2015
A Reference Dataset for Network Traffic Activity Based Intrusion Detection System.
Int. J. Comput. Commun. Control, 2015

An intrusion detection system using network traffic profiling and online sequential extreme learning machine.
Expert Syst. Appl., 2015

2013
Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques.
CoRR, 2013


  Loading...