Rutvij H. Jhaveri

Orcid: 0000-0002-3285-7346

According to our database1, Rutvij H. Jhaveri authored at least 64 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Performance Analysis of Satellite-Vehicle Networks With a Non-Terrestrial Vehicle.
IEEE Trans. Intell. Veh., January, 2024

Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology.
Peer Peer Netw. Appl., January, 2024

IoT-Assisted Automatic Driver Drowsiness Detection through Facial Movement Analysis Using Deep Learning and a U-Net-Based Architecture.
Inf., 2024

Spatial Computing: Concept, Applications, Challenges and Future Directions.
CoRR, 2024

A Novel Constructive Unceasement Conditional Random Field and Dynamic Bayesian Network Model for Attack Prediction on Internet of Vehicle.
IEEE Access, 2024

Enhancing Household Energy Consumption Predictions Through Explainable AI Frameworks.
IEEE Access, 2024

2023
Toward Network-Aware Query Execution Systems in Large Datacenters.
IEEE Trans. Netw. Serv. Manag., December, 2023

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.
IEEE Trans. Intell. Transp. Syst., December, 2023

Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things.
Comput. Electr. Eng., September, 2023

STAR-RIS-Empowered Cognitive Non-Terrestrial Vehicle Network With NOMA.
IEEE Trans. Intell. Veh., June, 2023

ESCALB: An effective slave controller allocation-based load balancing scheme for multi-domain SDN-enabled-IoT networks.
J. King Saud Univ. Comput. Inf. Sci., June, 2023

EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element.
Digit. Commun. Networks, April, 2023

Secrecy Performance for RIS-Based Integrated Satellite Vehicle Networks With a UAV Relay and MRC Eavesdropping.
IEEE Trans. Intell. Veh., February, 2023

Integrated Satellite Multiple Two-Way Relay Networks: Secrecy Performance Under Multiple Eves and Vehicles With Non-Ideal Hardware.
IEEE Trans. Intell. Veh., February, 2023

Application of Robust Zero-Watermarking Scheme Based on Federated Learning for Securing the Healthcare Data.
IEEE J. Biomed. Health Informatics, February, 2023

Reinforcement-Learning-Based Optimization on Energy Efficiency in UAV Networks for IoT.
IEEE Internet Things J., February, 2023

Consumer-Centric Internet of Medical Things for Cyborg Applications Based on Federated Reinforcement Learning.
IEEE Trans. Consumer Electron., 2023

Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks.
IEEE Open J. Commun. Soc., 2023

Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection.
Int. J. Intell. Syst., 2023

Generative Pre-trained Transformer: A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions.
CoRR, 2023

An AI-Assisted Smart Healthcare System Using 5G Communication.
IEEE Access, 2023

Metaverse for Healthcare: A Survey on Potential Applications, Challenges and Future Directions.
IEEE Access, 2023

Securing Internet of Vehicles Protocols using ASCON and GIFT-COFB.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

FL-PSO: A Federated Learning approach with Particle Swarm Optimization for Brain Stroke Prediction.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Knowledge Guided Deep Learning for General-Purpose Computer Vision Applications.
Proceedings of the Computer Analysis of Images and Patterns, 2023

2022
Mobile Collaborative Secrecy Performance Prediction for Artificial IoT Networks.
IEEE Trans. Ind. Informatics, 2022

A Novel Model Based on Window-Pass Preferences for Data Emergency Aware Scheduling in Computer Networks.
IEEE Trans. Ind. Informatics, 2022

ML-Based Delay Attack Detection and Isolation for Fault-Tolerant Software-Defined Industrial Networks.
Sensors, 2022

Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test.
Secur. Commun. Networks, 2022

HyPASS: Design of hybrid-SDN prevention of attacks of source spoofing with host discovery and address validation.
Phys. Commun., 2022

SDN Framework for Mitigating Time-Based Delay Attack.
J. Circuits Syst. Comput., 2022

Guest Editorial: Emerging Trends and Challenges in Internet-of-Underwater-Things.
IEEE Internet Things Mag., 2022

Preface to the Special Issue on Privacy and Security for Internet of Things.
Int. J. Wirel. Inf. Networks, 2022

XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions.
CoRR, 2022

WOGRU-IDS - An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks.
Comput. Commun., 2022

Cooperative vehicular networks: An optimal and machine learning approach.
Comput. Electr. Eng., 2022

CES Blocks - A Novel Chaotic Encryption Schemes-Based Blockchain System for an IoT Environment.
IEEE Access, 2022

Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks.
Proceedings of the 96th Vehicular Technology Conference, 2022

BC-IoDT: blockchain-based framework for authentication in internet of drone things.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

A QoS-Aware Software Defined Mobility Architecture for Named Data Networking.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

2021
Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection.
Secur. Commun. Networks, 2021

Probabilistic Deep Q Network for real-time path planning in censorious robotic procedures using force sensors.
J. Real Time Image Process., 2021

Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

An ICT-based solid waste management system for smart cities: a case of municipality in India.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks.
Comput. Commun., 2021

A soft computing based multi-objective optimization approach for automatic prediction of software cost models.
Appl. Soft Comput., 2021

2020
Internet of health things-driven deep learning system for detection and classification of cervical cells using transfer learning.
J. Supercomput., 2020

An enhanced approach for three factor remote user authentication in multi - server environment.
J. Intell. Fuzzy Syst., 2020

A Survey of Energy Efficient Schemes in Ad-hoc Networks.
CoRR, 2020

Various Secure Routing Schemes for MANETs: A Survey.
CoRR, 2020

Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey.
CoRR, 2020

Real-time QoS Routing Scheme in SDN-based Robotic Cyber-Physical Systems.
CoRR, 2020

2019
Privacy-Preserving Forwarding Using Homomorphic Encryption for Information-Centric Wireless Ad Hoc Networks.
IEEE Commun. Lett., 2019

Managing Industrial Communication Delays with Software-Defined Networking.
Proceedings of the 25th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2019

2018
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs.
Secur. Commun. Networks, 2018

Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT.
IEEE Access, 2018

2017
Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks.
Int. J. Commun. Syst., 2017

Cooperation based defense mechanism against selfish nodes in DTNs.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Evaluating Energy Eciency of Secure Routing Schemes for Mobile Ad-Hoc Networks.
Int. J. Next Gener. Comput., 2016

2015
A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks.
Wirel. Networks, 2015

Mobile Ad-hoc Networking with AODV: A Review.
Int. J. Next Gener. Comput., 2015

2010
Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols
CoRR, 2010


  Loading...