S. Sibi Chakkaravarthy

Orcid: 0000-0001-7778-0453

Affiliations:
  • Vellore Institute of Technology - Andhra Pradesh, Amaravathi, India


According to our database1, S. Sibi Chakkaravarthy authored at least 46 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A comprehensive examination of email spoofing: Issues and prospects for email security.
Comput. Secur., February, 2024

MERP: Metaverse Extended Realtiy Portal.
CoRR, 2024

2023
Container security: Precaution levels, mitigation strategies, and research perspectives.
Comput. Secur., December, 2023

Flow based containerized honeypot approach for network traffic analysis: An empirical study.
Comput. Sci. Rev., November, 2023

Correction: Skin Cancer Segmentation Based on Triangular Intuitionistic Fuzzy Sets.
SN Comput. Sci., May, 2023

Skin Cancer Segmentation Based on Triangular Intuitionistic Fuzzy Sets.
SN Comput. Sci., May, 2023

A comprehensive survey on deep learning based malware detection techniques.
Comput. Sci. Rev., February, 2023

Cleo: Smart Glasses to Monitor Consumption of Alcohol and Cigarettes.
SN Comput. Sci., 2023

TUSH-Key: Transferable User Secrets on Hardware Key.
CoRR, 2023

SimplyMime: A Control at Our Fingertips.
CoRR, 2023

MagicEye: An Intelligent Wearable Towards Independent Living of Visually Impaired.
CoRR, 2023

MetaSecure: A Passwordless Authentication for the Metaverse.
CoRR, 2023

e-Inu: Simulating A Quadruped Robot With Emotional Sentience.
CoRR, 2023

A Survey on Yogic Posture Recognition.
IEEE Access, 2023

MetaHap: A Low Cost Haptic Glove for Metaverse.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

2022
iDrone: IoT-Enabled Unmanned Aerial Vehicles for Detecting Wildfires Using Convolutional Neural Networks.
SN Comput. Sci., 2022

Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud.
Multim. Tools Appl., 2022

Deep Convolutional Neural Network (Falcon) and transfer learning-based approach to detect malarial parasite.
Multim. Tools Appl., 2022

ALBERT-based fine-tuning model for cyberbullying analysis.
Multim. Syst., 2022

EfficientWord-Net: An Open Source Hotword Detection Engine Based on Few-Shot Learning.
J. Inf. Knowl. Manag., 2022

A decentralized open web cryptographic standard.
Comput. Electr. Eng., 2022

Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets.
IEEE Access, 2022

Metakey: A Novel and Seamless Passwordless Multifactor Authentication for Metaverse.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022

Optimized cluster centroids for segmentation of skin cancer using triangular intuitionistic fuzzy sets.
Proceedings of the Algorithms, Computing and Mathematics Conference 2022 (ACM 2022), Hybrid Event, Chennai, India, August 29, 2022

2021
MyWear: A Novel Smart Garment for Automatic Continuous Vital Monitoring.
IEEE Trans. Consumer Electron., 2021

Comprehensive analysis of embeddings and pre-training in NLP.
Comput. Sci. Rev., 2021

EfficientWord-Net: An Open Source Hotword Detection Engine based on One-shot Learning.
CoRR, 2021

VISU: A 3-D Printed Functional Robot for Crowd Surveillance.
IEEE Consumer Electron. Mag., 2021

Vision enabled Smart Prosthetic Arm for Amputees.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021

2020
Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.
J. Medical Syst., 2020

FBMC-based dispersion compensation using artificial neural network equalization for long reach-passive optical network.
Int. J. Wavelets Multiresolution Inf. Process., 2020

Detecting abnormal events in traffic video surveillance using superorientation optical flow feature.
IET Image Process., 2020

MyWear: A Smart Wear for Continuous Body Vital Monitoring and Emergency Alert.
CoRR, 2020

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks.
IEEE Access, 2020

2019
Role-based policy to maintain privacy of patient health records in cloud.
J. Supercomput., 2019

LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks.
Neural Comput. Appl., 2019

Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering.
Multim. Tools Appl., 2019

Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks.
IET Networks, 2019

A Survey on malware analysis and mitigation techniques.
Comput. Sci. Rev., 2019

Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance.
Comput. Commun., 2019

2018
Futuristic cyber-attacks.
Int. J. Knowl. Based Intell. Eng. Syst., 2018

Hybrid feature descriptors to detect face spoof attacks.
J. Intell. Fuzzy Syst., 2018

Hybrid Analysis Technique to detect Advanced Persistent Threats.
Int. J. Intell. Inf. Technol., 2018

2017
Analyzing ConvNets Depth for Deep Face Recognition.
Proceedings of 2nd International Conference on Computer Vision & Image Processing, 2017

2015
Automatic Leaf Vein Feature Extraction for First Degree Veins.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2015

2014
Asynchronous Time encoder based quasi-Static modelling for Human Area Network in VANET.
J. Comput. Sci., 2014


  Loading...