Sandhya Aneja

Orcid: 0000-0003-2266-4951

According to our database1, Sandhya Aneja authored at least 29 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Predicting Agriculture Yields Based on Machine Learning Using Regression and Deep Learning.
IEEE Access, 2023

2022
Device fingerprinting using deep convolutional neural networks.
Int. J. Commun. Networks Distributed Syst., 2022

Predictive linguistic cues for fake news: a societal artificial intelligence problem.
CoRR, 2022

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising.
CoRR, 2022

Collaborative adversary nodes learning on the logs of IoT devices in an IoT network.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks.
Int. J. Secur. Networks, 2021

Transfer learning for cancer diagnosis in histopathological images.
CoRR, 2021

2020
Device Fingerprinting using Deep Convolutional Neural Networks.
Dataset, December, 2020

Neural Machine Translation model for University Email Application.
Proceedings of the SSPS 2020: 2020 2nd Symposium on Signal Processing Systems, 2020

Network Traffic Analysis based IoT Device Identification.
Proceedings of the BDIOT 2020: The 4th International Conference on Big Data and Internet of Things, 2020

2019
Energy efficient reputation mechanism for defending different types of flooding attack.
Wirel. Networks, 2019

Transfer Learning using CNN for Handwritten Devanagari Character Recognition.
CoRR, 2019

Attacks in Delay Tolerant Networks: Classification and Analysis.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
IoT Device Fingerprint using Deep Learning.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

2016
Experimental Evaluation of Routing Schemes for Intermittently Connected Wireless Mobile Networks.
Wirel. Pers. Commun., 2016

Protocols for mitigating blackhole attacks in delay tolerant networks.
Wirel. Networks, 2016

SMOME: A framework for evaluating the costs and benefits of instrumentation in smart home systems.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

2015
BlackBox as a DTN device.
Int. J. Next Gener. Comput., 2015

POSOP Routing Algorithm: A DTN Routing Scheme for Information Connectivity of Health Centres in Hilly State of North India.
Int. J. Distributed Sens. Networks, 2015

CONCOR: context-aware community-oriented routing for intermittently connected network.
EURASIP J. Wirel. Commun. Netw., 2015

Defending flooding attack in Delay Tolerant Networks.
Proceedings of the 2015 International Conference on Information Networking, 2015

A Framework for Evaluating the Costs and Benefits of Instrumentation in Smart Home Systems.
Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, 2015

2014
IFM: A Scalable High Resolution Flood Modeling Framework.
Proceedings of the Euro-Par 2014 Parallel Processing, 2014

2013
Discovering Minimum Exposed Path to Attack in Mobile Ad hoc Networks in optimal O(jPj) time after pre-processing.
Int. J. Next Gener. Comput., 2013

DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

CACBR: context aware community based routing for intermittently connected network.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

A hybrid parallelization approach for high resolution operational flood forecasting.
Proceedings of the 20th Annual International Conference on High Performance Computing, 2013

2012
Reliable Distance Vector routing protocol to handle Blackhole and Selfish (RDVBS) nodes in Ad hoc Networks.
Int. J. Next Gener. Comput., 2012

Reference based approach to mitigate blackhole attacks in delay tolerant networks.
Proceedings of the Q2SWinet'12, 2012


  Loading...