Sarbjeet Singh

Orcid: 0000-0002-7603-9230

According to our database1, Sarbjeet Singh authored at least 50 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Aeriform in-action: A novel dataset for human action recognition in aerial videos.
Pattern Recognit., August, 2023

Energy-efficient secure data fusion scheme for IoT based healthcare system.
Future Gener. Comput. Syst., June, 2023

PUMAVE-D: panjab university multilingual audio and video facial expression dataset.
Multim. Tools Appl., March, 2023

SLA-based Multi-dimensional Trust Model for Fog Computing Environments.
J. Grid Comput., 2023

2022
Recognition and Classification of Human Actions Using 2D Pose Estimation and Machine Learning.
J. Comput. Sci. Eng., December, 2022

Missing traffic data imputation using a dual-stage error-corrected boosting regressor with uncertainty estimation.
Inf. Sci., 2022

A comprehensive review of object detection with deep learning.
Digit. Signal Process., 2022

2021
Multi-objective Energy Aware Scheduling of Deadline Constrained Workflows in Clouds using Hybrid Approach.
Wirel. Pers. Commun., 2021

An intrinsic authorship verification technique for compromised account detection in social networks.
Soft Comput., 2021

Object Detection using Deep Learning: A Review.
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021

A Survey of Streaming Protocols for Video Transmission.
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021

Social Distancing Violation Detection Using Pre-Trained Object Detection Models.
Proceedings of the 19th OITS International Conference on Information Technology, 2021

Abusive Content Detection in Online User-Generated Data: A survey.
Proceedings of the Fifth International Conference On Arabic Computational Linguistics, 2021

2020
TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks.
Appl. Soft Comput., 2020

2019
Improved TOPSIS method for peak frame selection in audio-video human emotion recognition.
Multim. Tools Appl., 2019

The indirect costs assessment of railway incidents and their relationship to human error - The case of Signals Passed at Danger.
J. Rail Transp. Plan. Manag., 2019

An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing.
Int. J. Grid Util. Comput., 2019

Using the improved PROMETHEE for selection of trustworthy cloud database servers.
Int. Arab J. Inf. Technol., 2019

Multi-criteria workflow scheduling on clouds under deadline and budget constraints.
Concurr. Comput. Pract. Exp., 2019

MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2018
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches.
J. Netw. Comput. Appl., 2018

Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network.
Int. J. Simul. Process. Model., 2018

AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique.
Expert Syst. Appl., 2018

Comparison of learning techniques for prediction of customer churn in telecommunication.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018

Detecting Sarcasm in Text.
Proceedings of the Intelligent Systems Design and Applications, 2018

A Cost Optimal Information Dispersal Framework for Cloud Storage System.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Ranking based comparative analysis of graph centrality measures to detect negative nodes in online social networks.
J. Comput. Sci., 2017

Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers.
Int. J. Fuzzy Syst., 2017

Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017

Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017

Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers.
Future Gener. Comput. Syst., 2017

A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Comput. Electr. Eng., 2017

2016
Score-based genetic algorithm for scheduling workflow applications in clouds.
Int. J. Grid Util. Comput., 2016

A novel cloud auditor based trust management framework for cloud computing.
Int. J. Grid Util. Comput., 2016

A review of social network centric anomaly detection techniques.
Int. J. Commun. Networks Distributed Syst., 2016

Detecting negative relations in social networks.
Int. J. Commun. Networks Distributed Syst., 2016

A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers.
Future Gener. Comput. Syst., 2016

A Budget-constrained Time and Reliability Optimization BAT Algorithm for Scheduling Workflow Applications in Clouds.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

2015
Modelling factors affecting human operator failure probability in railway maintenance tasks: an ISM-based analysis.
Int. J. Syst. Assur. Eng. Manag., 2015

Developing RCM strategy for wind turbines utilizing e-condition monitoring.
Int. J. Syst. Assur. Eng. Manag., 2015

2014
Self-maintenance techniques: a smart approach towards self-maintenance system.
Int. J. Syst. Assur. Eng. Manag., 2014

Peers Feedback and Compliance Based Trust Computation for Cloud Computing.
Proceedings of the Security in Computing and Communications, 2014

A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Compliance based Trustworthiness Calculation Mechanism in Cloud Environment.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Deadline and cost based workflow scheduling in hybrid cloud.
Proceedings of the International Conference on Advances in Computing, 2013

2011
Lumbosacral bending moment assessment and parameter optimization using Taguchi design during lifting task in a steel rolling mill.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2009
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2006
A Framework for Handling Security Problems in Grid Environment using Web Services Security Specifications.
Proceedings of the 2006 International Conference on Semantics, 2006

Design of a Framework for Handling Security Issues in Grids.
Proceedings of the 9th International Conference in Information Technology, 2006


  Loading...