Shitharth Selvarajan

Orcid: 0000-0002-4931-724X

According to our database1, Shitharth Selvarajan authored at least 40 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs).
Int. J. Inf. Sec., February, 2024

EC-YOLOX: A Deep-Learning Algorithm for Floating Objects Detection in Ground Images of Complex Water Environments.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2023
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems.
J. Cloud Comput., December, 2023

An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm.
J. Cloud Comput., December, 2023

Certain investigation on optimization technique for sensor nodes in the bio medical recording system.
J. Intell. Fuzzy Syst., October, 2023

Development of edge computing and classification using The Internet of Things with incremental learning for object detection.
Internet Things, October, 2023

Secured data transmissions in corporeal unmanned device to device using machine learning algorithm.
Phys. Commun., August, 2023

IoT based arrhythmia classification using the enhanced hunt optimization-based deep learning.
Expert Syst. J. Knowl. Eng., August, 2023

Connotation of fuzzy logic system in Underwater communication systems for navy applications with data indulgence route.
Sustain. Comput. Informatics Syst., April, 2023

Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation.
PeerJ Comput. Sci., 2023

Efficient data transmission on wireless communication through a privacy-enhanced blockchain process.
PeerJ Comput. Sci., 2023

RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms.
IEEE Open J. Commun. Soc., 2023

Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks.
IEEE Open J. Commun. Soc., 2023

Prognosis of urban environs using time series analysis for preventing overexploitation using artificial intelligence.
Int. J. Data Anal. Tech. Strateg., 2023

Adaptive neuro-fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs.
IET Commun., 2023

MSI-A: An Energy Efficient Approximated Cache Coherence Protocol.
IEEE Access, 2023

2022
Grow of Artificial Intelligence to Challenge Security in IoT Application.
Wirel. Pers. Commun., 2022

Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection.
SN Comput. Sci., 2022

Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation.
Sensors, 2022

Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization.
Sensors, 2022

LSTM based decision support system for swing trading in stock market.
Knowl. Based Syst., 2022

FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique.
J. Sensors, 2022

Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism.
J. Sensors, 2022

Improvement of the Resilience of a Microgrid Using Fragility Modeling and Simulation.
J. Electr. Comput. Eng., 2022

Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm.
J. Cloud Comput., 2022

Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm.
Int. J. Web Based Learn. Teach. Technol., 2022

Content and Popularity-Based Music Recommendation System.
Int. J. Inf. Syst. Model. Des., 2022

Prognosis of Urban Environs using Time Series Analysis for Preventing Overexploitation using Artificial Intelligence.
Int. J. Data Anal. Tech. Strateg., 2022

Three-phase service level agreements and trust management model for monitoring and managing the services by trusted cloud broker.
IET Commun., 2022

An optimization-based machine learning technique for smart home security using 5G.
Comput. Electr. Eng., 2022

Hyper spectral image classifications for monitoring harvests in agriculture using fly optimization algorithm.
Comput. Electr. Eng., 2022

A machine learning algorithm for classification of mental tasks.
Comput. Electr. Eng., 2022

Design of Soccer League Optimization Based Hybrid Controller for Solar-Battery Integrated UPQC.
IEEE Access, 2022

An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System.
IEEE Access, 2022

An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks.
IEEE Access, 2022

Cervical Cancer Diagnosis Using Intelligent Living Behavior of Artificial Jellyfish Optimized With Artificial Neural Network.
IEEE Access, 2022

Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks.
Proceedings of the 96th Vehicular Technology Conference, 2022

2021
An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems.
IEEE Access, 2021

2020
Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm.
IET Inf. Secur., 2020

2017
An enhanced optimization based algorithm for intrusion detection in SCADA network.
Comput. Secur., 2017


  Loading...