Sunil Kumar

Orcid: 0000-0002-1953-6273

Affiliations:
  • Manipal University Jaipur, Jaipur, Rajasthan, India


According to our database1, Sunil Kumar authored at least 16 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain.
J. Intell. Manuf., December, 2025

Hybrid IoT-CAD system: optimized feature selection based gated recurrent residual deep learning for cyber attack detection in IoT networks.
Discov. Internet Things, December, 2025

A fair and interpretable deep learning approach for healthcare access prediction in underserved communities.
Discov. Artif. Intell., December, 2025

Unveiling the future: A comprehensive analysis of 6G technology and its transformative potential.
Telecommun. Syst., September, 2025

Enhancing Network Slicing Efficiency in 6G Networks With a Hybrid Deep Learning Approach Leveraging Crisscross Harris Hawks Optimization.
IEEE Commun. Stand. Mag., September, 2025

Harnessing machine learning for academic insight: A study of educational performance in Bhopal, India.
Educ. Inf. Technol., June, 2025

2024
Optimized transfer learning approach for leaf disease classification in smart agriculture.
Multim. Tools Appl., June, 2024

Efficient deepfake detection using shallow vision transformer.
Multim. Tools Appl., January, 2024

SHC: 8-bit Compact and Efficient S-Box Structure for Lightweight Cryptography.
IEEE Access, 2024

2023
Performance and security analysis using B-128 modified blowfish algorithm.
Multim. Tools Appl., July, 2023

Human brain tumor classification and segmentation using CNN.
Multim. Tools Appl., February, 2023

Performance evaluation and design of B-128 modified Blowfish algorithm.
Secur. Priv., 2023

Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach.
J. Mobile Multimedia, 2023

2018
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018

Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2018

2016
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges.
Secur. Commun. Networks, 2016


  Loading...