Umesh Kumar Lilhore

Orcid: 0000-0001-6073-3773

According to our database1, Umesh Kumar Lilhore authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A smart waste classification model using hybrid CNN-LSTM with transfer learning for sustainable environment.
Multim. Tools Appl., March, 2024

A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning.
Comput. Secur., January, 2024

2023
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing.
J. Cloud Comput., December, 2023

Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput., December, 2023

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree.
J. Cloud Comput., December, 2023

HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning.
Sensors, September, 2023

An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering.
Sensors, September, 2023

Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model.
Array, September, 2023

Optimized LightGBM model for security and privacy issues in cyber-physical systems.
Trans. Emerg. Telecommun. Technol., June, 2023

ProRE: An ACO- based programmer recommendation model to precisely manage software bugs.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain.
IEEE Access, 2023

2022
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
Sensors, 2022

A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method.
Sensors, 2022

A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2022

Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205.
Comput. Electr. Eng., 2022

A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography.
Comput. Electr. Eng., 2022

2012
A New Approach to Overcome Problem of Congestion in Wireless Networks.
Proceedings of the Intelligent Informatics, 2012


  Loading...