Vaidehi Vijayakumar

Orcid: 0000-0002-9524-5291

According to our database1, Vaidehi Vijayakumar authored at least 74 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Social network malicious insider detection using time-based trust evaluation.
Ann. des Télécommunications, October, 2023

Detection of fraudulent marketing of consumer product in social networking services.
J. Intell. Fuzzy Syst., 2023

An unsupervised approach for personalized RHM with reduced mean alert latency.
J. Intell. Fuzzy Syst., 2023

Suppressing Rain Streak Weather Noise for Recognizing Overturned Accidental Car Vehicle License Plate.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud.
Multim. Tools Appl., 2022

ALBERT-based fine-tuning model for cyberbullying analysis.
Multim. Syst., 2022

TOPSIS inspired cost-efficient concurrent workflow scheduling algorithm in cloud.
J. King Saud Univ. Comput. Inf. Sci., 2022

Reliable budget aware workflow scheduling strategy on multi-cloud environment.
Clust. Comput., 2022

2021
A Stable Clustering Scheme with Node Prediction in MANET.
Int. J. Commun. Networks Inf. Secur., 2021

Comprehensive analysis of embeddings and pre-training in NLP.
Comput. Sci. Rev., 2021

Cost-effective workflow scheduling approach on cloud under deadline constraint using firefly algorithm.
Appl. Intell., 2021

2020
Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.
J. Medical Syst., 2020

Adaptive density based data mining technique for detection of abnormalities in traffic video surveillance.
J. Intell. Fuzzy Syst., 2020

Intelligent Personalized Abnormality Detection for Remote Health Monitoring.
Int. J. Intell. Inf. Technol., 2020

Detecting abnormal events in traffic video surveillance using superorientation optical flow feature.
IET Image Process., 2020

Budget aware scheduling algorithm for workflow applications in IaaS clouds.
Clust. Comput., 2020

Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks.
IEEE Access, 2020

2019
Role-based policy to maintain privacy of patient health records in cloud.
J. Supercomput., 2019

OAFPM: optimized ANFIS using frequent pattern mining for activity recognition.
J. Supercomput., 2019

Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering.
Multim. Tools Appl., 2019

Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks.
IET Networks, 2019

Hybrid decision trees for data streams based on Incremental Flexible Naive Bayes prediction at leaf nodes.
Evol. Intell., 2019

A Survey on malware analysis and mitigation techniques.
Comput. Sci. Rev., 2019

WC-PAD: Web Crawling based Phishing Attack Detection.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

2018
Futuristic cyber-attacks.
Int. J. Knowl. Based Intell. Eng. Syst., 2018

Hybrid feature descriptors to detect face spoof attacks.
J. Intell. Fuzzy Syst., 2018

A Novel Approach for Face Recognition under Varying Illumination Conditions.
Int. J. Intell. Inf. Technol., 2018

Symmetric Uncertainty Based Search Space Reduction for Fast Face Recognition.
Int. J. Intell. Inf. Technol., 2018

Hybrid Analysis Technique to detect Advanced Persistent Threats.
Int. J. Intell. Inf. Technol., 2018

2017
Improved Searchable Attribute Based Encryption in Cloud.
J. Inf. Sci. Eng., 2017

Anomalous Event Detection in Traffic Video Surveillance Based on Temporal Pattern Analysis.
J. Comput., 2017

A secure cloud based Personal Health Record framework for a multi owner environment.
Ann. des Télécommunications, 2017

Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Analyzing ConvNets Depth for Deep Face Recognition.
Proceedings of 2nd International Conference on Computer Vision & Image Processing, 2017

2016
Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks.
Int. Arab J. Inf. Technol., 2016

Pose estimation in real time video using Tri-Line method.
Proceedings of the Sixth International Symposium on Embedded Computing and System Design, 2016

2015
Sensor based efficient decision making framework for remote healthcare.
J. Ambient Intell. Smart Environ., 2015

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application.
KSII Trans. Internet Inf. Syst., 2015

Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events.
KSII Trans. Internet Inf. Syst., 2015

Complex Event Refinement by Statistical Augmentation Model.
Int. J. Intell. Inf. Technol., 2015

Optimum steepest descent higher level learning radial basis function network.
Expert Syst. Appl., 2015

A genetic approach for personalized healthcare.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

An efficient rule balancing for scalable complex event processing.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT).
Proceedings of the Advanced Computing and Systems for Security - ACSS 2015, 2015

2014
Hierarchical Particle Swarm Optimization with Ortho-Cyclic Circles.
Expert Syst. Appl., 2014

Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion.
J. Comput. Sci., 2013

Performance Analysis of Various Artificial Intelligent Neural Networks for GPS/INS Integration.
Appl. Artif. Intell., 2013

Fusion of multisensor images using Nonsubsampled Contourlet Transform and Fuzzy Logic.
Proceedings of the FUZZ-IEEE 2013, 2013

SOA Framework for Geriatric Remote Health Care Using Wireless Sensor Network.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Qos Enhancement in Wireless VoIP Networks Using Interactive Multiple Model Based Kalman Filter.
Wirel. Pers. Commun., 2012

2011
Analysis of Frequency Reuse and Throughput Enhancement in WiMAX Systems.
Wirel. Pers. Commun., 2011

QoS guaranteed integration methodology for a WLAN-WiMAX heterogeneous network.
Comput. Electr. Eng., 2011

Cache based ant colony routing algorithm for mobile ad hoc networks.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
Secure Group Key Management Scheme for Multicast Networks.
Int. J. Netw. Secur., 2010

Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
CoRR, 2010

Integration of INS and GPS using radial basis function neural networks for vehicular navigation.
Proceedings of the 11th International Conference on Control, 2010

Real-time INS/GPS data fusion using hybrid adaptive network based fuzzy inference.
Proceedings of the 11th International Conference on Control, 2010

Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Fuzzy Rule-Base Based Intrusion Detection System on Application Layer.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks.
Proceedings of the Recent Trends in Network Security and Applications, 2010

VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2008
A pragmatic analysis of user mobility patterns in macrocellular wireless networks.
Pervasive Mob. Comput., 2008

Performance Analysis of Soft Computing Based Anomaly Detectors.
Int. J. Netw. Secur., 2008

2007
Performance Analysis of UWB Channels for Wireless Personal Area Networks.
Wirel. Pers. Commun., 2007

Design of efficient architectures for 1-D and 2-D DLMS adaptive filters.
Integr., 2007

SeReRoM: Secured Reliable Routing Scheme for Multicasting.
Int. J. Netw. Secur., 2007

Multi-path routing scheme for non-interactive multicast communications.
Int. J. Netw. Manag., 2007

Semantic query Cache using Dynamic Facts (SCDF): a novel approach to efficient information retrieval.
Int. J. Metadata Semant. Ontologies, 2007

2006
Context based Application Level Intrusion Detection System.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

2003
Erratum to "VLSI based fuzzy logic controller enabled adaptive interactive multiple model for target tracking" [Integration 35 (2003) 1-10].
Integr., 2003

2001
Neural network aided Kalman filtering for multitarget tracking applications.
Comput. Electr. Eng., 2001

1999
An Aided Genetic Algorithm for Multiprocessor Scheduling.
Parallel Process. Lett., 1999


  Loading...