Yashwant Singh

Orcid: 0000-0003-2833-2093

According to our database1, Yashwant Singh authored at least 26 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks.
Discov. Internet Things, December, 2023

Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review.
Int. J. Artif. Intell. Tools, March, 2023

Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
Sensors, 2023

Federated Learning Based Privacy Ensured Sensor Communication in IoT Networks: A Taxonomy, Threats and Attacks.
IEEE Access, 2023

2022
A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

Intrusion Detection System Model for IoT Networks Using Ensemble Learning.
J. Interconnect. Networks, 2022

IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities.
Expert Syst. J. Knowl. Eng., 2022

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope.
Comput. Commun., 2022

2021
Internet of Things: Evolution, Concerns and Security Challenges.
Sensors, 2021

A systematic survey on internet of things: Energy efficiency and interoperability perspective.
Trans. Emerg. Telecommun. Technol., 2021

Metaheuristic Routing: A Taxonomy and Energy-Efficient Framework for Internet of Things.
IEEE Access, 2021

2020
An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare.
Sensors, 2020

An Intelligent Opportunistic Routing Protocol for Big Data in WSNs.
Int. J. Multim. Data Eng. Manag., 2020

Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm.
Int. J. Inf. Comput. Secur., 2020

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges.
IEEE Access, 2020

Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts.
Proceedings of the 12th International Conference on Electronics, 2020

2019
Reauthentication scheme for mobile wireless sensor networks.
Sustain. Comput. Informatics Syst., 2019

Deployment and Coverage in Wireless Sensor Networks: A Perspective.
Proceedings of the 11th International Conference on Electronics, 2019

Machine Learning-based Software Effort Estimation: An Analysis.
Proceedings of the 11th International Conference on Electronics, 2019

2018
Node authentication algorithm for securing static wireless sensor networks from node clone attack.
Int. J. Inf. Comput. Secur., 2018

2017
An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network.
Int. J. Inf. Syst. Model. Des., 2017

2015
Middle Position Dynamic Energy Opportunistic Routing for Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2013
Distributed Event Detection in Wireless Sensor Networks for Forest Fires.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

2012
Energy reduction in weakly hard real time systems.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
Incorporating AOSD to Enhance Model Driven Architecture.
J. Softw. Eng. Appl., 2011

2009
Models and Transformations in MDA.
Proceedings of the First International Conference on Computational Intelligence, 2009


  Loading...