Comparative analysis of Android and iOS from security viewpoint S Garg, N Baliyan Computer Science Review 40, 100372, 2021 | 99 | 2021 |
A novel parallel classifier scheme for vulnerability detection in android S Garg, N Baliyan Computers & Electrical Engineering 77, 12-26, 2019 | 45 | 2019 |
Obesity prediction using ensemble machine learning approaches K Jindal, N Baliyan, PS Rana Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2018 | 43 | 2018 |
Quality assessment of software as a service on cloud using fuzzy logic N Baliyan, S Kumar Cloud Computing in Emerging Markets (CCEM), 2013 IEEE International …, 2013 | 40 | 2013 |
Android security assessment: A review, taxonomy and research gap study S Garg, N Baliyan Computers & Security 100, 102087, 2021 | 32 | 2021 |
A study of recent recommender system techniques S Bansal, N Baliyan International Journal of Knowledge and Systems Science (IJKSS) 10 (2), 13-41, 2019 | 31 | 2019 |
Prediction of heart disease severity with hybrid data mining M Saini, N Baliyan, V Bassi 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 24 | 2017 |
Bi-MARS: a bi-clustering based memetic algorithm for recommender systems S Bansal, N Baliyan Applied Soft Computing 97, 106785, 2020 | 20 | 2020 |
Data on vulnerability detection in android S Garg, N Baliyan Data in brief 22, 1081-1087, 2019 | 20 | 2019 |
Software process and quality evaluation for semantic web applications N Baliyan, S Kumar IETE Technical Review 31 (6), 452-462, 2014 | 16 | 2014 |
Towards software engineering paradigm for software as a service N Baliyan, S Kumar Contemporary Computing (IC3), 2014 Seventh International Conference on, 329-333, 2014 | 16 | 2014 |
Quality evaluation of ontologies S Kumar, N Baliyan, S Kumar, N Baliyan Semantic Web-Based Systems: Quality Assessment Models, 19-50, 2018 | 11 | 2018 |
M2VMapper: Malware-to-Vulnerability mapping for Android using text processing S Garg, N Baliyan Expert Systems with Applications 191, 116360, 2022 | 10 | 2022 |
Improved market basket analysis with utility mining N Srivastava, K Gupta, N Baliyan Proceedings of 3rd international conference on internet of things and …, 2018 | 10 | 2018 |
Grey wolf optimization with fuzzy logic for energy‐efficient communication in wireless sensor network‐based Internet of Things scenario K Verma, N Baliyan International Journal of Communication Systems 34 (17), e4981, 2021 | 9 | 2021 |
Machine learning based android vulnerability detection: A roadmap S Garg, N Baliyan Information Systems Security: 16th International Conference, ICISS 2020 …, 2020 | 9 | 2020 |
Hadoop based analysis and visualization of diabetes data through tableau P Bhardwaj, N Baliyan 2019 Twelfth International Conference on Contemporary Computing (IC3), 1-5, 2019 | 9 | 2019 |
Ontology cohesion and coupling metrics S Kumar, N Baliyan, S Sukalikar International Journal on Semantic Web and Information Systems (IJSWIS) 13 (4 …, 2017 | 8 | 2017 |
PAM clustering based taxi hotspot detection for informed driving N Verma, N Baliyan 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 8 | 2017 |
An Ontology-Based Approach for Test Case Reuse S Dalal, S Kumar, N Baliyan Intelligent Computing, Communication and Devices, Series: Advances in …, 2015 | 8 | 2015 |