关注
Chithra Selvaraj
Chithra Selvaraj
Department of Computer Technology, Anna University, MIT Campus
在 annauniv.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on technologies and security protocols: Reference for future generation IoT
R Yugha, S Chithra
Journal of Network and Computer Applications 169, 102763, 2020
1442020
A survey on security issues of reputation management systems for peer-to-peer networks
C Selvaraj, S Anand
Computer science review 6 (4), 145-160, 2012
602012
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
ST Revathi, N Ramaraj, S Chithra
Cluster Computing 22, 3521-3530, 2019
342019
Peer profile based trust model for P2P systems using genetic algorithm
C Selvaraj, S Anand
Peer-to-Peer Networking and Applications 5, 92-103, 2012
342012
Performance analysis of IoT protocol under different mobility models
K Kabilan, N Bhalaji, C Selvaraj, M Kumaar, PTR Karthikeyan
Computers & Electrical Engineering 72, 154-168, 2018
332018
Empirical study of feature selection methods over classification algorithms
N Bhalaji, KBS Kumar, C Selvaraj
International Journal of Intelligent Systems Technologies and Applications …, 2018
322018
Proactive maintenance of small wind turbines using IoT and machine learning models
Y Selvaraj, C Selvaraj
International Journal of Green Energy 19 (5), 463-475, 2022
142022
BCI cinematics–A pre-release analyser for movies using H2O deep learning platform
SK KB, G Krishna, N Bhalaji, S Chithra
Computers & Electrical Engineering 74, 547-556, 2019
132019
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
S Thanga Revathi, N Ramaraj, S Chithra
Cluster Computing 22 (Suppl 2), 3521-3530, 2019
112019
Portable text to speech converter for the visually impaired
K Ragavi, P Radja, S Chithra
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
92016
Tracy–Singh product and genetic whale optimization algorithm for retrievable data perturbation for privacy preserved data publishing in cloud computing
T Revathi S, N Ramaraj, S Chithra
The Computer Journal 63 (2), 239-253, 2020
82020
Attribute based trust evaluation for secure RPL protocol in IoT environment
R Yugha, S Chithra
2019 International Conference on Vision towards Emerging Trends in …, 2019
82019
Enhanced portable text to speech converter for visually impaired
C Selvaraj, N Bhalaji
International Journal of Intelligent Systems Technologies and Applications …, 2018
82018
Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
N Bhalaji, C Selvaraj
Proceedings of International Conference on Communication and Networks …, 2017
72017
Machine learning based spectrum prediction in cognitive radio networks
P Pandian, C Selvaraj, N Bhalaji, KGA Depak, S Saikrishnan
2023 International Conference on Networking and Communications (ICNWC), 1-6, 2023
52023
Analysis of 6LOWPAN and CoAP Protocols for Maternal Health Care
K Kabilan, N Bhalaji, S Chithra
Microelectronics, Electromagnetics and Telecommunications: Proceedings of …, 2019
42019
Bio-sensor authentication for medical applications using WBAN
G Venkatesan, C Selvaraj
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
42016
A role based trust model for peer to peer systems using credential trees
C Selvaraj, S Anand
International Journal of Computer Theory and Engineering 3 (2), 234, 2011
42011
An Effective Crack Identification in Civil Infrastructure with IoT and Improved Convolutional Neural Network
S Yoganand, S Chithra
International Journal of Structural Stability and Dynamics 22 (12), 2250128, 2022
22022
NoRegINT—A Tool for Performing OSINT and Analysis from Social Media
S Karthika, N Bhalaji, S Chithra, N Sri Harikarthick, D Bhattacharya
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2021
22021
系统目前无法执行此操作,请稍后再试。
文章 1–20