An Intrusion Detection System using Network Traffic Profiling and Online Sequential Extreme Learning Machine R Singh, H Kumar, RK Singla Expert Systems with Applications, 2015 | 300 | 2015 |
Deep learning-based object detection in low-altitude UAV datasets: A survey P Mittal, R Singh, A Sharma Image and Vision computing 104, 104046, 2020 | 227 | 2020 |
Network augmentation by dynamically splitting the switching function in SDN BS Rawal, G Manogaran, R Singh, M Poongodi, M Hamdi 2021 IEEE International Conference on Communications Workshops (ICC …, 2021 | 160 | 2021 |
Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data K Bajaj, B Sharma, R Singh Complex & Intelligent Systems 8 (5), 3641-3658, 2022 | 104 | 2022 |
Internet attacks and intrusion detection system: A review of the literature R Singh, H Kumar, RK Singla, RR Ketti Online Information Review 41 (2), 171-184, 2017 | 94 | 2017 |
Integration of WSN with IoT applications: a vision, architecture, and future challenges K Bajaj, B Sharma, R Singh Integration of WSN and IoT for Smart Cities, 79-102, 2020 | 79 | 2020 |
Statistical vertical reduction‐based data abridging technique for big network traffic dataset S Garg, R Singh, MS Obaidat, VK Bhalla, B Sharma International Journal of Communication Systems 33 (4), e4249, 2020 | 67 | 2020 |
Heart sound classification using machine learning and phonocardiogram V Arora, R Leekha, R Singh, I Chana Modern Physics Letters B 33 (26), 1950321, 2019 | 65 | 2019 |
TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset R Singh, H Kumar, RK Singla International Journal of Engineering and Technology 5 (6), 4598-4604, 2013 | 31 | 2013 |
Dilated convolution based RCNN using feature fusion for Low-Altitude aerial objects P Mittal, A Sharma, R Singh, V Dhull Expert Systems with Applications 199, 117106, 2022 | 28 | 2022 |
A Reference Dataset for Network Traffic Activity Based Intrusion Detection System R Singh, H Kumar, RK Singla International Journal of Computers, Communications & Control 10 (3), 390-402, 2015 | 22 | 2015 |
Analysis of Feature Selection Techniques for Network Traffic Dataset R Singh, H Kumar, RK Singla International Conference on Machine Intelligence and Research Advancement …, 2013 | 22 | 2013 |
Securing fog computing with a decentralised user authentication approach based on blockchain O Umoren, R Singh, Z Pervez, K Dahal Sensors 22 (10), 3956, 2022 | 21 | 2022 |
Blockchain-enabled end-to-end encryption for instant messaging applications R Singh, ANS Chauhan, H Tewari 2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and …, 2022 | 20 | 2022 |
Review of Soft Computing in Malware Detection R Singh, H Kumar, RK Singla Special issues on IP Multimedia Communications 1, 55-60, 2011 | 19 | 2011 |
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices S Kumari, M Singh, R Singh, H Tewari Computer Networks 217, 109327, 2022 | 17 | 2022 |
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey S Kumari, M Singh, R Singh, H Tewari Software: Practice and Experience, 2022 | 17 | 2022 |
Framework of data privacy preservation and location obfuscation in vehicular cloud networks H Al‐Balasmeh, M Singh, R Singh Concurrency and Computation: Practice and Experience 34 (5), e6682, 2022 | 14 | 2022 |
Key management using Chebyshev polynomials for mobile ad hoc networks KR Ramkumar, R Singh China Communications 14 (11), 237-246, 2017 | 12 | 2017 |
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices S Kumari, M Singh, R Singh, H Tewari Knowledge-Based Systems 253, 109543, 2022 | 11 | 2022 |