Fake profile detection techniques in large-scale online social networks: A comprehensive review D Ramalingam, V Chinnaiah Computers & Electrical Engineering 65, 165-177, 2018 | 150 | 2018 |
Link failure recovery using shortest path fast rerouting technique in SDN V Muthumanikandan, C Valliyammai Wireless Personal Communications 97, 2475-2495, 2017 | 43 | 2017 |
# ChennaiFloods: leveraging human and machine learning for crisis mapping during disasters using social media B Anbalagan, C Valliyammai 2016 IEEE 23rd international conference on high performance computing …, 2016 | 31 | 2016 |
Resource allocation issues and challenges in cloud computing ST Selvi, C Valliyammai, VN Dhatchayani 2014 International Conference on Recent Trends in Information Technology, 1-6, 2014 | 28 | 2014 |
Information entropy based event detection during disaster in cyber-social networks A Bhuvaneswari, C Valliyammai Journal of Intelligent & Fuzzy Systems 36 (5), 3981-3992, 2019 | 25 | 2019 |
A top web security vulnerability SQL injection attack—Survey J Abirami, R Devakunchari, C Valliyammai 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-9, 2015 | 25 | 2015 |
Predicting the risk of readmission of diabetic patients using MapReduce M Gowsalya, K Krushitha, C Valliyammai 2014 Sixth International Conference on Advanced Computing (ICoAC), 297-301, 2014 | 21 | 2014 |
An enhanced deep learning model for duplicate question pairs recognition K Abishek, BR Hariharan, C Valliyammai Soft Computing in Data Analytics: Proceedings of International Conference on …, 2019 | 18 | 2019 |
Semantics-based sensitive topic diffusion detection framework towards privacy aware online social networks C Valliyammai, A Bhuvaneswari Cluster Computing 22, 407-422, 2019 | 16 | 2019 |
Social context based Naive Bayes filtering of spam messages from online social networks CC Kiliroor, C Valliyammai Soft Computing in Data Analytics: Proceedings of International Conference on …, 2019 | 15 | 2019 |
A survey on link failures in software defined networks V Muthumanikandan, C Valliyammai 2015 Seventh International Conference on Advanced Computing (ICoAC), 1-5, 2015 | 14 | 2015 |
Social IoT-enabled emergency event detection framework using geo-tagged microblogs and crowdsourced photographs A Bhuvaneswari, C Valliyammai Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 12 | 2019 |
Trust analysis on social networks for identifying authenticated users CC Kiliroor, C Valliyammai 2016 Eighth International Conference on Advanced Computing (ICoAC), 37-41, 2017 | 12 | 2017 |
A grid resource brokering strategy based on resource and network performance in grid V Chinnaiah, TS Somasundaram Future Generation Computer Systems 28 (3), 491-499, 2012 | 12 | 2012 |
Congestion-free transient plane (CFTP) using bandwidth sharing during link failures in SDN M Vanamoorthy, V Chinnaiah The Computer Journal 63 (6), 832-843, 2020 | 11 | 2020 |
Blockchain-based secure big data storage on cloud D Manikandan, C Valliyammai, RN Karthika Int J Recent Technol Engg 9 (4), 37-45, 2020 | 10 | 2020 |
A cloud resource allocation strategy based on fitness based live migration and clustering V Chinnaiah, S Gudi Pudi, TS Somasundaram, SS Basha Wireless Personal Communications 98, 2943-2958, 2018 | 10 | 2018 |
An intelligent personalized recommendation for travel group planning based on reviews C Valliyammai, R PrasannaVenkatesh, C Vennila, SG Krishnan 2016 Eighth International Conference on Advanced Computing (ICoAC), 67-71, 2017 | 10 | 2017 |
Dynamic resource management in cloud ST Selvi, C Valliyammai, GP Sindhu, SS Basha 2014 Sixth International Conference on Advanced Computing (ICoAC), 287-291, 2014 | 9 | 2014 |
Distributed and scalable Sybil identification based on nearest neighbour approximation using big data analysis techniques C Valliyammai, R Devakunchari Cluster Computing 22 (Suppl 6), 14461-14476, 2019 | 8 | 2019 |