Community detection in social networks P Bedi, C Sharma Wiley interdisciplinary reviews: Data mining and knowledge discovery 6 (3 …, 2016 | 403 | 2016 |
Optimized gray-scale image watermarking using DWT–SVD and Firefly Algorithm A Mishra, C Agarwal, A Sharma, P Bedi Expert Systems with Applications 41 (17), 7858-7867, 2014 | 319 | 2014 |
Plant disease detection using hybrid model based on convolutional autoencoder and convolutional neural network P Bedi, P Gole Artificial Intelligence in Agriculture 5, 90-101, 2021 | 237 | 2021 |
Trust Based Recommender System for Semantic Web. P Bedi, H Kaur, S Marwaha IJCAI 7, 2677-2682, 2007 | 229 | 2007 |
Minutiae extraction from fingerprint images-a review R Bansal, P Sehgal, P Bedi arXiv preprint arXiv:1201.1422, 2011 | 186 | 2011 |
Trust based recommender system using ant colony for trust computation P Bedi, R Sharma Expert Systems with Applications 39 (1), 1183-1190, 2012 | 171 | 2012 |
I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems P Bedi, N Gupta, V Jindal Applied Intelligence 51 (2), 1133-1151, 2021 | 129 | 2021 |
Siam-IDS: Handling class imbalance problem in intrusion detection systems using siamese neural network P Bedi, N Gupta, V Jindal Procedia Computer Science 171, 780-789, 2020 | 100 | 2020 |
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems N Gupta, V Jindal, P Bedi Computers & Security 112, 102499, 2022 | 98 | 2022 |
E-waste management using blockchain based smart contracts N Gupta, P Bedi 2018 International Conference on Advances in Computing, Communications and …, 2018 | 86 | 2018 |
Using PSO in a spatial domain based image hiding scheme with distortion tolerance P Bedi, R Bansal, P Sehgal Computers & Electrical Engineering 39 (2), 640-654, 2013 | 86 | 2013 |
Predicting the priority of a reported bug using machine learning techniques and cross project validation M Sharma, P Bedi, KK Chaturvedi, VB Singh 2012 12th international conference on intelligent systems design and …, 2012 | 85 | 2012 |
LIO-IDS: Handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system N Gupta, V Jindal, P Bedi Computer Networks 192, 108076, 2021 | 68 | 2021 |
Use of big data technology in vehicular ad-hoc networks P Bedi, V Jindal 2014 International Conference on Advances in Computing, Communications and …, 2014 | 64 | 2014 |
Empowering recommender systems using trust and argumentation P Bedi, P Vashisth Information sciences 279, 569-586, 2014 | 64 | 2014 |
Avoiding traffic jam using ant colony optimization-a novel approach P Bedi, N Mediratta, S Dhand, R Sharma, A Singhal International Conference on Computational Intelligence and Multimedia …, 2007 | 64 | 2007 |
Evaluating web usability from the user’s perspective H Banati, P Bedi, PS Grover Journal of Computer Science 2 (4), 314-317, 2006 | 61 | 2006 |
Focused crawling of tagged web resources using ontology P Bedi, A Thukral, H Banati Computers & Electrical Engineering 39 (2), 613-628, 2013 | 55 | 2013 |
Multimodal biometric authentication using PSO based watermarking P Bedi, R Bansal, P Sehgal Procedia Technology 4, 612-618, 2012 | 55 | 2012 |
Beginning with big data simplified P Bedi, V Jindal, A Gautam 2014 International Conference on Data Mining and Intelligent Computing …, 2014 | 49 | 2014 |