default search action
Kamlesh Dutta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta:
Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review. Int. J. Inf. Comput. Secur. 24(3/4): 284-321 (2024) - [j41]Pooja Rani, Kamlesh Dutta, Vijay Kumar:
Performance evaluation of drug synergy datasets using computational intelligence approaches. Multim. Tools Appl. 83(3): 8971-8997 (2024) - [j40]Upinder Kaur, Aparna N. Mahajan, Sunil Kumar, Kamlesh Dutta:
Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs. Wirel. Pers. Commun. 138(2): 819-859 (2024) - [i2]Subramanyam Sahoo, Kamlesh Dutta:
Boardwalk Empire: How Generative AI is Revolutionizing Economic Paradigms. CoRR abs/2410.15212 (2024) - 2023
- [j39]Arun Kumar, Kamlesh Dutta, Abhishek Srivastava:
Topological and Dimensional constraints based optimal placement of Layout Entities using Clustering and Genetic Algorithm. Appl. Soft Comput. 132: 109867 (2023) - [j38]Parnika Bhat, Sunny Behal, Kamlesh Dutta:
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning. Comput. Secur. 130: 103277 (2023) - [j37]Pooja Rani, Kamlesh Dutta, Vijay Kumar:
Drug synergy model for malignant diseases using deep learning. J. Bioinform. Comput. Biol. 21(3): 2350014:1-2350014:18 (2023) - [j36]Arun Kumar, Kamlesh Dutta, Abhishek Srivastava:
Generating Automated Layout Design using a Multi-population Genetic Algorithm. J. Web Eng. 22(2): 357-384 (2023) - [j35]Kusum Lata, Pardeep Singh, Kamlesh Dutta:
Semi-automatic Annotation for Mentions in Hindi Text. SN Comput. Sci. 4(5): 515 (2023) - [i1]Kusum Lata, Pardeep Singh, Kamlesh Dutta:
SMDDH: Singleton Mention detection using Deep Learning in Hindi Text. CoRR abs/2301.09361 (2023) - 2022
- [j34]Kusum Lata, Pardeep Singh, Kamlesh Dutta:
Mention detection in coreference resolution: survey. Appl. Intell. 52(9): 9816-9860 (2022) - [j33]Pooja Rani, Kamlesh Dutta, Vijay Kumar:
Artificial intelligence techniques for prediction of drug synergy in malignant diseases: Past, present, and future. Comput. Biol. Medicine 144: 105334 (2022) - [j32]Parnika Bhat, Kamlesh Dutta:
A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9464-9477 (2022) - [j31]Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta:
Evaluating the Performance of Various SVM Kernel Functions Based on Basic Features Extracted from KDDCUP'99 Dataset by Random Forest Method for Detecting DDoS Attacks. Wirel. Pers. Commun. 123(4): 3127-3145 (2022) - 2021
- [j30]Kusum Lata, Pardeep Singh, Kamlesh Dutta:
A comprehensive review on feature set used for anaphora resolution. Artif. Intell. Rev. 54(4): 2917-3006 (2021) - [j29]Parnika Bhat, Kamlesh Dutta:
CogramDroid-An approach towards malware detection in Android using opcode ngrams. Concurr. Comput. Pract. Exp. 33(20) (2021) - 2020
- [j28]Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta:
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks. Int. J. Secur. Priv. Pervasive Comput. 12(4): 1-18 (2020) - [j27]Kaushik Adhikary, Shashi Bhushan, Sunil Kumar, Kamlesh Dutta:
Hybrid Algorithm to Detect DDoS Attacks in VANETs. Wirel. Pers. Commun. 114(4): 3613-3634 (2020) - [c6]Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Gitanshu, Kamlesh Dutta:
Distributed routing for underwater wireless sensor networks using cuckoo search-ant colony optimization. ICDCN 2020: 39:1-39:5
2010 – 2019
- 2019
- [j26]Parnika Bhat, Kamlesh Dutta:
A Survey on Various Threats and Current State of Security in Android Platform. ACM Comput. Surv. 52(1): 21:1-21:35 (2019) - [j25]Kamlesh Dutta, Varun Gupta, Vachik S. Dave:
Analysis and Comparison of Neural Network Models for Software Development Effort Estimation. J. Cases Inf. Technol. 21(2): 88-112 (2019) - [c5]Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Kamlesh Dutta:
Dependability Analysis for On-Demand Computing Based Transaction Processing System. AINA 2019: 188-199 - 2018
- [j24]Poonam Tanwar, T. V. Prasad, Kamlesh Dutta:
Natural language processing for hybrid knowledge representation. Int. J. Adv. Intell. Paradigms 10(3): 223-235 (2018) - [j23]Sunil Kumar, Kamlesh Dutta, Anjani Garg:
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks. Wirel. Pers. Commun. 101(4): 1901-1927 (2018) - [j22]Sunil Kumar, Kamlesh Dutta:
Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks. Wirel. Pers. Commun. 101(4): 2029-2052 (2018) - 2017
- [j21]Mukesh Kumar, Kamlesh Dutta:
Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN. Int. J. Inf. Secur. Priv. 11(1): 35-51 (2017) - 2016
- [j20]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Historical prioritisation and reprioritisations using hierarchical historical R-tree. Int. J. Comput. Appl. Technol. 54(4): 257-265 (2016) - [j19]Sunil Kumar, Kamlesh Dutta:
Securing Mobile Ad Hoc Networks: Challenges and Solutions. Int. J. Handheld Comput. Res. 7(1): 26-76 (2016) - [j18]Priyanka Dadhich, Kamlesh Dutta, Mahesh Chandra Govil:
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities. Int. J. Secur. Networks 11(1/2): 48-65 (2016) - [j17]Sunil Kumar, Kamlesh Dutta:
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur. Commun. Networks 9(14): 2484-2556 (2016) - 2015
- [j16]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Hybrid regression testing technique: based on requirement priorities, fault and modification history. Int. J. Comput. Appl. Technol. 51(4): 352-365 (2015) - [j15]Sunil Kumar, Kamlesh Dutta:
Intrusion detection technique for black hole attack in mobile ad hoc networks. Int. J. Inf. Priv. Secur. Integr. 2(2): 81-101 (2015) - [j14]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Hybrid Regression Testing Based on Path Pruning. Int. J. Syst. Serv. Oriented Eng. 5(1): 35-55 (2015) - [j13]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Requirement Prioritization of Complex Web 2.0 Application based on Effects on Regression Testing: A Hybrid Approach. Int. J. Syst. Serv. Oriented Eng. 5(3): 18-37 (2015) - 2014
- [j12]Vachik S. Dave, Kamlesh Dutta:
Neural network based models for software effort estimation: a review. Artif. Intell. Rev. 42(2): 295-307 (2014) - [j11]Anil Singh, Kamlesh Dutta, Avtar Singh:
Resource Allocation in Cloud Computing Environment using AHP Technique. Int. J. Cloud Appl. Comput. 4(1): 33-44 (2014) - [j10]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Requirement reprioritisation for pairwise compared requirements. Int. J. Comput. Aided Eng. Technol. 6(1): 29-47 (2014) - [j9]Varun Gupta, Durg Singh Chauhan, Chetna Gupta, Kamlesh Dutta:
Current prioritisation and reprioritisation practices: a case study approach. Int. J. Comput. Aided Eng. Technol. 6(2): 159-170 (2014) - [c4]Pardeep Singh, Kamlesh Dutta:
Semiautomatic annotation scheme for demonstrative pronoun considering indirect anaphora for Hindi. ICACCI 2014: 1710-1714 - 2013
- [j8]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Incremental development & revolutions of E-learning software systems in education sector: a case study approach. Hum. centric Comput. Inf. Sci. 3: 8 (2013) - 2012
- [j7]Varun Gupta, Durg Singh Chauhan, Kamlesh Dutta:
Regression Testing-Based Requirement Prioritization of Mobile Applications. Int. J. Syst. Serv. Oriented Eng. 3(4): 20-39 (2012) - [c3]Tumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta:
Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password. ACITY (1) 2012: 11-22 - 2011
- [j6]Kamlesh Dutta, Siddhant Sarthak:
Architectural space planning using evolutionary computing approaches: a review. Artif. Intell. Rev. 36(4): 311-321 (2011) - [j5]Kamlesh Dutta, Saroj Kaushik, Nupur Prakash:
Machine Learning Approach for the Classification of Demonstrative Pronouns for Indirect Anaphora in Hindi News Items. Prague Bull. Math. Linguistics 95: 33-50 (2011) - [j4]Srikanth Baride, Kamlesh Dutta:
A cloud based software testing paradigm for mobile applications. ACM SIGSOFT Softw. Eng. Notes 36(3): 1-4 (2011) - [j3]Vachik S. Dave, Kamlesh Dutta:
Comparison of regression model, feed-forward neural network and radial basis neural network for software development effort estimation. ACM SIGSOFT Softw. Eng. Notes 36(5): 1-5 (2011) - [c2]Priyanka Dadhich, Kamlesh Dutta, Mahesh Chandra Govil:
Reputation-Based Trust for Mobile Agents. ADCONS 2011: 486-494 - 2010
- [j2]Kamlesh Dutta, Nupur Prakash, Saroj Kaushik:
Probabilistic neural network approach to the classification of demonstrative pronouns for indirect anaphora in Hindi. Expert Syst. Appl. 37(8): 5607-5613 (2010)
2000 – 2009
- 2009
- [j1]Kamlesh Dutta, Nupur Prakash, Saroj Kaushik:
Application of Pronominal Divergence and Anaphora Resolution in English-Hindi Machine Translation. Polibits 39: 55-58 (2009) - 2004
- [c1]Kamlesh Dutta, Saroj Kaushik, Nupur Prakash:
Information Extraction from Hindi Texts. LREC 2004
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint