default search action
Raman Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Hilbert curves-based location privacy technique for vehicular cloud networks. Clust. Comput. 27(3): 2489-2504 (2024) - [j25]Sheetal Garg, Rohit Ahuja, Raman Singh, Ivan Perl:
An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center. Clust. Comput. 27(5): 5699-5719 (2024) - [j24]Rohit Ahuja, Sahil Chugh, Raman Singh:
SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain. Future Internet 16(4): 132 (2024) - [j23]Payal Mittal, Akashdeep Sharma, Raman Singh:
Deep learning based high performance classification architecture for low-altitude aerial images. Multim. Tools Appl. 83(6): 16849-16868 (2024) - [j22]Charlotte McCabe, Althaff Irfan Cader Mohideen, Raman Singh:
A Blockchain-Based Authentication Mechanism for Enhanced Security. Sensors 24(17): 5830 (2024) - 2023
- [j21]Sheetal Garg, Rohit Ahuja, Raman Singh, Ivan Perl:
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model. Clust. Comput. 26(6): 3547-3563 (2023) - [j20]Raman Singh, Sean Sturley, Hitesh Tewari:
Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network. Future Internet 15(3): 96 (2023) - [j19]Raman Singh, Zeeshan Pervez, Hitesh Tewari:
Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload. Future Internet 15(5): 173 (2023) - [j18]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network. Int. Arab J. Inf. Technol. 20(1): 66-77 (2023) - [j17]Austine Onwubiko, Raman Singh, Shahid Awan, Zeeshan Pervez, Naeem Ramzan:
Enabling Trust and Security in Digital Twin Management: A Blockchain-Based Approach with Ethereum and IPFS. Sensors 23(14): 6641 (2023) - 2022
- [j16]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Comput. Networks 217: 109327 (2022) - [j15]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Framework of data privacy preservation and location obfuscation in vehicular cloud networks. Concurr. Comput. Pract. Exp. 34(5) (2022) - [j14]Payal Mittal, Akashdeep Sharma, Raman Singh, Vishal Dhull:
Dilated convolution based RCNN using feature fusion for Low-Altitude aerial objects. Expert Syst. Appl. 199: 117106 (2022) - [j13]Payal Mittal, Akashdeep Sharma, Raman Singh:
A Feature Pyramid Based Multi-stage Framework for Object Detection in Low-altitude UAV Images. Int. J. Artif. Intell. Tools 31(2): 2250028:1-2250028:25 (2022) - [j12]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices. Knowl. Based Syst. 253: 109543 (2022) - [j11]Otuekong Umoren, Raman Singh, Zeeshan Pervez, Keshav P. Dahal:
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors 22(10): 3956 (2022) - [j10]Otuekong Umoren, Raman Singh, Shahid Awan, Zeeshan Pervez, Keshav P. Dahal:
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors 22(22): 8969 (2022) - [j9]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey. Softw. Pract. Exp. 52(10): 2047-2076 (2022) - [j8]Payal Mittal, Akashdeep Sharma, Raman Singh, Arun Kumar Sangaiah:
On the performance evaluation of object classification models in low altitude aerial data. J. Supercomput. 78(12): 14548-14570 (2022) - [c5]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Data and Location Privacy of Smart Devices over Vehicular Cloud Computing. FRUCT 2022: 30-37 - [c4]Raman Singh, Ark Nandan Singh Chauhan, Hitesh Tewari:
Blockchain-enabled End-to-End Encryption for Instant Messaging Applications. WoWMoM 2022: 501-506 - 2021
- [j7]Bhisham Sharma, Deepika Koundal, Raman Singh:
Guest editorial: Introduction to the Special Section on Load Balancing of Sensory Data for IoT Deep Learning Applications with Edge/Fog Computing (VSI-lbdl). Comput. Electr. Eng. 93: 107332 (2021) - [j6]Raman Singh, Maninder Singh, Sheetal Garg, Ivan Perl, Olga Kalyonova, Aleksandr Penskoi:
Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment. J. Ambient Intell. Smart Environ. 13(3): 185-199 (2021) - [c3]Bharat S. Rawal, Gunasekaran Manogaran, Raman Singh, Poongodi M, Mounir Hamdi:
Network Augmentation by Dynamically Splitting the Switching Function in SDN. ICC Workshops 2021: 1-6 - [i5]Raman Singh, Ark Nandan Singh Chauhan, Hitesh Tewari:
Blockchain-Enabled End-to-End Encryption for Instant Messaging Applications. CoRR abs/2104.08494 (2021) - [i4]Raman Singh, Hitesh Tewari:
Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload. CoRR abs/2104.08495 (2021) - 2020
- [j5]Sheetal Garg, Raman Singh, Mohammad S. Obaidat, Vinod Kumar Bhalla, Bhisham Sharma:
Statistical vertical reduction-based data abridging technique for big network traffic dataset. Int. J. Commun. Syst. 33(4) (2020) - [j4]Payal Mittal, Raman Singh, Akashdeep Sharma:
Deep learning-based object detection in low-altitude UAV datasets: A survey. Image Vis. Comput. 104: 104046 (2020) - [c2]Pragya Sharma, Jayakrishnan Nair, Raman Singh:
Adaptive Flow-Level Scheduling for the IoT MAC. COMSNETS 2020: 515-518 - [c1]Raman Singh, Andrew Donegan, Hitesh Tewari:
Framework for a Decentralized Web. ITNAC 2020: 1-7 - [p1]Karan Bajaj, Bhisham Sharma, Raman Singh:
Integration of WSN with IoT Applications: A Vision, Architecture, and Future Challenges. Integration of WSN and IoT for Smart Cities 2020: 79-102 - [i3]Raman Singh, Andrew Donegan, Hitesh Tewari:
Framework for a Decentralized Web. CoRR abs/2008.02083 (2020)
2010 – 2019
- 2019
- [i2]Pragya Sharma, Jayakrishnan Nair, Raman Singh:
Adaptive flow-level scheduling for the IoT MAC. CoRR abs/1912.10619 (2019) - 2017
- [j3]Raman Singh, Harish Kumar, Ravinder Kumar Singla, Ramachandran Ramkumar Ketti:
Internet attacks and intrusion detection system: A review of the literature. Online Inf. Rev. 41(2): 171-184 (2017) - 2015
- [j2]Raman Singh, Harish Kumar, R. K. Singla:
An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22): 8609-8624 (2015) - [j1]Raman Singh, Harish Kumar, R. K. Singla:
A Reference Dataset for Network Traffic Activity Based Intrusion Detection System. Int. J. Comput. Commun. Control 10(3): 390-402 (2015) - 2013
- [i1]Raman Singh, Harish Kumar, R. K. Singla:
Sampling Based Approaches to Handle Imbalances in Network Traffic Dataset for Machine Learning Techniques. CoRR abs/1311.2677 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint