Name
Papers
Collaborators
B. B. GUPTA
101
205
Citations 
PageRank 
Referers 
518
46.49
1263
Referees 
References 
2665
1111
Search Limit
1001000
Title
Citations
PageRank
Year
XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks00.342022
SDN-Assisted Safety Message Dissemination Framework for Vehicular Critical Energy Infrastructure20.362022
CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT Using Machine Learning00.342022
The monarch butterfly optimization algorithm for solving feature selection problems00.342022
Multiobjective whale optimization algorithm-based feature selection for intelligent systems00.342022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System00.342022
InFeMo: Flexible Big Data Management Through a Federated Cloud System10.402022
Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach00.342022
A location-based privacy-preserving oblivious sharing scheme for indoor navigation00.342022
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system00.342022
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things10.352022
Myocardial infarction detection based on deep neural network on imbalanced data00.342022
Efficient deep learning approach for augmented detection of Coronavirus disease50.522022
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions10.352022
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities00.342022
Building a knowledge graph by using cross-lingual transfer method and distributed MinIE algorithm on apache spark00.342022
A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box00.342022
A survey of phishing attack techniques, defence mechanisms and open research challenges00.342022
Boosting-Based DDoS Detection in Internet of Things Systems00.342022
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks00.342022
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study00.342022
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments00.342022
An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency00.342022
A PBNM and economic incentive-based defensive mechanism against DDoS attacks00.342022
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care70.502021
A Taxonomy Of Various Attacks On Smart Card-Based Applications And Countermeasures00.342021
IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network90.452021
Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things30.652021
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images00.342021
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense10.372021
Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model70.502021
Dns Rule-Based Schema To Botnet Detection00.342021
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection00.342020
An Internet-Of-Things-Based Security Scheme For Healthcare Environment For Robust Location Privacy00.342020
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment60.422020
An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud00.342020
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN.00.342020
Soft computing techniques for big data and cloud computing00.342020
A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures00.342020
Parallel implementation for 3D medical volume fuzzy segmentation170.692020
Multi Attribute Auction Based Incentivized Solution Against DDoS Attacks00.342020
Attribute-Based Access Control And Authentication Mechanism Using Smart Cards For Cloud-Based Iot Applications00.342020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security120.612020
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet00.342020
Phishing Attack Detection using a Search Engine and Heuristics-based Technique00.342020
Visual saliency guided complex image retrieval120.542020
An Overview Of Internet Of Things (Iot): Architectural Aspects, Challenges, And Protocols90.542020
Deep learning models for human centered computing in fog and mobile edge networks10.352019
Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches00.342019
Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques140.512019
  • 1
  • 2