default search action
Sarbjeet Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Sharish Gupta, Sarbjeet Singh:
Indian dance classification using machine learning techniques: A survey. Entertain. Comput. 50: 100639 (2024) - 2023
- [j32]Sarbjeet Singh, Dilip Kumar:
Energy-efficient secure data fusion scheme for IoT based healthcare system. Future Gener. Comput. Syst. 143: 15-29 (2023) - [j31]Victor Chang, Jagpreet Sidhu, Sarbjeet Singh, Rajinder Sandhu:
SLA-based Multi-dimensional Trust Model for Fog Computing Environments. J. Grid Comput. 21(1): 4 (2023) - [j30]Lovejit Singh, Naveen Aggarwal, Sarbjeet Singh:
PUMAVE-D: panjab university multilingual audio and video facial expression dataset. Multim. Tools Appl. 82(7): 10117-10144 (2023) - [j29]Surbhi Kapoor, Akashdeep Sharma, Amandeep Verma, Sarbjeet Singh:
Aeriform in-action: A novel dataset for human action recognition in aerial videos. Pattern Recognit. 140: 109505 (2023) - 2022
- [j28]Ravpreet Kaur, Sarbjeet Singh:
A comprehensive review of object detection with deep learning. Digit. Signal Process. 132: 103812 (2022) - [j27]Mankirat Kaur, Sarbjeet Singh, Naveen Aggarwal:
Missing traffic data imputation using a dual-stage error-corrected boosting regressor with uncertainty estimation. Inf. Sci. 586: 344-373 (2022) - [j26]Monika Dhiman, Akash Sharma, Sarbjeet Singh:
Recognition and Classification of Human Actions Using 2D Pose Estimation and Machine Learning. J. Comput. Sci. Eng. 16(4): 199-210 (2022) - 2021
- [j25]Ravneet Kaur, Sarbjeet Singh, Harish Kumar:
An intrinsic authorship verification technique for compromised account detection in social networks. Soft Comput. 25(6): 4345-4366 (2021) - [j24]Mala Kalra, Sarbjeet Singh:
Multi-objective Energy Aware Scheduling of Deadline Constrained Workflows in Clouds using Hybrid Approach. Wirel. Pers. Commun. 116(3): 1743-1764 (2021) - [c18]Simrat Kaur, Sarbjeet Singh, Sakshi Kaushal:
Abusive Content Detection in Online User-Generated Data: A survey. ACLING 2021: 274-281 - [c17]Vishal Bharti, Sarbjeet Singh:
Social Distancing Violation Detection Using Pre-Trained Object Detection Models. OCIT 2021: 319-324 - [c16]Amritpal Kaur, Sarbjeet Singh:
A Survey of Streaming Protocols for Video Transmission. DSMLAI 2021: 186-191 - [c15]Biponjot Kaur, Sarbjeet Singh:
Object Detection using Deep Learning: A Review. DSMLAI 2021: 328-334 - 2020
- [j23]Ravneet Kaur, Sarbjeet Singh, Harish Kumar:
TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks. Appl. Soft Comput. 97(Part): 106770 (2020)
2010 – 2019
- 2019
- [j22]Mala Kalra, Sarbjeet Singh:
Multi-criteria workflow scheduling on clouds under deadline and budget constraints. Concurr. Comput. Pract. Exp. 31(17) (2019) - [j21]Jagpreet Sidhu, Sarbjeet Singh:
Using the improved PROMETHEE for selection of trustworthy cloud database servers. Int. Arab J. Inf. Technol. 16(2): 194-202 (2019) - [j20]Mala Kalra, Sarbjeet Singh:
An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing. Int. J. Grid Util. Comput. 10(5): 528-544 (2019) - [j19]Miltos Kyriakidis, Samuel Simanjuntak, Sarbjeet Singh, Arnab Majumdar:
The indirect costs assessment of railway incidents and their relationship to human error - The case of Signals Passed at Danger. J. Rail Transp. Plan. Manag. 9: 34-45 (2019) - [j18]Lovejit Singh, Sarbjeet Singh, Naveen Aggarwal:
Improved TOPSIS method for peak frame selection in audio-video human emotion recognition. Multim. Tools Appl. 78(5): 6277-6308 (2019) - [c14]Ravneet Kaur, Sarbjeet Singh, Harish Kumar:
MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks. FNSS 2019: 65-80 - 2018
- [j17]Ravneet Kaur, Sarbjeet Singh, Harish Kumar:
AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique. Expert Syst. Appl. 113: 397-414 (2018) - [j16]Sakshi Kaushal, Harish Kumar, Sarbjeet Singh, Shubhani Aggarwal, Jasleen Kaur, Sundarapandian Vaidyanathan:
Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network. Int. J. Simul. Process. Model. 13(1): 35-42 (2018) - [j15]Ravneet Kaur, Sarbjeet Singh, Harish Kumar:
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112: 53-88 (2018) - [c13]Sakshi Thakur, Sarbjeet Singh, Makhan Singh:
Detecting Sarcasm in Text. ISDA (2) 2018: 996-1005 - [c12]Sukhwant Kaur, Makhan Singh, Sarbjeet Singh:
A Cost Optimal Information Dispersal Framework for Cloud Storage System. ISDA (2) 2018: 1055-1064 - [c11]Manpreet Singh, Sarbjeet Singh, Nadesh Seen, Sakshi Kaushal, Harish Kumar:
Comparison of learning techniques for prediction of customer churn in telecommunication. ITNAC 2018: 1-5 - 2017
- [j14]Ravneet Kaur, Sarbjeet Singh:
A comparative analysis of structural graph metrics to identify anomalies in online social networks. Comput. Electr. Eng. 57: 294-310 (2017) - [j13]Sarbjeet Singh, Jagpreet Sidhu:
Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Future Gener. Comput. Syst. 67: 109-132 (2017) - [j12]Jagpreet Sidhu, Sarbjeet Singh:
Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. J. Grid Comput. 15(1): 81-105 (2017) - [j11]Jagpreet Sidhu, Sarbjeet Singh:
Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers. J. Grid Comput. 15(2): 197-218 (2017) - [j10]Rajanpreet Kaur Chahal, Sarbjeet Singh:
Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers. Int. J. Fuzzy Syst. 19(2): 338-354 (2017) - [j9]Mankirat Kaur, Sarbjeet Singh:
Ranking based comparative analysis of graph centrality measures to detect negative nodes in online social networks. J. Comput. Sci. 23: 91-108 (2017) - 2016
- [j8]Navneet Kaur Gill, Sarbjeet Singh:
A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers. Future Gener. Comput. Syst. 65: 10-32 (2016) - [j7]Mankirat Kaur, Sarbjeet Singh:
Detecting negative relations in social networks. Int. J. Commun. Networks Distributed Syst. 17(2): 164-188 (2016) - [j6]Ravneet Kaur, Sarbjeet Singh:
A review of social network centric anomaly detection techniques. Int. J. Commun. Networks Distributed Syst. 17(4): 358-386 (2016) - [j5]Jagpreet Sidhu, Sarbjeet Singh:
A novel cloud auditor based trust management framework for cloud computing. Int. J. Grid Util. Comput. 7(3): 219-235 (2016) - [j4]Lovejit Singh, Sarbjeet Singh:
Score-based genetic algorithm for scheduling workflow applications in clouds. Int. J. Grid Util. Comput. 7(4): 272-284 (2016) - [c10]Navneet Kaur Gill, Sarbjeet Singh:
A Budget-constrained Time and Reliability Optimization BAT Algorithm for Scheduling Workflow Applications in Clouds. EUSPN/ICTH 2016: 199-204 - 2015
- [j3]Sarbjeet Singh, Rupesh Kumar, Uday Kumar:
Modelling factors affecting human operator failure probability in railway maintenance tasks: an ISM-based analysis. Int. J. Syst. Assur. Eng. Manag. 6(2): 129-138 (2015) - [j2]Sarbjeet Singh, David Baglee, Michael Knowles, Diego Galar:
Developing RCM strategy for wind turbines utilizing e-condition monitoring. Int. J. Syst. Assur. Eng. Manag. 6(2): 150-156 (2015) - 2014
- [j1]Sarbjeet Singh, Diego Galar, David Baglee, Sten-Erik Björling:
Self-maintenance techniques: a smart approach towards self-maintenance system. Int. J. Syst. Assur. Eng. Manag. 5(1): 75-83 (2014) - [c9]Jagpreet Sidhu, Sarbjeet Singh:
Compliance based Trustworthiness Calculation Mechanism in Cloud Environment. EUSPN/ICTH 2014: 439-446 - [c8]Navneet Kaur Gill, Sarbjeet Singh:
Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System. FICTA (2) 2014: 39-47 - [c7]Lovejit Singh, Sarbjeet Singh:
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment. SNDS 2014: 139-150 - [c6]Jagpreet Sidhu, Sarbjeet Singh:
Peers Feedback and Compliance Based Trust Computation for Cloud Computing. SSCC 2014: 68-80 - 2013
- [c5]Nitish Chopra, Sarbjeet Singh:
Deadline and cost based workflow scheduling in hybrid cloud. ICACCI 2013: 840-846 - 2011
- [c4]Sarbjeet Singh, Sunand Kumar:
Lumbosacral bending moment assessment and parameter optimization using Taguchi design during lifting task in a steel rolling mill. IEEM 2011: 385-388
2000 – 2009
- 2009
- [c3]Gunmeet Singh, Sarbjeet Singh:
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]. ICICS 2009: 346-358 - 2006
- [c2]Sarbjeet Singh, Seema Bawa:
Design of a Framework for Handling Security Issues in Grids. ICIT 2006: 178-179 - [c1]Sarbjeet Singh, Seema Bawa:
A Framework for Handling Security Problems in Grid Environment using Web Services Security Specifications. SKG 2006: 68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint