default search action
Ashutosh Kumar Singh 0001
Person information
- affiliation: National Institute of Technology, NIT, Department of Computer Applications, Kurukshetra, India
- affiliation: University of Bristol, Department of computer science, UK
- affiliation (PhD 2000): Banaras Hindu University, BHU, Indian Institute of Technology, Varanasi, India
- affiliation (former): Curtin University, School of Engineering and Science, Sarawak, Malaysia
Other persons with the same name
- Ashutosh Kumar Singh — disambiguation page
- Ashutosh Kumar Singh 0002 — Motilal Nehru National Institute of Technology Allahabad, Department of Computer Science and Engineering, Prayagraj, India
- Ashutosh Kumar Singh 0003 — Power Grid Corporation of India Ltd., Gurgaon, India
- Ashutosh Kumar Singh 0004 — National Institute of Technology Patna, Department of Electrical Engineering, Bihar, India (and 1 more)
- Ashutosh Kumar Singh 0005 — Thapar Institute of Engineering and Technology, Department of Communication Engineering, Patiala, India (and 1 more)
- Ashutosh Kumar Singh 0006 — Indian Institute of Information Technology Allahabad, Electronics and Communication Engineering Department, Prayagraj, Uttar Pradesh, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j95]Kishu Gupta, Deepika Saxena, Rishabh Gupta, Jatinder Kumar, Ashutosh Kumar Singh:
FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments. Appl. Soft Comput. 157: 111519 (2024) - [j94]Ashutosh Kumar Singh, Jitendra Kumar, Deepika Saxena, Athanasios V. Vasilakos:
Introduction to the special section on eXplainable Artificial Intelligence (XAI): Methods, Applications, and Challenges (VSI-xai). Comput. Electr. Eng. 120: 109630 (2024) - [j93]Smruti Rekha Swain, Anshu Parashar, Ashutosh Kumar Singh, Chung-Nan Lee:
Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks. Clust. Comput. 27(4): 4673-4685 (2024) - [j92]Kishu Gupta, Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh:
MAIDS: malicious agent identification-based data security model for cloud environments. Clust. Comput. 27(5): 6167-6184 (2024) - [j91]Jatinder Kumar, Ashutosh Kumar Singh:
A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid. Clust. Comput. 27(6): 7389-7400 (2024) - [j90]Vaibhav Jain, Devendra Kumar Sharma, Hari Mohan Gaur, Ashutosh Kumar Singh, Xiaoqing Wen:
Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation. ACM Comput. Surv. 56(5): 120:1-120:36 (2024) - [j89]Niharika Singh, Jitendra Kumar, Ashutosh Kumar Singh, Anand Mohan:
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 261-274 (2024) - [j88]Ashutosh Kumar Singh, Niharika Singh, Ishu Gupta:
Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment. Multim. Tools Appl. 83(13): 37431-37451 (2024) - [j87]Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, Chung-Nan Lee:
A Multiple Controlled Toffoli Driven Adaptive Quantum Neural Network Model for Dynamic Workload Prediction in Cloud Environments. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 7574-7588 (2024) - [j86]Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, Athanasios V. Vasilakos:
Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds. IEEE Trans Autom. Sci. Eng. 21(4): 5837-5851 (2024) - [j85]Vinaytosh Mishra, Kishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers. IEEE Trans. Consumer Electron. 70(1): 4379-4387 (2024) - [j84]Sandeep Kumar Sood, Yogveer S. Lamba, Ashutosh Kumar Singh:
Progress and Prospects of 3-D and 4-D Printing in Sustainable Development: A Scientometric Review. IEEE Trans. Engineering Management 71: 14415-14425 (2024) - [j83]Deepika Saxena, Ashutosh Kumar Singh:
A High Up-Time and Security Centered Resource Provisioning Model Toward Sustainable Cloud Service Management. IEEE Trans. Green Commun. Netw. 8(3): 1182-1195 (2024) - [j82]Deepika Saxena, Ashutosh Kumar Singh:
An Oversubscription and Service Pricing Exploitation-Based Profit Maximization Framework for Industry Cloud Resource Management. IEEE Trans. Serv. Comput. 17(5): 2041-2053 (2024) - [c18]Deepika Saxena, Ashutosh Kumar Singh, Volker Lindenstruth:
A Latency Aware and Dynamic Caching Model for Heterogeneous Datalake Environments. COMPSAC 2024: 2302-2307 - [e2]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part I. Communications in Computer and Information Science 2026, Springer 2024, ISBN 978-3-031-53081-4 [contents] - [e1]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part II. Communications in Computer and Information Science 2027, Springer 2024, ISBN 978-3-031-53084-5 [contents] - [i33]Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee:
An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management. CoRR abs/2410.03217 (2024) - [i32]Vinaytosh Mishra, Kishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers. CoRR abs/2410.03621 (2024) - 2023
- [j81]Rishabh Gupta, Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A differential approach and deep neural network based data privacy-preserving model in cloud environment. J. Ambient Intell. Humaniz. Comput. 14(5): 4659-4674 (2023) - [j80]Ashutosh Kumar Singh, Jatinder Kumar:
A secure and privacy-preserving data aggregation and classification model for smart grid. Multim. Tools Appl. 82(15): 22997-23015 (2023) - [j79]Sakshi Chhabra, Ashutosh Kumar Singh:
Secure and energy efficient dynamic hierarchical load balancing framework for cloud data centers. Multim. Tools Appl. 82(19): 29843-29856 (2023) - [j78]Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, Chung-Nan Lee:
An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud. IEEE Syst. J. 17(2): 2445-2454 (2023) - [j77]Ashutosh Kumar Singh, Smruti Rekha Swain, Deepika Saxena, Chung-Nan Lee:
A Bio-Inspired Virtual Machine Placement Toward Sustainable Cloud Resource Management. IEEE Syst. J. 17(3): 3894-3905 (2023) - [j76]Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, Chung-Nan Lee:
SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection. IEEE Syst. J. 17(4): 5130-5141 (2023) - [j75]Jatinder Kumar, Deepika Saxena, Ashutosh Kumar Singh, Athanasios V. Vasilakos:
A Quantum Controlled-NOT Neural Network-Based Load Forecast and Management Model for Smart Grid. IEEE Syst. J. 17(4): 5714-5725 (2023) - [j74]Ashutosh Kumar Singh, Sakshi Chhabra, Rishabh Gupta, Deepika Saxena:
A Reliable Client Detection System during Load Balancing for Multi-tenant Cloud Environment. SN Comput. Sci. 4(1): 86 (2023) - [j73]Pooja Rani, Ashutosh Kumar Singh:
An Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grids in Cloud Environment. SN Comput. Sci. 4(5): 540 (2023) - [j72]Sakshi Patni, Ashutosh Kumar Singh:
An Optimal Host Allocation and Load Distribution Framework Using Maximum Likelihood in Cloud Environment. SN Comput. Sci. 4(5): 572 (2023) - [j71]Ashutosh Kumar Singh, Smruti Rekha Swain, Chung-Nan Lee:
A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment. Soft Comput. 27(7): 3817-3828 (2023) - [j70]Ashutosh Kumar Singh, Jatinder Kumar:
A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid. J. Supercomput. 79(4): 3750-3770 (2023) - [j69]Jatinder Kumar, Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Power consumption forecast model using ensemble learning for smart grid. J. Supercomput. 79(10): 11007-11028 (2023) - [j68]Ashutosh Kumar Singh, Pooja Rani:
An AI-driven fault-tolerant aggregation model for smart grid. J. Supercomput. 79(18): 20665-20683 (2023) - [j67]Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Stefan Schmid:
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud. IEEE Trans. Parallel Distributed Syst. 34(4): 1313-1330 (2023) - [j66]Deepika Saxena, Ashutosh Kumar Singh:
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications. IEEE Trans. Serv. Comput. 16(3): 1604-1615 (2023) - [j65]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. IEEE Trans. Syst. Man Cybern. Syst. 53(11): 6815-6827 (2023) - [j64]Smruti Rekha Swain, Deepika Saxena, Jatinder Kumar, Ashutosh Kumar Singh, Chung-Nan Lee:
An AI-Driven Intelligent Traffic Management Model for 6G Cloud Radio Access Networks. IEEE Wirel. Commun. Lett. 12(6): 1056-1060 (2023) - [c17]Smruti Rekha Swain, Anshu Parashar, Ashutosh Kumar Singh, Chung-Nan Lee:
An Energy Efficient Virtual Machine Placement Scheme for Intelligent Resource Management at Cloud Data Center. OCIT 2023: 65-70 - [i31]Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Stefan Schmid:
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud. CoRR abs/2302.02452 (2023) - [i30]Smruti Rekha Swain, Deepika Saxena, Jatinder Kumar, Ashutosh Kumar Singh, Chung-Nan Lee:
An AI-driven intelligent traffic management model for 6G cloud radio access networks. CoRR abs/2303.14372 (2023) - [i29]Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Cryptography approach for Secure Outsourced Data Storage in Cloud Environment. CoRR abs/2306.08322 (2023) - [i28]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. CoRR abs/2308.09578 (2023) - 2022
- [j63]Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee, Rajkumar Buyya:
Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions. IEEE Access 10: 71247-71277 (2022) - [j62]Ashutosh Kumar Singh, Trailokya Nath Sasamal, Lau Siong Hoe, P. W. Chandana Prasad, Saeed Rasouli Heikalabad:
Guest editorial: Introduction to the special section on recent advances and challenges in quantum-dot cellular automata (VSI-QCA). Comput. Electr. Eng. 102: 108247 (2022) - [j61]Deepika Saxena, Ashutosh Kumar Singh:
An Intelligent Traffic Entropy Learning-Based Load Management Model for Cloud Networks. IEEE Netw. Lett. 4(2): 59-63 (2022) - [j60]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Aaisha Makkar, Ashutosh Kumar Singh:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. IEEE Netw. Lett. 4(4): 174-178 (2022) - [j59]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh:
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment. IEEE Netw. Lett. 4(4): 217-221 (2022) - [j58]Rishabh Gupta, Ashutosh Kumar Singh:
A privacy-preserving model for cloud data storage through fog computing. Int. J. Comput. Aided Eng. Technol. 17(3): 348-359 (2022) - [j57]Hari Mohan Gaur, Ashutosh Kumar Singh, Umesh Ghanekar:
An Efficient Design of Scalable Reversible Multiplier with Testability. J. Circuits Syst. Comput. 31(10): 2250179:1-2250179:13 (2022) - [j56]Rishabh Gupta, Ashutosh Kumar Singh:
Differential and Access Policy Based Privacy-Preserving Model in Cloud Environment. J. Web Eng. 21(3) (2022) - [j55]Ashutosh Kumar Singh, Rishabh Gupta:
A privacy-preserving model based on differential approach for sensitive data in cloud environment. Multim. Tools Appl. 81(23): 33127-33150 (2022) - [j54]Rishabh Gupta, Ashutosh Kumar Singh:
A Differential Approach for Data and Classification Service-Based Privacy-Preserving Machine Learning Model in Cloud Environment. New Gener. Comput. 40(3): 737-764 (2022) - [j53]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center. IEEE Syst. J. 16(2): 3163-3174 (2022) - [j52]Deepika Saxena, Ashutosh Kumar Singh, Rajkumar Buyya:
OP-MLB: An Online VM Prediction-Based Multi-Objective Load Balancing Framework for Resource Management at Cloud Data Center. IEEE Trans. Cloud Comput. 10(4): 2804-2816 (2022) - [j51]Aaisha Makkar, Tae Woo Kim, Ashutosh Kumar Singh, Jungho Kang, Jong Hyuk Park:
SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach. IEEE Trans. Ind. Informatics 18(9): 6406-6414 (2022) - [j50]Deepika Saxena, Ashutosh Kumar Singh:
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments. J. Supercomput. 78(6): 8003-8024 (2022) - [j49]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services. IEEE Trans. Netw. Serv. Manag. 19(3): 3048-3061 (2022) - [i27]Ishu Gupta, Ashutosh Kumar Singh:
A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions. CoRR abs/2202.11965 (2022) - [i26]Ishu Gupta, Sloni Mittal, Ankit Tiwari, Priya Agarwal, Ashutosh Kumar Singh:
TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model. CoRR abs/2203.05367 (2022) - [i25]Ishu Gupta, Harsh Mittal, Deepak Rikhari, Ashutosh Kumar Singh:
MLRM: A Multiple Linear Regression based Model for Average Temperature Prediction of A Day. CoRR abs/2203.05835 (2022) - [i24]Ishu Gupta, Tarun Kumar Madan, Sukhman Singh, Ashutosh Kumar Singh:
HiSA-SMFM: Historical and Sentiment Analysis based Stock Market Forecasting Model. CoRR abs/2203.08143 (2022) - [i23]Ishu Gupta, Vartika Sharma, Sizman Kaur, Ashutosh Kumar Singh:
PCA-RF: An Efficient Parkinson's Disease Prediction Model based on Random Forest Classification. CoRR abs/2203.11287 (2022) - [i22]Sakshi Chhabra, Ashutosh Kumar Singh:
A Comprehensive Vision on Cloud Computing Environment: Emerging Challenges and Future Research Directions. CoRR abs/2207.07955 (2022) - [i21]Smruti Rekha Swain, Ashutosh Kumar Singh, Chung-Nan Lee:
Efficient Resource Management in Cloud Environment. CoRR abs/2207.12085 (2022) - [i20]Deepika Saxena, Ashutosh Kumar Singh:
an intelligent security centered resource-efficient resource management model for cloud computing environments. CoRR abs/2210.16602 (2022) - [i19]Sakshi Chhabra, Ashutosh Kumar Singh:
Dynamic Resource Allocation Method for Load Balance Scheduling over Cloud Data Center Networks. CoRR abs/2211.02352 (2022) - [i18]Rishabh Gupta, Ashutosh Kumar Singh:
A Privacy-Preserving Outsourced Data Model in Cloud Environment. CoRR abs/2211.13542 (2022) - [i17]Ashutosh Kumar Singh, Deepika Saxena, Jitendra Kumar, Vrinda Gupta:
A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads. CoRR abs/2211.14619 (2022) - [i16]Deepika Saxena, Ashutosh Kumar Singh:
A High Availability Management Model based on VM Significance Ranking and Resource Estimation for Cloud Applications. CoRR abs/2211.16117 (2022) - [i15]Jatinder Kumar, Ashutosh Kumar Singh:
Security and Privacy-Preservation of IoT Data in Cloud-Fog Computing Environment. CoRR abs/2212.00321 (2022) - [i14]Deepika Saxena, Ashutosh Kumar Singh:
A proactive autoscaling and energy-efficient VM allocation framework using online multi-resource neural network for cloud data center. CoRR abs/2212.01896 (2022) - [i13]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services. CoRR abs/2212.03547 (2022) - [i12]Sakshi Chhabra, Ashutosh Kumar Singh:
A smart resource management mechanism with trust access control for cloud computing environment. CoRR abs/2212.05319 (2022) - [i11]Deepika Saxena, Ashutosh Kumar Singh:
OSC-MC: Online Secure Communication Model for Cloud Environment. CoRR abs/2212.05451 (2022) - [i10]Rishabh Gupta, Ashutosh Kumar Singh:
A Differential Approach for Data and Classification Service based Privacy-Preserving Machine Learning Model in Cloud Environment. CoRR abs/2212.10177 (2022) - [i9]Ashutosh Kumar Singh, Rishabh Gupta:
A Privacy-Preserving Model based on Differential Approach for Sensitive Data in Cloud Environment. CoRR abs/2212.12534 (2022) - 2021
- [j48]Jitendra Kumar, Ashutosh Kumar Singh:
Performance evaluation of metaheuristics algorithms for workload prediction in cloud environment. Appl. Soft Comput. 113(Part): 107895 (2021) - [j47]Hari Mohan Gaur, Ashutosh Kumar Singh, Anand Mohan, Masahiro Fujita, Dhiraj K. Pradhan:
Design of Single-Bit Fault-Tolerant Reversible Circuits. IEEE Des. Test 38(2): 89-96 (2021) - [j46]Deepika Saxena, Ashutosh Kumar Singh:
OSC-MC: Online Secure Communication Model for Cloud Environment. IEEE Commun. Lett. 25(9): 2844-2848 (2021) - [j45]Deepika Saxena, Ashutosh Kumar Singh:
A proactive autoscaling and energy-efficient VM allocation framework using online multi-resource neural network for cloud data center. Neurocomputing 426: 248-264 (2021) - [j44]Jitendra Kumar, Ashutosh Kumar Singh, Rajkumar Buyya:
Self directed learning based workload forecasting model for cloud resource management. Inf. Sci. 543: 345-366 (2021) - [j43]Sakshi Chhabra, Ashutosh Kumar Singh:
Dynamic Resource Allocation Method for Load Balance Scheduling Over Cloud Data Center Networks. J. Web Eng. 20(8) (2021) - [j42]Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Rajkumar Buyya:
MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment. IEEE Syst. J. 15(3): 4248-4259 (2021) - [j41]Ashutosh Kumar Singh, Deepika Saxena, Jitendra Kumar, Vrinda Gupta:
A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads. IEEE Trans. Parallel Distributed Syst. 32(12): 2893-2905 (2021) - [j40]Jitendra Kumar, Ashutosh Kumar Singh:
Performance Assessment of Time Series Forecasting Models for Cloud Datacenter Networks' Workload Prediction. Wirel. Pers. Commun. 116(3): 1949-1969 (2021) - [c16]Ayushi Acharya, Hari Prasad, Vinod Kumar Singh, Ishu Gupta, Ashutosh Kumar Singh:
MACI: Malicious API Call Identifier Model to Secure the Host Platform. ICMC 2021: 309-320 - [i8]Deepika Saxena, Ashutosh Kumar Singh:
workload forecasting and resource management models based on machine learning for cloud computing environments. CoRR abs/2106.15112 (2021) - [i7]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre. CoRR abs/2107.13502 (2021) - [i6]Hari Mohan Gaur, Ashutosh Kumar Singh, Umesh Ghanekar:
Testable Designs of Toffoli Fredkin Reversible Circuits. CoRR abs/2108.07448 (2021) - [i5]Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends. CoRR abs/2108.09508 (2021) - [i4]Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, Jitendra Kumar, Ashutosh Kumar Singh:
Credit Card Fraud Detection using Machine Learning: A Study. CoRR abs/2108.10005 (2021) - [i3]Harsh Mittal, Deepak Rikhari, Jitendra Kumar, Ashutosh Kumar Singh:
A study on Machine Learning Approaches for Player Performance and Match Results Prediction. CoRR abs/2108.10125 (2021) - [i2]Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh:
A Survey and Comparative Study on Multi-Cloud Architectures: Emerging Issues And Challenges For Cloud Federation. CoRR abs/2108.12831 (2021) - [i1]Jatinder Kumar, Ashutosh Kumar Singh:
A Discussion and Comparative Study on Security and Privacy of Smart Meter Data. CoRR abs/2111.09227 (2021) - 2020
- [b1]Trailokya Nath Sasamal, Ashutosh Kumar Singh, Anand Mohan:
Quantum-Dot Cellular Automata Based Digital Logic Circuits: A Design Perspective. Studies in Computational Intelligence 879, Springer 2020, ISBN 978-981-15-1822-5, pp. 1-148 - [j39]Jitendra Kumar, Ashutosh Kumar Singh:
Cloud datacenter workload estimation using error preventive time series forecasting models. Clust. Comput. 23(2): 1363-1379 (2020) - [j38]Deepika Singh, Ashutosh Kumar Singh:
Role of image thermography in early breast cancer detection- Past, present and future. Comput. Methods Programs Biomed. 183 (2020) - [j37]Ishu Gupta, Ashutosh Kumar Singh:
SELI: statistical evaluation based leaker identification stochastic scheme for secure data sharing. IET Commun. 14(20): 3607-3618 (2020) - [j36]Ishu Gupta, Ashutosh Kumar Singh:
GUIM-SMD: guilty user identification model using summation matrix-based distribution. IET Inf. Secur. 14(6): 773-782 (2020) - [j35]Jitendra Kumar, Ashutosh Kumar Singh, Rajkumar Buyya:
Ensemble learning based predictive framework for virtual machine resource request prediction. Neurocomputing 397: 20-30 (2020) - [j34]Sakshi Chhabra, Ashutosh Kumar Singh:
A secure VM allocation scheme to preserve against co-resident threat. Int. J. Web Eng. Technol. 15(1): 96-115 (2020) - [j33]Jitendra Kumar, Ashutosh Kumar Singh:
Adaptive Learning based Prediction Framework for Cloud Datacenter Networks' Workload Anticipation. J. Inf. Sci. Eng. 36(5): 981-992 (2020) - [j32]Ishu Gupta, Ashutosh Kumar Singh:
An Integrated Approach for Data Leaker Detection in Cloud Environment. J. Inf. Sci. Eng. 36(5): 993-1005 (2020) - [j31]Jitendra Kumar, Ashutosh Kumar Singh:
Decomposition Based Cloud Resource Demand Prediction Using Extreme Learning Machines. J. Netw. Syst. Manag. 28(4): 1775-1793 (2020) - [j30]Ashutosh Kumar Singh, Ishu Gupta:
Online information leaker identification scheme for secure data sharing. Multim. Tools Appl. 79(41-42): 31165-31182 (2020) - [j29]Jitendra Kumar, Deepika Saxena, Ashutosh Kumar Singh, Anand Mohan:
BiPhase adaptive learning-based neural network model for cloud datacenter workload forecasting. Soft Comput. 24(19): 14593-14610 (2020)
2010 – 2019
- 2019
- [j28]Hari Mohan Gaur, Ashutosh Kumar Singh, Umesh Ghanekar:
Design of Reversible Arithmetic Logic Unit with Built-In Testability. IEEE Des. Test 36(5): 54-61 (2019) - [j27]Ashutosh Kumar Singh, Hari Mohan Gaur, Umesh Ghanekar:
Fault detection in multiple controlled Fredkin circuits. IET Circuits Devices Syst. 13(5): 723-729 (2019) - [j26]Ishu Gupta, Ashutosh Kumar Singh:
Dynamic threshold based information leaker identification scheme. Inf. Process. Lett. 147: 69-73 (2019) - [j25]Trailokya Nath Sasamal, Ashutosh Kumar Singh, Umesh Ghanekar:
Design and Implementation of QCA D-Flip-Flops and RAM Cell Using Majority Gates. J. Circuits Syst. Comput. 28(5): 1950079:1-1950079:20 (2019) - 2018
- [j24]Niharika Singh, Ashutosh Kumar Singh:
Data Privacy Protection Mechanisms in Cloud. Data Sci. Eng. 3(1): 24-39 (2018) - [j23]Hari Mohan Gaur, Ashutosh Kumar Singh, Umesh Ghanekar:
Testable Design of Reversible Circuits Using Parity Preserving Gates. IEEE Des. Test 35(4): 56-64 (2018) - [j22]Jitendra Kumar, Ashutosh Kumar Singh:
Workload prediction in cloud using artificial neural network and adaptive differential evolution. Future Gener. Comput. Syst. 81: 41-52 (2018) - [j21]Trailokya Nath Sasamal, Ashutosh Kumar Singh, Umesh Ghanekar:
Efficient design of coplanar ripple carry adder in QCA. IET Circuits Devices Syst. 12(5): 594-605 (2018) - [j20]Surender Singh, Ashutosh Kumar Singh:
Correlation-based feature subset selection technique for web spam classification. Int. J. Web Eng. Technol. 13(4): 363-379 (2018) - [j19]Hari Mohan Gaur, Ashutosh Kumar Singh, Umesh Ghanekar:
Offline Testing of Reversible Logic Circuits: An Analysis. Integr. 62: 50-67 (2018) - [j18]Trailokya Nath Sasamal, Anand Mohan, Ashutosh Kumar Singh:
Efficient Design of Reversible Logic ALU Using Coplanar Quantum-Dot Cellular Automata. J. Circuits Syst. Comput. 27(2): 1850021:1-1850021:19 (2018) - 2017
- [j17]Alex Goh Kwang Leng, Ravi Kumar Patchmuthu, Ashutosh Kumar Singh:
Distrust seed set propagation algorithm to detect web spam. J. Intell. Inf. Syst. 49(2): 213-235 (2017) - [c15]Ishu Gupta, Ashutosh Kumar Singh:
A Probability based Model for Data Leakage Detection using Bigraph. ICCNS 2017: 1-5 - 2016
- [j16]Ravi Kumar Patchmuthu, Alex Goh Kwang Leng, Ashutosh Kumar Singh, Anand Mohan:
Efficient Methodologies to Determine the Relevancy of Hanging Pages Using Stability Analysis. Cybern. Syst. 47(5): 376-391 (2016) - [j15]Nikhil Raj, Ashutosh Kumar Singh, Anil Kumar Gupta:
Low Voltage High Output Impedance Bulk-Driven Quasi-Floating Gate Self-Biased High-Swing Cascode Current Mirror. Circuits Syst. Signal Process. 35(8): 2683-2703 (2016) - [j14]Nikhil Raj, Ashutosh Kumar Singh, Anil Kumar Gupta:
High performance current mirrors using quasi-floating bulk. Microelectron. J. 52: 11-22 (2016) - [j13]Nikhil Raj, Ashutosh Kumar Singh, Anil Kumar Gupta:
Low voltage high performance bulk driven quasi-floating gate based self-biased cascode current mirror. Microelectron. J. 52: 124-133 (2016) - 2015
- [j12]Billy Pik Lik Lau, Ashutosh Kumar Singh, Terence Peng Lian Tan:
A review on dependence graph in social reasoning mechanism. Artif. Intell. Rev. 43(2): 229-242 (2015) - [j11]Ravi Kumar Patchmuthu, Ashutosh Kumar Singh, Anand Mohan:
Efficient methodologies to overcome the effects of hanging pages in search engine optimisation. Int. J. Web Eng. Technol. 10(2): 129-151 (2015) - [c14]Vanya Arun, N. K. Shukla, Ashutosh Kumar Singh, Kamal K. Upadhyay:
Design of All Optical Line Selector Based on SOA for Data Communication. ICCCT 2015: 281-285 - [c13]Chua Shin Cheng, Lenin Gopal, Amandeep S. Sidhu, Ashutosh Kumar Singh:
Design of low quantum cost reversible BCD adder. ICCSCE 2015: 107-110 - 2014
- [j10]Alex Goh Kwang Leng, Ashutosh Kumar Singh, Ravi Kumar Patchmuthu, Anand Mohan:
Tprank: contend with Web Spam using Trust Propagation. Cybern. Syst. 45(4): 307-323 (2014) - [j9]Sing Yee Tan, Ashutosh Kumar Singh:
Knowledge-based fuzzy approach in determining the mass spring stiffness parameter. Comput. methods Biomech. Biomed. Eng. Imaging Vis. 2(3): 167-175 (2014) - [j8]Alex Goh Kwang Leng, Ravi Kumar Patchmuthu, Ashutosh Kumar Singh:
Link-based web spam detection using weight properties. J. Intell. Inf. Syst. 43(1): 129-145 (2014) - [j7]Nikhil Raj, Ashutosh Kumar Singh, Anil Kumar Gupta:
Low power high output impedance high bandwidth QFGMOS current mirror. Microelectron. J. 45(8): 1132-1142 (2014) - [c12]Lenin Gopal, Nikhil Raj, Nyap Tet Clement Tham, Alpha Agape Gopalai, Ashutosh Kumar Singh:
Design of reversible multiplexer/de-multiplexer. ICCSCE 2014: 361-365 - [c11]Nyap Tet Clement Tham, Alpha Agape Gopalai, Lenin Gopal, Ashutosh Kumar Singh:
A comparative study on the implementation of reversible Binary Coded Decimal (BCD) Adder performance on Field Programmable Gate array (FPGA). ICCSCE 2014: 399-404 - [c10]Lenin Gopal, Nikhil Raj, Alpha Agape Gopalai, Ashutosh Kumar Singh:
Design of reversible multiplexer/de-multiplexer. ICCSCE 2014: 416-420 - 2013
- [c9]Alex Goh Kwang Leng, Ashutosh Kumar Singh, King Hann Lim:
Multilayer perceptrons neural network based Web spam detection application. ChinaSIP 2013: 636-640 - [c8]Prerna Meena, Devendra Singh Gurjar, Ashutosh Kumar Singh, Shekhar Verma:
Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey. ICACNI 2013: 1135-1143 - 2012
- [j6]Alex Goh Kwang Leng, Ravi Kumar Patchmuthu, Ashutosh Kumar Singh, Anand Mohan:
Link-Based Spam Algorithms in Adversarial Information Retrieval. Cybern. Syst. 43(6): 459-475 (2012) - [c7]Azam Beg, P. W. Chandana Prasad, Ashutosh Kumar Singh, S. M. N. Arosha Senanayake:
A neural model for processor-throughput using hardware parameters and software's dynamic behavior. ISDA 2012: 821-825 - 2011
- [j5]Ashutosh Kumar Singh, Ravi Kumar Patchmuthu, Alex Goh Kwang Leng:
Efficient Methodologies to Handle Hanging Pages Using Virtual Node. Cybern. Syst. 42(8): 621-635 (2011) - 2010
- [j4]Jimson Mathew, Abusaleh M. Jabir, Ashutosh Kumar Singh, Hafizur Rahaman, Dhiraj K. Pradhan:
A Galois field-based logic synthesis with testability. IET Comput. Digit. Tech. 4(4): 263-273 (2010)
2000 – 2009
- 2008
- [j3]Ashutosh Kumar Singh, Anand Mohan:
An Efficient Method for Generating Optimal OBDD of Boolean Functions. Comput. Inf. Sci. 1(2): 56-62 (2008) - [j2]Lenin Gopal, Ashutosh Kumar Singh, Veeramani Shanmugam:
Power Estimation in Mobile Communication Systems. Comput. Inf. Sci. 1(3): 88-94 (2008) - [c6]Jimson Mathew, Hafizur Rahaman, Ashutosh Kumar Singh, Abusaleh M. Jabir, Dhiraj K. Pradhan:
A Galois Field Based Logic Synthesis Approach with Testability. VLSI Design 2008: 629-634 - 2007
- [j1]Abusaleh M. Jabir, Dhiraj K. Pradhan, T. L. Rajaprabhu, Ashutosh Kumar Singh:
A Technique for Representing Multiple Output Binary Functions with Applications to Verification and Simulation. IEEE Trans. Computers 56(8): 1133-1145 (2007) - 2006
- [c5]P. W. Chandana Prasad, Ashutosh Kumar Singh, Azam Beg, Ali Assi:
Modelling the XOR/XNOR Boolean Functions Complexity Using Neural Network. ICECS 2006: 1348-1351 - 2005
- [c4]Dhiraj K. Pradhan, Ashutosh Kumar Singh, T. L. Rajaprabhu, Abusaleh M. Jabir:
GASIM: a fast Galois field based simulator for functional model. HLDVT 2005: 135-142 - 2004
- [c3]T. L. Rajaprabhu, Ashutosh Kumar Singh, Abusaleh M. Jabir, Dhiraj K. Pradhan:
MODD for CF: a representation for fast evaluation of multiple-output functions. HLDVT 2004: 61-66 - 2003
- [c2]P. W. Chandana Prasad, M. Maria Dominic, Ashutosh Kumar Singh:
Improved Variable Ordering for ROBDDs. ICADL 2003: 544-547 - [c1]P. W. Chandana Prasad, M. Maria Dominic, Ashutosh Kumar Singh:
Variable Order Verification Use of Logic Representation. ICADL 2003: 689
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint