Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme
Journal of Information Security and Applications (JISA), Volume 80, Issue CFeb 2024https://doi.org/10.1016/j.jisa.2023.103694AbstractRecently, Patro et al. proposed a multiple gray-scale image encryption scheme based on cross-coupled chaotic maps. The authors claimed the scheme could withstand known plain-text attacks and chosen-plaintext attacks. In this paper, we have ...
- research-articleJuly 2023
Dynamic temporal position observant graph neural network for traffic forecasting
Applied Intelligence (KLU-APIN), Volume 53, Issue 20Oct 2023, Pages 23166–23178https://doi.org/10.1007/s10489-023-04737-8AbstractSpatio-temporal forecasting has several applications in neurology, climate, and transportation. One classic example of such a learning assignment is traffic forecasting. The task is complex because of traffic’s non-linearity and dynamic nature ...
- research-articleMay 2023
PO-GNN: Position-observant inductive graph neural networks for position-based prediction
Information Processing and Management: an International Journal (IPRM), Volume 60, Issue 3May 2023https://doi.org/10.1016/j.ipm.2023.103333AbstractMost graph neural networks (GNNs) map local neighborhood information into node embeddings but lack positional information. It results in similar node embeddings for nodes in similar local neighborhoods, leading to poor performance. We ...
Highlights- PO-GNN captures the global positions of nodes w.r.t. anchor nodes.
- Positional ...
- research-articleFebruary 2023
deepBF: Malicious URL detection using learned Bloom Filter and evolutionary deep learning
Computer Communications (COMS), Volume 200, Issue CFeb 2023, Pages 30–41https://doi.org/10.1016/j.comcom.2022.12.027AbstractMalicious URL detection is an emerging research area due to the continuous modernization of various systems, for instance, Edge Computing. This article presents a novel malicious URL detection technique called deepBF (deep learning and ...
- research-articleNovember 2022
A survey of graph neural networks in various learning paradigms: methods, applications, and challenges
Artificial Intelligence Review (ARTR), Volume 56, Issue 7Jul 2023, Pages 6295–6364https://doi.org/10.1007/s10462-022-10321-2AbstractIn the last decade, deep learning has reinvigorated the machine learning field. It has solved many problems in computer vision, speech recognition, natural language processing, and other domains with state-of-the-art performances. In these domains,...
- research-articleSeptember 2022
Secret image encryption based on chaotic system and elliptic curve cryptography
Digital Signal Processing (DISP), Volume 129, Issue CSep 2022https://doi.org/10.1016/j.dsp.2022.103639AbstractThe advent of internet has been a boon to society. It has helped in information retrieval and is a great help in communication. Nowadays, communication comprises digital information in images, videos, GIFs, and many other formats. ...
- research-articleOctober 2022
A Survey on Surveillance using Drones
IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary ComputingAugust 2022, Pages 250–257https://doi.org/10.1145/3549206.3549253Drones are flying robots that can be remotely controlled. In this paper, we discussed different ways a drone can be used for surveillance. Drones are used to detect forest fires, manage traffic remotely, surveillance of crowds, etc. Drones make ...
- articleSeptember 2021
A survey on the roles of Bloom Filter in implementation of the Named Data Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 196, Issue CSep 2021https://doi.org/10.1016/j.comnet.2021.108232AbstractToday is the era of smart devices. Through smart devices, people remain connected with each other across the globe. But, it led the current Internet towards scalability issues. Therefore, leaving IP-based Internet behind, the world is ...
- research-articleJune 2019
rDBF: A r-Dimensional Bloom Filter for massive scale membership query
Journal of Network and Computer Applications (JNCA), Volume 136, Issue CJun 2019, Pages 100–113https://doi.org/10.1016/j.jnca.2019.03.004AbstractBloom Filter is a data structure for membership filtering that is deployed in various domains to boost up the lookup performance and to lower the memory consumption. Bloom Filter has gained a massive popularity nowadays, and thus, it is deployed ...
- review-articleJanuary 2019
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Journal of Computer Networks and Communications (JCNC), Volume 20192019https://doi.org/10.1155/2019/2712417Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns “true” or “false” with an error tolerance depending on the presence of the element in the set. Bloom filter is used to boost up the performance of a ...
- research-articleJanuary 2018
rTuner: A Performance Enhancement of MapReduce Job
ICCMS '18: Proceedings of the 10th International Conference on Computer Modeling and SimulationJanuary 2018, Pages 176–183https://doi.org/10.1145/3177457.3191710In this paper, we present a novel task scheduling algorithm, called rTuner. The key objective of the rTuner is to enhance the reduce task execution time in heterogeneous environments. Because, the reduce task is a very expensive process. The reduce ...