Fake news detection using deep learning models: A novel approach S Kumar, R Asthana, S Upadhyay, N Upreti, M Akbar Transactions on Emerging Telecommunications Technologies 31 (2), e3767, 2020 | 169 | 2020 |
An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen IEEE Access 8, 28096-28108, 2020 | 112 | 2020 |
Improved authenticated key agreement scheme for fog-driven IoT healthcare system TY Wu, T Wang, YQ Lee, W Zheng, S Kumari, S Kumar Security and Communication Networks 2021, 1-16, 2021 | 69 | 2021 |
An improved blockchain-based authentication protocol for IoT network management M Yavari, M Safkhani, S Kumari, S Kumar, CM Chen Security and Communication Networks 2020, 1-16, 2020 | 60 | 2020 |
Energy‐efficient fog computing in Internet of Things based on Routing Protocol for Low‐Power and Lossy Network with Contiki A Kumar, S Sharma, N Goyal, SK Gupta, S Kumari, S Kumar International Journal of Communication Systems 35 (4), e5049, 2022 | 47 | 2022 |
Forward Privacy Preservation in IoT-Enabled Healthcare Systems K Wang, CM Chen, Z Tie, M Shojafar, S Kumar, S Kumari IEEE transactions on industrial informatics 18 (3), 1991-1999, 2021 | 47 | 2021 |
LSTM Network for Transportation Mode Detection S Kumar, A Damaraju, A Kumar, S Kumari, CM Chen Journal of Internet Technology 22 (4), 891-902, 2021 | 46 | 2021 |
A provably secure three-factor authentication protocol for wireless sensor networks TY Wu, L Yang, Z Lee, SC Chu, S Kumari, S Kumar Wireless Communications and Mobile Computing 2021, 1-15, 2021 | 39 | 2021 |
Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks K Renuka, S Kumar, S Kumari, CM Chen Sensors 19 (21), 4625, 2019 | 35 | 2019 |
Lightweight authentication protocol in edge-based smart grid environment CM Chen, L Chen, Y Huang, S Kumar, JMT Wu EURASIP Journal on Wireless Communications and Networking 2021, 1-18, 2021 | 32 | 2021 |
RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications M Safkhani, N Bagheri, S Kumari, H Tavakoli, S Kumar, J Chen IEEE Access 8, 200851-200862, 2020 | 31 | 2020 |
Disbezant: secure and robust federated learning against byzantine attack in iot-enabled mts X Ma, Q Jiang, M Shojafar, M Alazab, S Kumar, S Kumari IEEE Transactions on Intelligent Transportation Systems 24 (2), 2492-2502, 2022 | 29 | 2022 |
A survey on the blockchain techniques for the Internet of Vehicles security S Kumar, S Velliangiri, P Karthikeyan, S Kumari, S Kumar, MK Khan Transactions on Emerging Telecommunications Technologies 35 (4), e4317, 2024 | 28 | 2024 |
Transfer reinforcement learning-based road object detection in next generation IoT domain K Wang, CM Chen, MS Hossain, G Muhammad, S Kumar, S Kumari Computer Networks 193, 108078, 2021 | 28 | 2021 |
Performance Evaluation of DSR, AODV and DSDV Routing Protocol for Wireless Adhoc Network M Gupta, S Kumar 2015 IEEE International Conference on Computational Intelligence …, 2015 | 27 | 2015 |
Comparative study of TCP variants for congestion control in wireless network P Chaudhary, S Kumar 2017 International conference on computing, communication and automation …, 2017 | 25 | 2017 |
Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems W Li, C Jin, S Kumari, H Xiong, S Kumar Transactions on Emerging Telecommunications Technologies 33 (10), e3986, 2022 | 24 | 2022 |
A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET Y Zhao, X Zhang, X Xie, Y Ding, S Kumar Transactions on Emerging Telecommunications Technologies 33 (5), e3785, 2022 | 24 | 2022 |
A review of comparative analysis of TCP variants for congestion control in network P Chaudhary, S Kumar International Journal of Computer Applications 160 (8), 2017 | 24 | 2017 |
Blockchain-based medical data sharing schedule guaranteeing security of individual entities CM Chen, X Deng, S Kumar, S Kumari, SK Islam Journal of Ambient Intelligence and Humanized Computing, 1-10, 2021 | 21 | 2021 |