LAKA: lightweight authentication and key agreement protocol for internet of things based wireless body area network M Soni, DK Singh Wireless personal communications 127 (2), 1067-1084, 2022 | 81 | 2022 |
WITHDRAWN: Blockchain-based security & privacy for biomedical and healthcare information exchange systems M Soni, DK Singh Materials Today: Proceedings, 2021 | 75 | 2021 |
Wavelet based digital watermarking scheme for medical images M Soni, D Kumar 2020 12th international conference on computational intelligence and …, 2020 | 58 | 2020 |
Privacy-preserving authentication and key-management protocol for health information systems M Soni, DK Singh Data Protection and Privacy in Healthcare, 37-50, 2021 | 55 | 2021 |
Hand Gesture Recognition system for physically challenged people using IoT R Nair, DK Singh, Ashu, S Yadav, ... 6th International Conference on Advanced Computing & Communication Systems …, 2020 | 52 | 2020 |
Blockchain Implementation for Privacy preserving and securing the Healthcare data M Soni, DK Singh 2021 10th ieee international conference on communication systems and network …, 2021 | 44 | 2021 |
Intrusion response prioritization based on fuzzy ELECTRE multiple criteria decision making technique DK Singh, P Kaushik Journal of Information Security and Applications 48, 1-8, 2019 | 23 | 2019 |
Blockchain-based group authentication scheme for 6G communication network M Soni, DK Singh Physical Communication 57, 102005, 2023 | 20 | 2023 |
Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare M Soni, DK Singh Computer Communications 194, 292-300, 2022 | 15 | 2022 |
A modified convolutional neural network framework for categorizing lung cell histopathological image based on residual network SWDK Singh Healthcare Analytics, 2023 | 13 | 2023 |
Framework for Fuzzy Rule Based Automatic Intrusion Response Selection System (FRAIRSS) using Fuzzy Analytic Hierarchy Process and Fuzzy TOPSIS DK Singh, P Kaushik Journal of Intelligent & Fuzzy Systems 35 (2), 2559-2571, 2018 | 13 | 2018 |
New directions for security attacks, privacy, and malware detection in WBAN MSDK Singh Evolutionary Intelligence 15 (03, Sep 2022), 2022 | 10 | 2022 |
A key exchange system for secure data coordination in healthcare systems M Soni, DK Singh Healthcare Analytics 3, 100138, 2023 | 9 | 2023 |
WITHDRAWN: Challenges in evolutionary algorithm to find optimal parameters of SVM: A review A Namdeo, D Singh Materials Today: Proceedings, 2021 | 8 | 2021 |
Security attacks in internet of things R Nair, P Sharma, DK Singh Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications …, 2020 | 8 | 2020 |
Wireless Personal Communication M Soni, DK Singh Springer, 2021 | 7 | 2021 |
Machine learning-based recommendation system for disease-drug material and adverse drug reaction: comparative review K Tiwari, DK Singh Materials Today: Proceedings 51, 304-313, 2022 | 6 | 2022 |
Analysis of decision making factors for automated intrusion response system (AIRS): A review DK Singh, P Kaushik International Journal of Computer Science and Information Security 14 (6), 471, 2016 | 5 | 2016 |
Analysis of cryptographic encryption algorithm design to Secure IoT Devices: A review P Garg, DK Singh Materials Today: Proceedings 51, 810-814, 2022 | 3 | 2022 |
Deadlock Avoidance: A Dynamic Programming Approach RR Singh, DK Singh 2010 International Conference on Computational Intelligence and …, 2010 | 1 | 2010 |