default search action
Awadhesh Kumar Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Divya Garg, Gyanendra Kumar Verma, Awadhesh Kumar Singh:
EEG-based emotion recognition using MobileNet Recurrent Neural Network with time-frequency features. Appl. Soft Comput. 154: 111338 (2024) - [j43]Diksha Malhotra, Poonam Saini, Awadhesh Kumar Singh:
Blockchain-based proof-of-authenticity frameworks for Explainable AI. Multim. Tools Appl. 83(13): 37889-37911 (2024) - 2023
- [j42]Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network. Int. J. Inf. Sec. 22(1): 119-135 (2023) - [j41]Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures. J. Ambient Intell. Humaniz. Comput. 14(7): 9355-9381 (2023) - [j40]Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:
Termination detection in cloud. Int. J. Syst. Assur. Eng. Manag. 14(6): 2337-2344 (2023) - [j39]R. L. Keerthana, Awadhesh Kumar Singh, Poonam Saini, Diksha Malhotra:
Explaining Sarcasm of Tweets using Attention Mechanism. Scalable Comput. Pract. Exp. 24(4): 787-796 (2023) - [j38]Divya Garg, Gyanendra Kumar Verma, Awadhesh Kumar Singh:
EEG-Based Emotion Recognition Using Quantum Machine Learning. SN Comput. Sci. 4(5): 480 (2023) - [j37]Pooja Chaudhary, B. B. Gupta, Awadhesh Kumar Singh:
Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology. Soft Comput. 27(8): 4593-4608 (2023) - 2022
- [j36]Sidharth Quamara, Awadhesh Kumar Singh:
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives. Comput. Secur. 113: 102548 (2022) - [j35]Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. Comput. Secur. 115: 102627 (2022) - [j34]Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh:
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. Comput. Secur. 118: 102710 (2022) - [j33]Santosh Kumar, Mahendra Kumar Murmu, Awadhesh Kumar Singh:
A bio-inspired backbone formation protocol in cognitive radio networks. Int. J. Commun. Syst. 35(16) (2022) - [j32]Diksha Malhotra, Poonam Saini, Awadhesh Kumar Singh:
Modified Transformer Architecture to Explain Black Box Models in Narrative Form. Int. J. Semantic Web Inf. Syst. 18(1): 1-19 (2022) - [j31]Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh:
XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks. J. Circuits Syst. Comput. 31(13): 2250222:1-2250222:24 (2022) - [j30]Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:
A hybrid approach towards reduced checkpointing overhead in cloud-based applications. Peer-to-Peer Netw. Appl. 15(1): 473-483 (2022) - [j29]Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh:
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks. Telecommun. Syst. 81(1): 23-39 (2022) - [j28]Diksha Malhotra, Poonam Saini, Awadhesh Kumar Singh:
How Blockchain Can Automate KYC: Systematic Review. Wirel. Pers. Commun. 122(2): 1987-2021 (2022) - [c20]Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh, Kwok Tai Chui:
Cognitive XSS Defensive Approach to Secure Smart Devices. ICCE-TW 2022: 461-462 - 2021
- [j27]Santosh Kumar, Awadhesh Kumar Singh:
A localized algorithm for clustering in cognitive radio networks. J. King Saud Univ. Comput. Inf. Sci. 33(5): 600-607 (2021) - [j26]Akshat Gaurav, Awadhesh Kumar Singh:
Light weight approach for secure backbone construction for MANETs. J. King Saud Univ. Comput. Inf. Sci. 33(7): 908-919 (2021) - [c19]Diksha Malhotra, Shubham Srivastava, Poonam Saini, Awadhesh Kumar Singh:
Blockchain based audit trailing of XAI decisions: Storing on IPFS and Ethereum Blockchain. COMSNETS 2021: 1-5 - 2020
- [j25]Santosh Kumar, Bharti Sharma, Awadhesh Kumar Singh:
An efficient algorithm for backbone construction in cognitive radio networks. Int. J. Commun. Syst. 33(8) (2020) - [p1]Mahendra Kumar Murmu, Awadhesh Kumar Singh:
Security Issues in Cognitive Radio Ad Hoc Networks. Handbook of Computer Networks and Cyber Security 2020: 247-264
2010 – 2019
- 2019
- [j24]Mahendra Kumar Murmu, Awadhesh Kumar Singh:
A bio-inspired leader election protocol for cognitive radio networks. Clust. Comput. 22(Suppl 1): 1665-1678 (2019) - [j23]Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini:
Failure detectors for crash faults in cloud. J. Ambient Intell. Humaniz. Comput. 10(11): 4407-4415 (2019) - [j22]Mahendra Kumar Murmu, Awadhesh Kumar Singh:
Speedy leader election to avoid application discontinuity in cognitive radio networks. Telecommun. Syst. 70(3): 349-364 (2019) - [j21]Santosh Kumar, Awadhesh Kumar Singh:
Fault Tolerant Routing Protocol in Cognitive Radio Networks. Wirel. Pers. Commun. 107(1): 679-694 (2019) - 2018
- [j20]Shantanu Sharma, Awadhesh Kumar Singh:
An election algorithm to ensure the high availability of leader in large mobile ad hoc networks. Int. J. Parallel Emergent Distributed Syst. 33(2): 172-196 (2018) - 2017
- [j19]Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh:
A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks. J. King Saud Univ. Comput. Inf. Sci. 29(3): 378-398 (2017) - [j18]Mahendra Kumar Murmu, Awadhesh Kumar Singh:
A Leader Election Protocol for Cognitive Radio Networks. Wirel. Pers. Commun. 97(3): 3773-3791 (2017) - 2016
- [j17]Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh:
A hierarchical virtual backbone construction protocol for mobile ad hoc networks. J. King Saud Univ. Comput. Inf. Sci. 28(3): 276-288 (2016) - [j16]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A survey on 5G: The next generation of mobile communication. Phys. Commun. 18: 64-84 (2016) - 2015
- [j15]Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks. J. King Saud Univ. Comput. Inf. Sci. 27(4): 402-415 (2015) - [j14]Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Movement-Based Checkpointing and Message Logging for Recovery in MANETs. Wirel. Pers. Commun. 83(3): 1971-1993 (2015) - [c18]Kuldeep Singh, Poonam Saini, Sudesh Rani, Awadhesh Kumar Singh:
Authentication and privacy preserving message transfer scheme for vehicular ad hoc networks (VANETs). Conf. Computing Frontiers 2015: 58:1-58:7 - [i3]Shantanu Sharma, Awadhesh Kumar Singh:
On Detecting Termination in Cognitive Radio Networks. CoRR abs/1507.04462 (2015) - [i2]Abhinav Singh, Awadhesh Kumar Singh:
Mobility and Energy Conscious Clustering Protocol for Wireless Networks. CoRR abs/1510.07148 (2015) - [i1]Nisha Panwar, Shantanu Sharma, Awadhesh Kumar Singh:
A Survey on 5G: The Next Generation of Mobile Communication. CoRR abs/1511.01643 (2015) - 2014
- [j13]Poonam Saini, Awadhesh Kumar Singh:
Hash-based Byzantine fault tolerant agreement with enhanced view consistency. Int. J. Commun. Networks Distributed Syst. 12(2): 152-168 (2014) - [j12]Shantanu Sharma, Awadhesh Kumar Singh:
On detecting termination in cognitive radio networks. Int. J. Netw. Manag. 24(6): 499-527 (2014) - [j11]Bharti Sharma, Ravinder Singh Bhatia, Awadhesh Kumar Singh:
A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks. J. Inf. Process. Syst. 10(1): 36-54 (2014) - [j10]Ashish Khanna, Awadhesh Kumar Singh, Abhishek Swaroop:
A Leader-Based k-Local Mutual Exclusion Algorithm Using Token for MANETs. J. Inf. Sci. Eng. 30(5): 1303-1319 (2014) - [j9]Ritu Garg, Awadhesh Kumar Singh:
Multi-objective workflow grid scheduling using ε-fuzzy dominance sort based discrete particle swarm optimization. J. Supercomput. 68(2): 709-732 (2014) - 2013
- [j8]Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Log Based Recovery with Low Overhead for Large Mobile Computing Systems. J. Inf. Sci. Eng. 29(5): 969-984 (2013) - 2012
- [j7]Ritu Garg, Awadhesh Kumar Singh:
Reference Point Based Multi-Objective Optimization to Workflow Grid Scheduling. Int. J. Appl. Evol. Comput. 3(1): 80-99 (2012) - 2011
- [j6]Parmeet Kaur Jaggi, Awadhesh Kumar Singh:
Message efficient global snapshot recording using a self stabilizing spanning tree in a MANET. Int. J. Commun. Networks Inf. Secur. 3(3) (2011) - [c17]Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh:
DMX in MANETs: major research trends since 2004. ACAI 2011: 50-55 - [c16]Poonam Saini, Awadhesh Kumar Singh:
Efficient fault tolerant consensus using preemptive token. ACAI 2011: 56-60 - [c15]Awadhesh Kumar Singh, Shantanu Sharma:
Trivial solution for a non-trivial problem in MANETs. ACAI 2011: 111-119 - [c14]Poonam Saini, Awadhesh Kumar Singh:
An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration. ADCONS 2011: 612-620 - [c13]Awadhesh Kumar Singh, Shantanu Sharma:
Message efficient leader finding algorithm for mobile ad hoc networks. COMSNETS 2011: 1-6 - [c12]Bharti Sharma, Rabinder Singh Bhatia, Awadhesh Kumar Singh:
On the Potential of Ricart-Agrawala Algorithm in Mobile Computing Environments. HPAGC 2011: 430-434 - [c11]Shantanu Sharma, Awadhesh Kumar Singh:
Democratic Leader Finding Algorithm for Large Mobile Ad Hoc Networks. ICDCS Workshops 2011: 304-312 - [c10]Awadhesh Kumar Singh, Shantanu Sharma:
Elite Leader Finding Algorithm for MANETs. ISPDC 2011: 125-132 - [c9]Poonam Saini, Awadhesh Kumar Singh:
Hash Based Byzantine Fault Tolerant Agreement with Enhanced View Consistency. PDCAT 2011: 368-374 - [c8]Shantanu Sharma, Awadhesh Kumar Singh:
On Detecting Termination in Cognitive Radio Networks. PRDC 2011: 71-78 - [c7]Ritu Garg, Awadhesh Kumar Singh:
Multi-objective Workflow Grid Scheduling Based on Discrete Particle Swarm Optimization. SEMCCO (1) 2011: 183-190 - 2010
- [j5]Abhishek Swaroop, Awadhesh Kumar Singh:
An Improved Quorum-Based Algorithm for Extended GME Problem in Distributed Systems. J. Inf. Sci. Eng. 26(1): 57-69 (2010) - [j4]Umesh Ghanekar, Awadhesh Kumar Singh, Rajoo Pandey:
A Contrast Enhancement-Based Filter for Removal of Random Valued Impulse Noise. IEEE Signal Process. Lett. 17(1): 47-50 (2010) - [c6]Umesh Ghanekar, Awadhesh Kumar Singh, Rajoo Pandey:
Impulse Noise Removal from Color Images Using Adaptive Neuro-fuzzy Impulse Detector. IC3 (1) 2010: 373-380 - [c5]Abhishek Swaroop, Awadhesh Kumar Singh:
A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems. ICDCN 2010: 178-183 - [c4]Awadhesh Kumar Singh, Anup Kumar Bandyopadhyay:
Specifying Fault-Tolerance Using Split Precondition Logic. ICDCN 2010: 466-472
2000 – 2009
- 2009
- [c3]Awadhesh Kumar Singh, Rohit Bhat, Anshul Kumar:
An Index-Based Mobile Checkpointing and Recovery Algorithm. ICDCN 2009: 200-205 - [c2]Abhishek Swaroop, Awadhesh Kumar Singh:
A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems. ICDCN 2009: 462-467 - 2008
- [c1]Awadhesh Kumar Singh:
A Randomized Approach to Bound Jayanti's Mutual Exclusion Algorithm. ICETET 2008: 1325-1330 - 2005
- [j3]Awadhesh Kumar Singh, Umesh Ghanekar, Anup Kumar Bandyopadhyay:
Specifying Mobile Network using a wp-like Formal Approach. Rev. Colomb. de Computación 6(2): 59-77 (2005) - 2004
- [j2]Awadhesh Kumar Singh, Anup Kumar Bandyopadhyay:
Verifying Mutual Exclusion and Liveness Properties with Split Preconditions. J. Comput. Sci. Technol. 19(6): 795-802 (2004) - [j1]Awadhesh Kumar Singh, Anup Kumar Bandyopadhyay:
Adding the leads-to operator to Dijkstra's calculus. ACM SIGPLAN Notices 39(2): 12-17 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint