default search action
L. Jegatha Deborah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Li Zhang
, Jianbo Xu
, Audithan Sivaraman
, Lazarus Jegatha Deborah, Pradip Kumar Sharma
, Pandi Vijayakumar
:
A Two-Stage Differential Privacy Scheme for Federated Learning Based on Edge Intelligence. IEEE J. Biomed. Health Informatics 28(6): 3349-3360 (2024) - 2023
- [j32]S. C. Rajkumar
, L. Jegatha Deborah, Pandi Vijayakumar, Karthick K R
:
Secure session key pairing and a lightweight key authentication scheme for liable drone services. Cyber Secur. Appl. 1: 100012 (2023) - [j31]S. C. Rajkumar
, L. Jegatha Deborah
, Pandi Vijayakumar
:
Optimized traffic flow prediction based on cluster formation and reinforcement learning. Int. J. Commun. Syst. 36(12) (2023) - [j30]R. Vinoth
, Lazarus Jegatha Deborah
:
An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J. Ambient Intell. Humaniz. Comput. 14(3): 1431-1443 (2023) - [j29]R. Karthika
, V. Elizabeth Jesi, Mary Subaja Christo, L. Jegatha Deborah
, Audithan Sivaraman
, Sanjeev Kumar
:
Intelligent personalised learning system based on emotions in e-learning. Pers. Ubiquitous Comput. 27(6): 2211-2223 (2023) - 2022
- [j28]S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah:
Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning. Comput. J. 65(10): 2678-2692 (2022) - [j27]Pandi Vijayakumar, S. C. Rajkumar
, L. Jegatha Deborah:
Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication. Int. J. Cloud Appl. Comput. 12(1): 1-14 (2022) - [j26]M. Usha Rani, N. Saravana Selvam, L. Jegatha Deborah:
An Improvement of Yield Production Rate for Crops by Predicting Disease Rate Using Intelligent Decision Systems. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-22 (2022) - [j25]Pandi Vijayakumar, L. Jegatha Deborah, S. C. Rajkumar
:
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-33 (2022) - [j24]R. Elakkiya
, Kuppa Sai Sri Teja, L. Jegatha Deborah
, Carmen Bisogni
, Carlo Maria Medaglia
:
Imaging based cervical cancer diagnostics using small object detection - generative adversarial networks. Multim. Tools Appl. 81(1): 191-207 (2022) - [j23]R. Vinoth
, Lazarus Jegatha Deborah, Pandi Vijayakumar
, Brij B. Gupta
:
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments. IEEE Trans. Netw. Sci. Eng. 9(5): 3633-3642 (2022) - 2021
- [j22]S. Guruvammal, T. Chellatamilan, L. Jegatha Deborah:
Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children. Comput. J. 64(11): 1760-1774 (2021) - [j21]S. C. Rajkumar
, L. Jegatha Deborah
:
An improved public transportation system for effective usage of vehicles in intelligent transportation system. Int. J. Commun. Syst. 34(13) (2021) - [j20]Rajendran Karthika, L. Jegatha Deborah:
Enhanced Learning Experiences Based on Regulatory Fit Theory Using Affective State Detection. Int. J. Semantic Web Inf. Syst. 17(4): 37-55 (2021) - [j19]R. Vinoth
, Lazarus Jegatha Deborah
, Pandi Vijayakumar
, Neeraj Kumar
:
Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT. IEEE Internet Things J. 8(5): 3801-3811 (2021) - [j18]Victor Chang
, Carole A. Goble, Muthu Ramachandran, Lazarus Jegatha Deborah, Reinhold Behringer:
Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19. Inf. Syst. Frontiers 23(6): 1363-1367 (2021) - [j17]Qing Fan
, Jianhua Chen, Lazarus Jegatha Deborah
, Min Luo:
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain. J. Syst. Archit. 117: 102112 (2021) - [j16]Maria Azees
, Pandi Vijayakumar
, Lazarus Jegatha Deborah
, Marimuthu Karuppiah
, Mary Subaja Christo
:
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs. Secur. Commun. Networks 2021: 6679882:1-6679882:11 (2021) - 2020
- [j15]Ramu Naresh, Pandi Vijayakumar, Lazarus Jegatha Deborah
, Sivakumar Radhakrishnan:
A Novel Trust Model for Secure Group Communication in Distributed Computing. J. Organ. End User Comput. 32(3): 1-14 (2020) - [j14]Rajendran Karthika
, L. Jegatha Deborah, Pandi Vijayakumar
:
Intelligent e-learning system based on fuzzy logic. Neural Comput. Appl. 32(12): 7661-7670 (2020)
2010 – 2019
- 2019
- [j13]Pandi Vijayakumar
, S. Milton Ganesh
, Lazarus Jegatha Deborah
, SK Hafizul Islam
, Mohammad Mehedi Hassan
, Abdulhameed Alelaiwi, Giancarlo Fortino
:
MGPV: A novel and efficient scheme for secure data sharing among mobile users in the public cloud. Future Gener. Comput. Syst. 95: 560-569 (2019) - [c5]Lazarus Jegatha Deborah
, Rajendran Karthika, Pandi Vijayakumar
, Bharat S. Rawal, Yong Wang:
Secure Online Examination System for e-learning. CCECE 2019: 1-4 - 2018
- [j12]Pandi Vijayakumar
, S. Milton Ganesh
, L. Jegatha Deborah
, Bharat S. Rawal
:
A new SmartSMS protocol for secure SMS communication in m-health environment. Comput. Electr. Eng. 65: 265-281 (2018) - [j11]Pandi Vijayakumar
, Victor I. Chang
, L. Jegatha Deborah, Balamurugan Balusamy
, P. G. Shynu
:
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78: 943-955 (2018) - [j10]Pandi Vijayakumar
, Victor Chang
, L. Jegatha Deborah
, Bharat S. Rawal Kshatriya:
Key management and key distribution for secure group communication in mobile and cloud network. Future Gener. Comput. Syst. 84: 123-125 (2018) - 2017
- [j9]Pandi Vijayakumar
, Perumal Pandiaraja, Marimuthu Karuppiah
, L. Jegatha Deborah:
An efficient secure communication for healthcare system using wearable devices. Comput. Electr. Eng. 63: 232-245 (2017) - [j8]Pandi Vijayakumar
, Maria Azees
, Victor I. Chang
, L. Jegatha Deborah
, Balamurugan Balusamy
:
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3): 2439-2450 (2017) - [j7]Maria Azees
, Pandi Vijayakumar
, Lazarus Jegatha Deborah:
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 18(9): 2467-2476 (2017) - [c4]S. Milton Ganesh, Pandi Vijayakumar, L. Jegatha Deborah, Md. Zakirul Alam Bhuiyan
:
Attacks on the Anti-collusion Data Sharing Scheme for Dynamic Groups in the Cloud. SpaCCS Workshops 2017: 457-467 - [c3]Rajendran Karthika, Lazarus Jegatha Deborah, Pandi Vijayakumar
, Sivaraman Audithan
:
Grouping Users for Quick Recommendations of Text Documents Based on Deep Neural Network. SpaCCS Workshops 2017: 617-626 - 2016
- [j6]Pandi Vijayakumar
, Ramu Naresh, Lazarus Jegatha Deborah, SK Hafizul Islam
:
An efficient group key agreement protocol for secure P2P communication. Secur. Commun. Networks 9(17): 3952-3965 (2016) - [j5]Pandi Vijayakumar
, Ramu Naresh, SK Hafizul Islam
, Lazarus Jegatha Deborah
:
An effective key distribution for secure internet pay-TV using access key hierarchies. Secur. Commun. Networks 9(18): 5085-5097 (2016) - [j4]Pandi Vijayakumar
, Maria Azees
, Arputharaj Kannan
, Lazarus Jegatha Deborah
:
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 17(4): 1015-1028 (2016) - 2015
- [c2]Pandi Vijayakumar
, Maria Azees
, L. Jegatha Deborah
:
CPAV: Computationally Efficient Privacy Preserving Anonymous Authentication Scheme for Vehicular Ad Hoc Networks. CSCloud 2015: 62-67 - 2014
- [j3]L. Jegatha Deborah, Ramachandran Baskaran, Arputharaj Kannan
:
Learning styles assessment and theoretical origin in an E-learning scenario: a survey. Artif. Intell. Rev. 42(4): 801-819 (2014) - 2013
- [j2]Pandi Vijayakumar
, Sundan Bose, Arputharaj Kannan
, L. Jegatha Deborah
:
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication. KSII Trans. Internet Inf. Syst. 7(4): 878-894 (2013) - 2012
- [j1]Lazarus Jegatha Deborah
, Ramachandran Baskaran, Arputharaj Kannan
:
Deontic Logic Based Ontology Alignment Technique for E-Learning. Int. J. Intell. Inf. Technol. 8(3): 56-72 (2012) - 2011
- [c1]L. Jegatha Deborah, Ramachandran Baskaran, Arputharaj Kannan
:
Ontology Construction Using Computational Linguistics for E-Learning. IVIC (2) 2011: 50-63 - [i1]L. Jegatha Deborah, Ramachandran Baskaran, Arputharaj Kannan:
Visualizing Domain Ontology using Enhanced Anaphora Resolution Algorithm. CoRR abs/1109.2321 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint