default search action
Mayank Dave
Person information
- affiliation: National Institute of Technology, Kurukshetra, Haryana, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j51]Sumit Dalal
, Sarika Jain
, Mayank Dave
:
Review of Advancements in Depression Detection Using Social Media Data. IEEE Trans. Comput. Soc. Syst. 12(1): 77-100 (2025) - [j50]Sumit Dalal, Sarika Jain, Mayank Dave:
DepressionFeature: Underlying ontology for user-specific depression analysis. J. Supercomput. 81(1): 93 (2025) - 2024
- [j49]Sonam Bhardwaj
, Adrian Shuai Li, Mayank Dave
, Elisa Bertino:
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation. Comput. Secur. 140: 103769 (2024) - [j48]Sonam Bhardwaj
, Mayank Dave
:
RAKSHAM: Responsive approach to Knock-off scavenging hackers and attack mitigation. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j47]Mamta Nain, Nitin Goyal
, Sanjay Kumar Dhurandher, Mayank Dave
, Anil K. Verma, Amita Malik:
A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions. Int. J. Commun. Syst. 37(16) (2024) - [j46]Sumit Dalal
, Sarika Jain, Mayank Dave
:
Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data. New Gener. Comput. 42(1): 135-155 (2024) - [j45]Sumit Dalal
, Sarika Jain, Mayank Dave:
Correction to: Convolution Neural Network Having Multiple Channels with Own Attention Layer for Depression Detection from Social Data. New Gener. Comput. 42(1): 199-200 (2024) - [j44]Sonam Bhardwaj, Mayank Dave
:
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks. Telecommun. Syst. 85(4): 601-621 (2024) - [i7]Sumit Dalal, Sarika Jain, Mayank Dave:
Deep Knowledge-Infusion For Explainable Depression Detection. CoRR abs/2409.02122 (2024) - 2023
- [j43]Sonam Bhardwaj
, Mayank Dave
:
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack. Comput. Secur. 135: 103521 (2023) - [j42]Hardik Sachdeva, Shivam Gupta, Anushka Misra, Khushbu Chauhan, Mayank Dave:
Privacy and security improvement in UAV network using blockchain. Int. J. Commun. Networks Distributed Syst. 29(4): 383-406 (2023) - [j41]Sonam Bhardwaj
, Mayank Dave
:
Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique. SN Comput. Sci. 4(6): 737 (2023) - [j40]Rochak Swami
, Mayank Dave
, Virender Ranga
:
Mitigation of DDoS Attack Using Moving Target Defense in SDN. Wirel. Pers. Commun. 131(4): 2429-2443 (2023) - 2022
- [j39]Sonam Bhardwaj
, Mayank Dave
:
Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics. Wirel. Pers. Commun. 122(3): 2701-2722 (2022) - [j38]Mayank Dave
, Vishal Rastogi, Mehak Miglani, Parveen Saharan, Nitin Goyal
:
Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain. Wirel. Pers. Commun. 124(2): 1677-1694 (2022) - [c17]Sumit Dalal, Abhisek Sharma, Sarika Jain, Mayank Dave:
Manual Prompt Generation For Language Model Probing. LM-KBC@ISWC 2022: 67-76 - [i6]Hardik Sachdeva, Shivam Gupta, Anushka Misra, Khushbu Chauhan, Mayank Dave:
Improving Privacy and Security in Unmanned Aerial Vehicles Network using Blockchain. CoRR abs/2201.06100 (2022) - [i5]Shubham Shakya, Mayank Dave
:
Analysis, Detection, and Classification of Android Malware using System Calls. CoRR abs/2208.06130 (2022) - 2021
- [j37]Priyanka Ahlawat
, Mayank Dave
:
An attack resistant key predistribution scheme for wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 33(3): 268-280 (2021) - [j36]Rochak Swami
, Mayank Dave, Virender Ranga
:
Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking. Wirel. Pers. Commun. 118(4): 2295-2317 (2021) - 2020
- [j35]Rochak Swami
, Mayank Dave, Virender Ranga
:
Voting-based intrusion detection framework for securing software-defined networks. Concurr. Comput. Pract. Exp. 32(24) (2020) - [j34]Nitin Goyal
, Mayank Dave
, Anil Kumar Verma:
SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs. Wirel. Pers. Commun. 113(1): 1-15 (2020) - [c16]Vibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave
:
Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning. SAI (3) 2020: 161-173 - [i4]Vaishali Kansal, Mayank Dave:
Proactive DDoS Attack Mitigation in Cloud-Fog Environment using Moving Target Defense. CoRR abs/2012.01964 (2020)
2010 – 2019
- 2019
- [j33]Rochak Swami
, Mayank Dave
, Virender Ranga
:
Software-defined Networking-based DDoS Defense Mechanisms. ACM Comput. Surv. 52(2): 28:1-28:36 (2019) - [j32]Nitin Goyal
, Mayank Dave
, Anil K. Verma:
Data aggregation in underwater wireless sensor network: Recent approaches and issues. J. King Saud Univ. Comput. Inf. Sci. 31(3): 275-286 (2019) - [j31]Nitin Goyal
, Mayank Dave
, Anil Kumar Verma:
Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends. Wirel. Pers. Commun. 104(3): 995-1022 (2019) - [c15]Vikram Singh
, Mayank Dave
:
Improving Result Diversity Using Query Term Proximity in Exploratory Search. BDA 2019: 67-87 - [c14]Hittu Garg, Mayank Dave
:
Securing User Access at IoT Middleware Using Attribute Based Access Control. ICCCNT 2019: 1-6 - 2018
- [j30]Nitin Goyal
, Mayank Dave
, Anil Kumar Verma:
A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. Int. J. Commun. Syst. 31(4) (2018) - [j29]Priyanka Ahlawat
, Mayank Dave
:
A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security. Int. J. Commun. Syst. 31(12) (2018) - [j28]Priyanka Ahlawat
, Mayank Dave
:
Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN. Wirel. Pers. Commun. 99(4): 1541-1568 (2018) - 2017
- [j27]Amit Kumar Singh
, Basant Kumar, Sanjay Kumar Singh
, Mayank Dave
, Vivek Kumar Singh
, Pardeep Kumar
, S. P. Ghrera, Pradeep Kumar Gupta
, Anand Mohan:
Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications. Multim. Tools Appl. 76(5): 7563-7573 (2017) - [j26]Sanjay Kumar Malik
, Mayank Dave
, Sanjay K. Dhurandher, Isaac Woungang, Leonard Barolli:
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft Comput. 21(21): 6225-6236 (2017) - [j25]Priyanka Ahlawat
, Mayank Dave
:
A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks. Wirel. Pers. Commun. 94(4): 3327-3353 (2017) - [c13]Nisha Hooda, Mayank Dave
:
Energy Efficient Rekeying Protocol for Wireless Sensor and Actor Networks. UCAmI 2017: 533-544 - [i3]Sanya Chaba, Rahul Kumar, Rohan Pant, Mayank Dave:
Malware Detection Approach for Android systems Using System Call Logs. CoRR abs/1709.08805 (2017) - 2016
- [j24]Virender Ranga
, Mayank Dave
, Anil Kumar Verma:
A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN. Int. J. Commun. Networks Distributed Syst. 17(4): 433-449 (2016) - [j23]Amit Kumar Singh
, Mayank Dave
, Anand Mohan:
Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multim. Tools Appl. 75(14): 8381-8401 (2016) - [j22]Shailja Sharma, Jagdeep Singh Lather, Mayank Dave
:
Semantic approach for Web service classification using machine learning and measures of semantic relatedness. Serv. Oriented Comput. Appl. 10(3): 221-231 (2016) - [j21]Neeraj Kumar
, Mayank Dave
:
BIIR: A Beacon Information Independent VANET Routing Algorithm with Low Broadcast Overhead. Wirel. Pers. Commun. 87(3): 869-895 (2016) - [j20]Nitin Goyal
, Mayank Dave
, Anil Kumar Verma:
Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 89(2): 687-707 (2016) - [c12]Ashutosh Upadhyay, Mayank Dave
:
Fuzzy-BPN Based Improved Technique for Color Image Watermarking. ICIA 2016: 85:1-85:10 - 2015
- [j19]Virender Ranga
, Mayank Dave
, Anil Kumar Verma:
Relay node placement to heal partitioned wireless sensor networks. Comput. Electr. Eng. 48: 371-388 (2015) - [j18]Amit Kumar Singh
, Basant Kumar, Mayank Dave
, Anand Mohan:
Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel. Pers. Commun. 80(4): 1415-1433 (2015) - [j17]Amit Kumar Singh
, Mayank Dave
, Anand Mohan:
Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain. Wirel. Pers. Commun. 83(3): 2133-2150 (2015) - [c11]Shailja Sharma, Jagdeep Singh Lather, Mayank Dave
:
Google based hybrid approach for discovering services. ICSC 2015: 498-502 - 2014
- [j16]Amit Kumar Singh
, Mayank Dave
, Anand Mohan:
Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. Int. J. Electron. Secur. Digit. Forensics 6(4): 285-305 (2014) - [j15]Virender Ranga
, Mayank Dave
, Anil Kumar Verma
:
A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs. Wirel. Pers. Commun. 77(3): 2155-2182 (2014) - [j14]Rakesh Kumar, Mayank Dave
:
Mobility Models and their Affect on Data Aggregation and Dissemination in Vehicular Networks. Wirel. Pers. Commun. 79(3): 2237-2269 (2014) - [c10]Shailja Sharma, Jagdeep Singh Lather, Mayank Dave
:
Hybrid cognitive model for semantic discovery and selection of services. CogSIMA 2014: 73-78 - 2013
- [j13]Rajwinder Singh, Mayank Dave
:
Antecedence Graph Approach to Checkpointing for Fault Tolerance in Mobile Agent Systems. IEEE Trans. Computers 62(2): 247-258 (2013) - [j12]Rajesh Kumar Aggarwal, Mayank Dave
:
Performance evaluation of sequentially combined heterogeneous feature streams for Hindi speech recognition system. Telecommun. Syst. 52(3): 1457-1466 (2013) - [j11]Rakesh Kumar, Mayank Dave
:
A Framework For Handling Local Broadcast Storm Using Probabilistic Data Aggregation In VANET. Wirel. Pers. Commun. 72(1): 315-341 (2013) - [j10]Virender Ranga
, Mayank Dave
, Anil Kumar Verma
:
Network Partitioning Recovery Mechanisms in WSANs: a Survey. Wirel. Pers. Commun. 72(2): 857-917 (2013) - [c9]Sanjay Kumar
, Mayank Dave
, Surender Dahiya
:
Performance evaluation of ant based routing protocol for WSNs with Heterogeneous nodes under different radio propagation models. IEEE ANTS 2013: 1-6 - [c8]Amit Kumar Singh
, Mayank Dave
, Anand Mohan:
A Hybrid Algorithm for Image Watermarking against Signal Processing Attacks. MIWAI 2013: 235-246 - 2012
- [j9]Rajesh Kumar Aggarwal, Mayank Dave
:
Integration of multiple acoustic and language models for improved Hindi speech recognition system. Int. J. Speech Technol. 15(2): 165-180 (2012) - [j8]Rajesh Kumar Aggarwal, Mayank Dave
:
Filterbank optimization for robust ASR using GA and PSO. Int. J. Speech Technol. 15(2): 191-201 (2012) - [c7]Rajwinder Singh, Mayank Dave
:
Novel Monitoring Mechanism for Distributed System Software Using Mobile Agents. ISI 2012: 383-392 - 2011
- [j7]Shashi Bhushan
, Mayank Dave
, R. B. Patel:
Reducing Network Overhead with Common Junction Methodology. Int. J. Mob. Comput. Multim. Commun. 3(3): 51-61 (2011) - [j6]Rajesh Kumar Aggarwal, Mayank Dave
:
Acoustic modeling problem for automatic speech recognition system: conventional methods (Part I). Int. J. Speech Technol. 14(4): 297 (2011) - [j5]Rajesh Kumar Aggarwal, Mayank Dave
:
Acoustic modeling problem for automatic speech recognition system: advances and refinements (Part II). Int. J. Speech Technol. 14(4): 309 (2011) - [i2]Rakesh Kumar, Mayank Dave:
A Comparative Study of Various Routing Protocols in VANET. CoRR abs/1108.2094 (2011) - [i1]Rakesh Kumar, Mayank Dave:
Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network. CoRR abs/1108.2095 (2011) - 2010
- [j4]Rajesh Kumar Bhatia, Mayank Dave
, Ramesh Chandra Joshi:
Ant colony based rule generation for reusable software component retrieval. ACM SIGSOFT Softw. Eng. Notes 35(2): 1-5 (2010) - [j3]Sanjeev Gupta, Mayank Dave
:
Model of Real Time Architecture for Data Placement in Wireless Sensor Networks. Wirel. Sens. Netw. 2(1): 53-61 (2010) - [c6]Rajesh Kumar Aggarwal, Mayank Dave
:
Tied Mixture Modeling in Hindi Speech Recognition System. ICT 2010: 514-519
2000 – 2009
- 2009
- [j2]Amita Rani, Mayank Dave
:
Load Balanced Routing Mechanisms for Mobile Ad Hoc Networks. Int. J. Commun. Netw. Syst. Sci. 2(7): 627-635 (2009) - [j1]Sanjeev Manchanda, S. B. Singh, Mayank Dave
:
Change Management and Software Reuse Supportive 'Genetic Information System Development and Maintenance' Model. Int. J. Softw. Eng. Knowl. Eng. 19(1): 113-136 (2009) - [c5]Manoj Kumar Gupta, Mayank Dave
, Archana Purwar:
Simulation of Power Efficient Region Based Approach for Query Processing in Wireless Sensor Networks. ICETET 2009: 1104-1109 - 2008
- [c4]Amita Rani, Mayank Dave
:
Weighted load balanced routing protocol for MANET. ICON 2008: 1-6 - [c3]Rajesh Kumar Aggarwal, Mayank Dave:
Implementing a Speech Recognition System Interface for Indian Languages. IJCNLP 2008: 105-112 - [c2]Rajesh Kumar Bhatia, Mayank Dave
, Ramesh C. Joshi:
Ant colony based rule generation for reusable software component retrieval. ISEC 2008: 129-130 - 2006
- [c1]Rajesh Kumar Bhatia, Mayank Dave, Ramesh C. Joshi:
Retrieval of Most Relevant Reusable Component Using Genetic Algorithms. Software Engineering Research and Practice 2006: 151-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint