- Topic Modeling
- Advanced Text Analysis Techniques
- Advanced Authentication Protocols Security
- Data Mining Algorithms and Applications
- User Authentication and Security Systems
- Semantic Web and Ontologies
- Web Data Mining and Analysis
- Text and Document Classification Technologies
- Natural Language Processing Techniques
- Artificial Intelligence in Healthcare
- Network Security and Intrusion Detection
- Information Retrieval and Search Behavior
- Interconnection Networks and Systems
- Blockchain Technology Applications and Security
- Sentiment Analysis and Opinion Mining
- Imbalanced Data Classification Techniques
- Advanced Malware Detection Techniques
- IPv6, Mobility, Handover, Networks, Security
- AI-based Problem Solving and Planning
- Energy Load and Power Forecasting
- Neural Networks and Applications
- Music and Audio Processing
- Distributed systems and fault tolerance
- Wireless Body Area Networks
- Cryptography and Data Security
Indian Institute of Information Technology Sri City
2017-2024
Amrita Vishwa Vidyapeetham
2024
Tongji University
2024
CMR University
2019-2023
Indian Institute of Information Technology Allahabad
2018-2023
Indian Institute of Management Tiruchirappalli
2022
Orthopaedic Research Group
2022
Anna University, Chennai
2019
Norwegian University of Science and Technology
2010-2018
NTNU Samfunnsforskning
2017
With rapid technological growth, security attacks are drastically increasing. In many crucial Internet-of-Things (IoT) applications such as healthcare and defense, the early detection of plays a significant role in protecting huge resources. An intrusion system is used to address this problem. The signature-based approaches fail detect zero-day attacks. So anomaly-based particularly AI tools, becoming popular. addition, imbalanced dataset leads biased results. Machine Learning (ML) models,...
Increasing use of electronic healthcare (eHealth) services demands efficient and secure solutions. Such solutions need to ensure the prevention unauthorized access patient data provide faster response. Fog computing is a viable solution responses in eHealth systems. Key distribution authentication play major role providing security data. Existing centralized architectures are susceptible single-point-of-compromise, that is, entire system vulnerable when authority keys unexpectedly revealed...
Abstract In this article, the combined magnetohydrodynamic heat, momentum and mass (species) transfer in external boundary layer flow of Casson nanofluid from an isothermal sphere surface with convective condition under applied magnetic field is studied theoretically. The effects Brownian motion thermophoresis are incorporated model presence both heat nanoparticle conditions. governing partial differential equations (PDEs) transformed into highly nonlinear, coupled, multi-degree non-similar...