Abhishek Kumar

ORCID: 0000-0002-8505-2007
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Brain Tumor Detection and Classification
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • EEG and Brain-Computer Interfaces
  • Internet Traffic Analysis and Secure E-voting
  • ECG Monitoring and Analysis
  • Advanced Malware Detection Techniques
  • Advanced Neural Network Applications
  • COVID-19 diagnosis using AI
  • Artificial Intelligence in Healthcare
  • Advanced Steganography and Watermarking Techniques
  • Smart Grid Security and Resilience
  • AI in Service Interactions
  • Identification and Quantification in Food
  • Imbalanced Data Classification Techniques
  • User Authentication and Security Systems
  • Wireless Body Area Networks
  • Advanced Authentication Protocols Security
  • AI in cancer detection
  • Time Series Analysis and Forecasting
  • Bluetooth and Wireless Communication Technologies
  • Air Quality Monitoring and Forecasting
  • Spam and Phishing Detection
  • Advanced Wireless Network Optimization

Chandigarh University
2023-2025

Chitkara University
2022

Mahaveer Academy of Technology and Science University
2016

Ngee Ann Polytechnic
2004

This research aims to analyze the continuous structure involved in developing Artificial Intelligence (AI)-based healthcare systems ensure sustainable outcomes. A comparison is made between organizational objectives system determine proper use of AI architectural design. The study will delve into results obtained from using design and highlight activities found perform tasks. provide insights potential improving sector. this be helpful for organizations individuals interested incorporating...

10.1109/icstsn57873.2023.10151477 article EN 2023-04-21

Abstract The advancement of information technology, the Internet Things (IoT), and several miniaturize equipment's enhances healthcare field that provides real‐time patient monitoring, which helps to provide medication anywhere anytime. However, accurate detection is still a challenging task for an effective classification model introduced in this research. proposed method Enhanced Hunt optimization based Deep convolutional neural network (Enhanced based‐Deep CNN), algorithm (EHOA) developed...

10.1111/exsy.13298 article EN Expert Systems 2023-04-16

Brain tumours are regarded as a fatal condition that impacts the lives of so many people worldwide. The kind, location, and size brain tumour all affect how it will be treated. Hence, an automated diagnosis is needed for early detection. Convolutional neural networks (CNNs) have become increasingly desired in recent times tasks like these. In this work, we performed multi-class classification into different types over MRI scans. For these several convolutional used comparative analysis made...

10.1109/cises58720.2023.10183528 article EN 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) 2023-04-28

Abstract The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust detection prevention mechanism for authenticated access. Blockchain is a distributed which attacker tries to hack by utilizing all resources with application enormous requests. Several methods like Rival Technique, filter modular approach so on, were developed detect prevent DDoS blockchain; still, accuracy challenging task. Hence, this research...

10.1002/ett.4729 article EN Transactions on Emerging Telecommunications Technologies 2023-01-25

Early identification of diabetes is vital since it's an incurable condition with no complete cure. We used data mining and machine learning strategies in our investigation to anticipate diabetes. 768 individuals their relevant attributes are the focus hour. Few methods have been applied dataset for goal forecasting occurrence The implemented algorithms' consistency harshness investigated using that focused on correlating accuracy F-1 rankings. Comparison between algorithms done increase...

10.1109/aic57670.2023.10263919 article EN 2022 IEEE World Conference on Applied Intelligence and Computing (AIC) 2023-07-29

The utilization of Artificial Intelligence (AI)-enabled software and hardware is expected to enhance the effectiveness monetary exchanges, which main objective this research. Since transaction costs are based on actual amount being transferred, customers feel more at ease making purchases using approach. This work aims investigate role financial systems in effective corporate administration, with a particular emphasis gateways as key components these systems. study investigates factors...

10.1109/icstsn57873.2023.10151455 article EN 2023-04-21

Data anomalies are found using anomaly detection. Generative adversarial networks (GANs) can produce synthetic data and learn complex patterns. Temporal dependencies relevant features needed to identify timeseries anomalies. A GAN is trained detect in data. The model performs better with Traditional ML models struggle the difficulties of identification time-series due issues such as dealing high dimensionality, capturing temporal correlations, detecting infrequent events skewed class...

10.1109/icscss57650.2023.10169365 article EN 2023-06-14

Software-defined networking (SDN) has significantly transformed the field of network management through consolidation control and provision enhanced adaptability. However, this paradigm shift concurrently presented novel security concerns. The preservation service path integrity holds significant importance within SDN environments due to potential for malevolent entities exploit flows, resulting in a range breaches. This research paper introduces model called "EnsureS", which aims enhance by...

10.1038/s41598-023-44701-7 article EN cc-by Scientific Reports 2023-10-13

Abstract Detection of cyber‐threats in the smart grid Supervisory Control and Data Acquisition (SCADA) is still remains one complex essential processes need to be highly concentrated present times. Typically, SCADA more prone security issues due their environmental problems vulnerabilities. Therefore, proposed work intends design a new detection approach by integrating optimization classification models for security. In this framework, min‐max normalization performed at first noise removal...

10.1049/gtd2.12943 article EN cc-by-nc-nd IET Generation Transmission & Distribution 2023-08-01

With many gaps and shortcomings in the field of IoT security, no matter how simple you think it is on your side what goes inside an intrusion detection system technique to detect attacks. This study explores current state IDS IoT. The most important points vulnerability are identified, we examine ways address them immediately. One key finding research that interoperability problems between differing devices platforms loom as two big roadblocks. Besides, lack standardized evaluation standards...

10.23919/indiacom61295.2024.10499013 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2024-02-28

Many industries have serious concerns about the secure transmission of sensitive data, and use blockchain technology, steganography, optimization algorithms has emerged as a potent remedy. Steganography can hide data increase effectiveness process, while technology offers transparent platform for storage transfer. The employment these technologies in tandem to offer reliable solution transfer is provided this paper. We also go over strategy's possible advantages difficulties suggestions...

10.1109/wconf58270.2023.10234981 article EN 2023-07-14

In order to improve the secure transfer of sensitive data, this paper investigates integration blockchain, steganography, and optimization algorithms. By obscuring data within files, boosting anonymity in blockchain transactions, enabling watermarking for evidence ownership, steganography enhances blockchain. concealing access credentials, it protects document exchange guarantees integrity IoT. Steganography work together security privacy. A strong solution is put forth by combining these...

10.1109/iciip61524.2023.10537655 article EN 2023-11-22

Worldwide Interoperability for Microwave Access applications and QoS specifications are based upon class schemes. These service classes effect to user fairness system utilization. Improved MAX C/I algorithm considers waiting time channel interference ratio but not scheduling schemes, after including this neglecting condition solves the problem of long distance priorities. RR scheduled instructions execution where queue priorities users set. But gain criteria, now mDmT resolves those...

10.1109/icetech.2016.7569331 article EN 2016-03-01

Abstract The Internet of Vehicles (IoV) is an element the global connectivity infrastructure Connected vehicles are beneficial to health their users in a significant way. However, several drawbacks have been identified, creating potential for compromised devices. Moreover, high mobility results energy consumption, which reduces network's overall performance. Efficient Privacy-preserving Lightweight-cryptography Cluster-based (EPLC-IoV) model that has proposed divided into five distinct...

10.21203/rs.3.rs-3287887/v1 preprint EN cc-by Research Square (Research Square) 2023-08-29

Cloud computing has become a revolution of modern computer paradigms, offering adaptable resources to the utmost. But thread operations inside cloud environments still fall under critical challenge for efficient processing and resource utilization. Integration blockchain technology would be new, transformative opportunity optimizing threads. Straddling realms infrastructure, this paper discusses threads examines how distributing program can lead better computational efficiency using...

10.1109/icdt61202.2024.10489326 article EN 2024-03-15
Coming Soon ...