A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges A Thakkar, R Lohiya Archives of Computational Methods in Engineering 28 (4), 3211-3243, 2021 | 330 | 2021 |
A review of the advancement in intrusion detection datasets A Thakkar, R Lohiya Procedia Computer Science 167, 636-645, 2020 | 289 | 2020 |
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions A Thakkar, R Lohiya Artificial Intelligence Review 55 (1), 453-563, 2022 | 256 | 2022 |
Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System A Thakkar, R Lohiya Information Fusion 90, 353-363, 2023 | 164 | 2023 |
Attack classification using feature selection techniques: a comparative study A Thakkar, R Lohiya Journal of Ambient Intelligence and Humanized Computing 12 (1), 1249-1266, 2021 | 159 | 2021 |
Application domains, evaluation data sets, and research challenges of IoT: A systematic review R Lohiya, A Thakkar IEEE Internet of Things Journal 8 (11), 8774-8798, 2020 | 103 | 2020 |
Role of swarm and evolutionary algorithms for intrusion detection system: A survey A Thakkar, R Lohiya Swarm and evolutionary computation 53, 100631, 2020 | 99 | 2020 |
Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network A Thakkar, R Lohiya IEEE Internet of Things Journal 10 (13), 11888-11895, 2023 | 86 | 2023 |
Intrusion detection using deep neural network with antirectifier layer R Lohiya, A Thakkar Applied Soft Computing and Communication Networks: Proceedings of ACN 2020 …, 2021 | 44 | 2021 |
Analyzing fusion of regularization techniques in the deep learning‐based intrusion detection system A Thakkar, R Lohiya International Journal of Intelligent Systems 36 (12), 7340-7388, 2021 | 37 | 2021 |
Survey on mobile forensics R Lohiya, P John, P Shah International Journal of Computer Applications 118 (16), 2015 | 30 | 2015 |
A review on challenges and future research directions for machine learning-based intrusion detection system A Thakkar, R Lohiya Archives of Computational Methods in Engineering 30 (7), 4245-4269, 2023 | 24 | 2023 |
Hate speech detection: A comprehensive review of recent works A Gandhi, P Ahir, K Adhvaryu, P Shah, R Lohiya, E Cambria, S Poria, ... Expert Systems, e13562, 2024 | 17 | 2024 |
Face recognition techniques: A survey for forensic applications R Lohiya, P Shah International Journal of Advanced Research in Computer Engineering …, 2015 | 7 | 2015 |
A comprehensive survey on: quantum cryptography P Verma, R Lohiya Int J Sci Res 4 (4), 2214-2219, 2015 | 3 | 2015 |
Privacy Preserving Data Mining: A Comprehensive Survey R Lohiya, A Mandowara, R Raolji International Journal of Computer Applications 975, 8887, 2017 | 2 | 2017 |
A Compendium on Risk Assessment of Phishing Attack Using Attack Modeling Techniques R Lohiya, A Thakkar Procedia Computer Science 235, 1105-1114, 2024 | 1 | 2024 |
Video Based Face Detection and Tracking for Forensic Applications R Lohiya, P Shah Research gate, February, 2019 | 1 | 2019 |
Spectral unmixing with hyperspectral datasets of AVIRIS-NG V Joshi, S Bhattacharya, R Lohiya 2017 International Conference on Intelligent Computing, Instrumentation and …, 2017 | | 2017 |