Cost effective genetic algorithm for workflow scheduling in cloud under deadline constraint J Meena, M Kumar, M Vardhan IEEE Access 4, 5065-5082, 2016 | 159 | 2016 |
An adaptive inertia weight teaching-learning-based optimization algorithm and its applications AK Shukla, P Singh, M Vardhan Applied Mathematical Modelling 77, 309-326, 2020 | 119 | 2020 |
A new hybrid wrapper TLBO and SA with SVM approach for gene expression data AK Shukla, P Singh, M Vardhan Information Sciences 503, 238-254, 2019 | 95 | 2019 |
A survey of android application and malware hardening V Sihag, M Vardhan, P Singh Computer Science Review 39, 100365, 2021 | 87 | 2021 |
Gene selection for cancer types classification using novel hybrid metaheuristics approach AK Shukla, P Singh, M Vardhan Swarm and Evolutionary Computation 54, 100661, 2020 | 74 | 2020 |
A hybrid gene selection method for microarray recognition AK Shukla, P Singh, M Vardhan Biocybernetics and Biomedical Engineering 38 (4), 975-991, 2018 | 74 | 2018 |
De-LADY: Deep learning based Android malware detection using Dynamic features. V Sihag, M Vardhan, P Singh, G Choudhary, S Son J. Internet Serv. Inf. Secur. 11 (2), 34-45, 2021 | 72 | 2021 |
A two-stage gene selection method for biomarker discovery from microarray data for cancer classification AK Shukla, P Singh, M Vardhan Chemometrics and Intelligent Laboratory Systems 183, 47-58, 2018 | 70 | 2018 |
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection S Dwivedi, M Vardhan, S Tripathi Cluster Computing, 1-20, 2021 | 66 | 2021 |
A new hybrid feature subset selection framework based on binary genetic algorithm and information theory AK Shukla, P Singh, M Vardhan International Journal of Computational Intelligence and Applications 18 (03 …, 2019 | 66 | 2019 |
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection S Dwivedi, M Vardhan, S Tripathi, AK Shukla Evolutionary intelligence 13 (1), 103-117, 2020 | 61 | 2020 |
Distributed ledger technology based property transaction system with support for IoT devices N Singh, M Vardhan International Journal of Cloud Applications and Computing (IJCAC) 9 (2), 60-78, 2019 | 59 | 2019 |
Defense against distributed DoS attack detection by using intelligent evolutionary algorithm S Dwivedi, M Vardhan, S Tripathi International Journal of Computers and Applications 44 (3), 219-229, 2022 | 57 | 2022 |
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure S Dwivedi, M Vardhan, S Tripathi Computer Networks 176, 107251, 2020 | 50 | 2020 |
BLADE: Robust malware detection against obfuscation in android V Sihag, M Vardhan, P Singh Forensic Science International: Digital Investigation 38, 301176, 2021 | 45 | 2021 |
Computing optimal block size for blockchain based applications with contradictory objectives N Singh, M Vardhan Procedia Computer Science 171, 1389-1398, 2020 | 44 | 2020 |
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni Applied Sciences 12 (3), 976, 2022 | 39 | 2022 |
PWEBSA: Twitter sentiment analysis by combining Plutchik wheel of emotion and word embedding P Kumar, M Vardhan International Journal of Information Technology, 1-9, 2022 | 34 | 2022 |
Signature based malicious behavior detection in android V Sihag, A Swami, M Vardhan, P Singh International Conference on Computing Science, Communication and Security …, 2020 | 33 | 2020 |
A hybrid framework for optimal feature subset selection AK Shukla, P Singh, M Vardhan Journal of Intelligent & Fuzzy Systems 36 (3), 2247-2259, 2019 | 33 | 2019 |