Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics AK Sangaiah, DV Medhane, T Han, MS Hossain, G Muhammad IEEE Transactions on Industrial Informatics 15 (7), 4189-4196, 2019 | 221 | 2019 |
Blockchain-enabled distributed security framework for next-generation IoT: An edge cloud and software-defined network-integrated approach DV Medhane, AK Sangaiah, MS Hossain, G Muhammad, J Wang IEEE Internet of Things Journal 7 (7), 6143-6149, 2020 | 172 | 2020 |
Energy-Aware Green Adversary Model for Cyber Physical Security in Industrial System AK Sangaiah, DV Medhane, GB Bian, A Ghoneim, M Alrashoud, ... IEEE Transactions on Industrial Informatics 16 (5), 3322 - 3329, 2019 | 106 | 2019 |
Search space-based multi-objective optimization evolutionary algorithm DV Medhane, AK Sangaiah Computers & Electrical Engineering 58, 126-143, 2017 | 42 | 2017 |
ESCAPE: effective scalable clustering approach for parallel execution of continuous position-based queries in position monitoring applications DV Medhane, AK Sangaiah IEEE Transactions on Sustainable Computing 2 (2), 49-61, 2017 | 39 | 2017 |
PCCA: Position confidentiality conserving algorithm for content-protection in e-governance services and applications DV Medhane, AK Sangaiah IEEE Transactions on Emerging Topics in Computational Intelligence 2 (3 …, 2018 | 18 | 2018 |
Source node position confidentiality aspects in wireless networks: An extended review DV Medhane, AK Sangaiah International Journal of High Performance Systems Architecture 6 (2), 61-81, 2016 | 10 | 2016 |
A quantum-inspired hybrid intelligent position monitoring system in wireless networks DV Medhane, AK Sangaiah Quantum Inspired Computational Intelligence, 417-452, 2017 | 9 | 2017 |
Blockchain-enabled distributed security framework for next-generation IoT: an edge cloud and software-defined network-integrated approach. IEEE Internet Things J 7 (7): 6143–6149 DV Medhane, AK Sangaiah, MS Hossain, G Muhammad, J Wang | 6 | 2020 |
Object detection and face recognition using yolo and inception model YV Kale, AU Shetty, YA Patil, RA Patil, DV Medhane International Conference on Advanced Network Technologies and Intelligent …, 2021 | 5 | 2021 |
Source node position confidentiality (SNPC) conserving position monitoring system for wireless networks DV Medhane, AK Sangaiah Emerging ICT for Bridging the Future-Proceedings of the 49th Annual …, 2015 | 5 | 2015 |
Feature-based Intrusion Detection System with Support Vector Machine M Khodaskar, D Medhane, R Ingle, A Buchade, A Khodaskar 2022 IEEE International Conference on Blockchain and Distributed Systems …, 2022 | 4 | 2022 |
Guest editorial: Special issue on algorithms and computational models for sustainable computing in cloud and data centers F Xhafa, G Mastorakis, CX Mavromoustakis, C Dobre IEEE Transactions on Sustainable Computing 2 (2), 47-48, 2017 | 4 | 2017 |
OptDCE: An Optimal and Diverse Classifier Ensemble for Imbalanced Datasets UR Godase, DV Medhane International Journal of Computer Information Systems and Industrial …, 2022 | 3 | 2022 |
Blockchain-enabled Distributed Security Framework for Next Generation IoT: An Edge-Cloud and Software Defined Network Integrated Approach. IeeeXplore. 2020 Feb DVM AKSMSHJW | 3 | 2020 |
Computational Intelligence Model for Code Generation from Natural Language Problem Statement AB Kulkarni, SS Karandikar, PA Bamhore, SR Gawade, DV Medhane 2018 Fourth International Conference on Computing Communication Control and …, 2019 | 3 | 2019 |
An Employee Health Monitoring System Using Wireless Body Area Networks and Machine Learning YU Ringe, PR Sonar, DV Medhane, SR Devane Applied Computer Vision and Soft Computing with Interpretable AI, 69-84, 2024 | 2 | 2024 |
Applied computer vision and soft computing with interpretable AI SV Shinde, DV Medhane, O Castillo CRC Press, 2023 | 2 | 2023 |
ServiceArc: A Systematic Approach towards Daily Wage Labour Management through Automation System A Jadhav, P Atre, A Andhare, U Chaturvedi, PP Boraste, DV Medhane 2023 4th International Conference for Emerging Technology (INCET), 1-5, 2023 | 2 | 2023 |
A K-anonymity confidentiality defending locality examining scheme for wireless networks with jack secure system' DV Medhane, SP Kosbatwar International Journal of Computer Networks and Wireless Communications 2 (5 …, 2012 | 2 | 2012 |