Hybrid Android malware detection by combining supervised and unsupervised learning A Arora, SK Peddoju, V Chouhan, A Chaudhary Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 48 | 2018 |
Packet monitoring approach to prevent DDoS attack in cloud computing V Chouhan, SK Peddoju International Journal of Computer Science and Electrical Engineering (IJCSEE …, 2013 | 34 | 2013 |
Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure Y Baseri, V Chouhan, A Ghorbani arXiv preprint arXiv:2404.10659, 2024 | 17 | 2024 |
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols Y Baseri, V Chouhan, A Hafid Computers & Security, 103883, 2024 | 16 | 2024 |
Outlier Management and its Impact on Diabetes Prediction: A Voting Ensemble Study. SP Praveen, K Sandeep, NR Sai, A Sharma, J Pandey, V Chouhan Journal of Intelligent Systems & Internet of Things 12 (1), 2024 | 13 | 2024 |
Blockchain-based secure and transparent election and vote counting mechanism using secret sharing scheme V Chouhan, A Arora Journal of Ambient Intelligence and Humanized Computing 14 (10), 14009-14027, 2023 | 13 | 2023 |
Investigation of optimal data encoding parameters based on user preference for cloud storage V Chouhan, SK Peddoju IEEE Access 8, 75105-75118, 2020 | 13 | 2020 |
Do-It-Yourself Recommender System: Reusing and Recycling with Blockchain and Deep Learning S Pandey, V Chouhan, D Verma, S Rajrah, F Alenezi, R Saini, ... IEEE Access 10, 90056-90067, 2022 | 12 | 2022 |
Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration A Chaudhary, SK Peddoju, V Chouhan Journal of Grid Computing 21 (3), 2023 | 8 | 2023 |
Hierarchical storage technique for maintaining hop-count to prevent DDoS attack in cloud computing V Chouhan, SK Peddoju Proceedings of International Conference on Advances in Computing 174, 511-518, 2013 | 7 | 2013 |
Real-time safety and surveillance system using facial recognition mechanism S Pandey, V Chouhan, RP Mahapatra, D Chhettri, H Sharma Intelligent Computing and Applications: Proceedings of ICICA 2019, 497-506, 2021 | 6 | 2021 |
Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition Y Baseri, V Chouhan, A Ghorbani, A Chow Computers & Security 150, 104272, 2025 | 5 | 2025 |
Trusted and Transparent Blockchain-enabled E-waste Optimization to Recover Precious Metals with Microwave Heating RP Mahapatra, SS Srikant, S Pandey, V Chouhan, RB Rao Journal of Scientific and Industrial Research (JSIR) 80 (07), 623-629, 2021 | 4 | 2021 |
Energy efficient cluster head selection using hybrid RL-PSO approach A Choudhary, NC Barwar, V Chouhan Full Length Artic 11 (2), 08-8, 2024 | 2 | 2024 |
Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Study for Quantum-Safe Migration Y Baseri, V Chouhan, A Ghorbani, A Chow Available at SSRN 4750609, 2024 | 2 | 2024 |
dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key V Chouhan, SK Peddoju, R Buyya Journal of Information Security and Applications 69, 103265, 2022 | 2 | 2022 |
Fair Trading of Crops in a Trusted and Transparent manner using Smart Contracts V Chouhan, S Pandey, N Sharma, N Prajapati Edge Analytics: Proceedings of 26th annual International Conference on …, 2022 | 1 | 2022 |
Reliable verification of distributed encoded data fragments in the cloud V Chouhan, SK Peddoju Journal of Ambient Intelligence and Humanized Computing 12 (10), 9127-9143, 2021 | 1 | 2021 |
A smart contract solution for transparent auctions on permissioned blockchain platform S Swain, V Chouhan Computers and Electrical Engineering 121, 109859, 2025 | | 2025 |
Comminution Characters of Fault Zone Rocks and Secure Outcomes in the Blockchain Record-Keeping System for Industrial Applications SS Srikant, S Pandey, RP Mahapatra, V Chouhan, RB Rao Journal of Scientific and Industrial Research (JSIR) 81 (07), 767-775, 2022 | | 2022 |