1. |
N. Arya, U. Singh, and S. Singh, “Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm,” in IEEE International Conference on Computer Communication and Control, IC4 2015, 2016, doi: 10.1109/IC4.2015.7375649. |
2. |
U. Singh, M. Samvatsar, A. Sharma, and A. K. Jain, “Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol,” in 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, 2016, doi: 10.1109/CDAN.2016.7570908. |
3. |
U. Singh, M. Shukla, A. K. Jain, M. Patsariya, R. Itare, and S. Yadav, Trust Based Model for Mobile Ad-Hoc Network in Internet of Things, vol. 98. 2020. |
4. |
M. Muwel, P. Mishra, M. Samvatsar, U. Singh, and R. Sharma, “Efficient ECGDH algorithm through protected multicast routing protocol in MANETs,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017- Janua, doi: 10.1109/ICECA.2017.8212743. |
5. |
U. Singh, V. Vankhede, S. Maheshwari, D. Kumar, and N. Solanki, Review of Software Defined Networking: Applications, Challenges and Advantages, vol. 98. 2020. |
6. |
U. Singh, M. Samvatsar, A. Sharma, and A. K. Jain, “Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol,” in 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, 2016, doi: 10.1109/CDAN.2016.7570908 |
7. |
V. K. Saurabh, R. Sharma, R. Itare, and U. Singh, “Cluster-based technique for detection and prevention of black-hole attack in MANETs,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212712. |
8. |
A. S. Chouhan, V. Sharma, U. Singh, and R. Sharma, “A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212740. |
9. |
L. Baghel, P. Mishra, M. Samvatsar, and U. Singh, “Detection of black hole attack in mobile ad hoc network using adaptive approach,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212741. |
10. |
N. Arya, U. Singh, and S. Singh, “Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm,” in IEEE International Conference on Computer Communication and Control, IC4 2015, 2016, doi: 10.1109/IC4.2015.7375649. |
11. |
A. Sharma, D. Bhuriya, and U. Singh, “Secure data transmission on MANET by hybrid cryptography technique,” in IEEE International Conference on Computer Communication and Control, IC4 2015, 2016, doi: 10.1109/IC4.2015.7375688. |
12. |
S. Singh, A. Mishra, and U. Singh, “Detecting and avoiding of collaborative black hole attack on MANET using trusted AODV routing algorithm,” in 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, 2016, doi: 10.1109/CDAN.2016.7570906. |
13. |
R. Verma, R. Sharma, and U. Singh, “New approach through detection and prevention of wormhole attack in MANET,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212719. |
14. |
D. Wagh, N. Pareek, and U. Singh, “Elimination of internal attacksfor PUMA in MANET,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212710. |
15. |
R. Parihar, A. Jain, and U. Singh, “Support vector machine through detecting packet dropping misbehaving nodes in MANET,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212711. |
16. |
S. Waskle, L. Parashar and U. Singh, "Intrusion Detection System Using PCA with Random Forest Approach," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 803-808, doi: 10.1109/ICESC48915.2020.9155656. |
17. |
A. Bhawsar, Y. Pandey and U. Singh, "Detection and Prevention of Wormhole Attack using the Trust-based Routing System," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 809-814, doi: 10.1109/ICESC48915.2020.9156009. |
18. |
S. Nihale, S. Sharma, L. Parashar and U. Singh, "Network Traffic Prediction Using Long Short-Term Memory," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 338-343, doi: 10.1109/ICESC48915.2020.9156045. |
19. |
Shukla, M., Joshi, B.K. & Singh, U. Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08647-1
|
20. |
R. Yadav, A. Choorasiya, U. Singh, P. Khare, and P. Pahade, “A Recommendation System for E-Commerce Base on Client Profile,” in Proceedings of the 2nd International Conference on Trends in Electronics and Informatics, ICOEI 2018, 2018, doi: 10.1109/ICOEI.2018.8553930. |
21. |
V. Prakaulya, R. Sharma, U. Singh, and R. Itare, “Railway passenger forecasting using time series decomposition model,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212725. |
22. |
D. Bhuriya, G. Kaushal, A. Sharma, and U. Singh, “Stock market predication using a linear regression,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212716 |
23. |
R. Verma, P. Choure, and U. Singh, “Neural networks through stock market data prediction,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212717. |
24. |
P. Kewat, R. Sharma, U. Singh, and R. Itare, “Support vector machines through financial time series forecasting,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212859. |
25. |
A. Sharma, D. Bhuriya, and U. Singh, “Survey of stock market prediction using machine learning approach,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212715. |
26. |
S. Sable, A. Porwal, and U. Singh, “Stock price prediction using genetic algorithms and evolution strategies,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212724. |
27. |
A. Roshan, A. Vyas, and U. Singh, “Credit Card Fraud Detection Using Choice Tree Technology,” in Proceedings of the 2nd International Conference on Electronics, Communication and Aerospace Technology, ICECA 2018, 2018, doi: 10.1109/ICECA.2018.8474734. |
28. |
H. Soni, A. Vyas, and U. Singh, “Identify Rare Disease Patients from Electronic Health Records through Machine Learning Approach,” in Proceedings of the International Conference on Inventive Research in Computing Applications, ICIRCA 2018, 2018, doi: 10.1109/ICIRCA.2018.8597203. |
29. |
A. Saxena, A. Vyas, L. Parashar and U. Singh, "A Glaucoma Detection using Convolutional Neural Network," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 815-820, doi: 10.1109/ICESC48915.2020.9155930. |
30. |
B. Bamne, N. Shrivastava, L. Parashar and U. Singh, "Transfer learning-based Object Detection by using Convolutional Neural Networks," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2020, pp. 328-332, doi: 10.1109/ICESC48915.2020.9156060.
|
31. |
U. Singh, N. Kumar Solanki, M. Kumar Varma, and T. Sevak, “A review on big data protection of Hadoop,” in Proceedings of the 2nd International Conference on Communication and Electronics Systems, ICCES 2017, 2018, vol. 2018-Janua, doi: 10.1109/CESYS.2017.8321221. |
32. |
U. Singh, N. Kumar Solanki, M. Kumar Varma, and T. Sevak, “Towards analyzing MongoDB NoSQL security and designing injection defense solution,” in Proceedings of the 2nd International Conference on Communication and Electronics Systems, ICCES 2017, 2018, vol. 2018-Janua, doi: 10.1109/CESYS.2017.8321222. |
33. |
V. Prakaulya, N. Pareek, and U. Singh, “Network performance in IEEE 802.11 and IEEE 802.11p cluster based on VANET,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212713. |
34. |
P. Shakyawar, P. Choure, and U. Singh, “Eigenface method through through facial expression recognition,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212714. |
35. |
K. Kushwah, V. Sharma, and U. Singh, “Neural network method through facial expression recognition,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212721 |
36. |
Y. Mathur, P. Jain, and U. Singh, “Foremost section study and kernel support vector machine through brain images classifier,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212726. |
37. |
V. S. Tomar, N. Gupta, and U. Singh, “Expressions recognition based on human face,” in Proceedings of the 3rd International Conference on Computing Methodologies and Communication, ICCMC 2019, 2019, doi: 10.1109/ICCMC.2019.8819714. |
38. |
P. Gupta, M. Samvatsar, and U. Singh, “Cloud computing through dynamic resource allocation scheme,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212723. |
39. |
P. S. Chouhan, M. Samvatsar, and U. Singh, “Energetic SSource allotment scheme for cloud computing using threshold-based,” in Proceedings of the International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017, 2017, vol. 2017-Janua, doi: 10.1109/ICECA.2017.8212744. |