default search action
Bijendra Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Devender Kumar, Satish Chand, Bijendra Kumar:
A secure three-factor authentication protocol for mobile networks. Int. J. Inf. Comput. Secur. 23(2): 119-138 (2024) - [j37]Khushil Kumar Saini, Damandeep Kaur, Devender Kumar, Bijendra Kumar:
An efficient three-factor authentication protocol for wireless healthcare sensor networks. Multim. Tools Appl. 83(23): 63699-63721 (2024) - 2023
- [j36]Vibha Jain, Bijendra Kumar:
QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning. J. Netw. Syst. Manag. 31(1): 7 (2023) - [c9]Chirayu Jhakal, Khushi Singal, Manan Suri, Divya Chaudhary, Bijendra Kumar, Ian Gorton:
Detection of Sexism on Social Media with Multiple Simple Transformers. CLEF (Working Notes) 2023: 959-966 - [c8]Adwita Arora, Naman Dhingra, Divya Chaudhary, Ian Gorton, Bijendra Kumar:
Exploring the Indian Political YouTube Landscape: A Multimodal Multi-Task Approach. MUWS@CIKM 2023: 3-17 - [c7]Manan Suri, Aaryak Garg, Divya Chaudhary, Ian Gorton, Bijendra Kumar:
WADER at SemEval-2023 Task 9: A Weak-labelling framework for Data augmentation in tExt Regression Tasks. SemEval@ACL 2023: 1945-1952 - [i2]Manan Suri, Aaryak Garg, Divya Chaudhary, Ian Gorton, Bijendra Kumar:
WADER at SemEval-2023 Task 9: A Weak-labelling framework for Data augmentation in tExt Regression Tasks. CoRR abs/2303.02758 (2023) - 2022
- [j35]Shruti Sachdeva, Bijendra Kumar:
Flood susceptibility mapping using extremely randomized trees for Assam 2020 floods. Ecol. Informatics 67: 101498 (2022) - [j34]Vibha Jain, Bijendra Kumar:
Auction based cost-efficient resource allocation by utilizing blockchain in fog computing. Trans. Emerg. Telecommun. Technol. 33(7) (2022) - [j33]Vibha Jain, Bijendra Kumar:
Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach. Trans. Emerg. Telecommun. Technol. 33(11) (2022) - [j32]Vibha Jain, Bijendra Kumar:
Quality of Service-Based Resource Management in Fog Computing: A Systematic Review. Int. J. Cloud Appl. Comput. 12(1): 1-27 (2022) - [j31]Vibha Jain, Bijendra Kumar, Aditya Gupta:
Cybertwin-driven resource allocation using deep reinforcement learning in 6G-enabled edge environment. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part B): 5708-5720 (2022) - [c6]Manan Suri, Nalin Semwal, Divya Chaudhary, Ian Gorton, Bijendra Kumar:
I don't feel so good! Detecting Depressive Tendencies using Transformer-based Multimodal Frameworks. MLNLP 2022: 360-365 - 2021
- [j30]Devender Kumar, Harmanpreet Singh Grover, Damandeep Kaur, Adarsh Verma, Khushil Kumar Saini, Bijendra Kumar:
An efficient anonymous user authentication and key agreement protocol for wireless sensor networks. Int. J. Commun. Syst. 34(5) (2021) - [j29]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC. Int. J. Heal. Inf. Syst. Informatics 16(2): 21-48 (2021) - [j28]Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta, Bijendra Kumar:
Integer multiplication ranking method for cloud services selection. J. Ambient Intell. Humaniz. Comput. 12(2): 2003-2017 (2021) - [j27]Deepak Sharma, Bijendra Kumar, Satish Chand, Rajiv Ratn Shah:
Uncovering research trends and topics of communities in machine learning. Multim. Tools Appl. 80(6): 9281-9314 (2021) - [j26]Vibha Jain, Bijendra Kumar:
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts. Peer-to-Peer Netw. Appl. 14(5): 3124-3142 (2021) - [j25]Deepak Sharma, Bijendra Kumar, Satish Chand, Rajiv Ratn Shah:
A Trend Analysis of Significant Topics Over Time in Machine Learning Research. SN Comput. Sci. 2(6): 469 (2021) - [i1]Deepak Sharma, Bijendra Kumar, Satish Chand:
Recommending Researchers in Machine Learning based on Author-Topic Model. CoRR abs/2109.02022 (2021) - 2020
- [j24]Amarjit Malhotra, Sanjay K. Dhurandher, Megha Gupta, Bijendra Kumar:
Best fit power weighted difference method for fog node selection in smart cities. IET Commun. 14(19): 3448-3457 (2020) - [j23]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks 9(6): 315-325 (2020) - [j22]Rituraj Soni, Bijendra Kumar, Satish Chand:
Text Region Extraction From Scene Images Using AGF and MSER. Int. J. Image Graph. 20(2): 2050009:1-2050009:23 (2020) - [j21]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network. Wirel. Pers. Commun. 114(1): 629-655 (2020)
2010 – 2019
- 2019
- [j20]Rituraj Soni, Bijendra Kumar, Satish Chand:
Text detection and localization in natural scene images based on text awareness score. Appl. Intell. 49(4): 1376-1405 (2019) - [j19]Divya Chaudhary, Bijendra Kumar:
Cost optimized Hybrid Genetic-Gravitational Search Algorithm for load scheduling in Cloud Computing. Appl. Soft Comput. 83 (2019) - [j18]Devender Kumar, Satish Chand, Bijendra Kumar:
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J. Ambient Intell. Humaniz. Comput. 10(2): 641-660 (2019) - [j17]Rituraj Soni, Bijendra Kumar, Satish Chand:
Optimal feature and classifier selection for text region classification in natural scene images using Weka tool. Multim. Tools Appl. 78(22): 31757-31791 (2019) - [j16]Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand:
SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network. Wirel. Pers. Commun. 107(2): 1289-1308 (2019) - [c5]Jeevan Singh Nayal, Abhishek Joshi, Bijendra Kumar:
Emotion Recognition in Songs via Bayesian Deep Learning. Audio Mostly Conference 2019: 235-238 - 2018
- [j15]Divya Chaudhary, Bijendra Kumar:
Cloudy GSA for load scheduling in cloud computing. Appl. Soft Comput. 71: 861-871 (2018) - [j14]Manju, Satish Chand, Bijendra Kumar:
Genetic algorithm-based meta-heuristic for target coverage problem. IET Wirel. Sens. Syst. 8(4): 170-175 (2018) - [j13]Amarjit Malhotra, Sanjay Kumar Dhurandher, Megha Gupta, Bijendra Kumar:
EMCloud: A hierarchical volunteer cloud with explicit mobile devices. Int. J. Commun. Syst. 31(17) (2018) - [j12]Bijendra Kumar, Prabir Sarkar:
Understanding Collaborative Interaction for Varying Product Complexity. Int. J. e Collab. 14(3): 19-48 (2018) - [j11]Devender Kumar, Satish Chand, Bijendra Kumar:
A PKC-based user authentication scheme without smart card. J. Intell. Fuzzy Syst. 35(5): 5379-5390 (2018) - [j10]Divya Chaudhary, Bijendra Kumar:
A New Balanced Particle Swarm Optimisation for Load Scheduling in Cloud Computing. J. Inf. Knowl. Manag. 17(1): 1850009:1-1850009:23 (2018) - [c4]Divya Chaudhary, Bijendra Kumar, Shaksham Garg:
Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in Cloud. SSCC 2018: 313-323 - 2017
- [j9]Samayveer Singh, Satish Chand, Bijendra Kumar:
Multilevel heterogeneous network model for wireless sensor networks. Telecommun. Syst. 64(2): 259-277 (2017) - [j8]Manju, Satish Chand, Bijendra Kumar:
Selective α-Coverage Based Heuristic in Wireless Sensor Networks. Wirel. Pers. Commun. 97(1): 1623-1636 (2017) - [c3]Divya Chaudhary, Bijendra Kumar, Rahul Khanna:
NPSO Based Cost Optimization for Load Scheduling in Cloud Computing. SSCC 2017: 109-121 - 2016
- [j7]Samayveer Singh, Satish Chand, Rajeev Kumar, Aruna Malik, Bijendra Kumar:
NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wirel. Sens. Syst. 6(5): 151-157 (2016) - [j6]Samayveer Singh, Satish Chand, Bijendra Kumar:
Energy Efficient Clustering Protocol Using Fuzzy Logic for Heterogeneous WSNs. Wirel. Pers. Commun. 86(2): 451-475 (2016) - 2014
- [j5]Satish Chand, Samayveer Singh, Bijendra Kumar:
Heterogeneous HEED Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 77(3): 2117-2139 (2014) - [c2]Samayveer Singh, Satish Chand, Bijendra Kumar:
A stage-4 heterogeneous network model in WSNs. ICACCI 2014: 2191-2195 - 2013
- [c1]Samayveer Singh, Satish Chand, Bijendra Kumar:
3-Tier Heterogeneous Network Model for Increasing Lifetime in Three Dimensional WSNs. QSHINE 2013: 238-247
2000 – 2009
- 2009
- [j4]Satish Chand, Bijendra Kumar, Hari Om:
Segmented patching broadcasting protocol for video data. Comput. Commun. 32(4): 679-684 (2009) - [j3]Satish Chand, Bijendra Kumar, Hari Om:
Video Data Delivery using Slotted Patching. J. Netw. Comput. Appl. 32(3): 660-665 (2009) - 2008
- [j2]Satish Chand, Bijendra Kumar, Hari Om:
Patching-based broadcasting scheme for video services. Comput. Commun. 31(10): 1970-1978 (2008) - 2006
- [j1]Satish Chand, Bijendra Kumar, Hari Om:
Request based data delivery in video-on-demand services. IEEE Trans. Consumer Electron. 52(4): 1318-1324 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint