scispace - formally typeset
Search or ask a question
Institution

Thapar University

EducationPatiāla, Punjab, India
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Cloud computing & Fuzzy logic. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A two-stage lightweight mutual authentication protocol well suited to SDN-backed multi UAV networks deployed in surveillance areas and compared with other state-of-the-art works in terms of computation latency and resilience against known security attacks is presented.

63 citations

Journal ArticleDOI
01 Sep 2018
TL;DR: Using the proposed survey, a detailed taxonomy based upon the types of attacks and possible solutions to handle these attacks is proposed and various emerging open issues and challenges along with the security threats are identified and discussed in the paper.

63 citations

Journal ArticleDOI
TL;DR: This paper investigates deduplication techniques based on text and multimedia data along with their corresponding taxonomies as these techniques have different challenges for duplicate data detection.
Abstract: The exponential growth of digital data in cloud storage systems is a critical issue presently as a large amount of duplicate data in the storage systems exerts an extra load on it. Deduplication is an efficient technique that has gained attention in large-scale storage systems. Deduplication eliminates redundant data, improves storage utilization and reduces storage cost. This paper presents a broad methodical literature review of existing data deduplication techniques along with various existing taxonomies of deduplication techniques that have been based on cloud data storage. Furthermore, the paper investigates deduplication techniques based on text and multimedia data along with their corresponding taxonomies as these techniques have different challenges for duplicate data detection. This research work is useful to identify deduplication techniques based on text, image and video data. It also discusses existing challenges and significant research directions in deduplication for future researchers, and article concludes with a summary of valuable suggestions for future enhancements in deduplication.

63 citations

Journal ArticleDOI
TL;DR: A novel multi-objective differential evolution based random forest technique is proposed that is able to tune the parameters of random forest in an efficient manner and outperforms existing techniques in terms of accuracy, f-measure, sensitivity and specificity.
Abstract: Many machine learning techniques have been used in past few decades for various medical applications. However, these techniques suffer from parameter tuning issue. Therefore, an efficient tuning of...

63 citations

Proceedings ArticleDOI
20 May 2019
TL;DR: Blockchain technology is used for the storage of collected data from the drones and update the information into the distributed ledgers to reduce the burden of drones.
Abstract: Data Dissemination is the distribution of data/statistics to the end users. With the adoption of Internet of Drones (IoD) environment for data dissemination, an efficient scheme is proposed which provides data integrity, identity anonymity, authentication, authorization, accountability (AAA) to the system model. We propose a system model having Ethereum based public blockchain distributed network in order to secure drone communication for the data collection and transmission. The proposed model provides secure communication between the drones and the users in a decentralized way. In this paper, blockchain technology is used for the storage of collected data from the drones and update the information into the distributed ledgers to reduce the burden of drones. It also provides integrity, authentication, and authorization to the collected data by the drones in the system model. Motivated by this consideration, the goal of this paper is threefold. First, we select a forger node from the number of drones. Second, we create blocks and validate their processes. Third, we provide secure data dissemination by applying Proof-of-Stake consensus mechanism. Afterward, we evaluate the security of the presented system model compared against the corresponding ones of some state-of-the-art in terms of communication time/cost. The results confirm that our system model is reliable and scalable for data dissemination in the IoD environment.

63 citations


Authors

Showing all 3035 results

NameH-indexPapersCitations
Gaurav Sharma82124431482
Vinod Kumar7781526882
Neeraj Kumar7658718575
Ashish Sharma7590920460
Dinesh Kumar69133324342
Pawan Kumar6454715708
Harish Garg6131111491
Rafat Siddique5818311133
Surya Prakash Singh5573612989
Abhijit Mukherjee5537810196
Ajay Kumar5380912181
Soumen Basu452477888
Sudeep Tanwar432635402
Yosi Shacham-Diamand422876463
Rupinder Singh424587452
Network Information
Related Institutions (5)
Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

96% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

95% related

Indian Institute of Technology Delhi
26.9K papers, 503.8K citations

94% related

Indian Institute of Technology Kharagpur
38.6K papers, 714.5K citations

94% related

Anna University
19.9K papers, 312.6K citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202347
2022149
20211,237
20201,083
2019962
2018933