Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding D Menaga, S Revathi IET Information Security 12 (4), 332-340, 2018 | 39 | 2018 |
Deep learning: a recent computing platform for multimedia information retrieval D Menaga, S Revathi Deep learning techniques and optimization strategies in big data analytics …, 2020 | 19 | 2020 |
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing S Thanga Revathi, N Ramaraj, S Chithra Cluster Computing 22 (Suppl 2), 3521-3530, 2019 | 11 | 2019 |
An empirical study of cancer classification techniques based on the neural networks D Menaga, S Revathi Biomedical Engineering: Applications, Basis and Communications 32 (02), 2050013, 2020 | 9 | 2020 |
Tracy–Singh product and genetic whale optimization algorithm for retrievable data perturbation for privacy preserved data publishing in cloud computing T Revathi S, N Ramaraj, S Chithra The Computer Journal 63 (2), 239-253, 2020 | 9 | 2020 |
Cloud‐Assisted Privacy‐Preserving Method for Healthcare Using Adaptive Fractional Brain Storm Integrated Whale Optimization Algorithm S Thanga Revathi, A Gayathri, J Kalaivani, MS Christo, D Pelusi, M Azees Security and Communication Networks 2021 (1), 6210054, 2021 | 5 | 2021 |