An effective digit recognition model using enhanced convolutional neural network based chaotic grey wolf optimization P Preethi, R Asokan, N Thillaiarasu, T Saravanan Journal of Intelligent & Fuzzy Systems, 1-11, 2021 | 65 | 2021 |
A survey on acquiring integrity of shared data with effective user termination in the cloud N Shyamambika, N Thillaiarasu 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 41 | 2016 |
Enforcing security and privacy over multi-cloud framework using assessment techniques N Thillaiarasu., S ChenthurPandian. Intelligent Systems and Control (ISCO), 2016 10th International Conference …, 2016 | 41 | 2016 |
Paddy plant disease recognition, risk analysis, and classification using deep convolution neuro-fuzzy network VV Kumar, KMK Raghunath, N Rajesh, M Venkatesan, RB Joseph, ... Journal of Mobile Multimedia, 325-348, 2022 | 38 | 2022 |
Attaining Integrity, Secured Data Sharing and Removal of Misbehaving Client in the Public Cloud using an External Agent and Secure Encryption Technique NT N. Shyamambika Advances in Natural and Applied Sciences. 10(9) 10 (9), 421-431, 2016 | 29 | 2016 |
Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment N Thillaiarasu, SC Pandian, V Vijayakumar, S Prabaharan, L Ravi, ... Wireless Networks, 1-14, 2019 | 24 | 2019 |
A survey on different computer vision based human activity recognition for surveillance applications A Shenoy, N Thillaiarasu 2022 6th International Conference on Computing Methodologies and …, 2022 | 23 | 2022 |
A Survey of Secure Routing Protocols of Mobile AdHoc Network NT S Ranjithkumar SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2015 | 23 | 2015 |
Optimal Grouping and Belief based CH selection in mobile ad-hoc network using Chunk Reliable Routing Protocol T Saravanan, N Thillaiarasu 2021 International Conference on Advance Computing and Innovative …, 2021 | 22 | 2021 |
Enforcing confidentiality and authentication over public cloud using hybrid cryptosystems N Thillaiarasu, S Chenthur Pandian, G Naveen Balaji, RM Benitha Shierly, ... International Conference on Intelligent Data Communication Technologies and …, 2019 | 17 | 2019 |
RETRACTED ARTICLE: Analysing the User Actions and Location for Identifying Online Scam in Internet Banking on Cloud AJP Lazar, S Sengan, LPL Cavaliere, T Nadesan, D Sharma, MK Gupta, ... Wireless Personal Communications 127 (Suppl 1), 5-6, 2022 | 15 | 2022 |
Artificial Intelligence for Internet of Things: Design Principle, Modernization, and Techniques N Thillaiarasu, SL Tripathi, V Dhinakaran CRC Press, 2022 | 13 | 2022 |
Novel heuristic scheme to enforce safety and confidentiality using feature-based encryption in multi-cloud environment (MCE) N Thillaiarasu, SC Pandian, N Gowthaman Information and Knowledge in Internet of Things, 441-456, 2022 | 12 | 2022 |
Internet of Everything (IoE) in Smart City Paradigm Using Advanced Sensors for Handheld Devices and Equipment P Malini, N Gowthaman, A Gautami, N Thillaiarasu IoT and IoE Driven Smart Cities, 121-141, 2021 | 12 | 2021 |
Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing D Srilatha, N Thillaiarasu Journal of Information Technology Management 15 (Special Issue), 1-18, 2023 | 10 | 2023 |
Design of a confidentiality model using semantic-based information segmentation (SBIS) and scattered storage in cloud computing N Thillaiarasu, N Gowthaman, S Chenthur Pandian IoT and IoE Driven Smart Cities, 183-213, 2022 | 10 | 2022 |
Investigation of comparison on modified cnn techniques to classify fake face in deepfake videos A Gowda, N Thillaiarasu 2022 8th International Conference on Advanced Computing and Communication …, 2022 | 8 | 2022 |
Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloud K Nagendran, T Nadesan, P Chandrika, R Chethana International Journal of Engineering & Technology 7 (4.19), 186-188, 2018 | 7 | 2018 |
Map-Reduce based Distance Weighted k-Nearest Neighbor Machine Learning Algorithm for Big Data Applications E Gothai, V Muthukumaran, K Valarmathi, VE Sathishkumar, ... Scalable Computing: Practice and Experience 23 (4), 129-145, 2022 | 6 | 2022 |
DDoSNet: A Deep Learning Model for detecting Network Attacks in Cloud Computing D Srilatha, N Thillaiarasu 2022 4th International Conference on Inventive Research in Computing …, 2022 | 4 | 2022 |