Classification of healthy and rot leaves of apple using gradient boosting and support vector classifier K Aravind, S PraylaShyry, Y Felix International Journal of Innovative Technology and Exploring Engineering …, 2019 | 12 | 2019 |
Efficient identification of bots by K-means clustering SP Shyry Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 10 | 2016 |
Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks N Gopinath, SP Shyry Soft Computing 27 (18), 13365-13372, 2023 | 9 | 2023 |
A comparative analysis of machine learning algorithms on malicious URL prediction D Vaishnavi, S Suwetha, YB Jinila, R Subhashini, SP Shyry 2021 5th International Conference on Intelligent Computing and Control …, 2021 | 9 | 2021 |
A comparative analysis of prediction of autism spectrum disorder (ASD) using machine learning V Vishal, A Singh, YB Jinila, SP Shyry, J Jabez 2022 6th International Conference on Trends in Electronics and Informatics …, 2022 | 8 | 2022 |
Enhancing the cloud security using side channel attack free QKD with entangled fuzzy logic N Gopinath, S Prayla Shyry Journal of Intelligent & Fuzzy Systems 43 (6), 8359-8369, 2022 | 8 | 2022 |
RETRACTED: A Survey of image pre-processing techniques for medical images KCP Shankar, SP Shyry Journal of physics: conference series 1911 (1), 012003, 2021 | 7 | 2021 |
Detection and prevention of spam mail with semantics-based text classification of collaborative and content filtering SP Shyry, YB Jinila Journal of Physics: Conference Series 1770 (1), 012031, 2021 | 7 | 2021 |
Distributed fuzzy logic based cluster head election scheme (DFLCHES) for prolonging the lifetime of the wireless sensor network S Ramakrishnan, SP Shyry Int. J. Eng. Technol 7, 111-117, 2018 | 7 | 2018 |
A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images KCP Shankar, SP Shyry Soft Computing, 1-11, 2023 | 6 | 2023 |
Performance measurement in selfish overlay network by fuzzy logic deployment of overlay nodes SP Shyry 2014 International Conference on Control, Instrumentation, Communication and …, 2014 | 6 | 2014 |
A multi-component-based zero trust model to mitigate the threats in internet of medical things Y Bevish Jinila, S Prayla Shyry, A Christy Data Engineering for Smart Systems: Proceedings of SSIC 2021, 605-613, 2022 | 5 | 2022 |
Survey on Artificial Intelligence Based Resilient Recovery of Botnet Attack J Aruna, SP Shyry 2021 5th International Conference on Trends in Electronics and Informatics …, 2021 | 5 | 2021 |
PPSA: Privacy preserved and secured architecture for internet of vehicles Y Bevish Jinila, G Merlin Sheeba, S Prayla Shyry Wireless Personal Communications 118 (4), 3271-3288, 2021 | 5 | 2021 |
Early stage detection of glaucoma and its levels using fundus images of eye K Navya, K Lekhna, SP Shyry Journal of Critical Reviews 7 (4), 2020 | 5 | 2020 |
Biometric-based three-tier microservice architecture for mitigating the fraudulent behaviour SP Shyry Proceedings of the 2nd International Conference on Communication, Devices …, 2019 | 5* | 2019 |
Virtual Self Driving Car using Improved Convolution Neural Networks YB Jinila, J Jabez, SP Shyry 2021 5th International Conference on Electrical, Electronics, Communication …, 2021 | 4 | 2021 |
Novel enhanced encryption algorithm for shared key generation SP Shyry Proceedings of the 2014 International Conference on Interdisciplinary …, 2014 | 4 | 2014 |
Finagling congestion in selfish overlay routing by belittling link utilization SP Shyry, V Ramachandran 2010 3rd International Conference on Emerging Trends in Engineering and …, 2010 | 4 | 2010 |
Side Channel Attack Free Quantum Key Distribution Using Entangled Fuzzy Logic N Gopinath, SP Shyry Brazilian Journal of Physics 53 (2), 35, 2023 | 3 | 2023 |