A review of topic modeling methods I Vayansky, SAP Kumar Information Systems 94, 101582, 2020 | 528 | 2020 |
Security in internet of things: Challenges, solutions and future directions SA Kumar, T Vealey, H Srivastava 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772-5781, 2016 | 353 | 2016 |
Topic modeling and sentiment analysis of global climate change tweets B Dahal, SAP Kumar, Z Li Social network analysis and mining 9, 1-20, 2019 | 268 | 2019 |
Phishing–challenges and solutions I Vayansky, S Kumar Computer Fraud & Security 2018 (1), 15-20, 2018 | 140 | 2018 |
Using proactive fault-tolerance approach to enhance cloud service reliability J Liu, S Wang, A Zhou, SAP Kumar, F Yang, R Buyya IEEE Transactions on Cloud Computing 6 (4), 1191-1202, 2016 | 133 | 2016 |
A novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance SAP Kumar, R Madhumathi, PR Chelliah, L Tao, S Wang Journal of Reliable Intelligent Environments 4 (4), 199-209, 2018 | 119 | 2018 |
Securing docker containers from denial of service (dos) attacks J Chelladhurai, PR Chelliah, SA Kumar 2016 IEEE International Conference on Services Computing (SCC), 856-859, 2016 | 105 | 2016 |
MVR: An architecture for computation offloading in mobile edge computing X Wei, S Wang, A Zhou, J Xu, S Su, S Kumar, F Yang 2017 IEEE international conference on edge computing (EDGE), 232-235, 2017 | 99 | 2017 |
Predicting obesity rate and obesity-related healthcare costs using data analytics S Revels, SAP Kumar, O Ben-Assuli Health policy and technology 6 (2), 198-207, 2017 | 58 | 2017 |
5G security challenges and solutions: a review by OSI layers S Sullivan, A Brighente, SAP Kumar, M Conti Ieee Access 9, 116294-116314, 2021 | 55 | 2021 |
Vulnerability assessment for security in aviation cyber-physical systems SAP Kumar, B Xu 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 46 | 2017 |
Big data analytics framework for system health monitoring B Xu, SA Kumar 2015 IEEE International Congress on Big Data, 401-408, 2015 | 42 | 2015 |
3D face reconstruction from single 2D image using distinctive features HMR Afzal, S Luo, MK Afzal, G Chaudhary, M Khari, SAP Kumar IEEE Access 8, 180681-180689, 2020 | 39 | 2020 |
Evaluation of classification algorithms for distributed denial of service attack detection M Gohil, S Kumar 2020 IEEE Third International Conference on Artificial Intelligence and …, 2020 | 38 | 2020 |
A practical model for educators to predict student performance in K-12 education using machine learning JL Harvey, SAP Kumar 2019 IEEE symposium series on computational intelligence (SSCI), 3004-3011, 2019 | 37 | 2019 |
An adaptive security model for mobile agents in wireless networks SP Alampalayam, A Kumar GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 35 | 2003 |
Presentation of a novel method for prediction of traffic with climate condition based on ensemble learning of neural architecture search (NAS) and linear regression J Artin, A Valizadeh, M Ahmadi, SAP Kumar, A Sharifi Complexity 2021 (1), 8500572, 2021 | 34 | 2021 |
Control framework for secure cloud computing H Srivastava, SA Kumar Journal of Information Security 6 (01), 12, 2014 | 34 | 2014 |
A Survey of Intelligent Transportation Systems Security: Challenges and Solutions J Harvey, S Kumar 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 32 | 2020 |
An adaptive and predictive security model for mobile ad hoc networks S Alampalayam, A Kumar Wireless Personal Communications 29, 263-281, 2004 | 32 | 2004 |