A federated calibration scheme for convolutional neural networks: Models, applications and challenges

S Gaba, I Budhiraja, V Kumar, S Garg… - Computer …, 2022 - Elsevier
Deep learning has been created as a practical artificial intelligence strategy that takes
various layers of information and gives the best in the effects of different classes. The use of …

[HTML][HTML] Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

A Barnawi, S Gaba, A Alphy, A Jabbari… - Neural Computing and …, 2023 - Springer
The usage of intelligent IoT devices is exponentially rising, and so the possibility of attacks in
the IoT surfaces. The deep leaning algorithms are competent for directing the sanctuary …

Holochain: An agent-centric distributed hash table security in smart iot applications

S Gaba, H Khan, KJ Almalki, A Jabbari… - IEEE …, 2023 - ieeexplore.ieee.org
The accomplishment of blockchain has increased the focus on the various applications for
simplifying the confidentiality and transaction sanctuary using the decentralized architecture …

[HTML][HTML] Smart city IoT system network level routing analysis and blockchain security based implementation

S Bommu, K Babburu, SN, LN Thalluri… - Journal of Electrical …, 2023 - Springer
This paper demonstrates, network-level performance analysis and implementation of smart
city Internet of Things (IoT) system with Infrastructure as a Service (IaaS) level cloud …

A deep analysis on the role of deep learning models using generative adversarial networks

A Aggarwal, S Gaba, S Nagpal, A Arya - Blockchain and Deep Learning …, 2022 - Springer
A comparatively novel advance field of deep learning is the Generative Adversarial Network
called GAN. These different types of networks if they start working in line with each other and …

A modified approach for accuracy enhancement in intruder detection with optimally certain features

S Gaba, S Nagpal, A Aggarwal, S Kumar… - … Communications and 5G …, 2023 - Springer
Mobile ad-hoc networks are vibrant and incessantly varying ad-hoc networks, so having
centralized checking on the same is impossible. Vehicular ad-hoc network (VANET) is like …

Blockchain consensus algorithms: Past, present, and future trends

N Nezhadsistani, SMH Bamakan… - Distributed Computing to …, 2023 - Elsevier
Reaching an agreement in a blockchain network is a crucial and challenging task that is
described as a consensus problem and has a broad range of applications in reality …

An Optimized Approach for Intrusion Detection in Internet of Softwarized Things

S Gaba, A Nehra, I Budhiraja, V Kumar… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
In the past years, there has been fast growth in various applications which generates
penetrating and personal information dependent on the Internet of things (IoT). The …

[PDF][PDF] A comparative analysis among task scheduling for grouped and ungrouped grid application

A Aggarwal, S Gaba, S Nagpal, A Arya - NITTTR, 2021 - ceur-ws.org
Grid Computing is new, and inescapable innovation in the fields of logic, and designing, and
just as in business, and modern undertakings. This innovation assists with associating all …