default search action
Adarsh Kumar
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Adarsh Kumar 0001 — University of Wisconsin-Madison, WI, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Suraj Kumar Bhagat, Tiyasha Tiyasha, A. H. Shather, Mehdi Jamei, Adarsh Kumar, Zainab Al-Khafaji, Leonardo Goliatt, Shafik S. Shafik, Omer A. Alawi, Zaher Mundher Yaseen:
Wind speed prediction and insight for generalized predictive modeling framework: a comparative study for different artificial intelligence models. Neural Comput. Appl. 36(23): 14119-14150 (2024) - 2023
- [j34]Dharani Kumar Talapula, Kiran Kumar Ravulakollu, Manoj Kumar, Adarsh Kumar:
SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data. Artif. Intell. Rev. 56(12): 14327-14365 (2023) - [j33]Gaurav Sharma, Deepak Kumar Sharma, Adarsh Kumar:
Role of cybersecurity and Blockchain in battlefield of things. Internet Technol. Lett. 6(3) (2023) - [j32]Adarsh Kumar, Neelu Jyothi Ahuja, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto de Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo:
Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions. J. Netw. Comput. Appl. 215: 103649 (2023) - [j31]Keshav Kaushik, Adarsh Kumar:
Demystifying quantum blockchain for healthcare. Secur. Priv. 6(3) (2023) - [j30]Srikanth Pulipeti, Adarsh Kumar:
Secure quantum computing for healthcare sector: A short analysis. Secur. Priv. 6(5) (2023) - [j29]Biswajit Bhowmik, Shrinidhi Anil Varna, Adarsh Kumar, Rahul Kumar:
AutoCov22: A Customized Deep Learning Framework for COVID-19 Detection. SN Comput. Sci. 4(5): 659 (2023) - [c23]Pedro Sarmento, Adarsh Kumar, Yu-Hua Chen, CJ Carr, Zack Zukowski, Mathieu Barthet:
GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers. EvoMUSART@EvoStar 2023: 260-275 - [c22]Deepti Sharma, Adarsh Kumar, Ramesh Babu Battula:
FedBeam: Federated learning based privacy preserved localization for mass-Beamforming in 5GB. ICOIN 2023: 616-621 - [c21]Deepak Kumar Sharma, Adarsh Kumar:
Blockchain for Patient Data Integrity: Decentralised Storage and Retrieval in Modern Healthcare Systems. RTIP2R (2) 2023: 355-368 - [c20]Adarsh Kumar Arya, Vineeta Gautam, Adarsh Kumar:
Comparative Studies of Stochastic Techniques to Minimize the Cost of Biomass Supply Networks. RTIP2R (2) 2023: 383-392 - [i16]Pedro Sarmento, Adarsh Kumar, Yu-Hua Chen, CJ Carr, Zack Zukowski, Mathieu Barthet:
GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers. CoRR abs/2302.05393 (2023) - [i15]Adarsh Kumar, Rajalakshmi Krishnamurthi, Gaurav Sharma, Saurabh Jain, P. Srikanth, Kriti Sharma, Nagender Aneja:
Revolutionizing Modern Networks: Advances in AI, Machine Learning, and Blockchain for Quantum Satellites and UAV-based Communication. CoRR abs/2303.11753 (2023) - [i14]Adarsh Kumar, Pedro Sarmento:
From Words to Music: A Study of Subword Tokenization Techniques in Symbolic Music Generation. CoRR abs/2304.08953 (2023) - [i13]Pedro Sarmento, Adarsh Kumar, Dekun Xie, CJ Carr, Zack Zukowski, Mathieu Barthet:
ShredGP: Guitarist Style-Conditioned Tablature Generation. CoRR abs/2307.05324 (2023) - 2022
- [j28]P. Srikanth, Adarsh Kumar, Mustapha Hedabou:
An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games. IEEE Access 10: 132232-132249 (2022) - [j27]Kamred Udham Singh, Surbhi Bhatia, Ankit Kumar, Sandeep Kautish, Adarsh Kumar, Shakila Basheer, Alaa Ali Hameed:
A Robust NIfTI Image Authentication Framework Based on DST and Multi-Scale Otsu Thresholding. IEEE Access 10: 132608-132620 (2022) - [j26]Saurabh Jain, Adarsh Kumar:
A security analysis of lightweight consensus algorithm for wearable kidney. Int. J. Grid Util. Comput. 13(5): 505-525 (2022) - [j25]Piyush Katariya, Vedika Gupta, Rohan Arora, Adarsh Kumar, Shreya Dhingra, Qin Xin, D. Jude Hemanth:
A deep neural network-based approach for fake news detection in regional language. Int. J. Web Inf. Syst. 18(5/6): 286-309 (2022) - [j24]Anuraj Singh, Gaurav Sharma, Rajalakshmi Krishnamurthi, Adarsh Kumar, Surbhi Bhatia, Arwa A. Mashat:
Cybersecurity for Battlefield of Things - A Comprehensive Review. J. Circuits Syst. Comput. 31(17): 2230010:1-2230010:49 (2022) - [j23]Adarsh Kumar, Carlo Ottaviani, Sukhpal Singh Gill, Rajkumar Buyya:
Securing the future internet of things with post-quantum cryptography. Secur. Priv. 5(2) (2022) - [j22]Adarsh Kumar, Anuraj Singh Yadav, Sukhpal Singh Gill, Haris Pervaiz, Qiang Ni, Rajkumar Buyya:
A secure drone-to-drone communication and software defined drone network-enabled traffic monitoring system. Simul. Model. Pract. Theory 120: 102621 (2022) - [j21]Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya:
Quantum computing: A taxonomy, systematic review and future directions. Softw. Pract. Exp. 52(1): 66-114 (2022) - [j20]Adarsh Kumar, Diego Augusto de Jesus Pacheco, Keshav Kaushik, Joel J. P. C. Rodrigues:
Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda. Veh. Commun. 36: 100487 (2022) - [c19]Punyajoy Saha, Kanishk Singh, Adarsh Kumar, Binny Mathew, Animesh Mukherjee:
CounterGeDi: A Controllable Approach to Generate Polite, Detoxified and Emotional Counterspeech. IJCAI 2022: 5157-5163 - [i12]Punyajoy Saha, Kanishk Singh, Adarsh Kumar, Binny Mathew, Animesh Mukherjee:
CounterGeDi: A controllable approach to generate polite, detoxified and emotional counterspeech. CoRR abs/2205.04304 (2022) - [i11]Adarsh Kumar, Carlo Ottaviani, Sukhpal Singh Gill, Rajkumar Buyya:
Securing the Future Internet of Things with Post-Quantum Cryptography. CoRR abs/2206.10473 (2022) - [i10]Keshav Kaushik, Adarsh Kumar:
Demystifying Quantum Blockchain for Healthcare. CoRR abs/2210.03638 (2022) - [i9]Neelu Jyoti Ahuja, Adarsh Kumar, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto de Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo:
Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions. CoRR abs/2210.06540 (2022) - [i8]P. Srikanth, Adarsh Kumar:
Secure Quantum Computing for Healthcare Sector: A Short Analysis. CoRR abs/2211.10027 (2022) - [i7]Gaurav Sharma, Deepak Kumar Sharma, Adarsh Kumar:
Role of Cybersecurity and Blockchain in Battlefield of Things. CoRR abs/2212.11562 (2022) - 2021
- [j19]Adarsh Kumar, Rajalakshmi Krishnamurthi, Surbhi Bhatia, Keshav Kaushik, Neelu Jyothi Ahuja, Anand Nayyar, Mehedi Masud:
Blended Learning Tools and Practices: A Comprehensive Analysis. IEEE Access 9: 85151-85197 (2021) - [j18]Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, S. Manjula Gandhi, S. Gayathri Devi, Diego Augusto de Jesus Pacheco, Arwa A. Mashat:
Survey of Promising Technologies for Quantum Drones and Networks. IEEE Access 9: 125868-125911 (2021) - [j17]Saurabh Jain, Neelu Jyothi Ahuja, P. Srikanth, Kishor Vinayak Bhadane, Bharathram Nagaiah, Adarsh Kumar, Charalambos Konstantinou:
Blockchain and Autonomous Vehicles: Recent Advances and Future Directions. IEEE Access 9: 130264-130328 (2021) - [j16]Ravi Singhal, Adarsh Kumar, Harvinder Singh, Stephanie Fuller, Sukhpal Singh Gill:
Digital device-based active learning approach using virtual community classroom during the COVID-19 pandemic. Comput. Appl. Eng. Educ. 29(5): 1007-1033 (2021) - [j15]Adarsh Kumar, Kriti Sharma, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill, Rajkumar Buyya:
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic. Future Gener. Comput. Syst. 115: 1-19 (2021) - [j14]Harvinder Singh, Adarsh Kumar, Kiran Kumar Ravulakollu, Manoj Kumar, Thompson Stephan:
Uncertainties evaluation and analysis using quantitative technique for a software project. Int. J. Ad Hoc Ubiquitous Comput. 38(1/2/3): 70-81 (2021) - [j13]Adarsh Kumar, Deepak Kumar Sharma:
A multidimensional-multilayered anomaly detection in RFID-sensor integrated internet of things network. Int. J. Cloud Comput. 10(5/6): 613-632 (2021) - [j12]Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish Kumar Luhach, Mohammad S. Khan, Anuraj Singh:
A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management. Veh. Commun. 28: 100313 (2021) - [c18]Ojasv Kamal, Adarsh Kumar, Tejas Vaidhya:
Hostility Detection in Hindi Leveraging Pre-trained Language Models. CONSTRAINT@AAAI 2021: 213-223 - [c17]Pedro Sarmento, Adarsh Kumar, CJ Carr, Zack Zukowski, Mathieu Barthet, Yi-Hsuan Yang:
DadaGP: A Dataset of Tokenized GuitarPro Songs for Sequence Models. ISMIR 2021: 610-617 - [c16]Biswajit Bhowmik, Shrinidhi Anil Varna, Adarsh Kumar, Rahul Kumar:
Reducing False Prediction On COVID-19 Detection Using Deep Learning. MWSCAS 2021: 404-407 - [c15]Adarsh Kumar, Ojasv Kamal, Susmita Mazumdar:
Adversities are all you need: Classification of self-reported breast cancer posts on Twitter using Adversarial Fine-tuning. SMM4H@NAACL-HLT 2021: 112-114 - [c14]Yash Butala, Kanishk Singh, Adarsh Kumar, Shrey Shrivastava:
Team Phoenix at WASSA 2021: Emotion Analysis on News Stories with Pre-Trained Language Models. WASSA@EACL 2021: 274-280 - [p1]Adarsh Kumar, Mohamed Elsersy, Ashraf Darwish, Aboul Ella Hassanien:
Drones Combat COVID-19 Epidemic: Innovating and Monitoring Approach. Digital Transformation and Emerging Technologies for Fighting COVID-19 Pandemic 2021: 175-188 - [i6]Ojasv Kamal, Adarsh Kumar, Tejas Vaidhya:
Hostility Detection in Hindi leveraging Pre-Trained Language Models. CoRR abs/2101.05494 (2021) - [i5]Yash Butala, Kanishk Singh, Adarsh Kumar, Shrey Shrivastava:
Team Phoenix at WASSA 2021: Emotion Analysis on News Stories with Pre-Trained Language Models. CoRR abs/2103.06057 (2021) - [i4]Pedro Sarmento, Adarsh Kumar, CJ Carr, Zack Zukowski, Mathieu Barthet, Yi-Hsuan Yang:
DadaGP: A Dataset of Tokenized GuitarPro Songs for Sequence Models. CoRR abs/2107.14653 (2021) - [i3]Manmeet Singh, Chirag Dhara, Adarsh Kumar, Sukhpal Singh Gill, Steve Uhlig:
Quantum Artificial Intelligence for the Science of Climate Change. CoRR abs/2108.10855 (2021) - 2020
- [j11]Adarsh Kumar, P. Srikanth, Anand Nayyar, Gaurav Sharma, Rajalakshmi Krishnamurthi, Mamoun Alazab:
A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City. IEEE Access 8: 89395-89424 (2020) - [j10]Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Kriti Sharma, Vinay Grover, Eklas Hossain:
A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE Access 8: 118433-118471 (2020) - [j9]Adarsh Kumar, Rajalakshmi Krishnamurthi, Saurabh Jain, Anand Nayyar, Mohamed Abouhawwash:
A novel heuristic simulation-optimization method for critical infrastructure in smart transportation systems. Int. J. Commun. Syst. 33(11) (2020) - [j8]Pooja Mahajan, Shantanu Tomar, Adarsh Kumar, Neelesh Yadav, Aditya Arya, Vivek Dhar Dwivedi:
A multi-target approach for discovery of antiviral compounds against dengue virus from green tea. Netw. Model. Anal. Health Informatics Bioinform. 9(1): 20 (2020) - [j7]Pooja Mahajan, Shantanu Tomar, Adarsh Kumar, Neelesh Yadav, Aditya Arya, Vivek Dhar Dwivedi:
Correction to: A multi‑target approach for discovery of antiviral compounds against dengue virus from green tea. Netw. Model. Anal. Health Informatics Bioinform. 9(1): 52 (2020) - [j6]Adarsh Kumar, Deepak Kumar Sharma, Anand Nayyar, Saurabh Singh, Byungun Yoon:
Lightweight Proof of Game (LPoG): A Proof of Work (PoW)'s Extended Lightweight Consensus Algorithm for Wearable Kidneys. Sensors 20(10): 2868 (2020) - [j5]Rajalakshmi Krishnamurthi, Adarsh Kumar, Dhanalekshmi Gopinathan, Anand Nayyar, Basit Qureshi:
An Overview of IoT Sensor Data Processing, Fusion, and Analysis Techniques. Sensors 20(21): 6076 (2020) - [i2]Adarsh Kumar, Kriti Sharma, Harvinder Singh, Sagar Gupta Naugriya, Sukhpal Singh Gill, Rajkumar Buyya:
A Drone-based Networked System and Methods for Combating Coronavirus Disease (COVID-19) Pandemic. CoRR abs/2006.06943 (2020) - [i1]Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya:
Quantum Computing: A Taxonomy, Systematic Review and Future Directions. CoRR abs/2010.15559 (2020)
2010 – 2019
- 2018
- [c13]Adarsh Kumar, Alok Aggarwal:
An Efficient Outlier Detection Mechanism for RFID-Sensor Integrated MANET. ISDA (1) 2018: 853-863 - [c12]Adarsh Kumar, Alok Aggarwal:
Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs. ISDA (1) 2018: 934-944 - 2017
- [j4]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things. Int. J. Adv. Intell. Paradigms 9(2/3): 220-245 (2017) - 2016
- [j3]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs. Int. J. Netw. Secur. 18(1): 1-18 (2016) - [c11]Siddhant Agarwal, Mukta Goyal, Adarsh Kumar, K. Rajalakshmi:
Intuitionistic fuzzy ant colony optimization for course sequencing in E-learning. IC3 2016: 1-6 - [c10]Adarsh Kumar, Alok Aggarwal:
Analysis of DCNS anti-collision protocol with contiguous channel allocation. IC3 2016: 1-7 - [c9]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Simulation and cost analysis of group authentication protocols. IC3 2016: 1-7 - [c8]Adarsh Kumar, Mukta Goyal, K. Rajalakshmi, Alok Aggarwal:
A simulation annealing based anti-collision protocol for RFID tag identification. IC3 2016: 1-7 - [c7]Upanya Singh, Nandini Srivastava, Adarsh Kumar:
JIIT-edu: An android application for college faculty. IC3 2016: 1-6 - 2014
- [j2]Manju Lata, Adarsh Kumar:
Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 6(1) (2014) - [j1]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs. KSII Trans. Internet Inf. Syst. 8(3): 1119-1143 (2014) - [c6]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Cost and performance analysis of server-centric authentication protocol in supply chain management. ISSPIT 2014: 269-274 - 2013
- [c5]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs). IC3 2013: 421-426 - [c4]Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks. QSHINE 2013: 750-763 - 2012
- [c3]Adarsh Kumar, Alok Aggarwal, Charu:
Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks. IC3 2012: 335-346 - [c2]Adarsh Kumar, Alok Aggarwal:
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. SNDS 2012: 240-251
2000 – 2009
- 2009
- [c1]Shaju L. Kurup, Arvind Raman, Adarsh Kumar:
Mantras, Astras & Shastras for ITSM Transformation. Int. CMG Conference 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint