default search action
Virender Ranga
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Anita Thakur, Virender Ranga, Ritu Agarwal:
Workload dynamics implications in permissioned blockchain scalability and performance. Clust. Comput. 27(8): 11569-11593 (2024) - [j30]Aditi Zear, Virender Ranga, Kamal Kumar Gola:
Network partition detection and recovery with the integration of unmanned aerial vehicle. Concurr. Comput. Pract. Exp. 36(13) (2024) - [j29]Gourav Kumar Sharma, Santosh Kumar, Virender Ranga, Mahendra Kumar Murmu:
Artificial intelligence in cerebral stroke images classification and segmentation: A comprehensive study. Multim. Tools Appl. 83(14): 43539-43575 (2024) - [j28]Sunakshi Mehra, Virender Ranga, Ritu Agarwal, Seba Susan:
Speaker independent recognition of low-resourced multilingual Arabic spoken words through hybrid fusion. Multim. Tools Appl. 83(35): 82533-82561 (2024) - [j27]Sunakshi Mehra, Virender Ranga, Ritu Agarwal:
Improving speech command recognition through decision-level fusion of deep filtered speech cues. Signal Image Video Process. 18(2): 1365-1373 (2024) - [j26]Sunakshi Mehra, Virender Ranga, Ritu Agarwal:
A deep learning approach to dysarthric utterance classification with BiLSTM-GRU, speech cue filtering, and log mel spectrograms. J. Supercomput. 80(10): 14520-14547 (2024) - [j25]Janardan Kumar Verma, Jitender Kumar Chhabra, Virender Ranga:
Track Consensus-Based Labeled Multi-Target Tracking in Mobile Distributed Sensor Network. IEEE Trans. Mob. Comput. 23(6): 7351-7362 (2024) - 2023
- [j24]Aditi Zear, Virender Ranga, Kriti Bhushan:
Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs. Comput. Commun. 203: 15-29 (2023) - [j23]Ravinder Kumar, Amita Malik, Virender Ranga:
Security concerns over IoT routing using emerging technologies: A review. Trans. Emerg. Telecommun. Technol. 34(7) (2023) - [j22]Ankit Attkan, Virender Ranga, Priyanka Ahlawat:
A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security. ACM Trans. Internet Things 4(2): 14:1-14:39 (2023) - [j21]Rochak Swami, Mayank Dave, Virender Ranga:
Mitigation of DDoS Attack Using Moving Target Defense in SDN. Wirel. Pers. Commun. 131(4): 2429-2443 (2023) - [i7]Abhishek Verma, Virender Ranga:
CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. CoRR abs/2302.12443 (2023) - [i6]Abhishek Verma, Virender Ranga:
Machine Learning Based Intrusion Detection Systems for IoT Applications. CoRR abs/2302.12452 (2023) - [i5]Abhishek Verma, Virender Ranga:
Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review. CoRR abs/2303.00265 (2023) - [i4]Abhishek Verma, Virender Ranga:
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. CoRR abs/2303.00273 (2023) - 2022
- [j20]Aditi Zear, Virender Ranga:
UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks. Ad Hoc Networks 130: 102823 (2022) - [j19]Aditi Zear, Virender Ranga, Kriti Bhushan:
Partition detection and recovery by UAVs in damaged WSANs using N-angle clustering. Int. J. Commun. Syst. 35(11) (2022) - [j18]Ravinder Kumar, Amita Malik, Virender Ranga:
An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks. Knowl. Based Syst. 256: 109762 (2022) - [j17]Gopal Singh Kushwah, Virender Ranga:
Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution. Wirel. Pers. Commun. 124(3): 2613-2636 (2022) - 2021
- [j16]Gopal Singh Kushwah, Virender Ranga:
Optimized extreme learning machine for detecting DDoS attacks in cloud computing. Comput. Secur. 105: 102260 (2021) - [j15]Abhishek Verma, Virender Ranga:
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things. Computing 103(7): 1479-1500 (2021) - [j14]Gopal Singh Kushwah, Virender Ranga:
Distributed denial of service attack detection in cloud computing using hybrid extreme learning machine. Turkish J. Electr. Eng. Comput. Sci. 29(4): 1852-1870 (2021) - [j13]Janardan Kumar Verma, Virender Ranga:
Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope. J. Intell. Robotic Syst. 102(1): 10 (2021) - [j12]Rochak Swami, Mayank Dave, Virender Ranga:
Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking. Wirel. Pers. Commun. 118(4): 2295-2317 (2021) - [i3]Shivam Gupta, Virender Ranga, Priyansh Agrawal:
EpilNet: A Novel Approach to IoT based Epileptic Seizure Prediction and Diagnosis System using Artificial Intelligence. CoRR abs/2111.03265 (2021) - [i2]Virender Ranga, Shivam Gupta, Jyoti Meena, Priyansh Agrawal:
Automated Human Mind Reading Using EEG Signals for Seizure Detection. CoRR abs/2111.03270 (2021) - [i1]Virender Ranga, Shivam Gupta, Priyansh Agrawal, Jyoti Meena:
Pathological Analysis of Blood Cells Using Deep Learning Techniques. CoRR abs/2111.03274 (2021) - 2020
- [j11]Rochak Swami, Mayank Dave, Virender Ranga:
Voting-based intrusion detection framework for securing software-defined networks. Concurr. Comput. Pract. Exp. 32(24) (2020) - [j10]Abhishek Verma, Virender Ranga:
Mitigation of DIS flooding attacks in RPL-based 6LoWPAN networks. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j9]Gopal Singh Kushwah, Virender Ranga:
Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J. Inf. Secur. Appl. 53: 102532 (2020) - [j8]Abhishek Verma, Virender Ranga:
CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis. Telecommun. Syst. 75(1): 43-61 (2020) - [j7]Abhishek Verma, Virender Ranga:
Machine Learning Based Intrusion Detection Systems for IoT Applications. Wirel. Pers. Commun. 111(4): 2287-2310 (2020) - [c4]Abhishek Verma, Virender Ranga:
Addressing Copycat Attacks in IPv6-Based Low Power and Lossy Networks. SAI (2) 2020: 415-426
2010 – 2019
- 2019
- [j6]Rochak Swami, Mayank Dave, Virender Ranga:
Software-defined Networking-based DDoS Defense Mechanisms. ACM Comput. Surv. 52(2): 28:1-28:36 (2019) - [j5]Abhishek Verma, Virender Ranga:
Evaluation of Network Intrusion Detection Systems for RPL Based 6LoWPAN Networks in IoT. Wirel. Pers. Commun. 108(3): 1571-1594 (2019) - [c3]Abhishek Verma, Virender Ranga:
Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks. TENCON 2019: 552-557 - 2017
- [c2]Gaurav Kumar, Virender Ranga:
Meta-heuristic solution for relay nodes placement in constrained environment. IC3 2017: 1-6 - [c1]Gaurav Kumar, Virender Ranga:
Healing Partitioned Wireless Sensor Networks. UCAmI 2017: 545-557 - 2016
- [j4]Virender Ranga, Mayank Dave, Anil Kumar Verma:
A multi-criterion fuzzy logic intra-cluster and inter-cluster-based stable cluster head election approach in large scale WSN. Int. J. Commun. Networks Distributed Syst. 17(4): 433-449 (2016) - 2015
- [j3]Virender Ranga, Mayank Dave, Anil Kumar Verma:
Relay node placement to heal partitioned wireless sensor networks. Comput. Electr. Eng. 48: 371-388 (2015) - 2014
- [j2]Virender Ranga, Mayank Dave, Anil Kumar Verma:
A Hybrid Timer Based Single Node Failure Recovery Approach for WSANs. Wirel. Pers. Commun. 77(3): 2155-2182 (2014) - 2013
- [j1]Virender Ranga, Mayank Dave, Anil Kumar Verma:
Network Partitioning Recovery Mechanisms in WSANs: a Survey. Wirel. Pers. Commun. 72(2): 857-917 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint