default search action
Celestine Iwendi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Tao Hai, Muammer Aksoy, Celestine Iwendi, Ebuka Ibeke, Senthilkumar Mohan:
CIA Security for Internet of Vehicles and Blockchain-AI Integration. J. Grid Comput. 22(2): 43 (2024) - [j48]Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi:
A machine learning model for Alzheimer's disease prediction. IET Cyper-Phys. Syst.: Theory & Appl. 9(2): 125-134 (2024) - [j47]Puneet Kumar, Bhoopesh Singh Bhati, Rajesh Kumar Dhanaraj, Celestine Iwendi, Balamurugan Balusamy, Nitesh Singh Bhati, Prerana Rai:
Feature subset selection using heuristic and metaheuristic approaches for diabetes prediction on a binary encoded dataset. Int. J. Model. Simul. Sci. Comput. 15(3): 2450031:1-2450031:24 (2024) - [j46]Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla:
A systematic review on blockchain-based access control systems in cloud environment. J. Cloud Comput. 13(1): 146 (2024) - [j45]G. Jagadeesh, M. Pounambal, K. ArivuSelvan, E. Sathiyamoorthy, J. Vellingiri, V. Madhu Viswanatham, Celestine Iwendi:
Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective. Signal Image Video Process. 18(5): 4395-4406 (2024) - [j44]G. Jagadeesh, J. Gitanjali, J. Vellingiri, M. Pounambal, E. Sathiyamoorthy, Celestine Iwendi:
MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment. J. Supercomput. 80(8): 10223-10254 (2024) - [c7]Celestine Iwendi, Chatti Subba Lakshmi, Bala Dhandayuthapani Veerasamy, Paul Hollins, Damilare Adeola, Pradeep Hewage, Adedapo Paul Aderemi, Piyush Kumar Shukla:
Empowering Marketing Management and Gaming Consumer Interaction Through AI and Citizen Science. GEM 2024: 1-6 - [c6]Paul W. L. Watson, Katharina Koller, Celestine Iwendi, Claudia Magdalena Fabian, Paul Hollins, Barbara Kieslinger:
Exploring the Concept of Mini Data Sprints as a Methodology to Assess Data Validity and Stimulate Climate Conversation. GEM 2024: 1-6 - [i1]K. Swapna Sudha, N. Jeyanthi, Celestine Iwendi:
Secure Supervised Learning-Based Smart Home Authentication Framework. CoRR abs/2402.00568 (2024) - 2023
- [j43]Afzal Badshah, Ateeqa Jalal, Umar Farooq, Ghani Ur Rehman, Shahab S. Band, Celestine Iwendi:
Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds. Big Data 11(5): 339-354 (2023) - [j42]Poongodi Manoharan, Ranjan Walia, Celestine Iwendi, Tariq Ahamed Ahanger, S. T. Suganthi, M. M. Kamruzzaman, Sami Bourouis, Wajdi Alhakami, Mounir Hamdi:
SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j41]Durga Rajan, Poovammal Eswaran, Gautam Srivastava, Kadiyala Ramana, Celestine Iwendi:
Blockchain-based multi-layered federated extreme learning networks in connected vehicles. Expert Syst. J. Knowl. Eng. 40(6) (2023) - [j40]Sandeep Kumar Arora, Gulshan Kumar, Mustapha Hedabou, El Mehdi Amhoud, Celestine Iwendi:
Blockchain-inspired lightweight trust-based system in vehicular networks. Int. J. Netw. Manag. 33(5) (2023) - [j39]Aysha Shabbir, Maryam Shabbir, Abdul Rehman Javed, Muhammad Rizwan, Celestine Iwendi, Chinmay Chakraborty:
Exploratory data analysis, classification, comparative analysis, case severity detection, and internet of things in COVID-19 telemonitoring for smart hospitals. J. Exp. Theor. Artif. Intell. 35(4): 507-534 (2023) - [j38]Celestine Iwendi, Gautam Srivastava, Suleman Khan, Praveen Kumar Reddy Maddikunta:
Cyberbullying detection solutions based on deep learning architectures. Multim. Syst. 29(3): 1839-1852 (2023) - [j37]Kadiyala Ramana, Gautam Srivastava, Madapuri Rudra Kumar, Thippa Reddy Gadekallu, Jerry Chun-Wei Lin, Mamoun Alazab, Celestine Iwendi:
A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas. IEEE Trans. Intell. Transp. Syst. 24(4): 3922-3934 (2023) - 2022
- [j36]Afzal Badshah, Celestine Iwendi, Ateeqa Jalal, Syed Shabih Ul Hasan, Ghawar Said, Shahab S. Band, Arthur Chang:
Use of regional computing to minimize the social big data effects. Comput. Ind. Eng. 171: 108433 (2022) - [j35]Celestine Iwendi, Senthilkumar Mohan, Suleman Khan, Ebuka Ibeke, Ali Ahmadian, Tiziana Ciano:
Covid-19 fake news sentiment analysis. Comput. Electr. Eng. 101: 107967 (2022) - [j34]Khalid M. Alhamed, Celestine Iwendi, Ashit Kumar Dutta, Badr Almutairi, Hisham Alsaghier, Sultan Almotairi:
Building construction based on video surveillance and deep reinforcement learning using smart grid power system. Comput. Electr. Eng. 103: 108273 (2022) - [j33]Sohaib A. Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band:
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 181: 274-283 (2022) - [j32]Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi:
A futuristic approach to generate random bit sequence using dynamic perturbed chaotic system. Turkish J. Electr. Eng. Comput. Sci. 30(1): 35-49 (2022) - [j31]Dhanamjayulu Chittathuru, Nizhal U. N., Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Celestine Iwendi, Chuliang Wei, Qin Xin:
Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning. IET Image Process. 16(3): 647-658 (2022) - [j30]Celestine Iwendi, Ebuka Ibeke, Harshini Eggoni, Sreerajavenkatareddy Velagala, Gautam Srivastava:
Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model. Int. J. Inf. Technol. Decis. Mak. 21(1): 463-484 (2022) - [j29]Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Pushpita Chatterjee, Desire Ngabo, Waleed S. Alnumay:
A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization. IEEE Internet Things J. 9(4): 2566-2577 (2022) - [j28]Mehrdad Ahmadi Kamarposhti, Ilhami Colak, Celestine Iwendi, Shahab S. Band, Ebuka Ibeke:
Optimal Coordination of PSS and SSSC Controllers in Power System Using Ant Colony Optimization Algorithm. J. Circuits Syst. Comput. 31(4): 2250060:1-2250060:20 (2022) - [j27]Celestine Iwendi, Kainaat Mahboob, Zarnab Khalid, Abdul Rehman Javed, Muhammad Rizwan, Uttam Ghosh:
Classification of COVID-19 individuals using adaptive neuro-fuzzy inference system. Multim. Syst. 28(4): 1223-1237 (2022) - [j26]Maryum Bibi, Wajid Arshad Abbasi, Wajid Aziz, Sundus Khalil, Mueen Uddin, Celestine Iwendi, Thippa Reddy Gadekallu:
A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis. Pattern Recognit. Lett. 158: 80-86 (2022) - [j25]Lakshmana Kumar Ramasamy, Firoz Khan, Mohammad Shah, Balusupati Veera Venkata Siva Prasad, Celestine Iwendi, Cresantus Biamba:
Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring. Sensors 22(3): 1076 (2022) - [j24]Manik Gupta, Rakesh Kumar, Shashi Shekhar, Bhisham Sharma, Ram Bahadur Patel, Shaily Jain, Imed Ben Dhaou, Celestine Iwendi:
Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain. Sensors 22(14): 5119 (2022) - [j23]Shynu Padinjappurathu Gopalan, Chiranji Lal Chowdhary, Celestine Iwendi, Muhammad Awais Farid, Lakshmana Kumar Ramasamy:
An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems. Sensors 22(15): 5574 (2022) - [j22]Joseph Henry Anajemba, Celestine Iwendi, Imran Razzak, James Adu Ansere, Izuchukwu Michael Okpalaoguchi:
A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications. IEEE Trans. Ind. Informatics 18(9): 6445-6454 (2022) - 2021
- [j21]Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, Jerry Chun-Wei Lin:
Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing. IEEE Access 9: 8820-8834 (2021) - [j20]Ponnan Suresh, Saravanakumar Umathurai, Celestine Iwendi, Senthilkumar Mohan, Gautam Srivastava:
Field-programmable gate arrays in a low power vision system. Comput. Electr. Eng. 90: 106996 (2021) - [j19]Mohit Mittal, Celestine Iwendi, Suleman Khan, Abdul Rehman Javed:
Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j18]Mohammad Sirajuddin, Ch. Rupa, Celestine Iwendi, Cresantus Biamba:
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network. Secur. Commun. Networks 2021: 5521713:1-5521713:9 (2021) - [j17]Celestine Iwendi, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Kuruva Lakshmanna, Ali Kashif Bashir, Md. Jalil Piran:
A metaheuristic optimization approach for energy efficiency in the IoT networks. Softw. Pract. Exp. 51(12): 2558-2571 (2021) - [j16]Joseph Henry Anajemba, James Adu Ansere, Frederick Sam, Celestine Iwendi, Gautam Srivastava:
Optimal soft error mitigation in wireless communication using approximate logic circuits. Sustain. Comput. Informatics Syst. 30: 100521 (2021) - [j15]Celestine Iwendi, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, Gautam Srivastava:
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures. ACM Trans. Internet Techn. 21(3): 73:1-73:22 (2021) - 2020
- [j14]Celestine Iwendi, Suleman Khan, Joseph Henry Anajemba, Ali Kashif Bashir, Fazal Noor:
Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model. IEEE Access 8: 28462-28474 (2020) - [j13]Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Mamdouh Alenezi, Mohit Mittal:
Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation. IEEE Access 8: 53931-53941 (2020) - [j12]Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, G. Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, Ohyun Jo:
KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks. IEEE Access 8: 72650-72660 (2020) - [j11]Vivek Singhal, S. S. Jain, Divya Anand, Aman Singh, Sahil Verma, Kavita, Joel J. P. C. Rodrigues, Noor Zaman, Uttam Ghosh, Ohyun Jo, Celestine Iwendi:
Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings. IEEE Access 8: 113790-113806 (2020) - [j10]Celestine Iwendi, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava:
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput. Commun. 161: 160-171 (2020) - [j9]Harshita Patel, Dharmendra Singh Rajput, G. Thippa Reddy, Celestine Iwendi, Ali Kashif Bashir, Ohyun Jo:
A review on classification of imbalanced data for wireless sensor networks. Int. J. Distributed Sens. Networks 16(4) (2020) - [j8]Abdul Rehman Javed, Muhammad Usman Sarwar, Suleman Khan, Celestine Iwendi, Mohit Mittal, Neeraj Kumar:
Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition. Sensors 20(8): 2216 (2020) - [j7]Celestine Iwendi, Suleman Khan, Joseph Henry Anajemba, Mohit Mittal, Mamdouh Alenezi, Mamoun Alazab:
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems. Sensors 20(9): 2559 (2020) - [j6]Joseph Henry Anajemba, Yue Tang, Celestine Iwendi, Akpesiri Ohwoekevwo, Gautam Srivastava, Ohyun Jo:
Realizing Efficient Security and Privacy in IoT Networks. Sensors 20(9): 2609 (2020)
2010 – 2019
- 2019
- [j5]Celestine Iwendi, Mohammed A. Alqarni, Joseph Henry Anajemba, Ahmed S. Alfakeeh, Zhiyong Zhang, Ali Kashif Bashir:
Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment. IEEE Access 7: 82337-82348 (2019) - [j4]Svitlana Kutia, Sajjad Hussain Chauhdary, Celestine Iwendi, Lin Liu, Wang Yong, Ali Kashif Bashir:
Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems. IEEE Access 7: 90777-90788 (2019) - [j3]Mohit Mittal, Celestine Iwendi:
A Survey on Energy-Aware Wireless Sensor Routing Protocols. EAI Endorsed Trans. Energy Web 6(24): e5 (2019) - [j2]P. M. Durai Raj Vincent, Natarajan Deepa, Dhivya Elavarasan, Kathiravan Srinivasan, Sajjad Hussain Chauhdary, Celestine Iwendi:
Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability. Sensors 19(17): 3667 (2019) - 2018
- [j1]Celestine Iwendi, Mueen Uddin, James Adu Ansere, Pascal Nkurunziza, Joseph Henry Anajemba, Ali Kashif Bashir:
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique. IEEE Access 6: 47258-47267 (2018) - [c5]Celestine Iwendi, Zhiyong Zhang, Xin Du:
ACO based key management routing mechanism for WSN security and data collection. ICIT 2018: 1935-1939 - [c4]Shoushou Zhang, Celestine Iwendi, Siyuan Guo:
Analysis of frequency characteristic of surface permanent magnet synchronous machine. ICIT 2018: 2087-2092 - [c3]Celestine Iwendi, James Adu Ansere, Pascal Nkurunziza, Joseph Henry Anajemba, Zhou Yixuan:
An ACO-KMT Energy Efficient Routing Scheme for Sensed-IoT Network. IECON 2018: 3841-3846 - [c2]Joseph Henry Anajemba, Yue Tang, James Adu Ansere, Celestine Iwendi:
Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique. IECON 2018: 3864-3869 - 2011
- [c1]Celestine Iwendi:
Power consumption trade-off analysis in an OFDM communication chain. AFRICON 2011: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint