


default search action
Bharat Bhushan 0005
Person information
- affiliation: Sharda University, Greater Noida, India
Other persons with the same name
- Bharat Bhushan — disambiguation page
- Bharat Bhushan 0001
— Delhi Technological University, New Delhi, India - Bharat Bhushan 0002
— Ohio State University, Columbus, OH, USA - Bharat Bhushan 0003
— Delhi Technological University, New Delhi, India - Bharat Bhushan 0004
— Radius Synergies International, Noida, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j21]N. Sheena, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EESDA: Energy-Efficient And Secure Data Aggregation Protocol for IoT. Peer Peer Netw. Appl. 18(4): 220 (2025)
[i1]A. K. M. Bahalul Haque, Bharat Bhushan, Gaurav Dhiman:
Conceptualizing Smart City Applications: Requirements, Architecture, Security Issues and Emerging Trends. CoRR abs/2510.12841 (2025)- 2024
[j20]Jiby J. Puthiyidam
, Shelbi Joseph, Bharat Bhushan
:
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication. Comput. Commun. 216: 307-323 (2024)
[j19]N. Sheena
, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
EMCP: evolutionary multi-objective clustering protocol for prolonged lifetime of heterogeneous IoT networks. J. Supercomput. 80(4): 5224-5254 (2024)
[j18]Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan:
Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker. J. Supercomput. 80(7): 8898-8932 (2024)
[j17]Shraiyash Pandey
, Bharat Bhushan
:
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks. Wirel. Networks 30(4): 2987-3026 (2024)
[c5]Atul Agrawal
, Pashupati Baniya, Esraa Mohammed Alazzawi, Nitin Rakesh, Bharat Bhushan, Akhtar Jamil:
Detection of DoS and DDoS Attacks Using Machine Learning and Blockchain in IoMT Networks. AIBThings 2024: 1-5
[c4]Andleeb Khan
, Parma Nand, Bharat Bhushan, Esraa Mohammed Alazzawi, Akhtar Jamil:
A Review of Spectrum Sharing in 6G for IoT Environment. AIBThings 2024: 1-6
[c3]Andleeb Khan
, Parma Nand, Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil:
A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask. AIBThings 2024: 1-5- 2023
[j16]N. Sheena
, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks. Clust. Comput. 26(6): 4101-4117 (2023)
[j15]Andrew J.
, Deva Priya Isravel, K. Martin Sagayam, Bharat Bhushan, Yuichi Sei
, Jennifer Eunice
:
Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J. Netw. Comput. Appl. 215: 103633 (2023)
[j14]Nemika Tyagi, Bharat Bhushan
:
Demystifying the Role of Natural Language Processing (NLP) in Smart City Applications: Background, Motivation, Recent Advances, and Future Research Directions. Wirel. Pers. Commun. 130(2): 857-908 (2023)
[c2]Aayush Juyal
, Bharat Bhushan
, Alaa Ali Hameed
, Akhtar Jamil
:
Deep Learning Approaches for Cyber Threat Detection and Mitigation. ICAAI 2023: 34-41
[c1]Pashupati Baniya
, Parma Nand
, Bharat Bhushan
, Alaa Ali Hameed
, Akhtar Jamil
:
Blockchain Based Security Framework for Internet of Medical Things (IoMT) Applications. ICAAI 2023: 73-78- 2022
[j13]A. K. M. Bahalul Haque, Bharat Bhushan
, Gaurav Dhiman
:
Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends. Expert Syst. J. Knowl. Eng. 39(5) (2022)
[j12]Kulandairaj Martin Sagayam, Ahona Ghosh
, Bharat Bhushan, J. Andrew Onesimu
, Korhan Cengiz
, Ahmed A. Elngar
:
Underwater estimation of audio signal prediction using fruit fly algorithm and hybrid wavelet neural network. J. Reliab. Intell. Environ. 8(2): 211-221 (2022)
[j11]Chandrashekhar Azad
, Bharat Bhushan, Rohit Sharma
, Achyut Shankar, Krishna Kant Singh
, Aditya Khamparia:
Prediction model using SMOTE, genetic algorithm and decision tree (PMSGD) for classification of diabetes mellitus. Multim. Syst. 28(4): 1289-1307 (2022)
[j10]Bharat Bhushan
, Gadadhar Sahoo:
FLEAC: Fuzzy Logic-based Energy Adequate Clustering Protocol for Wireless Sensor Networks using Improved Grasshopper Optimization Algorithm. Wirel. Pers. Commun. 124(1): 573-606 (2022)- 2021
[j9]Bharat Bhushan
, Preeti Sinha, Kulandairaj Martin Sagayam
, J. Andrew Onesimu
:
Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. 90: 106897 (2021)
[j8]Aditya Khamparia
, Prakash Kumar Singh, Poonam Rani, Debabrata Samanta
, Ashish Khanna
, Bharat Bhushan
:
An internet of health things-driven deep learning framework for detection and classification of skin cancer using transfer learning. Trans. Emerg. Telecommun. Technol. 32(7) (2021)
[j7]Shivam Saxena
, Bharat Bhushan
, Mohd Abdul Ahad:
Blockchain based solutions to secure IoT: Background, integration trends and a way forward. J. Netw. Comput. Appl. 181: 103050 (2021)
[j6]Shashank Srivastava, Sandeep Saxena, Rajkumar Buyya, Manoj Kumar, Achyut Shankar
, Bharat Bhushan:
CGP: Cluster-based gossip protocol for dynamic resource environment in cloud. Simul. Model. Pract. Theory 108: 102275 (2021)
[j5]Bharat Bhushan
, Chinmayee Sahoo
, Preeti Sinha, Aditya Khamparia:
Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions. Wirel. Networks 27(1): 55-90 (2021)- 2020
[j4]Ganesan Rajesh, X. Mercilin Raajini
, Kulandairaj Martin Sagayam
, Bharat Bhushan
, Utku Köse
:
Fuzzy genetic based dynamic spectrum allocation approach for cognitive radio sensor networks. Turkish J. Electr. Eng. Comput. Sci. 28(5): 2416-2432 (2020)
[j3]Bharat Bhushan
, Gadadhar Sahoo:
ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment. Wirel. Pers. Commun. 111(3): 1667-1694 (2020)
[p1]Bharat Bhushan
, Gadadhar Sahoo:
Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective. Handbook of Computer Networks and Cyber Security 2020: 683-713
2010 – 2019
- 2019
[j2]Bharat Bhushan
, Gadadhar Sahoo
:
E2 SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks. Wirel. Networks 25(5): 2697-2721 (2019)- 2018
[j1]Bharat Bhushan
, Gadadhar Sahoo
:
Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks. Wirel. Pers. Commun. 98(2): 2037-2077 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-13 23:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







