A review of topic modeling methods I Vayansky, SAP Kumar Information Systems 94, 101582, 2020 | 754 | 2020 |
Security in internet of things: Challenges, solutions and future directions SA Kumar, T Vealey, H Srivastava 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772-5781, 2016 | 373 | 2016 |
Topic modeling and sentiment analysis of global climate change tweets B Dahal, SAP Kumar, Z Li Social network analysis and mining 9, 1-20, 2019 | 341 | 2019 |
A novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance SAP Kumar, R Madhumathi, PR Chelliah, L Tao, S Wang Journal of Reliable Intelligent Environments 4 (4), 199-209, 2018 | 154 | 2018 |
Phishing–challenges and solutions I Vayansky, S Kumar Computer Fraud & Security 2018 (1), 15-20, 2018 | 152 | 2018 |
Using proactive fault-tolerance approach to enhance cloud service reliability J Liu, S Wang, A Zhou, SAP Kumar, F Yang, R Buyya IEEE Transactions on Cloud Computing 6 (4), 1191-1202, 2016 | 148 | 2016 |
Securing docker containers from denial of service (dos) attacks J Chelladhurai, PR Chelliah, SA Kumar 2016 IEEE International Conference on Services Computing (SCC), 856-859, 2016 | 118 | 2016 |
MVR: An architecture for computation offloading in mobile edge computing X Wei, S Wang, A Zhou, J Xu, S Su, S Kumar, F Yang 2017 IEEE international conference on edge computing (EDGE), 232-235, 2017 | 106 | 2017 |
5G security challenges and solutions: a review by OSI layers S Sullivan, A Brighente, SAP Kumar, M Conti IEEE access 9, 116294-116314, 2021 | 91 | 2021 |
Predicting obesity rate and obesity-related healthcare costs using data analytics S Revels, SAP Kumar, O Ben-Assuli Health policy and technology 6 (2), 198-207, 2017 | 66 | 2017 |
A survey on the blockchain techniques for the Internet of Vehicles security S Kumar, S Velliangiri, P Karthikeyan, S Kumari, S Kumar, MK Khan Transactions on Emerging Telecommunications Technologies, e4317, 2021 | 56 | 2021 |
Vulnerability assessment for security in aviation cyber-physical systems SAP Kumar, B Xu 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 51 | 2017 |
3D face reconstruction from single 2D image using distinctive features HMR Afzal, S Luo, MK Afzal, G Chaudhary, M Khari, SAP Kumar IEEE Access 8, 180681-180689, 2020 | 49 | 2020 |
Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions R Uddin, SAP Kumar, V Chamola Ad Hoc Networks 152, 103322, 2024 | 47 | 2024 |
Evaluation of classification algorithms for distributed denial of service attack detection M Gohil, S Kumar 2020 IEEE Third International Conference on Artificial Intelligence and …, 2020 | 45 | 2020 |
A Survey of Intelligent Transportation Systems Security: Challenges and Solutions J Harvey, S Kumar 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 43 | 2020 |
A practical model for educators to predict student performance in K-12 education using machine learning JL Harvey, SAP Kumar 2019 IEEE symposium series on computational intelligence (SSCI), 3004-3011, 2019 | 43 | 2019 |
Big data analytics framework for system health monitoring B Xu, SA Kumar 2015 IEEE International Congress on Big Data, 401-408, 2015 | 42 | 2015 |
Control framework for secure cloud computing H Srivastava, SA Kumar Journal of Information Security 6 (1), 12-23, 2014 | 40 | 2014 |
Ensemble algorithm using transfer learning for sheep breed classification D Agrawal, S Minocha, S Namasudra, S Kumar 2021 IEEE 15th international symposium on applied computational intelligence …, 2021 | 36 | 2021 |