Gautam Srivastava
#136,685
Most Influential Person Now
Researcher
Gautam Srivastava's AcademicInfluence.com Rankings
Gautam Srivastavacomputer-science Degrees
Computer Science
#6306
World Rank
#6652
Historical Rank
Computational Linguistics
#1057
World Rank
#1071
Historical Rank
Machine Learning
#2001
World Rank
#2027
Historical Rank
Artificial Intelligence
#2251
World Rank
#2289
Historical Rank

Download Badge
Computer Science
Gautam Srivastava's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Gautam Srivastava Influential?
(Suggest an Edit or Addition)Gautam Srivastava's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques (2019) (554)
- A Decentralized Privacy-Preserving Healthcare Blockchain for IoT (2019) (478)
- A survey on security and privacy of federated learning (2021) (396)
- Analysis of Dimensionality Reduction Techniques on Big Data (2020) (314)
- Deep neural networks to predict diabetic retinopathy (2020) (128)
- Federated-Learning-Based Anomaly Detection for IoT Security Attacks (2021) (116)
- Security Aspects of Internet of Things aided Smart Grids: a Bibliometric Survey (2019) (110)
- An incentive-aware blockchain-based solution for internet of fake media things (2020) (106)
- Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain (2020) (104)
- B-Ride: Ride Sharing With Privacy-Preservation, Trust and Fair Payment Atop Public Blockchain (2019) (100)
- Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security (2020) (95)
- An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things (2021) (94)
- Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments (2021) (89)
- Efficient and Privacy-Preserving Medical Research Support Platform Against COVID-19: A Blockchain-Based Approach (2021) (88)
- PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities (2021) (86)
- Automated cognitive health assessment in smart homes using machine learning (2020) (85)
- Deep Learning-Embedded Social Internet of Things for Ambiguity-Aware Social Recommendations (2022) (80)
- KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks (2020) (77)
- Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention (2020) (76)
- Green communication in IoT networks using a hybrid optimization algorithm (2020) (75)
- Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness (2022) (73)
- Security and privacy of UAV data using blockchain technology (2020) (71)
- Fekete-Szegö inequality for classes of (p, q)-Starlike and (p, q)-convex functions (2019) (70)
- Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks (2022) (69)
- SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles (2021) (68)
- A Secure Publish/Subscribe Protocol for Internet of Things (2019) (68)
- Cryptocurrency malware hunting: A deep Recurrent Neural Network approach (2020) (64)
- A Light and Secure Healthcare Blockchain for IoT Medical Devices (2019) (62)
- Optimized Blockchain Model for Internet of Things based Healthcare Applications (2019) (61)
- Why Waldo befriended the dummy? k-Anonymization of social networks with pseudo-nodes (2013) (61)
- Service Offloading With Deep Q-Network for Digital Twinning-Empowered Internet of Vehicles in Edge Computing (2022) (60)
- Complexity of social network anonymization (2013) (56)
- Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles (2021) (55)
- Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection (2021) (53)
- k-Anonymization of Social Networks by Vertex Addition (2011) (53)
- N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets (2020) (51)
- Geometric Properties of Certain Classes of Analytic Functions Associated with a q-Integral Operator (2019) (50)
- Cyberbullying detection solutions based on deep learning architectures (2020) (50)
- Agent architecture of an intelligent medical system based on federated learning and blockchain technology (2021) (49)
- Predictive model for battery life in IoT networks (2020) (48)
- The Future of Blockchain Technology in Healthcare Internet of Things Security (2020) (45)
- Robust Collaborative Filtering Recommendation With User-Item-Trust Records (2021) (44)
- Defensive Modeling of Fake News Through Online Social Networks (2020) (44)
- An efficient public key secure scheme for cloud and IoT security (2020) (43)
- Nonlinear MIMO for Industrial Internet of Things in Cyber–Physical Systems (2021) (39)
- Cost optimization of secure routing with untrusted devices in software defined networking (2020) (39)
- Social Network Privacy for Attribute Disclosure Attacks (2011) (39)
- Suspicious activity detection using deep learning in secure assisted living IoT environments (2020) (39)
- Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices (2019) (39)
- Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining (2021) (38)
- A Light Blockchain-Powered Privacy-Preserving Organization Scheme for Ride Sharing Services (2020) (37)
- A game theoretic analysis of resource mining in blockchain (2020) (37)
- A predictive GA-based model for closed high-utility itemset mining (2021) (37)
- ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City (2019) (37)
- A study of multivalent q-starlike functions connected with circular domain (2019) (37)
- Some Applications of a New Integral Operator in q-Analog for Multivalent Functions (2019) (36)
- Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks (2021) (36)
- Delay-Sensitive Secure NOMA Transmission for Hierarchical HAP–LAP Medical-Care IoT Networks (2022) (36)
- A Two-stage Text Feature Selection Algorithm for Improving Text Classification (2021) (35)
- Social Network Anonymization via Edge Addition (2011) (35)
- Fuzzy high-utility pattern mining in parallel and distributed Hadoop framework (2021) (34)
- Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain (2019) (34)
- Storage and Proximity Management for Centralized Personal Health Records Using an IPFS-Based Optimization Algorithm (2021) (33)
- Integrating encryption techniques for secure data storage in the cloud (2020) (33)
- A secured distributed detection system based on IPFS and blockchain for industrial image and video data security (2021) (32)
- Data Sharing and Privacy for Patient IoT Devices Using Blockchain (2019) (31)
- Intelligent Ubiquitous Network Accessibility for Wireless-Powered MEC in UAV-Assisted B5G (2021) (31)
- MQTT-G: A Publish/Subscribe Protocol with Geolocation (2018) (31)
- Generalized Mittag-Leffler Input Stability of the Fractional Differential Equations (2019) (31)
- Self-attention-based conditional random fields latent variables model for sequence labeling (2021) (30)
- An Artificial Intelligence-Based Quorum System for the Improvement of the Lifespan of Sensor Networks (2021) (29)
- Attention-Based Deep Entropy Active Learning Using Lexical Algorithm for Mental Health Treatment (2021) (29)
- An Evolutionary Model to Mine High Expected Utility Patterns From Uncertain Databases (2021) (28)
- A Software Defined Network Based Fuzzy Normalized Neural Adaptive Multipath Congestion Control for the Internet of Things (2020) (28)
- Information Granulation-Based Community Detection for Social Networks (2020) (28)
- PHANTOM Protocol as the New Crypto-Democracy (2018) (28)
- Blockchain Technology and Neural Networks for the Internet of Medical Things (2020) (28)
- A bidirectional congestion control transport protocol for the internet of drones (2020) (27)
- A graph‐based convolutional neural network stock price prediction with leading indicators (2020) (27)
- SLPoW: Secure and Low Latency Proof of Work Protocol for Blockchain in Green IoT Networks (2020) (27)
- A Privacy-Enhancing Framework for Internet of Things Services (2019) (26)
- Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology (2018) (26)
- A Novel Auto-Focus Method for Image Processing Using Laser Triangulation (2019) (26)
- Dynamic server placement in edge computing toward Internet of Vehicles (2021) (25)
- Large-Scale High-Utility Sequential Pattern Analytics in Internet of Things (2021) (25)
- Efficient closed high-utility pattern fusion model in large-scale databases (2021) (25)
- An Empirical Evaluation of AI Deep Explainable Tools (2020) (24)
- A Pre-Large Weighted-Fusion System of Sensed High-Utility Patterns (2021) (23)
- Diversified and Scalable Service Recommendation With Accuracy Guarantee (2020) (23)
- Security and Privacy of Patient Information in Medical Systems Based on Blockchain Technology (2021) (23)
- A Response-Aware Traffic Offloading Scheme Using Regression Machine Learning for User-Centric Large-Scale Internet of Things (2021) (22)
- Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures (2021) (22)
- Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms (2021) (22)
- Anomaly Detection in Cyber-Physical Systems Using Machine Learning (2020) (22)
- An Incentive Based Approach for COVID-19 planning using Blockchain Technology (2020) (22)
- Realizing Efficient Security and Privacy in IoT Networks (2020) (21)
- P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT (2022) (21)
- A Two-Phase Anomaly Detection Model for Secure Intelligent Transportation Ride-Hailing Trajectories (2020) (21)
- Deep learning disease prediction model for use with intelligent robots (2020) (20)
- A load balance multi-scheduling model for OpenCL kernel tasks in an integrated cluster (2020) (20)
- Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments (2021) (19)
- Genetically Optimized Prediction of Remaining Useful Life (2021) (19)
- Post-Quantum Era Privacy Protection for Intelligent Infrastructures (2021) (19)
- Assessing Canadians Health Activity and Nutritional Habits Through Social Media (2020) (19)
- Reliable customer analysis using federated learning and exploring deep-attention edge intelligence (2022) (19)
- Making Sense of Blockchain for AI Deepfakes Technology (2020) (19)
- Fast and Accurate Convolution Neural Network for Detecting Manufacturing Data (2021) (18)
- An efficient algorithm for fuzzy frequent itemset mining (2020) (18)
- HUNA: A Method of Hierarchical Unsupervised Network Alignment for IoT (2021) (18)
- Instability Detection and Prevention in Smart Grids Under Asymmetric Faults (2020) (16)
- Enabling TCP Pacing using Programmable Data Plane Switches (2019) (16)
- Two-stage data encryption using chaotic neural networks (2020) (16)
- FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts (2021) (16)
- Wireless Transmitter Identification Based on Device Imperfections (2020) (16)
- Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain (2018) (15)
- A nutrient recommendation system for soil fertilization based on evolutionary computation (2021) (15)
- Scalable Mining of High-Utility Sequential Patterns With Three-Tier MapReduce Model (2021) (15)
- Field-programmable gate arrays in a low power vision system (2021) (15)
- An ensemble model for intrusion detection in the Internet of Softwarized Things (2020) (15)
- Efficient and reliable forensics using intelligent edge computing (2021) (15)
- A Hybrid Deep Generative Local Metric Learning Method for Intrusion Detection (2020) (15)
- Green Internet of Things Application of a Medical Massage Robot With System Interruption (2019) (14)
- Hiding sensitive information in eHealth datasets (2021) (14)
- Uncertain-Driven Analytics of Sequence Data in IoCV Environments (2021) (14)
- Differential Cryptanalysis of Round-Reduced LEA (2018) (14)
- Hiding sensitive information in eHealth datasets (2021) (14)
- Fast and Accurate Deep Learning Framework for Secure Fault Diagnosis in the Industrial Internet of Things (2023) (14)
- Communication Efficiency in Federated Learning: Achievements and Challenges (2021) (14)
- Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server (2021) (14)
- Performance evaluation of secured network traffic classification using a machine learning approach (2021) (14)
- Root causing, detecting, and fixing flaky tests: State of the art and future roadmap (2020) (14)
- Performance Prediction and Interpretation of a Refuse Plastic Fuel Fired Boiler (2020) (13)
- Consumer recommendation prediction in online reviews using Cuckoo optimized machine learning models (2021) (13)
- Remaining useful life prediction based on state assessment using edge computing on deep learning (2020) (13)
- An Incentive Based Approach for COVID-19 using Blockchain Technology (2020) (13)
- Content Delivery Networks (2020) (13)
- A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems (2021) (12)
- Resource Offload Consolidation Based on Deep-Reinforcement Learning Approach in Cyber-Physical Systems (2020) (12)
- Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model (2021) (12)
- A Scalable Platform to Collect, Store, Visualize, and Analyze Big Data in Real Time (2021) (12)
- A Blockchain Based Cloud Integrated IoT Architecture Using a Hybrid Design (2020) (12)
- Where's @Waldo?: Finding Users on Twitter (2019) (11)
- A Machine Learning-based SDN Controller Framework for Drone Management (2021) (11)
- Privacy reinforcement learning for faults detection in the smart grid (2021) (11)
- A Machine Learning Driven Threat Intelligence System for Malicious URL Detection (2021) (11)
- Hybrid Group Anomaly Detection for Sequence Data: Application to Trajectory Data Analytics (2022) (11)
- Ensemble sparse representation-based cyber threat hunting for security of smart cities (2020) (11)
- Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM (2019) (11)
- Fake Review Classification Using Supervised Machine Learning (2020) (10)
- Fuzzy Explainable Attention-based Deep Active Learning on Mental-Health Data (2021) (10)
- Mining of High-Utility Patterns in Big IoT-based Databases (2021) (10)
- Malicious URL Detection using Logistic Regression (2021) (10)
- A Machine Learning Model for Data Sanitization (2021) (10)
- Journey of customers in this digital era: Understanding the role of artificial intelligence technologies in user engagement and conversion (2021) (10)
- Secure AI and Blockchain-enabled Framework in Smart Vehicular Networks (2021) (10)
- Active Spectral Botnet Detection Based on Eigenvalue Weighting (2020) (10)
- The Addition of Geolocation to Sensor Networks (2018) (10)
- Using Twitter for diabetes community analysis (2020) (10)
- A Framework for Automatic Categorization of Social Data Into Medical Domains (2020) (10)
- ProBlock: a novel approach for fake news detection (2021) (9)
- Enhancing Network Security Via Machine Learning: Opportunities and Challenges (2020) (9)
- An IoT-Based Hedge System for Solar Power Generation (2021) (9)
- Deviation Point Curriculum Learning for Trajectory Outlier Detection in Cooperative Intelligent Transport Systems (2022) (9)
- Tracing the Source of Fake News using a Scalable Blockchain Distributed Network (2020) (9)
- Fault-Tolerance Mechanisms for Software-Defined Internet of Vehicles (2021) (9)
- Rec-CFSVD++: Implementing Recommendation System Using Collaborative Filtering and Singular Value Decomposition (SVD)++ (2021) (9)
- The Design of Mobile Distance Online Education Resource Sharing from the Perspective of Man-Machine Cooperation (2021) (9)
- Service offloading oriented edge server placement in smart farming (2020) (9)
- A Novel Synergetic LSTM-GA Stock Trading Suggestion System in Internet of Things (2021) (8)
- An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint (2021) (8)
- Security and Privacy in Shared HitLCPS Using a GA-Based Multiple-Threshold Sanitization Model (2022) (8)
- Correction to: A digital rights management system based on a scalable blockchain (2020) (8)
- A Blockchain-Based Energy Trading Scheme for Electric Vehicles (2021) (8)
- Artificial Intelligence-Based Surveillance System for Railway Crossing Traffic (2020) (8)
- The Homophily Principle in Social Network Analysis (2020) (8)
- Impact of CSR on Company’s Reputation and Brand Image (2019) (7)
- A Performance Evaluation of TCP BBRv2 Alpha (2020) (7)
- Mobile Cloud Computing Framework for Securing Data (2021) (7)
- Green Communication Protocol with Geolocation (2019) (7)
- Linguistic frequent pattern mining using a compressed structure (2021) (7)
- Vertex-Weighted Measures for Link Prediction in Hashtag Graphs (2019) (7)
- Analyzing Use of Twitter by Diabetes online Community (2019) (7)
- Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings (2021) (7)
- Call for Special Issue Papers: Multimedia Big Data Analytics for Engineering Education (2020) (6)
- Multi-source fusion for weak target images in the Industrial Internet of Things (2021) (6)
- Hybridization of cognitive computing for food services (2020) (6)
- An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems (2019) (6)
- Call for Special Issue Papers: Multimedia Big Data Analytics for Engineering Education. (2020) (6)
- Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach (2020) (6)
- DEDC: Sustainable data communication for cognitive radio sensors in the Internet of Things (2020) (6)
- SS-ITS: secure scalable intelligent transportation systems (2021) (6)
- Budget Feasible Roadside Unit Allocation Mechanism in Vehicular Ad-Hoc Networks (2020) (6)
- A Graph Based Approach to Automate Essay Evaluation (2020) (6)
- Bitcoin Mining: A Game Theoretic Analysis (2018) (6)
- Gauging Ecliptic Sentiment (2018) (5)
- A Machine-Learning-Based System for Prediction of Cardiovascular and Chronic Respiratory Diseases (2021) (5)
- Informative index for investment based on Kelly criterion (2021) (5)
- Efficient Search over Encrypted Medical Data with Known-Plaintext/Background Models and Unlinkability (2021) (5)
- Latent Discriminative Low-Rank Projection for Visual Dimension Reduction in Green Internet of Things (2021) (5)
- A Long Short-Term Memory Network Stock Price Prediction with Leading Indicators (2021) (5)
- Privacy-Preserving Deep Reinforcement Learning in Vehicle Ad Hoc Networks (2022) (5)
- A Local Betweenness Centrality Based Forwarding Technique for Social Opportunistic IoT Networks (2021) (5)
- Analytics of high average-utility patterns in the industrial internet of things (2021) (5)
- Sufficiency Criterion for A Subfamily of Meromorphic Multivalent Functions of Reciprocal Order with Respect to Symmetric Points (2019) (5)
- Email Classification and Forensics Analysis using Machine Learning (2021) (5)
- LightLedger: A Novel Blockchain-Based Domain Certificate Authentication and Validation Scheme (2021) (5)
- Editorial: Applications of Fuzzy Systems in Data Science and Big Data (2021) (5)
- A Comparison of State-of-the-Art Machine Learning Models for OpCode-Based IoT Malware Detection (2020) (5)
- Mining Multiple Fuzzy Frequent Patterns with Compressed List Structures (2020) (4)
- Guest Editorial: 6G-Enabled Network in Box (NIB) for Industrial Applications and Services (2021) (4)
- Deep Neural Networks for Detecting Real Emotions Using Biofeedback and Voice (2020) (4)
- Efficient Mining of Pareto-Front High Expected Utility Patterns (2020) (4)
- An efficient vehicular-relay selection scheme for vehicular communication (2021) (4)
- The Marichev-Saigo-Maeda Fractional-Calculus Operators Involving the (p,q)-Extended Bessel and Bessel-Wright Functions (2021) (4)
- A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining (2020) (4)
- PixSel : Images as Book Cipher Keys : An Efficient Implementation Using Partial Homophonic Substitution Ciphers (2018) (4)
- Optimal soft error mitigation in wireless communication using approximate logic circuits (2021) (4)
- Mining large‐scale high utility patterns in vehicular ad hoc network environments (2020) (4)
- An Efficient and Reliable Lightweight PUF for IoT-based Applications (2021) (4)
- Federated Learning Model with Augmentation and Samples Exchange Mechanism (2021) (4)
- A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments (2021) (4)
- Label-bag based Graph Anonymization via Edge Addition (2014) (4)
- EWPS: Emergency Data Communication in the Internet of Medical Things (2021) (4)
- Cognitive Analytics of Social Media Services for Edge Resource Pre-Allocation in Industrial Manufacturing (2021) (4)
- Integrated Ranking Algorithm for Efficient Decision Making (2021) (4)
- A CNN-based Stock Price Trend Prediction with Futures and Historical Price (2020) (3)
- Anonymization and De-anonymization of Social Network Data (2014) (3)
- IEEE Access Special Section Editorial: Lightweight Security and Provenance for Internet of Health Things (2021) (3)
- Fekete-Szego inequality for Classes of Starlike and Convex Functions (2019) (3)
- Sensor Fusion for Drone Detection (2021) (3)
- Network-Aware SDN Load Balancer with Deep Active Learning based Intrusion Detection Model (2021) (3)
- Secure Cattle Stock Infrastructure for the Internet of Things using Blockchain (2020) (3)
- Enterprise Human Resource Quality Management Model based on Grey Relational Analysis (2020) (3)
- Emergent Deep Learning for Anomaly Detection in Internet of Everything (2023) (3)
- RAT Hunter: Building Robust Models for Detecting Remote Access Trojans Based on Optimum Hybrid Features (2020) (3)
- Repeatable measurement of Twitter user impact NASA and the great American Eclipse of 2017 (2018) (3)
- Revisiting the Purpose of Selling: Toward a Model of Responsible Selling (2019) (3)
- A review of the state of the art in business intelligence software (2021) (3)
- Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks (2021) (3)
- MQTTg: An Android Implementation (2019) (2)
- Efficient Allocation of Resource-Intensive Mobile Cyber–Physical Social System Applications on a Heterogeneous Mobile Ad Hoc Cloud (2022) (2)
- Testing the Causal Map Builder on Amazon Alexa (2020) (2)
- The security of vulnerable senior citizens through dynamically sensed signal acquisition (2020) (2)
- Evaluation of Congestion Aware Social Metrics for Centrality-Based Routing (2021) (2)
- Multimodal Machine Learning for Pedestrian Detection (2021) (2)
- The Reliability of IoT Networks With Characteristics of Abnormal Induced Signals (2021) (2)
- Determining Sufficient Volume of Data for Analysis with Statistical Framework (2020) (2)
- Multi-agent Architecture for Internet of Medical Things (2020) (2)
- The Efficient Mining of Skyline Patterns from a Volunteer Computing Network (2021) (2)
- Immutable and Secure IP Address Protection Using Blockchain (2020) (2)
- Differential Cryptanalysis in ARX Ciphers, Applications to LEA (2018) (2)
- GSTChain: A Blockchain Network Application for the Goods and Services Tax (2021) (2)
- PixSel: Images as Book Cipher Keys (2018) (2)
- Analysis of Link Prediction Algorithms in Hashtag Graphs (2021) (2)
- Energy consumption in Bitcoin Mining : A Game Theoretic Analysis (2018) (2)
- Big Data Application for Security of Renewable Energy Resources (2020) (2)
- Independence number of graphs and line graphs of trees by means of omega invariant (2020) (2)
- Blockchain Education (2019) (2)
- Green Communication with Geolocation (2018) (2)
- A Transaction Classification Model of Federated Learning (2021) (2)
- Generalized $M_{m,r}$ -Network: A Case for Fixed Message Dimensions (2020) (1)
- Security protocol of sensitive high utility itemset hiding in shared IoT environments (2021) (1)
- Relationship of the Bernardi integral operator with certain classes of analytic functions (2020) (1)
- Graph anonymization through edge and vertex addition (2011) (1)
- A PSO-Based Sanitization Process with Multi-thresholds Model (2020) (1)
- Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1 (2021) (1)
- QoS routing algorithm for OBS networks based on a multi-objective genetic algorithm (2021) (1)
- Differential Cryptanalysis in ARX Ciphers with specific applications to LEA (2018) (1)
- Analysis of degree characteristics in airport networks (2019) (1)
- Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory (2020) (1)
- A Recurrent Attention Model for Cyber Attack Classification (2021) (1)
- A ML-Based Stock Trading Model for Profit Predication (2021) (1)
- Social Network Anonymity using Ant Colony Systems (2017) (1)
- Statistical Descriptors-based Automatic Fingerprint Identification: Machine Learning Approaches (2019) (1)
- The Effects of Ant Colony Optimization on Graph Anonymization (2016) (1)
- Mining Profitable and Concise Patterns in Large-Scale Internet of Things Environments (2021) (1)
- Deep-Attention Model to Analyze Reliable Customers via Federated Learning (2021) (1)
- A Tool based on ML-driven Graphical Model for Stock Price Prediction by Leading Indicators (2020) (1)
- Evolutionary Trading Signal Prediction Model Optimization Based on Chinese News and Technical Indicators in the Internet of Things (2023) (1)
- Artificial neural network to diagnose the consumer behaviour towards non-fuel products and services at filling stations (2021) (1)
- Efficient Mining of Non-Dominated High Quantity-Utility Patterns (2020) (0)
- An Improved Label-bag based Graph Anonymization based on Utility (2013) (0)
- Message from Data Science and Systems 2022 General Chairs (2022) (0)
- Brand positioning of automotive lubricants of psus for four wheeler segment (2015) (0)
- Editorial (2015) (0)
- Fractal Properties of the Generalized Mandelbrot Set with Complex Exponent (2023) (0)
- Effect of marketing channel on perishable goods (2018) (0)
- Impact of supply chain management on the digital marketing of perishable goods (fruits and vegetables) (2018) (0)
- Mining of High-Utility Patterns in Big IoT Databases (2021) (0)
- Anonymization and Deanonymization of Social Network Data (2015) (0)
- Sensor data fusion for the industrial artificial intelligence of things (2021) (0)
- Fuzzy High-Utility Pattern Mining based on the Hadoop Framework (2020) (0)
- Expanding Cybersecurity Knowledge Through an Indigenous Lens: A First Look (2020) (0)
- A study on reviews of online grocery stores during COVID-19 pandemic using sentiment analysis (2022) (0)
- High-Utility Pattern Mining in Hadoop Environments (2020) (0)
- Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks (2022) (0)
- Cybersecurity Education in Rural Indigenous Canada (2021) (0)
- 4 CHANNEL DEMULTIPLEXER BASED ON PHOTONIC CRYSTAL (2018) (0)
- A Graphic CNN-LSTM Model for Stock Price Predication (2021) (0)
- A GA-based Data Sanitization for Hiding Sensitive Information with Multi-Thresholds Constraint (2020) (0)
- Mining High-Utility Sequential Patterns in Uncertain Databases (2020) (0)
- Foreword: Special issue on blockchain for logistic industry (2021) (0)
- Multiple contaminant biosignal quality analysis for electrocardiography (2022) (0)
- Guest Editorial: Artificial Intelligence for Securing Industrial-Based Cyber-Physical Systems (2021) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Gautam Srivastava?
Gautam Srivastava is affiliated with the following schools: