default search action
Shekhar Verma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j91]Shivangi Nigam, Adarsh Prasad Behera, Shekhar Verma, P. Nagabhushan:
Deformity removal from handwritten text documents using variable cycle GAN. Int. J. Document Anal. Recognit. 27(4): 615-627 (2024) - [j90]Upendra Pratap Singh, Indrajeet Kumar Sinha, Krishna Pratap Singh, Shekhar Verma:
Meta-DPSTL: meta learning-based differentially private self-taught learning. Int. J. Mach. Learn. Cybern. 15(9): 4021-4053 (2024) - [j89]Sambhavi Tiwari, Manas Gogoi, Shekhar Verma, Krishna Pratap Singh:
MAC: a meta-learning approach for feature learning and recombination. Pattern Anal. Appl. 27(2): 63 (2024) - [j88]Adarsh Prasad Behera, Satya Prakash, Siddhant Khanna, Shivangi Nigam, Shekhar Verma:
CNN-Based Metrics for Performance Evaluation of Generative Adversarial Networks. IEEE Trans. Artif. Intell. 5(10): 5040-5049 (2024) - [i11]Manas Gogoi, Sambhavi Tiwari, Shekhar Verma:
Perturbing the Gradient for Alleviating Meta Overfitting. CoRR abs/2405.12299 (2024) - [i10]Shikha Verma, Kuldeep Srivastava, Akhilesh Tiwari, Shekhar Verma:
Estimation of the Area and Precipitation Associated with a Tropical Cyclone Biparjoy by using Image Processing. CoRR abs/2407.05255 (2024) - 2023
- [j87]Abhishek, Rakesh Kumar Yadav, Shekhar Verma:
Semi-supervised learning with dropouts. Expert Syst. Appl. 215: 119235 (2023) - [j86]Pravin Mundhe, Pooja Phad, R. Yuvaraj, Shekhar Verma, S. Venkatesan:
Blockchain-based conditional privacy-preserving authentication scheme in VANETs. Multim. Tools Appl. 82(16): 24155-24179 (2023) - [j85]Rakesh Kumar Yadav, Abhishek, Abhishek Verma, Prashant Shukla, Katyayani Verma, Shekhar Verma:
Low-rank GAT: toward robust quantification of neighborhood influence. Neural Comput. Appl. 35(5): 3925-3936 (2023) - [j84]Shivangi Nigam, Adarsh Prasad Behera, Manas Gogoi, Shekhar Verma, P. Nagabhushan:
Strike off removal in Indic scripts with transfer learning. Neural Comput. Appl. 35(17): 12927-12943 (2023) - [j83]Raghav, Nitish Andola, S. Venkatesan, Shekhar Verma:
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. Peer Peer Netw. Appl. 16(5): 2525-2547 (2023) - [j82]Abhishek, Rakesh Kumar Yadav, Shekhar Verma:
Parzen Window Approximation on Riemannian Manifold. Pattern Recognit. 134: 109081 (2023) - [j81]Adarsh Prasad Behera, Puja Rani, Shekhar Verma, Manish Kumar:
Curvature Regularized Similarity Based Ricci Flow Embedding. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 150-163 (2023) - [j80]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
PSCLS: provably secure certificateless signature scheme for IoT device on cloud. J. Supercomput. 79(5): 4962-4982 (2023) - [j79]Raghav, Nitish Andola, Katyayani Verma, S. Venkatesan, Shekhar Verma:
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud. J. Supercomput. 79(13): 14117-14145 (2023) - [j78]Raghav, Nitish Andola, Katyayani Verma, S. Venkatesan, Shekhar Verma:
Correction to: Proactive threshold‑proxy re‑encryption scheme for secure data sharing on cloud. J. Supercomput. 79(15): 17755 (2023) - [j77]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
P2LBS: Privacy Provisioning in Location-Based Services. IEEE Trans. Serv. Comput. 16(1): 466-477 (2023) - [i9]Sambhavi Tiwari, Manas Gogoi, Shekhar Verma, Krishna Pratap Singh:
Learning to Learn with Indispensable Connections. CoRR abs/2304.02862 (2023) - [i8]Shikha Verma, Kuldeep Srivastava, Akhilesh Tiwari, Shekhar Verma:
Deep Learning Techniques in Extreme Weather Events: A Review. CoRR abs/2308.10995 (2023) - [i7]Indrajeet Kumar Sinha, Shekhar Verma, Krishna Pratap Singh:
FAM: fast adaptive meta-learning. CoRR abs/2308.13970 (2023) - [i6]Indrajeet Kumar Sinha, Shekhar Verma, Krishna Pratap Singh:
Equitable-FL: Federated Learning with Sparsity for Resource-Constrained Environment. CoRR abs/2309.00864 (2023) - 2022
- [j76]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient and privacy-preserving location-based services over the cloud. Clust. Comput. 25(5): 3175-3192 (2022) - [j75]Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma:
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. Clust. Comput. 25(5): 3699-3717 (2022) - [j74]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
A Survey of Oblivious Transfer Protocol. ACM Comput. Surv. 54(10s): 211:1-211:37 (2022) - [j73]Lalita Mishra, Shekhar Verma:
Graph attention autoencoder inspired CNN based brain tumor classification using MRI. Neurocomputing 503: 236-247 (2022) - [j72]Nitish Andola, Sourabh Prakash, Vijay Kumar Yadav, Raghav, S. Venkatesan, Shekhar Verma:
A secure searchable encryption scheme for cloud using hash-based indexing. J. Comput. Syst. Sci. 126: 119-137 (2022) - [j71]Adarsh Prasad Behera, Jagriti Singh, Shekhar Verma, Manish Kumar:
Data visualization through non linear dimensionality reduction using feature based Ricci flow embedding. Multim. Tools Appl. 81(11): 14831-14850 (2022) - [j70]Vijay Kumar Yadav, Shekhar Verma, Subramanian Venkatesan:
Linkable Privacy-Preserving Scheme for Location-Based Services. IEEE Trans. Intell. Transp. Syst. 23(7): 7998-8012 (2022) - [j69]Arpita Bhargava, Shekhar Verma:
DUEL: Dempster Uncertainty-Based Enhanced- Trust Level Scheme for VANET. IEEE Trans. Intell. Transp. Syst. 23(9): 15079-15090 (2022) - [j68]Vijay Kumar Yadav, Rakesh Kumar Yadav, Shekhar Verma, S. Venkatesan:
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud. J. Supercomput. 78(2): 2386-2416 (2022) - [j67]Nitish Andola, Raghav Gahlot, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Searchable encryption on the cloud: a survey. J. Supercomput. 78(7): 9952-9984 (2022) - [j66]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
EP2LBS: efficient privacy-preserving scheme for location-based services. J. Supercomput. 78(13): 14991-15013 (2022) - [j65]Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
Anonymous and Linkable Location-Based Services. IEEE Trans. Veh. Technol. 71(9): 9397-9409 (2022) - [i5]Sambhavi Tiwari, Manas Gogoi, Shekhar Verma, Krishna Pratap Singh:
MAC: A Meta-Learning Approach for Feature Learning and Recombination. CoRR abs/2209.09613 (2022) - [i4]Manas Gogoi, Sambhavi Tiwari, Shekhar Verma:
Adaptive Prototypical Networks. CoRR abs/2211.12479 (2022) - [i3]Lalita Mishra, Shekhar Verma, Shirshu Varma:
Hybrid Model using Feature Extraction and Non-linear SVM for Brain Tumor Classification. CoRR abs/2212.02794 (2022) - 2021
- [j64]Rakesh Kumar Yadav, Abhishek, Shekhar Verma, S. Venkatesan:
Cross-covariance based affinity for graphs. Appl. Intell. 51(6): 3844-3864 (2021) - [j63]Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Anonymity on blockchain based e-cash protocols - A survey. Comput. Sci. Rev. 40: 100394 (2021) - [j62]Pravin Mundhe, Shekhar Verma, S. Venkatesan:
A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput. Sci. Rev. 41: 100411 (2021) - [j61]Arpita Bhargava, Shekhar Verma:
DEIT: Dempster Shafer Theory-based edge-centric Internet of Things-specific trust model. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j60]Nidhi Sindhwani, Shekhar Verma, Tushar Bajaj, Rohit Anand:
Comparative Analysis of Intelligent Driving and Safety Assistance Systems Using YOLO and SSD Model of Deep Learning. Int. J. Inf. Syst. Model. Des. 12(1): 131-146 (2021) - [j59]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
An efficient and light weight polynomial multiplication for ideal lattice-based cryptography. Multim. Tools Appl. 80(2): 3089-3120 (2021) - [j58]Prashant Shukla, Abhishek, Shekhar Verma, Manish Kumar:
A rotation based regularization method for semi-supervised learning. Pattern Anal. Appl. 24(3): 887-905 (2021) - [j57]Rakesh Kumar Yadav, Abhishek, Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
HSIC-based affinity measure for learning on graphs. Pattern Anal. Appl. 24(4): 1667-1683 (2021) - [j56]Abhishek, Rakesh Kumar Yadav, Shekhar Verma, S. Venkatesan:
iHRNL: Iterative Hessian-based manifold regularization mechanism for localization in WSN. J. Supercomput. 77(10): 12026-12049 (2021) - [j55]Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
SpyChain: A Lightweight Blockchain for Authentication and Anonymous Authorization in IoD. Wirel. Pers. Commun. 119(1): 343-362 (2021) - 2020
- [j54]Vijay Kumar Yadav, Anshu S. Anand, Shekhar Verma, S. Venkatesan:
Private computation of the Schulze voting method over the cloud. Clust. Comput. 23(4): 2517-2531 (2020) - [j53]Arpita Bhargava, Shekhar Verma:
KATE: Kalman Trust Estimator for Internet of Drones. Comput. Commun. 160: 388-401 (2020) - [j52]Bodhi Chakraborty, Shekhar Verma, Krishna Pratap Singh:
Temporal Differential Privacy in Wireless Sensor Networks. J. Netw. Comput. Appl. 155: 102548 (2020) - [j51]Rakesh Kumar Yadav, Abhishek, Shekhar Verma, S. Venkatesan:
Regularization on a rapidly varying manifold. Int. J. Mach. Learn. Cybern. 11(7): 1571-1590 (2020) - [j50]Prashant Shukla, Abhishek Verma, Abhishek, Shekhar Verma, Manish Kumar:
Interpreting SVM for medical images using Quadtree. Multim. Tools Appl. 79(39-40): 29353-29373 (2020) - [j49]Raghav, Nitish Andola, S. Venkatesan, Shekhar Verma:
PoEWAL: A lightweight consensus mechanism for blockchain in IoT. Pervasive Mob. Comput. 69: 101291 (2020) - [j48]Pravin Mundhe, Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient Lattice-Based Ring Signature for Message Authentication in VANETs. IEEE Syst. J. 14(4): 5463-5474 (2020) - [j47]Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient and Secure Location-Based Services Scheme in VANET. IEEE Trans. Veh. Technol. 69(11): 13567-13578 (2020) - [j46]Pravin Mundhe, Vijay Kumar Yadav, Abhishek Singh, Shekhar Verma, S. Venkatesan:
Ring Signature-Based Conditional Privacy-Preserving Authentication in VANETs. Wirel. Pers. Commun. 114(1): 853-881 (2020) - [c40]Indrajeet Kumar Sinha, Krishna Pratap Singh, Shekhar Verma:
DP-ANN: A new Differential Private Artificial Neural Network with Application on Health data (Workshop Paper). BigMM 2020: 351-355 - [c39]Rakesh Kumar Yadav, Manikanta Moghili, Abhishek, Prashant Shukla, Shekhar Verma:
Ensemble Based Graph Convolutional Network for Semi Supervised Learning. CVIP (3) 2020: 443-451 - [c38]Adarsh Prasad Behera, Sayli Godage, Shekhar Verma, Manish Kumar:
Regularized Deep Convolutional Generative Adversarial Network. CVIP (3) 2020: 452-464 - [c37]Rakesh Kumar Yadav, Abhishek, Sourav S, Shekhar Verma:
GCN with Clustering Coefficients and Attention Module. ICMLA 2020: 185-190 - [i2]Abhishek Singh, Shekhar Verma:
Parzen Window Approximation on Riemannian Manifold. CoRR abs/2012.14661 (2020)
2010 – 2019
- 2019
- [j45]Muneendra Ojha, Krishna Pratap Singh, Pavan Chakraborty, Shekhar Verma:
A review of multi-objective optimisation and decision making using evolutionary algorithms. Int. J. Bio Inspired Comput. 14(2): 69-84 (2019) - [j44]Kapil Sharma, Varsha Dixit, Brijesh Kumar Chaurasia, Shekhar Verma:
Trust computation using fuzzy analyser. Int. J. Inf. Technol. Commun. Convergence 3(3): 177-190 (2019) - [j43]Muneendra Ojha, Krishna Pratap Singh, Pavan Chakraborty, Shekhar Verma:
An Efficient Framework Using Normalized Dominance Operator for Multi-Objective Evolutionary Algorithms. Int. J. Swarm Intell. Res. 10(1): 15-37 (2019) - [j42]Abhishek, Shekhar Verma:
Optimal manifold neighborhood and kernel width for robust non-linear dimensionality reduction. Knowl. Based Syst. 185 (2019) - [j41]Nitish Andola, Raghav, Manas Gogoi, S. Venkatesan, Shekhar Verma:
Vulnerabilities on Hyperledger Fabric. Pervasive Mob. Comput. 59 (2019) - [j40]Vishal Krishna Singh, Manish Kumar, Shekhar Verma:
Accurate Detection of Important Events in WSNs. IEEE Syst. J. 13(1): 248-257 (2019) - [j39]Vivek Kumar Singh, Shekhar Verma, Manish Kumar:
ODECS: An On-Demand Explosion-Based Compressed Sensing Using Random Walks in Wireless Sensor Networks. IEEE Syst. J. 13(3): 2466-2475 (2019) - [j38]Vishal Krishna Singh, Manish Kumar, Shekhar Verma:
Node Scheduling and Compressed Sampling for Event Reporting in WSNs. IEEE Trans. Netw. Sci. Eng. 6(3): 418-431 (2019) - [j37]Jyoti Kashniyal, Shekhar Verma, Krishna Pratap Singh:
A new patch and stitch algorithm for localization in wireless sensor networks. Wirel. Networks 25(6): 3251-3264 (2019) - [j36]Bodhi Chakraborty, Shekhar Verma, Krishna Pratap Singh:
Differentially Private Location Privacy Preservation in Wireless Sensor Networks. Wirel. Pers. Commun. 104(1): 387-406 (2019) - [j35]Brijesh Kumar Chaurasia, Md. Iftekhar Alam, Arun Prakash, Ranjeet Singh Tomar, Shekhar Verma:
MPMAC: Clustering Based MAC Protocol for VANETs. Wirel. Pers. Commun. 108(1): 409-436 (2019) - 2018
- [j34]Bodhi Chakraborty, Shekhar Verma, Krishna Pratap Singh:
Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Comput. Secur. 77: 36-48 (2018) - [j33]Nitish Andola, Sourabh Prakash, S. Venkatesan, Shekhar Verma:
Secure and lightweight multi user searchable encryption scheme. J. Intell. Fuzzy Syst. 35(2): 1239-1251 (2018) - [j32]Neeraj Jain, Shekhar Verma, Manish Kumar:
Low cost localization using Nyström extended locally linear embedding. Pattern Recognit. Lett. 110: 30-35 (2018) - [j31]Vivek Kumar Singh, Shekhar Verma, Manish Kumar:
DBCS: A Decomposition Based Compressive Sensing for Event Oriented Wireless Sensor Networks. Wirel. Pers. Commun. 99(1): 351-369 (2018) - [j30]Vivekanand Jha, Shekhar Verma, Nupur Prakash, Garima Gupta:
Corona Based Optimal Node Deployment Distribution in Wireless Sensor Networks. Wirel. Pers. Commun. 102(1): 325-354 (2018) - 2017
- [j29]Kalpana Singh, Manish Kumar, Shekhar Verma:
Mining of yield components and other associated quantitative traits in various crops. Int. J. Bioinform. Res. Appl. 13(3): 279-291 (2017) - [j28]Kapil Sharma, Brijesh Kumar Chaurasia, Shekhar Verma, Arpita Bhargava:
Trust computation in VANET using TOEFV. Int. J. Trust. Manag. Comput. Commun. 4(1): 36-51 (2017) - [j27]Jyoti Kashniyal, Shekhar Verma, Krishna Pratap Singh:
Wireless Sensor Networks Localization Using Progressive Isomap. Wirel. Pers. Commun. 92(3): 1281-1302 (2017) - [c36]Jyoti Kashniyal, Shekhar Verma, Krishna Pratap Singh:
Flip Error Elimination and Core Map Selection in Patch and Stitch Algorithms for Localization in Wireless Sensor Network. ICCCT 2017: 41-46 - [c35]Vivekanand Jha, Nupur Prakash, Shekhar Verma:
An energy efficient approach for corona based wireless sensor network. UEMCON 2017: 316-321 - 2015
- [j26]Brijesh Kumar Chaurasia, Ranjeet Singh Tomar, Shekhar Verma:
Using trust for lightweight communication in VANETs. Int. J. Artif. Intell. Soft Comput. 5(2): 105-116 (2015) - [c34]Muneendra Ojha, Krishna Pratap Singh, Pavan Chakraborty, Shekhar Verma:
An Aggregation Based Approach with Pareto Ranking in Multiobjective Genetic Algorithm. SocProS (2) 2015: 261-271 - 2014
- [j25]Brijesh Kumar Chaurasia, Shekhar Verma:
Secure pay while on move toll collection using VANET. Comput. Stand. Interfaces 36(2): 403-411 (2014) - [j24]Ashmita Debnath, Pradheepkumar Singaravelu, Shekhar Verma:
Privacy in wireless sensor networks using ring signature. J. King Saud Univ. Comput. Inf. Sci. 26(2): 228-236 (2014) - [j23]Manjusha Pandey, Shekhar Verma:
Privacy Provisioning in Wireless Sensor Networks. Wirel. Pers. Commun. 75(2): 1115-1140 (2014) - [c33]Nitul Dutta, Hiren Kumar Deva Sarma, Ashish Kr. Srivastava, Shekhar Verma:
A SINR Based Clustering Protocol for Cognitive Radio Ad Hoc Network (CRAHN). ICIT 2014: 69-75 - 2013
- [j22]Pradheepkumar Singaravelu, Shekhar Verma:
Performance analysis of multivariate cryptosystem schemes for wireless sensor network. Comput. Electr. Eng. 39(6): 1880-1893 (2013) - [j21]Manish Kumar, Shekhar Verma, Neerav Agarwal:
GMCA: a greedy multilevel clustering algorithm for data gathering in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 11(2): 198-213 (2013) - [j20]Brijesh Kumar Chaurasia, Shekhar Verma:
Privacy preserving mutual authentication in WiMAX. Int. J. Inf. Technol. Commun. Convergence 2(4): 308-320 (2013) - [j19]Pradheepkumar Singaravelu, Shekhar Verma:
Practicability of HFE Scheme for Wireless Sensor Network. Trans. Comput. Sci. 17: 116-132 (2013) - [j18]Brijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar:
Intersection Attack on Anonymity in VANET. Trans. Comput. Sci. 17: 133-149 (2013) - [j17]Ranjeet Singh Tomar, Shekhar Verma, Geetam Singh Tomar:
Cluster Based RSU Centric Channel Access for VANETs. Trans. Comput. Sci. 17: 150-171 (2013) - [c32]Prerna Meena, Devendra Singh Gurjar, Ashutosh Kumar Singh, Shekhar Verma:
Optimal Positioning of Base Station in Wireless Sensor Networks: A Survey. ICACNI 2013: 1135-1143 - [c31]Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Shekhar Verma, Rajendra Singh Kushwah:
Network Connectivity in VANETs. SocProS (1) 2013: 767-775 - [c30]Brijesh Kumar Chaurasia, Awanish Shahi, Shekhar Verma:
Authentication in Cloud Computing Environment Using Two Factor Authentication. SocProS (2) 2013: 779-785 - 2012
- [j16]Brijesh Kumar Chaurasia, Shekhar Verma:
Model-based verification of privacy preserving authentication protocol for VANETs. Int. J. Inf. Technol. Commun. Convergence 2(2): 120-137 (2012) - [j15]Ranjeet Singh Tomar, Shekhar Verma:
Safety of Lane Change Maneuver Through A Priori Prediction of Trajectory Using Neural Networks. Netw. Protoc. Algorithms 4(1): 4-21 (2012) - [c29]Ranjeet Singh Tomar, Shekhar Verma:
Enhanced SDMA for VANET Communication. AINA Workshops 2012: 688-693 - 2011
- [j14]Prabakaran Subramani, Rajendra Sahu, Shekhar Verma, S. Prabakaran:
An optimised gene selection approach using wavelet power spectrum. Int. J. Bioinform. Res. Appl. 7(4): 335-354 (2011) - [j13]Brijesh Kumar Chaurasia, Shekhar Verma:
Secure toll collection in VANETs. Int. J. Inf. Technol. Commun. Convergence 1(4): 421-443 (2011) - [j12]Ranjeet Singh Tomar, Shekhar Verma:
Neural Network Based Lane Change Trajectory Prediction in Autonomous Vehicles. Trans. Comput. Sci. 13: 125-146 (2011) - [j11]Brijesh Kumar Chaurasia, Shekhar Verma:
Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks. Trans. Comput. Sci. 13: 147-156 (2011) - [c28]Khushboo Tripathi, Manjusha Pandey, Shekhar Verma:
Comparison of reactive and proactive routing protocols for different mobility conditions in WSN. ICCCS 2011: 156-161 - [c27]Rameshwar Nath Tripathi, Shekhar Verma, S. V. Rao:
Nature-Inspired Fault Tolerant Area Monitoring in Sensor Network. SocProS (1) 2011: 469-480 - [c26]Pradheepkumar Singaravelu, Shekhar Verma:
Feasibility of Rainbow Signature for Broadcast Authentication in Sensor Networks. VTC Spring 2011: 1-5 - 2010
- [j10]Brijesh Kumar Chaurasia, Shekhar Verma:
Maximising anonymity of a vehicle. Int. J. Auton. Adapt. Commun. Syst. 3(2): 198-216 (2010) - [j9]Manish Kumar, Pritish Kumar Varadwaj, Shekhar Verma:
Two-phase clustering based aggregation of sensor data. Int. J. Data Min. Model. Manag. 2(3): 216-237 (2010) - [j8]Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar:
Mechanism for Privacy Preservation in VANETS. Int. J. Grid High Perform. Comput. 2(2): 12-22 (2010) - [j7]S. B. Kotwal, Shekhar Verma, G. S. Tomar, Raj Abrol:
One Anchor Distance and Angle Based Multi - Hop Adaptive Iterative Localization Algorithm for Wireless Sensor Networks. Int. J. Grid High Perform. Comput. 2(3): 31-43 (2010) - [j6]Sumeet Gupta, Shekhar Verma, G. S. Tomar, Raj Abrol:
Intelligent Industrial Data Acquisition and Energy Monitoring using Wireless Sensor Networks. Int. J. Grid High Perform. Comput. 2(3): 44-59 (2010) - [j5]Sarabjeet Singh Bedi, Shekhar Verma, Geetam S. Tomar:
NPT Based Video Watermarking with Non-overlapping Block Matching. Trans. Comput. Sci. 11: 270-292 (2010) - [c25]Amit Kant Pandit, Shekhar Verma, Geetam S. Tomar:
Pruned-AZB for reduced complexity block matching in video compression. CISIM 2010: 553-556 - [c24]Nemi Chandra Rathore, Shekhar Verma, Ranjeet Singh Tomar, Geetam S. Tomar:
CMAC: A cluster based MAC protocol for VANETs. CISIM 2010: 563-568 - [c23]Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar:
Infrastructure Aided Privacy Preserving-Authentication in VANETs. FGIT 2010: 74-84 - [c22]Pradheepkumar Singaravelu, Shekhar Verma:
Viability of multivariate cryptosystems for WSN. ICITST 2010: 1-6 - [c21]Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar:
Infrastructure Aided Privacy Preserving-Authentication in VANETs. ISA 2010: 179-189 - [c20]Rahul Budhiraja, Shekhar Verma, Arunanshu Pandey:
Designing interactive presentation systems for classrooms. SIGDOC 2010: 259-260
2000 – 2009
- 2009
- [j4]Mritunjay Rai, Shekhar Verma, Shashikala Tapaswi:
A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks. J. Networks 4(6): 511-519 (2009) - [j3]Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham:
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. Trans. Comput. Sci. 4: 136-148 (2009) - [c19]Sumeet Gupta, Shekhar Verma, Geetam S. Tomar, Raj Abrol:
Wireless Sensor Network Based Industrial Monitoring & Diagnostic System. CICSyN 2009: 125-130 - [c18]S. B. Kotwal, Shekhar Verma, Geetam S. Tomar, Raj Abrol:
MAIL: Multi-Hop Adaptive Iterative Localization for Wireless Sensor Networks. CICSyN 2009: 149-154 - [c17]Brijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar, S. M. Bhaskar:
Pseudonym Based Mechanism for Sustaining Privacy in VANETs. CICSyN 2009: 420-425 - [c16]Mritunjay Rai, Shekhar Verma, Shashikala Tapaswi:
A Heuristic for Minimum Connected Dominating Set with Local Repair for Wireless Sensor Networks. ICN 2009: 106-111 - [c15]Brijesh Kumar Chaurasia, Shekhar Verma:
Haste induced behavior and VANET communication. ICVES 2009: 19-24 - [c14]Ajit Jaiswal, Shekhar Verma, Brijesh Kumar Chaurasia, G. S. Tomar:
Profile based Mobility Model for Vehicular ad- hoc Networks. NaBIC 2009: 493-498 - [c13]Geetam S. Tomar, Manish Dixit, Shekhar Verma:
AODV Routing Protocol with Selective Flooding. SoCPaR 2009: 682-686 - [c12]Sarabjeet Singh Bedi, Geetam Singh Tomar, Shekhar Verma:
Robust Watermarking of Image in the Transform Domain Using Edge Detection. UKSim 2009: 233-238 - [c11]Geetam Singh Tomar, Shekhar Verma:
Dynamic Multi-level Hierarchal Clustering Approach for Wireless Sensor Networks. UKSim 2009: 563-567 - 2008
- [c10]Brijesh Kumar Chaurasia, Shekhar Verma:
Optimizing Pseudonym Updation for Anonymity in VANETS. APSCC 2008: 1633-1637 - [c9]Sarabjeet Singh Bedi, Harpreet Singh Sobti, Rabia Bano, Shekhar Verma:
Digital Watermarking Technique for Ownership Claim using Buyer Signature. Security and Management 2008: 81-86 - [c8]Vinay Rishiwal, Mano Yadav, Shekhar Verma:
Power Aware Routing to Support Real Time Traffic in Mobile Adhoc Networks. ICETET 2008: 223-227 - [c7]Vinay Rishiwal, Shekhar Verma:
QoS-Based Pure Adaptive Routing in MANETs. ICETET 2008: 228-233 - [c6]Manish Kumar, Shekhar Verma, Pankaj Pratap Singh:
Clustering approach to data aggregation in wireless sensor networks. ICON 2008: 1-6 - [c5]Vinay Rishiwal, Ashwani Kush, Shekhar Verma:
Stable and Energy Efficient Routing for Mobile Adhoc Networks. ITNG 2008: 1028-1033 - [c4]Sarabjeet Singh Bedi, Rabia Bano, Shekhar Verma:
Image Index Based Digital Watermarking Techniqu for Ownership Claim and Buyer Fingerprinting. World Congress on Engineering (Selected Papers) 2008: 267-276 - [c3]Brijesh Kumar Chaurasia, Shekhar Verma:
Maximizing anonymity of a vehicle through pseudonym updation. WICON 2008: 83 - 2006
- [j2]Prabakaran Subramani, Rajendra Sahu, Shekhar Verma:
Feature selection using Haar wavelet power spectrum. BMC Bioinform. 7: 432 (2006) - [c2]M. Shukla, Mritunjay Rai, G. S. Tomar, Shekhar Verma:
MCDS Based Multicasting in Mobile Adhoc Networks. ICDCN 2006: 52-57 - [i1]Dhananjay D. Kulkarni, Shekhar Verma, Prashant:
Finding Cliques of a Graph using Prime Numbers. CoRR abs/cs/0601117 (2006) - 2005
- [c1]Piyali Mandal, Ashish Thakral, Shekhar Verma:
Watermark Based Digital Rights Management. ITCC (1) 2005: 74-78 - 2002
- [j1]Gaurav Jain, Deepali Singh, Shekhar Verma:
Service level agreements in IP networks. Inf. Manag. Comput. Secur. 10(4): 171-177 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint