default search action
Priyanka Verma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika:
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model. Clust. Comput. 27(10): 13749-13762 (2024) - [j25]Priyanka Verma, Nitesh Bharot, John G. Breslin, Mukta Sharma, Nisha Chaurasia, Ankit Vidyarthi:
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j24]Vishwas Dohale, Milind Akarte, Angappa Gunasekaran, Priyanka Verma:
Exploring the role of artificial intelligence in building production resilience: learnings from the COVID-19 pandemic. Int. J. Prod. Res. 62(15): 5472-5488 (2024) - [j23]Priyanka Verma, Satyendra Kumar:
Investigation of In0.7Ga0.3As/Ga0.5As0.5Sb-Based Heterojunction TFET with Ferroelectric Gate Dielectric for Performance and Reliability. J. Circuits Syst. Comput. 33(9) (2024) - [j22]Priyanka Verma, John G. Breslin, Donna O'Shea, Nakul Mehta, Nitesh Bharot, Ankit Vidyarthi:
Leveraging Gametic Heredity in Oversampling Techniques to Handle Class Imbalance for Efficient Cyberthreat Detection in IIoT. IEEE Trans. Consumer Electron. 70(1): 1940-1951 (2024) - [j21]Priyanka Verma, Nitesh Bharot, John G. Breslin, Donna O'Shea, Ankit Vidyarthi, Deepak Gupta:
Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT. IEEE Trans. Consumer Electron. 70(1): 3856-3866 (2024) - [j20]Nisha Chaurasia, Munna Ram, Priyanka Verma, Nakul Mehta, Nitesh Bharot:
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks. J. Supercomput. 80(13): 18325-18346 (2024) - [c17]Nitesh Bharot, John G. Breslin, Priyanka Verma:
Revolutionizing Human Activity Recognition in Healthcare: Harnessing Red Deer for Feature Selection and Focal Loss-Based MLP for Classification. SoftCOM 2024: 1-7 - 2023
- [j19]Jefkine Kafunah, Priyanka Verma, Muhammad Intizar Ali, John G. Breslin:
Out-of-Distribution Data Generation for Fault Detection and Diagnosis in Industrial Systems. IEEE Access 11: 135061-135073 (2023) - [j18]Vishwas Dohale, Priyanka Verma, Angappa Gunasekaran, Milind Akarte:
Manufacturing strategy 4.0: a framework to usher towards industry 4.0 implementation for digital transformation. Ind. Manag. Data Syst. 123(1): 10-40 (2023) - [c16]Priyanka Verma, John G. Breslin, Donna O'Shea:
PerCFed: An Effective Personalized Clustered Federated Learning Mechanism to Handle non-IID Challenges for Industry 4.0. CloudNet 2023: 299-306 - [c15]Mikael Brunila, Jack LaViolette, Sky CH-Wang, Priyanka Verma, Clara Féré, Grant McKenzie:
Toward a Critical Toponymy Framework for Named Entity Recognition: A Case Study of Airbnb in New York City. EMNLP 2023: 4676-4695 - [c14]Mikael Brunila, Priyanka Verma, Grant McKenzie:
When Everything Is "Nearby": How Airbnb Listings in New York City Exaggerate Proximity (Short Paper). GIScience 2023: 16:1-16:8 - [c13]Nitesh Bharot, Mirco Soderi, Priyanka Verma, John G. Breslin:
Improving Product Quality Control in Smart Manufacturing through Transfer Learning-Based Fault Detection. SMARTCOMP 2023: 213-215 - [c12]Priyanka Verma, Miguel Ponce de Leon, John G. Breslin, Donna O'Shea:
FedTIU: Securing Virtualized PLCs Against DDoS Attacks Using a Federated Learning Enabled Threat Intelligence Unit. SMARTCOMP 2023: 233-236 - [i2]Mikael Brunila, Jack LaViolette, Sky CH-Wang, Priyanka Verma, Clara Féré, Grant McKenzie:
Toward a Critical Toponymy Framework for Named Entity Recognition: A Case Study of Airbnb in New York City. CoRR abs/2310.15302 (2023) - 2022
- [j17]Debabrata Das, Priyanka Verma, Ajinkya N. Tanksale:
Designing a closed-loop supply chain for reusable packaging materials: A risk-averse two-stage stochastic programming model using CVaR. Comput. Ind. Eng. 167: 108004 (2022) - [j16]Rajeev Kumar Gupta, Pranav Gautam, Rajesh Kumar Pateriya, Priyanka Verma, Yatendra Sahu:
COVID-19 Lesion Segmentation and Classification of Lung CTs Using GMM-Based Hidden Markov Random Field and ResNet 18. Int. J. Fuzzy Syst. Appl. 11(2): 1-21 (2022) - [j15]Vishwas Dohale, Angappa Gunasekaran, Milind Akarte, Priyanka Verma:
52 Years of manufacturing strategy: an evolutionary review of literature (1969-2021). Int. J. Prod. Res. 60(2): 569-594 (2022) - [j14]Ashutosh Mishra, Priyanka Verma, Manoj Kumar Tiwari:
A circularity-based quality assessment tool to classify the core for recovery businesses. Int. J. Prod. Res. 60(19): 5835-5853 (2022) - [j13]Priyanka Verma, John G. Breslin, Donna O'Shea:
FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries. Sensors 22(22): 8974 (2022) - 2021
- [j12]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment. Clust. Comput. 24(3): 1917-1933 (2021) - [j11]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach. Int. J. Swarm Intell. Res. 12(1): 29-49 (2021) - [j10]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack. Wirel. Networks 27(4): 2529-2548 (2021) - [c11]Priyanka Verma, Ananya Saxena, Alok Sharma, Bill Thies, Devansh Mehta:
Demo: A WhatsApp Bot for Citizen Journalism in Rural India. COMPASS 2021: 423-427 - [c10]Priyanka Verma, Sameer Patil:
Exploring Privacy Aspects of Smartphone Notifications. MobileHCI 2021: 48:1-48:13 - 2020
- [j9]Vijaya Dixit, Priyanka Verma, Piyush Raj:
Leveraging tacit knowledge for shipyard facility layout selection using fuzzy set theory. Expert Syst. Appl. 158: 113423 (2020) - [j8]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud. Wirel. Pers. Commun. 115(2): 1335-1361 (2020) - [c9]Deveshi Thanawala, Aditya Sarin, Priyanka Verma:
An Approach to Waste Segregation and Management Using Convolutional Neural Networks. ICACDS 2020: 139-150
2010 – 2019
- 2019
- [j7]Sourabh Kulkarni, Priyanka Verma, R. Mukundan:
Performance landscape modeling in digital manufacturing firm. Bus. Process. Manag. J. 25(3): 533-552 (2019) - [j6]Anjali Shishodia, Priyanka Verma, Vijaya Dixit:
Supplier evaluation for resilient project driven supply chain. Comput. Ind. Eng. 129: 465-478 (2019) - [j5]Sourabh Kulkarni, Priyanka Verma, R. Mukundan:
Assessing manufacturing strategy definitions utilising text-mining. Int. J. Prod. Res. 57(14): 4519-4546 (2019) - [c8]Rakhshan Anjum, Priyanka Verma, Sunanda Verma:
Multiple Image Watermarking for Efficient Storage and Transmission of Medical Images. ICACDS (2) 2019: 92-102 - [c7]Vishwas Dohale, Milind Akarte, Priyanka Verma:
Determining the Process Choice Criteria for Selecting a Production System in a Manufacturing Firm Using a Delphi Technique. IEEM 2019: 1265-1269 - 2018
- [j4]Vijaya Dixit, Priyanka Verma, Piyush Raj, Mayank Sharma:
Resource and time criticality based block spatial scheduling in a shipyard under uncertainty. Int. J. Prod. Res. 56(22): 6993-7007 (2018) - [j3]Tejas I. Dhamecha, Mahek Shah, Priyanka Verma, Mayank Vatsa, Richa Singh:
CrowdFaceDB: Database and benchmarking for face verification in crowd. Pattern Recognit. Lett. 107: 17-24 (2018) - 2017
- [j2]Priyanka Verma, Nishtha Kesswani:
User identification prerequisite for memorisation a type of personalisation. Int. J. Serv. Technol. Manag. 23(4): 290-298 (2017) - [c6]Sakshi Saxena, Priyanka Verma, Dharmveer Singh Rajpoot:
Clustering based minimum spanning tree algorithm. IC3 2017: 1-3 - [c5]Shailesh S. Deshpande, Arcot Sowmya, Piyush Yadav, Shamsuddin Ladha, Priyanka Verma, Karthikeyan Vaiapury, Jay Gubbi, P. Balamuralidhar:
CogVis: attention-driven cognitive architecture for visual change detection. SAC 2017: 151-154 - 2016
- [c4]Amit A. Deshmukh, Payal Mohadikar, Kshitij Lele, Priyanka Verma, Divya Singh, Kamla Prasan Ray:
Ultra-wideband star shaped planar monopole antenna. ANTS 2016: 1-6 - [c3]Amit A. Deshmukh, Priyanka Verma, Divya Singh, Payal Mohadikar, Kamla Prasan Ray:
Key-shaped slot loaded circular microstrip antenna for multi-band and broadband response. ANTS 2016: 1-6 - 2015
- [c2]Tejas I. Dhamecha, Priyanka Verma, Mahek Shah, Richa Singh, Mayank Vatsa:
Annotated crowd video face database. ICB 2015: 106-112 - 2014
- [i1]Priyanka Verma, Nishtha Kesswani:
Web Usage mining framework for Data Cleaning and IP address Identification. CoRR abs/1408.5460 (2014) - 2011
- [j1]Chandra K. Jaggi, Aditi Khanna, Priyanka Verma:
Two-warehouse partial backlogging inventory model for deteriorating items with linear trend in demand under inflationary conditions. Int. J. Syst. Sci. 42(7): 1185-1196 (2011) - 2010
- [c1]Priyanka Verma, R. R. K. Sharma:
Strong and Weak Formulations of Single Stage Uncapacitated Warehouse Location Problem. BAIP 2010: 656-659
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint