default search action
R. Leela Velusamy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth:
Categorical learning for automated network traffic categorization for future generation networks in SDN. Computing 106(5): 1451-1473 (2024) - 2023
- [j19]A. Kavitha, Koppala Guravaiah, R. Leela Velusamy, S. Suseela, Dhilip Kumar V.:
DR-NAP: Data reduction strategy using neural adaptation phenomenon in wireless sensor networks. Int. J. Commun. Syst. 36(8) (2023) - [j18]S. Priya, S. Selvakumar, R. Leela Velusamy:
Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks. J. Ambient Intell. Humaniz. Comput. 14(3): 1951-1975 (2023) - [j17]Suguna Paramasivam, R. Leela Velusamy:
Quality of service aware routing in software defined video streaming: a survey. Peer Peer Netw. Appl. 16(4): 1739-1760 (2023) - [j16]Suguna Paramasivam, R. Leela Velusamy:
Cor-ENTC:correlation with ensembled approach for network traffic classification using SDN technology for future networks. J. Supercomput. 79(8): 8513-8537 (2023) - [c11]Jayalekshmi Sumathi, R. Leela Velusamy:
Energy aware Load Balanced Clustering using Golden Eagle Optimization in MS based LR-WPAN. ANT/EDI40 2023: 812-819 - 2022
- [j15]S. Priya, S. Selvakumar, R. Leela Velusamy:
PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites. Wirel. Pers. Commun. 125(1): 755-784 (2022) - [c10]Pavithra Sridhar, V. Aananth, Madhav Aggarwal, R. Leela Velusamy:
Transformer Based Motion In-Betweening. ACCV (Workshops) 2022: 295-307 - [c9]Pavithra Sridhar, V. Aananth, Madhav Aggarwal, R. Leela Velusamy:
Transformer Based Motion In-Betweening. AI*IA 2022: 299-312 - 2021
- [j14]Jayalekshmi Sumathi, R. Leela Velusamy:
A review on distributed cluster based routing approaches in mobile wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 12(1): 835-849 (2021) - [j13]E. Elakkiya, S. Selvakumar, R. Leela Velusamy:
TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism. J. Ambient Intell. Humaniz. Comput. 12(10): 9287-9302 (2021) - [j12]Jayalekshmi Sumathi, R. Leela Velusamy:
GSA-RPI: GSA based Rendezvous Point Identification in a two-level cluster based LR-WPAN for uncovering the optimal trajectory of Mobile Data Collection Agent. J. Netw. Comput. Appl. 183-184: 103048 (2021) - 2020
- [j11]A. Kavitha, R. Leela Velusamy:
Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 35(2): 96-116 (2020) - [j10]A. Kavitha, Koppala Guravaiah, R. Leela Velusamy:
A Cluster-Based Routing Strategy Using Gravitational Search Algorithm for WSN. J. Comput. Sci. Eng. 14(1): 26-39 (2020) - [j9]N. G. Bhuvaneswari Amma, S. Selvakumar, R. Leela Velusamy:
A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks. IEEE Trans. Netw. Serv. Manag. 17(4): 2511-2522 (2020) - [j8]A. Kavitha, Koppala Guravaiah, R. Leela Velusamy:
CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks. Wirel. Pers. Commun. 115(2): 1363-1384 (2020) - [j7]A. Kavitha, Koppala Guravaiah, R. Leela Velusamy:
Correction to: CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks. Wirel. Pers. Commun. 115(2): 1385 (2020) - [c8]N. G. Bhuvaneswari Amma, S. Selvakumar, R. Leela Velusamy:
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection. FICTA (2) 2020: 41-50 - [c7]Elakkiya E, S. Selvakumar, R. Leela Velusamy:
CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection. ICCCNT 2020: 1-7 - [c6]S. Priya, S. Selvakumar, R. Leela Velusamy:
Detection of Phishing Attacks using Radial Basis Function Network Trained for Categorical Attributes. ICCCNT 2020: 1-6
2010 – 2019
- 2019
- [j6]Koppala Guravaiah, R. Leela Velusamy:
Prototype of Home Monitoring Device Using Internet of Things and River Formation Dynamics-Based Multi-Hop Routing Protocol (RFDHM). IEEE Trans. Consumer Electron. 65(3): 329-338 (2019) - [c5]Sanjay Kumar Yadav, Suguna Paramasivam, R. Leela Velusamy:
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN). ICCCNT 2019: 1-7 - 2018
- [j5]Koppala Guravaiah, R. Leela Velusamy:
BEACH: Balanced Energy and Adaptive Cluster Head Selection Algorithm for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 42(3-4): 199-225 (2018) - [c4]Mohit Agrawal, R. Leela Velusamy:
PRISMO: Priority Based Spam Detection Using Multi Optimization. BDA 2018: 392-401 - 2017
- [j4]U. Venkanna, R. Leela Velusamy:
Cooperative routing in mobile ad hoc networks using fuzzy logic. Int. J. Ad Hoc Ubiquitous Comput. 25(3): 147-162 (2017) - [j3]Koppala Guravaiah, R. Leela Velusamy:
Energy Efficient Clustering Algorithm Using RFD Based Multi-hop Communication in Wireless Sensor Networks. Wirel. Pers. Commun. 95(4): 3557-3584 (2017) - [c3]Koppala Guravaiah, Thivyavignesh Ramasamy Gurumurthy, R. Leela Velusamy:
Vehicle monitoring using internet of things. IML 2017: 24:1-24:7 - 2016
- [j2]U. Venkanna, R. Leela Velusamy:
TEA-CBRP: Distributed cluster head election in MANET by using AHP. Peer-to-Peer Netw. Appl. 9(1): 159-170 (2016) - [i4]Koppala Guravaiah, R. Leela Velusamy:
Performance Analysis of RFDMRP: River Formation Dynamics based Multi-Hop Routing Protocol in WSNs. CoRR abs/1602.04980 (2016) - 2015
- [j1]U. Venkanna, Jeh Krishna Agarwal, R. Leela Velusamy:
A Cooperative Routing for MANET Based on Distributed Trust and Energy Management. Wirel. Pers. Commun. 81(3): 961-979 (2015) - [c2]Mohit Agrawal, R. Leela Velusamy:
Unsupervised Spam Detection in Hyves Using SALSA. FICTA 2015: 517-526 - [c1]Sachin Kumar, R. Leela Velusamy:
Latent Fingerprint preprocessing: Orientation field correction using region wise dictionary. ICACCI 2015: 1238-1243 - 2012
- [i3]Ipsita Mohanty, R. Leela Velusamy:
Information Retrieval From Internet Applications For Digital Forensic. CoRR abs/1209.3590 (2012)
2000 – 2009
- 2008
- [i2]Muthiah Annamalai, R. Leela Velusamy:
A Call-Graph Profiler for GNU Octave. CoRR abs/0810.3468 (2008) - 2006
- [i1]Muthiah Annamalai, Hemant Kumar, R. Leela Velusamy:
Octave-GTK: A GTK binding for GNU Octave. CoRR abs/cs/0604073 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint