default search action
Siddhartha Chauhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Aschalew Tirulo, Siddhartha Chauhan, Biju Issac:
Ensemble LOF-based detection of false data injection in smart grid demand response system. Comput. Electr. Eng. 116: 109188 (2024) - [j27]Pranjal Kumar, Siddhartha Chauhan:
Towards improvement of baseline performance for regression based human pose estimation. Evol. Syst. 15(2): 659-667 (2024) - [j26]Aschalew Tirulo, Siddhartha Chauhan, Kamlesh Dutta:
Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review. Int. J. Inf. Comput. Secur. 24(3/4): 284-321 (2024) - 2023
- [j25]Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi:
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions. Eng. Appl. Artif. Intell. 120: 105894 (2023) - [j24]Piyush Rawat, Siddhartha Chauhan:
A survey on clustering protocols in wireless sensor network: taxonomy, comparison, and future scope. J. Ambient Intell. Humaniz. Comput. 14(3): 1543-1589 (2023) - [j23]Piyush Rawat, Pranjal Kumar, Siddhartha Chauhan:
Fuzzy logic and particle swarm optimization-based clustering protocol in wireless sensor network. Soft Comput. 27(9): 5177-5193 (2023) - 2022
- [j22]Pranjal Kumar, Piyush Rawat, Siddhartha Chauhan:
Contrastive self-supervised learning: review, progress, challenges and future research directions. Int. J. Multim. Inf. Retr. 11(4): 461-488 (2022) - [j21]Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi:
Human pose estimation using deep learning: review, methodologies, progress and future research directions. Int. J. Multim. Inf. Retr. 11(4): 489-521 (2022) - [j20]Piyush Rawat, Siddhartha Chauhan:
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network. Peer-to-Peer Netw. Appl. 15(3): 1417-1436 (2022) - [j19]Pranjal Kumar, Siddhartha Chauhan:
Study on temperature (τ ) variation for SimCLR-based activity recognition. Signal Image Video Process. 16(6): 1667-1672 (2022) - 2021
- [j18]Piyush Rawat, Siddhartha Chauhan:
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. Comput. Sci. Rev. 40: 100396 (2021) - [j17]Piyush Rawat, Siddhartha Chauhan:
Probability based cluster routing protocol for wireless sensor network. J. Ambient Intell. Humaniz. Comput. 12(2): 2065-2077 (2021) - [j16]Piyush Rawat, Siddhartha Chauhan:
Particle swarm optimization-based energy efficient clustering protocol in wireless sensor network. Neural Comput. Appl. 33(21): 14147-14165 (2021) - [j15]Piyush Rawat, Siddhartha Chauhan, Rahul Priyadarshi:
A Novel Heterogeneous Clustering Protocol for Lifetime Maximization of Wireless Sensor Network. Wirel. Pers. Commun. 117(2): 825-841 (2021) - [j14]Arvind Dhaka, Vidhyacharan Bhaskar, Siddhartha Chauhan, Amita Nandal:
Analysing Outage Probability and Diversity for Matrix Based Shadowed Attenuation in Multipath Fading Environment. Wirel. Pers. Commun. 117(3): 1797-1814 (2021) - 2020
- [j13]Anamika Sharma, Siddhartha Chauhan:
Analytic evaluation of non-uniformities for coverage probability computation of randomly deployed wireless sensor network. Int. J. Sens. Networks 34(1): 1-14 (2020) - [j12]Piyush Rawat, Siddhartha Chauhan, Rahul Priyadarshi:
Energy-Efficient Clusterhead Selection Scheme in Heterogeneous Wireless Sensor Network. J. Circuits Syst. Comput. 29(13): 2050204:1-2050204:22 (2020) - [j11]Shashi Gurung, Siddhartha Chauhan:
A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wirel. Networks 26(3): 1981-2011 (2020) - [j10]Anamika Sharma, Siddhartha Chauhan:
A distributed reinforcement learning based sensor node scheduling algorithm for coverage and connectivity maintenance in wireless sensor network. Wirel. Networks 26(6): 4411-4429 (2020)
2010 – 2019
- 2019
- [j9]Shashi Gurung, Siddhartha Chauhan:
Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Networks 25(3): 975-988 (2019) - [j8]Shashi Gurung, Siddhartha Chauhan:
A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET. Wirel. Networks 25(4): 1685-1695 (2019) - 2018
- [j7]Shashi Gurung, Siddhartha Chauhan:
A novel approach for mitigating gray hole attack in MANET. Wirel. Networks 24(2): 565-579 (2018) - [j6]Shashi Gurung, Siddhartha Chauhan:
A novel approach for mitigating route request flooding attack in MANET. Wirel. Networks 24(8): 2899-2914 (2018) - [j5]Shashi Gurung, Siddhartha Chauhan:
A dynamic threshold based approach for mitigating black-hole attack in MANET. Wirel. Networks 24(8): 2957-2971 (2018) - [j4]Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar, Amita Nandal:
Statistical Approach for Performance Analysis of Multipath Scattering Environment. Wirel. Pers. Commun. 98(1): 743-757 (2018) - [j3]Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar:
Analysis and Simulation of Second-Order Statistics with Modified Characteristic Function Parameters in a Multipath Fading Environment. Wirel. Pers. Commun. 100(3): 851-862 (2018) - [j2]Arvind Dhaka, Siddhartha Chauhan, Vidhyacharan Bhaskar:
Effect of Matrix Partitioning on Second Order Statistics of Fading Channels. Wirel. Pers. Commun. 100(3): 863-875 (2018) - [c2]Anamika Sharma, Siddhartha Chauhan:
Optimal Threshold Coverage Area (OTCA) Algorithm for Random Deployment of Sensor Nodes in Large Asymmetrical Terrain. ICACDS (2) 2018: 34-42 - [c1]Deepshikha, Siddhartha Chauhan:
Load Adaptive and Priority Based MAC Protocol for Body Sensors and Consumer Electronic (CE) Devices. ICACDS (2) 2018: 88-97 - 2014
- [j1]Siddhartha Chauhan, Lalit Kumar Awasthi:
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 12(3): 275-298 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint