default search action
Ashutosh Bhatia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari:
Enhancing security through continuous biometric authentication using wearable sensors. Internet Things 28: 101374 (2024) - [c54]Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari:
SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning. AINA (3) 2024: 59-72 - [c53]Ankit Agrawal, Bhaskar Mangal, Ashutosh Bhatia, Kamlesh Tiwari:
Enabling AI in Agriculture 4.0: A Blockchain-Based Mobile CrowdSensing Architecture. AINA (2) 2024: 173-186 - [c52]Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS Systems. AINA (4) 2024: 174-186 - [c51]Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari:
QC-Stack: A Layered Reference Model for Quantum Computers. COMSNETS 2024: 962-967 - [i10]Kaustubh Dwivedi, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions. CoRR abs/2404.18090 (2024) - 2023
- [j10]Ankit Agrawal, Sarthak Choudhary, Ashutosh Bhatia, Kamlesh Tiwari:
Pub-SubMCS: A privacy-preserving publish-subscribe and blockchain-based mobile crowdsensing framework. Future Gener. Comput. Syst. 146: 234-249 (2023) - [c50]Yadagiri Shiva Sai Sashank, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
D-insta: A Decentralized Image Sharing Platform. AINA (3) 2023: 206-217 - [c49]Gerard Christopher Aloysius, Ashutosh Bhatia, Kamlesh Tiwari:
Stability and Availability Optimization of Distributed ERP Systems During Cloud Migration. AINA (2) 2023: 343-354 - [c48]Usneek Singh, Nisarg Vora, Punit Lohia, Yashvardhan Sharma, Ashutosh Bhatia, Kamlesh Tiwari:
Multilingual Chatbot for Indian Languages. ICCCNT 2023: 1-5 - [c47]K. Haribabu, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System. ICOIN 2023: 140-145 - [c46]Ritik Bavdekar, Eashan Jayant Chopde, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations. ICOIN 2023: 146-151 - [c45]Pratham Gupta, Kunjan Shah, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
DCGit: Decentralized Internet Hosting for Software Development. ICOIN 2023: 660-665 - [c44]Geetika Arora, Arsh Kumbhat, Ashutosh Bhatia, Kamlesh Tiwari:
CP-Net: Multi-Scale Core Point Localization in Fingerprints Using Hourglass Network. IWBF 2023: 1-6 - 2022
- [j9]Ankit Agrawal, Ashutosh Bhatia, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu, Deepak Vishwakarma, Rekha Kaushik:
A survey on analyzing encrypted network traffic of mobile devices. Int. J. Inf. Sec. 21(4): 873-915 (2022) - [j8]Ashutosh Bhatia, Deepak Kumar Vishvakarma, Rekha Kaushik, Ankit Agrawal:
Entropy and likelihood-based detection of DGA generated domain names and their families. Int. J. Secur. Networks 17(3): 147-192 (2022) - [j7]Sandhya Rathee, Shubham Tiwari, K. Haribabu, Ashutosh Bhatia:
qMon: A method to monitor queueing delay in OpenFlow networks. J. Commun. Networks 24(4): 463-474 (2022) - [c43]Aman Sharma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Bitcoin's Blockchain Data Analytics: A Graph Theoretic Perspective. AINA (1) 2022: 459-470 - [c42]Amit Pandia, Geetika Arora, Archit Jain, Rohit Bharadwaj, Ashutosh Bhatia, Kamlesh Tiwari:
DTeeth: Teeth-photo Based Human Authentication for Mobile Devices. IJCB 2022: 1-8 - [c41]Jai Singhal, Ankit Singh Gautam, Ashutosh Bhatia, Ankit Agrawal, Rekha Kaushik:
DD-Locker: Blockchain-based Decentralized Personal Document Locker. ICOIN 2022: 68-73 - [c40]Rudraraju Sacin Varma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Multi-vendor IoT-based Resource Sharing using OAuth and Blockchain. ICOIN 2022: 74-77 - [c39]Rohit Bharadwaj, Ashutosh Bhatia, Laxmi Divya Chhibbar, Kamlesh Tiwari, Ankit Agrawal:
Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation. ICOIN 2022: 486-491 - [i9]Ritik Bavdekar, Eashan Jayant Chopde, Ashutosh Bhatia, Kamlesh Tiwari, Sandeep Joshua Daniel, Atul:
Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research. CoRR abs/2202.02826 (2022) - 2021
- [j6]Geetika Arora, Sumit Kalra, Ashutosh Bhatia, Kamlesh Tiwari:
PalmHashNet: Palmprint Hashing Network for Indexing Large Databases to Boost Identification. IEEE Access 9: 145912-145928 (2021) - [j5]Sandhya Rathee, Nitin Varyani, K. Haribabu, Aakash Bajaj, Ashutosh Bhatia, Ram Jashnani, Zhi-Li Zhang:
GlobeSnap: An Efficient Globally Consistent Statistics Collection for Software-Defined Networks. J. Netw. Syst. Manag. 29(3): 35 (2021) - [c38]Raj Sanjay Shah, Ashutosh Bhatia, Atith Gandhi, Shray Mathur:
Bitcoin Data Analytics: Scalable techniques for transaction clustering and embedding generation. COMSNETS 2021: 1-6 - [c37]Ayush Bahuguna, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari, Deepak Vishwakarma:
User Profiling Using Smartphone Network Traffic Analysis. COMSNETS 2021: 69-73 - [c36]Sandhya Rathee, Divesh Uttamchandani, K. Haribabu, Ashutosh Bhatia:
An Efficient Method to Collect Statistics in SDN Using Curvature Based Sampling. ICOIN 2021: 175-180 - [c35]Indraneel Ghosh, Subham Kumar, Ashutosh Bhatia, Deepak Kumar Vishwakarma:
Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names. ICOIN 2021: 391-396 - [c34]Adityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, Deepak Kumar Vishwakarma:
Improving the performance of Machine Learning Algorithms for TOR detection. ICOIN 2021: 439-444 - [c33]Aaron Fernandes, Karan Garg, Ankit Agrawal, Ashutosh Bhatia:
Decentralized Online Voting using Blockchain and Secret Contracts. ICOIN 2021: 582-587 - [i8]Bilwasiva Basu Mallick, Ashutosh Bhatia:
Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks. CoRR abs/2107.01810 (2021) - 2020
- [c32]Yashita Goswami, Ankit Agrawal, Ashutosh Bhatia:
E-Governance: A Tendering Framework Using Blockchain With Active Participation of Citizens. IEEE ANTS 2020: 1-4 - [c31]Raj Sanjay Shah, Ashutosh Bhatia:
Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics Framework. AINA Workshops 2020: 178-189 - [c30]Sandhya Rathee, K. Haribabu, Parth Patel, Ashutosh Bhatia, Ujjwal Gandhi:
Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDN. AINA Workshops 2020: 190-200 - [c29]Palak Vij, Sayali Nikam, Ashutosh Bhatia:
Detection of Algorithmically Generated Domain Names using LSTM. COMSNETS 2020: 1-6 - [c28]Mihika Naik, Ashutosh Bhatia, Kamlesh Tiwari:
I Know Who You are: A Learning Framework to Profile Smartphone Users. COMSNETS 2020: 555-558 - [c27]Gaurang Bansal, Ashutosh Bhatia:
A Fast, Secure and Distributed Consensus Mechanism for Energy Trading Among Vehicles using Hashgraph. ICOIN 2020: 772-777 - [i7]Ashutosh Bhatia, R. C. Hansdah:
A Classification Framework for TDMA Scheduling techniques in WSNs. CoRR abs/2002.00458 (2020) - [i6]Aman Sharma, Ashutosh Bhatia:
Bitcoin's Blockchain Data Analytics: A Graph Theoretic Perspective. CoRR abs/2002.06403 (2020) - [i5]Ayush Bahuguna, Ashutosh Bhatia, Kamlesh Tiwari, Deepak Vishwakarma:
User profiling using smartphone network traffic analysis. CoRR abs/2003.00542 (2020) - [i4]Sreelakshmi K. K., Ashutosh Bhatia, Ankit Agrawal:
Securing IoT Applications using Blockchain: A Survey. CoRR abs/2006.03317 (2020) - [i3]Ashutosh Bhatia, Ankit Agrawal, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu, Deepak Vishwakarma:
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices. CoRR abs/2006.12352 (2020)
2010 – 2019
- 2019
- [c26]Denson George, Anand Wani, Ashutosh Bhatia:
A Blockchain based Solution to Know Your Customer (KYC) Dilemma. ANTS 2019: 1-6 - [c25]Subham Kumar, Ashutosh Bhatia:
Detecting Domain Generation Algorithms to prevent DDoS attacks using Deep Learning. ANTS 2019: 1-4 - [c24]Sandhya Rathee, T. Dinesh Ram Kumar, K. Haribabu, Ashutosh Bhatia:
A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN Networks. AINA 2019: 325-340 - [c23]T. Dinesh Ram Kumar, Ashutosh Bhatia, R. C. Hansdah:
Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party. AINA 2019: 1254-1265 - [c22]Deepak Kumar Vishvakarma, Ashutosh Bhatia, Zdenek Ríha:
Detection of Algorithmically Generated Domain Names in Botnets. AINA 2019: 1279-1290 - [c21]Sandhya Rathee, Rahul Sharma, Piyush Kumar Jain, K. Haribabu, Ashutosh Bhatia, Sundar Balasubramaniam:
OpenSnap: Collection of Globally Consistent Statistics in Software Defined Networks. COMSNETS 2019: 149-156 - [c20]Pravin Murkya, Jasmeet Singh, Ashutosh Bhatia:
A Topology Independent TDMA-based MAC protocol for Vehicular Networks. COMSNETS 2019: 407-409 - [c19]Ashutosh Bhatia, Rahul Nehete, Praveen Kaushik, Pravin Murkya, K. Haribabu:
A Lightweight ARQ Scheme to Minimize Communication Overhead. COMSNETS 2019: 507-509 - [c18]Varun Amrutiya, Siddhant Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia:
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains. ICOIN 2019: 66-71 - [i2]Lavish Saluja, Ashutosh Bhatia:
Zero Knowledge Proof based authentication protocol using graph isomorphism. CoRR abs/1911.09329 (2019) - [i1]Ashutosh Bhatia, R. C. Hansdah:
A Two-Phase Scheme for Distributed TDMA Scheduling in WSNs with Flexibility to Trade-off between Schedule Length and Scheduling Time. CoRR abs/1912.12039 (2019) - 2018
- [j4]Ashutosh Bhatia, Ranjeet Kumar Patro:
A Delay and Energy Efficient Poll-Based MAC Protocol for Wireless Body Area Networks. Wirel. Pers. Commun. 99(2): 915-939 (2018) - [c17]Sandhya, Mallikarjun Swamy, K. Haribabu, Ashutosh Bhatia:
Achieving waypoint enforcement in multi-VLAN hybrid SDN. COMSNETS 2018: 519-521 - [c16]Shivin Srivastava, Ashutosh Bhatia:
On the Learning Capabilities of Recurrent Neural Networks: A Cryptographic Perspective. ICBK 2018: 162-167 - [c15]Ashutosh Bhatia, K. Haribabu, Kartikeya Gupta, Aakash Sahu:
Realization of flexible and scalable VANETs through SDN and virtualization. ICOIN 2018: 280-282 - [c14]Ganesh Bellikar, Ashutosh Bhatia, R. C. Hansdah, Sudhanshu Singh:
3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs. ICOIN 2018: 420-425 - [c13]Vishal Maheshwari, Ashutosh Bhatia, Kuldeep Kumar:
Faster detection and prediction of DDoS attacks using MapReduce and time series analysis. ICOIN 2018: 556-561 - 2017
- [c12]Ashutosh Bhatia, Sudhanshu Singh:
Bandwidth Efficient Clock Skew Compensation in TDMA-Based Star Topology Wireless Networks. AINA 2017: 522-529 - 2016
- [j3]Ashutosh Bhatia, R. C. Hansdah:
TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. Comput. Networks 104: 79-93 (2016) - [c11]Ashutosh Bhatia, Ranjeet Kumar Patro:
PMAC: A poll-based MAC protocol for wireless body area networks (WBANs). ANTS 2016: 1-6 - 2015
- [j2]Ashutosh Bhatia, Ramesh C. Hansdah:
A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs. Mob. Inf. Syst. 2015: 234143:1-234143:16 (2015) - [c10]Ashutosh Bhatia, R. C. Hansdah:
DSLR: A Distributed Schedule Length Reduction Algorithm for WSNs. IPDPS 2015: 365-374 - 2014
- [j1]Ashutosh Bhatia, R. C. Hansdah:
A media access and feedback protocol for reliable multicast over wireless channel. Wirel. Networks 20(8): 2371-2383 (2014) - [c9]Siddharth Watwe, Ashutosh Bhatia, R. C. Hansdah:
A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC Protocol. AINA Workshops 2014: 366-371 - [c8]Ashutosh Bhatia, R. C. Hansdah:
RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs. AINA Workshops 2014: 378-384 - [c7]Ashutosh Bhatia, R. C. Hansdah:
A TDMA-Based Energy Aware MAC (TEA-MAC) Protocol for Reliable Multicast in WSNs. AINA 2014: 798-805 - [c6]Ashutosh Bhatia, R. C. Hansdah:
A Fast and Fault-Tolerant Distributed Algorithm for Near-Optimal TDMA Scheduling in WSNs. DCOSS 2014: 294-301 - 2013
- [c5]Ashutosh Bhatia, R. C. Hansdah:
A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs. AINA Workshops 2013: 377-384 - [c4]Ashutosh Bhatia, R. C. Hansdah:
A Media Access and Feedback Protocol for Reliable Multicast over Wireless Channel. ICDCN 2013: 445-449
2000 – 2009
- 2008
- [c3]Shubhranshu Singh, Ashutosh Bhatia:
A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET. APSCC 2008: 237-242 - [c2]Ashutosh Bhatia, Shubhranshu Singh:
A Distributed Prefix Allocation Scheme for Subordinate MANET. APSCC 2008: 920-925 - [c1]Ashutosh Bhatia, Praveen Kaushik:
A cluster based minimum battery cost AODV routing using multipath route for zigbee. ICON 2008: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint