default search action
Balamurugan Balusamy
Person information
- affiliation: Galgotias University, School of Computer Science and Engineering, Greater Noida, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]R. Vijay Anand, T. Shanmuga Priyan, Madala Guru Brahmam, Balamurugan Balusamy, Francesco Benedetto:
IMNMAGN: Integrative Multimodal Approach for Enhanced Detection of Neurodegenerative Diseases Using Fusion of Multidomain Analysis With Graph Networks. IEEE Access 12: 73095-73112 (2024) - [j44]R. Vijay Anand, Magesh G, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Francesco Benedetto:
Quantum Channel Optimization: Integrating Quantum-Inspired Machine Learning With Genetic Adaptive Strategies. IEEE Access 12: 80397-80417 (2024) - [j43]M. K. Nallakaruppan, Balamurugan Balusamy, M. Lawanya Shri, V. Malathi, Siddhartha Bhattacharyya:
An Explainable AI framework for credit evaluation and analysis. Appl. Soft Comput. 153: 111307 (2024) - [j42]Vaishali Ravindranath, M. K. Nallakaruppan, M. Lawanya Shri, Balamurugan Balusamy, Siddhartha Bhattacharyya:
Evaluation of performance enhancement in Ethereum fraud detection using oversampling techniques. Appl. Soft Comput. 161: 111698 (2024) - [j41]Balamurugan Balusamy, Rajesh Kumar Dhanaraj, Tamizharasi Seetharaman, Vandana Sharma, Achyut Shankar, Wattana Viriyasitavat:
Design control and management of intelligent and autonomous nanorobots with artificial intelligence for Prevention and monitoring of blood related diseases. Eng. Appl. Artif. Intell. 131: 107798 (2024) - [j40]Prabu Kaliyaperumal, Sudhakar Periyasamy, Manikandan Thirumalaisamy, Balamurugan Balusamy, Francesco Benedetto:
A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT. Future Internet 16(7): 253 (2024) - [j39]Puneet Kumar, Bhoopesh Singh Bhati, Rajesh Kumar Dhanaraj, Celestine Iwendi, Balamurugan Balusamy, Nitesh Singh Bhati, Prerana Rai:
Feature subset selection using heuristic and metaheuristic approaches for diabetes prediction on a binary encoded dataset. Int. J. Model. Simul. Sci. Comput. 15(3): 2450031:1-2450031:24 (2024) - [j38]Sankar Sennan, Somula Ramasubbareddy, Rajesh Kumar Dhanaraj, Anand Nayyar, Balamurugan Balusamy:
Energy-efficient cluster head selection in wireless sensor networks-based internet of things (IoT) using fuzzy-based Harris hawks optimization. Telecommun. Syst. 87(1): 119-135 (2024) - [j37]Vijay Anand Rajasekaran, Alagiri Indirajithu, P. Jayalakshmi, Anand Nayyar, Balamurugan Balusamy:
Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks. J. Supercomput. 80(12): 16860-16886 (2024) - 2023
- [j36]A. Daniel, R. Deebalakshmi, R. Thilagavathy, T. Kohilakanagalakshmi, S. Janakiraman, Balamurugan Balusamy:
Optimal feature selection for malware detection in cyber physical systems using graph convolutional network. Comput. Electr. Eng. 108: 108689 (2023) - 2022
- [j35]Tianyang Liu, Yongxin Zhu, Hui Wang, Balamurugan Balusamy, Pandi Vijayakumar, Jingtong Peng:
Transformer anomaly detection based on time-frequency domain software-hardware cooperative analysis. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j34]Hanlin Zhu, Yongxin Zhu, Hui Wang, Shihui Wang, Ziwei Liu, Balamurugan Balusamy, Pandi Vijayakumar, Ming Xia:
Multiscale deep network based multistep prediction of high-dimensional time series from power transmission systems. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [c6]N. Pushpalatha, S. Jabeera, N. Hemalatha, Vandana Sharma, Balamurugan Balusamy, R. Yuvaraj:
A Succinct Summary of the Solar MPPT Utilizing a Diverse Optimizing Compiler. IC3I 2022: 1177-1181 - 2021
- [j33]D. Udaya Suriya Rajkumar, P. Sunil Gavaskar, Fadi Al-Turjman, R. Sathiyaraj, Balamurugan Balusamy:
Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j32]Yogesh Sharma, Balamurugan Balusamy:
A Novel Approach for Privacy Preservation in Blockchain Network Using Tensor Product and a Hybrid Swarm Intelligence. Int. J. Mob. Comput. Multim. Commun. 12(4): 52-71 (2021) - [j31]Rathinavel Silambarasan, Haci Mehmet Baskonus, R. Vijay Anand, M. Dinakaran, Balamurugan Balusamy, Wei Gao:
Longitudinal strain waves propagating in an infinitely long cylindrical rod composed of generally incompressible materials and its Jacobi elliptic function solutions. Math. Comput. Simul. 182: 566-602 (2021) - [j30]Thompson Stephan, Fadi M. Al-Turjman, K. Suresh Joseph, Balamurugan Balusamy:
Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks. Int. J. Mach. Learn. Cybern. 12(11): 3261-3294 (2021) - [j29]Manisha Rathee, Sushil Kumar, Amir H. Gandomi, Kumar Dilip, Balamurugan Balusamy, Rizwan Patan:
Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Trans. Engineering Management 68(1): 170-182 (2021) - 2020
- [j28]Ranganathan Indrakumari, Thangamuthu Poongodi, Palanimuthu Suresh, Balamurugan Balusamy:
Chapter Seven - The growing role of integrated and insightful big and real-time data analytics platforms. Adv. Comput. 117: 165-186 (2020) - [j27]Kshira Sagar Sahoo, Bata Krishna Tripathy, Kshirasagar Naik, Somula Ramasubbareddy, Balamurugan Balusamy, Manju Khari, Daniel Burgos:
An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks. IEEE Access 8: 132502-132513 (2020) - [j26]Bhoopesh Singh Bhati, Chandra Shekhar Rai, Balamurugan Balusamy, Fadi Al-Turjman:
An intrusion detection scheme based on the ensemble of discriminant classifiers. Comput. Electr. Eng. 86: 106742 (2020) - [j25]Kshira Sagar Sahoo, Somula Ramasubbareddy, Balamurugan Balusamy, B. Vikram Deep:
Analysing control plane scalability issue of software defined wide area network using simulated annealing technique. Int. J. Grid Util. Comput. 11(6): 827-837 (2020) - [j24]Sankar Sennan, P. Srinivasan, Somula Ramasubbareddy, Balamurugan Balusamy:
Energy-aware multipath routing protocol for internet of things using network coding techniques. Int. J. Grid Util. Comput. 11(6): 838-846 (2020) - [j23]Thompson Stephan, Fadi Al-Turjman, K. Suresh Joseph, Balamurugan Balusamy, Sweta Srivastava:
Artificial intelligence inspired energy and spectrum aware cluster based routing protocol for cognitive radio sensor networks. J. Parallel Distributed Comput. 142: 90-105 (2020) - [j22]Kshira Sagar Sahoo, Pritish Mishra, Mayank Tiwary, Somula Ramasubbareddy, Balamurugan Balusamy, Amir H. Gandomi:
Improving End-Users Utility in Software-Defined Wide Area Network Systems. IEEE Trans. Netw. Serv. Manag. 17(2): 696-707 (2020) - [j21]Manju Khari, Aditya Kumar Garg, Amir H. Gandomi, Rashmi Gupta, Rizwan Patan, Balamurugan Balusamy:
Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques. IEEE Trans. Syst. Man Cybern. Syst. 50(1): 73-80 (2020) - [c5]M. Arun, Saminathan Balamurali, Bharat S. Rawal, Qiang Duan, Lakshmana Kumar Ramasamy, Balamurugan Baluswamy:
Mutual Authentication and Authorized Data Access Between Fog and User Based on Blockchain Technology. INFOCOM Workshops 2020: 37-42
2010 – 2019
- 2019
- [j20]Thangamuthu Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, Balamurugan Balusamy:
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks. IEEE Access 7: 18409-18419 (2019) - [j19]Israa Assaf, Fatima Brieteh, Mona Tfaily, Mariam El-Baida, Seifedine Nimer Kadry, Balamurugan Balusamy:
Students university healthy lifestyle practice: quantitative analysis. Health Inf. Sci. Syst. 7(1): 7 (2019) - [j18]Achyut Shankar, Natarajan Jaisankar, Mohammed S. Khan, Rizwan Patan, Balamurugan Balusamy:
Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wirel. Sens. Syst. 9(2): 68-76 (2019) - [j17]Pandi Vijayakumar, Perumal Pandiaraja, Balamurugan Balusamy, Marimuthu Karuppiah:
A Novel Performance Enhancing Task Scheduling Algorithm for Cloud-Based E-Health Environment. Int. J. E Health Medical Commun. 10(2): 102-117 (2019) - [j16]Sudharshan Chakravarthy, Madhav Anand Jagannathan, J. Jennifer Ranjani, Balamurugan Baluswamy, Seifedine Nimer Kadry:
An optimized hierarchical encryption technique for tamper recognition. Multim. Tools Appl. 78(13): 18693-18712 (2019) - [j15]M. P. Gopinath, G. S. Tamizh Arasi, L. Kavisankar, R. Sathyaraj, S. Karthi, S. L. Aarthy, Balamurugan Balusamy:
A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT). Neural Comput. Appl. 31(S-1): 293-308 (2019) - 2018
- [j14]E. Vijay Sekar, J. Anuradha, Anshita Arya, Balamurugan Balusamy, Victor I. Chang:
A framework for smart traffic management using hybrid clustering techniques. Clust. Comput. 21(1): 347-362 (2018) - [j13]Priya Vedhanayagam, Subha S., Balamurugan Balusamy:
Analysis of performance measures to improve the quality of service in cloud based e-government web portal. Electron. Gov. an Int. J. 14(1): 32-50 (2018) - [j12]Pandi Vijayakumar, Victor I. Chang, L. Jegatha Deborah, Balamurugan Balusamy, P. G. Shynu:
Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst. 78: 943-955 (2018) - [j11]Jana Dwaidy, Anjie Dwaidy, Hanin Hasan, Seifedine Nimer Kadry, Balamurugan Balusamy:
Survey of energy drink consumption and adverse health effects in Lebanon. Health Inf. Sci. Syst. 6(1): 15 (2018) - [j10]SK Hafizul Islam, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, Ruhul Amin, Varun Rajeev M., Balamurugan Balusamy:
A Provably Secure Three-Factor Session Initiation Protocol for Multimedia Big Data Communications. IEEE Internet Things J. 5(5): 3408-3418 (2018) - [c4]M. Lawanya Shri, E. Ganga Devi, Balamurugan Balusamy, Seifedine Nimer Kadry, Sanjay Misra, Modupe Odusami:
A Fuzzy Based Hybrid Firefly Optimization Technique for Load Balancing in Cloud Datacenters. IBICA 2018: 463-473 - 2017
- [j9]Pandi Vijayakumar, Maria Azees, Victor I. Chang, L. Jegatha Deborah, Balamurugan Balusamy:
Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust. Comput. 20(3): 2439-2450 (2017) - [j8]Suyel Namasudra, Pinki Roy, Pandi Vijayakumar, Sivaraman Audithan, Balamurugan Balusamy:
Time efficient secure DNA based access control model for cloud computing environment. Future Gener. Comput. Syst. 73: 90-105 (2017) - [j7]G. NaliniPriya, K. G. Maheswari, Balamurugan Balusamy, Kotteswari Karthikeyan, Arun Kumar Sangaiah:
Availability modeling for multi-tier cloud environment. Intell. Autom. Soft Comput. 23(3): 485-492 (2017) - [j6]Balamurugan Balusamy, Kotteswari Karthikeyan, Arun Kumar Sangaiah:
Ant colony-based load balancing and fault recovery for cloud computing environment. Int. J. Adv. Intell. Paradigms 9(2/3): 204-219 (2017) - [j5]Balamurugan Balusamy, P. Venkata Krishna:
Simplified and efficient framework for managing roles in cloud-based transaction processing systems using attribute-based encryption. Int. J. Comput. Sci. Eng. 14(2): 135-149 (2017) - [j4]Balamurugan Balusamy, Siddharth Ramachandran, Nalini Priya:
Achieving fine-grained access control and mitigating role explosion by utilising ABE with RBAC. Int. J. High Perform. Comput. Netw. 10(1/2): 109-117 (2017) - [j3]G. NaliniPriya, Arun Kumar Sangaiah, Aishwarya Thangavelu, Thusitha Murali, Balamurugan Balusamy:
Providing efficient user management for large-scale enterprise by achieving high scalability over cloud. Int. J. Internet Protoc. Technol. 10(3): 133-142 (2017) - [j2]Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, Victor Chang:
A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System. Int. J. Netw. Secur. 19(4): 559-572 (2017) - [c3]Priya Vedhanayagam, Subha S., Balamurugan Balusamy, Pandi Vijayakumar, Victor Chang:
Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service . IoTBDS 2017: 449-460 - 2015
- [j1]Balamurugan Balusamy, P. Venkata Krishna:
Collective advancements on access control scheme for multi-authority cloud storage system. Int. J. Grid Util. Comput. 6(3/4): 133-142 (2015) - [c2]Kamalraj Durai, Balamurugan Balusamy, S. Jegadeeswari, M. Sugumaran:
Shamir's key based confidentiality on cloud data storage. ICACCI 2015: 418-423 - [c1]Balamurugan Balusamy, Kamalraj Durai, S. Jegadeeswari, M. Sugumaran:
Secured fast prediction of cloud data stream with balanced load factor using Ensemble Tree Classification. ICACCI 2015: 424-430
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint