Year : 2024
A Multi-class Classification for Detection of IoT Network Attacks Using Machine Learning Models
Cite this Research Publication : Vaisakhkrishnan, K., Ashok, G., Mishra, P., & Kumar, T. G. (2024). Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT. Procedia Computer Science, 235, 2498-2507
Publisher : Procedia Computer Science
Year : 2024
Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT.
Cite this Research Publication : Vaisakhkrishnan, K., Ashok, G., Mishra, P., & Kumar, T. G. (2024). Guarding Digital Health: Deep Learning for Attack Detection in Medical IoT. Procedia Computer Science, 235, 2498-2507
Publisher : Procedia Computer Science
Year : 2024
VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks
Cite this Research Publication : Lakshmi, Vimitha R. Vidhya, and T. Gireesh Kumar. "VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks."Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), volume: 15, number: 1,2024
Publisher : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA
Year : 2023
Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric vehicles
Cite this Research Publication : Pannerselvam, S., Narayanan, V., & Kumar, T. G. (2023). Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric vehicles. Procedia Computer Science, 218, 235-248
Publisher : Procedia Computer Science
Year : 2023
Detection of network attacks using machine learning and deep learning models
Cite this Research Publication : Dhanya, K. A., Vajipayajula, S., Srinivasan, K., Tibrewal, A., Kumar, T. S., & Kumar, T. G. (2023). Detection of network attacks using machine learning and deep learning models. Procedia Computer Science, 218, 57-66
Publisher : Procedia Computer Science
Year : 2023
Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm
Cite this Research Publication : Baskar, A., & Kumar, T. G. (2023). Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm. International Journal of Advanced Intelligence Paradigms, 26(1), 1-13
Publisher : International Journal of Advanced Intelligence Paradigms
Year : 2023
Obfuscated Malware detection using Machine Learning models
Cite this Research Publication : Balasubramanian, K. M., Vasudevan, S. V., Thangavel, S. K., Kumar, G., Srinivasan, K., Tibrewal, A., &Vajipayajula, S. (2023, July). Obfuscated Malware detection using Machine Learning models. In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-8). IEEE
Publisher : IEEE
Year : 2023
Comparative analysis of deep learning and machine learning models for network intrusion detection
Cite this Research Publication : Dharaneish, V. C., Kumar, N., Kumar, G., &Vajipayajula, S. (2023, July). Comparative analysis of deep learning and machine learning models for network intrusion detection. In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-13). IEEE
Publisher : IEEE
Year : 2023
Edge Computing Based Secure Healthcare System
Cite this Research Publication : Souganthika, G., Gireesh Kumar, and N. Radhika. "Edge Computing Based Secure Healthcare System." 2023 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2023
Publisher : IEEE
Year : 2023
A vision system to assist visually challenged people for face recognition using multi-task cascaded convolutional neural network (MTCNN) and local binary pattern (LBP)
Cite this Research Publication :
Baskar, A., Kumar, T. G., &Samiappan, S. (2023).
. Journal of Ambient Intelligence and Humanized Computing, 14(4), 4329-4341
Publisher : Journal of Ambient Intelligence and Humanized Computing,
Year : 2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN
Cite this Research Publication : Dhanya, K. A. Gireesh Kumar T" Obfuscated malware detection in iot android applications using markov images and cnn. IEEE Syst. J., 1–11 (2023)." (2023)
Publisher : IEEE
Year : 2022
A machine learning and deep neural network approach in industrial control systems
Cite this Research Publication : Ribu Hassini, S., Gireesh Kumar, T., & Kowshik Hurshan, S. (2022). A machine learning and deep neural network approach in industrial control systems. In ICT Analysis and Applications (pp. 525-536). Springer Singapore
Publisher : Springer
Year : 2022
Smart farming based on AI, edge computing and IoT
Cite this Research Publication : Kumar, G., & Shashank, K. V. (2022, September). Smart farming based on AI, edge computing and IoT. In 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (pp. 324-327). IEEE
Publisher : IEEE
Year : 2021
An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation
Cite this Research Publication : Malathi, P., & Kumar, T. G. (2021). An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation. International Journal of Intelligent Systems Technologies and Applications, 20(2), 167-181
Year : 2020
String Reduced Dimensional Representation of Spatial Trajectory for Clustering
Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “String Reduced Dimensional Representation of Spatial Trajectory for Clustering”, 2020.
Publisher : (2020)
Year : 2020
Maximizing the Embedding Efficiency Using Linear Block Codes in Spatial and Transform Domains
Cite this Research Publication : Malathi P., M, A. Sridhar, Paliwal, A., and Dr. Gireesh K. T., “Maximizing the Embedding Efficiency Using Linear Block Codes in Spatial and Transform Domains”, Procedia Computer Science, vol. 167, pp. 302-312, 2020.
Publisher : Procedia Computer Science
Year : 2020
An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis
Cite this Research Publication : M. P. Anand, Dr. Gireesh K. T., and Charan, P. V. Sai, “An Ensemble Approach For Algorithmically Generated Domain Name Detection Using Statistical And Lexical Analysis”, Procedia Computer Science, vol. 171, pp. 1129-1136, 2020.
Publisher : Procedia Computer Science
Year : 2020
Socialized Proficient Routing in Opportunistic Mobile Network Using Machine Learning Techniques
Cite this Research Publication : V. Lakshmi and Dr. Gireesh K. T., “Socialized Proficient Routing in Opportunistic Mobile Network Using Machine Learning Techniques”, International Journal of Intelligent Engineering and Systems, vol. 13, pp. 434-445, 2020.
Publisher : International Journal of Intelligent Engineering and Systems
Year : 2020
Future Engineering Curricula: Balancing Domain Competence with CPS Readiness
Cite this Research Publication : B. B. Nair, Ram, D. S. H., Manoj Kumar Panda, Balaji, A. J., Dr. Gireesh K. T., and Mohan, V., “Future Engineering Curricula: Balancing Domain Competence with CPS Readiness”, IEEE Design Test, vol. 37, pp. 16-23, 2020.
Publisher : IEEE Design Test
Year : 2019
String based Feature Representation for Trajectory Clustering
Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “String based Feature Representation for Trajectory Clustering ”, International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 10, no. 2, pp. 1-18, 2019.
Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
Year : 2019
Ransomware Analysis Using Reverse Engineering
Cite this Research Publication : S. Naveen and Dr. Gireesh K. T., “Ransomware Analysis Using Reverse Engineering”, Communications in Computer and Information Science, vol. 1046, pp. 185-194, 2019.
Publisher : Communications in Computer and Information Science
Year : 2019
Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions
Cite this Research Publication : V. R. Vidhya Lakshmi and Dr. Gireesh K. T., “Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions”, International Journal of Electrical and Computer Engineering, vol. 9, no. 2, pp. 1145-1152, 2019.
Publisher : International Journal of Electrical and Computer Engineering
Year : 2019
Efficient Android Malware Scanner using Hybrid Analysis
Cite this Research Publication : K. A. Dhanya and Dr. Gireesh K. T., “Efficient Android Malware Scanner Using Hybrid Analysis”, International Journal of Recent Technology and Engineering (IJRTE), vol. 7, no. e-5S3, 2019.
Publisher : International Journal of Recent Technology and Engineering (IJRTE)
Year : 2019
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
Cite this Research Publication : P. V. Sai Charan, Dr. Gireesh K. T., and P. Anand, M., “Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks”, Communications in Computer and Information Science, vol. 985, pp. 45-54, 2019.
Publisher : Communications in Computer and Information Science
Year : 2018
Static and Dynamic Analysis for Android Malware Detection
Cite this Research Publication : K. Sugunan, Dr. Gireesh K. T., and Dhanya, K. A., “Static and Dynamic Analysis for Android Malware Detection”, Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing, vol. 645, pp. 147-155, 2018.
Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing
Year : 2018
Clustering of trajectory data using hierarchical approaches
Cite this Research Publication : B.A. Sabarish, R. Karthi, and Dr. Gireesh K. T., “Clustering of trajectory data using hierarchical approaches”, Lecture Notes in Computational Vision and Biomechanics, vol. 28, pp. 215-226, 2018.
Publisher : Lecture Notes in Computational Vision and Biomechanics
Year : 2017
Mobile social networks: Architecture, privacy, security issues and solutions
Cite this Research Publication : V. R. Vidhya Lakshmi and T. Kumar, G., “Mobile social networks: Architecture, privacy, security issues and solutions”, Journal of Communications, vol. 12, pp. 524-531, 2017.
Publisher : Journal of Communications, Engineering and Technology Publishing,
Year : 2017
A framework for dynamic malware analysis based on behavior artifacts
Cite this Research Publication : T. G. Gregory Paul and Dr. Gireesh K. T., “A framework for dynamic malware analysis based on behavior artifacts”, Advances in Intelligent Systems and Computing, vol. 515, pp. 551-559, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for EMC application
Cite this Research Publication :
S. S. Prabhu, Bhavani, R., Dr. Gireesh K. T., and Dr. T. Rajagopalan, “A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for \EMC\ application”, Computational Materials Science, vol. 126, pp. 400 - 406, 2017.
Publisher : Computational Materials Science
Year : 2016
Privilege-based scoring system against cross-site scripting using machine learning
Cite this Research Publication : N. S. Sunder and Dr. Gireesh K. T., “Privilege-based scoring system against cross-site scripting using machine learning”, Advances in Intelligent Systems and Computing, vol. 394, pp. 591-598, 2016
Publisher : Advances in Intelligent Systems and Computing
Year : 2014
A Novel Cloud Based NIDPS for Smartphones
Cite this Research Publication : V. A. Pandian and Dr. Gireesh K. T., “A Novel Cloud Based NIDPS for Smartphones”, Communications in Computer and Information Science, vol. 420 CCIS, pp. 473-484, 2014.
Publisher : Communications in Computer and Information Science
Year : 2012
Tracking of nose tip: An alternative for mouse
Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. Jb, ,, ,, and Sreevathsan, Ra, “Tracking of nose tip: An alternative for mouse”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6411 LNCS, pp. 219-225, 2012.
Publisher : Lecture Notes in Computer Science
Year : 2011
Steganalysis for calibrated and lower embedded uncalibrated images
Cite this Research Publication : D. D. Shankar, Dr. Gireesh K. T., and Nath, H. V., “Steganalysis for calibrated and lower embedded uncalibrated images”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7077 LNCS, pp. 294-301, 2011.
Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Year : 2011
Cognitive environment for pervasive learners
Cite this Research Publication : S. Sharma, Sreevathsan, R., Srikanth, M. V. V. N. S., Harshith, C., and Dr. Gireesh K. T., “Cognitive environment for pervasive learners”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 506-515, 2011.
Publisher : Communications in Computer and Information Science
Year : 2010
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine
Cite this Research Publication : P. P. Amritha, Madathil, A., and Dr. Gireesh K. T., “Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine”, Communications in Computer and Information Science, vol. 101, pp. 638-640, 2010.
Publisher : Communications in Computer and Information Science
Year : 2010
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces
Cite this Research Publication : JaDivya Udayan, Dr. Gireesh K. T., John, R. Mc, Poornaselvan, K. Jd, and Lakshmanan, S. Aa, “Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces”, Communications in Computer and Information Science, vol. 101, pp. 602-605, 2010.
Publisher : Communications in Computer and Information Science
Year : 2010
Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.
Cite this Research Publication : Dr. Gireesh K. T., Poornaselvan, K. J., and Dr. M. Sethumadhavan, “Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.”, Defence Science Journal, vol. 60, no. 4, pp. 387-391, 2010.
Publisher : Defence Science Journal