Back close
Publications
multi class classification for detection of IoT botnet malware

Citation : Chunduri, H., Gireesh Kumar, T., & Charan, P. V. S. (2021, February). A multi class classification f ...

Publisher :Springer

Publications
An efficient data hiding technique in image using binary Hamming code along with particle swarm optimisation

Citation : Malathi, P., & Kumar, T. G. (2021). An efficient data hiding technique in image using binary Hamming ...

Publications
Performance assessment of IDS based on CICIDS-2017 dataset

Citation : Priyanka, V., & Gireesh Kumar, T. (2022). Performance assessment of IDS based on CICIDS-2017 dataset ...

Publisher :Springer

Publications
A machine learning and deep neural network approach in industrial control systems

Citation : Ribu Hassini, S., Gireesh Kumar, T., & Kowshik Hurshan, S. (2022). A machine learning and deep neura ...

Publisher :Springer

Publications
Analysis of Deep Steganography Robustness Using Various Loss Functions

Citation : Chekatamala, V., Malathi, P., & Kumar, G. (2022, May). Analysis of Deep Steganography Robustness Usi ...

Publisher :IEEE

Publications
Smart farming based on AI, edge computing and IoT

Citation : Kumar, G., & Shashank, K. V. (2022, September). Smart farming based on AI, edge computing and IoT. I ...

Publisher :IEEE

Publications
Energy efficient machine learning based SMART-A-BLE implemented wireless battery management system for both hybrid electric vehicles and battery electric vehicles

Citation : Pannerselvam, S., Narayanan, V., & Kumar, T. G. (2023). Energy efficient machine learning based SMAR ...

Publisher :Procedia Computer Science

Publications
Detection of network attacks using machine learning and deep learning models

Citation : Dhanya, K. A., Vajipayajula, S., Srinivasan, K., Tibrewal, A., Kumar, T. S., & Kumar, T. G. (2023). ...

Publisher :Procedia Computer Science

Publications
Automatic face enhancement technique using sigmoid normalisation based on single scale Retinex algorithm

Citation : Baskar, A., & Kumar, T. G. (2023). Automatic face enhancement technique using sigmoid normalisation ...

Publisher :International Journal of Advanced Intelligence Paradigms

Publications
Obfuscated Malware detection using Machine Learning models

Citation : Balasubramanian, K. M., Vasudevan, S. V., Thangavel, S. K., Kumar, G., Srinivasan, K., Tibrewal, A., ...

Publisher :IEEE

Publications
Comparative analysis of deep learning and machine learning models for network intrusion detection

Citation : Dharaneish, V. C., Kumar, N., Kumar, G., &Vajipayajula, S. (2023, July). Comparative analysis of dee ...

Publisher :IEEE

Publications
Edge Computing Based Secure Healthcare System

Citation : Souganthika, G., Gireesh Kumar, and N. Radhika. "Edge Computing Based Secure Healthcare System." 202 ...

Publisher :IEEE

Admissions Apply Now