A survey on Cross-Layer Design Approach for Secure Wireless Sensor Networks K Vidya, D Devi International Conference on Innovative Computing and Communication, 2018 | 12* | 2018 |
Genetic algorithm optimized fuzzy decision system for efficient data transmission with deafness avoidance in multihop cognitive radio networks VNJ Robert, K Vidya Journal of Ambient Intelligence and Humanized Computing 14 (2), 959-972, 2023 | 10 | 2023 |
Security Enhanced Crowdfunding Using Blockchain and Lattice Based Cryptosystem K Vidya, HI Hussain, V Celestine, V Kumar, VNJ ROBERT | 7 | 2022 |
Enhancing hand interaction patterns for virtual objects in mobile augmented reality using marker-less tracking K Vidya, R Deryl, K Dinesh, S Rajabommannan, G Sujitha 2014 International Conference on Computing for Sustainable Global …, 2014 | 7 | 2014 |
Secure data access control for multi-authority Quantum based cloud storage K Vidya, A Abinaya 2015 International Conference on Computing and Communications Technologies …, 2015 | 3 | 2015 |
Effective cooperative spectrum sensing using deep recurrent reinforced learning‐based Q‐routing in multihop cognitive radio networks VNJ Robert, K Vidya International Journal of Communication Systems 34 (17), e4982, 2021 | 2 | 2021 |
Quantum Cryptographic Approach to Decentralized Access Control and Privacy Preserving in Cloud K Vidya, VS Alamelu, K Sashi Kumar, L SreeChandraa Asian Journal of Information Technology 15 (3), 578-592, 2016 | 2 | 2016 |
OAM-GANN: Online Adaptive Memory based Genetically optimized Artificial Neural Network for PUEA Detection in CRN Applications VNJ Robert, K Vidya | 1 | 2022 |
A comparative study of cooperative and non-cooperative game model for overlay spectrum access in multihop cognitive radio networks VN Jeygar Robert, K Vidya AIP Conference Proceedings 2336 (1), 2021 | 1 | 2021 |
An Effective Channel Access Mechanism for Data Transmission in Heterogeneous Cognitive Radio Sensor Networks VNJ Robert, K Vidya 2018 International Conference on Intelligent Computing and Communication for …, 2018 | 1 | 2018 |
Robust DWT-SVD Based Blind Watermarking for DIBR 3D Video K Vidya, T Sujithra International Conference on Computer, Communication and Signal Processing …, 2018 | 1 | 2018 |
Preserving Privacy of Cloud Data Using Homomorphic Encryption in MapReduce VKMSS Sujitha . G, Rajeswaran .T, Thiagarajan.R International Journal of Hybrid Information Technology 7 (3), 363-376, 2014 | 1* | 2014 |
Throughput optimisation of inter-and intra-domain autonomous systems traffic engineering K Vidya, VR Uthariaraj International Journal of Communication Networks and Distributed Systems 6 (1 …, 2011 | 1 | 2011 |
Quantum Octal Logarithmic Approximation Keying(QOLAK) Scheme for Securing AS-PATH in Inter-Domain Routing K Vidya, VR Uthariaraj Information Technology Journal 10 (9), 1725-1732, 2011 | 1 | 2011 |
Application of logarithmic keying for securing ASPATH in inter-domain routing K Vidya, VR Uthariaraj 2009 First International Conference on Advanced Computing, 86-92, 2009 | 1 | 2009 |
Bi-Criteria Latency Optimization of Intra- and Inter-Autonomous System Traffic Engineering K Vidya, V Rhymend Uthariaraj World Academy of Science Engineering and Technology 38, 227-234, 2009 | 1 | 2009 |
A deep convolutional neural network architecture for breast mass classification using mammogram images S G., V K., G R. Journal of Autonomous Intelligence 7 (3), 15, 2023 | | 2023 |
Compressed Deepfake Detection using Spatio-Temporal Approach with Model Pruning K Vidya, P Ramesh, H Viknesh, S Devanand Procedia Computer Science 230, 436-444, 2023 | | 2023 |
A Survey on Quantum Cryptography for Security in Cloud K Vidya, VS Alamelu, K Sashikumar, L Sreechandra International Journal of Applied Engineering Research 10 (9), 2015 | | 2015 |
Distributed and independent access to quantum encrypted cloud database K Vidya, D Devika 2014 Sixth International Conference on Advanced Computing (ICoAC), 61-65, 2014 | | 2014 |