Min max normalization based data perturbation method for privacy protection YK Jain, SK Bhandare International Journal of Computer and Communication Technology, 233-238, 2013 | 384 | 2013 |
A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys YK Jain, RR Ahirwal International Journal of Computer Science and Security 4 (1), 40-49, 2010 | 98 | 2010 |
An efficient association rule hiding algorithm for privacy preserving data mining YK Jain, VK Yadav, GS Panday International Journal on Computer Science and Engineering 3 (7), 2792-2798, 2011 | 75 | 2011 |
Upendra,“An Efficient Intrusion Detection based on Decision Tree Classifier Using Feature Reduction,” YK Jain International Journal of Scientific and Research Publication 2 (1), 1-6, 2012 | 58 | 2012 |
Honeypot based secure network system L Patil, S Desai, A Singh | 42 | 2021 |
Grayhole attack and prevention in mobile adhoc network M Arya, YK Jain International Journal of Computer Applications 27 (10), 21-26, 2011 | 34 | 2011 |
A bee colony based multi-objective load balancing technique for cloud computing environment A Soni, G Vishwakarma, YK Jain Int J Comput Appl 114 (4), 19-25, 2015 | 30 | 2015 |
Behavior analysis of malicious node in the different routing algorithms in mobile ad hoc network (MANET) D Mishra, YK Jain, S Agrawal 2009 International Conference on Advances in Computing, Control, and …, 2009 | 30 | 2009 |
Trust based secure aodv in manet P Sharma Journal of Global Research in Computer Science 3 (6), 107-114, 2012 | 29 | 2012 |
Efficient retrieval of text for biomedical domain using data mining algorithm S Vashishta, YK Jain International Journal of Advanced Computer Science and Applications 2 (4), 2011 | 25 | 2011 |
Comparison between different classification methods with application to skin cancer YK Jain, M Jain International Journal of Computer Applications 53 (11), 2012 | 24 | 2012 |
Proposing an efficient method for frequent pattern mining VK Singh, V Shah, YK Jain, A Shukla, AS Thoke, VK Singh, C Dule, ... World Academy of Science, Engineering and Technology 61 (48), 384-390, 2008 | 20 | 2008 |
Intrusion detection using supervised learning with feature set reduction YK Jain International Journal of Computer Applications 33 (6), 2011 | 19 | 2011 |
Energy level accuracy and life time increased in mobile ad-hoc networks using OLSR YK Jain, RK Verma International Journal of Advanced Research in Computer Science and Software …, 2012 | 17 | 2012 |
Email security using encrption and compression YK Jain, PB Gosavi 2008 International Conference on Computational Intelligence for Modelling …, 2008 | 17 | 2008 |
An efficient smart card based remote user authentication scheme using hash function SS Sonwanshi, RR Ahirwal, YK Jain 2012 IEEE Students' Conference on Electrical, Electronics and Computer …, 2012 | 16 | 2012 |
An efficient k-means algorithm for the cluster head selection based on SAW and WPM A Khandelwal, YK Jain International Journal of Advanced Computer Research 8 (37), 191-202, 2018 | 15 | 2018 |
Detecting and tracking of moving objects from video TS Waykole, YK Jain International Journal of Computer Applications 81 (18), 0975-8887, 2013 | 15 | 2013 |
Designing and Developing e-Learning Solution: Study on Moodle 2.0 R Shrivastava, YK Jain, AK Sachan International Journal of Machine Learning and Computing 3 (3), 305, 2013 | 14 | 2013 |
Skin cancer detection and classification using wavelet transform and probabilistic neural network YK Jain, M Jain IET Digital Library, 2012 | 14 | 2012 |