Comparative analysis of Android and iOS from security viewpoint S Garg, N Baliyan Computer Science Review 40, 100372, 2021 | 83 | 2021 |
A novel parallel classifier scheme for vulnerability detection in android S Garg, N Baliyan Computers & Electrical Engineering 77, 12-26, 2019 | 41 | 2019 |
Quality assessment of software as a service on cloud using fuzzy logic N Baliyan, S Kumar Cloud Computing in Emerging Markets (CCEM), 2013 IEEE International …, 2013 | 41 | 2013 |
Obesity prediction using ensemble machine learning approaches K Jindal, N Baliyan, PS Rana Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th …, 2018 | 37 | 2018 |
Android security assessment: A review, taxonomy and research gap study S Garg, N Baliyan Computers & Security 100, 102087, 2021 | 27 | 2021 |
A study of recent recommender system techniques S Bansal, N Baliyan International Journal of Knowledge and Systems Science (IJKSS) 10 (2), 13-41, 2019 | 27 | 2019 |
Prediction of heart disease severity with hybrid data mining M Saini, N Baliyan, V Bassi 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 25 | 2017 |
Data on vulnerability detection in android S Garg, N Baliyan Data in brief 22, 1081-1087, 2019 | 20 | 2019 |
Bi-MARS: a bi-clustering based memetic algorithm for recommender systems S Bansal, N Baliyan Applied Soft Computing 97, 106785, 2020 | 19 | 2020 |
Software process and quality evaluation for semantic web applications N Baliyan, S Kumar IETE Technical Review 31 (6), 452-462, 2014 | 16 | 2014 |
Towards software engineering paradigm for software as a service N Baliyan, S Kumar Contemporary Computing (IC3), 2014 Seventh International Conference on, 329-333, 2014 | 16 | 2014 |
Improved market basket analysis with utility mining N Srivastava, K Gupta, N Baliyan Proceedings of 3rd international conference on internet of things and …, 2018 | 10 | 2018 |
Quality evaluation of ontologies S Kumar, N Baliyan, S Kumar, N Baliyan Semantic Web-Based Systems: Quality Assessment Models, 19-50, 2018 | 10 | 2018 |
Machine learning based android vulnerability detection: A roadmap S Garg, N Baliyan Information Systems Security: 16th International Conference, ICISS 2020 …, 2020 | 9 | 2020 |
Hadoop based analysis and visualization of diabetes data through tableau P Bhardwaj, N Baliyan 2019 Twelfth International Conference on Contemporary Computing (IC3), 1-5, 2019 | 9 | 2019 |
Ontology cohesion and coupling metrics S Kumar, N Baliyan, S Sukalikar International Journal on Semantic Web and Information Systems (IJSWIS) 13 (4 …, 2017 | 8 | 2017 |
PAM clustering based taxi hotspot detection for informed driving N Verma, N Baliyan 2017 8th International Conference on Computing, Communication and Networking …, 2017 | 8 | 2017 |
A behavioral metrics suite for modular ontologies N Baliyan, S Kumar Proceedings of the Second International Conference on Information and …, 2016 | 8 | 2016 |
An Ontology-Based Approach for Test Case Reuse S Dalal, S Kumar, N Baliyan Intelligent Computing, Communication and Devices, Series: Advances in …, 2015 | 8 | 2015 |
M2VMapper: Malware-to-Vulnerability mapping for Android using text processing S Garg, N Baliyan Expert Systems with Applications 191, 116360, 2022 | 7 | 2022 |