Suresh Veluru
Suresh Veluru
AI Lead at ServisBOT, Republic of Ireland
Verified email at
Cited by
Cited by
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Y Rahulamathavan, RCW Phan, S Veluru, K Cumanan, M Rajarajan
IEEE Transactions on Dependable and Secure Computing, 1, 2013
Rough-DBSCAN: A fast hybrid density based clustering method for large data sets
P Viswanath, VS Babu
Pattern Recognition Letters 30 (16), 1477-1488, 2009
Hadoop based defense solution to handle distributed denial of service (ddos) attacks
S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru
Scientific Research Publishing, 2013
Privacy-preserving clinical decision support system using gaussian kernel-based classification
Y Rahulamathavan, S Veluru, RCW Phan, JA Chambers, M Rajarajan
IEEE journal of biomedical and health informatics 18 (1), 56-66, 2013
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
MR Y Rahulamathavan, S Veluru, J Han, R Lu, F Li
IEEE Transactions on Computers, DOI 10.1109/TC.2015.2510646, 2016
Rough-fuzzy weighted k-nearest leader classifier for large data sets
VS Babu, P Viswanath
Pattern Recognition 42 (9), 1719-1731, 2009
Entropy clustering approach for improving forecasting in DDoS attacks
A Olabelurin, S Veluru, A Healing, M Rajarajan
2015 IEEE 12th International Conference on Networking, Sensing and Control …, 2015
Machine learning based intrusion detection techniques
KK Gulla, P Viswanath, SB Veluru, RR Kumar
Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020
Privacy preserving text analytics: research challenges and strategies in name analysis
S Veluru, Y Rahulamathavan, BB Gupta, M Rajarajan
Standards and standardization: concepts, methodologies, tools, and …, 2015
Weighted k-nearest leader classifier for large data sets
VS Babu, P Viswanath
Pattern Recognition and Machine Intelligence: Second International …, 2007
A review on intrusion detection techniques and intrusion detection systems in MANETs
SS Chakravarthi, S Veluru
2014 International Conference on Computational Intelligence and …, 2014
An efficient and fast parzen-window density based clustering method for large data sets
VS Babu, P Viswanath
2008 First International Conference on Emerging Trends in Engineering and …, 2008
Generating privacy zones in smart cities
F Peters, S Hanvey, S Veluru, AE Mady, M Boubekeur, B Nuseibeh
2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
Optimal allocation of virtual resources using genetic algorithm in cloud environments
KD Babu, DG Kumar, S Veluru
Proceedings of the 12th ACM International Conference on Computing Frontiers, 1-6, 2015
Surname identification and correction in a corpus of forename surname dataset
S Veluru, Y Rahulamathavan, M Rajarajan
UK Workshop on Computational Intelligence, 2012
Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions
BB Gupta, DP Agrawal, S Yamaguchi, NAG Arachchilage, S Veluru
Annals of Telecommunications 72, 513-515, 2017
The uncertainty of identity toolset: Analysing digital traces for user profiling
M Adnan, A Lima, L Rossi, S Veluru, P Longley, M Musolesi, M Rajarajan
Proceedings of the 7th International Conference on Security of Information …, 2014
phan RC, Chambers JA, Rajarajan M
Y Rahulamathavan, S Veluru
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel …, 2014
E-mail Address Categorization based on Semantics of Surnames
S Veluru, Y Rahulamathavan, P Viswanath, P Longley, M Rajarajan
IEEE Symposium on Computational Intelligence and Data Mining, 222-229, 2013
Generalized branch and bound algorithm for feature subset selection
P Viswanath, PV Kumar, VS Babu, MV Kumar
International Conference on Computational Intelligence and Multimedia …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20