Follow
Chithra Selvaraj
Chithra Selvaraj
Department of Computer Technology, Anna University, MIT Campus
Verified email at annauniv.edu - Homepage
Title
Cited by
Cited by
Year
A survey on technologies and security protocols: Reference for future generation IoT
R Yugha, S Chithra
Journal of Network and Computer Applications 169, 102763, 2020
1352020
A survey on security issues of reputation management systems for peer-to-peer networks
C Selvaraj, S Anand
Computer science review 6 (4), 145-160, 2012
602012
Peer profile based trust model for P2P systems using genetic algorithm
C Selvaraj, S Anand
Peer-to-Peer Networking and Applications 5, 92-103, 2012
342012
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
ST Revathi, N Ramaraj, S Chithra
Cluster Computing 22, 3521-3530, 2019
332019
Empirical study of feature selection methods over classification algorithms
N Bhalaji, KBS Kumar, C Selvaraj
International Journal of Intelligent Systems Technologies and Applications …, 2018
312018
Performance analysis of IoT protocol under different mobility models
K Kabilan, N Bhalaji, C Selvaraj, M Kumaar, PTR Karthikeyan
Computers & Electrical Engineering 72, 154-168, 2018
292018
Proactive maintenance of small wind turbines using IoT and machine learning models
Y Selvaraj, C Selvaraj
International Journal of Green Energy 19 (5), 463-475, 2022
142022
BCI cinematics–A pre-release analyser for movies using H2O deep learning platform
SK KB, G Krishna, N Bhalaji, S Chithra
Computers & Electrical Engineering 74, 547-556, 2019
132019
Brain storm-based Whale Optimization Algorithm for privacy-protected data publishing in cloud computing
S Thanga Revathi, N Ramaraj, S Chithra
Cluster Computing 22 (Suppl 2), 3521-3530, 2019
112019
Portable text to speech converter for the visually impaired
K Ragavi, P Radja, S Chithra
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
92016
Tracy–Singh product and genetic whale optimization algorithm for retrievable data perturbation for privacy preserved data publishing in cloud computing
T Revathi S, N Ramaraj, S Chithra
The Computer Journal 63 (2), 239-253, 2020
82020
Attribute based trust evaluation for secure RPL protocol in IoT environment
R Yugha, S Chithra
2019 International Conference on Vision towards Emerging Trends in …, 2019
82019
Enhanced portable text to speech converter for visually impaired
C Selvaraj, N Bhalaji
International Journal of Intelligent Systems Technologies and Applications …, 2018
82018
Comprehensive Trust Based Scheme to Combat Malicious Nodes in MANET Based Cyber Physical Systems
N Bhalaji, C Selvaraj
Proceedings of International Conference on Communication and Networks …, 2017
72017
Machine learning based spectrum prediction in cognitive radio networks
P Pandian, C Selvaraj, N Bhalaji, KGA Depak, S Saikrishnan
2023 International Conference on Networking and Communications (ICNWC), 1-6, 2023
52023
Analysis of 6LOWPAN and CoAP Protocols for Maternal Health Care
K Kabilan, N Bhalaji, S Chithra
Microelectronics, Electromagnetics and Telecommunications: Proceedings of …, 2019
42019
Bio-sensor authentication for medical applications using WBAN
G Venkatesan, C Selvaraj
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
42016
A role based trust model for peer to peer systems using credential trees
C Selvaraj, S Anand
International Journal of Computer Theory and Engineering 3 (2), 234, 2011
42011
An Improved Pairing-Free Ciphertext Policy Framework for IoT.
M Amirthavalli, S Chithra, R Yugha
Computer Systems Science & Engineering 46 (1), 2023
12023
Privacy Protected IoT-Blockchain using ZKP for Healthcare application
R Yugha, S Chithra, N Bhalaji, S Karthika
Journal of Control Engineering and Applied Informatics 24 (4), 76-87, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20