Follow
Dr. Kumaran U
Title
Cited by
Cited by
Year
Fusion of mel and gammatone frequency cepstral coefficients for speech emotion recognition using deep C-RNN
U Kumaran, S Radha Rammohan, SM Nagarajan, A Prathik
International Journal of Speech Technology 24 (2), 303-314, 2021
852021
Secure data transmission in internet of medical things using RES-256 algorithm
SM Nagarajan, GG Deverajan, U Kumaran, M Thirunavukkarasan, ...
IEEE Transactions on Industrial Informatics 18 (12), 8876-8884, 2021
482021
Performance analysis of water quality monitoring system in IoT using machine learning techniques
N Rakesh, U Kumaran
2021 International Conference On Forensics, Analytics, Big Data, Security …, 2021
182021
Security framework for IoT and deep belief network-based healthcare system using blockchain technology
SM Nagarajan, P Anandhan, V Muthukumaran, K Uma, U Kumaran
International Journal of Electronic Business 17 (3), 226-243, 2022
172022
Phishing detection using machine learning techniques
U Nishitha, R Kandimalla, RMM Vardhan, U Kumaran
2023 3rd Asian Conference on Innovation in Technology (ASIANCON), 1-6, 2023
112023
A secure and privacy-preserving approach to protect user data across cloud based online social networks
U Kumaran
International Journal of Grid and High Performance Computing (IJGHPC) 12 (2 …, 2020
92020
Next Generation Imaging Methodology: An Intelligent Transportation System for Consumer Industry
GG Devarajan, U Kumaran, G Chandran, RP Mahapatra, A Alkhayyat
IEEE Transactions on Consumer Electronics, 2024
62024
Privacy preserving in data mining technical: A review
U Kumaran, N Khare, AS Suraj
Research journal of pharmacy and technology 9 (11), 2023-2026, 2016
52016
Calculating the heart disease in switzerland using Pearson's correlation
R Kalyanasundaram, A Prasanth, BR Tamizhselvan, U Kumaran
2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017
32017
Gradient Boosting classifier performance evaluation using Generative Adversarial Networks
P Lavanya, RP Singh, U Kumaran, P Kumar
Procedia Computer Science 235, 3016-3024, 2024
22024
Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy
U Kumaran, S Thangam, TN Prabhakar, J Selvaganesan, HN Vishwas
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2023
22023
Covid Contact Tracing Integrated with Blockchain Technology
MA Mathew, U Kumaran
2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), 1-7, 2022
22022
A Review on Privacy Preserving Data Mining using Secure Multiparty Computation
U Kumaran, N Khare
Indian Journal of Science and Technology 9 (48), 1-3, 2016
22016
Enhanced Security Measures for Image Privacy: Encryption Perspectives
R Omshith, VP Balaji, RV Rahul, U Kumaran
2024 2nd International Conference on Intelligent Data Communication …, 2024
12024
Data Address focused Implementation of Low Latency Secure Blockchain for EMRs
U Kumaran, S Thangam, TVN Prabhakar, S Shreyas, VR Krishnan, ...
2023 IEEE 3rd Mysore Sub Section International Conference (MysuruCon), 1-6, 2023
12023
Effective Privacy Preserving Data Mining Techniques for Secure Data Contribution and Retrieval in Social Networks
U Kumaran
Vellore, 2020
12020
Data analysis using box and whisker plot for functional point
K Divagar, E Deepchandar, K Kavin, U Kumaran
1
Enhancing Cloud IoT Security With Blockchain and SDN
U Kumaran, T Swetha, I Sharma, R Keerthana, V Tejashwini, ...
2024 International Conference on Communication, Computer Sciences and …, 2024
2024
Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
U Kumaran, T Swetha, GSNS Reddy, H Ala, SM Nagarajan, B Umah
2024 International Conference on Communication, Computer Sciences and …, 2024
2024
A Comparative Study on the Performance of Machine learning Algorithms for Malware Detection and Classification
P Lavanya, PB Pati, U Kumaran
2024 IEEE 9th International Conference for Convergence in Technology (I2CT), 1-8, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20