Vidushi Vashishth
Vidushi Vashishth
Department of Information Technology, Netaji Subhas Institute of Technology, University of Delhi
Verified email at nsit.net.in
Title
Cited by
Cited by
Year
A game theory based secure model against Black hole attacks in Opportunistic Networks
A Chhabra, V Vashishth, DK Sharma
2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017
202017
A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks
A Chhabra, V Vashishth, DK Sharma
International Journal of Communication Systems 31 (4), e3487, 2018
162018
Seir: A stackelberg game based approach for energy-aware and incentivized routing in selfish opportunistic networks
A Chhabra, V Vashishth, DK Sharma
2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017
132017
GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks
V Vashishth, A Chhabra, DK Sharma
Computer Communications 134, 138-148, 2019
102019
An energy efficient routing protocol for wireless internet-of-things sensor networks
A Chhabra, V Vashishth, A Khanna, DK Sharma, J Singh
arXiv preprint arXiv:1808.01039, 2018
6*2018
A predictive approach to task scheduling for Big Data in cloud environments using classification algorithms
V Vashishth, A Chhabra, A Sood
2017 7th International Conference on Cloud Computing, Data Science …, 2017
52017
A machine learning approach using classifier cascades for optimal routing in opportunistic internet of things networks
V Vashishth, A Chhabra, DK Sharma
2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019
12019
RLProph: a dynamic programming based reinforcement learning approach for optimal routing in opportunistic IoT networks
DK Sharma, JJPC Rodrigues, V Vashishth, A Khanna, A Chhabra
WIRELESS NETWORKS, 2020
2020
Hands-On ONE Simulator: Opportunistic Network Environment
A Chhabra, V Vashishth, DK Sharma
Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy, 158, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–9