


default search action
Brijesh Kumar Chaurasia
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Mritunjay Shall Peelam
, Brijesh Kumar Chaurasia
, Aditya Kumar Sharma
, Vinay Chamola
, Biplab Sikdar
:
Unlocking the Potential of Interconnected Blockchains: A Comprehensive Study of Cosmos Blockchain Interoperability. IEEE Access 12: 171753-171776 (2024) - [j37]Aditya Kumar Sharma, Mritunjay Shall Peelam, Brijesh Kumar Chaurasia, Vinay Chamola
:
QIoTChain: Quantum IoT-blockchain fusion for advanced data protection in Industry 4.0. IET Blockchain 4(3): 252-262 (2024) - [j36]Shaurya Pratap Singh, Brijesh Kumar Chaurasia, Tanmay Tripathi, Ayush Pal, Siddharth Gupta:
Attack on lattice shortest vector problem using K-Nearest Neighbour. Iran J. Comput. Sci. 7(3): 515-531 (2024) - [j35]Aditya Kumar Sharma, Brijesh Kumar Chaurasia, Vrijendra Singh:
Blockchain-based feedback system using NFT in e-commerce. Iran J. Comput. Sci. 7(3): 579-587 (2024) - [j34]Man Mohan Shukla, B. K. Tripathi, Tanay Dwivedi, Ashish Tripathi, Brijesh Kumar Chaurasia
:
A hybrid CNN with transfer learning for skin cancer disease detection. Medical Biol. Eng. Comput. 62(10): 3057-3071 (2024) - [j33]Rohit Saxena, Deepak Arora, Vishal Nagar, Brijesh Kumar Chaurasia
:
Blockchain transaction deanonymization using ensemble learning. Multim. Tools Appl. 83(37): 84589-84618 (2024) - [j32]Yogendra Pratap Singh, Brijesh Kumar Chaurasia
, Man Mohan Shukla:
Deep transfer learning driven model for mango leaf disease detection. Int. J. Syst. Assur. Eng. Manag. 15(10): 4779-4805 (2024) - [j31]Tanay Dwivedi, Brijesh Kumar Chaurasia
, Man Mohan Shukla:
Lightweight vision image transformer (LViT) model for skin cancer disease classification. Int. J. Syst. Assur. Eng. Manag. 15(10): 5030-5055 (2024) - [j30]Soumya Bajpai
, Kapil Sharma
, Brijesh Kumar Chaurasia:
A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT. SN Comput. Sci. 5(5): 537 (2024) - [j29]Abhijeet Pratap Singh, Brijesh Kumar Chaurasia
, Ashish Tripathi:
Stacking Enabled Ensemble Learning Based Intrusion Detection Scheme (SELIDS) for IoV. SN Comput. Sci. 5(8): 1000 (2024) - [j28]Yogendra Pratap Singh, Brijesh Kumar Chaurasia, Man Mohan Shukla:
Mango Fruit Variety Classification Using Lightweight VGGNet Model. SN Comput. Sci. 5(8): 1083 (2024) - [j27]Ankit Kumar
, Brijesh Kumar Chaurasia
:
Detection of SARS-CoV-2 Virus Using Lightweight Convolutional Neural Networks. Wirel. Pers. Commun. 135(2): 941-965 (2024) - 2023
- [j26]Brijesh Kumar Chaurasia
, Harsh Raj, Shreya Singh Rathour, Piyush Bhushan Singh:
Transfer learning-driven ensemble model for detection of diabetic retinopathy disease. Medical Biol. Eng. Comput. 61(8): 2033-2049 (2023) - [j25]Gaurav Tripathi
, Vishal Krishna Singh
, Brijesh Kumar Chaurasia:
An energy-efficient heterogeneous data gathering for sensor-based internet of things. Multim. Tools Appl. 82(27): 42593-42616 (2023) - [j24]Piyush Bhushan Singh, Pawan Singh, Harsh Dev, Anil Tiwari, Devanshu Batra, Brijesh Kumar Chaurasia:
Glaucoma Classification using Light Vision Transformer. EAI Endorsed Trans. Pervasive Health Technol. 9(1) (2023) - [j23]Soumya Bajpai
, Kapil Sharma, Brijesh Kumar Chaurasia:
Intrusion Detection Framework in IoT Networks. SN Comput. Sci. 4(4): 350 (2023) - [j22]Ashish Tripathi
, Anuradha Misra, Kuldeep Kumar, Brijesh Kumar Chaurasia:
Optimized Machine Learning for Classifying Colorectal Tissues. SN Comput. Sci. 4(5): 461 (2023) - [j21]Ashish Tripathi
, Anuradha Misra, Kuldeep Kumar, Brijesh Kumar Chaurasia:
Correction: Optimized Machine Learning for Classifying Colorectal Tissues. SN Comput. Sci. 4(5): 535 (2023) - [j20]Piyush Bhushan Singh, Pawan Singh, Harsh Dev, Brijesh Kumar Chaurasia:
Glaucoma Classification Using Enhanced Deep Transfer Learning Models with Hybrid ROI Cropped Optic Disc Technique. SN Comput. Sci. 4(6): 722 (2023) - [c14]Soumya Bajpai
, Kapil Sharma, Brijesh Kumar Chaurasia:
Intrusion Detection for Internet of Vehicles using Machine Learning. ICCCNT 2023: 1-6 - [c13]Garima Misha, Bramah Hazela, Brijesh Kumar Chaurasia:
Zero Knowledge based Authentication for Internet of Medical Things. ICCCNT 2023: 1-6 - [c12]Sandeep Srivastava, Deepshikha Agarwal, Brijesh Kumar Chaurasia:
Secure Decentralized Identity Management using Blockchain. TrustCom 2023: 1355-1360 - 2021
- [j19]Mainak Adhikari, Abhishek Hazra
, Varun G. Menon, Brijesh Kumar Chaurasia, Shahid Mumtaz:
A Roadmap of Next-Generation Wireless Technology for 6G-Enabled Vehicular Networks. IEEE Internet Things Mag. 4(4): 79-85 (2021) - 2020
- [j18]Brijesh Kumar Chaurasia
, Wellington S. Manjoro, Mradul Dhakar:
Traffic Congestion Identification and Reduction. Wirel. Pers. Commun. 114(2): 1267-1286 (2020)
2010 – 2019
- 2019
- [j17]Kapil Sharma, Varsha Dixit, Brijesh Kumar Chaurasia, Shekhar Verma:
Trust computation using fuzzy analyser. Int. J. Inf. Technol. Commun. Convergence 3(3): 177-190 (2019) - [j16]Brijesh Kumar Chaurasia, Kapil Sharma
:
Trust Computation in VANET Cloud. Trans. Comput. Sci. 34: 77-95 (2019) - [j15]Brijesh Kumar Chaurasia
, Md. Iftekhar Alam, Arun Prakash
, Ranjeet Singh Tomar, Shekhar Verma
:
MPMAC: Clustering Based MAC Protocol for VANETs. Wirel. Pers. Commun. 108(1): 409-436 (2019) - 2017
- [j14]Kapil Sharma, Brijesh Kumar Chaurasia, Shekhar Verma, Arpita Bhargava:
Trust computation in VANET using TOEFV. Int. J. Trust. Manag. Comput. Commun. 4(1): 36-51 (2017) - [j13]Tafadzwa Tapuwa Chakavarika, Shashi K. Gupta
, Brijesh Kumar Chaurasia:
Energy Efficient Key Distribution and Management Scheme in Wireless Sensor Networks. Wirel. Pers. Commun. 97(1): 1059-1070 (2017) - 2015
- [j12]Brijesh Kumar Chaurasia, Ranjeet Singh Tomar, Shekhar Verma:
Using trust for lightweight communication in VANETs. Int. J. Artif. Intell. Soft Comput. 5(2): 105-116 (2015) - [j11]Gunjan Jain, S. R. Biradar, Brijesh Kumar Chaurasia:
Cluster Head Selection Heuristic Using Weight and Rank in WSN. Trans. Comput. Sci. 25: 135-147 (2015) - 2014
- [j10]Brijesh Kumar Chaurasia, Shekhar Verma
:
Secure pay while on move toll collection using VANET. Comput. Stand. Interfaces 36(2): 403-411 (2014) - 2013
- [j9]Brijesh Kumar Chaurasia, Shekhar Verma:
Privacy preserving mutual authentication in WiMAX. Int. J. Inf. Technol. Commun. Convergence 2(4): 308-320 (2013) - [j8]Laxmi Shrivastava
, Sarita S. Bhadauraia, Geetam Singh Tomar, Brijesh Kumar Chaurasia:
Secure Congestion Adaptive Routing Using Group Signature Scheme. Trans. Comput. Sci. 17: 101-115 (2013) - [j7]Brijesh Kumar Chaurasia, Shekhar Verma, Geetam Singh Tomar:
Intersection Attack on Anonymity in VANET. Trans. Comput. Sci. 17: 133-149 (2013) - [c11]Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Shekhar Verma
, Rajendra Singh Kushwah
:
Network Connectivity in VANETs. SocProS (1) 2013: 767-775 - [c10]Brijesh Kumar Chaurasia, Awanish Shahi, Shekhar Verma
:
Authentication in Cloud Computing Environment Using Two Factor Authentication. SocProS (2) 2013: 779-785 - 2012
- [j6]Brijesh Kumar Chaurasia, Shekhar Verma:
Model-based verification of privacy preserving authentication protocol for VANETs. Int. J. Inf. Technol. Commun. Convergence 2(2): 120-137 (2012) - 2011
- [j5]Brijesh Kumar Chaurasia, Shekhar Verma:
Secure toll collection in VANETs. Int. J. Inf. Technol. Commun. Convergence 1(4): 421-443 (2011) - [j4]Brijesh Kumar Chaurasia, Shekhar Verma
:
Conditional Privacy through Ring Signature in Vehicular Ad-hoc Networks. Trans. Comput. Sci. 13: 147-156 (2011) - [c9]Brijesh Kumar Chaurasia, Ranjeet Singh Tomar:
Trust Management Model for Wireless Ad Hoc Networks. SocProS (1) 2011: 201-206 - 2010
- [j3]Brijesh Kumar Chaurasia, Shekhar Verma
:
Maximising anonymity of a vehicle. Int. J. Auton. Adapt. Commun. Syst. 3(2): 198-216 (2010) - [j2]Brijesh Kumar Chaurasia, Shekhar Verma
, G. S. Tomar
:
Mechanism for Privacy Preservation in VANETS. Int. J. Grid High Perform. Comput. 2(2): 12-22 (2010) - [c8]Brijesh Kumar Chaurasia, Shekhar Verma
, G. S. Tomar
:
Infrastructure Aided Privacy Preserving-Authentication in VANETs. FGIT 2010: 74-84 - [c7]Brijesh Kumar Chaurasia, Shekhar Verma
, G. S. Tomar
:
Infrastructure Aided Privacy Preserving-Authentication in VANETs. ISA 2010: 179-189
2000 – 2009
- 2009
- [j1]Brijesh Kumar Chaurasia, Shekhar Verma
, G. S. Tomar
, Ajith Abraham:
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks. Trans. Comput. Sci. 4: 136-148 (2009) - [c6]Brijesh Kumar Chaurasia, Shekhar Verma
, Geetam Singh Tomar
, S. M. Bhaskar:
Pseudonym Based Mechanism for Sustaining Privacy in VANETs. CICSyN 2009: 420-425 - [c5]Brijesh Kumar Chaurasia, Shekhar Verma
:
Haste induced behavior and VANET communication. ICVES 2009: 19-24 - [c4]Ajit Jaiswal, Shekhar Verma
, Brijesh Kumar Chaurasia, G. S. Tomar
:
Profile based Mobility Model for Vehicular ad- hoc Networks. NaBIC 2009: 493-498 - 2008
- [c3]Brijesh Kumar Chaurasia, Shekhar Verma
:
Optimizing Pseudonym Updation for Anonymity in VANETS. APSCC 2008: 1633-1637 - [c2]G. S. Tomar
, Brijesh Kumar Chaurasia:
Modified Stream Control Transmission Protocol over Broadband High Latency Networks. Asia International Conference on Modelling and Simulation 2008: 174-179 - [c1]Brijesh Kumar Chaurasia, Shekhar Verma:
Maximizing anonymity of a vehicle through pseudonym updation. WICON 2008: 83
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint