![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Lokesh Chouhan
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Medeswara Rao Kondamudi, Somya Ranjan Sahoo, Lokesh Chouhan, Nandakishor Yadav:
A comprehensive survey of fake news in social networks: Attributes, features, and detection approaches. J. King Saud Univ. Comput. Inf. Sci. 35(6): 101571 (2023) - 2021
- [j8]Pankaj Kumar, Lokesh Chouhan
:
A privacy and session key based authentication scheme for medical IoT networks. Comput. Commun. 166: 154-164 (2021) - [j7]Pankaj Kumar
, Lokesh Chouhan
:
Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j6]Pankaj Kumar, Lokesh Chouhan
:
A secure authentication scheme for IoT application in smart home. Peer-to-Peer Netw. Appl. 14(1): 420-438 (2021) - 2020
- [j5]Pankaj Kumar, Lokesh Chouhan:
A Small World Phenomenon Based Greedy Network Model for Robust IoT Network. Ad Hoc Sens. Wirel. Networks 48(3-4): 221-247 (2020) - [j4]Lokesh Chouhan
, Nancy Chauhan, Amitosh Swain Mahapatra, Vidushi Agarwal:
A survey on the applications of machine learning in wireless sensor networks. Int. J. High Perform. Comput. Netw. 16(4): 197-220 (2020)
2010 – 2019
- 2018
- [j3]Lokesh Chouhan
, H. S. Lalventhangi:
Adaptive Energy Detection Based Solution for Fronthaul Problem in C-RAN. Wirel. Pers. Commun. 103(4): 2743-2755 (2018) - 2016
- [j2]Lokesh Chouhan
, Aditya Trivedi:
Performance study of a CSMA based multiuser MAC protocol for cognitive radio networks: analysis of channel utilization and opportunity perspective. Wirel. Networks 22(1): 33-47 (2016) - 2015
- [j1]Jayanti Rastogi, Lokesh Chouhan
, Aditya Trivedi:
Multichannel CSMA Based MAC Scheme for Unsaturated Cognitive Radio Networks: Performance Study of the Opportunity and Contention Window. Wirel. Pers. Commun. 85(3): 1279-1294 (2015) - 2013
- [c3]Lokesh Chouhan
, Aditya Trivedi:
Analysis of MAC schemes for cognitive radio network: Perfect and imperfect learning modelling. WOCN 2013: 1-6 - 2012
- [c2]Lokesh Chouhan
, Aditya Trivedi:
Priority based MAC scheme for cognitive radio network: A queuing theory modelling. WOCN 2012: 1-5 - [c1]Rajni Dubey, Sanjeev Sharma, Lokesh Chouhan
:
Secure and trusted algorithm for cognitive radio network. WOCN 2012: 1-7
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint