default search action
Umesh Kumar Lilhore
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Nisha Devi, Sandeep Dalal, Kamna Solanki, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Nasratullah Nuristani:
A systematic literature review for load balancing and task scheduling techniques in cloud computing. Artif. Intell. Rev. 57(10): 276 (2024) - [j24]Sumit, Rajender Singh Chhillar, Sandeep Dalal, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Samiya:
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm. Clust. Comput. 27(5): 7023-7048 (2024) - [j23]Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya:
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Comput. Secur. 136: 103560 (2024) - [j22]Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Yogesh Kumar Sharma:
An adaptive mobility-aware secure handover and scheduling protocol for Earth Observation (EO) communication using fog computing. Earth Sci. Informatics 17(3): 2429-2446 (2024) - [j21]Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Neetu Faujdar, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Abdullah Algarni:
Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation. J. Cloud Comput. 13(1): 126 (2024) - [j20]Umesh Kumar Lilhore, Sarita Simiaya, Musaed A. Alhussein, Neetu Faujdar, Surjeet Dalal, Khursheed Aurangzeb:
Optimizing protein sequence classification: integrating deep learning models with Bayesian optimization for enhanced biological analysis. BMC Medical Informatics Decis. Mak. 24(1): 236 (2024) - [j19]Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Robertas Damasevicius:
A smart waste classification model using hybrid CNN-LSTM with transfer learning for sustainable environment. Multim. Tools Appl. 83(10): 29505-29529 (2024) - [j18]Umesh Kumar Lilhore, Surjeet Dalal, Neetu Faujdar, Sarita Simaiya, Mamta Dahiya, Shilpi Tomar, Arshad Hashmi:
Unveiling the prevalence and risk factors of early stage postpartum depression: a hybrid deep learning approach. Multim. Tools Appl. 83(26): 68281-68315 (2024) - [j17]Surjeet Dalal, Umesh Kumar Lilhore, Nidhi Sharma, Shakti Arora, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency. PeerJ Comput. Sci. 10: e1939 (2024) - 2023
- [j16]Sumit Kumar Rana, Arun Kumar Rana, Sanjeev Kumar Rana, Vishnu Sharma, Umesh Kumar Lilhore, Osamah Ibrahim Khalaf, Antonino Galletta:
Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain. IEEE Access 11: 83289-83300 (2023) - [j15]Amit Malik, Edeh Michael Onyema, Surjeet Dalal, Umesh Kumar Lilhore, Darpan Anand, Ashish Sharma, Sarita Simaiya:
Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model. Array 19: 100303 (2023) - [j14]Surjeet Dalal, M. Poongodi, Umesh Kumar Lilhore, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud, Sarita Simaiya:
Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans. Emerg. Telecommun. Technol. 34(6) (2023) - [j13]Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed Alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar:
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J. Cloud Comput. 12(1): 14 (2023) - [j12]Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya, Dayang Norhayati Abang Jawawi, Deema Mohammed Alsekait, Sachin Ahuja, Cresantus Biamba, Mounir Hamdi:
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing. J. Cloud Comput. 12(1): 85 (2023) - [j11]Surjeet Dalal, Umesh Kumar Lilhore, Neetu Foujdar, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. J. Cloud Comput. 12(1): 137 (2023) - [j10]Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. J. Cloud Comput. 12(1): 144 (2023) - [j9]Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed Alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar:
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J. Cloud Comput. 12(1): 166 (2023) - [j8]Ashima Kukkar, Umesh Kumar Lilhore, Jaroslav Frnda, Jasminder Kaur Sandhu, Rashmi Das, Nitin Goyal, Arun Kumar, Kamalakanta Muduli, Filip Rezac:
ProRE: An ACO- based programmer recommendation model to precisely manage software bugs. J. King Saud Univ. Comput. Inf. Sci. 35(1): 483-498 (2023) - [j7]Surjeet Dalal, Umesh Kumar Lilhore, Poongodi Manoharan, Uma Rani, Fadl Dahan, Fahima Hajjej, Ismail Keshta, Ashish Sharma, Sarita Simaiya, Kaamran Raahemifar:
An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering. Sensors 23(18): 7816 (2023) - [j6]Umesh Kumar Lilhore, Poongodi Manoharan, Sarita Simaiya, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Surjeet Dalal, Ashish Sharma, Kaamran Raahemifar:
HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors 23(18): 7856 (2023) - 2022
- [j5]Manjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, Mounir Hamdi:
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography. Comput. Electr. Eng. 102: 108205 (2022) - [j4]Manjari Singh Rathore, M. Poongodi, Praneet Saurabh, Umesh Kumar Lilhore, Sami Bourouis, Wajdi Alhakami, Jude Osamor, Mounir Hamdi:
Corrigendum to "A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography" CAEE, Volume 102, September 2022, 108205. Comput. Electr. Eng. 103: 108387 (2022) - [j3]Umesh Kumar Lilhore, Osamah Ibrahim Khalaf, Sarita Simaiya, Carlos Andrés Tavera Romero, Ghaida Muttashar Abdulsahib, Poongodi M, Dinesh Kumar:
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Int. J. Distributed Sens. Networks 18(9): 155013292211171 (2022) - [j2]Umesh Kumar Lilhore, Agbotiname Lucky Imoize, Chun-Ta Li, Sarita Simaiya, Subhendu Kumar Pani, Nitin Goyal, Arun Kumar Rana, Cheng-Chi Lee:
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities. Sensors 22(8): 2908 (2022) - [j1]Amit Kumar Balyan, Sachin Ahuja, Umesh Kumar Lilhore, Sanjeev Kumar Sharma, Poongodi Manoharan, Abeer D. Algarni, Hela Elmannai, Kaamran Raahemifar:
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method. Sensors 22(16): 5986 (2022)
2010 – 2019
- 2012
- [c1]Umesh Kumar Lilhore, Praneet Saurabh, Bhupendra Verma:
A New Approach to Overcome Problem of Congestion in Wireless Networks. ISI 2012: 499-506
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint