default search action
Sujata Pal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Vidushi Agarwal, Sujata Pal:
HierChain: A Hierarchical-Blockchain-Based Data Management System for Smart Healthcare. IEEE Internet Things J. 11(2): 2924-2934 (2024) - [j15]Vidushi Agarwal, Shruti Mishra, Sujata Pal:
Towards a Sustainable Blockchain: A Peer-to-Peer Federated Learning based Approach. ACM Trans. Internet Techn. 24(4): 1-26 (2024) - [j14]Vidushi Agarwal, Omid Ardakanian, Sujata Pal:
A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring. IEEE Trans. Sustain. Comput. 9(5): 766-777 (2024) - [c23]Shruti Mishra, Sujata Pal, Sweta Dey:
BlasT: Blood Clot Classification Model Using Transfer Learning Based Convolutional Neural Network. COMSNETS 2024: 80-85 - 2023
- [j13]Vivek Sethi, Sujata Pal:
FedDOVe: A Federated Deep Q-learning-based Offloading for Vehicular fog computing. Future Gener. Comput. Syst. 141: 96-105 (2023) - [j12]Avani Vyas, Sujata Pal:
Power Saving Approach of a Smart Watch for Monitoring the Heart Rate of a Runner. IEEE Trans. Consumer Electron. 69(3): 490-498 (2023) - [j11]Priyanka Kamboj, Sujata Pal, Samaresh Bera, Sudip Misra:
QoS-Aware Multipath Routing in Software-Defined Networks. IEEE Trans. Netw. Sci. Eng. 10(2): 723-732 (2023) - [c22]Sweta Dey, Sujata Pal:
Controlling Air Pollution in Data Centers using Green Data Centers. CCGridW 2023: 200-205 - [c21]Shruti Mishra, Sujata Pal:
EAR: An Energy Efficient Human Activity Recognition from Wearable Devices. GLOBECOM (Workshops) 2023: 1826-1831 - [c20]Gagandeep Shubham, Vidushi Agarwal, Sujata Pal:
IoT Data Security: An Integration of Blockchain and Federated Learning. ICC Workshops 2023: 434-439 - [c19]Vidushi Agarwal, Sujata Pal:
FLEC: Federated Learning for Cloud/Edge-Based Smart Industry via Batch Normalization. ICC Workshops 2023: 1576-1581 - 2022
- [j10]Avani Vyas, Sujata Pal, Barun Kumar Saha:
Relay-based Communications in WBANs: A Comprehensive Survey. ACM Comput. Surv. 54(1): 2:1-2:34 (2022) - [j9]Vivek Sethi, Sujata Pal, Avani Vyas, Shweta Jain, Kshirasagar Naik:
Energy-and-delay-aware scheduling and load balancing in vehicular fog networks. Telecommun. Syst. 81(3): 373-387 (2022) - [c18]Vivek Sethi, Sujata Pal:
MobiCache: a mobility-aware caching technique in vehicular edge computing. MobiCom 2022: 868-870 - [c17]Sweta Dey, Sujata Pal:
Federated learning-based air quality prediction for smart cities using BGRU model. MobiCom 2022: 871-873 - [c16]Priyanka Kamboj, Sujata Pal:
Energy-Aware Routing in SDN Enabled Data Center Network. NCA 2022: 123-130 - 2021
- [j8]Priyanka Kamboj, Shivang Khare, Sujata Pal:
User authentication using Blockchain based smart contract in role-based access control. Peer-to-Peer Netw. Appl. 14(5): 2961-2976 (2021) - [j7]Priyanka Kamboj, Sujata Pal:
A policy based framework for quality of service management in software defined networks. Telecommun. Syst. 78(3): 331-349 (2021) - [c15]Shrikant Saxena, Shivang Khare, Sujata Pal:
A Blockchain and Machine Learning based IoT Framework to Improve Contract Farming. GLOBECOM (Workshops) 2021: 1-6 - [c14]Shrikant Saxena, Shivang Khare, Sujata Pal, Vidushi Agarwal:
Analyzing the Spread of Infectious Disease Using a Probabilistic Model. ICC Workshops 2021: 1-6 - [c13]Vivek Sethi, Sujata Pal:
Controlling Spread of COVID-19 Using VANETs. ICC 2021: 1-6 - [c12]Priyanka Kamboj, Sujata Pal, Ambika Mehra:
A QoS-aware Routing based on Bandwidth Management in Software-Defined IoT Network. MASS 2021: 579-584 - 2020
- [j6]Neeraj Sharma, Junghyun Jun, Sujata Pal:
Mitigating the effect of negative link correlation on contention mechanism of MAC protocols in wireless sensor networks. IET Commun. 14(22): 4007-4013 (2020) - [c11]Avani Vyas, Sujata Pal:
Exploiting Redundancy and Mobility in Energy-Efficient Communication for WBANs. ICDCN 2020: 24:1-24:8 - [c10]Vineet Mehta, Abhinav Dhall, Sujata Pal, Shehroz S. Khan:
Motion and Region Aware Adversarial Learning for Fall Detection with Thermal Imaging. ICPR 2020: 6321-6328 - [c9]Vidushi Agarwal, Sujata Pal, Neeraj Sharma, Vivek Sethi:
Identification of Defective Nodes in Cyber-Physical Systems. MASS 2020: 20-25 - [c8]Vidushi Agarwal, Sujata Pal:
Blockchain meets IoT: A Scalable Architecture for Security and Maintenance. MASS 2020: 53-61 - [c7]Vivek Sethi, Sujata Pal, Avani Vyas:
Online Energy-efficient Scheduling Algorithm for Renewable Energy-powered Roadside units in VANETs. MASS 2020: 506-514 - [p1]Avani Vyas, Sujata Pal:
Preventing Security and Privacy Attacks in WBANs. Handbook of Computer Networks and Cyber Security 2020: 201-225 - [i1]Vineet Mehta, Abhinav Dhall, Sujata Pal, Shehroz S. Khan:
Motion and Region Aware Adversarial Learning for Fall Detection with Thermal Imaging. CoRR abs/2004.08352 (2020)
2010 – 2019
- 2019
- [c6]Amit Behal, Avani Vyas, Sujata Pal:
Local Traffic Optimization by Exploiting the Mobility of Smart Devices. COMSNETS 2019: 690-694 - [c5]Nikhil Jangamreddy, Vivek Sethi, Sujata Pal:
Web-Based Gesture Recognition System for Controlling Heterogeneous IoT devices using Deep Learning. COMSNETS 2019: 700-702 - [c4]Priyanka Kamboj, Sujata Pal:
QoS in software defined IoT network using blockchain based smart contract: poster abstract. SenSys 2019: 430-431 - 2018
- [c3]Sujata Pal, Anindo Ghosh, Vivek Sethi:
Vehicle Air Pollution Monitoring Using IoTs. SenSys 2018: 400-401 - 2017
- [j5]Sujata Pal, Barun Kumar Saha, Sudip Misra:
Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks. IEEE Trans. Cybern. 47(12): 4463-4474 (2017) - [j4]Barun Kumar Saha, Sudip Misra, Sujata Pal:
SeeR: Simulated Annealing-Based Routing in Opportunistic Mobile Networks. IEEE Trans. Mob. Comput. 16(10): 2876-2888 (2017) - 2016
- [b1]Sudip Misra, Barun Kumar Saha, Sujata Pal:
Opportunistic Mobile Networks - Advances and Applications. Computer Communications and Networks, Springer 2016, ISBN 978-3-319-29029-4, pp. 3-276 - [j3]Barun Kumar Saha, Sudip Misra, Sujata Pal:
Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks. IEEE Trans. Computers 65(4): 1310-1322 (2016) - 2015
- [j2]Sujata Pal, Sudip Misra:
DISIDE: Distributed strategy identification in opportunistic mobile networks. Comput. Commun. 71: 119-128 (2015) - [j1]Sudip Misra, Sujata Pal, Barun Kumar Saha:
Distributed Information-Based Cooperative Strategy Adaptationin Opportunistic Mobile Networks. IEEE Trans. Parallel Distributed Syst. 26(3): 724-737 (2015) - [c2]Sujata Pal, Sudip Misra:
Contact-based routing in DTNs. IMCOM 2015: 3:1-3:6 - 2013
- [c1]Sujata Pal, Sudip Misra, Barun Kumar Saha:
Rock-Scissors-Paper cycle of cooperation strategies in Opportunistic Mobile Networks. ICC Workshops 2013: 1062-1066
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint