default search action
Anirudh Paranjothi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan, Vladimir K. Poulkov:
A Comprehensive Systematic Review of Blockchain-based Intrusion Detection Systems. AIIoT 2024: 605-611 - [c11]Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li:
Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement Learning. CCNC 2024: 1-7 - [c10]Gideon Adele, Abinash Borah, Anirudh Paranjothi, Mohammad S. Khan:
A Survey and Comparative Analysis of Methods for Countering Sybil Attacks in VANETs. CCWC 2024: 178-183 - [c9]Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li:
Enabling Rural IoV Communication through Decentralized Clustering and Federated Learning. CCWC 2024: 228-234 - [c8]Chandler Scott, Mohammad S. Khan, Biju Bajracharya, Anirudh Paranjothi:
Trust-Based Security for Decentralized Clustering in IoV. SmartNets 2024: 1-4 - [i11]Mortan Thomas, Abinash Borah, Anirudh Paranjothi:
Trust-Aware Sybil Attack Detection for Resilient Vehicular Communication. CoRR abs/2411.07520 (2024) - 2023
- [c7]Abinash Borah, Anirudh Paranjothi:
Sybil Attack Detection in VANETs using Fog Computing and Beamforming. UEMCON 2023: 626-631 - [c6]Anirudh Paranjothi, Mohammad S. Khan:
Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing. VTC Fall 2023: 1-6 - [c5]Abinash Borah, Anirudh Paranjothi:
Research Issues in False Information Broadcasting Rogue Node Detection for Green VANETs. WPMC 2023: 1-6 - 2022
- [j7]Anirudh Paranjothi, Mohammed Atiquzzaman:
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing. Digit. Commun. Networks 8(5): 814-824 (2022) - 2021
- [i10]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks. CoRR abs/2102.00839 (2021) - [i9]Anirudh Paranjothi, Mohammed Atiquzzaman:
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing. CoRR abs/2108.10267 (2021) - [i8]Anirudh Paranjothi, Mohammed Atiquzzaman:
Enhancing Security in VANETs with Efficient Sybil Attack Detection using Fog Computing. CoRR abs/2108.10319 (2021) - 2020
- [j6]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j5]Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, Mohammed Atiquzzaman:
VANETomo: A congestion identification and control scheme in connected vehicles using network tomography. Comput. Commun. 151: 275-289 (2020) - [j4]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
PMCD: Platoon - Merging approach for cooperative driving. Internet Technol. Lett. 3(1) (2020) - [c4]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
F-RouND: Fog-based Rogue Nodes Detection in Vehicular Ad hoc Networks. GLOBECOM 2020: 1-6 - [i7]Anirudh Paranjothi:
Performance Analysis of Message Dissemination Techniques in VANET using Fog Computing. CoRR abs/2003.04354 (2020) - [i6]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
Survey on Congestion Detection and Control in Connected Vehicles. CoRR abs/2007.14896 (2020) - [i5]Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
Message Dissemination in Connected Vehicles. CoRR abs/2009.01634 (2020)
2010 – 2019
- 2019
- [j3]Yasmin Jahir, Mohammed Atiquzzaman, Hazem H. Refai, Anirudh Paranjothi, Peter G. LoPresti:
Routing protocols and architecture for disaster area network: A survey. Ad Hoc Networks 82: 1-14 (2019) - [j2]Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, Mohammad S. Khan:
Hybrid-Vehfog: A robust approach for reliable dissemination of critical messages in connected vehicles. Trans. Emerg. Telecommun. Technol. 30(6) (2019) - [j1]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7 (2019) - [i4]Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, Mohammad S. Khan:
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles. CoRR abs/1902.08626 (2019) - [i3]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model. CoRR abs/1906.04219 (2019) - 2018
- [c3]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment. VTC Fall 2018: 1-5 - [c2]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles Using Dynamic Fog. WWIC 2018: 311-322 - [i2]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles using Dynamic Fog. CoRR abs/1805.07662 (2018) - [i1]Anirudh Paranjothi, Mohammad S. Khan, Mohammed Atiquzzaman:
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment. CoRR abs/1807.03362 (2018) - 2016
- [c1]Anirudh Paranjothi, Mohammad S. Khan, Mais Nijim, Rajab Challoo:
MAvanet: Message authentication in VANET using social networks. UEMCON 2016: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint