default search action
Shivani Gaba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sheshikala Martha, Jebreel Khurmi, Akansha Singh, Krishna Kant Singh, Sameh S. Askar, Mohamed Abouhawwash:
A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems. IEEE Access 12: 6017-6035 (2024) - [j7]Shally Nagpal, Shivani Gaba, Ishan Budhiraja, Meenakshi Sharma, Akansha Singh, Krishna Kant Singh, S. Sameh Aksar, Mohamed Abouhawwash, Celestine Iwendi:
Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains. IEEE Access 12: 132317-132331 (2024) - [j6]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sahil Garg, Mohammad Mehedi Hassan:
An innovative multi-agent approach for robust cyber-physical systems using vertical federated learning. Ad Hoc Networks 163: 103578 (2024) - [j5]Ashima Yadav, Shivani Gaba, Haneef Khan, Ishan Budhiraja, Akansha Singh, Krishna Kant Singh:
ETMA: Efficient Transformer-Based Multilevel Attention Framework for Multimodal Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 5015-5027 (2024) - [c5]Shivani Gaba, Ishan Budhiraja, Vimal Kumar:
Improving Security and Privacy in Advanced Federated Learning Environments for Cyber-Physical Systems. ICC Workshops 2024: 1822-1827 - 2023
- [j4]Shivani Gaba, Haneef Khan, Khalid J. Almalki, Abdoh M. A. Jabbari, Ishan Budhiraja, Vimal Kumar, Akansha Singh, Krishna Kant Singh, Sameh S. Askar, Mohamed Abouhawwash:
Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications. IEEE Access 11: 81205-81223 (2023) - [j3]Ahmed Barnawi, Shivani Gaba, Anna Alphy, Abdoh M. A. Jabbari, Ishan Budhiraja, Vimal Kumar, Neeraj Kumar:
A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces. Neural Comput. Appl. 35(25): 18293-18308 (2023) - [c4]Shivani Gaba, Anushka Nehra, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
An Optimized Approach for Intrusion Detection in Internet of Softwarized Things. ICC Workshops 2023: 648-653 - 2022
- [j2]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Sahil Garg, Georges Kaddoum, Mohammad Mehedi Hassan:
A federated calibration scheme for convolutional neural networks: Models, applications and challenges. Comput. Commun. 192: 144-162 (2022) - [j1]Alankrita Aggarwal, Shivani Gaba, Shally Chawla, Anoopa Arya:
Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With ANN. Int. J. Secur. Priv. Pervasive Comput. 14(1): 1-11 (2022) - [c3]Shivani Gaba, Ishan Budhiraja, Aaisha Makkar, Deepak Garg:
Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking. ICC Workshops 2022: 260-264 - [c2]Alankrita Aggarwal, Shivani Gaba, Pardeep Singh, Shally Chawla:
Character Recognition using Approaches of Artificial Neural Network: A Review. ITTAP 2022: 186-193 - [c1]Shivani Gaba, Ishan Budhiraja, Vimal Kumar, Aaisha Makkar:
Federated Learning Based Secured Computational Offloading in Cyber-Physical IoST Systems. RTIP2R 2022: 344-355 - [i1]Ashima Yadav, Shivani Gaba, Ishan Budhiraja, Neeraj Kumar:
ETMA: Efficient Transformer Based Multilevel Attention framework for Multimodal Fake News Detection. CoRR abs/2206.07331 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint