


default search action
Rahul Saha
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j53]Amandeep Verma, Rahul Saha, Gulshan Kumar, Alessandro Brighente, Mauro Conti, Tai-Hoon Kim:
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches. IEEE Access 13: 23556-23579 (2025) - 2024
- [j52]Archana Chhabra
, Rahul Saha
, Gulshan Kumar
, Tai-Hoon Kim
:
Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval. IEEE Access 12: 32089-32110 (2024) - [j51]Amandeep Verma, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j50]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j49]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti
:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024) - [j48]Archana Chhabra, Rahul Saha, Gulshan Kumar:
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. Clust. Comput. 27(6): 8189-8206 (2024) - [j47]PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti
:
MADESANT: malware detection and severity analysis in industrial environments. Clust. Comput. 27(8): 11347-11367 (2024) - [j46]Amandeep Verma
, Rahul Saha
, Gulshan Kumar, Mauro Conti
:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024) - [j45]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Reji Thomas:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024) - [j44]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024) - [j43]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 21(6): 5694-5705 (2024) - [j42]Amandeep Verma, Rahul Saha
, Gulshan Kumar, Mauro Conti
, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024) - 2023
- [j41]Gulshan Kumar
, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j40]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti
, Xiaochun Cheng
:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j39]Irfan Ahmad Rather
, Gulshan Kumar, Rahul Saha:
Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system. Int. J. Commun. Syst. 36(9) (2023) - [j38]Rekha Goyat
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Rahul Saha
, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j37]Rahul Saha
, Gulshan Kumar
, Tannishtha Devgun, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Blockchain Framework in Post-Quantum Decentralization. IEEE Trans. Serv. Comput. 16(1): 1-12 (2023) - [j36]Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - 2022
- [j35]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tai-Hoon Kim
:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j34]PLS Jayalaxmi, Rahul Saha
, Gulshan Kumar
, Tai-Hoon Kim:
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things. Comput. Electr. Eng. 97: 107610 (2022) - [j33]PLS Jayalaxmi, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j32]Rahul Saha
, Gulshan Kumar
, Neeraj Kumar
, Tai-Hoon Kim
, Tannishtha Devgun, Reji Thomas
, Ahmed Barnawi
:
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment. IEEE Internet Things J. 9(5): 3631-3641 (2022) - [j31]Rekha Goyat
, Gulshan Kumar
, Mamoun Alazab
, Mauro Conti
, Mritunjay Kumar Rai
, Reji Thomas
, Rahul Saha
, Tai-Hoon Kim
:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j30]Mauro Conti
, Gulshan Kumar
, Pranav Nerurkar, Rahul Saha
, Luigi Vigneri
:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j29]Ashish Kumar, Rahul Saha
, Mauro Conti
, Gulshan Kumar
, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j28]Arshdeep Singh, Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Mamoun Alazab, Reji Thomas
:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j27]Amandeep Verma
, Rahul Saha
, Neeraj Kumar
, Gulshan Kumar, Tai-Hoon Kim:
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multim. Tools Appl. 81(14): 19879-19944 (2022) - [j26]Rahul Saha
, Gulshan Kumar
, Mauro Conti
, Tannishtha Devgun, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - 2021
- [j25]PLS Jayalaxmi
, Rahul Saha
, Gulshan Kumar
, Neeraj Kumar
, Tai-Hoon Kim
:
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 9: 25344-25359 (2021) - [j24]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, William J. Buchanan
, Tannishtha Devgun, Reji Thomas
:
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access 9: 100972-100980 (2021) - [j23]Gulshan Kumar, Rahul Saha
, Chhagan Lal, Mauro Conti
:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021) - [j22]Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. Future Gener. Comput. Syst. 125: 221-231 (2021) - [j21]Rahul Saha
, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim:
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks. Int. J. Inf. Comput. Secur. 16(3/4): 226-238 (2021) - [j20]Rahul Saha
, Gulshan Kumar
, G. Geetha
, Tai-Hoon Kim
, Mamoun Alazab
, Reji Thomas
, Mritunjay Kumar Rai
, Joel J. P. C. Rodrigues
:
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface. IEEE Trans. Veh. Technol. 70(8): 7495-7508 (2021) - 2020
- [j19]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mamoun Alazab
, William J. Buchanan
, Mritunjay Kumar Rai
, G. Geetha
, Reji Thomas
:
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access 8: 94748-94756 (2020) - [j18]Tai-Hoon Kim
, Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
:
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access 8: 96455-96467 (2020) - [j17]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface. IEEE Internet Things J. 7(8): 7783-7794 (2020) - [j16]Ashish Kumar, Rahul Saha
, Mamoun Alazab
, Gulshan Kumar:
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things. J. Inf. Secur. Appl. 55: 102662 (2020) - [j15]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, Reji Thomas
, Tai-Hoon Kim
:
A Lattice Signcrypted Secured Localization in Wireless Sensor Networks. IEEE Syst. J. 14(3): 3949-3956 (2020) - [j14]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai
, William J. Buchanan
, Reji Thomas
, G. Geetha
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 69(7): 7707-7722 (2020) - 2019
- [j13]Rahul Saha
, Gulshan Kumar
, Mritunjay Kumar Rai, Reji Thomas, Se-Jung Lim:
Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications. IEEE Access 7: 44536-44543 (2019) - [j12]Rahul Saha
, G. Geetha
, Gulshan Kumar
, Tai-Hoon Kim
, William J. Buchanan
:
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access 7: 172045-172054 (2019) - [j11]Tai-Hoon Kim
, Rekha Goyat, Mritunjay Kumar Rai
, Gulshan Kumar
, William J. Buchanan
, Rahul Saha
, Reji Thomas
:
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 7: 184133-184144 (2019) - [j10]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
:
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 6(4): 6835-6842 (2019) - [j9]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim
, Se-Jung Lim
, Jai Sukh Paul Singh
:
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set. Sensors 19(2): 376 (2019) - [j8]Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar
, Rahul Saha
, Tai-Hoon Kim
:
Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks. Sensors 19(16): 3603 (2019) - 2018
- [j7]Gulshan Kumar
, Rahul Saha
, Mritunjay Kumar Rai, Tai-Hoon Kim
:
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication. IEEE Access 6: 46558-46567 (2018) - [j6]Gulshan Kumar
, Mritunjay Kumar Rai
, Rahul Saha
, Hye-Jin Kim:
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks. Int. J. Distributed Sens. Networks 14(1) (2018) - [j5]Gulshan Kumar
, Rahul Saha
, Mandeep Singh, Mritunjay Kumar Rai:
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. Int. J. Inf. Secur. Priv. 12(1): 53-62 (2018) - [j4]Rahul Saha
, G. Geetha, Gulshan Kumar
, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Secur. Commun. Networks 2018: 9802475:1-9802475:11 (2018) - 2017
- [j3]Gulshan Kumar
, Mritunjay Kumar Rai, Rahul Saha
:
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks. J. Netw. Comput. Appl. 99: 10-16 (2017) - [j2]Gulshan Kumar
, Mritunjay Kumar Rai
, Hye-Jin Kim
, Rahul Saha
:
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks. Mob. Inf. Syst. 2017: 3243570:1-3243570:12 (2017) - 2015
- [j1]Rahul Saha
, G. Geetha, Gulshan Kumar
:
Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence. Int. J. Cyber Behav. Psychol. Learn. 5(4): 53-61 (2015)
Conference and Workshop Papers
- 2024
- [c9]Archana Chhabra, Rahul Saha, Mauro Conti:
PITCOR: Privacy-assured Time-controlled Revocation in Blockchain Transactions. BCCA 2024: 141-148 - 2023
- [c8]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha, Tai-Hoon Kim:
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model. AICV 2023: 535-549 - 2022
- [c7]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha:
Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network. ACM 2022: 86-101 - [c6]Arshdeep Singh, Rahul Saha
, Mauro Conti
, Gulshan Kumar:
PoSC: Combined Score for Consensus in Intemet-of-Things Applications. BCCA 2022: 173-180 - [c5]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6 - [c4]PLS Jayalaxmi, Rahul Saha, Lalit Garg, Gulshan Kumar:
SID-RIS: Cascaded Intrusion Detection System for Industrial Internet of Things. WAI 2022: 20-32 - 2021
- [c3]Rahul Saha
, Gulshan Kumar, Alessandro Brighente, Mauro Conti
:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33 - [c2]Alessandro Brighente, Mauro Conti
, Gulshan Kumar, Reza Ghanbari, Rahul Saha
:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439 - 2011
- [c1]Rahul Saha
, G. Geetha, Gang-soo Lee:
CLAPTCHA- A Novel Captcha. FGIT-SecTech 2011: 94-100
Editorship
- 2023
- [e1]Geetha Ganesan, Sudip Roy, Rahul Saha:
Proceedings of the Workshop on Control and Embedded Systems (WCES 2022) Co-located with TOOTILL 100 - International Conference on Computing Sciences (ICCS 2022), Chennai, India, April 22 - 24, 2022 (Later changed to Online due to COVID-19 Pandemic). CEUR Workshop Proceedings 3314, CEUR-WS.org 2023 [contents]
Informal and Other Publications
- 2024
- [i5]Arindam Majee, Rahul Saha, Snehasish Roy, Srilekha Mandal, Sayan Chatterjee:
Swarm UAVs Communication. CoRR abs/2405.00024 (2024) - 2023
- [i4]Nilay Patel, Rahul Saha, Jeffrey Flanigan
:
A New Approach Towards Autoformalization. CoRR abs/2310.07957 (2023) - [i3]Sean Welleck, Rahul Saha:
LLMSTEP: LLM proofstep suggestions in Lean. CoRR abs/2310.18457 (2023) - 2020
- [i2]Gulshan Kumar, Rahul Saha, William J. Buchanan, G. Geetha, Reji Thomas, Tai-Hoon Kim, Mamoun Alazab:
Decentralized Accessibility of e-commerce Products through Blockchain Technology. CoRR abs/2007.05265 (2020) - 2011
- [i1]Rahul Saha, G. Geetha:
Identifying Reference Objects by Hierarchical Clustering in Java Environment. CoRR abs/1110.3379 (2011)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-24 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint