Follow
Gaurav Choudhary
Title
Cited by
Cited by
Year
Study and investigation on 5G technology: A systematic review
R Dangi, P Lalwani, G Choudhary, I You, G Pau
Sensors 22 (1), 26, 2021
2362021
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
G Choudhary, V Sharma, I You, K Yim, R Chen, JH Cho
2018 14th International Wireless Communications & Mobile Computing …, 2018
1002018
Internet of Drones (IoD): threats, vulnerability, and security perspectives
G Choudhary, V Sharma, T Gupta, J Kim, I You
MobiSec’18: The 3rd International Symposium on Mobile Internet Security, 2018
972018
An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system
I You, S Kwon, G Choudhary, V Sharma, JT Seo
Sensors 18 (6), 1888, 2018
712018
Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot)
V Sharma, G Choudhary, Y Ko, I You
IEEE Access 6, 43368-43383, 2018
692018
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol
G Choudhary, V Sharma, I You
Computers & Electrical Engineering 74, 59-73, 2019
682019
De-LADY: Deep learning based Android malware detection using Dynamic features
V Sihag, M Vardhan, P Singh, G Choudhary, S Son
Journal of Internet Services and Information Security (JISIS) 11 (2), 34-45, 2021
572021
Security of 5g-mobile backhaul networks: a survey
G Choudhary, J Kim, V Sharma
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2019
472019
Ml-based 5g network slicing security: A comprehensive survey
R Dangi, A Jadhav, G Choudhary, N Dragoni, MK Mishra, P Lalwani
Future Internet 14 (4), 116, 2022
432022
Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance
G Dave, G Choudhary, V Sihag, I You, KKR Choo
Computers & Security, 102516, 2022
402022
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices
S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You
IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022
372022
Security of zero trust networks in cloud computing: A comparative review
S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim
Sustainability 14 (18), 11213, 2022
332022
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems
G Choudhary, PV Astillo, I You, K Yim, R Chen, JH Cho
IEEE Transactions on Network and Service Management, 2020
312020
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling
A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni
Applied Sciences 12 (3), 976, 2022
272022
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks
G Choudhary, V Sharma
5G enabled secure wireless networks, 69-102, 2019
262019
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications
V Sharma, G Choudhary, I You, JD Lim, JN Kim
Journal of Internet Technology 19 (2), 515-530, 2018
222018
Misbehavior detection of embedded IoT devices in medical cyber physical systems
I You, K Yim, V Sharma, G Choudhary, IR Chen, JH Cho
Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018
212018
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system
PV Astillo, G Choudhary, DG Duguma, J Kim, I You
IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021
172021
On IoT misbehavior detection in cyber physical systems
I You, K Yim, V Sharma, G Choudhary, R Chen, JH Cho
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
172018
PICAndro: Packet InspeCtion-Based Android Malware Detection
V Sihag, G Choudhary, M Vardhan, P Singh, JT Seo
Security and Communication Networks 2021, 2021
162021
The system can't perform the operation now. Try again later.
Articles 1–20