Stock market prediction using machine learning I Parmar, N Agarwal, S Saxena, R Arora, S Gupta, H Dhiman, L Chouhan 2018 first international conference on secure cyber computing and …, 2018 | 154 | 2018 |
Tabu Search Algorithm (TSA): A Comprehensive Survey VK Prajapati, M Jain, L Chouhan 3rd International Conference on Emerging Technologies in Computer …, 2020 | 58 | 2020 |
Cryptographic and Information Security Approaches for Images and Videos S Ramakrishnan CRC Press, 2018 | 52 | 2018 |
A secure authentication scheme for IoT application in smart home P Kumar, L Chouhan Peer-to-Peer Networking and Applications 14 (1), 420-438, 2021 | 40 | 2021 |
A privacy and session key based authentication scheme for medical IoT networks P Kumar, L Chouhan Computer Communications 166, 154-164, 2021 | 38 | 2021 |
Evolution in Computational Intelligence V Bhateja, SL Peng, SC Satapathy, YD Zhang Springer, 2021 | 37* | 2021 |
Blockchain: a decentralized technique for securing Internet of Things A Songara, L Chouhan Conference on Emerging Trends in Engineering Innovations & Technology …, 2017 | 28 | 2017 |
A Survey on Cloud Computing Security Issues and Cryptographic Techniques, V Agarwal, AK Kaushal, L Chouhan International Conference on Social Networking and Computational Intelligence …, 2019 | 25 | 2019 |
A comprehensive survey of fake news in social networks: Attributes, features, and detection approaches MR Kondamudi, SR Sahoo, L Chouhan, N Yadav Journal of King Saud University-Computer and Information Sciences 35 (6), 101571, 2023 | 23 | 2023 |
Big data analytics for smart and connected cities N Dey, S Tamane IGI Global, 2018 | 17 | 2018 |
Priority based MAC scheme for cognitive radio network: A queuing theory modelling L Chouhan, A Trivedi 2012 Ninth International Conference on Wireless and Optical Communications …, 2012 | 17 | 2012 |
Secure and trusted algorithm for cognitive radio network R Dubey, S Sharma, L Chouhan 2012 Ninth International Conference on Wireless and Optical Communications …, 2012 | 17 | 2012 |
Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network P Kumar, L Chouhan Transactions on Emerging Telecommunications Technologies 32 (5), e3993, 2021 | 11 | 2021 |
A survey on cloud federation architecture and challenges L Chouhan, P Bansal, B Lauhny, Y Chaudhary Social Networking and Computational Intelligence: Proceedings of SCI-2018, 51-65, 2020 | 11 | 2020 |
Crime prediction and analysis A Gahalot, S Dhiman, L Chouhan 2nd International Conference on Data, Engineering and Applications (IDEA), 1-6, 2020 | 10 | 2020 |
Cognitive radio and interference management: Technology and Strategy: Technology and Strategy ML Ku Igi Global, 2012 | 8 | 2012 |
Cognitive Radio Networks: Implementation and Application issues in India L Chouhan, L Trivedi | 7 | 2012 |
MAC Layer Protocols for Cognitive Radio Networks L Chouhan, A Trivedi Self-Organization and Green Applications in Cognitive Radio Networks 1, 154-189, 2013 | 6* | 2013 |
Lokesh Chouhan Department of Computer Science and Engineering National Institute of Technology I Parmar, N Agarwal, S Saxena, R Arora, S Gupta, H Dhiman Hamirpur–177005, INDIA-Stock Market Prediction Using Machine Learning, 0 | 6 | |
Security for Cognitive Radio Networks R Dubey, S Sharma, L Chouhan Cognitive Radio and Interference Management: Technology and Strategy 1, 238-256, 2013 | 5 | 2013 |