Credit card fraud detection using anomaly techniques VC Sharmila, K Kumar, R Sundaram, D Samyuktha, R Harish 2019 1st International Conference on Innovations in Information and …, 2019 | 23 | 2019 |
Water management using genetic algorithm-based machine learning SG Gino Sophia, V Ceronmani Sharmila, S Suchitra, T Sudalai Muthu, ... Soft computing 24, 17153-17165, 2020 | 19 | 2020 |
Role of artificial intelligence based chat generative pre-trained transformer (chatgpt) in cyber security SG Prasad, VC Sharmila, MK Badrinarayanan 2023 2nd International Conference on Applied Artificial Intelligence and …, 2023 | 17 | 2023 |
An survey on DNA based cryptography BB Raj, VC Sharmila 2018 International Conference on Emerging Trends and Innovations In …, 2018 | 14 | 2018 |
Construction of strategic connected dominating set for mobile ad hoc networks VC Sharmila, A George Journal of Computer Science 10 (2), 285, 2014 | 12 | 2014 |
Zadeh max–min composition fuzzy rule for dominated pixel values in iris localization SG Gino Sophia, V Ceronmani Sharmila Soft Computing 23, 1873-1889, 2019 | 10 | 2019 |
QoS-aware service migration in multi-access edge compute using closed-loop adaptive particle swarm optimization algorithm S Velrajan, V Ceronmani Sharmila Journal of Network and Systems Management 31 (1), 17, 2023 | 9 | 2023 |
Virtual machine security problems and countermeasures for improving quality of service in cloud computing S Mahipal, VC Sharmila 2021 International Conference on Artificial Intelligence and Smart Systems …, 2021 | 9 | 2021 |
QoS management in multi-access edge compute S Velrajan, VC Sharmila 2021 5th International Conference on Computing Methodologies and …, 2021 | 5 | 2021 |
Efficient Mutual User Authentication Protocol to Share Files Using ID in Cloud Storage K Sujatha, VC SHARMILA Journal of Theoretical and Applied Information Technology 98 (20), 2020 | 5 | 2020 |
Detecting Trojan attacks on deep neural networks J Singh, VC Sharmila 2020 4th International Conference on Computer, Communication and Signal …, 2020 | 5 | 2020 |
Recognition, Classification for Normal, Contact and Cosmetic Iris Images using Deep Learning CS Gino Sophia International Journal of Recent Technology and Engineering 8 (3), 4334-4340, 2019 | 5* | 2019 |
Efficacy and Security Effectiveness: Key Parameters in Evaluation of Network Security V C., Prasad, S.G., Badrinarayanan, M.K.Sharmila International Journal of Performability Engineering 18 (4), 282-288, 2022 | 4 | 2022 |
Computer vision algorithms for dominant contact lens feature extraction using fuzzy-logic-based classifications SG Gino Sophia, V Ceronmani Sharmila Soft Computing 24 (18), 14235-14249, 2020 | 4 | 2020 |
Implementation of connected dominating set in fog computing using knowledge-upgraded iot devices V Ceronmani Sharmila, A George Knowledge Computing and Its Applications: Knowledge Manipulation and …, 2018 | 4 | 2018 |
Strategic location-based connected dominating set for mobile ad hoc networks VC Sharmila, A George Proc. Int. Conf. Advances Commun. Netw. Comput, 832-840, 2014 | 4 | 2014 |
Optimizing cloud health care data transmissions using fog N Valeti, VC Sharmila Journal of Physics: Conference Series 1228 (1), 012008, 2019 | 3 | 2019 |
Digitized Bus Ticketing Framework VC Sharmila, S Monesh, R Aayush, G Karesh, I Ibrahim 2019 1st International Conference on Innovations in Information and …, 2019 | 3 | 2019 |
Morphological-based localization of an iris image SG Gino Sophia, V Ceronmani Sharmila First International Conference on Artificial Intelligence and Cognitive …, 2019 | 3 | 2019 |
Implementation of connected dominating set in social networks using mention anomaly S Nivetha, V Ceronmani Sharmila Artificial Intelligence and Evolutionary Computations in Engineering Systems …, 2017 | 3 | 2017 |