Skip to main content

and
  1. No Access

    Article

    Classifying informative tweets using feature enhanced pre-trained language model

    Classifying tweets containing valuable information about COVID-19 is crucial for develo** monitoring systems that provide the latest updates. Existing approaches for informative tweet classification consider...

    Prakash Babu Yandrapati, R. Eswari in Social Network Analysis and Mining (2024)

  2. No Access

    Article

    A regularization based simple shallow perceptron network for detection of fake news in social networks

    There is an ever-increasing number of public users of the internet just to remain learned and updated as well as distribute millions of posts, articles, and videos across platforms such as Twitter, Facebook an...

    S. P. Ramya, R. Eswari in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    An ensemble-based stegware detection system for information hiding malware attacks

    Information hiding techniques like steganography are used by hackers to obfuscate malicious attack codes to carry malware scripts and deliver to crypto-miners in on-demand platforms like Cloud. Stegware is a t...

    A. Monika, R. Eswari in Journal of Ambient Intelligence and Humanized Computing (2023)

  4. No Access

    Chapter and Conference Paper

    Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage

    With the widespread cloud storage devices, most users store their data over cloud storage. A dishonest user might raise a false claim about the integrity of their data to get compensation. On the other hand, a...

    A. Vamshi, R. Eswari, Shivam Dubey in Security, Privacy and Data Analytics (2023)

  5. No Access

    Chapter and Conference Paper

    Detection of Location of Audio-Stegware in LSB Audio Steganography

    Steganography in malware, often known as stegomalware or stegware, is growing in popularity as attackers continue to show their versatility by inventing new tactics and re-inventing old ones in the quest to di...

    A. Monika, R. Eswari, Swastik Singh in Proceedings of International Conference on… (2023)

  6. No Access

    Chapter and Conference Paper

    SHLPM: Sentiment Analysis on Code-Mixed Data Using Summation of Hidden Layers of Pre-trained Model

    Code-mixing refers to the blending of languages. The most serious issue with code-mixing is that people move between languages and type in English instead of transcribing words in Dravidian scripts. Traditiona...

    Yandrapati Prakash Babu, R. Eswari in Advances in Data-Driven Computing and Inte… (2023)

  7. No Access

    Article

    A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT

    Cloud-Assisted Internet of Things (IoT) has become an increasingly widespread technological trend that can significantly improve the performance of IoT applications by outsourcing massive data from IoT devices...

    Medikonda Asha Kiran, Syam Kumar Pasupuleti in Peer-to-Peer Networking and Applications (2022)

  8. No Access

    Article

    Accident prevention and safety assistance using IOT and machine learning

    Transportation is playing a vital role in our daily life and its development has made many of our chores much easier. But in recent years, driver drowsiness, distractions, and speed limit crossing cause ruinou...

    S. Uma, R. Eswari in Journal of Reliable Intelligent Environments (2022)

  9. No Access

    Chapter and Conference Paper

    Performance of Optimization Algorithms in Attention-Based Deep Learning Model for Fake News Detection System

    Automatic fake news detection for categorizing the news as either fake or real is a complicated problem. Generally, the fake news does not fully contain false information. It is usually mixed with a substantia...

    S. P. Ramya, R. Eswari in Proceedings of International Conference on… (2022)

  10. No Access

    Chapter and Conference Paper

    Identification of Online Auction Bidding Robots Using Machine Learning

    aim of this project is to identify the bidding robots using machine learning, which bids in an online auction. Bidding robot is basically an application which helps to place a bid or click automatically on ...

    Pooja Maan, R. Eswari in Evolutionary Computing and Mobile Sustainable Networks (2021)

  11. No Access

    Chapter and Conference Paper

    Ensemble-Based Stegomalware Detection System for Hidden Ransomware Attack

    Ransomware analysis creates crucial aspects for cybersecurity defense mechanisms. Recently, attackers are confusing the parts of ransomware attack code using steganography to carry malicious JavaScript and eve...

    A. Monika, R. Eswari in Inventive Systems and Control (2021)

  12. No Access

    Article

    QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks

    Recent research in communication moves towards cyber space with modern applications such as multimedia surveillance, smart autonomous traffic control, advanced health care monitoring, industrial automation, an...

    S. Suseela, R. Eswari, S. Nickolas in Peer-to-Peer Networking and Applications (2020)

  13. No Access

    Chapter and Conference Paper

    Automated Cyber Threat Intelligence Generation from Honeypot Data

    The evolving of advance cyber threats requires the cyber security specialist and system analyst to detect, analyse and timely react against such kind of cyber attacks. In real practical scenario, the timely di...

    Kumar Sanjeev, B. Janet in Inventive Communication and Computational Technologies (2020)

  14. No Access

    Chapter and Conference Paper

    Adaptive Threshold-Based Algorithm for Multi-objective VM Placement in Cloud Data Centers

    Data is grown exponentially day by day which increases demand in cloud storage, leads to setting up a large number of cloud data centers. Such data centers employ an immense amount of electrical energy has end...

    Nithiya Baskaran, R. Eswari in Frontier Computing (2019)