


default search action
Vaidehi Vijayakumar
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i2]Krisvarish V, Priyadarshini T, K. P. Abhishek Sri Saai, Vaidehi Vijayakumar:
Resource-Efficient Transformer Architecture: Optimizing Memory and Execution Time for Real-Time Applications. CoRR abs/2501.00042 (2025) - 2023
- [j54]T. Nathezhtha, Sangeetha Dhamodaran, Vaidehi V.:
Social network malicious insider detection using time-based trust evaluation. Ann. des Télécommunications 78(9-10): 585-597 (2023) - [j53]Poorani Marimuthu, V. Vaidehi:
An unsupervised approach for personalized RHM with reduced mean alert latency. J. Intell. Fuzzy Syst. 44(2): 2173-2190 (2023) - [j52]T. Nathezhtha, Vaidehi V., Sangeetha Dhamodaran:
Detection of fraudulent marketing of consumer product in social networking services. J. Intell. Fuzzy Syst. 45(3): 4767-4775 (2023) - [c21]K. B. Sathya, V. Vaidehi:
Suppressing Rain Streak Weather Noise for Recognizing Overturned Accidental Car Vehicle License Plate. ICCCNT 2023: 1-12 - 2022
- [j51]K. Kalyana Chakravarthi
, P. Neelakantan, L. Shyamala, Vaidehi V.:
Reliable budget aware workflow scheduling strategy on multi-cloud environment. Clust. Comput. 25(2): 1189-1205 (2022) - [j50]Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
TOPSIS inspired cost-efficient concurrent workflow scheduling algorithm in cloud. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2359-2369 (2022) - [j49]Jatin Karthik Tripathy
, S. Sibi Chakkaravarthy, Suresh Chandra Satapathy
, Madhulika Sahoo
, Vaidehi V.:
ALBERT-based fine-tuning model for cyberbullying analysis. Multim. Syst. 28(6): 1941-1949 (2022) - [j48]Sangeetha Dhamodaran, S. Sibi Chakkaravarthy, Suresh Chandra Satapathy
, Vaidehi V., Meenalosini Vimal Cruz
:
Multi keyword searchable attribute based encryption for efficient retrieval of health Records in Cloud. Multim. Tools Appl. 81(16): 22065-22085 (2022) - 2021
- [j47]Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
Cost-effective workflow scheduling approach on cloud under deadline constraint using firefly algorithm. Appl. Intell. 51(3): 1629-1644 (2021) - [j46]Jatin Karthik Tripathy
, Sibi Chakkaravarthy Sethuraman, Meenalosini Vimal Cruz
, Anupama Namburu
, Mangalraj P., Nandha Kumar R., Sudhakar Ilango S., Vaidehi Vijayakumar
:
Comprehensive analysis of embeddings and pre-training in NLP. Comput. Sci. Rev. 42: 100433 (2021) - [j45]Drishya S. R., Renukadevi S., Vaidehi V.:
A Stable Clustering Scheme with Node Prediction in MANET. Int. J. Commun. Networks Inf. Secur. 13(1) (2021) - 2020
- [j44]S. Sibi Chakkaravarthy
, Sangeetha Dhamodaran, Meenalosini Vimal Cruz
, Vaidehi Vijayakumar, Balasubramanian Raman:
Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks. IEEE Access 8: 169944-169956 (2020) - [j43]Koneti Kalyan Chakravarthi, L. Shyamala, Vaidehi V.:
Budget aware scheduling algorithm for workflow applications in IaaS clouds. Clust. Comput. 23(4): 3405-3419 (2020) - [j42]J. Joshan Athanesious
, Vasuhi Srinivasan, Vaidehi Vijayakumar, Shiny Christobel, Sibi Chakkaravarthy Sethuraman:
Detecting abnormal events in traffic video surveillance using superorientation optical flow feature. IET Image Process. 14(9): 1881-1891 (2020) - [j41]Poorani Marimuthu, Varalakshmi Perumal, Vaidehi Vijayakumar:
Intelligent Personalized Abnormality Detection for Remote Health Monitoring. Int. J. Intell. Inf. Technol. 16(2): 87-109 (2020) - [j40]J. Joshan Athanesious
, Srinivasan Vasuhi
, Vaidehi V., Shiny Christobel, L. Jerart Julus:
Adaptive density based data mining technique for detection of abnormalities in traffic video surveillance. J. Intell. Fuzzy Syst. 39(3): 3737-3747 (2020) - [j39]Sibi Chakkaravarthy Sethuraman, Vaidehi Vijayakumar, Steven Walczak
:
Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles. J. Medical Syst. 44(1): 29 (2020)
2010 – 2019
- 2019
- [j38]S. Sibi Chakkaravarthy
, Sangeetha Dhamodaran
, Vaidehi Vijayakumar:
A Survey on malware analysis and mitigation techniques. Comput. Sci. Rev. 32: 1-23 (2019) - [j37]C. Sweetlin Hemalatha
, Ravi Pathak, V. Vaidehi:
Hybrid decision trees for data streams based on Incremental Flexible Naive Bayes prediction at leaf nodes. Evol. Intell. 12(4): 515-526 (2019) - [j36]Sibi Chakkaravarthy Sethuraman, Sangeetha Dhamodaran
, Vaidehi Vijayakumar:
Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. IET Networks 8(4): 219-232 (2019) - [j35]J. Joshan Athanesious
, S. Sibi Chakkaravarthy, Srinivasan Vasuhi
, Vaidehi Vijayakumar:
Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering. Multim. Tools Appl. 78(14): 19877-19903 (2019) - [j34]Poorani Marimuthu
, Varalakshmi Perumal, Vaidehi Vijayakumar:
OAFPM: optimized ANFIS using frequent pattern mining for activity recognition. J. Supercomput. 75(8): 5347-5366 (2019) - [j33]Akshay Tembhare, S. Sibi Chakkaravarthy
, Sangeetha Dhamodaran
, Vaidehi V., M. Venkata Rathnam:
Role-based policy to maintain privacy of patient health records in cloud. J. Supercomput. 75(9): 5866-5881 (2019) - [c20]T. Nathezhtha, Sangeetha Dhamodaran
, Vaidehi V.:
WC-PAD: Web Crawling based Phishing Attack Detection. ICCST 2019: 1-6 - 2018
- [j32]V. Mohanraj, Vaidehi Vijayakumar, S. Vasuhi, Ranajit Kumar:
A Novel Approach for Face Recognition under Varying Illumination Conditions. Int. J. Intell. Inf. Technol. 14(2): 22-42 (2018) - [j31]S. Sibi Chakkaravarthy, Vaidehi Vijayakumar, P. Rajesh
:
Hybrid Analysis Technique to detect Advanced Persistent Threats. Int. J. Intell. Inf. Technol. 14(2): 59-76 (2018) - [j30]C. Sweetlin Hemalatha
, Vignesh Sankaran, Vaidehi V., Shree Nandhini S, Sharmi P, B. Lavanya, S. Vasuhi, Ranajit Kumar:
Symmetric Uncertainty Based Search Space Reduction for Fast Face Recognition. Int. J. Intell. Inf. Technol. 14(4): 77-97 (2018) - [j29]V. Mohanraj, S. Sibi Chakkaravarthy, I. Gogul, Sathiesh Kumar Vajravelu
, Ranajit Kumar, Vaidehi Vijayakumar:
Hybrid feature descriptors to detect face spoof attacks. J. Intell. Fuzzy Syst. 34(3): 1411-1419 (2018) - [j28]S. Sibi Chakkaravarthy, Sangeetha Dhamodaran
, M. Venkata Rathnam
, K. Srinithi, Vaidehi Vijayakumar:
Futuristic cyber-attacks. Int. J. Knowl. Based Intell. Eng. Syst. 22(3): 195-204 (2018) - 2017
- [j27]Sangeetha Dhamodaran
, Vaidehi Vijayakumar
:
A secure cloud based Personal Health Record framework for a multi owner environment. Ann. des Télécommunications 72(1-2): 95-104 (2017) - [j26]Deepika R., Arvinth Prasath V. S., M. Indhumathi, Ponnai Manogaran Ashok Kumar, Vaidehi V.:
Anomalous Event Detection in Traffic Video Surveillance Based on Temporal Pattern Analysis. J. Comput. 12(2) (2017) - [j25]Vaidehi Vijayakumar, Sangeetha Dhamodaran:
Improved Searchable Attribute Based Encryption in Cloud. J. Inf. Sci. Eng. 33(3): 823-836 (2017) - [c19]Mohan Raj, I. Gogul, M. Deepan Raj, Sathiesh Kumar Vajravelu
, Vaidehi Vijayakumar, S. Sibi Chakkaravarthy:
Analyzing ConvNets Depth for Deep Face Recognition. CVIP (1) 2017: 317-330 - [c18]T. Nathezhtha, Vaidehi V.:
Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. SSCC 2017: 159-169 - 2016
- [j24]Subashri Thangavelu, Vaidehi Vijayakumar:
Efficient modified elliptic curve diffie-hellman algorithm for VoIP networks. Int. Arab J. Inf. Technol. 13(5): 492-500 (2016) - [c17]A. Vanitha, V. Vaidehi:
Pose estimation in real time video using Tri-Line method. ISED 2016: 303-307 - 2015
- [j23]Kirupa Ganapathy, Vaidehi V.
, Jesintha B. Chandrasekar:
Optimum steepest descent higher level learning radial basis function network. Expert Syst. Appl. 42(21): 8064-8077 (2015) - [j22]Ravi Pathak, Vaidehi V.
:
Complex Event Refinement by Statistical Augmentation Model. Int. J. Intell. Inf. Technol. 11(2): 55-69 (2015) - [j21]Ponnai Manogaran Ashok Kumar, Vaidehi V.
:
Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events. KSII Trans. Internet Inf. Syst. 9(1): 169-189 (2015) - [j20]Ponnai Manogaran Ashok Kumar, Vaidehi V.:
An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Application. KSII Trans. Internet Inf. Syst. 9(2): 659-679 (2015) - [j19]Kirupa Ganapathy, Vaidehi V.
, Dhivya Poorani:
Sensor based efficient decision making framework for remote healthcare. J. Ambient Intell. Smart Environ. 7(4): 461-481 (2015) - [c16]V. Mohanraj, Vaidehi V.
, Ranajith Kumar, R. Nakkeeran:
Face Recognition in Video Using Deformable Parts Model with Scale Invariant Feature Transform (DPSIFT). ACSS (1) 2015: 69-80 - [c15]Ravi Pathak, Vaidehi V.
:
An efficient rule balancing for scalable complex event processing. CCECE 2015: 190-195 - [c14]Vaidehi V.
, Kirupa Ganapathy, Vignesh Raghuraman:
A genetic approach for personalized healthcare. CCECE 2015: 196-201 - 2014
- [j18]Kirupa Ganapathy, Vaidehi V.
, Bhairavi Kannan, Harini Murugan:
Hierarchical Particle Swarm Optimization with Ortho-Cyclic Circles. Expert Syst. Appl. 41(7): 3460-3476 (2014) - [c13]Sangeetha Dhamodaran
, Vaidehi Vijayakumar
, Valliammai Thirunavukkarasu, Aiswarya Ramesh:
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption. SNDS 2014: 57-69 - 2013
- [j17]M. Malleswaran
, Vaidehi V.
, A. Saravanaselvan, M. Mohankumar
:
Performance Analysis of Various Artificial Intelligent Neural Networks for GPS/INS Integration. Appl. Artif. Intell. 27(5): 367-407 (2013) - [j16]D. Egfin Nirmala, A. Bibin Sam Paul, Vaidehi V.:
Improving Independent Component Analysis using Support Vector Machines for Multimodal Image fusion. J. Comput. Sci. 9(9): 1117-1132 (2013) - [c12]Kirupa Ganapathy, Bharathi Priya, Bhanu Priya, Dhivya, V. Prashanth, Vaidehi V.
:
SOA Framework for Geriatric Remote Health Care Using Wireless Sensor Network. ANT/SEIT 2013: 1012-1019 - [c11]D. Egfin Nirmala, R. K. Vignesh, Vaidehi V.
:
Fusion of multisensor images using Nonsubsampled Contourlet Transform and Fuzzy Logic. FUZZ-IEEE 2013: 1-8 - 2012
- [j15]P. K. Jawahar, Vaidehi V.
, D. Egfin Nirmala:
Qos Enhancement in Wireless VoIP Networks Using Interactive Multiple Model Based Kalman Filter. Wirel. Pers. Commun. 65(1): 67-81 (2012) - 2011
- [j14]J. Jackson Juliet Roy, Vaidehi V.
, M. S. Sricharan:
QoS guaranteed integration methodology for a WLAN-WiMAX heterogeneous network. Comput. Electr. Eng. 37(3): 261-274 (2011) - [j13]J. Jackson Juliet Roy, Vaidehi V.
:
Analysis of Frequency Reuse and Throughput Enhancement in WiMAX Systems. Wirel. Pers. Commun. 61(1): 1-17 (2011) - [c10]S. Sathish, K. Thangavel, Vaidehi V.
:
Cache based ant colony routing algorithm for mobile ad hoc networks. ACWR 2011: 473-476 - 2010
- [j12]Rajavelu Srinivasan, Vaidehi V., Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj:
Secure Group Key Management Scheme for Multicast Networks. Int. J. Netw. Secur. 10(3): 205-209 (2010) - [j11]Rajavelu Srinivasan, Vaidehi V., Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj:
Secure Group Key Management Scheme for Multicast Networks. Int. J. Netw. Secur. 11(1): 33-38 (2010) - [c9]S. Sangeetha, S. Haripriya, S. G. Mohana Priya, Vaidehi V.
, N. Srinivasan:
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer. CNSA 2010: 27-36 - [c8]R. Kayalvizhi
, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V.
:
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. CNSA 2010: 105-113 - [c7]T. Subashri, B. Gokul Vinoth Kumar, Vaidehi V.
:
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. CNSA 2010: 132-142 - [c6]R. Kayalvizhi
, M. Vijayalakshmi, Vaidehi V.
:
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. CNSA 2010: 172-180 - [c5]T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, Vaidehi V.
:
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory. CNSA 2010: 224-231 - [c4]M. Malleswaran
, J. Mary Anita, S. N. Sabreen, Vaidehi V.
:
Real-time INS/GPS data fusion using hybrid adaptive network based fuzzy inference. ICARCV 2010: 1536-1540 - [c3]M. Malleswaran
, Angel Deborah S
, S. Manjula, Vaidehi V.
:
Integration of INS and GPS using radial basis function neural networks for vehicular navigation. ICARCV 2010: 2427-2430 - [i1]S. Sangeetha, V. Vaidehi:
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS. CoRR abs/1005.4501 (2010)
2000 – 2009
- 2008
- [j10]N. Srinivasan, V. Vaidehi:
Performance Analysis of Soft Computing Based Anomaly Detectors. Int. J. Netw. Secur. 7(3): 436-447 (2008) - [j9]M. S. Sricharan, Vaidehi V.
:
A pragmatic analysis of user mobility patterns in macrocellular wireless networks. Pervasive Mob. Comput. 4(5): 616-632 (2008) - 2007
- [j8]M. R. Sumalatha, Vaidehi V.
, Arputharaj Kannan
:
Semantic query Cache using Dynamic Facts (SCDF): a novel approach to efficient information retrieval. Int. J. Metadata Semant. Ontologies 2(4): 281-294 (2007) - [j7]Rajavelu Srinivasan, Vaidehi V.
, N. Ranjani, M. Sathya, D. Subramani:
Multi-path routing scheme for non-interactive multicast communications. Int. J. Netw. Manag. 17(6): 399-413 (2007) - [j6]Rajavelu Srinivasan, Vaidehi V., K. N. Srivathsan, L. Ramesh Babu, C. Karunagaran:
SeReRoM: Secured Reliable Routing Scheme for Multicasting. Int. J. Netw. Secur. 5(1): 82-88 (2007) - [j5]K. R. Santha, Vaidehi V.
:
Design of efficient architectures for 1-D and 2-D DLMS adaptive filters. Integr. 40(3): 209-225 (2007) - [j4]C. Ramesh, Vaidehi V.
:
Performance Analysis of UWB Channels for Wireless Personal Area Networks. Wirel. Pers. Commun. 41(2): 169-178 (2007) - [c2]M. S. Sricharan, Vaidehi V.
:
A Pragmatic Analysis of User Mobility Patterns in Macrocellular Wireless Networks. WOWMOM 2007: 1-9 - 2006
- [c1]A. Anitha, Vaidehi V.
:
Context based Application Level Intrusion Detection System. ICNS 2006: 16 - 2003
- [j3]Ramesh Chidambaram, V. Sai Prithvi, Vaidehi V.
:
Erratum to "VLSI based fuzzy logic controller enabled adaptive interactive multiple model for target tracking" [Integration 35 (2003) 1-10]. Integr. 36(3): 155 (2003) - 2001
- [j2]Vaidehi V.
, N. Chitra, M. Chokkalingam, C. N. Krishnan:
Neural network aided Kalman filtering for multitarget tracking applications. Comput. Electr. Eng. 27(2): 217-228 (2001)
1990 – 1999
- 1999
- [j1]V. Vaidehi, C. N. Krishnan, P. Swaminathan:
An Aided Genetic Algorithm for Multiprocessor Scheduling. Parallel Process. Lett. 9(3): 423-436 (1999)
Coauthor Index
aka: Sibi Chakkaravarthy Sethuraman

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-07 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint