default search action
Ashish Singh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]S. Kavitha, Ashish Singh, Pramod Kumar, Asia Hazareena, Ravi Shankar Saxena, Kamakshi Kumari, Mohammad Aneesh:
Torus-Shaped Quantum Plasmonic Nano-Antenna Array for Optical Near-Field Communication. IEEE Access 12: 155485-155497 (2024) - [j45]Ashish Singh, Abhinav Kumar, Suyel Namasudra:
DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Frontiers Comput. Sci. 18(1): 181801 (2024) - [j44]Ashish Singh, Kakali Chatterjee:
Trust management in online computing environment: a complete review. J. Ambient Intell. Humaniz. Comput. 15(1): 491-545 (2024) - [j43]Jitesh Pradhan, Ashish Singh, Abhinav Kumar, Muhammad Khurram Khan:
Skin lesion classification using modified deep and multi-directional invariant handcrafted features. J. Netw. Comput. Appl. 231: 103949 (2024) - [j42]Pradeep Kumar Roy, Abhinav Kumar, Ashish Singh, Arun Kumar Sangaiah:
Forecasting Bitcoin Prices Using Deep Learning for Consumer-Centric Industrial Applications. IEEE Trans. Consumer Electron. 70(1): 1351-1358 (2024) - [j41]Jafar Ahmad Abed Alzubi, Omar A. Alzubi, Issa Qiqieh, Ashish Singh:
A Blended Deep Learning Intrusion Detection Framework for Consumable Edge-Centric IoMT Industry. IEEE Trans. Consumer Electron. 70(1): 2049-2057 (2024) - [c27]Ashish Singh, Michael J. Jones, Erik G. Learned-Miller:
Tracklet-based Explainable Video Anomaly Localization. CVPR Workshops 2024: 3992-4001 - [i9]Ashutosh Singh, Ashish Singh, Tales Imbiriba, Deniz Erdogmus, Ricardo Augusto Borsoi:
KODA: A Data-Driven Recursive Model for Time Series Forecasting and Data Assimilation using Koopman Operators. CoRR abs/2409.19518 (2024) - 2023
- [j40]Kakali Chatterjee, Ashish Singh, Neha:
A blockchain-enabled security framework for smart agriculture. Comput. Electr. Eng. 106: 108594 (2023) - [j39]Santanu Basak, Kakali Chatterjee, Ashish Singh:
DPPT : A differential privacy preservation technique for cyber-physical system. Comput. Electr. Eng. 109(Part A): 108661 (2023) - [j38]Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy:
TrIDS: an intelligent behavioural trust based IDS for smart healthcare system. Clust. Comput. 26(2): 903-925 (2023) - [j37]Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Ashish Singh:
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. Clust. Comput. 26(2): 1035-1051 (2023) - [j36]Ashish Singh, Kakali Chatterjee:
Edge computing based secure health monitoring framework for electronic healthcare system. Clust. Comput. 26(2): 1205-1220 (2023) - [j35]K. Muthamil Sudar, P. Deepalakshmi, Ashish Singh, Parvathaneni Naga Srinivasu:
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms. Clust. Comput. 26(2): 1461-1477 (2023) - [j34]Saima Rathore, Muhammad Aksam Iftikhar, Ahmad Chaddad, Ashish Singh, Zeeshan Gillani, Ahmed Abdulkadir:
Imaging phenotypes predict overall survival in glioma more accurate than basic demographic and cell mutation profiles. Comput. Methods Programs Biomed. 242: 107812 (2023) - [j33]Ashish Singh, Antonio Bevilacqua, Thach Le Nguyen, Feiyan Hu, Kevin McGuinness, Martin O'Reilly, Darragh Whelan, Brian Caulfield, Georgiana Ifrim:
Fast and robust video-based exercise classification via body pose tracking and scalable multivariate time series classifiers. Data Min. Knowl. Discov. 37(2): 873-912 (2023) - [j32]Pradeep Kumar Roy, Ashish Singh:
COVID-19 Disease Prediction Using Weighted Ensemble Transfer Learning. Int. J. Interact. Multim. Artif. Intell. 8(1): 13 (2023) - [j31]Jafar Ahmad Abed Alzubi, Omar A. Alzubi, Ashish Singh, Tareq Mahmod Alzubi:
A blockchain-enabled security management framework for mobile edge computing. Int. J. Netw. Manag. 33(5) (2023) - [j30]Ashish Singh, Kakali Chatterjee, Anish Kumar Singh, Neeraj Kumar:
Secure Smart Healthcare Framework Using Lightweight DNA Sequence and Chaos for Mobile-Edge Computing. IEEE Internet Things J. 10(6, March 15): 4883-4890 (2023) - [j29]Kakali Chatterjee, Ashish Singh, Neha, Keping Yu:
A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario. ACM J. Data Inf. Qual. 15(2): 23:1-23:24 (2023) - [j28]Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Tareq Mahmod Alzubi, Ashish Singh:
Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model. Mob. Networks Appl. 28(2): 795-807 (2023) - [j27]Ashish Singh, Adnan Gutub, Anand Nayyar, Muhammad Khurram Khan:
Redefining food safety traceability system through blockchain: findings, challenges and open issues. Multim. Tools Appl. 82(14): 21243-21277 (2023) - [j26]Shashi Shreya, Kakali Chatterjee, Ashish Singh:
BFSF: A secure IoT based framework for smart farming using blockchain. Sustain. Comput. Informatics Syst. 40: 100917 (2023) - [j25]Amitesh Kumar Pandit, Kakali Chatterjee, Ashish Singh:
Secure fine grained access control for telecare medical communication system. Telecommun. Syst. 84(1): 1-21 (2023) - [j24]Ashish Singh, Abhinav Kumar, Zahid Akhtar, Muhammad Khurram Khan:
Guest Editorial: Cybersecurity Intelligence in the Healthcare System. IEEE Trans. Ind. Informatics 19(1): 809-812 (2023) - [j23]Jafar Ahmad Abed Alzubi, Omar A. Alzubi, Ashish Singh, Manikandan Ramachandran:
Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning. IEEE Trans. Ind. Informatics 19(1): 1080-1087 (2023) - [j22]Anish Kumar Singh, Kakali Chatterjee, Ashish Singh:
An Image Security Model Based on Chaos and DNA Cryptography for IIoT Images. IEEE Trans. Ind. Informatics 19(2): 1957-1964 (2023) - [j21]Pradeep Kumar Roy, Ashish Singh, Jainam Vipul Desai, Sunil Kumar Singh:
Healthcare Data Security Using Lightweight Protocol for Cyber Physical System. IEEE Trans. Netw. Sci. Eng. 10(5): 2597-2606 (2023) - [c26]Ashish Singh, Michael J. Jones, Erik G. Learned-Miller:
EVAL: Explainable Video Anomaly Localization. CVPR 2023: 18717-18726 - [c25]P. William, Poornashankar, Anurag Shrivastava, Nandita Tripathi, Anil, Ashish Singh:
Secure Authentication Protocols For Internet Of Things (Iot) Devices. IC3I 2023: 1569-1574 - [c24]Amol K. Kadam, Anurag Shrivastava, Sonali K. Pawar, Vinod H. Patil, Jacob Michaelson, Ashish Singh:
Calories Burned Prediction Using Machine Learning. IC3I 2023: 1712-1717 - [c23]Ashutosh Singh, Ashish Singh, Aria Masoomi, Tales Imbiriba, Erik G. Learned-Miller, Deniz Erdogmus:
Inv-Senet: Invariant Self Expression Network for Clustering Under Biased Data. ICASSP 2023: 1-5 - [c22]Ashish Singh, Antonio Bevilacqua, Timilehin B. Aderinola, Thach Le Nguyen, Darragh Whelan, Martin O'Reilly, Brian Caulfield, Georgiana Ifrim:
An Examination of Wearable Sensors and Video Data Capture for Human Exercise Classification. ECML/PKDD (6) 2023: 312-329 - [i8]Ashish Singh, Antonio Bevilacqua, Timilehin B. Aderinola, Thach Le Nguyen, Darragh Whelan, Martin O'Reilly, Brian Caulfield, Georgiana Ifrim:
An Examination of Wearable Sensors and Video Data Capture for Human Exercise Classification. CoRR abs/2307.04516 (2023) - [i7]Ashish Singh, Prateek Agarwal, Zixuan Huang, Arpita Singh, Tong Yu, Sungchul Kim, Victor S. Bursztyn, Nikos Vlassis, Ryan A. Rossi:
FigCaps-HF: A Figure-to-Caption Generative Framework and Benchmark with Human Feedback. CoRR abs/2307.10867 (2023) - 2022
- [j20]Shashi Shreya, Kakali Chatterjee, Ashish Singh:
A smart secure healthcare monitoring system with Internet of Medical Things. Comput. Electr. Eng. 101: 107969 (2022) - [j19]Dillip Ranjan Nayak, Neelamadhab Padhy, Pradeep Kumar Mallick, Ashish Singh:
A deep autoencoder approach for detection of brain tumor images. Comput. Electr. Eng. 102: 108238 (2022) - [j18]Pradeep Kumar Roy, Ashish Singh, Asis Kumar Tripathy, Tapan Kumar Das:
Cyberbullying detection: an ensemble learning approach. Int. J. Comput. Sci. Eng. 25(3): 315-324 (2022) - [j17]Parvathaneni Naga Srinivasu, Ranjit Panigrahi, Ashish Singh, Akash Kumar Bhoi:
Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN. J. Circuits Syst. Comput. 31(17): 2250303:1-2250303:29 (2022) - [j16]Kakali Chatterjee, Ravi Raushan Kumar Chaudhary, Ashish Singh:
A lightweight block cipher technique for IoT based E-healthcare system security. Multim. Tools Appl. 81(30): 43551-43580 (2022) - [c21]Zhenxiao Luo, Lu Niu, Venki Korukanti, Yutian Sun, Masha Basmanova, Yi He, Beinan Wang, Devesh Agrawal, Hao Luo, Chunxu Tang, Ashish Singh, Yao Li, Peng Du, Girish Baliga, Maosong Fu:
From Batch Processing to Real Time Analytics: Running Presto® at Scale. ICDE 2022: 1598-1609 - [i6]Ashish Singh, Antonio Bevilacqua, Thach Le Nguyen, Feiyan Hu, Kevin McGuinness, Martin O'Reilly, Darragh Whelan, Brian Caulfield, Georgiana Ifrim:
Fast and Robust Video-Based Exercise Classification via Body Pose Tracking and Scalable Multivariate Time Series Classifiers. CoRR abs/2210.00507 (2022) - [i5]Ashutosh Singh, Ashish Singh, Aria Masoomi, Tales Imbiriba, Erik G. Learned-Miller, Deniz Erdogmus:
Inv-SENnet: Invariant Self Expression Network for clustering under biased data. CoRR abs/2211.06780 (2022) - [i4]Ashish Singh, Michael J. Jones, Erik G. Learned-Miller:
EVAL: Explainable Video Anomaly Localization. CoRR abs/2212.07900 (2022) - 2021
- [j15]Ashish Singh, Kakali Chatterjee:
Securing smart healthcare system with edge computing. Comput. Secur. 108: 102353 (2021) - [j14]Ashish Singh, Rajeevan Chandel, Rohit Dhiman:
Proposal and analysis of relative stability in mixed CNT bundle for sub-threshold interconnects. Integr. 80: 29-40 (2021) - [i3]Aloysius Lim, Ashish Singh, Jody Chiam, Carly Eckert, Vikas Kumar, Muhammad Aurangzeb Ahmad, Ankur Teredesai:
Machine Learning Approaches for Type 2 Diabetes Prediction and Care Management. CoRR abs/2104.07820 (2021) - 2020
- [j13]Ashish Singh, Kakali Chatterjee:
An adaptive mutual trust based access control model for electronic healthcare system. J. Ambient Intell. Humaniz. Comput. 11(5): 2117-2136 (2020) - [c20]Spyridon Bakas, Gaurav Shukla, Hamed Akbari, Güray Erus, Aristeidis Sotiras, Saima Rathore, Chiharu Sako, Sung Min Ha, Martin Rozycki, Ashish Singh, Russell T. Shinohara, Michel Bilello, Christos Davatzikos:
Integrative radiomic analysis for pre-surgical prognostic stratification of glioblastoma patients: from advanced to basic MRI protocols. Medical Imaging: Image-Guided Procedures 2020: 113151S
2010 – 2019
- 2019
- [j12]Mayank Kumar Kundalwal, Kakali Chatterjee, Ashish Singh:
An improved privacy preservation technique in health-cloud. ICT Express 5(3): 167-172 (2019) - [j11]Ashish Singh, Kakali Chatterjee:
Trust based access control model for securing electronic healthcare system. J. Ambient Intell. Humaniz. Comput. 10(11): 4547-4565 (2019) - [j10]Ashish Singh, Kakali Chatterjee:
ITrust: identity and trust based access control model for healthcare system security. Multim. Tools Appl. 78(19): 28309-28330 (2019) - [c19]Sarthak Pati, Ashish Singh, Saima Rathore, Aimilia Gastounioti, Mark Bergman, Phuc Ngo, Sung Min Ha, Dimitrios Bounias, James Minock, Grayson Murphy, Hongming Li, Amit Bhattarai, Adam Wolf, Patmaa Sridaran, Ratheesh Kalarot, Hamed Akbari, Aristeidis Sotiras, Siddhesh P. Thakur, Ragini Verma, Russell T. Shinohara, Paul A. Yushkevich, Yong Fan, Despina Kontos, Christos Davatzikos, Spyridon Bakas:
The Cancer Imaging Phenomics Toolkit (CaPTk): Technical Overview. BrainLes@MICCAI (2) 2019: 380-394 - [c18]Ashish Singh, Hang Su, SouYoung Jin, Huaizu Jiang, Chetan Manjesh, Geng Luo, Ziwei He, Li Hong, Erik G. Learned-Miller, Rosie Cowell:
Half&Half: New Tasks and Benchmarks for Studying Visual Common Sense. CVPR Workshops 2019: 1-4 - [c17]Aruni RoyChowdhury, Prithvijit Chakrabarty, Ashish Singh, SouYoung Jin, Huaizu Jiang, Liangliang Cao, Erik G. Learned-Miller:
Automatic adaptation of object detectors to new domains using self-training. CVPR Workshops 2019: 22-32 - [c16]Aruni RoyChowdhury, Prithvijit Chakrabarty, Ashish Singh, SouYoung Jin, Huaizu Jiang, Liangliang Cao, Erik G. Learned-Miller:
Automatic Adaptation of Object Detectors to New Domains Using Self-Training. CVPR 2019: 780-790 - [c15]Ashish Singh, Michel Bilello:
Current Status of the Use of Machine Learning and Magnetic Resonance Imaging in the Field of Neuro-Radiomics. RNO-AI@MICCAI 2019: 1-11 - [c14]Ashish Singh, Umesh Chandra, Shivesh Kumar, Kakali Chatterjee:
A Secure Access Control Model for E-health Cloud. TENCON 2019: 2329-2334 - [i2]Aruni RoyChowdhury, Prithvijit Chakrabarty, Ashish Singh, SouYoung Jin, Huaizu Jiang, Liangliang Cao, Erik G. Learned-Miller:
Automatic adaptation of object detectors to new domains using self-training. CoRR abs/1904.07305 (2019) - 2018
- [c13]SouYoung Jin, Aruni RoyChowdhury, Huaizu Jiang, Ashish Singh, Aditya Prasad, Deep Chakraborty, Erik G. Learned-Miller:
Unsupervised Hard Example Mining from Videos for Improved Object Detection. ECCV (13) 2018: 316-333 - [c12]Xiaomeng Chen, Jiayi Meng, Y. Charlie Hu, Maruti Gupta, Ralph Hasholzner, Venkatesan Nallampatti Ekambaram, Ashish Singh, Srikathyayani Srikanteswara:
A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis. SIGMETRICS (Abstracts) 2018: 107-109 - [i1]SouYoung Jin, Aruni RoyChowdhury, Huaizu Jiang, Ashish Singh, Aditya Prasad, Deep Chakraborty, Erik G. Learned-Miller:
Unsupervised Hard Example Mining from Videos for Improved Object Detection. CoRR abs/1808.04285 (2018) - 2017
- [j9]Ashish Singh, Kakali Chatterjee:
Cloud security issues and challenges: A survey. J. Netw. Comput. Appl. 79: 88-115 (2017) - [j8]Xiaomeng Chen, Jiayi Meng, Y. Charlie Hu, Maruti Gupta, Ralph Hasholzner, Venkatesan Nallampatti Ekambaram, Ashish Singh, Srikathyayani Srikanteswara:
A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis. Proc. ACM Meas. Anal. Comput. Syst. 1(2): 45:1-45:28 (2017) - [j7]Nihal Paul, Ashish Singh, Abhishek Midya, Partha Pratim Roy, Debi Prosad Dogra:
Moving object detection using modified temporal differencing and local fuzzy thresholding. J. Supercomput. 73(3): 1120-1139 (2017) - [j6]Sapna Verma, J. A. Ansari, Ashish Singh:
Truncated Equilateral Triangular Microstrip Antenna With and Without Superstrate. Wirel. Pers. Commun. 95(2): 873-889 (2017) - [c11]Ramakant Kumar, Kakali Chatterjee, Ashish Singh:
Secure Group Communication in Wireless Network Using Bilinear Pairing. ICCCT 2017: 89-94 - [c10]Manish Joshi, Koduri Teja, Ashish Singh, Rohit Dhiman:
Delay and Frequency Investigations in Coupled MLGNR Interconnects. VDAT 2017: 429-440 - 2016
- [c9]Ashish Singh, Kakali Chatterjee:
An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks. CISIM 2016: 682-693 - [c8]Sanjay Singh Rajput, Ashish Singh, Ashwani Kumar Chandel, Rajeevan Chandel:
Design of Low-Power High-Gain Operational Amplifier for Bio-Medical Applications. ISVLSI 2016: 355-360 - 2015
- [j5]Anurag Mishra, Jamshed Ahmed Ansari, Kamakshi Kamakshi, Ashish Singh, Mohammad Aneesh, Babau R. Vishvakarma:
Compact dualband rectangular microstrip patch antenna for 2.4/5.12-GHz wireless applications. Wirel. Networks 21(2): 347-355 (2015) - 2014
- [j4]Ashish Singh, Jamshed Ahmed Ansari, Kamakshi Kumari, Anurag Mishra, Mohammad Aneesh:
Compact notch loaded half disk patch antenna for dualband operation. Ann. des Télécommunications 69(9-10): 475-483 (2014) - [j3]Ashish Singh, Mohammad Aneesh, Kamakshi Kumari, Anurag Mishra, J. A. Ansari:
Analysis of F-shape microstrip line fed dualband antenna for WLAN applications. Wirel. Networks 20(1): 133-140 (2014) - [j2]Kamakshi Kumari, J. A. Ansari, Ashish Singh, Mohammad Aneesh:
Analysis of L-probe Proximity Fed Annular Ring Patch Antenna for Wireless Applications. Wirel. Pers. Commun. 77(2): 1449-1464 (2014) - 2013
- [j1]J. A. Ansari, Kamakshi Kumari, Ashish Singh, Anurag Mishra:
Ultra Wideband Co-planer Microstrip Patch Antenna for Wireless Applications. Wirel. Pers. Commun. 69(4): 1365-1378 (2013) - [c7]Ashish Singh, James Everett Young:
A dog tail for communicating robotic states. HRI 2013: 417-418 - [c6]Ashish Singh, James Everett Young:
A Dog Tail for Utility Robots: Exploring Affective Properties of Tail Movement. INTERACT (2) 2013: 403-419 - [c5]Ashish Singh, Stela Hanbyeol Seo, Yasmeen Hashish, Masayuki Nakane, James Everett Young, Andrea Bunt:
An interface for remote robotic manipulator control that reduces task load and fatigue. RO-MAN 2013: 738-743 - 2012
- [c4]Ashish Singh, James Everett Young:
Animal-inspired human-robot interaction: a robotic tail for communicating state. HRI 2012: 237-238 - 2011
- [c3]Santanu Chaudhury, Shantanu Ghosh, Amrita Basu, Brejesh Lall, Sumantra Dutta Roy, Lopamudra Choudhury, R. Prashanth, Ashish Singh, Amit Maniyar:
Perception-Based Design for Tele-presence. PReMI 2011: 154-159 - 2010
- [c2]Guozhi Tao, Ashish Singh, Luc M. Bidaut:
Liver segmentation from registered multiphase CT data sets with EM clustering and GVF level set. Medical Imaging: Image Processing 2010: 76230V
2000 – 2009
- 2005
- [c1]Santosh Dwivedi, Bernard Menezes, Ashish Singh:
Database Access Design for E-Business - A Case Study. COMAD 2005: 168-175
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint