Follow
Thillaiarasu.N
Thillaiarasu.N
School of Computing and Information Technology, REVA University, Bengaluru
Verified email at reva.edu.in - Homepage
Title
Cited by
Cited by
Year
An effective digit recognition model using enhanced convolutional neural network based chaotic grey wolf optimization
P Preethi, R Asokan, N Thillaiarasu, T Saravanan
Journal of Intelligent & Fuzzy Systems, 1-11, 2021
572021
RETRACTED ARTICLE: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing
N Thillaiarasu, S ChenthurPandian
Cluster Computing 22 (Suppl 1), 1179-1188, 2019
472019
A survey on acquiring integrity of shared data with effective user termination in the cloud
N Shyamambika, N Thillaiarasu
2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016
392016
Enforcing security and privacy over multi-cloud framework using assessment techniques
N Thillaiarasu., S ChenthurPandian.
Intelligent Systems and Control (ISCO), 2016 10th International Conference …, 2016
382016
Paddy plant disease recognition, risk analysis, and classification using deep convolution neuro-fuzzy network
VV Kumar, KMK Raghunath, N Rajesh, M Venkatesan, RB Joseph, ...
Journal of Mobile Multimedia 15 (50), 1829, 2021
362021
Attaining Integrity, Secured Data Sharing and Removal of Misbehaving Client in the Public Cloud using an External Agent and Secure Encryption Technique
NT N. Shyamambika
Advances in Natural and Applied Sciences. 10(9) 10 (9), 421-431, 2016
272016
Designing a trivial information relaying scheme for assuring safety in mobile cloud computing environment
N Thillaiarasu, SC Pandian, V Vijayakumar, S Prabaharan, L Ravi, ...
Wireless Networks, 1-14, 2019
242019
Optimal Grouping and Belief based CH selection in mobile ad-hoc network using Chunk Reliable Routing Protocol
T Saravanan, N Thillaiarasu
2021 International Conference on Advance Computing and Innovative …, 2021
212021
A Survey of Secure Routing Protocols of Mobile AdHoc Network
NT S Ranjithkumar
SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2015
212015
A survey on different computer vision based human activity recognition for surveillance applications
A Shenoy, N Thillaiarasu
2022 6th International Conference on Computing Methodologies and …, 2022
182022
Enforcing confidentiality and authentication over public cloud using hybrid cryptosystems
N Thillaiarasu, S Chenthur Pandian, G Naveen Balaji, RM Benitha Shierly, ...
International Conference on Intelligent Data Communication Technologies and …, 2019
152019
RETRACTED ARTICLE: Analysing the User Actions and Location for Identifying Online Scam in Internet Banking on Cloud
AJP Lazar, S Sengan, LPL Cavaliere, T Nadesan, D Sharma, MK Gupta, ...
Wireless Personal Communications 127 (Suppl 1), 5-6, 2022
122022
Novel heuristic scheme to enforce safety and confidentiality using feature-based encryption in multi-cloud environment (MCE)
N Thillaiarasu, SC Pandian, N Gowthaman
Information and Knowledge in Internet of Things, 441-456, 2022
122022
Internet of Everything (IoE) in Smart City Paradigm Using Advanced Sensors for Handheld Devices and Equipment
P Malini, N Gowthaman, A Gautami, N Thillaiarasu
IoT and IoE Driven Smart Cities, 121-141, 2021
112021
Design of a confidentiality model using semantic-based information segmentation (SBIS) and scattered storage in cloud computing
N Thillaiarasu, N Gowthaman, S Chenthur Pandian
IoT and IoE Driven Smart Cities, 183-213, 2022
102022
Implementation of Intrusion detection and prevention with Deep Learning in Cloud Computing
D Srilatha, N Thillaiarasu
Journal of Information Technology Management 15 (Special Issue), 1-18, 2023
82023
Artificial Intelligence for Internet of Things: Design Principle, Modernization, and Techniques
N Thillaiarasu, SL Tripathi, V Dhinakaran
CRC Press, 2022
72022
Investigation of comparison on modified cnn techniques to classify fake face in deepfake videos
A Gowda, N Thillaiarasu
2022 8th International Conference on Advanced Computing and Communication …, 2022
72022
Hyper Elliptic Curve Cryptography (HECC) to ensure data security in the cloud
K Nagendran, T Nadesan, P Chandrika, R Chethana
International Journal of Engineering & Technology 7 (4.19), 186-188, 2018
72018
Map-Reduce based Distance Weighted k-Nearest Neighbor Machine Learning Algorithm for Big Data Applications
E Gothai, V Muthukumaran, K Valarmathi, VE Sathishkumar, ...
Scalable Computing: Practice and Experience 23 (4), 129-145, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20