default search action
Udai Pratap Rao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis. Clust. Comput. 27(3): 3753-3769 (2024) - [j36]Sujoy Roy, Jeet Agrawal, Alok Kumar, Udai Pratap Rao:
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing. Clust. Comput. 27(5): 6013-6038 (2024) - [j35]Akhil Chaurasia, Alok Kumar, Udai Pratap Rao:
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment. Clust. Comput. 27(10): 13919-13944 (2024) - [j34]Gordhan Jethava, Udai Pratap Rao:
Exploring security and trust mechanisms in online social networks: An extensive review. Comput. Secur. 140: 103790 (2024) - [j33]Nidhi Joraviya, Bhavesh N. Gohil, Udai Pratap Rao:
Ab-HIDS: An anomaly-based host intrusion detection system using frequency of N-gram system call features and ensemble learning for containerized environment. Concurr. Comput. Pract. Exp. 36(23) (2024) - [j32]Chandan Trivedi, Keyur Parmar, Udai Pratap Rao:
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things. Peer Peer Netw. Appl. 17(2): 665-684 (2024) - [j31]Nidhi Joraviya, Bhavesh N. Gohil, Udai Pratap Rao:
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment. J. Supercomput. 80(9): 12218-12246 (2024) - 2023
- [j30]Dilay Parmar, Udai Pratap Rao:
Privacy-preserving enhanced dummy-generation technique for location-based services. Concurr. Comput. Pract. Exp. 35(2) (2023) - [j29]Ankur O. Bang, Udai Pratap Rao, Pallavi Kaliyar, Mauro Conti:
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 55(2): 44:1-44:36 (2023) - [j28]Dilay Parmar, Padmaja Joshi, Udai Pratap Rao, A. Sathish Kumar, Ashwin Nivangune:
A discovery and selection protocol for decentralised cloudlet systems. Int. J. Cloud Comput. 12(1): 1-22 (2023) - [j27]Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:
A review on cloud security issues and solutions. J. Comput. Secur. 31(4): 365-391 (2023) - [j26]Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao, Sonu Kumar:
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. Peer Peer Netw. Appl. 16(3): 1445-1467 (2023) - [j25]Chandan Trivedi, Udai Pratap Rao, Keyur Parmar, Pronaya Bhattacharya, Sudeep Tanwar, Ravi Sharma:
A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions. Secur. Priv. 6(5) (2023) - [j24]Ankur O. Bang, Udai Pratap Rao:
Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case. SN Comput. Sci. 4(4): 329 (2023) - [j23]Chandan Trivedi, Udai Pratap Rao:
Secrecy aware key management scheme for Internet of Healthcare Things. J. Supercomput. 79(11): 12492-12522 (2023) - 2022
- [j22]Gordhan Jethava, Udai Pratap Rao:
User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks. Comput. Electr. Eng. 99: 107753 (2022) - [j21]Gordhan Jethava, Udai Pratap Rao:
A novel trust prediction approach for online social networks based on multifaceted feature similarity. Clust. Comput. 25(6): 3829-3843 (2022) - [j20]Ankur O. Bang, Udai Pratap Rao, Andrea Visconti, Alessandro Brighente, Mauro Conti:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. Comput. Secur. 123: 102914 (2022) - [j19]Sweta Singh, Rakesh Kumar, Udai Pratap Rao:
Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-25 (2022) - [j18]Sweta Singh, Rakesh Kumar, Udai Pratap Rao:
Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-26 (2022) - [j17]Brijesh B. Mehta, Udai Pratap Rao:
Improved l-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing. J. King Saud Univ. Comput. Inf. Sci. 34(4): 1423-1430 (2022) - [j16]Ankur O. Bang, Udai Pratap Rao:
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things. Peer-to-Peer Netw. Appl. 15(1): 642-665 (2022) - [j15]Gordhan Jethava, Udai Pratap Rao:
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs). Peer-to-Peer Netw. Appl. 15(5): 2253-2269 (2022) - [j14]Ankur O. Bang, Udai Pratap Rao:
Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices. J. Supercomput. 78(8): 11111-11137 (2022) - [c8]Mukul Dhaka, Udai Pratap Rao, Akhil Chaurasia:
User Authentication using Behavioural Biometrics with Machine Learning. ANTS 2022: 255-260 - 2021
- [j13]Nikunj Domadiya, Udai Pratap Rao:
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining. Computing 103(1): 155-177 (2021) - [j12]Nikunj Domadiya, Udai Pratap Rao:
Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study. SN Comput. Sci. 2(6): 418 (2021) - [j11]Ankur O. Bang, Udai Pratap Rao:
A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case. J. Supercomput. 77(12): 13703-13738 (2021) - 2020
- [j10]Ruchika Gupta, Udai Pratap Rao:
Preserving location privacy using three layer RDV masking in geocoded published discrete point data. World Wide Web 23(1): 175-206 (2020) - [c7]Dilay Parmar, Udai Pratap Rao:
Dummy Generation-Based Privacy Preservation for Location-Based Services. ICDCN 2020: 63:1
2010 – 2019
- 2019
- [j9]Udai Pratap Rao, Brijesh B. Mehta, Nikhil Kumar:
Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing. Int. J. Inf. Technol. Web Eng. 14(2): 27-40 (2019) - [j8]Brijesh B. Mehta, Udai Pratap Rao, Ruchika Gupta, Mauro Conti:
Towards privacy preserving unstructured big data publishing. J. Intell. Fuzzy Syst. 36(4): 3471-3482 (2019) - [j7]Ruchika Gupta, Udai Pratap Rao:
VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services. Wirel. Pers. Commun. 107(2): 1041-1059 (2019) - [c6]Brijesh B. Mehta, Ruchika Gupta, Udai Pratap Rao, Mukesh Muthiyan:
A Scalable ($\alpha, k$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing. ICCCNT 2019: 1-6 - [c5]Udai Pratap Rao, Gargi Baser, Ruchika Gupta:
SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics. WIDECOM 2019: 233-255 - 2018
- [c4]Nikunj H. Domadiya, Udai Pratap Rao:
Privacy Preserving Approach for Association Rule Mining in Horizontally Partitioned Data using MFI and Shamir's Secret Sharing. ICIIS 2018: 217-222 - 2017
- [j6]Brijesh B. Mehta, Udai Pratap Rao:
Privacy preserving big data publishing: a scalable k-anonymization approach using MapReduce. IET Softw. 11(5): 271-276 (2017) - [j5]Udai Pratap Rao, Nikhil Kumar Singh:
Weighted Role Based Data Dependency Approach for Intrusion Detection in Database. Int. J. Netw. Secur. 19(3): 358-370 (2017) - [j4]Ruchika Gupta, Udai Pratap Rao:
Achieving location privacy through CAST in location based services. J. Commun. Networks 19(3): 239-249 (2017) - [j3]Ruchika Gupta, Udai Pratap Rao:
A Hybrid Location Privacy Solution for Mobile LBS. Mob. Inf. Syst. 2017: 2189646:1-2189646:11 (2017) - [j2]Ruchika Gupta, Udai Pratap Rao:
An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey. Wirel. Pers. Commun. 96(2): 1973-2007 (2017) - 2016
- [c3]Dilay Parmar, A. Sathish Kumar, Ashwin Nivangune, Padmaja Joshi, Udai Pratap Rao:
Discovery and selection mechanism of cloudlets in a decentralized MCC environment. MOBILESoft 2016: 15-16 - 2014
- [i1]Brijesh B. Mehta, Udai Pratap Rao:
A Novel approach as Multi-place Watermarking for Security in Database. CoRR abs/1402.7341 (2014) - 2013
- [j1]Udai Pratap Rao, Dhiren R. Patel:
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions. Inf. Secur. J. A Glob. Perspect. 22(1): 35-45 (2013) - 2010
- [c2]Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
A Survey on Preserving Privacy for Sensitive Association Rules in Databases. BAIP 2010: 538-544 - [c1]Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases. IKE 2010: 303-309
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint