Aparna, N., Preksha, S., Fareetha, R., & Chithra, S. (2025). Secure Gene Profile with AES Encryption and Blockchain. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICAISS61471.2025.11041865
CSE
H, D. U., & Kumar, J. (2025). Enhanced Transfer Learning-Based CNN for Abnormal Human Activity Detection in Video Surveillance Using Spatial-Temporal Features. Cybernetics and Systems. https://doi.org/10.1080/01969722.2025.2521708
Jayasimha, S., Patil, R., Yashashwini, S., Prabu, M., Srisathirapathy, S., & Maranan, R. (2025). Spilled Deep Capsule Neural Network with Skill Optimization Algorithm for Breast Cancer Recognition in Mammograms. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICICT64420.2025.11004784
Janartanan, V., Venkatesh, R., Rao, P., Vaithilingam, S., & Srinivasan, A. (2025). Stress and Depression Classification in Social Media using Contextual Knowledge Attention based Gated Recurrent Network. International Journal of Intelligent Engineering and Systems, 18(3), 420-431,. https://doi.org/10.22266/ijies2025.0430.29
Hoovayya, U., & Kumar, J. (2025). Improved LinkNet-DenseNet architecture with fine-tuned parameters for abnormal human activity detection for video surveillance. Signal, Image and Video Processing, 19(10). https://doi.org/10.1007/s11760-025-04343-w
Devi, K., Kumar, J., & Karanth, S. (2025). Optimized Method for Prediction and Recommendation of Crops Using Fusion Ensemble Learning Crop Recommendation Model. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICAECT63952.2025.10958850
Khan, I., Somshekhar, D., Harikrishnan, N., Neetha, N., & Pavithra, D. (2025). Hierarchical Meta-Reinforcement Learning for Uncertainty-Aware Resource Allocation in C-V2X Networks. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICMLAS64557.2025.10968190
Madhavan, S., Reddy, S. S. M., Kavitha, T., kaleem, A., & Shilpa, V. (2025). Energy-Efficient Reliable Data Transmission Using Optimized Cyclone Foraging Strategy in 5G Wireless Sensor Networks. Internet Technology Letters, 8(2), e643+. https://doi.org/10.1002/itl2.643 (Original work published)
Shirisha, M. G., Prasad, M. S., Naikodi, C., Srinivas, B., & Rao, B. (2025). Secured IoT Data Management Using AES Encryption And Blockchain Technology. Journal of Information Systems Engineering and Management, 10, 728-735,. https://doi.org/10.52783/jisem.v10i9s.1299
Prasad, S., Shirisha, G., Naikodi, C., Srinivas, B., & Rao, B. (2025). A Comparative Study of Sequence of Multiple Fingerprints for Secured Authentication. Journal of Information Systems Engineering and Management, 10, 698-708,. https://doi.org/10.52783/jisem.v10i9s.1296
