default search action
Heena Rathore
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j15]Harsh Agarwal, Heena Rathore:
BGRL: Basal Ganglia inspired Reinforcement Learning based framework for deep brain stimulators. Artif. Intell. Medicine 147: 102736 (2024) - [j14]Heena Rathore, Yash Kumar Singhal, George Kodimattam Joseph:
Social-Psychology-Inspired Reinforcement Learning Framework for Conflict Management in Connected Vehicles. IEEE Trans. Cogn. Dev. Syst. 16(2): 534-543 (2024) - 2023
- [j13]Heena Rathore, Amr Mohamed, Mohsen Guizani, Shailendra Rathore:
Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach. Neural Comput. Appl. 35(33): 23697-23710 (2023) - [j12]Santosh Kumar Yadav, Achleshwar Luthra, Esha Pahwa, Kamlesh Tiwari, Heena Rathore, Hari Mohan Pandey, Peter Corcoran:
DroneAttention: Sparse weighted temporal attention for drone-camera based activity recognition. Neural Networks 159: 57-69 (2023) - [j11]Heena Rathore, Siva Sai, Akshay Gundewar:
Social Psychology Inspired Distributed Ledger Technique for Anomaly Detection in Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 24(7): 7092-7107 (2023) - 2022
- [j10]Kartik Narayan, Heena Rathore, Faycal Znidi:
Using Epidemic Modeling, Machine Learning and Control Feedback Strategy for Policy Management of COVID-19. IEEE Access 10: 98244-98258 (2022) - [j9]Santosh Kumar Yadav, Siva Sai, Akshay Gundewar, Heena Rathore, Kamlesh Tiwari, Hari Mohan Pandey, Mohit Mathur:
CSITime: Privacy-preserving human activity recognition using WiFi channel state information. Neural Networks 146: 11-21 (2022) - 2021
- [j8]Heena Rathore, Abhay Samant, Murtuza Jadliwala:
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. ACM Trans. Cyber Phys. Syst. 5(1): 6:1-6:25 (2021) - 2020
- [j7]Heena Rathore, Chenglong Fu, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani, Zhengtao Yu:
Multi-layer security scheme for implantable medical devices. Neural Comput. Appl. 32(9): 4347-4360 (2020) - [j6]Heena Rathore, Amr Mohamed, Mohsen Guizani:
A Survey of Blockchain Enabled Cyber-Physical Systems. Sensors 20(1): 282 (2020) - 2019
- [j5]Heena Rathore, Abdulla Khalid Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants. IEEE Access 7: 24154-24164 (2019) - 2018
- [j4]Heena Rathore, Lothar Wenzel, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment. IEEE Access 6: 44718-44730 (2018) - [j3]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables. IEEE Access 6: 78016-78030 (2018) - 2016
- [j2]Heena Rathore, Venkataramana Badarla, George Kodimattam Joseph:
Sociopsychological trust model for Wireless Sensor Networks. J. Netw. Comput. Appl. 62: 75-87 (2016) - [j1]Heena Rathore, Venkataramana Badarla, Supratim Shit:
Consensus-Aware Sociopsychological Trust Model for Wireless Sensor Networks. ACM Trans. Sens. Networks 12(3): 21:1-21:27 (2016)
Conference and Workshop Papers
- 2024
- [c27]Pranay Chowdary Jasti, Henry Griffith, Heena Rathore:
A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle Security. CCNC 2024: 714-720 - [c26]Pranay Chowdary Jasti, Henry Griffith, Heena Rathore:
Detecting and Mitigating Colluding Attacks in Connected Vehicles using Reinforcement Learning. ICCE 2024: 1-6 - [c25]Gianna Voce, Henry Griffith, Heena Rathore:
Avoiding False Social Conformity in Majority-Malicious Connected Vehicle Networks Employing Consensus-Based Reputation Estimates. ICCE 2024: 1-6 - 2023
- [c24]Heena Rathore, Henry Griffith:
Leveraging Neuro-Inspired Reinforcement Learning for Secure Reputation-based Communication in Connected Vehicles. CNS 2023: 1-6 - [c23]Henry Griffith, Malik Farooq, Heena Rathore:
A Data Generation Workflow for Consensus-Based Connected Vehicle Security. ICCE 2023: 1-2 - [c22]Satyam Srivastava, Heena Rathore, Kamlesh Tiwari:
CEMDQN: Cognitive-inspired Episodic Memory in Deep Q-networks. IJCNN 2023: 1-6 - [c21]Abdullah Kamal, Zaid Jamal, Gabriel Rosales, Brian Robinson, Zachary Sotny, Heena Rathore:
Image to Text Recognition for Detecting Human and Machine Altered News in Social Media. IOTSMS 2023: 72-74 - [c20]Gianna Voce, Marbella Castillo, Henry Griffith, Heena Rathore:
Poster: Opinion Dynamics for Enhancing Trust and Security in Connected Vehicle Networks. MobiHoc 2023: 562-564 - [c19]Marbella Castillo, Gianna Voce, Henry Griffith, Heena Rathore:
Poster: Decentralized Simulation Workflow for Enhancing Connected Vehicle Security. MobiHoc 2023: 574-576 - [c18]Harsh Agarwal, Heena Rathore:
Novel Reinforcement Learning Algorithm for Suppressing Synchronization in Closed Loop Deep Brain Stimulators. NER 2023: 1-5 - [c17]Heena Rathore, Henry Griffith:
GNN-RL: Dynamic Reward Mechanism for Connected Vehicle Security using Graph Neural Networks and Reinforcement Learning. SMARTCOMP 2023: 201-203 - [c16]Heena Rathore, Henry Griffith:
Improving Reinforcement Learning Performance through a Behavioral Psychology-Inspired Variable Reward Scheme. SMARTCOMP 2023: 210-212 - 2022
- [c15]Heena Rathore, Vikram Bhadauria:
Intelligent Decision Making in Autonomous Vehicles using Cognition Aided Reinforcement Learning. WCNC 2022: 524-529 - 2021
- [c14]Heena Rathore, Abhay Samant:
Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations. ICC Workshops 2021: 1-6 - 2020
- [c13]Heena Rathore, Abhay Samant, Joe Camp, George Koutitas:
Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework. PerCom Workshops 2020: 1-6 - 2019
- [c12]Heena Rathore, Abhay Samant, Murtuza Jadliwala, Amr Mohamed:
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles. AutoSec@CODASPY 2019: 45-48 - [c11]Heena Rathore, Abhay Samant, Mohsen Guizani:
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking. NTMS 2019: 1-5 - 2018
- [c10]Heena Rathore, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
DTW based Authentication for Wireless Medical Device Security. IWCMC 2018: 476-481 - [c9]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
Towards a Practical Pedestrian Distraction Detection Framework using Wearables. PerCom Workshops 2018: 239-245 - [c8]Heena Rathore, Mohsen Guizani, Amr Mohamed:
Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks. WINCOM 2018: 1-6 - 2017
- [c7]Heena Rathore, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani:
DLRT: Deep Learning Approach for Reliable Diabetic Treatment. GLOBECOM 2017: 1-6 - [c6]Heena Rathore, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani:
A review of security challenges, attacks and resolutions for wireless medical devices. IWCMC 2017: 1495-1501 - 2014
- [c5]Heena Rathore, Venkataramana Badarla, Sushmita Jha, Anupam Gupta:
Novel approach for security in Wireless Sensor Network using bio-inspirations. COMSNETS 2014: 1-8 - [c4]Heena Rathore, Venkataramana Badarla:
Primary-secondary immune response adaptation for wireless sensor network. SECON 2014: 164-166 - 2013
- [c3]Heena Rathore, Sushmita Jha:
Bio-inspired machine learning based Wireless Sensor Network security. NaBIC 2013: 140-146 - 2012
- [c2]Heena Rathore, Sapana Ranwa, Abhay Samant:
Modular Network Effects on Communicable Disease Models. Asia International Conference on Modelling and Simulation 2012: 126-131 - [c1]Heena Rathore, Abhay Samant:
A system for building immunity in social networks. NaBIC 2012: 20-24
Informal and Other Publications
- 2023
- [i7]Hamzeh Davarikia, Faycal Znidi, Masoud Barati, Heena Rathore:
A New Index based on Power Splitting Indices for Predicting Proper Time of Controlled Islanding. CoRR abs/2303.15530 (2023) - [i6]Palaash Agrawal, Cheston Tan, Heena Rathore:
Advancing Perception in Artificial Intelligence through Principles of Cognitive Science. CoRR abs/2310.08803 (2023) - 2022
- [i5]Santosh Kumar Yadav, Achleshwar Luthra, Esha Pahwa, Kamlesh Tiwari, Heena Rathore, Hari Mohan Pandey, Peter Corcoran:
DroneAttention: Sparse Weighted Temporal Attention for Drone-Camera Based Activity Recognition. CoRR abs/2212.03384 (2022) - [i4]Harsh Agarwal, Heena Rathore:
Novel Reinforcement Learning Algorithm for Suppressing Synchronization in Closed Loop Deep Brain Stimulators. CoRR abs/2212.13260 (2022) - 2021
- [i3]Faycal Znidi, Hamzeh Davarikia, Heena Rathore:
Power Systems Transient Stability Indices: Hierarchical Clustering Based Detection of Coherent Groups Of Generators. CoRR abs/2102.13286 (2021) - 2018
- [i2]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables. CoRR abs/1811.04797 (2018) - 2017
- [i1]Nisha Vinayaga-Sureshkanth, Anindya Maiti, Murtuza Jadliwala, Kirsten Crager, Jibo He, Heena Rathore:
Towards a Practical Pedestrian Distraction Detection Framework using Wearables. CoRR abs/1710.03755 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint