default search action
Surjeet Dalal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Nisha Devi, Sandeep Dalal, Kamna Solanki, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Simaiya, Nasratullah Nuristani:
A systematic literature review for load balancing and task scheduling techniques in cloud computing. Artif. Intell. Rev. 57(10): 276 (2024) - [j25]Sumit, Rajender Singh Chhillar, Sandeep Dalal, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Samiya:
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm. Clust. Comput. 27(5): 7023-7048 (2024) - [j24]Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya:
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. Comput. Secur. 136: 103560 (2024) - [j23]Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Yogesh Kumar Sharma:
An adaptive mobility-aware secure handover and scheduling protocol for Earth Observation (EO) communication using fog computing. Earth Sci. Informatics 17(3): 2429-2446 (2024) - [j22]Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Neetu Faujdar, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Abdullah Algarni:
Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation. J. Cloud Comput. 13(1): 126 (2024) - [j21]Umesh Kumar Lilhore, Sarita Simiaya, Musaed A. Alhussein, Neetu Faujdar, Surjeet Dalal, Khursheed Aurangzeb:
Optimizing protein sequence classification: integrating deep learning models with Bayesian optimization for enhanced biological analysis. BMC Medical Informatics Decis. Mak. 24(1): 236 (2024) - [j20]Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Robertas Damasevicius:
A smart waste classification model using hybrid CNN-LSTM with transfer learning for sustainable environment. Multim. Tools Appl. 83(10): 29505-29529 (2024) - [j19]Umesh Kumar Lilhore, Surjeet Dalal, Neetu Faujdar, Sarita Simaiya, Mamta Dahiya, Shilpi Tomar, Arshad Hashmi:
Unveiling the prevalence and risk factors of early stage postpartum depression: a hybrid deep learning approach. Multim. Tools Appl. 83(26): 68281-68315 (2024) - [j18]Surjeet Dalal, Umesh Kumar Lilhore, Nidhi Sharma, Shakti Arora, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Improving smart home surveillance through YOLO model with transfer learning and quantization for enhanced accuracy and efficiency. PeerJ Comput. Sci. 10: e1939 (2024) - [j17]Sudha Yadav, Harkesh Sehrawat, Vivek Jaglan, Yudhvir Singh, Surjeet Dalal, Dac-Nhuong Le:
Developing Model-Agnostic Meta-Learning Enabled Lightbgm Model Asthma Level Prediction in Smart Healthcare Modeling. Scalable Comput. Pract. Exp. 25(6) (2024) - [j16]Rekha Nagar, Yudhvir Singh, Meenakshi Malik, Surjeet Dalal:
FdAI: Demand Forecast Model for Medical Tourism in India. SN Comput. Sci. 5(4): 431 (2024) - 2023
- [j15]Amit Malik, Edeh Michael Onyema, Surjeet Dalal, Umesh Kumar Lilhore, Darpan Anand, Ashish Sharma, Sarita Simaiya:
Forecasting students' adaptability in online entrepreneurship education using modified ensemble machine learning model. Array 19: 100303 (2023) - [j14]Surjeet Dalal, M. Poongodi, Umesh Kumar Lilhore, Fadl Dahan, Thavavel Vaiyapuri, Ismail Keshta, Sultan Mesfer Aldossary, Amena Mahmoud, Sarita Simaiya:
Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans. Emerg. Telecommun. Technol. 34(6) (2023) - [j13]Surjeet Dalal, Edeh Michael Onyema, Pawan Kumar, Didiugwu Chizoba Maryann, Akindutire Opeyemi Roselyn, Mercy Ifeyinwa Obichili:
A hybrid machine learning model for timely prediction of breast cancer. Int. J. Model. Simul. Sci. Comput. 14(4): 2341023:1-2341023:21 (2023) - [j12]Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed Alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar:
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J. Cloud Comput. 12(1): 14 (2023) - [j11]Surjeet Dalal, Umesh Kumar Lilhore, Neetu Foujdar, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. J. Cloud Comput. 12(1): 137 (2023) - [j10]Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, Sarita Simaiya, Manel Ayadi, Nouf Abdullah Almujally, Amel Ksibi:
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree. J. Cloud Comput. 12(1): 144 (2023) - [j9]Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed Alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar:
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. J. Cloud Comput. 12(1): 166 (2023) - [j8]Surjeet Dalal, Umesh Kumar Lilhore, Poongodi Manoharan, Uma Rani, Fadl Dahan, Fahima Hajjej, Ismail Keshta, Ashish Sharma, Sarita Simaiya, Kaamran Raahemifar:
An Efficient Brain Tumor Segmentation Method Based on Adaptive Moving Self-Organizing Map and Fuzzy K-Mean Clustering. Sensors 23(18): 7816 (2023) - [j7]Umesh Kumar Lilhore, Poongodi Manoharan, Sarita Simaiya, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Surjeet Dalal, Ashish Sharma, Kaamran Raahemifar:
HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors 23(18): 7856 (2023) - 2022
- [j6]John Zaki, Anand Nayyar, Surjeet Dalal, Zainab Hassan Ali:
House price prediction using hedonic pricing model and machine learning techniques. Concurr. Comput. Pract. Exp. 34(27) (2022) - [j5]Bijeta Seth, Surjeet Dalal, Vivek Jaglan, Dac-Nhuong Le, Senthilkumar Mohan, Gautam Srivastava:
Integrating encryption techniques for secure data storage in the cloud. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j4]Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, Bijeta Seth, Praise Young, Mohd Anas Wajid:
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. J. Cloud Comput. 11: 26 (2022) - [j3]Meenakshi Malik, Rainu Nandal, Surjeet Dalal, Ujjawal Maan, Dac-Nhuong Le:
An efficient driver behavioral pattern analysis based on fuzzy logical feature selection and classification in big data analysis. J. Intell. Fuzzy Syst. 43(3): 3283-3292 (2022) - 2021
- [j2]Surjeet Dalal, Osamah Ibrahim Khalaf:
Prediction of Occupation Stress by Implementing Convolutional Neural Network Techniques. J. Cases Inf. Technol. 23(3): 27-42 (2021) - 2020
- [c1]Surjeet Dalal, Akshat Agrawal, Neeraj Dahiya, Jatin Verma:
Software Process Improvement Assessment for Cloud Application Based on Fuzzy Analytical Hierarchy Process Method. ICCSA (4) 2020: 989-1001
2010 – 2019
- 2019
- [p3]Bijeta Seth, Surjeet Dalal, Raman Kumar:
Hybrid Homomorphic Encryption Scheme for Secure Cloud Data Storage. Recent Advances in Computational Intelligence 2019: 71-92 - [p2]Shakti Arora, Surjeet Dalal, Raman Kumar:
A Variant of Secret Sharing Protected with Poly-1305. Recent Advances in Computational Intelligence 2019: 107-119 - [p1]Bijeta Seth, Surjeet Dalal, Raman Kumar:
Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future. Recent Advances in Computational Intelligence 2019: 121-147 - 2018
- [j1]Dac-Nhuong Le, Bijeta Seth, Surjeet Dalal:
A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach. J. Cyber Secur. Mobil. 7(4): 379-408 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint