Radhakrishna Bhat
YOU?
Author Swipe
View article: Exploring privacy mechanisms and metrics in federated learning
Exploring privacy mechanisms and metrics in federated learning Open
The federated learning (FL) principle ensures multiple clients jointly develop a machine learning model without exchanging their local data. Various government enacted prohibition policies on data exchange between organizations have led to…
View article: BOUNDS ON NUMBER OF CUTVERTICES AND BLOCKS OF A GRAPH
BOUNDS ON NUMBER OF CUTVERTICES AND BLOCKS OF A GRAPH Open
View article: PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare Open
The Internet of Medical Things has enabled the development of smart healthcare systems, allowing users to collect, process, and transmit patient health data to cloud servers for further analysis. Internet of Things devices and cloud server…
View article: INVERSE BLOCK DOMINATION AND RELATED PARAMETERS IN GRAPHS
INVERSE BLOCK DOMINATION AND RELATED PARAMETERS IN GRAPHS Open
View article: SmartCardio: Advancing cardiac risk prediction through Internet of Things and edge cloud intelligence
SmartCardio: Advancing cardiac risk prediction through Internet of Things and edge cloud intelligence Open
Cardiovascular disease is a leading cause of illness and death globally. The integration of Internet of Things (IoT) and deep learning technologies, including transfer learning, has transformed healthcare by improving the prediction and mo…
View article: Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management
Design of an Efficient and Secure Authentication Scheme for Cloud-Fog-Device Framework Using Key Agreement and Management Open
IoT and Smart devices are typically deployed for real-time applications that need to communicate to the cloud infrastructure for data processing and storage. However, the cloud infrastructure has high network latency, and hence the fog has…
View article: A Secure and Distributed Placement for Quality of Service-Aware IoT Requests in Fog-Cloud of Things: A Novel Joint Algorithmic Approach
A Secure and Distributed Placement for Quality of Service-Aware IoT Requests in Fog-Cloud of Things: A Novel Joint Algorithmic Approach Open
The fast proliferation of internet-enabled devices generates massive amounts of data every day from every aspect of life. These internet-enabled devices lack the storage, processing power, and capacity necessary to handle and store this ma…
View article: A prediction model for flexural strength of corroded prestressed concrete beam using artificial neural network
A prediction model for flexural strength of corroded prestressed concrete beam using artificial neural network Open
The prestressed concrete structures are taking the forefront in recent years due to the innovations in the construction industry. However, corrosion is one of the barriers to the serviceability of the prestressed structures. Therefore, a d…
View article: Generation of Broadband Optical Frequency Comb by Interfering Dual Lasers in Electro-Optic Modulators
Generation of Broadband Optical Frequency Comb by Interfering Dual Lasers in Electro-Optic Modulators Open
In this article, we proposed two schemes for generating a broadband optical frequency comb (OFC) source using dual laser sources. In the first proposed technique, the OFC is generated using a cascaded single-drive Mach-Zehnder modulator (M…
View article: A Lightweight Authentication Framework for Fault-Tolerant Distributed WSN
A Lightweight Authentication Framework for Fault-Tolerant Distributed WSN Open
The vast production of resource-constrained wireless communication devices and the development of various techniques in recent years opens room for security concerns to overcome potential attacks. However, efficient methods are needed to r…
View article: A probabilistic public key encryption switching scheme for secure cloud storage
A probabilistic public key encryption switching scheme for secure cloud storage Open
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the current state-of-art techniques p…
View article: Hunting the pertinency of hash and bloom filter combinations on GPU for fast pattern matching
Hunting the pertinency of hash and bloom filter combinations on GPU for fast pattern matching Open
There has been rapid growth in the field of graphical processing unit (GPU) programming due to the drastic increase in the computing hardware manufacturing. The technology used in these devices is now more affordable and accessible to the …
View article: Efficient transformation capabilities of single database private block retrieval
Efficient transformation capabilities of single database private block retrieval Open
Private information retrieval (PIR) is one of the promising techniques to preserve user privacy in the presence of trusted-but-curious servers. The information theoretically private query construction assures the highest user privacy over …
View article: A secure two-party PIR for privacy applications
A secure two-party PIR for privacy applications Open
The major drawback of existing information retrieval schemes in preserving user privacy is that they either exhibit computationally bounded privacy with intractability assumptions or perfect privacy with high bandwidth utilisation. Today, …
View article: A novel recursive privacy-preserving information retrieval approach for private retrieval
A novel recursive privacy-preserving information retrieval approach for private retrieval Open
View article: A secure two-party PIR for privacy applications
A secure two-party PIR for privacy applications Open
View article: Vertex-vertex color energy of a graph
Vertex-vertex color energy of a graph Open
In this paper we introduce new kind of graph energy, vvcolor energy of a graph denoted as Ecvv(G).It depends both on underlying graph G and its coloring.Upper and lower bounds for Ecvv(G) are established.
View article: A novel recursive privacy-preserving information retrieval approach for private retrieval
A novel recursive privacy-preserving information retrieval approach for private retrieval Open
View article: A novel index retrieval and query optimisation method for private information retrieval in location-based service application
A novel index retrieval and query optimisation method for private information retrieval in location-based service application Open
Location-based service is a popular information and communications technology. Security, trust and privacy are the major concerns preventing the wide deployment of LBS. In this paper, we address privacy issues by employing computational pr…
View article: A novel index retrieval and query optimisation method for private information retrieval in location-based service application
A novel index retrieval and query optimisation method for private information retrieval in location-based service application Open
View article: THE STRONG (WEAK) VV-DOMINATING SET OF A GRAPH
THE STRONG (WEAK) VV-DOMINATING SET OF A GRAPH Open
Two vertices vv-dominate each other if they incident on the same block. A vertex strongly vv-dominates a vertex if u and w, vv-dominate each other and A set of vertices is said to be strong vv-dominating set if each vertex outside the…