Area of Interest
Machine Learning and Its Application
Securing Scada Network
Fedreated Learning
Security Applications for Critical Infrastructure
Privacy Preserving Machine Learning
Intrusion Detection Systems
Security and Privacy Issues in Cloud Computing
Secure Outsourcing, Applications on Public Cloud Servers
Journal Article Details
SLP-RRFPR: A Source Location Privacy Protection Scheme Based on Random Ring and Limited Hop Fake Packet Routing for Wireless Sensor Networks, Multimedia Tools and Applications, Springer, Vol 81 (2022), (SCI Indexed, IF-2.7)
A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication, Journal of Intelligent & Fuzzy Systems, vol no. 38, no. 5. pg no. 6445-6455, 2020, (SCI Indexed, IF-1.7)
Data confidentiality and integrity preserving outsourcing algorithm for Matrix-Chain Multiplication to a malicious cloud server, Journal of Intelligent & Fuzzy Systems, vol no. 34, no. 3, pg no. 1251-1263, 2018, (SCI Indexed, IF-1.7)
A comprehensive survey on security and privacy issues of publicly delegable algorithms, International Journal of Pure and Applied Mathematics, 118 (Special Issue 9), pp. 33-44. (Scopus Index)
Privacy Preserving and Efficient Outsourcing to Public Cloud: A Case of Statistical Analysis, International Journal of Information Security and Privacy, vol 12, no. 4, IGI Global 2017 (Scopus, E-SCI, H-Index 12).
Privacy preserving, verifiable and efficient outsourcing algorithm for matrix multiplication to a malicious cloud server. Cogent Engineering, Taylor & Francis 4(1), 1–20, 2017 (Scopus, Thomson Reuters E-SCI, Q2, SJR 0.27)
Privacy Preserving, Verifiable and Efficient Outsourcing Algorithm for Regression Analysis to a Malicious Cloud, Journal of Intelligent & Fuzzy Systems, vol. 32, no. 5, pp. 3413-3427, 2017, (SCI Indexed, IF-1.7).
Cost Effective Genetic Algorithm for Workflow Scheduling in Cloud under Deadline Constraint”, Journal of IEEE Access, IEEE, (SCI Indexed, IF-4.5)
A Systematic Review on Effective Workflow Scheduling Algorithms in Cloud Under Deadline Constraint,” IJCTA‐International J. Control Theory Appl., vol. 9, no. 41, pp. 1160–1170, 2016. (Scopus Index)
Ensemble feature extraction modules for improved Hindi speech recognition system. International Journal of Computer Science Issues (IJCSI), 9(3), 175, 2012.
Conference Article Details
[C1] Kumar D., Srivastava H., Prakhar A., Bhamare K., Kumar M., (2023 Accepted), “An Ensemble- Based Approach for Cyber Attack Detection in Financial Systems", 5th International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR) 2023, Springer, LNSS, NIT Kurukshetra, India
[C2] Kumar Malay, Tirpathi A, Vardhan M, “Reliable and Secure Data Availability in Distributed Cloud Data Storage using Optimal Exact – Regenerating Codes", National Conference on Advances in Computing Applications, IJCA pp. 23-29.
[C3] Kumar, Malay, Meena, J., Vardhan, M., & Jain, S. (2016, August). Secure and Efficient Regression Analysis Outsourcing Algorithm for Cloud Server. In Proceedings of the International Conference on Advances in Information Communication Technology & Computing (p. 63). ACM.
[C4] Kumar, Malay, Meena, J., Singh, R., & Vardhan, M. (2015, October). Data outsourcing: A threat to confidentiality, integrity, and availability. In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on (pp. 1496-1501). IEEE.
[C5] Kumar, Malay, Meena J., Vardhan, M. Secure and Efficient Delegation of System of Linear Equation to a Malicious Cloud Server. In 4th International Conference on Electronics and Communication Systems (ICECS), IEEE, Coimbatore, India-2017
Book Chapter Details
[B1] Tawar R, Kumar P, Kumar, M, Nandal, N, (2023) Applications of Deep Learning Methods in Healthcare and Medical Science, CRC Press Taylor Francis
[B2] Shukla A., Tripathi S. and Kumar Malay, (2022), Deployment and Analysis of Random Walk and Random way point Mobility Model for WSN Assisted IoT Hierarchical Framework, 5G and Beyond – The Futuristic IOT, CRC Press, Taylor and Francis
[B3] Kumar, Malay, Vardhan, M. (2017). Data confidentiality and integrity preserving outsourcing algorithm for system of linear equation to a malicious cloud server. Handbook of Research on Big Data Management and the Internet of Things for Improved Health Systems, IGI Global.
[B4] Kumar Malay, Vardhan Manu. (2019). A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplication, International Conference an Engineering Vibration, Communication and Information Processing, Lecture Notes in Electrical Engineering Series in Springer
Google Scholar Link
https://scholar.google.com/citations?user=gNdnWKgAAAAJ&hl=en&oi=ao