Pankaj Choudhary, Vikas Sihag, Gaurav Choudhary, Nicola Dragoni, DrIfTeR: A Drone Identification Technique using RF signals, Forensic Science International: Digital Investigation, Volume 54, 2025, 301948, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2025.301948.
Stefanie Lanz, Sarah Lily-Rose Pignol, Patrick Schmitt, Haochen Wang, Maria Papaioannou, Gaurav Choudhary, and Nicola Dragoni. 2025. "Optimizing Internet of Things Honeypots with Machine Learning: A Review" Applied Sciences 15, no. 10: 5251. https://doi.org/10.3390/app15105251
Kristoffer Torngaard Pedersen, Lauritz Pepke, Tobias Stærmose, Maria Papaioannou, Gaurav Choudhary, and Nicola Dragoni. "Deepfake-Driven Social Engineering: Threats, Detection Techniques, and Defensive Strategies in Corporate Environments" Journal of Cybersecurity and Privacy 5, no. 2: 18. 2025. https://doi.org/10.3390/jcp5020018
Matzen, A., Rüffer, A., Byllemos, M., Heine, O., Papaioannou, M., Choudhary, G., & Dragoni, N. (2025). Challenges and Potential Improvements for Passkey Adoption—A Literature Review with a User-Centric Perspective. Applied Sciences, 15(8), 4414, https://doi.org/10.3390/app15084414.
Bankó, M.B.; Dyszewski, S.; Králová, M.; Limpek, M.B.; Papaioannou, M.; Choudhary, G.; Dragoni, N. Advancements in Machine Learning-Based Intrusion Detection in IoT: Research Trends and Challenges. Algorithms 2025, 18, 209. https://doi.org/10.3390/a18040209
Vikas Kumar Jain, Jatin Aggrawal, Ramraj Dangi, Shiv Shankar Prasad Shukla, Anil Kumar Yadav, and Gaurav Choudhary. "Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies" Information 16, no. 2: 126. https://doi.org/10.3390/info16020126 (2025).
Ankur Pandey, Praveen Kumar Mannepalli, Manish Gupta, Ramraj Dangi & Gaurav Choudhary. A Deep Learning-Based Hybrid CNN-LSTM Model for Location-Aware Web Service Recommendation. Neural Process Lett 56, 234 (2024). https://doi.org/10.1007/s11063-024-11687-w
Abella, Vincent, Johnfil Initan, Jake Mark Perez, Philip Virgil Astillo, Luis Gerardo Cañete, Jr., and Gaurav Choudhary. 2024. "Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation" Future Internet 16, no. 8: 277. https://doi.org/10.3390/fi16080277
Cayme, K. J., Retutal, V. A., Salubre, M. E., Astillo, P. V., Cañete, J. L. G., & Choudhary, G. (2024). Gesture Recognition of Filipino Sign Language Using Convolutional and Long Short-Term Memory Deep Neural Networks. MDPI Knowledge, 4(3), 358-381.
Kumar, S., Kumar, D., Dangi, R., Choudhary, G., Dragoni, N., & You, I. (2024). A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices. Computers, Materials and Continua, 78(1), 31-63.
Ramraj Dangi, Gaurav Choudhary, Nicola Dragoni, Praveen Lalwani, Utkarsh Khare, and Souradeep Kundu. 2023. "6G Mobile Networks: Key Technologies, Directions, and Advances" Telecom 4, no. 4: 836-876. https://doi.org/10.3390/telecom4040037
Vikas Sihag, Gaurav Choudhary, Pankaj Choudhary, and Nicola Dragoni. "Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones." Drones 7, no. 7 (2023): 430.
Prabal Verma, Aditya Gupta, Ramraj Dangi, Gaurav Choudhary, Nicola Dragoni, Ilsun You, "FC-CACPHS: Fog-Cloud Assisted Context-Aware Framework for Cyber-Physical Healthcare System" in International Journal of Ad Hoc and Ubiquitous Computing.
Shubham Joshi, T. P. Anithaashri, Ravi Rastogi, Gaurav Choudhary, and Nicola Dragoni. "IEDA-HGEO: Improved Energy Efficient with Clustering-Based Data Aggregation and Transmission Protocol for Underwater Wireless Sensor Networks." Energies 16, no. 1 (2023): 353.
Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag (2022) ’ A Contemporary Anti Phishing Framework based on Visual Cryptography and Steganography ’ International Journal of Internet Technology and Secured Transactions, 10.1504/IJITST.2023.10054301.
Sirshak Sarkar, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. 2022. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review" Sustainability 14, no. 18: 11213. https://doi.org/10.3390/su141811213
Sandi Rahmadika, Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, Vishal Sharma, and Ilsun You. "Blockchain-based Privacy Preservation Scheme for Misbehavior Detection in Lightweight IoMT Devices", IEEE Journal of Biomedical and Health Informatics, Volume: 27, Issue: 2, February 2023, 10.1109/JBHI.2022.3187037 .
Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, and Nicola Dragoni. "Emerging Cyber Security Challenges after COVID Pandemic: A Survey", Journal of Internet Services and Information Security (JISIS), volume: 12, number: 2 (May), pp. 21-50 DOI:10.22667/JISIS.2022.05.31.021.
R. Velumani, Hariharasitaraman S, Gaurav Choudhary, Srinivasan Bama, Maranthiran V. Jose, and Nicola Dragoni. 2022. "Secured Secret Sharing of QR Codes Based on Nonnegative Matrix Factorization and Regularized Super Resolution Convolutional Neural Network" Sensors 22, no. 8: 2959. https://doi.org/10.3390/s22082959. April 2022.
Gaurav Choudhary, Vikas Sihag, Shristi Gupta, and Shishir Kumar Shandilya. "Aviation Attacks based on ILS and VOR Vulnerabilities", Journal of Surveillance, Security and Safety, 2022;3:27-40. http://dx.doi.org/10.20517/jsss.2021.17.
Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas K. Mishra, and Praveen Lalwani. 2022. "ML-Based 5G Network Slicing Security: A Comprehensive Survey" Future Internet 14, no. 4: 116. https://doi.org/10.3390/fi14040116, April 2022.
Ankit Agrawal, Sarsij Tripathi, Manu Vardhan, Vikas Sihag, Gaurav Choudhary, and Nicola Dragoni. "BERT-Based Transfer-Learning Approach for Nested Named-Entity Recognition Using Joint Labeling" Applied Sciences, 2022 12, no. 3: 976. https://doi.org/10.3390/app12030976.
Ramraj Dangi, Praveen Lalwani, Gaurav Choudhary, Ilsun You, and Giovanni Pau. 2022. "Study and Investigation on 5G Technology: A Systematic Review" Sensors 22, no. 1: 26. https://doi.org/10.3390/s22010026.
Gaurav Dave, Gaurav Choudhary, Vikas Sihag, Ilsun You, and Kim-Kwang Raymond Choo. "Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance." Computers & Security (Jan, 2022): 102516, DOI: https://doi.org/10.1016/j.cose.2021.102516.
Vikas Sihag, Gaurav Choudhary, Manu Vardhan, Pradeep Singh, and Jung Taek Seo. "PICAndro: Packet InspeCtion-based android malware detection." Security and Communication Networks, 2021:1–11, Nov 2021.
Sindhu N Pujar, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag, Arjun Choudhary "An Adaptive Auto Incident Response based Security Framework for Wireless Network Systems", Vol. 7, Article No. 4, August 15, 2021 DOI:0.22667/ReBiCTE.2021.08.15.004.
Shivam Singh, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag, Arjun Choudhary "Counterfeited Product Identification in a Supply Chain using Blockchain Technology", Vol. 7, Article No. 3, July 15, 2021 DOI:10.22667/ReBiCTE.2021.07.15.003.
Vikas Sihag, Manu Vardhan, Pradeep Singh, Gaurav Choudhary, and Seiil Son. "De-LADY: Deep learning-based Android malware detection using Dynamic features." Journal of Internet Services and Information Security (JISIS) 11, no. 2 (2021): 34-45.
Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, Jiyoon Kim and Ilsun You, "TrMAps: Trust Management in Specification-based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System," in IEEE Journal of Biomedical and Health Informatics, doi: 10.1109/JBHI.2021.3063173, March, 2021.
Kailash Kumar, Vikas Sihag, Gaurav Choudhary, "Geofencing based banking authentication system: A fraud mitigation technique", Research Briefs on Information & Communication Technology Evolution (ReBICTE) 6 (3) (2020) 3:1– 3:11.
Gaurav Choudhary, Philip Virgil Astillo, Ilsun You, Kangbin Yim, I.R. Chen, Jin-Hee Cho, “Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems,” IEEE Transactions on Network and Service Management, June 2020, doi: 10.1109/TNSM.2020.3007535.
Gaurav Choudhary, Vishal Sharma, Ilsun You, "Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol" Computers and Electrical Engineering, Volume 74, pp. 59-73, SCI-Indexed, March 2019.
Jiyoon Kim, Gaurav Choudhary, Jaejun Heo, Daniel Gerbi Duguma, Ilsun You "5G Wireless P2MP Backhaul Security Protocol: An Adaptive Approach" EURASIP Journal on Wireless Communications and Networking 2019, 265 (2019) doi:10.1186/s13638-019-1592-0.
Vishal Sharma, Gaurav Choudhary, Yongho Ko, Ilsun You, "Behaviour and Vulnerability Assessment of Drones-enabled Industrial Internet of Things (IIoT)" IEEE Access, Volume 6, pp. 43368-43383, SCI-Indexed, July 2018.
Ilsun You, Soonhyun Kwon, Gaurav Choudhary, Vishal Sharma, Jung Taek Seo "An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-enabled Parking System" Sensors, 18(6), SCIE-Indexed, 2018.
Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae Deok Lim, Jeong Nyeo Kim "Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications" Journal of Internet Technology 2018 Mar 1;19(2):515-30, SCIE-Indexed.
Gaurav Choudhary, Jiyoon Kim, Vishal Sharma, "Security of 5G-Mobile Backhaul Networks: A Survey" Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 9(4), 41-70, Dec 2018.
Takshi Gupta, Gaurav Choudhary, Vishal Sharma, "A Survey on the Security of Pervasive Online Social Networks (POSNs)" Journal of Internet Services and Information Security (JISIS), 8(2), 48-86, May 2018.