Bijendra Kumar

@nsut.ac.in



              

https://researchid.co/bijendra
100

Scopus Publications

2926

Scholar Citations

23

Scholar h-index

66

Scholar i10-index

Scopus Publications

  • RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks
    Deepti Singh, Bijendra Kumar, Samayveer Singh, Satish Chand, and Pradeep Kumar Singh

    Springer Science and Business Media LLC

  • MEnTr@LT-EDI-2024: Multilingual Ensemble of Transformer Models for Homophobia/Transphobia Detection


  • An efficient three-factor authentication protocol for wireless healthcare sensor networks
    Khushil Kumar Saini, Damandeep Kaur, Devender Kumar, and Bijendra Kumar

    Springer Science and Business Media LLC

  • A Trusted Resource Allocation Scheme in Fog Environment to Satisfy High Network Demand
    Vibha Jain and Bijendra Kumar

    Springer Science and Business Media LLC

  • QoS-Aware Task Offloading in Fog Environment Using Multi-agent Deep Reinforcement Learning
    Vibha Jain and Bijendra Kumar

    Springer Science and Business Media LLC

  • Implementing Catboost Algorithm for Allergen Cross Contamination Detection in Food Industry
    Sudharson D, D. Satheesh Kumar, Aman Kumar Dubey, B. Arun Kumar, Vaishali V, and Balavedhaa S

    IEEE
    In the food industry, allergen cross-contamination is a serious problem that necessitates innovative approaches to detection and prevention. In order to tackle this problem, this paper investigates the possibilities of machine learning (ML) techniques, focusing on CatBoost, XGBoost, and LightGBM in particular. Through an analysis of datasets from food processing establishments, the research develops prediction models that leverage on the distinct advantages of these machine learning methods. The models' comparative evaluations demonstrate how well they identify allergen cross-contamination risks, improving food safety protocols. This paper demonstrates the significant role of CatBoost, XGBoost, and LightGBM in strategically controlling allergen cross-contamination and offers insightful information about the applicability of ML. In the final analysis, these results provide a framework for the advancement of risk-mitigating intelligent systems that ensure consumer safety and support the industry’s broader food safety regulations.

  • Exploring the Indian Political YouTube Landscape: A Multimodal Multi-Task Approach


  • IPv6 Addressing Strategy for IoT Network: A Comprehensive Review
    Pragya and Bijendra Kumar

    IEEE
    IPv6 addressing has become increasingly important with the rapid emergence of the Internet of Things (IoT) due to the depletion of IPv4 addresses. Allocating IPv6 in the IoT is challenging because of the large number of devices with limited resources and the requirement for efficient and scalable addressing schemes. This paper comprehensively surveys the various IPv6 addressing strategies for IoT networks.This paper discusses the various factors involved in assigning IPv6 addresses to IoT nodes, including spatial information and allocation processes. The authors provide a detailed overview of existing IPv6 address assignment methods and the different types of IPv6 addresses used in IoT networks.The survey presents a tabular evaluation of the various addressing schemes based on different metrics, including address success rate (ASR), energy consumption,spatial information, communication overhead, and nature of deployment. Additionally, the paper highlights the advantages and disadvantages of different addressing schemes and discusses their areas of applicability.Furthermore, the survey highlights future research directions for addressing IoT, such as developing lightweight address generation schemes and better and secure addressing schemes to mitigate DOS and reconnaissance attacks.It also highlights the need for continued research to address the challenges associated with addressing IoT nodes.

  • IPv6 addressing scheme to enhance the performance by mitigating reconnaissance attack
    Pragya and Bijendra Kumar

    Wiley
    AbstractIn resource‐constrained networks, IPv6 addresses are assigned to devices using SLAAC‐based EUI‐64, which generates unique addresses. However, the constant interface identifier (IID) across networks makes it vulnerable to reconnaissance attacks like location tracking, network activity correlation, address scanning, etc. This research work introduces a new addressing strategy that utilizes the Elegant Pairing function to guarantee the generation of nonpredictable unique IPv6 addresses, thereby mitigating different types of reconnaissance attacks. The proposed scheme achieves 100% address success rate (ASR) based on experimental evaluation while effectively thwarting reconnaissance attacks. Importantly, it achieves security enhancements without additional communication overhead and energy consumption.

  • Detection of Sexism on Social Media with Multiple Simple Transformers


  • WADER at SemEval-2023 Task 9: A Weak-labelling framework for Data augmentation in tExt Regression Tasks


  • Machine Learning Assisted MPU6050-Based Road Anomaly Detection
    Jyoti Tripathi and Bijendra Kumar

    Springer Nature Singapore

  • Sell and Buy Homegrown Vegetables and Fruits Online Using E-Commerce UML Algorithm
    C. Preethi, V.S. Shree Saran, M. Meikannan, S.Shahul Hammed, K. Haripriya, and B.Arun Kumar

    IEEE
    E-commerce, also known as electronic commerce or internet commerce, refers to the exchange of money and data for the purpose of business operations through the internet. The term “ecommerce” is commonly used to refer to the online sale of tangible goods, but it may also refer to any type of commercial transaction made possible via the internet. It is nowadays one of the most important components of the internet. Electronic commerce is the process of conducting business using computer networks. An individual sitting in front of a computer may use all of the Internet's resources to purchase or sell things. E-commerce, which began in the early 1990s, has made enormous strides in the world of computers. B2B e-commerce is used to increase the usage of e-commerce in developing nations by enhancing access to global markets for enterprises in developing countries. Regardless of the rapid growth of technology, e-commerce has reached its apex. This article proposes a novel application concept. It describes the public's needs for M-Commerce, as well as the analysis and literacy survey of essential components of mobile devices that use such apps. The design and security of the application are both carefully studied. This study examines the characteristics and possibilities of a mobile E-app for selling and purchasing fresh vegetables. The outcomes demonstrate how the application has impacted the public, employment, and long-term growth.


  • I don't feel so good! Detecting Depressive Tendencies using Transformer-based Multimodal Frameworks
    Manan Suri, Nalin Semwal, Divya Chaudhary, Ian Gorton, and Bijendra Kumar

    ACM
    One of the most common mental illnesses that affects 5% of adults globally is depression. The advancement of social media has meant that more and more people have gained a platform to voice their thoughts and beliefs. People’s social media interactions and posted content can be used to infer critical characteristics such as depressive tendencies which will allow for timely intervention and help. This paper describes a novel supervised approach to detect depressive tendencies in Twitter users using multimodal frameworks which account for user interaction and online behaviour in addition to the tweet content processed using transformers like BERT. The performance of three multimodal frameworks is described with different methods for combining modalities. The best result is obtained a cross-modality based model which improves the baseline by 12% points.

  • Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach
    Vibha Jain and Bijendra Kumar

    Wiley
    With the recent advancements in the Internet of Things, cloud computing has emerged as an important industrial technology that assists in various data analysis operations. However, the remote locality of cloud servers and scalability issues of cloud computing make it unsuitable for real‐time computing‐intensive applications. Fog computing strives to support cloud computing in meeting scalability demands by providing location‐sensitive services closer to end devices. With decentralized heterogeneous resource capabilities, fog architecture can handle several computation‐intensive and delay‐sensitive user requests. Although deploying service providers in an untrustworthy environment makes it challenging to assess the trustworthy acquired services. Conspicuously, in this article, we present a trusted task offloading and resource allocation using blockchain technology. To start with, we analyze direct and indirect trust with a subjective logical aggregation approach using a distributed trust assessment approach. Additionally, we examined the various quality of service parameters and constructed a smart contract that utilizes the state‐of‐the‐art deep reinforcement learning algorithm, namely Deep Deterministic Policy Gradient, to maximize fog revenue while serving as many user requests as possible. The entire process from task generation to results calculation is assisted by blockchain and offloading task transactions are stored in the secure, immutable, and tamper‐resistant ledger. To assess the effectiveness of our proposed scheme, we compared the simulation results with other baseline schemes over different performance metrics in terms of reward, service latency, energy consumption, task drop ratio, and transaction success rate. The results suggest that enabling trust computation improves transaction success by 21%.


  • Auction based cost-efficient resource allocation by utilizing blockchain in fog computing
    Vibha Jain and Bijendra Kumar

    Wiley
    In the IoT‐cloud environment, the growing amount of spawn data may limit performance in terms of communication latency, network traffic, processing power, and energy usage. The introduction of fog computing extends the cloud services nearer to the edge of the network. Since these lightweight fog servers are not able to fulfill the demand of every user node and process each offloaded task due to the limited computation resources. Accordingly, an efficient resource management scheme is required to proficiently handle fog resources. The profit‐driven nature of both the fog service providers and user nodes increases the possibility of malicious activity while resource trading for their advantages or to privilege a bunch of devices. In this article, we designed a trusted and fair incentive mechanism that encourages buyers and sellers to trade by leveraging the benefits of blockchain and smart contracts. Especially, a combinatorial double auction employed market model is proposed which satisfies different economical properties such as individual rationality, budget balance, and truthfulness. Blockchain‐driven decentralized fog environments prevent the tampering of trade‐related information by the malicious nodes. Simulation results indicate that the proposed combinatorial double auction significantly improves the network utilization by improved winner determination and pricing model.


  • Duplicate Address Detection: Significance, Attacks and its Solutions
    Pragya and Bijendra Kumar

    IEEE
    IoT is a platform that allows various things to connect and communicate with one another. IPv6 is used to simplify the addressing process in order to address the IPv4 limitation. Each device needs an IPv6 address, which needs to be distinct and unique, in order to join a network. The DAD procedure is a useful tool for detecting address duplication in a network. It is necessary for each IoT object to create a unique IPv6 address when it joins the network in order to communicate with other nodes. The practice of detecting duplicate addresses is employed in order to ensure the unique address to each object before joining the network. This paper discusses the significance of the DAD process, potential dangers to the DAD process, and several author-provided solutions. This paper also presents different lessons learned from the literature and present future research directions towards the DAD process.

  • Quality of Service-Based Resource Management in Fog Computing: A Systematic Review
    Vibha Jain and Bijendra Kumar

    IGI Global
    In recent years, the emergence of the internet of things (IoT) has accelerated the quality of day-to-day tasks. With the rapid development of IoT devices, the cloud computing paradigm has become an attractive solution by facilitating on-demand services. However, the remote location of third-party cloud reduces the overall user experience while increasing the latency involved. Fog computing has been introduced as a promising solution by improving the overall service quality. Fog computing comprises distributed and heterogeneous fog nodes with limited resource capabilities. Therefore, managing fog resources while satisfying users' service quality is a challenging task. This study attempts to conduct a systematic review by examining high-quality research papers published between 2018 and April 2022. This paper aims to address current trends, challenges, and theoretical gaps with a wide range of open issues to guide the researchers and practitioners interested in carrying out the further research in the current domain.

  • Detection of Alzheimer's disease at Early Stage using Machine Learning
    S. Pavalarajan, B.Arun Kumar, S.Shahul Hammed, K. Haripriya, C. Preethi, and T. Mohanraj

    IEEE
    Identification of dementia is an important concern in medical image processing. Alzheimer is a common kind of dementia. Four machine learning models were designed for identifying this disease. This is classified as a classification problem, and the classification algorithms tested include logistic regression, support vector classifier, decision tree, and random forest classifier. The models are fine tuned by choosing optimal values for parameters that influences the accuracy of the model. The optimal parameters are found using a K-fold cross validation score, and the models are generated using that. The dataset used in the model is longitudinal cross sectional data from OASIS. It has been inferred from the results that random forest classifier performs well than the other models.

  • A Trend Analysis of Significant Topics Over Time in Machine Learning Research
    Deepak Sharma, Bijendra Kumar, Satish Chand, and Rajiv Ratn Shah

    Springer Science and Business Media LLC



RECENT SCHOLAR PUBLICATIONS

  • Development of controlled-release matrix tablets of anti-diabetic agent using natural and synthetic polymers
    C Prudhvi, S Sivaneswari, N Preethi, B Mounika, BN Kumar, SV Murthy, ...
    Intelligent Pharmacy 1 (3), 145-151 2023

  • A trusted resource allocation scheme in fog environment to satisfy high network demand
    V Jain, B Kumar
    Arabian Journal for Science and Engineering 48 (8), 9769-9786 2023

  • Considerations for patient and public involvement and engagement in health research
    OL Aiyegbusi, C McMullan, SE Hughes, GM Turner, A Subramanian, ...
    Nature Medicine 29 (8), 1922-1929 2023

  • Analysis of Heterotic Potential for Yield and Its Contributing Traits in Wheat (Triticum aestivum L.)
    B Reddy, B Kumar, R Kumar, H Thota
    International Journal of Environment and Climate Change 13 (9), 388-400 2023

  • Analysis of heterosis and heterobeltiosis for earliness, yield and its contributing traits in okra (Abelmoschus esculentus L. Moench)
    PL Chaudhary, B Kumar, R Kumar
    International Journal of Plant and Soil Science 35 (11), 84-98 2023

  • Machine Learning Assisted MPU6050-Based Road Anomaly Detection
    J Tripathi, B Kumar
    Machine Vision and Augmented Intelligence: Select Proceedings of MAI 2022 2023

  • WADER at SemEval-2023 Task 9: A Weak-labelling framework for Data augmentation in tExt Regression Tasks
    M Suri, A Garg, D Chaudhary, I Gorton, B Kumar
    arXiv preprint arXiv:2303.02758 2023

  • Genetic Diversity and Spatiotemporal Distribution of SARS-CoV-2 Alpha Variant in India. COVID 2023, 3, 472–479
    J Parasar, RK Pandey, Y Patel, PP Singh, A Srivastava, RK Mishra, ...
    2023

  • A Comprehensive Understanding of Text Region Identification and Localization in Scene Imagery Using DL Practices
    R Devi, B Kumar
    Machine Learning, Image Processing, Network Security and Data Sciences 2023

  • Multimodal Analysis and Modality Fusion for Detection of Depression from Twitter Data
    N Semwal, M Suri, D Chaudhary, I Gorton, B Kumar
    Association for the Advancement of Artificial Intelligence, 1-5 2023

  • Qos-aware task offloading in fog environment using multi-agent deep reinforcement learning
    V Jain, B Kumar
    Journal of Network and Systems Management 31 (1), 7 2023

  • Detection of sexism on social media with multiple simple transformers
    C Jhakal, K Singal, M Suri, D Chaudhary, I Gorton, B Kumar
    Working Notes of CLEF 2023

  • I don’t feel so good! Detecting Depressive Tendencies using Transformer-based Multimodal Frameworks
    M Suri, N Semwal, D Chaudhary, I Gorton, B Kumar
    Proceedings of the 2022 5th International Conference on Machine Learning and 2022

  • Improving Medical Predictions with Label Noise Tolerant Classification
    S Vernekar, A Ayyar, A Rajagopalan, B Kumar, VK Mishra
    2022 4th International Conference on Advances in Computing, Communication 2022

  • Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach
    V Jain, B Kumar
    Transactions on Emerging Telecommunications Technologies 33 (11), e4587 2022

  • Estimation of Heritability and Genetic Advance in Wheat (Triticum aestivum L.)
    B Kumar, S Kumar, SV Singh
    International Journal of Environment and Climate Change 12 (11), 2391-2400 2022

  • Prognostic correlation between 18F-FDG PET/CT and molecular markers in breast cancer patients
    V Baghel, JK Rai, SB Kumar, SK Abua, B Bhushan, V Meshram
    EUROPEAN JOURNAL OF NUCLEAR MEDICINE AND MOLECULAR IMAGING 49 (SUPPL 1 2022

  • Cybertwin-driven resource allocation using deep reinforcement learning in 6G-enabled edge environment
    V Jain, B Kumar, A Gupta
    Journal of King Saud University-Computer and Information Sciences 34 (8 2022

  • Auction based cost‐efficient resource allocation by utilizing blockchain in fog computing
    V Jain, B Kumar
    Transactions on Emerging Telecommunications Technologies 33 (7), e4469 2022

  • Flood susceptibility mapping using extremely randomized trees for Assam 2020 floods
    S Sachdeva, B Kumar
    Ecological Informatics 67, 101498 2022

MOST CITED SCHOLAR PUBLICATIONS

  • Heterogeneous HEED protocol for wireless sensor networks
    S Chand, S Singh, B Kumar
    Wireless personal communications 77, 2117-2139 2014
    Citations: 123

  • Energy efficient clustering protocol using fuzzy logic for heterogeneous WSNs
    S Singh, S Chand, B Kumar
    Wireless Personal Communications 86, 451-475 2016
    Citations: 81

  • Formulation of the reference Indian adult: anatomic and physiologic data
    SC Jain, SC Metha, B Kumar, AR Reddy, A Nagaratnam
    Health physics 68 (4), 509-522 1995
    Citations: 79

  • Comparison of gradient boosted decision trees and random forest for groundwater potential mapping in Dholpur (Rajasthan), India
    S Sachdeva, B Kumar
    Stochastic Environmental Research and Risk Assessment 35 (2), 287-306 2021
    Citations: 69

  • Cost optimized hybrid genetic-gravitational search algorithm for load scheduling in cloud computing
    D Chaudhary, B Kumar
    Applied Soft Computing 83, 105627 2019
    Citations: 69

  • Epidemiological characterization of avian Salmonella enterica serovar infections in India
    B Prakash, G Krishnappa, L Muniyappa, BS Kumar
    International Journal of Poultry Science 4 (6), 388-395 2005
    Citations: 66

  • NEECP: Novel energy‐efficient clustering protocol for prolonging lifetime of WSNs
    S Singh, S Chand, R Kumar, A Malik, B Kumar
    IET Wireless Sensor Systems 6 (5), 151-157 2016
    Citations: 58

  • Cloudy GSA for load scheduling in cloud computing
    D Chaudhary, B Kumar
    Applied Soft Computing 71, 861-871 2018
    Citations: 43

  • Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
    D Kumar, S Chand, B Kumar
    Journal of Ambient Intelligence and Humanized Computing 10, 641-660 2019
    Citations: 37

  • Protocol processing device and method
    B Kumar, S Subrahmanya
    US Patent App. 10/965,246 2005
    Citations: 36

  • Silicified Cyanobacteria from the Cherts of Archaean Sandur Schist Belt-Karnataka, India
    SM Naqvi, BS Venkatachala, M Shukla, B Kumar, R Natarajan, M Sharma
    Geological Society of India, 535-539 1987
    Citations: 35

  • Text detection and localization in natural scene images based on text awareness score
    R Soni, B Kumar, S Chand
    Applied Intelligence 49 (4), 1376-1405 2019
    Citations: 34

  • Development of a microfluidic device for cell concentration and blood cell-plasma separation
    MS Maria, BS Kumar, TS Chandra, AK Sen
    Biomedical microdevices 17, 1-19 2015
    Citations: 34

  • Estimation of rutin and quercetin in Terminalia chebula by HPLC
    BS Kumar, K Lakshman, KN Jayaveera, NV Krishna, M Manjunath, ...
    Asian Journal of Research in Chemistry 2 (4), 388-389 2009
    Citations: 34

  • Flood susceptibility mapping using extremely randomized trees for Assam 2020 floods
    S Sachdeva, B Kumar
    Ecological Informatics 67, 101498 2022
    Citations: 31

  • A trend analysis of machine learning research with topic models and mann-kendall test
    D Sharma, B Kumar, S Chand
    International Journal of Intelligent Systems and Applications 11 (2), 70-82 2019
    Citations: 31

  • Hepatoprotective and antioxidant activities of Amaranthus viridis Linn.
    BSA Kumar, K Lakshman, VBN Swamy, PAA Kumar, DS Shekar, B Manoj, ...
    2011
    Citations: 31

  • Genetic algorithm‐based meta‐heuristic for target coverage problem
    Manju, S Chand, B Kumar
    IET Wireless Sensor Systems 8 (4), 170-175 2018
    Citations: 27

  • A survey on journey of topic modeling techniques from SVD to deep learning
    D Sharma, B Kumar, S Chand
    International Journal of Modern Education and Computer Science 9 (7), 50 2017
    Citations: 27

  • A space based reversible high capacity text steganography scheme using font type and style
    R Kumar, A Malik, S Singh, B Kumar, S Chand
    2016 International Conference on Computing, Communication and Automation 2016
    Citations: 27