Publications

2021

  1. A review on distributed cluster based routing approaches in mobile wireless sensor networks , J Sumathi, RL Velusamy,Journal of Ambient Intelligence and Humanized Computing 12, 835-849 2021

  2. Evidential theoretic deep radial and probabilistic neural ensemble approach for detecting phishing attacks , S Priya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-25 2 2021

  3. SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection , NGB Amma, S Selvakumar, RL Velusamy, Intelligent Data Engineering and Analytics, 41-50 1 2021

  4. Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems , S Sripranav, A Ravi, K Gautham, RL Velusamy, Smart Trends in Computing and Communications: Proceedings of SmartCom 2020 … 1 2021

  5. GSA-RPI: GSA based Rendezvous Point Identification in a two-level cluster based LR-WPAN for uncovering the optimal trajectory of Mobile Data Collection Agent ,S Jayalekshmi, RL Velusamy, Journal of Network and Computer Applications 183, 103048

2020

  1. A cluster-based routing strategy using gravitational search algorithm for wsn , A Kavitha, K Guravaiah, RL Velusamy, Journal of Computing Science and Engineering 14 (1), 26-39 2020

  2. TextSpamDetector: textual content based deep learning framework for social spam detection using conjoint attention mechanism , E Elakkiya, S Selvakumar, RL Velusamy, Journal of Ambient Intelligence and Humanized Computing, 1-16 3 2020

  3. SQL injection detection using REGEX classifier , B Kranthikumar, RL Velusamy, Journal of Xi'an University of Architecture & Technology 12 (6), 800-809 3 2020

  4. Data collection protocols in wireless sensor networks , K Guravaiah, A Kavitha, RL Velusamy, Wireless Sensor Networks-Design, Deployment and Applications 2 2020

  5. A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks , NGB Amma, S Selvakumar, RL Velusamy, IEEE Transactions on Network and Service Management 17 (4), 2511-2522 2 2020

  6. Detection of phishing attacks using radial basis function network trained for categorical attributes , S Priya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 2 2020

  7. CIFAS: Community Inspired Firefly Algorithm with fuzzy cross-entropy for feature selection in Twitter Spam detection , E Elakkiya, S Selvakumar, RL Velusamy, 2020 11th International Conference on Computing, Communication and … 1 2020

  8. Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks , A Kavitha, RL Velusamy, International Journal of Ad Hoc and Ubiquitous Computing 35 (2), 96-116 1 2020

  9. Internet of things for smart gardening and securing home from fire accidents , K Guravaiah, RL Velusamy, Safety, Security, and Reliability of Robotic Systems, 93-106

  10. Correction to: CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1385-1385 2020

  11. CS-CGMP: Clustering Scheme Using Canada Geese Migration Principle for Routing in Wireless Sensor Networks , A Kavitha, K Guravaiah, RL Velusamy, Wireless Personal Communications 115 (2), 1363-1384 2020

  12. Gravitational Search Based Feature Selection for Enhanced Phishing Websites Detection , S Priya, S Selvakumar, RL Velusamy, 2020 2nd International Conference on Innovative Mechanisms for Industry … 2020

2019

  1. Prototype of home monitoring device using Internet of Things and river formation dynamics-based multi-hop routing protocol (RFDHM) , K Guravaiah, RL Velusamy, IEEE Transactions on Consumer Electronics 65 (3), 329-338

  2. Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN) , SK Yadav, P Suguna, RL Velusamy, 2019 10th International Conference on Computing, Communication and … 5 2019

2018

  1. BEACH: Balanced Energy and Adaptive Cluster Head Selection Algorithm for Wireless Sensor Networks. , K Guravaiah, RL Velusamy, Adhoc & Sensor Wireless Networks 42 2018

  2. PRISMO: Priority Based Spam Detection Using Multi Optimization , M Agrawal, RL Velusamy, International Conference on Big Data Analytics, 392-401 2

2017

  1. Energy-efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks , K Guravaiah, RL Velusamy, Wireless Personal Communications 95 (4), 3557-3584 24 2017

  2. Vehicle monitoring using internet of things , K Guravaiah, RG Thivyavignesh, RL Velusamy, Proceedings of the 1st International Conference on Internet of Things and … 2017

  3. Cooperative routing in mobile ad hoc networks using fuzzy logic , U Venkanna, RL Velusamy, International Journal of Ad Hoc and Ubiquitous Computing 25 (3), 147-162 3

2016

  1. TEA-CBRP: Distributed cluster head election in MANET by using AHP ,U Venkanna, RL Velusamy, Peer-to-Peer Networking and Applications 9 (1), 159-170

  2. Kernel approach for similarity measure in latent fingerprint recognition , S Kumar, RL Velusamy, 2016 International Conference on Emerging Trends in Electrical Electronics …

  3. R-salsa: A spam filtering technique for social networking sites , M Agrawal, RL Velusamy, 2016 IEEE Students' Conference on Electrical, Electronics and Computer … 6 2016

  4. Unsupervised spam detection in hyves using SALSA , M Agrawal, RL Velusamy, Proceedings of the 4th International Conference on Frontiers in Intelligent … 6 2016

  5. Performance Analysis of RFDMRP: River Formation Dynamics based Multi-Hop Routing Protocol in WSNs , K Guravaiah, RL Velusamy, arXiv preprint arXiv:1602.04980 3 2016

2015

  1. A cooperative routing for MANET based on distributed trust and energy management , U Venkanna, JK Agarwal, RL Velusamy, Wireless Personal Communications 81 (3), 961-979 2015

  2. Identification of influential nodes from social networks based on enhanced degree centrality measure , A Srinivas, RL Velusamy, 2015 IEEE International Advance Computing Conference (IACC), 1179-1184

  3. RFDMRP: River formation dynamics based multi-hop routing protocol for data collection in wireless sensor networks , K Guravaiah, RL Velusamy, Procedia Computer Science 54, 31-36 17 2015

  4. Optimized local route repair and congestion control in Mobile Ad hoc Network , P Ranjan, RL Velusamy, 2015 International Conference on Computing and Communications Technologies … 9 2015

  5. Latent fingerprint preprocessing: Orientation field correction using region wise dictionary , S Kumar, RL Velusamy , 2015 International Conference on Advances in Computing, Communications and …

2014

  1. Route discovery in Mobile Ad hoc Network using an optimum angle selection based approach, P Ranjan, RL Velusamy, 2014 International Conference on Computer and Communication Technology … 2 2014

  2. Reward based cooperative routing in Mobile Ad hoc Network by using Markov Decision Process , U Venkanna, RL Velusamy, 2014 Recent Advances in Engineering and Computational Sciences (RAECS), 1-6 2014

2013

  1. Mitigating the attacks on recommendation trust model for mobile ad hoc networks , U Venkanna, RL Velusamy, Proc. ERCICA, 123-130 7 2013

  2. Extraction of HTTP messages for retrieval of live evidence , I Mohanty, RL Velusamy, 2013 International Conference on Recent Trends in Information Technology … 2013

2012

  1. Authentication of Digital Documents Using Secret Key Biometric Watermarking ,V Anita, RL Velusamy, International Journal of Communication Network Security 1 (4), 5-11 2012

  2. Information Retrieval from Internet Applications for Digital Forensic , I Mohanty, RL Velusamy, International Journal of Security, Privacy and Trust Management (IJSPTM)

  3. Iris recognition systems with reduced storage and high accuracy using Majority Voting and Haar Transform , V Anitha, RL Velusamy,Advances in Computer Science, Engineering and Applications, 813—822

  4. Recovery of Live Evidence from Internet Applications , I Mohanty, RL Velusamy, Advances in Computer Science, Engineering and applications 167, 823-834

2011

  1. Multi-constraint QoS Unicast Routing Using Genetic Algorithm (MURUGA) , R Leela, S Selvakumar, Applied Soft Computing Journal 11, 1753-1761 2011

  2. Blackhole attack and their countermeasure based on trust management in manet: A survey , U Venkanna, RL Velusamy, third International Conference on Advances in Recent Technologies in 2011

2010

  1. Genetic algorithm approach to dynamic multiconstraint multipath QoS routing algorithm for IP networks R Leela, S Selvakumar, International Journal of Communication Networks and Distributed Systems 2010

  2. Dynamic multi constraint multi path QoS routing algorithm (DMCMPRA) R Leela, S Selvakumar, The International Journal of Computers and Applications 32 (3), 1206-1212

  3. Dynamic multi constraint multi path QoS routing algorithm (DMCMPRA) R Leela, S Selvakumar, Proceedings of the Eighth IASTED International Conference 621, 135

2009

  1. Qos Routing Using Genetic Algorithm (QoSGA) , R Leela, S Selvakumar, International Journal of Computer and Electrical Engineering (IJCEE) 1

  2. Genetic algorithm approach to dynamic multi constraint multi path QoS routing algorithm for IP networks (GA-DMCMPRA) , R Leela, S Selvakumar, Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First … 2009

2008

  1. Multi Constraint Routing for MANETs using Genetic Algorithm (MRMGA), L Velusamy R, S Selvakumar, International Conference on Communications Convergence and Broadband … 2008

  2. A Call-Graph Profiler for GNU Octave M Annamalai, L Velusamy, arXiv preprint arXiv:0810.3468 2008

2006

  1. Octave-GTK: A GTK binding for GNU Octave M Annamalai, H Kumar, L Velusamy, Journals of Software Maintenance and Evolution: Research and Practice 11, 1-11 3 2006